<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 113–126—JULY 7, 2014?>


<?I97 128 STAT. ?>
<?I98 128 STAT. ?>
<?I99 128 STAT. ?>
<?I50 PUBLIC LAW 113–126—JULY 7, 2014?>
<?I51 PUBLIC LAW 113–126—JULY 7, 2014?>
<?I52 PUBLIC LAW 113–126—JULY 7, 2014?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 113–126: To authorize appropriations for fiscal year 2014 for intelligence and intelligence-related activities of the United States Government and the Office of the Director of National Intelligence, the Central Intelligence Agency Retirement and Disability System, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>126</docNumber>
<citableAs>Public Law 113–126</citableAs><citableAs>128 Stat. 1390</citableAs>
<approvedDate>2014-07-07</approvedDate>
<dc:date>2014-07-07</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-03</processedDate>
<congress>113</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?1389</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 113–126—JULY 7, 2014</centerRunningHead>
<coverTitle>INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2014</coverTitle>
</note>
<page identifier="/us/stat/128/1390">128 STAT. 1390</page>
<dc:type>Public Law</dc:type><docNumber>113–126</docNumber>
<congress value="113">113th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To authorize appropriations for fiscal year 2014 for intelligence and intelligence-related activities of the United States Government and the Office of the Director of National Intelligence, the Central Intelligence Agency Retirement and Disability System, and for other purposes.<sidenote><p class="centered fontsize8" id="xc9d6f95f-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2014-07-07">July 7, 2014</approvedDate></p><p class="centered fontsize8" id="xc9d6f960-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/113/s/1681">S. 1681</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d6f961-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Intelligence Authorization Act for Fiscal Year 2014.</p></sidenote>
<section id="d396573e98" identifier="/us/pl/113/126/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE; TABLE OF CONTENTS.</heading><subsection class="firstIndent0 fontsize10" id="yc9d74782-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/s1/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Short Title</inline>.—</heading><content>This Act may be cited as the “<shortTitle role="act">Intelligence Authorization Act for Fiscal Year 2014</shortTitle>”.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d74783-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/s1/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents</inline>.—</heading><content>The table of contents for this Act is as follows:<?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 1. </designator>
<label>Short title; table of contents.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 2. </designator>
<label>Definitions.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE I—</designator>
<label>INTELLIGENCE ACTIVITIES</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 101. </designator>
<label>Authorization of appropriations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 102. </designator>
<label>Classified Schedule of Authorizations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 103. </designator>
<label>Personnel ceiling adjustments.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 104. </designator>
<label>Intelligence Community Management Account.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE II—</designator>
<label>CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 201. </designator>
<label>Authorization of appropriations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 202. </designator>
<label>CIARDS and FERS special retirement credit for service on detail to another agency.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE III—</designator>
<label>GENERAL PROVISIONS</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>Subtitle A—</designator>
<label>General Matters</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 301. </designator>
<label>Increase in employee compensation and benefits authorized by law.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 302. </designator>
<label>Restriction on conduct of intelligence activities.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 303. </designator>
<label>Specific authorization of funding for High Performance Computing Center 2.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 304. </designator>
<label>Clarification of exemption from Freedom of Information Act of identities of employees submitting complaints to the Inspector General of the Intelligence Community.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 305. </designator>
<label>Functional managers for the intelligence community.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 306. </designator>
<label>Annual assessment of intelligence community performance by function.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 307. </designator>
<label>Software licensing.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 308. </designator>
<label>Plans to respond to unauthorized public disclosures of covert actions.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 309. </designator>
<label>Auditability.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 310. </designator>
<label>Reports of fraud, waste, and abuse.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 311. </designator>
<label>Public Interest Declassification Board.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 312. </designator>
<label>Official representation items in support of the Coast Guard Attaché Program.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 313. </designator>
<label>Declassification review of certain items collected during the mission that killed Osama bin Laden on May 1, 2011.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 314. </designator>
<label>Merger of the Foreign Counterintelligence Program and the General Defense Intelligence Program.<page identifier="/us/stat/128/1391">128 STAT. 1391</page></label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>Subtitle B—</designator>
<label>Reporting</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 321. </designator>
<label>Significant interpretations of law concerning intelligence activities.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 322. </designator>
<label>Review for official publication of opinions of the Office of Legal Counsel of the Department of Justice concerning intelligence activities.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 323. </designator>
<label>Submittal to Congress by heads of elements of intelligence community of plans for orderly shutdown in event of absence of appropriations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 324. </designator>
<label>Reports on chemical weapons in Syria.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 325. </designator>
<label>Reports to the intelligence community on penetrations of networks and information systems of certain contractors.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 326. </designator>
<label>Report on electronic waste.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 327. </designator>
<label>Promoting STEM education to meet the future workforce needs of the intelligence community.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 328. </designator>
<label>Repeal of the termination of notification requirements regarding the authorized disclosure of national intelligence.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 329. </designator>
<label>Repeal or modification of certain reporting requirements.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE IV—</designator>
<label>MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>Subtitle A—</designator>
<label>National Security Agency</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 401. </designator>
<label>Appointment of the Director of the National Security Agency.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 402. </designator>
<label>Appointment of the Inspector General of the National Security Agency.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 403. </designator>
<label>Effective date and applicability.</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>Subtitle B—</designator>
<label>National Reconnaissance Office</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 411. </designator>
<label>Appointment of the Director of the National Reconnaissance Office.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 412. </designator>
<label>Appointment of the Inspector General of the National Reconnaissance Office.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 413. </designator>
<label>Effective date and applicability.</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>Subtitle C—</designator>
<label>Central Intelligence Agency</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 421. </designator>
<label>Gifts, devises, and bequests.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE V—</designator>
<label>SECURITY CLEARANCE REFORM</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 501. </designator>
<label>Continuous evaluation and sharing of derogatory information regarding personnel with access to classified information.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 502. </designator>
<label>Requirements for intelligence community contractors.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 503. </designator>
<label>Technology improvements to security clearance processing.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 504. </designator>
<label>Report on reciprocity of security clearances.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 505. </designator>
<label>Improving the periodic reinvestigation process.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 506. </designator>
<label>Appropriate committees of Congress defined.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE VI—</designator>
<label>INTELLIGENCE COMMUNITY WHISTLEBLOWER PROTECTIONS</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 601. </designator>
<label>Protection of intelligence community whistleblowers.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 602. </designator>
<label>Review of security clearance or access determinations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 603. </designator>
<label>Revisions of other laws.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 604. </designator>
<label>Policies and procedures; nonapplicability to certain terminations.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE VII—</designator>
<label>TECHNICAL AMENDMENTS</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 701. </designator>
<label>Technical amendments to the Central Intelligence Agency Act of 1949.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 702. </designator>
<label>Technical amendments to the National Security Act of 1947 relating to the past elimination of certain positions.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 703. </designator>
<label>Technical amendments to the Intelligence Authorization Act for Fiscal Year 2013.</label>
</referenceItem></toc>
</content></subsection>
</section>
<section id="d396573e442" identifier="/us/pl/113/126/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d76e94-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3003">50 USC 3003 note</ref>.</p></sidenote><heading>DEFINITIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9d795a5-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  In this Act:</chapeau><paragraph class="fontsize10" id="yc9d795a6-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/s2/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Congressional intelligence committees</inline>.—</heading><chapeau>The term “<term>congressional intelligence committees</term>” means—</chapeau><subparagraph class="fontsize10" id="yc9d795a7-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/s2/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the Select Committee on Intelligence of the Senate; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9d795a8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/s2/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the Permanent Select Committee on Intelligence of the House of Representatives.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9d795a9-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/s2/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Intelligence community</inline>.—</heading><content>The term “<term>intelligence community</term>” has the meaning given that term in section 3(4) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>).<page identifier="/us/stat/128/1392">128 STAT. 1392</page></content></paragraph>
</section>
<title id="d396573e488" identifier="/us/pl/113/126/tI" style="-uslm-lc:I658178"><num value="I">TITLE I—</num><heading>INTELLIGENCE ACTIVITIES</heading>
<section id="d396573e493" identifier="/us/pl/113/126/tI/s101" style="-uslm-lc:I658143"><num class="fontsize12" value="101">SEC. 101. </num><heading>AUTHORIZATION OF APPROPRIATIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9d80ada-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Funds are hereby authorized to be appropriated for fiscal year 2014 for the conduct of the intelligence and intelligence-related activities of the following elements of the United States Government:</chapeau><paragraph class="fontsize10" id="yc9d80adb-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The Office of the Director of National Intelligence.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80adc-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The Central Intelligence Agency.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80add-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The Department of Defense.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ade-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The Defense Intelligence Agency.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80adf-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>The National Security Agency.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>The Department of the Army, the Department of the Navy, and the Department of the Air Force.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>The Coast Guard.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae2-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><content>The Department of State.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae3-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/9" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">(9) </num><content>The Department of the Treasury.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae4-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/10" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="10">(10) </num><content>The Department of Energy.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae5-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/11" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="11">(11) </num><content>The Department of Justice.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae6-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/12" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="12">(12) </num><content>The Federal Bureau of Investigation.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae7-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/13" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="13">(13) </num><content>The Drug Enforcement Administration.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/14" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="14">(14) </num><content>The National Reconnaissance Office.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80ae9-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/15" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="15">(15) </num><content>The National Geospatial-Intelligence Agency.</content></paragraph>
<paragraph class="fontsize10" id="yc9d80aea-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s101/16" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="16">(16) </num><content>The Department of Homeland Security.</content></paragraph>
</section>
<section id="d396573e582" identifier="/us/pl/113/126/tI/s102" style="-uslm-lc:I658143"><num class="fontsize12" value="102">SEC. 102. </num><heading>CLASSIFIED SCHEDULE OF AUTHORIZATIONS.</heading><subsection class="firstIndent0 fontsize10" id="yc9d8590b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Specifications of Amounts and Personnel Levels</inline>.—</heading><content>The amounts authorized to be appropriated under section 101 and, subject to section 103, the authorized personnel ceilings as of September 30, 2014, for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations prepared to accompany the bill S. 1681 of the One Hundred Thirteenth Congress.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d8590c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Availability of Classified Schedule of Authorizations</inline>.—</heading><paragraph class="fontsize10" id="yc9d8590d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d8590e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Availability</inline>.—</heading><content>The classified Schedule of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President.</content></paragraph>
<paragraph class="fontsize10" id="yc9d8590f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Distribution by the president</inline>.—</heading><content>Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedule of Authorizations, or of appropriate portions of the Schedule, within the executive branch.</content></paragraph>
<paragraph class="fontsize10" id="yc9d85910-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Limits on disclosure</inline>.—</heading><chapeau>The President shall not publicly disclose the classified Schedule of Authorizations or any portion of such Schedule except—</chapeau><subparagraph class="fontsize10" id="yc9d85911-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (<ref href="/us/usc/t50/s3306/a">50 U.S.C. 3306(a)</ref>);</content></subparagraph>
<subparagraph class="fontsize10" id="yc9d85912-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>to the extent necessary to implement the budget; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9d85913-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s102/b/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>as otherwise required by law.<page identifier="/us/stat/128/1393">128 STAT. 1393</page></content></subparagraph>
</paragraph>
</subsection>
</section>
<section id="d396573e656" identifier="/us/pl/113/126/tI/s103" style="-uslm-lc:I658143"><num class="fontsize12" value="103">SEC. 103. </num><heading>PERSONNEL CEILING ADJUSTMENTS.</heading><subsection class="firstIndent0 fontsize10" id="yc9d8a734-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s103/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d8a735-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Authority for Increases</inline>.—</heading><content>The Director of National Intelligence may authorize employment of civilian personnel in excess of the number authorized for fiscal year 2014 by the classified Schedule of Authorizations referred to in section 102(a) if the Director of National Intelligence determines that such action is necessary to the performance of important intelligence functions, except that the number of personnel employed in excess of the number authorized under such section may not, for any element of the intelligence community, exceed 3 percent of the number of civilian personnel authorized under such Schedule for such element.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d8a736-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s103/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d8a737-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Guidelines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Treatment of Certain Personnel</inline>.—</heading><chapeau>The Director of National Intelligence shall establish guidelines that govern, for each element of the intelligence community, the treatment under the personnel levels authorized under section 102(a), including any exemption from such personnel levels, of employment or assignment in—</chapeau><paragraph class="fontsize10" id="yc9d8a738-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s103/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>a student program, trainee program, or similar program;</content></paragraph>
<paragraph class="fontsize10" id="yc9d8a739-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s103/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>a reserve corps or as a reemployed annuitant; or</content></paragraph>
<paragraph class="fontsize10" id="yc9d8a73a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s103/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>details, joint duty, or long term, full-time training.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d8a73b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s103/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d8a73c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Notice to Congressional Intelligence Committees</inline>.—</heading><content>The Director of National Intelligence shall notify the congressional intelligence committees in writing at least 15 days prior to each exercise of an authority described in subsection (a).</content></subsection>
</section>
<section id="d396573e712" identifier="/us/pl/113/126/tI/s104" style="-uslm-lc:I658143"><num class="fontsize12" value="104">SEC. 104. </num><heading>INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT.</heading><subsection class="firstIndent0 fontsize10" id="yc9d8f55d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s104/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of Appropriations</inline>.—</heading><content>There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2014 the sum of $528,229,000. Within such amount, funds identified in the classified Schedule of Authorizations referred to in section 102(a) for advanced research and development shall remain available until September 30, 2015.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d8f55e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s104/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Authorized Personnel Levels</inline>.—</heading><content>The elements within the Intelligence Community Management Account of the Director of National Intelligence are authorized 855 positions as of September 30, 2014. Personnel serving in such elements may be permanent employees of the Office of the Director of National Intelligence or personnel detailed from other elements of the United States Government.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d8f55f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s104/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Classified Authorizations</inline>.—</heading><paragraph class="fontsize10" id="yc9d8f560-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s104/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of appropriations</inline>.—</heading><content>In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Community Management Account for fiscal year 2014 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). Such additional amounts for advanced research and development shall remain available until September 30, 2015.</content></paragraph>
<paragraph class="fontsize10" id="yc9d8f561-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tI/s104/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of personnel</inline>.—</heading><content>In addition to the personnel authorized by subsection (b) for elements of the Intelligence Community Management Account as of September 30, 2014, there are authorized such additional personnel for the <page identifier="/us/stat/128/1394">128 STAT. 1394</page>
Community Management Account as of that date as are specified in the classified Schedule of Authorizations referred to in section 102(a).</content></paragraph>
</subsection>
</section>
</title>
<title id="d396573e767" identifier="/us/pl/113/126/tII" style="-uslm-lc:I658178"><num value="II">TITLE II—</num><heading>CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM</heading>
<section id="d396573e772" identifier="/us/pl/113/126/tII/s201" style="-uslm-lc:I658143"><num class="fontsize12" value="201">SEC. 201. </num><heading>AUTHORIZATION OF APPROPRIATIONS.</heading><content style="-uslm-lc:I658120">  There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund for fiscal year 2014 the sum of $514,000,000.</content></section>
<section id="d396573e779" identifier="/us/pl/113/126/tII/s202" style="-uslm-lc:I658143"><num class="fontsize12" value="202">SEC. 202. </num><heading>CIARDS AND FERS SPECIAL RETIREMENT CREDIT FOR SERVICE ON DETAIL TO ANOTHER AGENCY.</heading><subsection class="firstIndent0 fontsize10" id="yc9d91c72-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tII/s202/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Section 203(b) of the Central Intelligence Agency Retirement Act (<ref href="/us/usc/t50/s2013/b">50 U.S.C. 2013(b)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9d91c73-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tII/s202/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in the matter preceding paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>service in the Agency performed</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>service performed by an Agency employee</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yc9d91c74-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tII/s202/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Agency activities</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>intelligence activities</quotedText>”.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d91c75-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tII/s202/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d91c76-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s2013">50 USC 2013 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Application</inline>.—</heading><content>The amendment made by subsection (a) shall be applied to retired or deceased officers of the Central Intelligence Agency who were designated at any time under section 203 of the Central Intelligence Agency Retirement Act (<ref href="/us/usc/t50/s2013">50 U.S.C. 2013</ref>) prior to the date of the enactment of this Act.</content></subsection>
</section>
</title>
<title id="d396573e843" identifier="/us/pl/113/126/tIII" style="-uslm-lc:I658178"><num value="III">TITLE III—</num><heading>GENERAL PROVISIONS</heading>
<subtitle id="d396573e848" identifier="/us/pl/113/126/tIII/stA" style="-uslm-lc:I658178"><num value="A">Subtitle A—</num><heading>General Matters</heading>
<section id="d396573e853" identifier="/us/pl/113/126/tIII/stA/s301" style="-uslm-lc:I658143"><num class="fontsize12" value="301">SEC. 301. </num><heading>INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS AUTHORIZED BY LAW.</heading><content style="-uslm-lc:I658120">  Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law.</content></section>
<section id="d396573e860" identifier="/us/pl/113/126/tIII/stA/s302" style="-uslm-lc:I658143"><num class="fontsize12" value="302">SEC. 302. </num><heading>RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES.</heading><content style="-uslm-lc:I658120">  The authorization of appropriations by this Act shall not be deemed to constitute authority for the conduct of any intelligence activity which is not otherwise authorized by the Constitution or the laws of the United States.</content></section>
<section id="d396573e867" identifier="/us/pl/113/126/tIII/stA/s303" style="-uslm-lc:I658143"><num class="fontsize12" value="303">SEC. 303. </num><heading>SPECIFIC AUTHORIZATION OF FUNDING FOR HIGH PERFORMANCE COMPUTING CENTER 2.</heading><content style="-uslm-lc:I658120">  Funds appropriated for the construction of the High Performance Computing Center 2 (HPCC 2), as described in the table entitled Consolidated Cryptologic Program (CCP) in the classified annex to accompany the Consolidated and Further Continuing Appropriations Act, 2013 (<ref href="/us/pl/113/6">Public Law 113–6</ref>; <ref href="/us/stat/127/198">127 Stat. 198</ref>), in excess of the amount specified for such activity in the tables in the classified annex prepared to accompany the Intelligence <page identifier="/us/stat/128/1395">128 STAT. 1395</page>
Authorization Act for Fiscal Year 2013 (<ref href="/us/pl/112/277">Public Law 112–277</ref>; <ref href="/us/stat/126/2468">126 Stat. 2468</ref>) shall be specifically authorized by Congress for the purposes of section 504 of the National Security Act of 1947 (<ref href="/us/usc/t50/s3094">50 U.S.C. 3094</ref>).</content></section>
<section id="d396573e893" identifier="/us/pl/113/126/tIII/stA/s304" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="304">SEC. 304. </num><heading>CLARIFICATION OF EXEMPTION FROM FREEDOM OF INFORMATION ACT OF IDENTITIES OF EMPLOYEES SUBMITTING COMPLAINTS TO THE INSPECTOR GENERAL OF THE INTELLIGENCE COMMUNITY.</heading><content style="-uslm-lc:I658120">  Section 103H(g)(3)(A) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3033/g/3/A">50 U.S.C. 3033(g)(3)(A)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> “<quotedText>undertaken;</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>undertaken, and this provision shall qualify as a withholding statute pursuant to subsection (b)(3) of <ref href="/us/usc/t5/s552">section 552 of title 5, United States Code</ref> (commonly known as the ‘Freedom of Information Act’);</quotedText>”.</content></section>
<section id="d396573e916" identifier="/us/pl/113/126/tIII/stA/s305" style="-uslm-lc:I658143"><num class="fontsize12" value="305">SEC. 305. </num><heading>FUNCTIONAL MANAGERS FOR THE INTELLIGENCE COMMUNITY.</heading><subsection class="firstIndent0 fontsize10" id="yc9d96a97-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s305/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Functional Managers Authorized</inline>.—</heading><content>Title I of the National Security Act of 1947 (<ref href="/us/usc/t50/s3021/etseq">50 U.S.C. 3021 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after section 103I the following new section:<quotedContent><section class="indentUp2 firstIndent-2" id="yc9d991a8-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658144"><num class="bold" value="103J">“SEC. 103J. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9d991a9-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3034a">50 USC 3034a</ref>.</p></sidenote><heading class="bold">FUNCTIONAL MANAGERS FOR THE INTELLIGENCE COMMUNITY.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yc9d991aa-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Functional Managers Authorized</inline>.—</heading><content>The Director of National Intelligence may establish within the intelligence community one or more positions of manager of an intelligence function. Any position so established may be known as the ‘Functional Manager’ of the intelligence function concerned.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9d991ab-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Personnel</inline>.—</heading><content>The Director shall designate individuals to serve as manager of intelligence functions established under subsection (a) from among officers and employees of elements of the intelligence community.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9d991ac-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Duties</inline>.—</heading><chapeau>Each manager of an intelligence function established under subsection (a) shall have the duties as follows:</chapeau><paragraph class="fontsize10" id="yc9d991ad-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>To act as principal advisor to the Director on the intelligence function.</content></paragraph>
<paragraph class="fontsize10" id="yc9d991ae-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>To carry out such other responsibilities with respect to the intelligence function as the Director may specify for purposes of this section.”</content></paragraph>
</subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9d991af-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s305/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendment</inline>.—</heading><content>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 103I the following new item:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 103J. </designator>
<label>Functional managers for the intelligence community.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d396573e1017" identifier="/us/pl/113/126/tIII/stA/s306" style="-uslm-lc:I658143"><num class="fontsize12" value="306">SEC. 306. </num><heading>ANNUAL ASSESSMENT OF INTELLIGENCE COMMUNITY PERFORMANCE BY FUNCTION.</heading><subsection class="firstIndent0 fontsize10" id="yc9d9dfd0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s306/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Annual Assessments Required</inline>.—</heading><content>Title V of the National Security Act of 1947 (<ref href="/us/usc/t50/s3091/etseq">50 U.S.C. 3091 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after section 506I the following new section:<quotedContent><section class="indentUp2 firstIndent-2" id="yc9da2df1-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658144"><num class="bold" value="506J">“SEC. 506J. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9da2df2-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3105a">50 USC 3105a</ref>.</p></sidenote><heading class="bold">ANNUAL ASSESSMENT OF INTELLIGENCE COMMUNITY PERFORMANCE BY FUNCTION.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yc9da2df3-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9da2df4-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadlines.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9da2df5-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9da2df6-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Reports.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than April 1, 2016, and each year thereafter, the Director of National Intelligence shall, in consultation with the Functional Managers, submit to the congressional <page identifier="/us/stat/128/1396">128 STAT. 1396</page>
intelligence committees a report on covered intelligence functions during the preceding year.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9da2df7-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>Each report under subsection (a) shall include for each covered intelligence function for the year covered by such report the following:</chapeau><paragraph class="fontsize10" id="yc9da2df8-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>An identification of the capabilities, programs, and activities of such intelligence function, regardless of the element of the intelligence community that carried out such capabilities, programs, and activities.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2df9-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>A description of the investment and allocation of resources for such intelligence function, including an analysis of the allocation of resources within the context of the National Intelligence Strategy, priorities for recipients of resources, and areas of risk.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2dfa-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>A description and assessment of the performance of such intelligence function.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2dfb-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>An identification of any issues related to the application of technical interoperability standards in the capabilities, programs, and activities of such intelligence function.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2dfc-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><content>An identification of the operational overlap or need for de-confliction, if any, within such intelligence function.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2dfd-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><content>A description of any efforts to integrate such intelligence function with other intelligence disciplines as part of an integrated intelligence enterprise.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2dfe-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><content>A description of any efforts to establish consistency in tradecraft and training within such intelligence function.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2dff-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">“(8) </num><content>A description and assessment of developments in technology that bear on the future of such intelligence function.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2e00-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">“(9) </num><content>Such other matters relating to such intelligence function as the Director may specify for purposes of this section.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9da2e01-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="yc9da2e02-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>The term ‘<term>covered intelligence functions</term>’ means each intelligence function for which a Functional Manager has been established under section 103J during the year covered by a report under this section.</content></paragraph>
<paragraph class="fontsize10" id="yc9da2e03-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>The term ‘<term>Functional Manager</term>’ means the manager of an intelligence function established under section 103J.”</content></paragraph>
</subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9da2e04-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s306/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendment</inline>.—</heading><content>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 506I the following new item:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 506J. </designator>
<label>Annual assessment of intelligence community performance by function.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d396573e1175" identifier="/us/pl/113/126/tIII/stA/s307" style="-uslm-lc:I658143"><num class="fontsize12" value="307">SEC. 307. </num><heading>SOFTWARE LICENSING.</heading><subsection class="firstIndent0 fontsize10" id="yc9daa335-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Title I of the National Security Act of 1947 (<ref href="/us/usc/t50/s3021/etseq">50 U.S.C. 3021 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after section 108 the following new section:<quotedContent><section class="centered fontsize12" id="yc9daca46-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658143"><num class="fontsize12" value="109">“SEC. 109. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daca47-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3044">50 USC 3044</ref>.</p></sidenote><heading class="fontsize12">SOFTWARE LICENSING.</heading><subsection class="firstIndent0 fontsize10" id="yc9daca48-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daca49-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9daca4a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Requirement for Inventories of Software Licenses</inline>.—</heading><chapeau>The chief information officer of each element of the intelligence community, in consultation with the Chief Information Officer of the Intelligence Community, shall biennially—</chapeau><paragraph class="fontsize10" id="yc9daca4b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>conduct an inventory of all existing software licenses of such element, including utilized and unutilized licenses;<page identifier="/us/stat/128/1397">128 STAT. 1397</page></content></paragraph>
<paragraph class="fontsize10" id="yc9daca4c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daca4d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote><content>assess the actions that could be carried out by such element to achieve the greatest possible economies of scale and associated cost savings in software procurement and usage; and</content></paragraph>
<paragraph class="fontsize10" id="yc9daca4e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>submit to the Chief Information Officer of the Intelligence Community each inventory required by paragraph (1) and each assessment required by paragraph (2).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9daca4f-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Inventories by the Chief Information Officer of the Intelligence Community</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daca50-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote>—</heading><chapeau>The Chief Information Officer of the Intelligence Community, based on the inventories and assessments required by subsection (a), shall biennially—</chapeau><paragraph class="fontsize10" id="yc9daca51-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>compile an inventory of all existing software licenses of the intelligence community, including utilized and unutilized licenses; and</content></paragraph>
<paragraph class="fontsize10" id="yc9daca52-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daca53-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote><content>assess the actions that could be carried out by the intelligence community to achieve the greatest possible economies of scale and associated cost savings in software procurement and usage.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9daca54-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daca55-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Records.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Reports to Congress</inline>.—</heading><content>The Chief Information Officer of the Intelligence Community shall submit to the congressional intelligence committees a copy of each inventory compiled under subsection (b)(1).”</content></subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9daf166-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daf167-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadlines.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9daf168-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3044">50 USC 3044 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Initial Inventory</inline>.—</heading><paragraph class="fontsize10" id="yc9daf169-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Intelligence community elements</inline>.—</heading><subparagraph class="fontsize10" id="yc9daf16a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><heading class="fontsize10"><inline class="smallCaps">Date</inline>.—</heading><content>Not later than 120 days after the date of the enactment of this Act, the chief information officer of each element of the intelligence community shall complete the initial inventory, assessment, and submission required under section 109(a) of the National Security Act of 1947, as added by subsection (a) of this section.</content></subparagraph>
<subparagraph class="fontsize10" id="yc9daf16b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><heading class="fontsize10"><inline class="smallCaps">Basis</inline>.—</heading><content>The initial inventory conducted for each element of the intelligence community under section 109(a)(1) of the National Security Act of 1947, as added by subsection (a) of this section, shall be based on the inventory of software licenses conducted pursuant to section 305 of the Intelligence Authorization Act for Fiscal Year 2013 (<ref href="/us/pl/112/277">Public Law 112–277</ref>; <ref href="/us/stat/126/2472">126 Stat. 2472</ref>) for such element.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9daf16c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Chief information officer of the intelligence community</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Chief Information Officer of the Intelligence Community shall complete the initial compilation and assessment required under section 109(b) of the National Security Act of 1947, as added by subsection (a).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9daf16d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendments</inline>.—</heading><chapeau>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9daf16e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> the second item relating to section 104 (relating to Annual national security strategy report); and</content></paragraph>
<paragraph class="fontsize10" id="yc9daf16f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s307/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content><amendingAction type="insert">inserting</amendingAction> after the item relating to section 108 the following new item:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 109. </designator>
<label>Software licensing.”.</label>
</referenceItem></toc>
</quotedContent></content></paragraph>
</subsection>
</section>
<section id="d396573e1383" identifier="/us/pl/113/126/tIII/stA/s308" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="308">SEC. 308. </num><heading>PLANS TO RESPOND TO UNAUTHORIZED PUBLIC DISCLOSURES OF COVERT ACTIONS.</heading><content class="firstIndent0 fontsize10" id="xc9daf170-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 503 of the National Security Act of 1947 (<ref href="/us/usc/t50/s3093">50 U.S.C. 3093</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new subsection:<page identifier="/us/stat/128/1398">128 STAT. 1398</page><quotedContent><subsection class="firstIndent0 fontsize10" id="yc9daf171-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="h">“(h) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9daf172-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9daf173-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Plan.</p></sidenote><content>For each type of activity undertaken as part of a covert action, the President shall establish in writing a plan to respond to the unauthorized public disclosure of that type of activity.”</content></subsection>
</quotedContent>.</content></section>
<section id="d396573e1414" identifier="/us/pl/113/126/tIII/stA/s309" style="-uslm-lc:I658143"><num class="fontsize12" value="309">SEC. 309. </num><heading>AUDITABILITY.</heading><subsection class="firstIndent0 fontsize10" id="yc9db1884-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s309/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Title V of the National Security Act of 1947 (<ref href="/us/usc/t50/s3091/etseq">50 U.S.C. 3091 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new section:<quotedContent><section class="centered fontsize12" id="yc9db3f95-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658143"><num class="fontsize12" value="509">“SEC. 509. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9db3f96-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3108">50 USC 3108</ref>.</p></sidenote><heading class="fontsize12">AUDITABILITY OF CERTAIN ELEMENTS OF THE INTELLIGENCE COMMUNITY.</heading><subsection class="firstIndent0 fontsize10" id="yc9db3f97-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Requirement for Annual Audits</inline>.—</heading><content>The head of each covered entity shall ensure that there is a full financial audit of such covered entity each year beginning with fiscal year 2014. Such audits may be conducted by an internal or external independent accounting or auditing organization.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9db3f98-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Requirement for Unqualified Opinion</inline>.—</heading><content>Beginning as early as practicable, but in no event later than the audit required under subsection (a) for fiscal year 2016, the head of each covered entity shall take all reasonable steps necessary to ensure that each audit required under subsection (a) contains an unqualified opinion on the financial statements of such covered entity for the fiscal year covered by such audit.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9db3f99-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Reports to Congress</inline>.—</heading><content>The chief financial officer of each covered entity shall provide to the congressional intelligence committees an annual audit report from an accounting or auditing organization on each audit of the covered entity conducted pursuant to subsection (a).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9db3f9a-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><heading class="fontsize10"><inline class="smallCaps">Covered Entity Defined</inline>.—</heading><content>In this section, the term ‘<term>covered entity</term>’ means the Office of the Director of National Intelligence, the Central Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, the National Reconnaissance Office, and the National Geospatial-Intelligence Agency.”</content></subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9db3f9b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s309/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendment</inline>.—</heading><content>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 508 the following new item:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 509. </designator>
<label>Auditability of certain elements of the intelligence community.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d396573e1514" identifier="/us/pl/113/126/tIII/stA/s310" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="310">SEC. 310. </num><heading>REPORTS OF FRAUD, WASTE, AND ABUSE.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9db8dbc-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 8H(a) of the Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>) <amendingAction type="amend">is amended</amendingAction> in paragraph (1)—</chapeau><paragraph class="fontsize10" id="yc9db8dbd-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s310/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subparagraphs (B) and (C) as subparagraphs (C) and (D), respectively;</content></paragraph>
<paragraph class="fontsize10" id="yc9db8dbe-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s310/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="insert">inserting</amendingAction> after subparagraph (A) the following:<quotedContent><subparagraph class="indentDown1 firstIndent0 fontsize10" id="yc9db8dbf-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>An employee of an element of the intelligence community, an employee assigned or detailed to an element of the intelligence community, or an employee of a contractor to the intelligence community, who intends to report to Congress a complaint or information with respect to an urgent concern may report such complaint or information to the Inspector General of the Intelligence Community.”</content></subparagraph>
</quotedContent>; and</content></paragraph>
<paragraph class="fontsize10" id="yc9db8dc0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s310/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><chapeau>in subparagraph (D), as redesignated by paragraph (1)—</chapeau><subparagraph class="fontsize10" id="yc9db8dc1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s310/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Act or section 17</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Act, section 17</quotedText>”; and<page identifier="/us/stat/128/1399">128 STAT. 1399</page></content></subparagraph>
<subparagraph class="fontsize10" id="yc9db8dc2-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s310/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="delete">striking</amendingAction> the period at the end and <amendingAction type="insert">inserting</amendingAction> “<quotedText>, or section 103H(k) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3033/k">50 U.S.C. 3033(k)</ref>).</quotedText>”.</content></subparagraph>
</paragraph>
</section>
<section id="d396573e1587" identifier="/us/pl/113/126/tIII/stA/s311" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="311">SEC. 311. </num><heading>PUBLIC INTEREST DECLASSIFICATION BOARD.</heading><content style="-uslm-lc:I658120">  Section 710(b) of the Public Interest Declassification Act of 2000 (<ref href="/us/pl/106/567">Public Law 106–567</ref>; <ref href="/us/usc/t50/s3161">50 U.S.C. 3161 note</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> “<quotedText>2014.</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>2018.</quotedText>”.</content></section>
<section id="d396573e1609" identifier="/us/pl/113/126/tIII/stA/s312" style="-uslm-lc:I658143"><num class="fontsize12" value="312">SEC. 312. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9db8dc3-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t14/s150">14 USC 150 note</ref>.</p></sidenote><heading>OFFICIAL REPRESENTATION ITEMS IN SUPPORT OF THE COAST GUARD ATTACHÉ PROGRAM.</heading><content style="-uslm-lc:I658120">  Notwithstanding any other limitation on the amount of funds that may be used for official representation items, the Secretary of Homeland Security may use funds made available to the Secretary through the National Intelligence Program for necessary expenses for intelligence analysis and operations coordination activities for official representation items in support of the Coast Guard Attaché Program.</content></section>
<section id="d396573e1621" identifier="/us/pl/113/126/tIII/stA/s313" style="-uslm-lc:I658143"><num class="fontsize12" value="313">SEC. 313. </num><heading>DECLASSIFICATION REVIEW OF CERTAIN ITEMS COLLECTED DURING THE MISSION THAT KILLED OSAMA BIN LADEN ON MAY 1, 2011.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9dbdbe4-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Not<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dbdbe5-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote> later than 120 days after the date of the enactment of this Act, the Director of National Intelligence shall—</chapeau><paragraph class="fontsize10" id="yc9dbdbe6-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s313/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in the manner described in the classified annex to this Act—</chapeau><subparagraph class="fontsize10" id="yc9dbdbe7-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s313/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>complete a declassification review of documents collected in Abbottabad, Pakistan, during the mission that killed Osama bin Laden on May 1, 2011; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9dbdbe8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s313/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dbdbe9-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p></sidenote><content>make publicly available any information declassified as a result of the declassification review required under paragraph (1); and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9dbdbea-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s313/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dbdbeb-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Reports.</p></sidenote><chapeau>report to the congressional intelligence committees—</chapeau><subparagraph class="fontsize10" id="yc9dbdbec-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s313/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the results of the declassification review required under paragraph (1); and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9dbdbed-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stA/s313/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>a justification for not declassifying any information required to be included in such declassification review that remains classified.</content></subparagraph>
</paragraph>
</section>
<section id="d396573e1668" identifier="/us/pl/113/126/tIII/stA/s314" style="-uslm-lc:I658143"><num class="fontsize12" value="314">SEC. 314. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dbdbee-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3023">50 USC 3023 note</ref>.</p></sidenote><heading>MERGER OF THE FOREIGN COUNTERINTELLIGENCE PROGRAM AND THE GENERAL DEFENSE INTELLIGENCE PROGRAM.</heading><content style="-uslm-lc:I658120">  Notwithstanding any other provision of law, the Director of National Intelligence shall carry out the merger of the Foreign Counterintelligence Program into the General Defense Intelligence Program as directed in the classified annex to this Act.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dbdbef-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Effective date.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9dbdbf0-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Notification.</p></sidenote> The merger shall go into effect no earlier than 30 days after written notification of the merger is provided to the congressional intelligence committees.</content></section>
</subtitle>
<subtitle id="d396573e1687" identifier="/us/pl/113/126/tIII/stB" style="-uslm-lc:I658178"><num value="B">Subtitle B—</num><heading>Reporting</heading>
<section id="d396573e1692" identifier="/us/pl/113/126/tIII/stB/s321" style="-uslm-lc:I658143"><num class="fontsize12" value="321">SEC. 321. </num><heading>SIGNIFICANT INTERPRETATIONS OF LAW CONCERNING INTELLIGENCE ACTIVITIES.</heading><subsection class="firstIndent0 fontsize10" id="yc9dc2a11-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s321/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Title V of the National Security Act of 1947 (<ref href="/us/usc/t50/s3021/etseq">50 U.S.C. 3021 et seq.</ref>), as added by section 309 of this Act, is further amended by <amendingAction type="add">adding</amendingAction> at the end the following new section:<page identifier="/us/stat/128/1400">128 STAT. 1400</page>
<quotedContent><section class="centered fontsize12" id="yc9dc5122-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658143"><num class="fontsize12" value="510">“SEC. 510. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dc5123-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3109">50 USC 3109</ref>.</p></sidenote><heading class="fontsize12">SIGNIFICANT INTERPRETATIONS OF LAW CONCERNING INTELLIGENCE ACTIVITIES.</heading><subsection class="firstIndent0 fontsize10" id="yc9dc5124-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dc5125-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Notification</inline>.—</heading><content>Except as provided in subsection (c) and to the extent consistent with due regard for the protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters, the General Counsel of each element of the intelligence community shall notify the congressional intelligence committees, in writing, of any significant legal interpretation of the United States Constitution or Federal law affecting intelligence activities conducted by such element by not later than 30 days after the date of the commencement of any intelligence activity pursuant to such interpretation.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dc5126-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Content</inline>.—</heading><content>Each notification under subsection (a) shall provide a summary of the significant legal interpretation and the intelligence activity or activities conducted pursuant to such interpretation.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dc5127-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Exceptions</inline>.—</heading><chapeau>A notification under subsection (a) shall not be required for a significant legal interpretation if—</chapeau><paragraph class="fontsize10" id="yc9dc5128-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>notice of the significant legal interpretation was previously provided to the congressional intelligence committees under subsection (a); or</content></paragraph>
<paragraph class="fontsize10" id="yc9dc5129-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>the significant legal interpretation was made before the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2014.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dc512a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dc512b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9dc512c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Limited Access for Covert Action</inline>.—</heading><content>If the President determines that it is essential to limit access to a covert action finding under section 503(c)(2), the President may limit access to information concerning such finding that is subject to notification under this section to those members of Congress who have been granted access to the relevant finding under section 503(c)(2).”</content></subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dc512d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s321/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendment</inline>.—</heading><content>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 509, as so added, the following new item:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 510. </designator>
<label>Significant interpretations of law concerning intelligence activities.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d396573e1810" identifier="/us/pl/113/126/tIII/stB/s322" style="-uslm-lc:I658143"><num class="fontsize12" value="322">SEC. 322. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dc512e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t28/s521">28 USC 521 note</ref>.</p></sidenote><heading>REVIEW FOR OFFICIAL PUBLICATION OF OPINIONS OF THE OFFICE OF LEGAL COUNSEL OF THE DEPARTMENT OF JUSTICE CONCERNING INTELLIGENCE ACTIVITIES.</heading><subsection class="firstIndent0 fontsize10" id="yc9dced6f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dced70-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Process for Review for Official Publication</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Attorney General shall, in coordination with the Director of National Intelligence, establish a process for the regular review for official publication of significant opinions of the Office of Legal Counsel of the Department of Justice that have been provided to an element of the intelligence community.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dced71-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Factors</inline>.—</heading><chapeau>The process of review of opinions established under subsection (a) shall include consideration of the following:</chapeau><paragraph class="fontsize10" id="yc9dced72-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The potential importance of an opinion to other agencies or officials in the Executive branch.</content></paragraph>
<paragraph class="fontsize10" id="yc9dced73-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The likelihood that similar questions addressed in an opinion may arise in the future.</content></paragraph>
<paragraph class="fontsize10" id="yc9dced74-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The historical importance of an opinion or the context in which it arose.</content></paragraph>
<paragraph class="fontsize10" id="yc9dced75-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The potential significance of an opinion to the overall jurisprudence of the Office of Legal Counsel.<page identifier="/us/stat/128/1401">128 STAT. 1401</page></content></paragraph>
<paragraph class="fontsize10" id="yc9dced76-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>Such other factors as the Attorney General and the Director of National Intelligence consider appropriate.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dced77-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dced78-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Applicability.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Presumption</inline>.—</heading><content>The process of review established under subsection (a) shall apply a presumption that significant opinions of the Office of Legal Counsel should be published when practicable, consistent with national security and other confidentiality considerations.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dced79-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Construction</inline>.—</heading><chapeau>Nothing in this section shall require the official publication of any opinion of the Office of Legal Counsel, including publication under any circumstance as follows:</chapeau><paragraph class="fontsize10" id="yc9dced7a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/d/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>When publication would reveal classified or other sensitive information relating to national security.</content></paragraph>
<paragraph class="fontsize10" id="yc9dced7b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/d/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>When publication could reasonably be anticipated to interfere with Federal law enforcement efforts or is prohibited by law.</content></paragraph>
<paragraph class="fontsize10" id="yc9dced7c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/d/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>When publication would conflict with preserving internal Executive branch deliberative processes or protecting other information properly subject to privilege.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dced7d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Requirement To Provide Classified Opinions to Congress</inline>.—</heading><paragraph class="fontsize10" id="yc9dced7e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/e/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Any opinion of the Office of Legal Counsel that would have been selected for publication under the process of review established under subsection (a) but for the fact that publication would reveal classified or other sensitive information relating to national security shall be provided or made available to the appropriate committees of Congress.</content></paragraph>
<paragraph class="fontsize10" id="yc9dced7f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/e/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dced80-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9dced81-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Exception for covert action</inline>.—</heading><content>If the President determines that it is essential to limit access to a covert action finding under section 503(c)(2) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3093/c/2">50 U.S.C. 3093(c)(2)</ref>), the President may limit access to information concerning such finding that would otherwise be provided or made available under this subsection to those members of Congress who have been granted access to such finding under such section 503(c)(2).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dced82-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s322/f" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">(f) </num><heading class="fontsize10"><inline class="smallCaps">Judicial Review</inline>.—</heading><content>The determination whether an opinion of the Office of Legal Counsel is appropriate for official publication under the process of review established under subsection (a) is discretionary and is not subject to judicial review.</content></subsection>
</section>
<section id="d396573e1951" identifier="/us/pl/113/126/tIII/stB/s323" style="-uslm-lc:I658143"><num class="fontsize12" value="323">SEC. 323. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dced83-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3311">50 USC 3311</ref>.</p></sidenote><heading>SUBMITTAL TO CONGRESS BY HEADS OF ELEMENTS OF INTELLIGENCE COMMUNITY OF PLANS FOR ORDERLY SHUTDOWN IN EVENT OF ABSENCE OF APPROPRIATIONS.</heading><subsection class="firstIndent0 fontsize10" id="yc9dd62b4-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dd62b5-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Records.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Whenever the head of an applicable agency submits a plan to the Director of the Office of Management and Budget in accordance with section 124 of Office of Management and Budget Circular A–11, pertaining to agency operations in the absence of appropriations, or any successor circular of the Office that requires the head of an applicable agency to submit to the Director a plan for an orderly shutdown in the event of the absence of appropriations, such head shall submit a copy of such plan to the following:</chapeau><paragraph class="fontsize10" id="yc9dd62b6-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The congressional intelligence committees.</content></paragraph>
<paragraph class="fontsize10" id="yc9dd62b7-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The Subcommittee on Defense of the Committee on Appropriations of the Senate.</content></paragraph>
<paragraph class="fontsize10" id="yc9dd62b8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The Subcommittee on Defense of the Committee on Appropriations of the House of Representatives.<page identifier="/us/stat/128/1402">128 STAT. 1402</page></content></paragraph>
<paragraph class="fontsize10" id="yc9dd62b9-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>In the case of a plan for an element of the intelligence community that is within the Department of Defense, to—</chapeau><subparagraph class="fontsize10" id="yc9dd62ba-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/a/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the Committee on Armed Services of the Senate; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9dd62bb-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/a/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the Committee on Armed Services of the House of Representatives.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dd62bc-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/b" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Head of an Applicable Agency Defined</inline>.—</heading><chapeau>In this section, the term “<term>head of an applicable agency</term>” includes the following:</chapeau><paragraph class="fontsize10" id="yc9dd62bd-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The Director of National Intelligence.</content></paragraph>
<paragraph class="fontsize10" id="yc9dd62be-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The Director of the Central Intelligence Agency.</content></paragraph>
<paragraph class="fontsize10" id="yc9dd62bf-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s323/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>Each head of each element of the intelligence community that is within the Department of Defense.</content></paragraph>
</subsection>
</section>
<section id="d396573e2030" identifier="/us/pl/113/126/tIII/stB/s324" style="-uslm-lc:I658143"><num class="fontsize12" value="324">SEC. 324. </num><heading>REPORTS ON CHEMICAL WEAPONS IN SYRIA.</heading><subsection class="firstIndent0 fontsize10" id="yc9ddafe0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 30 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to Congress a report on the Syrian chemical weapons program.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9ddafe1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>The report required under subsection (a) shall include the following elements:</chapeau><paragraph class="fontsize10" id="yc9ddafe2-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>A comprehensive assessment of chemical weapon stockpiles in Syria, including names, types, and quantities of chemical weapons agents, types of munitions, and location and form of storage, production, and research and development facilities.</content></paragraph>
<paragraph class="fontsize10" id="yc9ddafe3-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>A listing of key personnel associated with the Syrian chemical weapons program.</content></paragraph>
<paragraph class="fontsize10" id="yc9ddafe4-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>An assessment of undeclared chemical weapons stockpiles, munitions, and facilities.</content></paragraph>
<paragraph class="fontsize10" id="yc9ddafe5-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>An assessment of how these stockpiles, precursors, and delivery systems were obtained.</content></paragraph>
<paragraph class="fontsize10" id="yc9ddafe6-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>A description of key intelligence gaps related to the Syrian chemical weapons program.</content></paragraph>
<paragraph class="fontsize10" id="yc9ddafe7-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>An assessment of any denial and deception efforts on the part of the Syrian regime related to its chemical weapons program.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9ddafe8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s324/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Progress Reports</inline>.—</heading><content>Every 90 days until the date that is 18 months after the date of the enactment of this Act, the Director of National Intelligence shall submit to Congress a progress report providing any material updates to the report required under subsection (a).</content></subsection>
</section>
<section id="d396573e2094" identifier="/us/pl/113/126/tIII/stB/s325" style="-uslm-lc:I658143"><num class="fontsize12" value="325">SEC. 325. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9ddafe9-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3330">50 USC 3330</ref>.</p></sidenote><heading>REPORTS TO THE INTELLIGENCE COMMUNITY ON PENETRATIONS OF NETWORKS AND INFORMATION SYSTEMS OF CERTAIN CONTRACTORS.</heading><subsection class="firstIndent0 fontsize10" id="yc9de9a4a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Procedures for Reporting Penetrations</inline>.—</heading><content>The Director of National Intelligence shall establish procedures that require each cleared intelligence contractor to report to an element of the intelligence community designated by the Director for purposes of such procedures when a network or information system of such contractor that meets the criteria established pursuant to subsection (b) is successfully penetrated.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9de9a4b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9de9a4c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9de9a4d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Criteria.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Networks and Information Systems Subject to Reporting</inline>.—</heading><content>The Director of National Intelligence shall, in consultation with appropriate officials, establish criteria for covered networks to be subject to the procedures for reporting system penetrations under subsection (a).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9de9a4e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Procedure Requirements</inline>.—</heading><page identifier="/us/stat/128/1403">128 STAT. 1403</page>
<paragraph class="fontsize10" id="yc9de9a4f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Rapid reporting</inline>.—</heading><chapeau>The procedures established pursuant to subsection (a) shall require each cleared intelligence contractor to rapidly report to an element of the intelligence community designated pursuant to subsection (a) of each successful penetration of the network or information systems of such contractor that meet the criteria established pursuant to subsection (b). Each such report shall include the following:</chapeau><subparagraph class="fontsize10" id="yc9de9a50-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>A description of the technique or method used in such penetration.</content></subparagraph>
<subparagraph class="fontsize10" id="yc9de9a51-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>A sample of the malicious software, if discovered and isolated by the contractor, involved in such penetration.</content></subparagraph>
<subparagraph class="fontsize10" id="yc9de9a52-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>A summary of information created by or for such element in connection with any program of such element that has been potentially compromised due to such penetration.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9de9a53-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Access to equipment and information by intelligence community personnel</inline>.—</heading><chapeau>The procedures established pursuant to subsection (a) shall—</chapeau><subparagraph class="fontsize10" id="yc9de9a54-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>include mechanisms for intelligence community personnel to, upon request, obtain access to equipment or information of a cleared intelligence contractor necessary to conduct forensic analysis in addition to any analysis conducted by such contractor;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9de9a55-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>provide that a cleared intelligence contractor is only required to provide access to equipment or information as described in subparagraph (A) to determine whether information created by or for an element of the intelligence community in connection with any intelligence community program was successfully exfiltrated from a network or information system of such contractor and, if so, what information was exfiltrated; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9de9a56-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>provide for the reasonable protection of trade secrets, commercial or financial information, and information that can be used to identify a specific person (other than the name of the suspected perpetrator of the penetration).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9de9a57-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Limitation on dissemination of certain information</inline>.—</heading><chapeau>The procedures established pursuant to subsection (a) shall prohibit the dissemination outside the intelligence community of information obtained or derived through such procedures that is not created by or for the intelligence community except—</chapeau><subparagraph class="fontsize10" id="yc9de9a58-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>with the approval of the contractor providing such information;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9de9a59-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>to the congressional intelligence committees or the Subcommittees on Defense of the Committees on Appropriations of the House of Representatives and the Senate for such committees and such Subcommittees to perform oversight; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9de9a5a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/c/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>to law enforcement agencies to investigate a penetration reported under this section.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9de9a5b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Issuance of Procedures and Establishment of Criteria</inline>.—</heading><paragraph class="fontsize10" id="yc9de9a5c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/d/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall establish the procedures required under subsection (a) and the criteria required under subsection (b).<page identifier="/us/stat/128/1404">128 STAT. 1404</page></content></paragraph>
<paragraph class="fontsize10" id="yc9de9a5d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/d/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Applicability date</inline>.—</heading><content>The requirements of this section shall apply on the date on which the Director of National Intelligence establishes the procedures required under this section.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9de9a5e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Coordination With the Secretary of Defense To Prevent Duplicate Reporting</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9de9a5f-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Procedures.</p></sidenote>—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence and the Secretary of Defense shall establish procedures to permit a contractor that is a cleared intelligence contractor and a cleared defense contractor under section 941 of the National Defense Authorization Act for Fiscal Year 2013 (<ref href="/us/pl/112/239">Public Law 112–239</ref>; <ref href="/us/usc/t10/s2224">10 U.S.C. 2224 note</ref>) to submit a single report that satisfies the requirements of this section and such section 941 for an incident of penetration of network or information system.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9de9a60-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/f" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">(f) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="yc9de9a61-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/f/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Cleared intelligence contractor</inline>.—</heading><content>The term “<term>cleared intelligence contractor</term>” means a private entity granted clearance by the Director of National Intelligence or the head of an element of the intelligence community to access, receive, or store classified information for the purpose of bidding for a contract or conducting activities in support of any program of an element of the intelligence community.</content></paragraph>
<paragraph class="fontsize10" id="yc9de9a62-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/f/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Covered network</inline>.—</heading><content>The term “<term>covered network</term>” means a network or information system of a cleared intelligence contractor that contains or processes information created by or for an element of the intelligence community with respect to which such contractor is required to apply enhanced protection.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9de9a63-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s325/g" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="g">(g) </num><heading class="fontsize10"><inline class="smallCaps">Savings Clauses</inline>.—</heading><content>Nothing in this section shall be construed to alter or limit any otherwise authorized access by government personnel to networks or information systems owned or operated by a contractor that processes or stores government data.</content></subsection>
</section>
<section id="d396573e2296" identifier="/us/pl/113/126/tIII/stB/s326" style="-uslm-lc:I658143"><num class="fontsize12" value="326">SEC. 326. </num><heading>REPORT ON ELECTRONIC WASTE.</heading><subsection class="firstIndent0 fontsize10" id="yc9dee884-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s326/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><content>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the extent to which the intelligence community has implemented the recommendations of the Inspector General of the Intelligence Community contained in the report entitled “Study of Intelligence Community Electronic Waste Disposal Practices” issued in May 2013.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9dee885-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote> Such report shall include an assessment of the extent to which the policies, standards, and guidelines of the intelligence community governing the proper disposal of electronic waste are applicable to covered commercial electronic waste that may contain classified information.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9dee886-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s326/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="yc9dee887-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s326/b/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Covered commercial electronic waste</inline>.—</heading><content>The term “<term>covered commercial electronic waste</term>” means electronic waste of a commercial entity that contracts with an element of the intelligence community.</content></paragraph>
<paragraph class="fontsize10" id="yc9dee888-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s326/b/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Electronic waste</inline>.—</heading><content>The term “<term>electronic waste</term>” includes any obsolete, broken, or irreparable electronic device, including a television, copier, facsimile machine, tablet, telephone, computer, computer monitor, laptop, printer, scanner, and associated electrical wiring.<page identifier="/us/stat/128/1405">128 STAT. 1405</page></content></paragraph>
</subsection>
</section>
<section id="d396573e2345" identifier="/us/pl/113/126/tIII/stB/s327" style="-uslm-lc:I658143"><num class="fontsize12" value="327">SEC. 327. </num><heading>PROMOTING STEM EDUCATION TO MEET THE FUTURE WORKFORCE NEEDS OF THE INTELLIGENCE COMMUNITY.</heading><subsection class="firstIndent0 fontsize10" id="yc9df36a9-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><chapeau>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the Secretary of Education and the congressional intelligence committees a report describing the anticipated hiring needs of the intelligence community in the fields of science, technology, engineering, and mathematics, including cybersecurity and computer literacy. The report shall—</chapeau><paragraph class="fontsize10" id="yc9df36aa-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>describe the extent to which competitions, challenges, or internships at elements of the intelligence community that do not involve access to classified information may be utilized to promote education in the fields of science, technology, engineering, and mathematics, including cybersecurity and computer literacy, within high schools or institutions of higher education in the United States;</content></paragraph>
<paragraph class="fontsize10" id="yc9df36ab-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>include cost estimates for carrying out such competitions, challenges, or internships; and</content></paragraph>
<paragraph class="fontsize10" id="yc9df36ac-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>include strategies for conducting expedited security clearance investigations and adjudications for students at institutions of higher education for purposes of offering internships at elements of the intelligence community.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9df36ad-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Consideration of Existing Programs</inline>.—</heading><content>In developing the report under subsection (a), the Director shall take into consideration existing programs of the intelligence community, including the education programs of the National Security Agency and the Information Assurance Scholarship Program of the Department of Defense, as appropriate.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9df36ae-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="yc9df36af-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/c/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">High school</inline>.—</heading><content>The term “<term>high school</term>” mean a school that awards a secondary school diploma.</content></paragraph>
<paragraph class="fontsize10" id="yc9df36b0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/c/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Institution of higher education</inline>.—</heading><content>The term “<term>institution of higher education</term>” has the meaning given the term in section 101(a) of the Higher Education Act of 1965 (<ref href="/us/usc/t20/s1001/a">20 U.S.C. 1001(a)</ref>).</content></paragraph>
<paragraph class="fontsize10" id="yc9df36b1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s327/c/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Secondary school</inline>.—</heading><content>The term “<term>secondary school</term>” has the meaning given the term in section 9101 of the Elementary and Secondary Education Act of 1965 (<ref href="/us/usc/t20/s7801">20 U.S.C. 7801</ref>).</content></paragraph>
</subsection>
</section>
<section id="d396573e2427" identifier="/us/pl/113/126/tIII/stB/s328" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="328">SEC. 328. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9df36b2-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3349">50 USC 3349</ref>.</p></sidenote><heading>REPEAL OF THE TERMINATION OF NOTIFICATION REQUIREMENTS REGARDING THE AUTHORIZED DISCLOSURE OF NATIONAL INTELLIGENCE.</heading><content style="-uslm-lc:I658120">  Section 504 of the Intelligence Authorization Act for Fiscal Year 2013 (<ref href="/us/pl/112/277">Public Law 112–277</ref>; <ref href="/us/stat/126/2477">126 Stat. 2477</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> subsection (e).</content></section>
<section id="d396573e2451" identifier="/us/pl/113/126/tIII/stB/s329" style="-uslm-lc:I658143"><num class="fontsize12" value="329">SEC. 329. </num><heading>REPEAL OR MODIFICATION OF CERTAIN REPORTING REQUIREMENTS.</heading><subsection class="firstIndent0 fontsize10" id="yc9e06f33-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Repeal of Reporting Requirements</inline>.—</heading><paragraph class="fontsize10" id="yc9e06f34-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/a/1" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Threat of attack on the united states using weapons of mass destruction</inline>.—</heading><content>Section 114 of the National Security Act of 1947 (<ref href="/us/usc/t50/s3050">50 U.S.C. 3050</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> subsection (b).</content></paragraph>
<paragraph class="fontsize10" id="yc9e06f35-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/a/2" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Treaty on conventional armed forces in europe</inline>.—</heading><content>Section 2(5)(E) of the Senate resolution advising and consenting to ratification of the Document Agreed Among the States Parties to the Treaty on Conventional Armed Forces in Europe <page identifier="/us/stat/128/1406">128 STAT. 1406</page>
(CFE) of November 19, 1990, adopted at Vienna May 31, 1996 (Treaty Doc. 105–5) (commonly referred to as the “CFE Flank Document”), 105th Congress, agreed to May 14, 1997, is <amendingAction type="repeal">repealed</amendingAction>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e06f36-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Modification of Reporting Requirements</inline>.—</heading><paragraph class="fontsize10" id="yc9e06f37-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/b/1" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Intelligence advisory committees</inline>.—</heading><content>Section 410(b) of the Intelligence Authorization Act for Fiscal Year 2010 (<ref href="/us/usc/t50/s3309">50 U.S.C. 3309</ref>) <amendingAction type="amend">is amended</amendingAction> to read as follows:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="yc9e09648-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Notification of Establishment of Advisory Committee</inline>.—</heading><chapeau>The Director of National Intelligence and the Director of the Central Intelligence Agency shall each notify the congressional intelligence committees each time each such Director creates an advisory committee. Each notification shall include—</chapeau><paragraph class="fontsize10" id="yc9e09649-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>a description of such advisory committee, including the subject matter of such committee;</content></paragraph>
<paragraph class="fontsize10" id="yc9e0964a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>a list of members of such advisory committee; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e0964b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>in the case of an advisory committee created by the Director of National Intelligence, the reasons for a determination by the Director under section 4(b)(3) of the Federal Advisory Committee Act (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>) that an advisory committee cannot comply with the requirements of such Act.”</content></paragraph>
</subsection>
</quotedContent>.</content></paragraph>
<paragraph class="fontsize10" id="yc9e0964c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/b/2" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Intelligence information sharing</inline>.—</heading><content>Section 102A(g)(4) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3024/g/4">50 U.S.C. 3024(g)(4)</ref>) <amendingAction type="amend">is amended</amendingAction> to read as follows:<quotedContent><paragraph class="indentDown1 firstIndent0 fontsize10" id="yc9e0964d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e0964e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Reports.</p></sidenote><content>The Director of National Intelligence shall, in a timely manner, report to Congress any statute, regulation, policy, or practice that the Director believes impedes the ability of the Director to fully and effectively ensure maximum availability of access to intelligence information within the intelligence community consistent with the protection of the national security of the United States.”</content></paragraph>
</quotedContent>.</content></paragraph>
<paragraph class="fontsize10" id="yc9e0bd5f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/b/3" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Intelligence community business system transformation</inline>.—</heading><content>Section 506D(j) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3100/j">50 U.S.C. 3100(j)</ref>) <amendingAction type="amend">is amended</amendingAction> in the matter preceding paragraph (1) by <amendingAction type="delete">striking</amendingAction> “<quotedText>2015</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>2014</quotedText>”.</content></paragraph>
<paragraph class="fontsize10" id="yc9e0bd60-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/b/4" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Activities of privacy and civil liberties officers</inline>.—</heading><content>Section 1062(f)(1) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t42/s2000ee–1/f/1">42 U.S.C. 2000ee–1(f)(1)</ref>) <amendingAction type="amend">is amended</amendingAction> in the matter preceding subparagraph (A) by <amendingAction type="delete">striking</amendingAction> “<quotedText>quarterly</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>semiannually</quotedText>”.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e0bd61-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Conforming Amendments</inline>.—</heading><chapeau>The National Security Act of 1947 (<ref href="/us/usc/t50/s3001/etseq">50 U.S.C. 3001 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e0bd62-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in the table of contents in the first section, by <amendingAction type="delete">striking</amendingAction> the item relating to section 114 and <amendingAction type="insert">inserting</amendingAction> the following new item:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 114. </designator>
<label>Annual report on hiring and retention of minority employees.”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="yc9e0bd63-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in section 114 (<ref href="/us/usc/t50/s3050">50 U.S.C. 3050</ref>)—</chapeau><subparagraph class="fontsize10" id="yc9e0bd64-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="amend">amending</amendingAction> the heading to read as follows: “<quotedText>annual report on hiring and retention of minority employees</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e0bd65-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>(a) <headingText class="smallCaps">Annual Report on Hiring and Retention of Minority Employees.—</headingText></quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e0bd66-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraphs (1) through (5) as subsections (a) through (e), respectively;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e0bd67-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><chapeau>in subsection (b) (as so redesignated)—<page identifier="/us/stat/128/1407">128 STAT. 1407</page></chapeau><clause class="fontsize10" id="yc9e0bd68-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/D/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subparagraphs (A) through (C) as paragraphs (1) through (3), respectively; and</content></clause>
<clause class="fontsize10" id="yc9e0bd69-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/D/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in paragraph (2) (as so redesignated)—</chapeau><subclause class="fontsize10" id="yc9e0bd6a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/D/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> clauses (i) and (ii) as subparagraphs (A) and (B), respectively; and</content></subclause>
<subclause class="fontsize10" id="yc9e0bd6b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/D/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in the matter preceding subparagraph (A) (as so redesignated), by <amendingAction type="delete">striking</amendingAction> “<quotedText>clauses (i) and (ii)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subparagraphs (A) and (B)</quotedText>”;</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e0bd6c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>in subsection (d) (as redesignated by subparagraph (C) of this paragraph), by <amendingAction type="delete">striking</amendingAction> “<quotedText>subsection</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e0bd6d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><chapeau>in subsection (e) (as redesignated by subparagraph (C) of this paragraph)—</chapeau><clause class="fontsize10" id="yc9e0bd6e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/F/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subparagraphs (A) through (C) as paragraphs (1) through (3), respectively; and</content></clause>
<clause class="fontsize10" id="yc9e0bd6f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/2/F/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>subsection,</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section</quotedText>”; and</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e0bd70-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><chapeau>in section 507 (<ref href="/us/usc/t50/s3106">50 U.S.C. 3106</ref>)—</chapeau><subparagraph class="fontsize10" id="yc9e0bd71-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>in subsection (a)—</chapeau><clause class="fontsize10" id="yc9e0bd72-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>(1) The date</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>The date</quotedText>”;</content></clause>
<clause class="fontsize10" id="yc9e0bd73-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>subsection (c)(1)(A)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsection (c)(1)</quotedText>”;</content></clause>
<clause class="fontsize10" id="yc9e0bd74-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>by <amendingAction type="delete">striking</amendingAction> paragraph (2); and</content></clause>
<clause class="fontsize10" id="yc9e0bd75-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/A/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subparagraphs (A) through (F) as paragraphs (1) through (6), respectively;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e0bd76-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in subsection (c)(1)—</chapeau><clause class="fontsize10" id="yc9e0bd77-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>(A) Except</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Except</quotedText>”; and</content></clause>
<clause class="fontsize10" id="yc9e0bd78-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> subparagraph (B); and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e0bd79-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><chapeau>in subsection (d)(1)—</chapeau><clause class="fontsize10" id="yc9e0bd7a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in subparagraph (A)—</chapeau><subclause class="fontsize10" id="yc9e0bd7b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/C/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>subsection (a)(1)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsection (a)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="yc9e0bd7c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/C/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>and</quotedText>” after “<quotedText>March 1;</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="yc9e0bd7d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> subparagraph (B); and</content></clause>
<clause class="fontsize10" id="yc9e0bd7e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIII/stB/s329/c/3/C/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subparagraph (C) as subparagraph (B).</content></clause>
</subparagraph>
</paragraph>
</subsection>
</section>
</subtitle>
</title>
<title id="d396573e2918" identifier="/us/pl/113/126/tIV" style="-uslm-lc:I658178"><num value="IV">TITLE IV—</num><heading>MATTERS RELATING TO ELEMENTS OF THE INTELLIGENCE COMMUNITY</heading>
<subtitle id="d396573e2923" identifier="/us/pl/113/126/tIV/stA" style="-uslm-lc:I658178"><num value="A">Subtitle A—</num><heading>National Security Agency</heading>
<section id="d396573e2928" identifier="/us/pl/113/126/tIV/stA/s401" style="-uslm-lc:I658143"><num class="fontsize12" value="401">SEC. 401. </num><heading>APPOINTMENT OF THE DIRECTOR OF THE NATIONAL SECURITY AGENCY.</heading><subsection class="firstIndent0 fontsize10" id="yc9e0e48f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s401/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Director of the National Security Agency</inline>.—</heading><chapeau>Section 2 of the National Security Agency Act of 1959 (<ref href="/us/usc/t50/s3602">50 U.S.C. 3602</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e10ba0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s401/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>(b)</quotedText>” before “<quotedText>There</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e10ba1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s401/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="insert">inserting</amendingAction> before subsection (b), as so designated by paragraph (1), the following:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="yc9e10ba2-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a)</num><paragraph class="inline" id="yc9e10ba3-e897-11f0-bc57-ad3ac4b1618c"><num value="1">(1) </num><content>There is a Director of the National Security Agency.<page identifier="/us/stat/128/1408">128 STAT. 1408</page></content></paragraph>
<paragraph class="indentUp0 firstIndent0 fontsize10" id="yc9e10ba4-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e10ba5-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Appointment.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e10ba6-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p></sidenote><content>The Director of the National Security Agency shall be appointed by the President, by and with the advice and consent of the Senate.</content></paragraph>
<paragraph class="indentUp0 firstIndent0 fontsize10" id="yc9e10ba7-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>The Director of the National Security Agency shall be the head of the National Security Agency and shall discharge such functions and duties as are provided by this Act or otherwise by law or executive order.”</content></paragraph>
</subsection>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e10ba8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s401/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e10ba9-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3602">50 USC 3602 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Position of Importance and Responsibility</inline>.—</heading><paragraph class="fontsize10" id="yc9e10baa-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s401/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The President may designate the Director of the National Security Agency as a position of importance and responsibility under <ref href="/us/usc/t10/s601">section 601 of title 10, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="yc9e10bab-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s401/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Effective date</inline>.—</heading><content>Paragraph (1) shall take effect on the date of the enactment of this Act.</content></paragraph>
</subsection>
</section>
<section id="d396573e3031" identifier="/us/pl/113/126/tIV/stA/s402" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="402">SEC. 402. </num><heading>APPOINTMENT OF THE INSPECTOR GENERAL OF THE NATIONAL SECURITY AGENCY.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e132bc-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  The Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e132bd-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s402/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in section 8G(a)(2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>the National Security Agency,</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e132be-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s402/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in section 12—</chapeau><subparagraph class="fontsize10" id="yc9e132bf-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s402/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>or the Federal Cochairpersons of the Commissions established under <ref href="/us/usc/t40/s15301">section 15301 of title 40, United States Code</ref>;</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>the Federal Cochairpersons of the Commissions established under <ref href="/us/usc/t40/s15301">section 15301 of title 40, United States Code</ref>; the Director of the National Security Agency;</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e132c0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s402/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in paragraph (2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>or the Commissions established under <ref href="/us/usc/t40/s15301">section 15301 of title 40, United States Code</ref>,</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>the Commissions established under <ref href="/us/usc/t40/s15301">section 15301 of title 40, United States Code</ref>, the National Security Agency,</quotedText>”.</content></subparagraph>
</paragraph>
</section>
<section id="d396573e3094" identifier="/us/pl/113/126/tIV/stA/s403" style="-uslm-lc:I658143"><num class="fontsize12" value="403">SEC. 403. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e132c1-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t5/app8G">5 USC app. 8G</ref> note.</p></sidenote><heading>EFFECTIVE DATE AND APPLICABILITY.</heading><subsection class="firstIndent0 fontsize10" id="yc9e1a7f2-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Except as otherwise specifically provided, the amendments made by sections 401 and 402 shall take effect on October 1, 2014, and shall apply upon the earlier of—</chapeau><paragraph class="fontsize10" id="yc9e1a7f3-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in the case of section 401—</chapeau><subparagraph class="fontsize10" id="yc9e1a7f4-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the date of the first nomination by the President of an individual to serve as the Director of the National Security Agency that occurs on or after October 1, 2014; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e1a7f5-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the date of the cessation of the performance of the duties of the Director of the National Security Agency by the individual performing such duties on October 1, 2014; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e1a7f6-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in the case of section 402—</chapeau><subparagraph class="fontsize10" id="yc9e1a7f7-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the date of the first nomination by the President of an individual to serve as the Inspector General of the National Security Agency that occurs on or after October 1, 2014; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e1a7f8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the date of the cessation of the performance of the duties of the Inspector General of the National Security Agency by the individual performing such duties on October 1, 2014.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e1a7f9-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e1a7fa-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Exception for Initial Nominations</inline>.—</heading><content>Notwithstanding paragraph (1)(A) or (2)(A) of subsection (a), an individual serving as the Director of the National Security Agency or the Inspector <page identifier="/us/stat/128/1409">128 STAT. 1409</page>
General of the National Security Agency on the date that the President first nominates an individual for such position on or after October 1, 2014, may continue to perform in that position after such date of nomination and until the individual appointed to the position, by and with the advice and consent of the Senate, assumes the duties of the position.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e1a7fb-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stA/s403/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Incumbent Inspector General</inline>.—</heading><content>The individual serving as Inspector General of the National Security Agency on the date of the enactment of this Act shall be eligible to be appointed by the President to a new term of service under section 3 of the Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>), by and with the advice and consent of the Senate.</content></subsection>
</section>
</subtitle>
<subtitle id="d396573e3173" identifier="/us/pl/113/126/tIV/stB" style="-uslm-lc:I658178"><num value="B">Subtitle B—</num><heading>National Reconnaissance Office</heading>
<section id="d396573e3178" identifier="/us/pl/113/126/tIV/stB/s411" style="-uslm-lc:I658143"><num class="fontsize12" value="411">SEC. 411. </num><heading>APPOINTMENT OF THE DIRECTOR OF THE NATIONAL RECONNAISSANCE OFFICE.</heading><subsection class="firstIndent0 fontsize10" id="yc9e1cf0c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s411/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>The National Security Act of 1947 (<ref href="/us/usc/t50/s3001/etseq">50 U.S.C. 3001 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> after section 106 the following:<quotedContent><section class="indentUp2 firstIndent-2" id="yc9e1f61d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658144"><num class="bold" value="106A">“SEC. 106A. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e1f61e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3041a">50 USC 3041a</ref>.</p></sidenote><heading class="bold">DIRECTOR OF THE NATIONAL RECONNAISSANCE OFFICE.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e1f61f-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>There is a Director of the National Reconnaissance Office.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e1f620-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Appointment</inline>.—</heading><content>The Director of the National Reconnaissance Office shall be appointed by the President, by and with the advice and consent of the Senate.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e1f621-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Functions and Duties</inline>.—</heading><content>The Director of the National Reconnaissance Office shall be the head of the National Reconnaissance Office and shall discharge such functions and duties as are provided by this Act or otherwise by law or executive order.”</content></subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e1f622-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s411/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e1f623-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3041a">50 USC 3041a note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Position of Importance and Responsibility</inline>.—</heading><paragraph class="fontsize10" id="yc9e1f624-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s411/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The President may designate the Director of the National Reconnaissance Office as a position of importance and responsibility under <ref href="/us/usc/t10/s601">section 601 of title 10, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="yc9e1f625-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s411/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Effective date</inline>.—</heading><content>Paragraph (1) shall take effect on the date of the enactment of this Act.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e1f626-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s411/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendment</inline>.—</heading><content>The table of contents in the first section of the National Security Act of 1947 (<ref href="/us/usc/t50/s3001/etseq">50 U.S.C. 3001 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 106 the following:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 106A. </designator>
<label>Director of the National Reconnaissance Office.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d396573e3307" identifier="/us/pl/113/126/tIV/stB/s412" style="-uslm-lc:I658143"><num class="fontsize12" value="412">SEC. 412. </num><heading>APPOINTMENT OF THE INSPECTOR GENERAL OF THE NATIONAL RECONNAISSANCE OFFICE.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e21d37-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  The Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>)—</chapeau><paragraph class="fontsize10" id="yc9e21d38-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s412/1" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in section 8G(a)(2),<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e21d39-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t5/app">5 USC app.</ref></p></sidenote> as amended by section 402, is further amended by <amendingAction type="delete">striking</amendingAction> “<quotedText>the National Reconnaissance Office,</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e21d3a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s412/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in section 12,<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e21d3b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t5/app">5 USC app.</ref></p></sidenote> as amended by section 402, is further amended—</chapeau><subparagraph class="fontsize10" id="yc9e21d3c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s412/2/A" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (1), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>or the Director of the National Reconnaissance Office;</quotedText>” before “<quotedText>as the case may be;</quotedText>”; and<page identifier="/us/stat/128/1410">128 STAT. 1410</page></content></subparagraph>
<subparagraph class="fontsize10" id="yc9e21d3d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s412/2/B" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in paragraph (2), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>or the National Reconnaissance Office,</quotedText>” before “<quotedText>as the case may be;</quotedText>”.</content></subparagraph>
</paragraph>
</section>
<section id="d396573e3362" identifier="/us/pl/113/126/tIV/stB/s413" style="-uslm-lc:I658143"><num class="fontsize12" value="413">SEC. 413. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e21d3e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t5/app8G">5 USC app. 8G</ref> note.</p></sidenote><heading>EFFECTIVE DATE AND APPLICABILITY.</heading><subsection class="firstIndent0 fontsize10" id="yc9e2926f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>The amendments made by sections 411 and 412 shall take effect on October 1, 2014, and shall apply upon the earlier of—</chapeau><paragraph class="fontsize10" id="yc9e29270-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in the case of section 411—</chapeau><subparagraph class="fontsize10" id="yc9e29271-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the date of the first nomination by the President of an individual to serve as the Director of the National Reconnaissance Office that occurs on or after October 1, 2014; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e29272-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the date of the cessation of the performance of the duties of the Director of the National Reconnaissance Office by the individual performing such duties on October 1, 2014; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e29273-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in the case of section 412—</chapeau><subparagraph class="fontsize10" id="yc9e29274-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the date of the first nomination by the President of an individual to serve as the Inspector General of the National Reconnaissance Office that occurs on or after October 1, 2014; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e29275-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the date of the cessation of the performance of the duties of the Inspector General of the National Reconnaissance Office by the individual performing such duties on October 1, 2014.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e29276-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e29277-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Exception for Initial Nominations</inline>.—</heading><content>Notwithstanding paragraph (1)(A) or (2)(A) of subsection (a), an individual serving as the Director of the National Reconnaissance Office or the Inspector General of the National Reconnaissance Office on the date that the President first nominates an individual for such position on or after October 1, 2014, may continue to perform in that position after such date of nomination and until the individual appointed to the position, by and with the advice and consent of the Senate, assumes the duties of the position.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e29278-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stB/s413/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Incumbent Inspector General</inline>.—</heading><content>The individual serving as Inspector General of the National Reconnaissance Office on the date of the enactment of this Act shall be eligible to be appointed by the President to a new term of service under section 3 of the Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>), by and with the advice and consent of the Senate.</content></subsection>
</section>
</subtitle>
<subtitle id="d396573e3437" identifier="/us/pl/113/126/tIV/stC" style="-uslm-lc:I658178"><num value="C">Subtitle C—</num><heading>Central Intelligence Agency</heading>
<section id="d396573e3442" identifier="/us/pl/113/126/tIV/stC/s421" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="421">SEC. 421. </num><heading>GIFTS, DEVISES, AND BEQUESTS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e2e099-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 12 of the Central Intelligence Agency Act of 1949 (<ref href="/us/usc/t50/s3512">50 U.S.C. 3512</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e2e09a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> the section heading and <amendingAction type="insert">inserting</amendingAction> “<quotedText><headingText class="smallCaps">gifts, devises, and bequests</headingText></quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="yc9e2e09b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in subsection (a)(2)—</chapeau><subparagraph class="fontsize10" id="yc9e2e09c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>by the Director as a gift to the Agency</quotedText>” after “<quotedText>accepted</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e2e09d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>this section</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>this subsection</quotedText>”;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e2e09e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>in subsection (b), by <amendingAction type="delete">striking</amendingAction> “<quotedText>this section,</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsection (a),</quotedText>”;<page identifier="/us/stat/128/1411">128 STAT. 1411</page></content></paragraph>
<paragraph class="fontsize10" id="yc9e2e09f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>in subsection (c), by <amendingAction type="delete">striking</amendingAction> “<quotedText>this section,</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsection (a),</quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="yc9e2e0a0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>in subsection (d), by <amendingAction type="delete">striking</amendingAction> “<quotedText>this section</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsection (a)</quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="yc9e2e0a1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsection (f) as subsection (g); and</content></paragraph>
<paragraph class="fontsize10" id="yc9e2e0a2-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tIV/stC/s421/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>by <amendingAction type="insert">inserting</amendingAction> after subsection (e) the following:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="yc9e307b3-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">“(f)</num><paragraph class="inline" id="yc9e307b4-e897-11f0-bc57-ad3ac4b1618c"><num value="1">(1) </num><content>The Director may engage in fundraising in an official capacity for the benefit of nonprofit organizations that provide support to surviving family members of deceased Agency employees or that otherwise provide support for the welfare, education, or recreation of Agency employees, former Agency employees, or their family members.</content></paragraph>
<paragraph class="indentUp0 firstIndent0 fontsize10" id="yc9e307b5-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e307b6-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Definition.</p></sidenote><content>In this subsection, the term ‘<term>fundraising</term>’ means the raising of funds through the active participation in the promotion, production, or presentation of an event designed to raise funds and does not include the direct solicitation of money by any other means.”</content></paragraph>
</subsection>
</quotedContent>.</content></paragraph>
</section>
</subtitle>
</title>
<title id="d396573e3574" identifier="/us/pl/113/126/tV" style="-uslm-lc:I658178"><num value="V">TITLE V—</num><heading>SECURITY CLEARANCE REFORM</heading>
<section id="d396573e3579" identifier="/us/pl/113/126/tV/s501" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="501">SEC. 501. </num><heading>CONTINUOUS EVALUATION AND SHARING OF DEROGATORY INFORMATION REGARDING PERSONNEL WITH ACCESS TO CLASSIFIED INFORMATION.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e32ec7-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 102A(j) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3024/j">50 U.S.C. 3024(j)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e32ec8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s501/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in the heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><headingText class="smallCaps">Sensitive Compartmented Information</headingText></quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText><headingText class="smallCaps">Classified Information</headingText></quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="yc9e32ec9-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s501/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in paragraph (3), by <amendingAction type="delete">striking</amendingAction> “<quotedText>; and</quotedText>” and <amendingAction type="insert">inserting</amendingAction> a semicolon;</content></paragraph>
<paragraph class="fontsize10" id="yc9e32eca-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s501/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>in paragraph (4), by <amendingAction type="delete">striking</amendingAction> the period and <amendingAction type="insert">inserting</amendingAction> a semicolon; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e32ecb-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s501/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following new paragraphs:<quotedContent><paragraph class="indentUp0 fontsize10" id="yc9e355dc-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><content>ensure that the background of each employee or officer of an element of the intelligence community, each contractor to an element of the intelligence community, and each individual employee of such a contractor who has been determined to be eligible for access to classified information is monitored on a continual basis under standards developed by the Director, including with respect to the frequency of evaluation, during the period of eligibility of such employee or officer of an element of the intelligence community, such contractor, or such individual employee to such a contractor to determine whether such employee or officer of an element of the intelligence community, such contractor, and such individual employee of such a contractor continues to meet the requirements for eligibility for access to classified information; and</content></paragraph>
<paragraph class="indentUp0 fontsize10" id="yc9e355dd-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><content>develop procedures to require information sharing between elements of the intelligence community concerning potentially derogatory security information regarding an employee or officer of an element of the intelligence community, a contractor to an element of the intelligence community, or an individual employee of such a contractor that may impact the eligibility of such employee or officer of an element of the intelligence community, such contractor, or such individual employee of such a contractor for a security clearance.”</content></paragraph>
</quotedContent>.<page identifier="/us/stat/128/1412">128 STAT. 1412</page></content></paragraph>
</section>
<section id="d396573e3657" identifier="/us/pl/113/126/tV/s502" style="-uslm-lc:I658143"><num class="fontsize12" value="502">SEC. 502. </num><heading>REQUIREMENTS FOR INTELLIGENCE COMMUNITY CONTRACTORS.</heading><subsection class="firstIndent0 fontsize10" id="yc9e37cee-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s502/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Requirements</inline>.—</heading><content>Section 102A of the National Security Act of 1947 (<ref href="/us/usc/t50/s3024">50 U.S.C. 3024</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new subsection:<quotedContent><subsection class="firstIndent0 fontsize10" id="yc9e3a3ff-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="x">“(x) </num><heading class="fontsize10"><inline class="smallCaps">Requirements for Intelligence Community Contractors</inline>.—</heading><chapeau>The Director of National Intelligence, in consultation with the head of each department of the Federal Government that contains an element of the intelligence community and the Director of the Central Intelligence Agency, shall—</chapeau><paragraph class="fontsize10" id="yc9e3a400-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><chapeau>ensure that—</chapeau><subparagraph class="fontsize10" id="yc9e3a401-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>any contractor to an element of the intelligence community with access to a classified network or classified information develops and operates a security plan that is consistent with standards established by the Director of National Intelligence for intelligence community networks; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e3a402-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>each contract awarded by an element of the intelligence community includes provisions requiring the contractor comply with such plan and such standards;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e3a403-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>conduct periodic assessments of each security plan required under paragraph (1)(A) to ensure such security plan complies with the requirements of such paragraph; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e3a404-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>ensure that the insider threat detection capabilities and insider threat policies of the intelligence community apply to facilities of contractors with access to a classified network.”</content></paragraph>
</subsection>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e3a405-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s502/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e3a406-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3024">50 USC 3024 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Applicability</inline>.—</heading><content>The amendment made by subsection (a) shall apply with respect to contracts entered into or renewed after the date of the enactment of this Act.</content></subsection>
</section>
<section id="d396573e3731" identifier="/us/pl/113/126/tV/s503" style="-uslm-lc:I658143"><num class="fontsize12" value="503">SEC. 503. </num><heading>TECHNOLOGY IMPROVEMENTS TO SECURITY CLEARANCE PROCESSING.</heading><subsection class="firstIndent0 fontsize10" id="yc9e44047-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e44048-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e44049-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Analysis.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>The Director of National Intelligence, in consultation with the Secretary of Defense and the Director of the Office of Personnel Management, shall conduct an analysis of the relative costs and benefits of potential improvements to the process for investigating persons who are proposed for access to classified information and adjudicating whether such persons satisfy the criteria for obtaining and retaining access to such information.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e4404a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e4404b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Evaluation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Contents of Analysis</inline>.—</heading><chapeau>In conducting the analysis required by subsection (a), the Director of National Intelligence shall evaluate the costs and benefits associated with—</chapeau><paragraph class="fontsize10" id="yc9e4404c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>the elimination of manual processes in security clearance investigations and adjudications, if possible, and automating and integrating the elements of the investigation process, including—</chapeau><subparagraph class="fontsize10" id="yc9e4404d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the clearance application process;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e4404e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>case management;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e4404f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>adjudication management;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e44050-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>investigation methods for the collection, analysis, storage, retrieval, and transfer of data and records; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e44051-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/1/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>records management for access and eligibility determinations;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e44052-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the elimination or reduction, if possible, of the use of databases and information sources that cannot be accessed and processed automatically electronically, or modification of <page identifier="/us/stat/128/1413">128 STAT. 1413</page>
such databases and information sources, to enable electronic access and processing;</content></paragraph>
<paragraph class="fontsize10" id="yc9e44053-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the use of government-developed and commercial technology for continuous monitoring and evaluation of government and commercial data sources that can identify and flag information pertinent to adjudication guidelines and eligibility determinations;</content></paragraph>
<paragraph class="fontsize10" id="yc9e44054-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>the standardization of forms used for routine reporting required of cleared personnel (such as travel, foreign contacts, and financial disclosures) and use of continuous monitoring technology to access databases containing such reportable information to independently obtain and analyze reportable data and events;</content></paragraph>
<paragraph class="fontsize10" id="yc9e44055-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>the establishment of an authoritative central repository of personnel security information that is accessible electronically at multiple levels of classification and eliminates technical barriers to rapid access to information necessary for eligibility determinations and reciprocal recognition thereof;</content></paragraph>
<paragraph class="fontsize10" id="yc9e44056-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>using digitally processed fingerprints, as a substitute for ink or paper prints, to reduce error rates and improve portability of data;</content></paragraph>
<paragraph class="fontsize10" id="yc9e44057-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>expanding the use of technology to improve an applicant’s ability to discover the status of a pending security clearance application or reinvestigation; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e44058-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/b/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><content>using government and publicly available commercial data sources, including social media, that provide independent information pertinent to adjudication guidelines to improve quality and timeliness, and reduce costs, of investigations and reinvestigations.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e44059-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s503/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Report to Congress</inline>.—</heading><content>Not later than 6 months after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a report on the analysis required by subsection (a).</content></subsection>
</section>
<section id="d396573e3841" identifier="/us/pl/113/126/tV/s504" style="-uslm-lc:I658143"><num class="fontsize12" value="504">SEC. 504. </num><heading>REPORT ON RECIPROCITY OF SECURITY CLEARANCES.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e4676a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  The head of the entity selected pursuant to section 3001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341/b">50 U.S.C. 3341(b)</ref>) shall submit to the appropriate committees of Congress a report each year through 2017 that describes for the preceding year—</chapeau><paragraph class="fontsize10" id="yc9e4676b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s504/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the periods of time required by authorized adjudicative agencies for accepting background investigations and determinations completed by an authorized investigative entity or authorized adjudicative agency;</content></paragraph>
<paragraph class="fontsize10" id="yc9e4676c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s504/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the total number of cases in which a background investigation or determination completed by an authorized investigative entity or authorized adjudicative agency is accepted by another agency;</content></paragraph>
<paragraph class="fontsize10" id="yc9e4676d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s504/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the total number of cases in which a background investigation or determination completed by an authorized investigative entity or authorized adjudicative agency is not accepted by another agency; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e4676e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s504/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>such other information or recommendations as the head of the entity selected pursuant to such section 3001(b) considers appropriate.<page identifier="/us/stat/128/1414">128 STAT. 1414</page></content></paragraph>
</section>
<section id="d396573e3875" identifier="/us/pl/113/126/tV/s505" style="-uslm-lc:I658143"><num class="fontsize12" value="505">SEC. 505. </num><heading>IMPROVING THE PERIODIC REINVESTIGATION PROCESS.</heading><subsection class="firstIndent0 fontsize10" id="yc9e4b58f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e4b590-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadlines.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e4b591-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e4b592-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Strategic plan.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, and annually thereafter until December 31, 2017, the Director of National Intelligence, in consultation with the Secretary of Defense and the Director of the Office of Personnel Management, shall transmit to the appropriate committees of Congress a strategic plan for updating the process for periodic reinvestigations consistent with a continuous evaluation program.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e4b593-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The plan required by subsection (a) shall include—</chapeau><paragraph class="fontsize10" id="yc9e4b594-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>an analysis of the costs and benefits associated with conducting periodic reinvestigations;</content></paragraph>
<paragraph class="fontsize10" id="yc9e4b595-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/b/2" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>an analysis of the costs and benefits associated with <amendingAction type="substitute">replacing</amendingAction> some or all periodic reinvestigations with a program of continuous evaluation;</content></paragraph>
<paragraph class="fontsize10" id="yc9e4b596-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>a determination of how many risk-based and ad hoc periodic reinvestigations are necessary on an annual basis for each component of the Federal Government with employees with security clearances;</content></paragraph>
<paragraph class="fontsize10" id="yc9e4b597-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>an analysis of the potential benefits of expanding the Government’s use of continuous evaluation tools as a means of improving the effectiveness and efficiency of procedures for confirming the eligibility of personnel for continued access to classified information; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e4b598-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>an analysis of how many personnel with out-of-scope background investigations are employed by, or contracted or detailed to, each element of the intelligence community.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e4b599-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s505/c" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Periodic Reinvestigations Defined</inline>.—</heading><content>In this section, the term “<term>periodic reinvestigations</term>” has the meaning given that term in section 3001(a) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341/a">50 U.S.C. 3341(a)</ref>).</content></subsection>
</section>
<section id="d396573e3948" identifier="/us/pl/113/126/tV/s506" role="definitions" style="-uslm-lc:I658143"><num class="fontsize12" value="506">SEC. 506. </num><heading>APPROPRIATE COMMITTEES OF CONGRESS DEFINED.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e4dcaa-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  In this title, the term “<term>appropriate committees of Congress</term>” means—</chapeau><paragraph class="fontsize10" id="yc9e4dcab-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s506/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the congressional intelligence committees;</content></paragraph>
<paragraph class="fontsize10" id="yc9e4dcac-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s506/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e4dcad-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tV/s506/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the Committee on Armed Services and the Committee on Homeland Security of the House of Representatives.</content></paragraph>
</section>
</title>
<title id="d396573e3971" identifier="/us/pl/113/126/tVI" style="-uslm-lc:I658178"><num value="VI">TITLE VI—</num><heading>INTELLIGENCE COMMUNITY WHISTLEBLOWER PROTECTIONS</heading>
<section id="d396573e3976" identifier="/us/pl/113/126/tVI/s601" style="-uslm-lc:I658143"><num class="fontsize12" value="601">SEC. 601. </num><heading>PROTECTION OF INTELLIGENCE COMMUNITY WHISTLEBLOWERS.</heading><subsection class="firstIndent0 fontsize10" id="yc9e52ace-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s601/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Title XI of the National Security Act of 1947 (<ref href="/us/usc/t50/s3231/etseq">50 U.S.C. 3231 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new section:<quotedContent><section class="indentUp2 firstIndent-2" id="yc9e59fff-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658144"><num class="bold" value="1104">“SEC. 1104. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e5a000-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3234">50 USC 3234</ref>.</p></sidenote><heading class="bold">PROHIBITED PERSONNEL PRACTICES IN THE INTELLIGENCE COMMUNITY.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e5a001-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="yc9e5a002-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Agency</inline>.—</heading><content>The term ‘<term>agency</term>’ means an executive department or independent establishment, as defined under <page identifier="/us/stat/128/1415">128 STAT. 1415</page>
sections 101 and 104 of <ref href="/us/usc/t5">title 5, United States Code</ref>, that contains an intelligence community element, except the Federal Bureau of Investigation.</content></paragraph>
<paragraph class="fontsize10" id="yc9e5a003-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Covered intelligence community element</inline>.—</heading><chapeau>The term ‘<term>covered intelligence community element</term>’—</chapeau><subparagraph class="fontsize10" id="yc9e5a004-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>means—</chapeau><clause class="fontsize10" id="yc9e5a005-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the Central Intelligence Agency, the Defense Intelligence Agency, the National Geospatial-Intelligence Agency, the National Security Agency, the Office of the Director of National Intelligence, and the National Reconnaissance Office; and</content></clause>
<clause class="fontsize10" id="yc9e5a006-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>any executive agency or unit thereof determined by the President under <ref href="/us/usc/t5/s2302/a/2/C/ii">section 2302(a)(2)(C)(ii) of title 5, United States Code</ref>, to have as its principal function the conduct of foreign intelligence or counterintelligence activities; and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e5a007-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>does not include the Federal Bureau of Investigation.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e5a008-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Personnel action</inline>.—</heading><chapeau>The term ‘<term>personnel action</term>’ means, with respect to an employee in a position in a covered intelligence community element (other than a position excepted from the competitive service due to its confidential, policy-determining, policymaking, or policy-advocating character)—</chapeau><subparagraph class="fontsize10" id="yc9e5a009-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>an appointment;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c71a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>a promotion;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c71b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>a disciplinary or corrective action;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c71c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>a detail, transfer, or reassignment;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c71d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><content>a demotion, suspension, or termination;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c71e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">“(F) </num><content>a reinstatement or restoration;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c71f-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">“(G) </num><content>a performance evaluation;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c720-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">“(H) </num><content>a decision concerning pay, benefits, or awards;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c721-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>a decision concerning education or training if such education or training may reasonably be expected to lead to an appointment, promotion, or performance evaluation; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e5c722-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="J">“(J) </num><content>any other significant change in duties, responsibilities, or working conditions.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e5c723-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Any employee of an agency who has authority to take, direct others to take, recommend, or approve any personnel action, shall not, with respect to such authority, take or fail to take a personnel action with respect to any employee of a covered intelligence community element as a reprisal for a lawful disclosure of information by the employee to the Director of National Intelligence (or an employee designated by the Director of National Intelligence for such purpose), the Inspector General of the Intelligence Community, the head of the employing agency (or an employee designated by the head of that agency for such purpose), the appropriate inspector general of the employing agency, a congressional intelligence committee, or a member of a congressional intelligence committee, which the employee reasonably believes evidences—</chapeau><paragraph class="fontsize10" id="yc9e5c724-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>a violation of any Federal law, rule, or regulation; or</content></paragraph>
<paragraph class="fontsize10" id="yc9e5c725-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>mismanagement, a gross waste of funds, an abuse of authority, or a substantial and specific danger to public health or safety.<page identifier="/us/stat/128/1416">128 STAT. 1416</page></content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e5c726-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e5c727-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">President.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Enforcement</inline>.—</heading><content>The President shall provide for the enforcement of this section.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e5c728-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><heading class="fontsize10"><inline class="smallCaps">Existing Rights Preserved</inline>.—</heading><chapeau>Nothing in this section shall be construed to—</chapeau><paragraph class="fontsize10" id="yc9e5c729-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>preempt or preclude any employee, or applicant for employment, at the Federal Bureau of Investigation from exercising rights provided under any other law, rule, or regulation, including <ref href="/us/usc/t5/s2303">section 2303 of title 5, United States Code</ref>; or</content></paragraph>
<paragraph class="fontsize10" id="yc9e5c72a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>repeal <ref href="/us/usc/t5/s2303">section 2303 of title 5, United States Code</ref>.”</content></paragraph>
</subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e5c72b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s601/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendment</inline>.—</heading><content>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new item:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1104. </designator>
<label>Prohibited personnel practices in the intelligence community.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d396573e4219" identifier="/us/pl/113/126/tVI/s602" style="-uslm-lc:I658143"><num class="fontsize12" value="602">SEC. 602. </num><heading>REVIEW OF SECURITY CLEARANCE OR ACCESS DETERMINATIONS.</heading><subsection class="firstIndent0 fontsize10" id="yc9e68a7c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">General Responsibility</inline>.—</heading><paragraph class="fontsize10" id="yc9e68a7d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/a/1" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Section 3001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341/b">50 U.S.C. 3341(b)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><subparagraph class="fontsize10" id="yc9e68a7e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in the matter preceding paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Not</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Except as otherwise provided, not</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e68a7f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in paragraph (5), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” after the semicolon;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e68a80-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/a/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>in paragraph (6), by <amendingAction type="delete">striking</amendingAction> the period at the end and <amendingAction type="insert">inserting</amendingAction> “<quotedText>; and</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e68a81-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/a/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>by <amendingAction type="insert">inserting</amendingAction> after paragraph (6) the following:<quotedContent><paragraph class="indentDown1 fontsize10" id="yc9e6b092-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e6b093-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e6b094-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Procedures.</p></sidenote><chapeau>not later than 180 days after the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2014—</chapeau><subparagraph class="fontsize10" id="yc9e6b095-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>developing policies and procedures that permit, to the extent practicable, individuals to appeal a determination to suspend or revoke a security clearance or access to classified information and to retain their government employment status while such challenge is pending; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e6b096-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>developing and implementing uniform and consistent policies and procedures to ensure proper protections during the process for denying, suspending, or revoking a security clearance or access to classified information, including the ability to appeal such a denial, suspension, or revocation, except that there shall be no appeal of an agency’s suspension of a security clearance or access determination for purposes of conducting an investigation, if that suspension lasts no longer than 1 year or the head of the agency or a designee of the head of the agency certifies that a longer suspension is needed before a final decision on denial or revocation to prevent imminent harm to the national security.”</content></subparagraph>
</paragraph>
</quotedContent>.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e6b097-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e6b098-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Reports.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e6b099-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e6b09a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Extension.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e6b09b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3341">50 USC 3341 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Required elements of policies and procedures</inline>.—</heading><content>The policies and procedures for appeal developed under paragraph (7) of section 3001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004, as added by subsection (a), shall provide for the Inspector General of the Intelligence Community, or the inspector general of the employing agency, to conduct fact-finding and report to the agency head or the designee of the agency head within 180 days unless the employee and the agency agree to an extension or the investigating inspector general determines in writing that a greater <page identifier="/us/stat/128/1417">128 STAT. 1417</page>
period of time is required. To the fullest extent possible, such fact-finding shall include an opportunity for the employee to present relevant evidence such as witness testimony.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e6b09c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Retaliatory Revocation of Security Clearances and Access Determinations</inline>.—</heading><content>Section 3001 of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341">50 U.S.C. 3341</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="firstIndent0 fontsize10" id="yc9e79afd-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="j">“(j) </num><heading class="fontsize10"><inline class="smallCaps">Retaliatory Revocation of Security Clearances and Access Determinations</inline>.—</heading><paragraph class="fontsize10" id="yc9e79afe-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Agency personnel with authority over personnel security clearance or access determinations shall not take or fail to take, or threaten to take or fail to take, any action with respect to any employee’s security clearance or access determination in retaliation for—</chapeau><subparagraph class="fontsize10" id="yc9e79aff-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>any lawful disclosure of information to the Director of National Intelligence (or an employee designated by the Director of National Intelligence for such purpose) or the head of the employing agency (or employee designated by the head of that agency for such purpose) by an employee that the employee reasonably believes evidences—</chapeau><clause class="fontsize10" id="yc9e79b00-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>a violation of any Federal law, rule, or regulation; or</content></clause>
<clause class="fontsize10" id="yc9e79b01-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>gross mismanagement, a gross waste of funds, an abuse of authority, or a substantial and specific danger to public health or safety;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e79b02-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><chapeau>any lawful disclosure to the Inspector General of an agency or another employee designated by the head of the agency to receive such disclosures, of information which the employee reasonably believes evidences—</chapeau><clause class="fontsize10" id="yc9e79b03-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>a violation of any Federal law, rule, or regulation; or</content></clause>
<clause class="fontsize10" id="yc9e79b04-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>gross mismanagement, a gross waste of funds, an abuse of authority, or a substantial and specific danger to public health or safety;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e79b05-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><chapeau>any lawful disclosure that complies with—</chapeau><clause class="fontsize10" id="yc9e79b06-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>subsections (a)(1), (d), and (h) of section 8H of the Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>);</content></clause>
<clause class="fontsize10" id="yc9e79b07-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>subparagraphs (A), (D), and (H) of section 17(d)(5) of the Central Intelligence Agency Act of 1949 (<ref href="/us/usc/t50/s3517/d/5">50 U.S.C. 3517(d)(5)</ref>); or</content></clause>
<clause class="fontsize10" id="yc9e79b08-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>subparagraphs (A), (D), and (I) of section 103H(k)(5) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3033/k/5">50 U.S.C. 3033(k)(5)</ref>); and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e79b09-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><chapeau>if the actions do not result in the employee or applicant unlawfully disclosing information specifically required by Executive order to be kept classified in the interest of national defense or the conduct of foreign affairs, any lawful disclosure in conjunction with—</chapeau><clause class="fontsize10" id="yc9e79b0a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the exercise of any appeal, complaint, or grievance right granted by any law, rule, or regulation;</content></clause>
<clause class="fontsize10" id="yc9e79b0b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>testimony for or otherwise lawfully assisting any individual in the exercise of any right referred to in clause (i); or</content></clause>
<clause class="fontsize10" id="yc9e79b0c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>cooperation with or disclosing information to the Inspector General of an agency, in accordance with applicable provisions of law in connection with an <page identifier="/us/stat/128/1418">128 STAT. 1418</page>
audit, inspection, or investigation conducted by the Inspector General.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e79b0d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Rule of construction</inline>.—</heading><content>Consistent with the protection of sources and methods, nothing in paragraph (1) shall be construed to authorize the withholding of information from Congress or the taking of any personnel action against an employee who lawfully discloses information to Congress.</content></paragraph>
<paragraph class="fontsize10" id="yc9e79b0e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Disclosures</inline>.—</heading><subparagraph class="fontsize10" id="yc9e79b0f-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>A disclosure shall not be excluded from paragraph (1) because—</chapeau><clause class="fontsize10" id="yc9e79b10-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the disclosure was made to a person, including a supervisor, who participated in an activity that the employee reasonably believed to be covered by paragraph (1)(A)(ii);</content></clause>
<clause class="fontsize10" id="yc9e79b11-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>the disclosure revealed information that had been previously disclosed;</content></clause>
<clause class="fontsize10" id="yc9e79b12-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>the disclosure was not made in writing;</content></clause>
<clause class="fontsize10" id="yc9e79b13-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">“(iv) </num><content>the disclosure was made while the employee was off duty; or</content></clause>
<clause class="fontsize10" id="yc9e79b14-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">“(v) </num><content>of the amount of time which has passed since the occurrence of the events described in the disclosure.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yc9e79b15-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Reprisals</inline>.—</heading><content>If a disclosure is made during the normal course of duties of an employee, the disclosure shall not be excluded from paragraph (1) if any employee who has authority to take, direct others to take, recommend, or approve any personnel action with respect to the employee making the disclosure, took, failed to take, or threatened to take or fail to take a personnel action with respect to that employee in reprisal for the disclosure.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e79b16-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Agency adjudication</inline>.—</heading><subparagraph class="fontsize10" id="yc9e79b17-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e79b18-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e79b19-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time period.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Remedial procedure</inline>.—</heading><content>An employee or former employee who believes that he or she has been subjected to a reprisal prohibited by paragraph (1) may, within 90 days after the issuance of notice of such decision, appeal that decision within the agency of that employee or former employee through proceedings authorized by subsection (b)(7), except that there shall be no appeal of an agency’s suspension of a security clearance or access determination for purposes of conducting an investigation, if that suspension lasts not longer than 1 year (or a longer period in accordance with a certification made under subsection (b)(7)).</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e79b1a-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Corrective action</inline>.—</heading><content>If, in the course of proceedings authorized under subparagraph (A), it is determined that the adverse security clearance or access determination violated paragraph (1), the agency shall take specific corrective action to return the employee or former employee, as nearly as practicable and reasonable, to the position such employee or former employee would have held had the violation not occurred. Such corrective action may include back pay and related benefits, travel expenses, and compensatory damages not to exceed $300,000.</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e79b1b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Contributing factor</inline>.—</heading><content>In determining whether the adverse security clearance or access determination violated paragraph (1), the agency shall find that paragraph (1) was violated if a disclosure described in paragraph <page identifier="/us/stat/128/1419">128 STAT. 1419</page>
(1) was a contributing factor in the adverse security clearance or access determination taken against the individual, unless the agency demonstrates by a preponderance of the evidence that it would have taken the same action in the absence of such disclosure, giving the utmost deference to the agency’s assessment of the particular threat to the national security interests of the United States in the instant matter.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e79b1c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><heading class="fontsize10"><inline class="smallCaps">Appellate review of security clearance access determinations by director of national intelligence</inline>.—</heading><subparagraph class="fontsize10" id="yc9e79b1d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e79b1e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Appeal</inline>.—</heading><content>Within 60 days after receiving notice of an adverse final agency determination under a proceeding under paragraph (4), an employee or former employee may appeal that determination in accordance with the procedures established under subparagraph (B).</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e79b1f-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e79b20-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Policies and procedures</inline>.—</heading><content>The Director of National Intelligence, in consultation with the Attorney General and the Secretary of Defense, shall develop and implement policies and procedures for adjudicating the appeals authorized by subparagraph (A).</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e79b21-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Congressional notification</inline>.—</heading><content>Consistent with the protection of sources and methods, at the time the Director of National Intelligence issues an order regarding an appeal pursuant to the policies and procedures established by this paragraph, the Director of National Intelligence shall notify the congressional intelligence committees.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e7c232-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><heading class="fontsize10"><inline class="smallCaps">Judicial review</inline>.—</heading><chapeau>Nothing in this section shall be construed to permit or require judicial review of any—</chapeau><subparagraph class="fontsize10" id="yc9e7c233-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>agency action under this section; or</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e7c234-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>action of the appellate review procedures established under paragraph (5).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e7c235-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><heading class="fontsize10"><inline class="smallCaps">Private cause of action</inline>.—</heading><content>Nothing in this section shall be construed to permit, authorize, or require a private cause of action to challenge the merits of a security clearance determination.”</content></paragraph>
</subsection>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e7c236-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Access Determination Defined</inline>.—</heading><content>Section 3001(a) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341/a">50 U.S.C. 3341(a)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><paragraph class="fontsize10" id="yc9e7c237-e897-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">“(9) </num><heading class="fontsize10"><inline class="smallCaps">Access determination</inline>.—</heading><chapeau>The term ‘<term>access determination</term>’ means the determination regarding whether an employee—</chapeau><subparagraph class="fontsize10" id="yc9e7c238-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>is eligible for access to classified information in accordance with Executive Order 12968 (<ref href="/us/fr/60/40245">60 Fed. Reg. 40245</ref>; relating to access to classified information), or any successor thereto, and Executive Order 10865 (<ref href="/us/fr/25/1583">25 Fed. Reg. 1583</ref>; relating to safeguarding classified information with industry), or any successor thereto; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e7c239-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>possesses a need to know under such an Order.”</content></subparagraph>
</paragraph>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e7c23a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e7c23b-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3341">50 USC 3341 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Existing Rights Preserved</inline>.—</heading><content>Nothing in this section or the amendments made by this section shall be construed to preempt, preclude, or otherwise prevent an individual from exercising rights, remedies, or avenues of redress currently provided under any other law, regulation, or rule.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e7c23c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s602/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e7c23d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3341">50 USC 3341 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Rule of Construction</inline>.—</heading><content>Nothing in section 3001 of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341">50 U.S.C. 3341</ref>), as amended by this title, shall be construed to require <page identifier="/us/stat/128/1420">128 STAT. 1420</page>
the repeal or replacement of agency appeal procedures implementing Executive Order 12968 (<ref href="/us/fr/60/40245">60 Fed. Reg. 40245</ref>; relating to access to classified information), or any successor thereto, and Executive Order 10865 (<ref href="/us/fr/25/1583">25 Fed. Reg. 1583</ref>; relating to safeguarding classified information with industry), or any successor thereto, that meet the requirements of paragraph (7) of section 3001(b) of such Act, as added by this section.</content></subsection>
</section>
<section id="d396573e4723" identifier="/us/pl/113/126/tVI/s603" style="-uslm-lc:I658143"><num class="fontsize12" value="603">SEC. 603. </num><heading>REVISIONS OF OTHER LAWS.</heading><subsection class="firstIndent0 fontsize10" id="yc9e85e7e-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Inspector General Act of 1978</inline>.—</heading><chapeau>Section 8H of the Inspector General Act of 1978 (<ref href="/us/usc/t5/app">5 U.S.C. App.</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e85e7f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in subsection (b)—</chapeau><subparagraph class="fontsize10" id="yc9e85e80-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>(1)</quotedText>” after “<quotedText>(b)</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e85e81-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><paragraph class="indentDown2 firstIndent0 fontsize10" id="yc9e85e82-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e85e83-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><content>If the head of an establishment determines that a complaint or information transmitted under paragraph (1) would create a conflict of interest for the head of the establishment, the head of the establishment shall return the complaint or information to the Inspector General with that determination and the Inspector General shall make the transmission to the Director of National Intelligence and, if the establishment is within the Department of Defense, to the Secretary of Defense.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e85e84-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Applicability.</p></sidenote> In such a case, the requirements of this section for the head of the establishment apply to each recipient of the Inspector General’s transmission.”</content></paragraph>
</quotedContent>;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e85e85-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsection (h) as subsection (i); and</content></paragraph>
<paragraph class="fontsize10" id="yc9e85e86-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="insert">inserting</amendingAction> after subsection (g) the following:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="yc9e85e87-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="h">“(h) </num><content>An individual who has submitted a complaint or information to an Inspector General under this section may notify any member of the Permanent Select Committee on Intelligence of the House of Representatives or the Select Committee on Intelligence of the Senate, or a staff member of either such Committee, of the fact that such individual has made a submission to that particular Inspector General, and of the date on which such submission was made.”</content></subsection>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e85e88-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Central Intelligence Agency</inline>.—</heading><chapeau>Section 17(d)(5) of the Central Intelligence Agency Act of 1949 (<ref href="/us/usc/t50/s3517/d/5">50 U.S.C. 3517(d)(5)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e85e89-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in subparagraph (B)—</chapeau><subparagraph class="fontsize10" id="yc9e85e8a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>(i)</quotedText>” after “<quotedText>(B)</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e85e8b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="indentDown2 firstIndent0 fontsize10" id="yc9e8859c-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e8859d-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><content>If the Director determines that a complaint or information transmitted under paragraph (1) would create a conflict of interest for the Director, the Director shall return the complaint or information to the Inspector General with that determination and the Inspector General shall make the transmission to the Director of National Intelligence.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e8859e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Applicability.</p></sidenote> In such a case, the requirements of this subsection for the Director of the Central Intelligence Agency apply to the Director of National Intelligence”</content></subsection>
</quotedContent>; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e8859f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subparagraph class="indentDown1 firstIndent0 fontsize10" id="yc9e885a0-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">“(H) </num><content>An individual who has submitted a complaint or information to the Inspector General under this section may notify any member of the Permanent Select Committee on Intelligence of the House of Representatives or the Select Committee on Intelligence of the Senate, or a staff member of either such Committee, of the fact that such individual has made a submission to the Inspector General, and of the date on which such submission was made.”</content></subparagraph>
</quotedContent>.<page identifier="/us/stat/128/1421">128 STAT. 1421</page></content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e885a1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s603/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">National Security Act of 1947</inline>.—</heading><content>Section 103H(k)(5) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3033/k/5">50 U.S.C. 3033(k)(5)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subclause class="indentUp0 firstIndent0 fontsize10" id="yc9e885a2-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>An individual who has submitted a complaint or information to the Inspector General under this section may notify any member of either of the congressional intelligence committees, or a staff member of either of such committees, of the fact that such individual has made a submission to the Inspector General, and of the date on which such submission was made.”</content></subclause>
</quotedContent>.</content></subsection>
</section>
<section id="d396573e4905" identifier="/us/pl/113/126/tVI/s604" style="-uslm-lc:I658143"><num class="fontsize12" value="604">SEC. 604. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e885a3-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3234">50 USC 3234 note</ref>.</p></sidenote><heading>POLICIES AND PROCEDURES; NONAPPLICABILITY TO CERTAIN TERMINATIONS.</heading><subsection class="firstIndent0 fontsize10" id="yc9e921e4-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/a" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Covered Intelligence Community Element Defined</inline>.—</heading><chapeau>In this section, the term “<term>covered intelligence community element</term>”—</chapeau><paragraph class="fontsize10" id="yc9e921e5-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>means—</chapeau><subparagraph class="fontsize10" id="yc9e921e6-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the Central Intelligence Agency, the Defense Intelligence Agency, the National Geospatial-Intelligence Agency, the National Security Agency, the Office of the Director of National Intelligence, and the National Reconnaissance Office; and</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e921e7-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>any executive agency or unit thereof determined by the President under <ref href="/us/usc/t5/s2302/a/2/C/ii">section 2302(a)(2)(C)(ii) of title 5, United States Code</ref>, to have as its principal function the conduct of foreign intelligence or counterintelligence activities; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e921e8-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>does not include the Federal Bureau of Investigation.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e921e9-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e921ea-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Regulations</inline>.—</heading><content>In consultation with the Secretary of Defense, the Director of National Intelligence shall develop policies and procedures to ensure that a personnel action shall not be taken against an employee of a covered intelligence community element as a reprisal for any disclosure of information described in 1104 of the National Security Act of 1947, as added by section 601 of this Act.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e921eb-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Report on the Status of Implementation of Regulations</inline>.—</heading><content>Not later than 2 years after the date of the enactment of this Act, the Director of National Intelligence shall submit a report on the status of the implementation of the regulations promulgated under subsection (b) to the congressional intelligence committees.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e921ec-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Nonapplicability to Certain Terminations</inline>.—</heading><chapeau>Section 1104 of the National Security Act of 1947, as added by section 601 of this Act, and section 3001 of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341">50 U.S.C. 3341</ref>), as amended by section 602 of this Act, shall not apply if—</chapeau><paragraph class="fontsize10" id="yc9e921ed-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/d/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>the affected employee is concurrently terminated under—</chapeau><subparagraph class="fontsize10" id="yc9e921ee-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/d/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content><ref href="/us/usc/t10/s1609">section 1609 of title 10, United States Code</ref>;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e921ef-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/d/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the authority of the Director of National Intelligence under section 102A(m) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3024/m">50 U.S.C. 3024(m)</ref>), if the Director determines that the termination is in the interest of the United States;</content></subparagraph>
<subparagraph class="fontsize10" id="yc9e921f0-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/d/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>the authority of the Director of the Central Intelligence Agency under section 104A(e) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3036/e">50 U.S.C. 3036(e)</ref>), if the Director determines that the termination is in the interest of the United States; or<page identifier="/us/stat/128/1422">128 STAT. 1422</page></content></subparagraph>
<subparagraph class="fontsize10" id="yc9e921f1-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/d/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content><ref href="/us/usc/t5/s7532">section 7532 of title 5, United States Code</ref>, if the head of the agency determines that the termination is in the interest of the United States; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yc9e921f2-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVI/s604/d/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e921f3-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xc9e921f4-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Notification.</p></sidenote><content>not later than 30 days after such termination, the head of the agency that employed the affected employee notifies the congressional intelligence committees of the termination.</content></paragraph>
</subsection>
</section>
</title>
<title id="d396573e5034" identifier="/us/pl/113/126/tVII" style="-uslm-lc:I658178"><num value="VII">TITLE VII—</num><heading>TECHNICAL AMENDMENTS</heading>
<section id="d396573e5039" identifier="/us/pl/113/126/tVII/s701" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="701">SEC. 701. </num><heading>TECHNICAL AMENDMENTS TO THE CENTRAL INTELLIGENCE AGENCY ACT OF 1949.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e94905-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 21 of the Central Intelligence Agency Act of 1949 (<ref href="/us/usc/t50/s3521">50 U.S.C. 3521</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e94906-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s701/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in subsection (b)(1)(D), by <amendingAction type="delete">striking</amendingAction> “<quotedText>section (a)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsection (a)</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e94907-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s701/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in subsection (c)(2)(E), by <amendingAction type="delete">striking</amendingAction> “<quotedText>provider.</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>provider</quotedText>”.</content></paragraph>
</section>
<section id="d396573e5076" identifier="/us/pl/113/126/tVII/s702" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="702">SEC. 702. </num><heading>TECHNICAL AMENDMENTS TO THE NATIONAL SECURITY ACT OF 1947 RELATING TO THE PAST ELIMINATION OF CERTAIN POSITIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xc9e94908-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 101(a) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3021/a">50 U.S.C. 3021(a)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e94909-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s702/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in paragraph (5), by <amendingAction type="delete">striking</amendingAction> the semicolon and <amendingAction type="insert">inserting</amendingAction> “<quotedText>; and</quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="yc9e9490a-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s702/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="delete">striking</amendingAction> paragraphs (6) and (7);</content></paragraph>
<paragraph class="fontsize10" id="yc9e9490b-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s702/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraph (8) as paragraph (6); and</content></paragraph>
<paragraph class="fontsize10" id="yc9e9701c-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s702/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>in paragraph (6) (as so redesignated), by <amendingAction type="delete">striking</amendingAction> “<quotedText>the Chairman of the Munitions Board, and the Chairman of the Research and Development Board,</quotedText>”.</content></paragraph>
</section>
<section id="d396573e5128" identifier="/us/pl/113/126/tVII/s703" style="-uslm-lc:I658143"><num class="fontsize12" value="703">SEC. 703. </num><heading>TECHNICAL AMENDMENTS TO THE INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2013.</heading><subsection class="firstIndent0 fontsize10" id="yc9e9972d-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s703/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Amendments</inline>.—</heading><chapeau>Section 506 of the Intelligence Authorization Act for Fiscal Year 2013<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e9972e-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3126">50 USC 3126</ref>.</p></sidenote> (<ref href="/us/pl/112/277">Public Law 112–277</ref>; <ref href="/us/stat/126/2478">126 Stat. 2478</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yc9e9972f-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s703/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Section 606(5)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Paragraph (5) of section 605</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yc9e99730-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s703/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>, as redesignated by section 310(a)(4)(B) of this Act,</quotedText>” before “<quotedText>is amended</quotedText>”.<page identifier="/us/stat/128/1423">128 STAT. 1423</page></content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yc9e99731-e897-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/126/tVII/s703/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xc9e99732-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3126">50 USC 3126 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Effective Date</inline>.—</heading><content>The amendments made by subsection (a) shall take effect as if included in the enactment of the Intelligence Authorization Act for Fiscal Year 2013 (<ref href="/us/pl/112/277">Public Law 112–277</ref>).</content></subsection>
</section>
</title>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2014-07-07">July 7, 2014</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/113/s/1681">S. 1681</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/113/120">113–120</ref> (<committee>Select Comm. on Intelligence</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 160 (2014):</heading>
<p class="indentUp4 firstIndent-1" id="xc9e99733-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">June 11, considered and passed Senate.</p><p class="indentUp4 firstIndent-1" id="xc9e99734-e897-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">June 24, considered and passed House.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>