<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 113–293—DEC. 19, 2014?>


<?I97 128 STAT. ?>
<?I98 128 STAT. ?>
<?I99 128 STAT. ?>
<?I50 PUBLIC LAW 113–293—DEC. 19, 2014?>
<?I51 PUBLIC LAW 113–293—DEC. 19, 2014?>
<?I52 PUBLIC LAW 113–293—DEC. 19, 2014?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 113–293: To authorize appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>293</docNumber>
<citableAs>Public Law 113–293</citableAs><citableAs>128 Stat. 3990</citableAs>
<approvedDate>2014-12-19</approvedDate>
<dc:date>2014-12-19</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-03</processedDate>
<congress>113</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?3989</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 113–293—DEC. 19, 2014</centerRunningHead>
<coverTitle>INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 2015</coverTitle>
</note>
<page identifier="/us/stat/128/3990">128 STAT. 3990</page>
<dc:type>Public Law</dc:type><docNumber>113–293</docNumber>
<congress value="113">113th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To authorize appropriations for fiscal years 2014 and 2015 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes.<sidenote><p class="centered fontsize8" id="x3b8a233a-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2014-12-19">Dec. 19, 2014</approvedDate></p><p class="centered fontsize8" id="x3b8a233b-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/113/hr/4681">H.R. 4681</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8a233c-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Intelligence Authorization Act for Fiscal Year 2015.</p></sidenote>
<section id="d271317e98" identifier="/us/pl/113/293/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE; TABLE OF CONTENTS.</heading><subsection class="firstIndent0 fontsize10" id="y3b8a715d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/s1/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Short Title</inline>.—</heading><content>This Act may be cited as the “<shortTitle role="act">Intelligence Authorization Act for Fiscal Year 2015</shortTitle>”.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8a715e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/s1/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents</inline>.—</heading><content>The table of contents for this Act is as follows:<?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 1. </designator>
<label>Short title; table of contents.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 2. </designator>
<label>Definitions.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 3. </designator>
<label>Budgetary effects.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE I—</designator>
<label>INTELLIGENCE ACTIVITIES</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 101. </designator>
<label>Authorization of appropriations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 102. </designator>
<label>Classified Schedule of Authorizations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 103. </designator>
<label>Personnel ceiling adjustments.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 104. </designator>
<label>Intelligence Community Management Account.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE II—</designator>
<label>CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 201. </designator>
<label>Authorization of appropriations.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE III—</designator>
<label>GENERAL PROVISIONS</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>Subtitle A—</designator>
<label>General Matters</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 301. </designator>
<label>Increase in employee compensation and benefits authorized by law.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 302. </designator>
<label>Restriction on conduct of intelligence activities.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 303. </designator>
<label>National intelligence strategy.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 304. </designator>
<label>Software licensing.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 305. </designator>
<label>Reporting of certain employment activities by former intelligence officers and employees.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 306. </designator>
<label>Inclusion of Predominantly Black Institutions in intelligence officer training program.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 307. </designator>
<label>Management and oversight of financial intelligence.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 308. </designator>
<label>Analysis of private sector policies and procedures for countering insider threats.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 309. </designator>
<label>Procedures for the retention of incidentally acquired communications.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 310. </designator>
<label>Clarification of limitation of review to retaliatory security clearance or access determinations.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 311. </designator>
<label>Feasibility study on consolidating classified databases of cyber threat indicators and malware samples.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 312. </designator>
<label>Sense of Congress on cybersecurity threat and cybercrime cooperation with Ukraine.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 313. </designator>
<label>Replacement of locally employed staff serving at United States diplomatic facilities in the Russian Federation.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 314. </designator>
<label>Inclusion of Sensitive Compartmented Information Facilities in United States diplomatic facilities in the Russian Federation and adjacent countries.<page identifier="/us/stat/128/3991">128 STAT. 3991</page></label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>Subtitle B—</designator>
<label>Reporting</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 321. </designator>
<label>Report on declassification process.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 322. </designator>
<label>Report on intelligence community efficient spending targets.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 323. </designator>
<label>Annual report on violations of law or executive order.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 324. </designator>
<label>Annual report on intelligence activities of the Department of Homeland Security.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 325. </designator>
<label>Report on political prison camps in North Korea.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 326. </designator>
<label>Assessment of security of domestic oil refineries and related rail transportation infrastructure.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 327. </designator>
<label>Enhanced contractor level assessments for the intelligence community.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 328. </designator>
<label>Assessment of the efficacy of memoranda of understanding to facilitate intelligence-sharing.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 329. </designator>
<label>Report on foreign man-made electromagnetic pulse weapons.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 330. </designator>
<label>Report on United States counterterrorism strategy to disrupt, dismantle, and defeat al-Qaeda and its affiliated or associated groups.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 331. </designator>
<label>Feasibility study on retraining veterans in cybersecurity.</label>
</referenceItem></toc>
</content></subsection>
</section>
<section id="d271317e322" identifier="/us/pl/113/293/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8a715f-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3003">50 USC 3003</ref>.</p></sidenote><heading>DEFINITIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b8a9870-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  In this Act:</chapeau><paragraph class="fontsize10" id="y3b8a9871-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/s2/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Congressional intelligence committees</inline>.—</heading><chapeau>The term “<term>congressional intelligence committees</term>” means—</chapeau><subparagraph class="fontsize10" id="y3b8abf82-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/s2/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the Select Committee on Intelligence of the Senate; and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8abf83-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/s2/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the Permanent Select Committee on Intelligence of the House of Representatives.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b8abf84-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/s2/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Intelligence community</inline>.—</heading><content>The term “<term>intelligence community</term>” has the meaning given that term in section 3(4) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>).</content></paragraph>
</section>
<section id="d271317e366" identifier="/us/pl/113/293/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>BUDGETARY EFFECTS.</heading><content style="-uslm-lc:I658120">  The budgetary effects of this Act, for the purpose of complying with the Statutory Pay-As-You-Go-Act of 2010, shall be determined by reference to the latest statement titled “Budgetary Effects of PAYGO Legislation” for this Act, submitted for printing in the Congressional Record by the Chairman of the Senate Budget Committee, provided that such statement has been submitted prior to the vote on passage.</content></section>
<title id="d271317e374" identifier="/us/pl/113/293/tI" style="-uslm-lc:I658178"><num value="I">TITLE I—</num><heading>INTELLIGENCE ACTIVITIES</heading>
<section id="d271317e379" identifier="/us/pl/113/293/tI/s101" style="-uslm-lc:I658143"><num class="fontsize12" value="101">SEC. 101. </num><heading>AUTHORIZATION OF APPROPRIATIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b8b34b5-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Funds are hereby authorized to be appropriated for fiscal year 2015 for the conduct of the intelligence and intelligence-related activities of the following elements of the United States Government:</chapeau><paragraph class="fontsize10" id="y3b8b34b6-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The Office of the Director of National Intelligence.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34b7-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The Central Intelligence Agency.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34b8-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The Department of Defense.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34b9-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The Defense Intelligence Agency.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34ba-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>The National Security Agency.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34bb-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>The Department of the Army, the Department of the Navy, and the Department of the Air Force.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34bc-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>The Coast Guard.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34bd-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><content>The Department of State.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34be-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/9" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">(9) </num><content>The Department of the Treasury.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34bf-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/10" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="10">(10) </num><content>The Department of Energy.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34c0-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/11" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="11">(11) </num><content>The Department of Justice.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34c1-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/12" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="12">(12) </num><content>The Federal Bureau of Investigation.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34c2-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/13" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="13">(13) </num><content>The Drug Enforcement Administration.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34c3-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/14" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="14">(14) </num><content>The National Reconnaissance Office.<page identifier="/us/stat/128/3992">128 STAT. 3992</page></content></paragraph>
<paragraph class="fontsize10" id="y3b8b34c4-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/15" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="15">(15) </num><content>The National Geospatial-Intelligence Agency.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b34c5-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s101/16" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="16">(16) </num><content>The Department of Homeland Security.</content></paragraph>
</section>
<section id="d271317e471" identifier="/us/pl/113/293/tI/s102" style="-uslm-lc:I658143"><num class="fontsize12" value="102">SEC. 102. </num><heading>CLASSIFIED SCHEDULE OF AUTHORIZATIONS.</heading><subsection class="firstIndent0 fontsize10" id="y3b8b82e6-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Specifications of Amounts and Personnel Levels</inline>.—</heading><content>The amounts authorized to be appropriated under section 101 and, subject to section 103, the authorized personnel ceilings as of September 30, 2015, for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations prepared to accompany the bill H.R. 4681 of the One Hundred Thirteenth Congress.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8b82e7-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Availability of Classified Schedule of Authorizations</inline>.—</heading><paragraph class="fontsize10" id="y3b8b82e8-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Availability</inline>.—</heading><content>The classified Schedule of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b82e9-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Distribution by the president</inline>.—</heading><content>Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedule of Authorizations, or of appropriate portions of the Schedule, within the executive branch.</content></paragraph>
<paragraph class="fontsize10" id="y3b8b82ea-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8b82eb-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">President.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Limits on disclosure</inline>.—</heading><chapeau>The President shall not publicly disclose the classified Schedule of Authorizations or any portion of such Schedule except—</chapeau><subparagraph class="fontsize10" id="y3b8b82ec-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (<ref href="/us/usc/t50/s3306/a">50 U.S.C. 3306(a)</ref>);</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8b82ed-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>to the extent necessary to implement the budget; or</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8b82ee-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s102/b/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>as otherwise required by law.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section id="d271317e542" identifier="/us/pl/113/293/tI/s103" style="-uslm-lc:I658143"><num class="fontsize12" value="103">SEC. 103. </num><heading>PERSONNEL CEILING ADJUSTMENTS.</heading><subsection class="firstIndent0 fontsize10" id="y3b8ba9ff-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s103/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8bd110-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Authority for Increases</inline>.—</heading><content>The Director of National Intelligence may authorize employment of civilian personnel in excess of the number authorized for fiscal year 2015 by the classified Schedule of Authorizations referred to in section 102(a) if the Director of National Intelligence determines that such action is necessary to the performance of important intelligence functions, except that the number of personnel employed in excess of the number authorized under such section may not, for any element of the intelligence community, exceed 3 percent of the number of civilian personnel authorized under such Schedule for such element.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8bd111-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s103/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8bd112-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Guidelines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Treatment of Certain Personnel</inline>.—</heading><chapeau>The Director of National Intelligence shall establish guidelines that govern, for each element of the intelligence community, the treatment under the personnel levels authorized under section 102(a), including any exemption from such personnel levels, of employment or assignment in—</chapeau><paragraph class="fontsize10" id="y3b8bd113-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s103/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>a student program, trainee program, or similar program;</content></paragraph>
<paragraph class="fontsize10" id="y3b8bd114-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s103/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>a reserve corps or as a reemployed annuitant; or</content></paragraph>
<paragraph class="fontsize10" id="y3b8bd115-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s103/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>details, joint duty, or long term, full-time training.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8bd116-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s103/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Notice to Congressional Intelligence Committees</inline>.—</heading><content>The Director<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8bd117-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote> of National Intelligence shall notify the congressional intelligence committees in writing at least 15 days prior to each exercise of an authority described in subsection (a).<page identifier="/us/stat/128/3993">128 STAT. 3993</page></content></subsection>
</section>
<section id="d271317e602" identifier="/us/pl/113/293/tI/s104" style="-uslm-lc:I658143"><num class="fontsize12" value="104">SEC. 104. </num><heading>INTELLIGENCE COMMUNITY MANAGEMENT ACCOUNT.</heading><subsection class="firstIndent0 fontsize10" id="y3b8bf828-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s104/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of Appropriations</inline>.—</heading><content>There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2015 the sum of $507,400,000. Within such amount, funds identified in the classified Schedule of Authorizations referred to in section 102(a) for advanced research and development shall remain available until September 30, 2016.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8bf829-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s104/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Authorized Personnel Levels</inline>.—</heading><content>The elements within the Intelligence Community Management Account of the Director of National Intelligence are authorized 794 positions as of September 30, 2015. Personnel serving in such elements may be permanent employees of the Office of the Director of National Intelligence or personnel detailed from other elements of the United States Government.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8bf82a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s104/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Classified Authorizations</inline>.—</heading><paragraph class="fontsize10" id="y3b8bf82b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s104/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of appropriations</inline>.—</heading><content>In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Community Management Account for fiscal year 2015 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). Such additional amounts for advanced research and development shall remain available until September 30, 2016.</content></paragraph>
<paragraph class="fontsize10" id="y3b8bf82c-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tI/s104/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of personnel</inline>.—</heading><content>In addition to the personnel authorized by subsection (b) for elements of the Intelligence Community Management Account as of September 30, 2015, there are authorized such additional personnel for the Community Management Account as of that date as are specified in the classified Schedule of Authorizations referred to in section 102(a).</content></paragraph>
</subsection>
</section>
</title>
<title id="d271317e652" identifier="/us/pl/113/293/tII" style="-uslm-lc:I658178"><num value="II">TITLE II—</num><heading>CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM</heading>
<section id="d271317e657" identifier="/us/pl/113/293/tII/s201" style="-uslm-lc:I658143"><num class="fontsize12" value="201">SEC. 201. </num><heading>AUTHORIZATION OF APPROPRIATIONS.</heading><content style="-uslm-lc:I658120">  There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund for fiscal year 2015 the sum of $514,000,000.</content></section>
</title>
<title id="d271317e665" identifier="/us/pl/113/293/tIII" style="-uslm-lc:I658178"><num value="III">TITLE III—</num><heading>GENERAL PROVISIONS</heading>
<subtitle id="d271317e670" identifier="/us/pl/113/293/tIII/stA" style="-uslm-lc:I658178"><num value="A">Subtitle A—</num><heading>General Matters</heading>
<section id="d271317e675" identifier="/us/pl/113/293/tIII/stA/s301" style="-uslm-lc:I658143"><num class="fontsize12" value="301">SEC. 301. </num><heading>INCREASE IN EMPLOYEE COMPENSATION AND BENEFITS AUTHORIZED BY LAW.</heading><content style="-uslm-lc:I658120">  Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law.<page identifier="/us/stat/128/3994">128 STAT. 3994</page></content></section>
<section id="d271317e684" identifier="/us/pl/113/293/tIII/stA/s302" style="-uslm-lc:I658143"><num class="fontsize12" value="302">SEC. 302. </num><heading>RESTRICTION ON CONDUCT OF INTELLIGENCE ACTIVITIES.</heading><content style="-uslm-lc:I658120">  The authorization of appropriations by this Act shall not be deemed to constitute authority for the conduct of any intelligence activity which is not otherwise authorized by the Constitution or the laws of the United States.</content></section>
<section id="d271317e691" identifier="/us/pl/113/293/tIII/stA/s303" style="-uslm-lc:I658143"><num class="fontsize12" value="303">SEC. 303. </num><heading>NATIONAL INTELLIGENCE STRATEGY.</heading><subsection class="firstIndent0 fontsize10" id="y3b8c464d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s303/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Title I of the National Security Act of 1947 (<ref href="/us/usc/t50/s3021/etseq">50 U.S.C. 3021 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after section 108 the following:<quotedContent><section class="indentUp2 firstIndent-2" id="y3b8c946e-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="108A">“SEC. 108A. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8c946f-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3043a">50 USC 3043a</ref>.</p></sidenote><heading class="bold">NATIONAL INTELLIGENCE STRATEGY.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="y3b8c9470-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8c9471-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Effective date.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8c9472-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8c9473-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Time period.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Beginning in 2017, and once every 4 years thereafter, the Director of National Intelligence shall develop a comprehensive national intelligence strategy to meet national security objectives for the following 4-year period, or a longer period, if appropriate.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y3b8c9474-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Requirements</inline>.—</heading><chapeau>Each national intelligence strategy required by subsection (a) shall—</chapeau><paragraph class="fontsize10" id="y3b8c9475-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><chapeau>delineate a national intelligence strategy consistent with—</chapeau><subparagraph class="fontsize10" id="y3b8c9476-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>the most recent national security strategy report submitted pursuant to section 108;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8c9477-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>the strategic plans of other relevant departments and agencies of the United States; and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8c9478-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>other relevant national-level plans;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b8c9479-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>address matters related to national and military intelligence, including counterintelligence;</content></paragraph>
<paragraph class="fontsize10" id="y3b8cbb8a-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>identify the major national security missions that the intelligence community is currently pursuing and will pursue in the future to meet the anticipated security environment;</content></paragraph>
<paragraph class="fontsize10" id="y3b8cbb8b-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>describe how the intelligence community will utilize personnel, technology, partnerships, and other capabilities to pursue the major national security missions identified in paragraph (3);</content></paragraph>
<paragraph class="fontsize10" id="y3b8cbb8c-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><content>assess current, emerging, and future threats to the intelligence community, including threats from foreign intelligence and security services and insider threats;</content></paragraph>
<paragraph class="fontsize10" id="y3b8cbb8d-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><content>outline the organizational roles and missions of the elements of the intelligence community as part of an integrated enterprise to meet customer demands for intelligence products, services, and support;</content></paragraph>
<paragraph class="fontsize10" id="y3b8cbb8e-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><content>identify sources of strategic, institutional, programmatic, fiscal, and technological risk; and</content></paragraph>
<paragraph class="fontsize10" id="y3b8cbb8f-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">“(8) </num><content>analyze factors that may affect the intelligence community’s performance in pursuing the major national security missions identified in paragraph (3) during the following 10-year period.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y3b8cbb90-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8cbb91-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8cbb92-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Submission to Congress</inline>.—</heading><content>The Director of National Intelligence shall submit to the congressional intelligence committees a report on each national intelligence strategy required by subsection (a) not later than 45 days after the date of the completion of such strategy.”</content></subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8cbb93-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s303/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendments</inline>.—</heading><content>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction> <page identifier="/us/stat/128/3995">128 STAT. 3995</page>
by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 108 the following new item:<?GPOvSpace 04?>
<quotedContent><toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 108A. </designator>
<label>National intelligence strategy.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d271317e853" identifier="/us/pl/113/293/tIII/stA/s304" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="304">SEC. 304. </num><heading>SOFTWARE LICENSING.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b8ce2a4-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Section 109 of the National Security Act of 1947 (<ref href="/us/usc/t50/s3044">50 U.S.C. 3044</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y3b8ce2a5-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s304/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in subsection (a)(2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>usage; and</quotedText>” and <amendingAction type="insert">inserting</amendingAction> <quotedContent>“usage, including—<subparagraph class="fontsize10" id="y3b8d09b6-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>increasing the centralization of the management of software licenses;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8d09b7-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>increasing the regular tracking and maintaining of comprehensive inventories of software licenses using automated discovery and inventory tools and metrics;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8d09b8-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>analyzing software license data to inform investment decisions; and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8d09b9-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>providing appropriate personnel with sufficient software licenses management training; and”</content></subparagraph>
</quotedContent>;</content></paragraph>
<paragraph class="fontsize10" id="y3b8d09ba-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s304/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in subsection (b)—</chapeau><subparagraph class="fontsize10" id="y3b8d09bb-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s304/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>; and</quotedText>” and <amendingAction type="insert">inserting</amendingAction> a semicolon;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8d09bc-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s304/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in paragraph (2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>usage.</quotedText>” and <amendingAction type="insert">inserting</amendingAction> <quotedContent>“usage, including—<subparagraph class="indentUp0 fontsize10" id="y3b8d30cd-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>increasing the centralization of the management of software licenses;</content></subparagraph>
<subparagraph class="indentUp0 fontsize10" id="y3b8d30ce-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>increasing the regular tracking and maintaining of comprehensive inventories of software licenses using automated discovery and inventory tools and metrics;</content></subparagraph>
<subparagraph class="indentUp0 fontsize10" id="y3b8d30cf-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>analyzing software license data to inform investment decisions; and</content></subparagraph>
<subparagraph class="indentUp0 fontsize10" id="y3b8d30d0-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>providing appropriate personnel with sufficient software licenses management training; and”</content></subparagraph>
</quotedContent>; and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8d30d1-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s304/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentDown1 fontsize10" id="y3b8d30d2-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>based on the assessment required under paragraph (2), make such recommendations with respect to software procurement and usage to the Director of National Intelligence as the Chief Information Officer considers appropriate.”</content></paragraph>
</quotedContent>; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b8d30d3-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s304/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following new subsection:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="y3b8d30d4-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8d30d5-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8d30d6-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Guidelines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Implementation of Recommendations</inline>.—</heading><content>Not later than 180 days after the date on which the Director of National Intelligence receives recommendations from the Chief Information Officer of the Intelligence Community in accordance with subsection (b)(3), the Director of National Intelligence shall, to the extent practicable, issue guidelines for the intelligence community on software procurement and usage based on such recommendations.”</content></subsection>
</quotedContent>.</content></paragraph>
</section>
<section id="d271317e995" identifier="/us/pl/113/293/tIII/stA/s305" style="-uslm-lc:I658143"><num class="fontsize12" value="305">SEC. 305. </num><heading>REPORTING OF CERTAIN EMPLOYMENT ACTIVITIES BY FORMER INTELLIGENCE OFFICERS AND EMPLOYEES.</heading><subsection class="firstIndent0 fontsize10" id="y3b8da607-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Restriction</inline>.—</heading><content>Title III of the National Security Act of 1947 (<ref href="/us/usc/t50/s3071/etseq">50 U.S.C. 3071 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after section 303 the following new section:<quotedContent><section class="centered fontsize12" id="y3b8dcd18-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658143"><num class="fontsize12" value="304">“SEC. 304. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8dcd19-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3073a">50 USC 3073a</ref>.</p></sidenote><heading class="fontsize12">REPORTING OF CERTAIN EMPLOYMENT ACTIVITIES BY FORMER INTELLIGENCE OFFICERS AND EMPLOYEES.</heading><subsection class="firstIndent0 fontsize10" id="y3b8dcd1a-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8dcd1b-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Regulations.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>The head of each element of the intelligence community shall issue regulations requiring each employee of such element occupying a covered position to sign a written agreement <page identifier="/us/stat/128/3996">128 STAT. 3996</page>
requiring the regular reporting of covered employment to the head of such element.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8dcd1c-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Agreement Elements</inline>.—</heading><chapeau>The regulations required under subsection (a) shall provide that an agreement contain provisions requiring each employee occupying a covered position to, during the two-year period beginning on the date on which such employee ceases to occupy such covered position—</chapeau><paragraph class="fontsize10" id="y3b8dcd1d-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>report covered employment to the head of the element of the intelligence community that employed such employee in such covered position upon accepting such covered employment; and</content></paragraph>
<paragraph class="fontsize10" id="y3b8dcd1e-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>annually (or more frequently if the head of such element considers it appropriate) report covered employment to the head of such element.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8dcd1f-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="y3b8dcd20-e87d-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Covered employment</inline>.—</heading><content>The term ‘<term>covered employment</term>’ means direct employment by, representation of, or the provision of advice relating to national security to the government of a foreign country or any person whose activities are directly or indirectly supervised, directed, controlled, financed, or subsidized, in whole or in major part, by any government of a foreign country.</content></paragraph>
<paragraph class="fontsize10" id="y3b8df431-e87d-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Covered position</inline>.—</heading><content>The term ‘<term>covered position</term>’ means a position within an element of the intelligence community that, based on the level of access of a person occupying such position to information regarding sensitive intelligence sources or methods or other exceptionally sensitive matters, the head of such element determines should be subject to the requirements of this section.</content></paragraph>
<paragraph class="fontsize10" id="y3b8df432-e87d-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Government of a foreign country</inline>.—</heading><content>The term ‘<term>government of a foreign country</term>’ has the meaning given the term in section 1(e) of the Foreign Agents Registration Act of 1938 (<ref href="/us/usc/t22/s611/e">22 U.S.C. 611(e)</ref>).”</content></paragraph>
</subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8df433-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8df434-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Regulations and Certification</inline>.—</heading><paragraph class="fontsize10" id="y3b8df435-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Regulations</inline>.—</heading><content>Not later than 90 days after the date of the enactment of this Act, the head of each element of the intelligence community shall issue the regulations required under section 304 of the National Security Act of 1947, as added by subsection (a) of this section.</content></paragraph>
<paragraph class="fontsize10" id="y3b8df436-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Certification</inline>.—</heading><chapeau>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees—</chapeau><subparagraph class="fontsize10" id="y3b8df437-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>a certification that each head of an element of the intelligence community has prescribed the regulations required under section 304 of the National Security Act of 1947, as added by subsection (a) of this section; or</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8df438-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>if the Director is unable to submit the certification described under subparagraph (A), an explanation as to why the Director is unable to submit such certification, including a designation of which heads of an element of the intelligence community have prescribed the regulations required under such section 304 and which have not.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8df439-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendments</inline>.—</heading><chapeau>The table of contents in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction>—<page identifier="/us/stat/128/3997">128 STAT. 3997</page></chapeau><paragraph class="fontsize10" id="y3b8df43a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> the second item relating to section 302 (Under Secretaries and Assistant Secretaries) and the items relating to sections 304, 305, and 306; and</content></paragraph>
<paragraph class="fontsize10" id="y3b8df43b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s305/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 303 the following new item:<?GPOvSpace 04?>
<quotedContent><toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 304. </designator>
<label>Reporting of certain employment activities by former intelligence officers and employees.”.</label>
</referenceItem></toc>
</quotedContent></content></paragraph>
</subsection>
</section>
<section id="d271317e1190" identifier="/us/pl/113/293/tIII/stA/s306" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="306">SEC. 306. </num><heading>INCLUSION OF PREDOMINANTLY BLACK INSTITUTIONS IN INTELLIGENCE OFFICER TRAINING PROGRAM.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b8e1b4c-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Section 1024 of the National Security Act of 1947 (<ref href="/us/usc/t50/s3224">50 U.S.C. 3224</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y3b8e1b4d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s306/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in subsection (c)(1), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>and Predominantly Black Institutions</quotedText>” after “<quotedText>universities</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="y3b8e1b4e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s306/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in subsection (g)—</chapeau><subparagraph class="fontsize10" id="y3b8e1b4f-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s306/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraph (4) as paragraph (5); and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8e1b50-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s306/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="insert">inserting</amendingAction> after paragraph (3) the following new paragraph:<quotedContent><paragraph class="indentDown1 fontsize10" id="y3b8e1b51-e87d-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8e1b52-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Definition.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Predominantly black institution</inline>.—</heading><content>The term ‘<term>Predominantly Black Institution</term>’ has the meaning given the term in section 318 of the Higher education Act of 1965 (<ref href="/us/usc/t20/s1059e">20 U.S.C. 1059e</ref>).”</content></paragraph>
</quotedContent>.</content></subparagraph>
</paragraph>
</section>
<section id="d271317e1253" identifier="/us/pl/113/293/tIII/stA/s307" style="-uslm-lc:I658143"><num class="fontsize12" value="307">SEC. 307. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8e1b53-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p></sidenote><heading>MANAGEMENT AND OVERSIGHT OF FINANCIAL INTELLIGENCE.</heading><subsection class="firstIndent0 fontsize10" id="y3b8e4164-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s307/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Requirement for Plan</inline>.—</heading><content>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall prepare a plan for management of the elements of the intelligence community that carry out financial intelligence activities.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8e4165-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s307/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Contents of Plan</inline>.—</heading><content>The plan required by subsection (a) shall establish a governance framework, procedures for sharing and harmonizing the acquisition and use of financial analytic tools, standards for quality of analytic products, procedures for oversight and evaluation of resource allocations associated with the joint development of information sharing efforts and tools, and an education and training model for elements of the intelligence community that carry out financial intelligence activities.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8e4166-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s307/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Briefing to Congress</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall brief the congressional intelligence committees on the actions the Director proposes to implement the plan required by subsection (a).</content></subsection>
</section>
<section id="d271317e1288" identifier="/us/pl/113/293/tIII/stA/s308" style="-uslm-lc:I658143"><num class="fontsize12" value="308">SEC. 308. </num><heading>ANALYSIS OF PRIVATE SECTOR POLICIES AND PROCEDURES FOR COUNTERING INSIDER THREATS.</heading><subsection class="firstIndent0 fontsize10" id="y3b8e8f87-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s308/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8e8f88-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8e8f89-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Analysis</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the National Counterintelligence Executive, shall submit to the congressional intelligence committees an analysis of private sector policies and procedures for countering insider threats.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8e8f8a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s308/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Content</inline>.—</heading><chapeau>The analysis required by subsection (a) shall include—</chapeau><paragraph class="fontsize10" id="y3b8e8f8b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s308/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8e8f8c-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Review.</p></sidenote><content>a review of whether and how the intelligence community could utilize private sector hiring and human resources best <page identifier="/us/stat/128/3998">128 STAT. 3998</page>
practices to screen, vet, and validate the credentials, capabilities, and character of applicants for positions involving trusted access to sensitive information;</content></paragraph>
<paragraph class="fontsize10" id="y3b8e8f8d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s308/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>an analysis of private sector policies for holding supervisors and subordinates accountable for violations of established security protocols and whether the intelligence community should adopt similar policies for positions of trusted access to sensitive information;</content></paragraph>
<paragraph class="fontsize10" id="y3b8e8f8e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s308/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8e8f8f-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessment.</p></sidenote><content>an assessment of the feasibility and advisability of applying mandatory leave policies, similar to those endorsed by the Federal Deposit Insurance Corporation and the Securities and Exchange Commission to identify fraud in the financial services industry, to certain positions within the intelligence community; and</content></paragraph>
<paragraph class="fontsize10" id="y3b8e8f90-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s308/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8e8f91-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8e8f92-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>recommendations for how the intelligence community could utilize private sector risk indices, such as credit risk scores, to make determinations about employee access to sensitive information.</content></paragraph>
</subsection>
</section>
<section id="d271317e1351" identifier="/us/pl/113/293/tIII/stA/s309" style="-uslm-lc:I658143"><num class="fontsize12" value="309">SEC. 309. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8e8f93-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s1813">50 USC 1813</ref>.</p></sidenote><heading>PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED COMMUNICATIONS.</heading><subsection class="firstIndent0 fontsize10" id="y3b8f79f4-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="y3b8f79f5-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/a/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Covered communication</inline>.—</heading><content>The term “<term>covered communication</term>” means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage.</content></paragraph>
<paragraph class="fontsize10" id="y3b8f79f6-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/a/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Head of an element of the intelligence community</inline>.—</heading><chapeau>The term “<term>head of an element of the intelligence community</term>” means, as appropriate—</chapeau><subparagraph class="fontsize10" id="y3b8f79f7-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the head of an element of the intelligence community; or</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8f79f8-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the head of the department or agency containing such element.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b8f79f9-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/a/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">United states person</inline>.—</heading><content>The term “<term>United States person</term>” has the meaning given that term in section 101 of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801">50 U.S.C. 1801</ref>).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8f79fa-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Procedures for Covered Communications</inline>.—</heading><paragraph class="fontsize10" id="y3b8f79fb-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8f79fc-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Requirement to adopt</inline>.—</heading><content>Not later than 2 years after the date of the enactment of this Act each head of an element of the intelligence community shall adopt procedures approved by the Attorney General for such element that ensure compliance with the requirements of paragraph (3).</content></paragraph>
<paragraph class="fontsize10" id="y3b8f79fd-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Coordination and approval</inline>.—</heading><chapeau>The procedures required by paragraph (1) shall be—</chapeau><subparagraph class="fontsize10" id="y3b8f79fe-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>prepared in coordination with the Director of National Intelligence; and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8f79ff-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>approved by the Attorney General prior to issuance.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b8f7a00-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Procedures</inline>.—</heading><subparagraph class="fontsize10" id="y3b8f7a01-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><heading class="fontsize10"><inline class="smallCaps">Application</inline>.—</heading><content>The procedures required by paragraph (1) shall apply to any intelligence collection activity not otherwise authorized by court order (including an order or certification issued by a court established under subsection (a) or (b) of section 103 of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1803">50 U.S.C. 1803</ref>)), subpoena, or similar legal process that is reasonably anticipated to result in the acquisition of a covered communication to or from <page identifier="/us/stat/128/3999">128 STAT. 3999</page>
a United States person and shall permit the acquisition, retention, and dissemination of covered communications subject to the limitation in subparagraph (B).</content></subparagraph>
<subparagraph class="fontsize10" id="y3b8f7a02-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8f7a03-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Time period.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Limitation on retention</inline>.—</heading><chapeau>A covered communication shall not be retained in excess of 5 years, unless—</chapeau><clause class="fontsize10" id="y3b8f7a04-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>the communication has been affirmatively determined, in whole or in part, to constitute foreign intelligence or counterintelligence or is necessary to understand or assess foreign intelligence or counterintelligence;</content></clause>
<clause class="fontsize10" id="y3b8f7a05-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>the communication is reasonably believed to constitute evidence of a crime and is retained by a law enforcement agency;</content></clause>
<clause class="fontsize10" id="y3b8f7a06-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>the communication is enciphered or reasonably believed to have a secret meaning;</content></clause>
<clause class="fontsize10" id="y3b8f7a07-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>all parties to the communication are reasonably believed to be non-United States persons;</content></clause>
<clause class="fontsize10" id="y3b8f7a08-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8f7a09-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8f7a0a-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><content>retention is necessary to protect against an imminent threat to human life, in which case both the nature of the threat and the information to be retained shall be reported to the congressional intelligence committees not later than 30 days after the date such retention is extended under this clause;</content></clause>
<clause class="fontsize10" id="y3b8f7a0b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/vi" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">(vi) </num><content>retention is necessary for technical assurance or compliance purposes, including a court order or discovery obligation, in which case access to information retained for technical assurance or compliance purposes shall be reported to the congressional intelligence committees on an annual basis; or</content></clause>
<clause class="fontsize10" id="y3b8f7a0c-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/vii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vii">(vii) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8f7a0d-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Time period.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8f7a0e-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8f7a0f-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Certification.</p></sidenote><chapeau>retention for a period in excess of 5 years is approved by the head of the element of the intelligence community responsible for such retention, based on a determination that retention is necessary to protect the national security of the United States, in which case the head of such element shall provide to the congressional intelligence committees a written certification describing—</chapeau><subclause class="fontsize10" id="y3b8f7a10-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/vii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>the reasons extended retention is necessary to protect the national security of the United States;</content></subclause>
<subclause class="fontsize10" id="y3b8f7a11-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/vii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>the duration for which the head of the element is authorizing retention;</content></subclause>
<subclause class="fontsize10" id="y3b8f7a12-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/vii/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>the particular information to be retained; and</content></subclause>
<subclause class="fontsize10" id="y3b8f7a13-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s309/b/3/B/vii/IV" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="IV">(IV) </num><content>the measures the element of the intelligence community is taking to protect the privacy interests of United States persons or persons located inside the United States.</content></subclause>
</clause>
</subparagraph>
</paragraph>
</subsection>
</section>
<section id="d271317e1554" identifier="/us/pl/113/293/tIII/stA/s310" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="310">SEC. 310. </num><heading>CLARIFICATION OF LIMITATION OF REVIEW TO RETALIATORY SECURITY CLEARANCE OR ACCESS DETERMINATIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b8fa124-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Section 3001(b)(7) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341/b/7">50 U.S.C. 3341(b)(7)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y3b8fa125-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s310/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in the matter preceding subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>2014—</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>2014, and consistent with subsection (j)—</quotedText>”;<page identifier="/us/stat/128/4000">128 STAT. 4000</page></content></paragraph>
<paragraph class="fontsize10" id="y3b8fa126-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s310/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>to appeal a determination to suspend or revoke a security clearance or access to classified information</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>alleging reprisal for having made a protected disclosure (provided the individual does not disclose classified information or other information contrary to law) to appeal any action affecting an employee’s access to classified information</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="y3b8fa127-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s310/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>in subparagraph (B), by <amendingAction type="delete">striking</amendingAction> “<quotedText>information,</quotedText>” <amendingAction type="insert">inserting</amendingAction> “<quotedText>information following a protected disclosure,</quotedText>”.</content></paragraph>
</section>
<section id="d271317e1606" identifier="/us/pl/113/293/tIII/stA/s311" style="-uslm-lc:I658143"><num class="fontsize12" value="311">SEC. 311. </num><heading>FEASIBILITY STUDY ON CONSOLIDATING CLASSIFIED DATABASES OF CYBER THREAT INDICATORS AND MALWARE SAMPLES.</heading><subsection class="firstIndent0 fontsize10" id="y3b8fef48-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s311/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8fef49-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Homeland Security, the Director of the National Security Agency, the Director of the Central Intelligence Agency, and the Director of the Federal Bureau of Investigation, shall conduct a feasibility study on consolidating classified databases of cyber threat indicators and malware samples in the intelligence community.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8fef4a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s311/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b8fef4b-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Records.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b8fef4c-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessments.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>The feasibility study required by subsection (a) shall include the following:</chapeau><paragraph class="fontsize10" id="y3b8fef4d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s311/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>An inventory of classified databases of cyber threat indicators and malware samples in the intelligence community.</content></paragraph>
<paragraph class="fontsize10" id="y3b8fef4e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s311/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>An assessment of actions that could be carried out to consolidate such databases to achieve the greatest possible information sharing within the intelligence community and cost savings for the Federal Government.</content></paragraph>
<paragraph class="fontsize10" id="y3b8fef4f-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s311/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>An assessment of any impediments to such consolidation.</content></paragraph>
<paragraph class="fontsize10" id="y3b8fef50-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s311/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>An assessment of whether the Intelligence Community Information Technology Enterprise can support such consolidation.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b8fef51-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s311/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Report to Congress</inline>.—</heading><content>Not later than 30 days after the date on which the Director of National Intelligence completes the feasibility study required by subsection (a), the Director shall submit to the congressional intelligence committees a written report that summarizes the feasibility study, including the information required under subsection (b).</content></subsection>
</section>
<section id="d271317e1666" identifier="/us/pl/113/293/tIII/stA/s312" style="-uslm-lc:I658143"><num class="fontsize12" value="312">SEC. 312. </num><heading>SENSE OF CONGRESS ON CYBERSECURITY THREAT AND CYBERCRIME COOPERATION WITH UKRAINE.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b903d72-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  It is the sense of Congress that—</chapeau><paragraph class="fontsize10" id="y3b906483-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>cooperation between the intelligence and law enforcement agencies of the United States and Ukraine should be increased to improve cybersecurity policies between these two countries;</content></paragraph>
<paragraph class="fontsize10" id="y3b906484-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the United States should pursue improved extradition procedures among the Governments of the United States, Ukraine, and other countries from which cybercriminals target United States citizens and entities;</content></paragraph>
<paragraph class="fontsize10" id="y3b906485-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><chapeau>the President should—</chapeau><subparagraph class="fontsize10" id="y3b906486-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>initiate a round of formal United States-Ukraine bilateral talks on cybersecurity threat and cybercrime cooperation, with additional multilateral talks that include other law enforcement partners such as Europol and Interpol; and<page identifier="/us/stat/128/4001">128 STAT. 4001</page></content></subparagraph>
<subparagraph class="fontsize10" id="y3b906487-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>work to obtain a commitment from the Government of Ukraine to end cybercrime directed at persons outside Ukraine and to work with the United States and other allies to deter and convict known cybercriminals;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b906488-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>the President should establish a capacity building program with the Government of Ukraine, which could include—</chapeau><subparagraph class="fontsize10" id="y3b906489-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>a joint effort to improve cyber capacity building, including intelligence and law enforcement services in Ukraine;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b90648a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>sending United States law enforcement agents to aid law enforcement agencies in Ukraine in investigating cybercrimes; and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b90648b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/4/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>agreements to improve communications networks to enhance law enforcement cooperation, such as a hotline directly connecting law enforcement agencies in the United States and Ukraine; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b90648c-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s312/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>the President should establish and maintain an intelligence and law enforcement cooperation scorecard with metrics designed to measure the number of instances that intelligence and law enforcement agencies in the United States request assistance from intelligence and law enforcement agencies in Ukraine and the number and type of responses received to such requests.</content></paragraph>
</section>
<section id="d271317e1727" identifier="/us/pl/113/293/tIII/stA/s313" style="-uslm-lc:I658143"><num class="fontsize12" value="313">SEC. 313. </num><heading>REPLACEMENT OF LOCALLY EMPLOYED STAFF SERVING AT UNITED STATES DIPLOMATIC FACILITIES IN THE RUSSIAN FEDERATION.</heading><subsection class="firstIndent0 fontsize10" id="y3b90b2ad-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Employment Requirement</inline>.—</heading><paragraph class="fontsize10" id="y3b90b2ae-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b90b2af-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The Secretary of State shall ensure that, not later than one year after the date of the enactment of this Act, every supervisory position at a United States diplomatic facility in the Russian Federation shall be occupied by a citizen of the United States who has passed, and shall be subject to, a thorough background check.</content></paragraph>
<paragraph class="fontsize10" id="y3b90b2b0-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b90b2b1-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Notification.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Extension</inline>.—</heading><content>The Secretary of State may extend the deadline under paragraph (1) for up to one year by providing advance written notification and justification of such extension to the appropriate congressional committees.</content></paragraph>
<paragraph class="fontsize10" id="y3b90b2b2-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Progress report</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Secretary of State shall submit to the appropriate congressional committees a report on progress made toward meeting the employment requirement under paragraph (1).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b90b2b3-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Plan for Reduced Use of Locally Employed Staff</inline>.—</heading><content>Not later than 180<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b90b2b4-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b90b2b5-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote> days after the date of the enactment of this Act, the Secretary of State, in coordination with other appropriate government agencies, shall submit to the appropriate congressional committees a plan to further reduce the reliance on locally employed staff in United States diplomatic facilities in the Russian Federation. The<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b90b2b6-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Cost estimates.</p></sidenote> plan shall, at a minimum, include cost estimates, timelines, and numbers of employees to be replaced.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b90b2b7-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/c" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Appropriate Congressional Committees Defined</inline>.—</heading><chapeau>In this section, the term “<term>appropriate congressional committees</term>” means—</chapeau><paragraph class="fontsize10" id="y3b90b2b8-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the congressional intelligence committees;<page identifier="/us/stat/128/4002">128 STAT. 4002</page></content></paragraph>
<paragraph class="fontsize10" id="y3b90b2b9-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the Committee on Armed Services, the Committee on Foreign Relations, and the Committee on Appropriations of the Senate; and</content></paragraph>
<paragraph class="fontsize10" id="y3b90b2ba-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the Committee on Armed Services, the Committee on Foreign Affairs, and the Committee on Appropriations of the House of Representatives.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b90b2bb-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s313/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Rule of Construction</inline>.—</heading><content>Nothing in this section shall be construed to infringe on the power of the President, by and with the advice and consent of the Senate, to appoint ambassadors, other public ministers, and consuls.”</content></subsection>
</section>
<section id="d271317e1829" identifier="/us/pl/113/293/tIII/stA/s314" style="-uslm-lc:I658143"><num class="fontsize12" value="314">SEC. 314. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b90b2bc-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t22/s4865">22 USC 4865 note</ref>.</p></sidenote><heading>INCLUSION OF SENSITIVE COMPARTMENTED INFORMATION FACILITIES IN UNITED STATES DIPLOMATIC FACILITIES IN THE RUSSIAN FEDERATION AND ADJACENT COUNTRIES.</heading><subsection class="firstIndent0 fontsize10" id="y3b9100dd-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s314/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Sensitive Compartmented Information Facility Requirement</inline>.—</heading><content>Each United States diplomatic facility that, after the date of the enactment of this Act, is constructed in, or undergoes a construction upgrade in, the Russian Federation, any country that shares a land border with the Russian Federation, or any country that is a former member of the Soviet Union shall be constructed to include a Sensitive Compartmented Information Facility.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b9100de-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s314/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b9100df-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b9100e0-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">National Security Waiver</inline>.—</heading><content>The Secretary of State may waive the requirement under subsection (a) if the Secretary determines that such waiver is in the national security interest of the United States and submits a written justification to the appropriate congressional committees not later than 180 days before exercising such waiver.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b9100e1-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s314/c" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Appropriate Congressional Committees Defined</inline>.—</heading><chapeau>In this section, the term “<term>appropriate congressional committees</term>” means—</chapeau><paragraph class="fontsize10" id="y3b9100e2-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s314/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the congressional intelligence committees;</content></paragraph>
<paragraph class="fontsize10" id="y3b9100e3-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s314/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the Committee on Armed Services, the Committee on Foreign Relations, and the Committee on Appropriations of the Senate; and</content></paragraph>
<paragraph class="fontsize10" id="y3b9100e4-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stA/s314/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the Committee on Armed Services, the Committee on Foreign Affairs, and the Committee on Appropriations of the House of Representatives.</content></paragraph>
</subsection>
</section>
</subtitle>
<subtitle id="d271317e1887" identifier="/us/pl/113/293/tIII/stB" style="-uslm-lc:I658178"><num value="B">Subtitle B—</num><heading>Reporting</heading>
<section id="d271317e1892" identifier="/us/pl/113/293/tIII/stB/s321" style="-uslm-lc:I658143"><num class="fontsize12" value="321">SEC. 321. </num><heading>REPORT ON DECLASSIFICATION PROCESS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b9127f5-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Not later than December 31, 2016, the Director of National Intelligence shall submit to Congress a report describing—</chapeau><paragraph class="fontsize10" id="y3b9127f6-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s321/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>proposals to improve the declassification process throughout the intelligence community; and</content></paragraph>
<paragraph class="fontsize10" id="y3b9127f7-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s321/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>steps the intelligence community could take, or legislation that may be necessary, to enable the National Declassification Center to better accomplish the missions assigned to the Center by Executive Order No. 13526 (<ref href="/us/fr/75/707">75 Fed. Reg. 707</ref>).</content></paragraph>
</section>
<section id="d271317e1913" identifier="/us/pl/113/293/tIII/stB/s322" style="-uslm-lc:I658143"><num class="fontsize12" value="322">SEC. 322. </num><heading>REPORT ON INTELLIGENCE COMMUNITY EFFICIENT SPENDING TARGETS.</heading><subsection class="firstIndent0 fontsize10" id="y3b917618-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than April 1, 2016, and April 1, 2017, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the status and <page identifier="/us/stat/128/4003">128 STAT. 4003</page>
effectiveness of efforts to reduce administrative costs for the intelligence community during the preceding year.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b917619-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>Each report under subsection (a) shall include for each element of the intelligence community the following:</chapeau><paragraph class="fontsize10" id="y3b91761a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>A description of the status and effectiveness of efforts to devise alternatives to government travel and promote efficient travel spending, such as teleconferencing and video conferencing.</content></paragraph>
<paragraph class="fontsize10" id="y3b91761b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>A description of the status and effectiveness of efforts to limit costs related to hosting and attending conferences.</content></paragraph>
<paragraph class="fontsize10" id="y3b91761c-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>A description of the status and effectiveness of efforts to assess information technology inventories and usage, and establish controls, to reduce costs related to underutilized information technology equipment, software, or services.</content></paragraph>
<paragraph class="fontsize10" id="y3b91761d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>A description of the status and effectiveness of efforts to limit the publication and printing of hard copy documents.</content></paragraph>
<paragraph class="fontsize10" id="y3b91761e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>A description of the status and effectiveness of efforts to improve the performance of Federal fleet motor vehicles and limit executive transportation.</content></paragraph>
<paragraph class="fontsize10" id="y3b91761f-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>A description of the status and effectiveness of efforts to limit the purchase of extraneous promotional items, such as plaques, clothing, and commemorative items.</content></paragraph>
<paragraph class="fontsize10" id="y3b917620-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>A description of the status and effectiveness of efforts to consolidate and streamline workforce training programs to focus on the highest priority workforce and mission needs.</content></paragraph>
<paragraph class="fontsize10" id="y3b917621-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s322/b/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><content>Such other matters relating to efforts to reduce intelligence community administrative costs as the Director may specify for purposes of this section.</content></paragraph>
</subsection>
</section>
<section id="d271317e1981" identifier="/us/pl/113/293/tIII/stB/s323" style="-uslm-lc:I658143"><num class="fontsize12" value="323">SEC. 323. </num><heading>ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE ORDER.</heading><subsection class="firstIndent0 fontsize10" id="y3b91c442-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s323/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Title V of the National Security Act of 1947 (<ref href="/us/usc/t50/s3091/etseq">50 U.S.C. 3091 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><section class="centered fontsize12" id="y3b91eb53-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658143"><num class="fontsize12" value="511">“SEC. 511. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b91eb54-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s3110">50 USC 3110</ref>.</p></sidenote><heading class="fontsize12">ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE ORDER.</heading><subsection class="firstIndent0 fontsize10" id="y3b91eb55-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Annual Reports Required</inline>.—</heading><content>The Director of National Intelligence shall annually submit to the congressional intelligence committees a report on violations of law or executive order relating to intelligence activities by personnel of an element of the intelligence community that were identified during the previous calendar year.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b91eb56-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>Each report submitted under subsection (a) shall, consistent with the need to preserve ongoing criminal investigations, include a description of, and any action taken in response to, any violation of law or executive order (including Executive Order No. 12333 (<ref href="/us/usc/t50/s3001">50 U.S.C. 3001 note</ref>)) relating to intelligence activities committed by personnel of an element of the intelligence community in the course of the employment of such personnel that, during the previous calendar year, was—</chapeau><paragraph class="fontsize10" id="y3b91eb57-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>determined by the director, head, or general counsel of any element of the intelligence community to have occurred;</content></paragraph>
<paragraph class="fontsize10" id="y3b91eb58-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>referred to the Department of Justice for possible criminal prosecution; or</content></paragraph>
<paragraph class="fontsize10" id="y3b91eb59-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>substantiated by the inspector general of any element of the intelligence community.”</content></paragraph>
</subsection>
</section>
</quotedContent>.<page identifier="/us/stat/128/4004">128 STAT. 4004</page></content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b91eb5a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s323/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Initial Report</inline>.—</heading><content>The first report required under section 511 of the National Security Act of 1947, as added by subsection (a), shall be submitted not later than one year after the date of the enactment of this Act.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b91eb5b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s323/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Guidelines</inline>.—</heading><chapeau>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the head of each element of the intelligence community, shall—</chapeau><paragraph class="fontsize10" id="y3b91eb5c-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s323/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>issue guidelines to carry out section 511 of the National Security Act of 1947, as added by subsection (a); and</content></paragraph>
<paragraph class="fontsize10" id="y3b91eb5d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s323/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>submit such guidelines to the congressional intelligence committees.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b91eb5e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s323/d" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendment</inline>.—</heading><content>The table of sections in the first section of the National Security Act of 1947 <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> after the item relating to section 510 the following new item:<?GPOvSpace 04?>
<quotedContent><toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 511. </designator>
<label>Annual report on violations of law or executive order.”.<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b91eb5f-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s323/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Rule of Construction</inline>.—</heading><content>Nothing in this section or the amendments made by this section shall be construed to alter any requirement existing on the date of the enactment of this Act to submit a report under any provision of law.</content></subsection>
</section>
<section id="d271317e2123" identifier="/us/pl/113/293/tIII/stB/s324" style="-uslm-lc:I658143"><num class="fontsize12" value="324">SEC. 324. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b921270-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s125">6 USC 125</ref>.</p></sidenote><heading>ANNUAL REPORT ON INTELLIGENCE ACTIVITIES OF THE DEPARTMENT OF HOMELAND SECURITY.</heading><subsection class="firstIndent0 fontsize10" id="y3b926091-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>For each fiscal year and along with the budget materials submitted in support of the budget of the Department of Homeland Security pursuant to <ref href="/us/usc/t31/s1105/a">section 1105(a) of title 31, United States Code</ref>, the Under Secretary for Intelligence and Analysis of the Department shall submit to the congressional intelligence committees a report for such fiscal year on each intelligence activity of each intelligence component of the Department, as designated by the Under Secretary, that includes the following:</chapeau><paragraph class="fontsize10" id="y3b926092-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The amount of funding requested for each such intelligence activity.</content></paragraph>
<paragraph class="fontsize10" id="y3b926093-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The number of full-time employees funded to perform each such intelligence activity.</content></paragraph>
<paragraph class="fontsize10" id="y3b926094-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The number of full-time contractor employees (or the equivalent of full-time in the case of part-time contractor employees) funded to perform or in support of each such intelligence activity.</content></paragraph>
<paragraph class="fontsize10" id="y3b926095-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b926096-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote><content>A determination as to whether each such intelligence activity is predominantly in support of national intelligence or departmental missions.</content></paragraph>
<paragraph class="fontsize10" id="y3b926097-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><chapeau>The total number of analysts of the Intelligence Enterprise of the Department that perform—</chapeau><subparagraph class="fontsize10" id="y3b926098-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a/5/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>strategic analysis; or</content></subparagraph>
<subparagraph class="fontsize10" id="y3b926099-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/a/5/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>operational analysis.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b92609a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Feasibility and Advisability Report</inline>.—</heading><chapeau>Not later than 120 days after the date of the enactment of this Act, the Secretary of Homeland Security, acting through the Under Secretary for Intelligence and Analysis, shall submit to the congressional intelligence committees a report that—<page identifier="/us/stat/128/4005">128 STAT. 4005</page></chapeau><paragraph class="fontsize10" id="y3b92609b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>examines the feasibility and advisability of including the budget request for all intelligence activities of each intelligence component of the Department that predominantly support departmental missions, as designated by the Under Secretary for Intelligence and Analysis, in the Homeland Security Intelligence Program; and</content></paragraph>
<paragraph class="fontsize10" id="y3b9287ac-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b9287ad-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Plans.</p></sidenote><content>includes a plan to enhance the coordination of department-wide intelligence activities to achieve greater efficiencies in the performance of the Department of Homeland Security intelligence functions.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b9287ae-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s324/c" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b9287af-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Definition.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Intelligence Component of the Department</inline>.—</heading><content>In this section, the term “<term>intelligence component of the Department</term>” has the meaning given that term in section 2 of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s101">6 U.S.C. 101</ref>).</content></subsection>
</section>
<section id="d271317e2227" identifier="/us/pl/113/293/tIII/stB/s325" style="-uslm-lc:I658143"><num class="fontsize12" value="325">SEC. 325. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b9287b0-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Human rights.</p></sidenote><heading>REPORT ON POLITICAL PRISON CAMPS IN NORTH KOREA.</heading><subsection class="firstIndent0 fontsize10" id="y3b92d5d1-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b92d5d2-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>The Director of National Intelligence, in consultation with the Secretary of State, shall submit to the congressional intelligence committees, the Committee on Foreign Relations of the Senate, and the Committee on Foreign Affairs of the House of Representatives a report on political prison camps in North Korea.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b92d5d3-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>The report required by subsection (a) shall—</chapeau><paragraph class="fontsize10" id="y3b92fce4-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>describe the actions the United States is taking to support implementation of the recommendations of the United Nations Commission of Inquiry on Human Rights in the Democratic People’s Republic of Korea, including the eventual establishment of a tribunal to hold individuals accountable for abuses; and</content></paragraph>
<paragraph class="fontsize10" id="y3b92fce5-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>include, with respect to each political prison camp in North Korea to the extent information is available—</chapeau><subparagraph class="fontsize10" id="y3b92fce6-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the estimated prisoner population of each such camp;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b92fce7-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the geographical coordinates of each such camp;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b92fce8-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>the reasons for confinement of the prisoners at each such camp;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b92fce9-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>a description of the primary industries and products made at each such camp, and the end users of any goods produced in such camp;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b92fcea-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>information regarding involvement of any non-North Korean entity or individual involved in the operations of each such camp, including as an end user or source of any good or products used in, or produced by, in such camp;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b92fceb-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>information identifying individuals and agencies responsible for conditions in each such camp at all levels of the Government of North Korea;</content></subparagraph>
<subparagraph class="fontsize10" id="y3b92fcec-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><content>a description of the conditions under which prisoners are confined, with respect to the adequacy of food, shelter, medical care, working conditions, and reports of ill-treatment of prisoners, at each such camp; and</content></subparagraph>
<subparagraph class="fontsize10" id="y3b92fced-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/b/2/H" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">(H) </num><content>unclassified imagery, including satellite imagery, of each such camp.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b92fcee-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s325/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Form</inline>.—</heading><content>The report required by subsection (a) shall be submitted in an unclassified form and may include a classified annex if necessary.<page identifier="/us/stat/128/4006">128 STAT. 4006</page></content></subsection>
</section>
<section id="d271317e2319" identifier="/us/pl/113/293/tIII/stB/s326" style="-uslm-lc:I658143"><num class="fontsize12" value="326">SEC. 326. </num><heading>ASSESSMENT OF SECURITY OF DOMESTIC OIL REFINERIES AND RELATED RAIL TRANSPORTATION INFRASTRUCTURE.</heading><subsection class="firstIndent0 fontsize10" id="y3b9323ff-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s326/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Assessment</inline>.—</heading><content>The Under Secretary of Homeland Security for Intelligence and Analysis shall conduct an intelligence assessment of the security of domestic oil refineries and related rail transportation infrastructure.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b932400-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s326/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b932401-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Submission</inline>.—</heading><chapeau>Not later than 180 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis shall submit to the congressional intelligence committees—</chapeau><paragraph class="fontsize10" id="y3b932402-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s326/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the results of the assessment required under subsection (a); and</content></paragraph>
<paragraph class="fontsize10" id="y3b932403-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s326/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b932404-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x3b932405-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>any recommendations with respect to intelligence sharing or intelligence collection to improve the security of domestic oil refineries and related rail transportation infrastructure to protect the communities surrounding such refineries or such infrastructure from potential harm that the Under Secretary considers appropriate.</content></paragraph>
</subsection>
</section>
<section id="d271317e2360" identifier="/us/pl/113/293/tIII/stB/s327" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="327">SEC. 327. </num><heading>ENHANCED CONTRACTOR LEVEL ASSESSMENTS FOR THE INTELLIGENCE COMMUNITY.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b934b16-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Section 506B(c) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3098/c">50 U.S.C. 3098(c)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y3b934b17-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s327/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in paragraph (11), by <amendingAction type="delete">striking</amendingAction> “<quotedText>or contracted</quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="y3b934b18-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s327/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraph (12) as paragraph (13); and</content></paragraph>
<paragraph class="fontsize10" id="y3b934b19-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s327/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="insert">inserting</amendingAction> after paragraph (11) the following:<quotedContent><paragraph class="indentUp0 fontsize10" id="y3b934b1a-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="12">“(12) </num><content>The best estimate of the number of intelligence collectors and analysts contracted by each element of the intelligence community and a description of the functions performed by such contractors.”</content></paragraph>
</quotedContent>.</content></paragraph>
</section>
<section id="d271317e2407" identifier="/us/pl/113/293/tIII/stB/s328" style="-uslm-lc:I658143"><num class="fontsize12" value="328">SEC. 328. </num><heading>ASSESSMENT OF THE EFFICACY OF MEMORANDA OF UNDERSTANDING TO FACILITATE INTELLIGENCE-SHARING.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x3b93722b-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Not<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b93722c-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x3b93722d-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote> later than 90 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis, in consultation with the Director of the Federal Bureau of Investigation and the Program Manager of the Information Sharing Environment, shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, the Committee on Homeland Security of the House of Representatives, the Committee on the Judiciary of the Senate, and the Committee on the Judiciary of the House of Representatives an assessment of the efficacy of the memoranda of understanding signed between Federal, State, local, tribal, and territorial agencies to facilitate intelligence-sharing within and separate from the Joint Terrorism Task Force. Such assessment shall include—</chapeau><paragraph class="fontsize10" id="y3b93722e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s328/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>any language within such memoranda of understanding that prohibited or may be construed to prohibit intelligence-sharing between Federal, State, local, tribal, and territorial agencies; and</content></paragraph>
<paragraph class="fontsize10" id="y3b93722f-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s328/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b937230-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x3b937231-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>any recommendations for memoranda of understanding to better facilitate intelligence-sharing between Federal, State, local, tribal, and territorial agencies.<page identifier="/us/stat/128/4007">128 STAT. 4007</page></content></paragraph>
</section>
<section id="d271317e2438" identifier="/us/pl/113/293/tIII/stB/s329" style="-uslm-lc:I658143"><num class="fontsize12" value="329">SEC. 329. </num><heading>REPORT ON FOREIGN MAN-MADE ELECTROMAGNETIC PULSE WEAPONS.</heading><subsection class="firstIndent0 fontsize10" id="y3b939942-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s329/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Armed Services of the Senate, and the Committee on Armed Services of the House of Representatives a report on the threat posed by man-made electromagnetic pulse weapons to United States interests through 2025, including threats from foreign countries and foreign non-State actors.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y3b939943-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s329/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Form</inline>.—</heading><content>The report required under subsection (a) shall be submitted in unclassified form, but may include a classified annex.</content></subsection>
</section>
<section id="d271317e2461" identifier="/us/pl/113/293/tIII/stB/s330" style="-uslm-lc:I658143"><num class="fontsize12" value="330">SEC. 330. </num><heading>REPORT ON UNITED STATES COUNTERTERRORISM STRATEGY TO DISRUPT, DISMANTLE, AND DEFEAT AL-QAEDA AND ITS AFFILIATED OR ASSOCIATED GROUPS.</heading><subsection class="firstIndent0 fontsize10" id="y3b943584-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><paragraph class="fontsize10" id="y3b943585-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a comprehensive report on the United States counterterrorism strategy to disrupt, dismantle, and defeat al-Qaeda and its affiliated or associated groups.</content></paragraph>
<paragraph class="fontsize10" id="y3b945c96-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Coordination</inline>.—</heading><content>The report required by paragraph (1) shall be prepared in coordination with the Secretary of State, the Secretary of the Treasury, the Attorney General, and the Secretary of Defense, and the head of any other department or agency of the United States Government that has responsibility for activities directed at combating al-Qaeda and its affiliated or associated groups.</content></paragraph>
<paragraph class="fontsize10" id="y3b945c97-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b945c98-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessments.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>The report required by paragraph (1) shall include the following:</chapeau><subparagraph class="fontsize10" id="y3b945c99-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>A definition of—</chapeau><clause class="fontsize10" id="y3b945c9a-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>al-Qaeda core, including a list of which known individuals constitute al-Qaeda core;</content></clause>
<clause class="fontsize10" id="y3b945c9b-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>an affiliated group of al-Qaeda, including a list of which known groups constitute an affiliate group of al-Qaeda;</content></clause>
<clause class="fontsize10" id="y3b945c9c-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>an associated group of al-Qaeda, including a list of which known groups constitute an associated group of al-Qaeda; and</content></clause>
<clause class="fontsize10" id="y3b945c9d-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/A/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>a group aligned with al-Qaeda, including a description of what actions a group takes or statements it makes that qualify it as a group aligned with al-Qaeda.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y3b945c9e-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b945c9f-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Lists.</p></sidenote><content>A list of any other group, including the organization that calls itself the Islamic State (also known as “ISIS” or “ISIL”), that adheres to the core mission of al-Qaeda, or who espouses the same violent jihad ideology as al-Qaeda.</content></subparagraph>
<subparagraph class="fontsize10" id="y3b945ca0-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>An assessment of the relationship between al-Qaeda core and the groups referred to in subparagraph (B).</content></subparagraph>
<subparagraph class="fontsize10" id="y3b945ca1-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>An assessment of the strengthening or weakening of al-Qaeda and the groups referred to in subparagraph (B) from January 1, 2010, to the present, including a <page identifier="/us/stat/128/4008">128 STAT. 4008</page>
description of the metrics that are used to assess strengthening or weakening and an assessment of the relative increase or decrease in violent attacks attributed to such entities.</content></subparagraph>
<subparagraph class="fontsize10" id="y3b945ca2-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>An assessment of whether or not an individual can be a member of al-Qaeda core if such individual is not located in Afghanistan or Pakistan.</content></subparagraph>
<subparagraph class="fontsize10" id="y3b945ca3-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>An assessment of whether or not an individual can be a member of al-Qaeda core as well as a member of a group referred to in subparagraph (B).</content></subparagraph>
<subparagraph class="fontsize10" id="y3b945ca4-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><content>A definition of defeat of core al-Qaeda.</content></subparagraph>
<subparagraph class="fontsize10" id="y3b945ca5-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/H" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">(H) </num><content>An assessment of the extent or coordination, command, and control between core al-Qaeda and the groups referred to in subparagraph (B), specifically addressing each such group.</content></subparagraph>
<subparagraph class="fontsize10" id="y3b945ca6-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/3/I" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>An assessment of the effectiveness of counterterrorism operations against core al-Qaeda and the groups referred to in subparagraph (B), and whether such operations have had a sustained impact on the capabilities and effectiveness of core al-Qaeda and such groups.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y3b945ca7-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Form</inline>.—</heading><content>The report required by paragraph (1) shall be submitted in unclassified form, but may include a classified annex.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y3b945ca8-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/b" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Appropriate Committees of Congress Defined</inline>.—</heading><chapeau>In this section, the term “<term>appropriate committees of Congress</term>” means—</chapeau><paragraph class="fontsize10" id="y3b945ca9-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the congressional intelligence committees;</content></paragraph>
<paragraph class="fontsize10" id="y3b945caa-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the Committee on Foreign Relations and the Committee on Armed Services of the Senate; and</content></paragraph>
<paragraph class="fontsize10" id="y3b945cab-e87d-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/293/tIII/stB/s330/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the Committee on Foreign Affairs and the Committee on Armed Services of the House of Representatives.</content></paragraph>
</subsection>
</section>
<section id="d271317e2611" identifier="/us/pl/113/293/tIII/stB/s331" style="-uslm-lc:I658143"><num class="fontsize12" value="331">SEC. 331. </num><heading>FEASIBILITY STUDY ON RETRAINING VETERANS IN CYBERSECURITY.</heading><content style="-uslm-lc:I658120">  Not<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x3b945cac-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote> later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Defense, the Secretary of Veterans Affairs, and the Secretary of Homeland Security, shall submit to Congress a feasibility study on retraining veterans and retired members of elements of the intelligence community in cybersecurity.</content></section>
</subtitle>
</title>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2014-12-19">December 19, 2014</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/113/hr/4681">H.R. 4681</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/113/463">113–463</ref> (<committee>Permanent Select Comm. on Intelligence</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 160 (2014):</heading>
<p class="indentUp4 firstIndent-1" id="x3b945cad-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">May 30, considered and passed House.</p><p class="indentUp4 firstIndent-1" id="x3b945cae-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 9, considered and passed Senate, amended.</p><p class="indentUp4 firstIndent-1" id="x3b945caf-e87d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 10, House concurred in Senate amendment.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>