<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 132 STAT. ?>
<?I98 132 STAT. ?>
<?I99 132 STAT. ?>
<?I50 PUBLIC LAW 115–118—JAN. 19, 2018?>
<?I51 PUBLIC LAW 115–118—JAN. 19, 2018?>
<?I52 PUBLIC LAW 115–118—JAN. 19, 2018?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 115–118: To amend the Foreign Intelligence Surveillance Act of 1978 to improve foreign intelligence collection and the safeguards, accountability, and oversight of acquisitions of foreign intelligence, to extend title VII of such Act, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>118</docNumber>
<citableAs>Public Law 115–118</citableAs><citableAs>132 Stat. 3</citableAs>
<approvedDate>2018-01-19</approvedDate>
<dc:date>2018-01-19</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>115</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 115–118—JAN. 19, 2018</centerRunningHead>
<page identifier="/us/stat/132/3">132 STAT. 3</page>
<dc:type>Public Law</dc:type><docNumber>115–118</docNumber>
<congress value="115">115th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To amend the Foreign Intelligence Surveillance Act of 1978 to improve foreign intelligence collection and the safeguards, accountability, and oversight of acquisitions of foreign intelligence, to extend title VII of such Act, and for other purposes.<sidenote><p class="centered fontsize8" id="xe8e188c0-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2018-01-19">Jan. 19, 2018</approvedDate></p><p class="centered fontsize8" id="xe8e188c1-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/115/s/139">S. 139</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e188c2-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">FISA Amendments Reauthorization Act of 2017.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8e188c3-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s1801">50 USC 1801 note</ref>.</p></sidenote>
<section id="d182181e92" identifier="/us/pl/115/118/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE; TABLE OF CONTENTS.</heading><subsection class="firstIndent0 fontsize10" id="ye8e1d6e4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/s1/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Short Title</inline>.—</heading><content>This Act may be cited as the “<shortTitle role="act">FISA Amendments Reauthorization Act of 2017</shortTitle>”.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="ye8e1d6e5-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/s1/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents</inline>.—</heading><content>The table of contents for this Act is as follows:<?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 1. </designator>
<label>Short title; table of contents.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 2. </designator>
<label>Amendments to the Foreign Intelligence Surveillance Act of 1978.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE I—</designator>
<label>ENHANCEMENTS TO FOREIGN INTELLIGENCE COLLECTION AND SAFEGUARDS, ACCOUNTABILITY, AND OVERSIGHT</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 101. </designator>
<label>Querying procedures required.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 102. </designator>
<label>Use and disclosure provisions.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 103. </designator>
<label>Congressional review and oversight of abouts collection.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 104. </designator>
<label>Publication of minimization procedures under section 702.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 105. </designator>
<label>Section 705 emergency provision.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 106. </designator>
<label>Compensation of amici curiae and technical experts.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 107. </designator>
<label>Additional reporting requirements.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 108. </designator>
<label>Improvements to Privacy and Civil Liberties Oversight Board.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 109. </designator>
<label>Privacy and civil liberties officers.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 110. </designator>
<label>Whistleblower protections for contractors of the intelligence community.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 111. </designator>
<label>Briefing on notification requirements.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 112. </designator>
<label>Inspector General report on queries conducted by Federal Bureau of Investigation.</label>
</referenceItem><referenceItem role="title" style="-uslm-lc:I658274">
<designator>TITLE II—</designator>
<label>EXTENSION OF AUTHORITIES, INCREASED PENALTIES, REPORTS, AND OTHER MATTERS</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 201. </designator>
<label>Extension of title VII of FISA; effective dates.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 202. </designator>
<label>Increased penalty for unauthorized removal and retention of classified documents or material.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 203. </designator>
<label>Report on challenges to the effectiveness of foreign intelligence surveillance.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 204. </designator>
<label>Comptroller General study on the classification system and protection of classified information.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 205. </designator>
<label>Technical amendments and amendments to improve procedures of the Foreign Intelligence Surveillance Court of Review.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>Sec. 206. </designator>
<label>Severability.</label>
</referenceItem></toc>
</content></subsection>
</section>
<section id="d182181e235" identifier="/us/pl/115/118/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>AMENDMENTS TO THE FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978.</heading><content style="-uslm-lc:I658120">  Except as otherwise expressly provided, whenever in this Act an amendment or repeal is expressed in terms of an amendment to, or a repeal of, a section or other provision, the reference shall be considered to be made to a section or other provision of the <page identifier="/us/stat/132/4">132 STAT. 4</page>
Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801/etseq">50 U.S.C. 1801 et seq.</ref>).</content></section>
<title id="d182181e248" identifier="/us/pl/115/118/tI" style="-uslm-lc:I658178"><num value="I">TITLE I—</num><heading>ENHANCEMENTS TO FOREIGN INTELLIGENCE COLLECTION AND SAFEGUARDS, ACCOUNTABILITY, AND OVERSIGHT</heading>
<section id="d182181e253" identifier="/us/pl/115/118/tI/s101" style="-uslm-lc:I658143"><num class="fontsize12" value="101">SEC. 101. </num><heading>QUERYING PROCEDURES REQUIRED.</heading><subsection class="firstIndent0 fontsize10" id="ye8e420d6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Querying Procedures</inline>.—</heading><paragraph class="fontsize10" id="ye8e420d7-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/a/1" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Section 702 (<ref href="/us/usc/t50/s1881a">50 U.S.C. 1881a</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><subparagraph class="fontsize10" id="ye8e420d8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsections (f) through (l) as subsections (g) through (m), respectively; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e420d9-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="insert">inserting</amendingAction> after subsection (e) the following new subsection:<quotedContent><subsection class="indentDown2 firstIndent0 fontsize10" id="ye8e4960a-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">“(f) </num><heading class="fontsize10"><inline class="smallCaps">Queries</inline>.—</heading><paragraph class="fontsize10" id="ye8e4960b-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e4960c-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultations.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Procedures required</inline>.—</heading><subparagraph class="fontsize10" id="ye8e4960d-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">Requirement to adopt</inline>.—</heading><content>The Attorney General, in consultation with the Director of National Intelligence, shall adopt querying procedures consistent with the requirements of the <ref href="/us/cons/amd4">fourth amendment to the Constitution of the United States</ref> for information collected pursuant to an authorization under subsection (a).</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4960e-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Record of united states person query terms</inline>.—</heading><content>The Attorney General, in consultation with the Director of National Intelligence, shall ensure that the procedures adopted under subparagraph (A) include a technical procedure whereby a record is kept of each United States person query term used for a query.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4960f-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Judicial review</inline>.—</heading><content>The procedures adopted in accordance with subparagraph (A) shall be subject to judicial review pursuant to subsection (j).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e49610-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Access to results of certain queries conducted by fbi</inline>.—</heading><subparagraph class="fontsize10" id="ye8e49611-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">Court order required for fbi review of certain query results in criminal investigations unrelated to national security</inline>.—</heading><chapeau>Except as provided by subparagraph (E), in connection with a predicated criminal investigation opened by the Federal Bureau of Investigation that does not relate to the national security of the United States, the Federal Bureau of Investigation may not access the contents of communications acquired under subsection (a) that were retrieved pursuant to a query made using a United States person query term that was not designed to find and extract foreign intelligence information unless—</chapeau><clause class="fontsize10" id="ye8e49612-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the Federal Bureau of Investigation applies for an order of the Court under subparagraph (C); and</content></clause>
<clause class="fontsize10" id="ye8e49613-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>the Court enters an order under subparagraph (D) approving such application.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e49614-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Jurisdiction</inline>.—</heading><content>The Court shall have jurisdiction to review an application and to enter an order approving the access described in subparagraph (A).<page identifier="/us/stat/132/5">132 STAT. 5</page></content></subparagraph>
<subparagraph class="fontsize10" id="ye8e49615-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Application</inline>.—</heading><chapeau>Each application for an order under this paragraph shall be made by a Federal officer in writing upon oath or affirmation to a judge having jurisdiction under subparagraph (B). Each application shall require the approval of the Attorney General based upon the finding of the Attorney General that the application satisfies the criteria and requirements of such application, as set forth in this paragraph, and shall include—</chapeau><clause class="fontsize10" id="ye8e49616-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the identity of the Federal officer making the application; and</content></clause>
<clause class="fontsize10" id="ye8e49617-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><chapeau>an affidavit or other information containing a statement of the facts and circumstances relied upon by the applicant to justify the belief of the applicant that the contents of communications described in subparagraph (A) covered by the application would provide evidence of—</chapeau><subclause class="fontsize10" id="ye8e49618-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>criminal activity;</content></subclause>
<subclause class="fontsize10" id="ye8e49619-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>contraband, fruits of a crime, or other items illegally possessed by a third party; or</content></subclause>
<subclause class="fontsize10" id="ye8e4961a-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">“(III) </num><content>property designed for use, intended for use, or used in committing a crime.</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e4961b-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e4961c-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Courts.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Order</inline>.—</heading><content>Upon an application made pursuant to subparagraph (C), the Court shall enter an order approving the accessing of the contents of communications described in subparagraph (A) covered by the application if the Court finds probable cause to believe that such contents would provide any of the evidence described in subparagraph (C)(ii).</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4961d-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><heading class="fontsize10"><inline class="smallCaps">Exception</inline>.—</heading><content>The requirement for an order of the Court under subparagraph (A) to access the contents of communications described in such subparagraph shall not apply with respect to a query if the Federal Bureau of Investigation determines there is a reasonable belief that such contents could assist in mitigating or eliminating a threat to life or serious bodily harm.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd2e-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">“(F) </num><heading class="fontsize10"><inline class="smallCaps">Rule of construction</inline>.—</heading><chapeau>Nothing in this paragraph may be construed as—</chapeau><clause class="fontsize10" id="ye8e4bd2f-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>limiting the authority of the Federal Bureau of Investigation to conduct lawful queries of information acquired under subsection (a);</content></clause>
<clause class="fontsize10" id="ye8e4bd30-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>limiting the authority of the Federal Bureau of Investigation to review, without a court order, the results of any query of information acquired under subsection (a) that was reasonably designed to find and extract foreign intelligence information, regardless of whether such foreign intelligence information could also be considered evidence of a crime; or</content></clause>
<clause class="fontsize10" id="ye8e4bd31-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>prohibiting or otherwise limiting the ability of the Federal Bureau of Investigation to access the results of queries conducted when evaluating whether to open an assessment or predicated investigation relating to the national security of the United States.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e4bd32-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this subsection:</chapeau><subparagraph class="fontsize10" id="ye8e4bd33-e839-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>The term ‘<term>contents</term>’ has the meaning given that term in <ref href="/us/usc/t18/s2510/8">section 2510(8) of title 18, United States Code</ref>.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd34-e839-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>The term ‘<term>query</term>’ means the use of one or more terms to retrieve the unminimized contents or noncontents <page identifier="/us/stat/132/6">132 STAT. 6</page>
located in electronic and data storage systems of communications of or concerning United States persons obtained through acquisitions authorized under subsection (a).”</content></subparagraph>
</paragraph>
</subsection>
</quotedContent>.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e4bd35-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e4bd36-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Certifications.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Application</inline>.—</heading><content>Subsection (f) of section 702 of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881a">50 U.S.C. 1881a</ref>), as added by paragraph (1), shall apply with respect to certifications submitted under subsection (h) of such section to the Foreign Intelligence Surveillance Court after January 1, 2018.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8e4bd37-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Conforming Amendments</inline>.—</heading><paragraph class="fontsize10" id="ye8e4bd38-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Amendments to section 702 of fisa</inline>.—</heading><chapeau>Such section 702 is further amended—</chapeau><subparagraph class="fontsize10" id="ye8e4bd39-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/A" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in subsection (a), by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (i)(3)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (j)(3)</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd3a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in subsection (c)—</chapeau><clause class="fontsize10" id="ye8e4bd3b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B/i" role="instruction" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in paragraph (1)(B), by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (g)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (h)</quotedText>”;</content></clause>
<clause class="fontsize10" id="ye8e4bd3c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B/ii" role="instruction" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in paragraph (2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>to subsection (i)(3)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>to subsection (j)(3)</quotedText>”; and</content></clause>
<clause class="fontsize10" id="ye8e4bd3d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><chapeau>in paragraph (3)—</chapeau><subclause class="fontsize10" id="ye8e4bd3e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B/iii/I" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (g)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (h)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd3f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B/iii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><chapeau>in subparagraph (B)—</chapeau><item class="fontsize10" id="ye8e4bd40-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B/iii/II/aa" role="instruction" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>to subsection (i)(1)(C)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>to subsection (j)(1)(C)</quotedText>”; and</content></item>
<item class="fontsize10" id="ye8e4bd41-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/B/iii/II/bb" role="instruction" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>under subsection (i)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>under subsection (j)</quotedText>”;</content></item>
</subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd42-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/C" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>in subsection (d)(2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>to subsection (i)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>to subsection (j)</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd43-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/D" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>in subsection (e)(2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>to subsection (i)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>to subsection (j)</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd44-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><chapeau>in subsection (h), as redesignated by subsection (a)(1)—</chapeau><clause class="fontsize10" id="ye8e4bd45-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/E/i" role="instruction" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in paragraph (2)(A)(iii), by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (f)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (g)</quotedText>”;</content></clause>
<clause class="fontsize10" id="ye8e4bd46-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/E/ii" role="instruction" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in paragraph (3), by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (i)(1)(C)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (j)(1)(C)</quotedText>”; and</content></clause>
<clause class="fontsize10" id="ye8e4bd47-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/E/iii" role="instruction" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>in paragraph (6), by <amendingAction type="delete">striking</amendingAction> “<quotedText>to subsection (i)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>to subsection (j)</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd48-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><chapeau>in subsection (j), as redesignated by subsection (a)(1)—</chapeau><clause class="fontsize10" id="ye8e4bd49-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in paragraph (1)—</chapeau><subclause class="fontsize10" id="ye8e4bd4a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/i/I" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>targeting and minimization procedures adopted in accordance with subsections (d) and (e)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>targeting, minimization, and querying procedures adopted in accordance with subsections (d), (e), and (f)(1)</quotedText>”;</content></subclause>
<subclause class="fontsize10" id="ye8e4bd4b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/i/II" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in subparagraph (B), by <amendingAction type="delete">striking</amendingAction> “<quotedText>targeting and minimization procedures adopted in accordance with subsections (d) and (e)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>targeting, minimization, and querying procedures adopted in accordance with subsections (d), (e), and (f)(1)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd4c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/i/III" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>in subparagraph (C), by <amendingAction type="delete">striking</amendingAction> “<quotedText>targeting and minimization procedures adopted in accordance with subsections (d) and (e)</quotedText>” and <page identifier="/us/stat/132/7">132 STAT. 7</page>
<amendingAction type="insert">inserting</amendingAction> “<quotedText>targeting, minimization, and querying procedures adopted in accordance with subsections (d), (e), and (f)(1)</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="ye8e4bd4d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in paragraph (2)—</chapeau><subclause class="fontsize10" id="ye8e4bd4e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/ii/I" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (g)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (h)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd4f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/ii/II" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subparagraph class="indentDown2 fontsize10" id="ye8e4bd50-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><heading class="fontsize10"><inline class="smallCaps">Querying procedures</inline>.—</heading><content>The querying procedures adopted in accordance with subsection (f)(1) to assess whether such procedures comply with the requirements of such subsection.”</content></subparagraph>
</quotedContent>;</content></subclause>
</clause>
<clause class="fontsize10" id="ye8e4bd51-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><chapeau>in paragraph (3)—</chapeau><subclause class="fontsize10" id="ye8e4bd52-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><chapeau>in subparagraph (A)—</chapeau><item class="fontsize10" id="ye8e4bd53-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iii/I/aa" role="instruction" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (g)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (h)</quotedText>”; and</content></item>
<item class="fontsize10" id="ye8e4bd54-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iii/I/bb" role="instruction" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>targeting and minimization procedures adopted in accordance with subsections (d) and (e)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>targeting, minimization, and querying procedures adopted in accordance with subsections (d), (e), and (f)(1)</quotedText>”; and</content></item>
</subclause>
<subclause class="fontsize10" id="ye8e4bd55-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><chapeau>in subparagraph (B), in the matter before clause (i)—</chapeau><item class="fontsize10" id="ye8e4bd56-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iii/II/aa" role="instruction" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (g)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (h)</quotedText>”; and</content></item>
<item class="fontsize10" id="ye8e4bd57-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iii/II/bb" role="instruction" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsections (d) and (e)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsections (d), (e), and (f)(1)</quotedText>”; and</content></item>
</subclause>
</clause>
<clause class="fontsize10" id="ye8e4bd58-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><chapeau>in paragraph (5)(A)—</chapeau><subclause class="fontsize10" id="ye8e4bd59-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iv/I" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (g)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (h)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd5a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/F/iv/II" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsections (d) and (e)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsections (d), (e), and (f)(1)</quotedText>”; and</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd5b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><chapeau>in subsection (m), as redesignated by subsection (a)(1)—</chapeau><clause class="fontsize10" id="ye8e4bd5c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/G/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in paragraph (1), in the matter before subparagraph (A)—</chapeau><subclause class="fontsize10" id="ye8e4bd5d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/G/i/I" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>targeting and minimization procedures adopted in accordance with subsections (d) and (e)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>targeting, minimization, and querying procedures adopted in accordance with subsections (d), (e), and (f)(1)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd5e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/G/i/II" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (f)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (g)</quotedText>”; and</content></subclause>
</clause>
<clause class="fontsize10" id="ye8e4bd5f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/G/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in paragraph (2)(A)—</chapeau><subclause class="fontsize10" id="ye8e4bd60-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/G/ii/I" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>targeting and minimization procedures adopted in accordance with subsections (d) and (e)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>targeting, minimization, and querying procedures adopted in accordance with subsections (d), (e), and (f)(1)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd61-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/1/G/ii/II" role="instruction" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>with subsection (f)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>with subsection (g)</quotedText>”.</content></subclause>
</clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e4bd62-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Amendments to fisa</inline>.—</heading><chapeau>The Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801/etseq">50 U.S.C. 1801 et seq.</ref>) is further amended—<page identifier="/us/stat/132/8">132 STAT. 8</page></chapeau><subparagraph class="fontsize10" id="ye8e4bd63-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/2/A" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 702(h)</quotedText>” each place it appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 702(i)</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd64-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/2/B" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 702(g)</quotedText>” each place it appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 702(h)</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd65-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/2/C" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>in section 707(b)(1)(G)(ii), by <amendingAction type="delete">striking</amendingAction> “<quotedText>subsections (d), (e), and (f)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsections (d), (e), (f)(1), and (g)</quotedText>”.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e4bd66-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Amendments to fisa amendments act of 2008</inline>.—</heading><chapeau>Section 404 of the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 (<ref href="/us/pl/110/261">Public Law 110–261</ref>; <ref href="/us/usc/t50/s1801">50 U.S.C. 1801 note</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><subparagraph class="fontsize10" id="ye8e4bd67-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>in subsection (a)(7)(B)—</chapeau><clause class="fontsize10" id="ye8e4bd68-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>under section 702(i)(3)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>under section 702(j)(3)</quotedText>”; and</content></clause>
<clause class="fontsize10" id="ye8e4bd69-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>of section 702(i)(4)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>of section 702(j)(4)</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e4bd6a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in subsection (b)—</chapeau><clause class="fontsize10" id="ye8e4bd6b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in paragraph (3)—</chapeau><subclause class="fontsize10" id="ye8e4bd6c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>to section 702(h)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>to section 702(i)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd6d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><chapeau>in subparagraph (B)—</chapeau><item class="fontsize10" id="ye8e4bd6e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/i/II/aa" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 702(h)(3) of</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 702(i)(3) of</quotedText>”; and</content></item>
<item class="fontsize10" id="ye8e4bd6f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/i/II/bb" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>to section 702(h)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>to section 702(i)</quotedText>”; and</content></item>
</subclause>
</clause>
<clause class="fontsize10" id="ye8e4bd70-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in paragraph (4)—</chapeau><subclause class="fontsize10" id="ye8e4bd71-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and sections 702(l)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>and sections 702(m)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="ye8e4bd72-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s101/b/3/B/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in subparagraph (B)(iv), by <amendingAction type="delete">striking</amendingAction> “<quotedText>or section 702(l)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>or section 702(m)</quotedText>”.</content></subclause>
</clause>
</subparagraph>
</paragraph>
</subsection>
</section>
<section id="d182181e1104" identifier="/us/pl/115/118/tI/s102" style="-uslm-lc:I658143"><num class="fontsize12" value="102">SEC. 102. </num><heading>USE AND DISCLOSURE PROVISIONS.</heading><subsection class="firstIndent0 fontsize10" id="ye8e5a7d3-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">End Use Restriction</inline>.—</heading><chapeau>Section 706(a) (<ref href="/us/usc/t50/s1881e/a">50 U.S.C. 1881e(a)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8e5a7d4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Information acquired</quotedText>” and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><paragraph class="indentUp0 fontsize10" id="ye8e5a7d5-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Information acquired”</content></paragraph>
</quotedContent>; and</content></paragraph>
<paragraph class="fontsize10" id="ye8e5a7d6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><paragraph class="indentUp0 fontsize10" id="ye8e5f5f7-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">United states persons</inline>.—</heading><subparagraph class="fontsize10" id="ye8e5f5f8-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Any information concerning a United States person acquired under section 702 shall not be used in evidence against that United States person pursuant to paragraph (1) in any criminal proceeding unless—</chapeau><clause class="fontsize10" id="ye8e5f5f9-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the Federal Bureau of Investigation obtained an order of the Foreign Intelligence Surveillance Court to access such information pursuant to section 702(f)(2); or</content></clause>
<clause class="fontsize10" id="ye8e5f5fa-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e5f5fb-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote><chapeau>the Attorney General determines that—</chapeau><subclause class="fontsize10" id="ye8e5f5fc-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>the criminal proceeding affects, involves, or is related to the national security of the United States; or</content></subclause>
<subclause class="fontsize10" id="ye8e5f5fd-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><chapeau>the criminal proceeding involves—</chapeau><item class="fontsize10" id="ye8e5f5fe-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">“(aa) </num><content>death;</content></item>
<item class="fontsize10" id="ye8e5f5ff-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">“(bb) </num><content>kidnapping;<page identifier="/us/stat/132/9">132 STAT. 9</page></content></item>
<item class="fontsize10" id="ye8e5f600-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="cc">“(cc) </num><content>serious bodily injury, as defined in <ref href="/us/usc/t18/s1365">section 1365 of title 18, United States Code</ref>;</content></item>
<item class="fontsize10" id="ye8e5f601-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="dd">“(dd) </num><content>conduct that constitutes a criminal offense that is a specified offense against a minor, as defined in section 111 of the Adam Walsh Child Protection and Safety Act of 2006 (<ref href="/us/usc/t34/s20911">34 U.S.C. 20911</ref>);</content></item>
<item class="fontsize10" id="ye8e5f602-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="ee">“(ee) </num><content>incapacitation or destruction of critical infrastructure, as defined in section 1016(e) of the USA PATRIOT Act (<ref href="/us/usc/t42/s5195c/e">42 U.S.C. 5195c(e)</ref>);</content></item>
<item class="fontsize10" id="ye8e5f603-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="ff">“(ff) </num><content>cybersecurity, including conduct described in section 1016(e) of the USA PATRIOT Act (<ref href="/us/usc/t42/s5195c/e">42 U.S.C. 5195c(e)</ref>) or section 1029, 1030, or 2511 of <ref href="/us/usc/t18">title 18, United States Code</ref>;</content></item>
<item class="fontsize10" id="ye8e5f604-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="gg">“(gg) </num><content>transnational crime, including transnational narcotics trafficking and transnational organized crime; or</content></item>
<item class="fontsize10" id="ye8e5f605-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="hh">“(hh) </num><content>human trafficking.</content></item>
</subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e5f606-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">No judicial review</inline>.—</heading><content>A determination by the Attorney General under subparagraph (A)(ii) is not subject to judicial review.”</content></subparagraph>
</paragraph>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8e5f607-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Intelligence Community Disclosure Provision</inline>.—</heading><chapeau>Section 603 (<ref href="/us/usc/t50/s1873">50 U.S.C. 1873</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8e5f608-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in subsection (b)—</chapeau><subparagraph class="fontsize10" id="ye8e5f609-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>good faith estimate of the number of targets of such orders;</quotedText>” and <amendingAction type="insert">inserting</amendingAction> the following: <quotedContent>“good faith estimate of—<subparagraph class="indentUp0 fontsize10" id="ye8e5f60a-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>the number of targets of such orders;</content></subparagraph>
<subparagraph class="indentUp0 fontsize10" id="ye8e5f60b-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>the number of targets of such orders who are known to not be United States persons; and</content></subparagraph>
<subparagraph class="indentUp0 fontsize10" id="ye8e5f60c-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>the number of targets of such orders who are known to be United States persons;”</content></subparagraph>
</quotedContent>;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e5f60d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in paragraph (2)—</chapeau><clause class="fontsize10" id="ye8e5f60e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in the matter preceding subparagraph (A), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>, including pursuant to subsection (f)(2) of such section,</quotedText>” after “<quotedText>section 702</quotedText>”;</content></clause>
<clause class="fontsize10" id="ye8e5f60f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subparagraphs (A) and (B) as subparagraphs (B) and (C), respectively;</content></clause>
<clause class="fontsize10" id="ye8e5f610-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/B/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>by <amendingAction type="insert">inserting</amendingAction> before subparagraph (B), as so redesignated, the following:<quotedContent><subparagraph class="indentDown1 fontsize10" id="ye8e61d21-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>the number of targets of such orders;”</content></subparagraph>
</quotedContent>;</content></clause>
<clause class="fontsize10" id="ye8e61d22-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/B/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>in subparagraph (B), as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” at the end; and</content></clause>
<clause class="fontsize10" id="ye8e61d23-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/B/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subparagraph class="indentDown1 fontsize10" id="ye8e61d24-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>the number of instances in which the Federal Bureau of Investigation opened, under the Criminal Investigative Division or any successor division, an investigation of a United States person (who is not considered a threat to national security) based wholly or in part on an acquisition authorized under such section;”</content></subparagraph>
</quotedContent>;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e61d25-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>in paragraph (3)(A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>orders; and</quotedText>” and <amendingAction type="insert">inserting</amendingAction> the following: <quotedContent>“orders, including—<clause class="fontsize10" id="ye8e61d26-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the number of targets of such orders who are known to not be United States persons; and<page identifier="/us/stat/132/10">132 STAT. 10</page></content></clause>
<clause class="fontsize10" id="ye8e61d27-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>the number of targets of such orders who are known to be United States persons; and”</content></clause>
</quotedContent>;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e61d28-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraphs (4), (5), and (6) as paragraphs (5), (6), and (7), respectively; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e61d29-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/1/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>by <amendingAction type="insert">inserting</amendingAction> after paragraph (3) the following:<quotedContent><paragraph class="indentDown1 fontsize10" id="ye8e61d2a-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>the number of criminal proceedings in which the United States or a State or political subdivision thereof provided notice pursuant to subsection (c) or (d) of section 106 (including with respect to information acquired from an acquisition conducted under section 702) or subsection (d) or (e) of section 305 of the intent of the government to enter into evidence or otherwise use or disclose any information obtained or derived from electronic surveillance, physical search, or an acquisition conducted pursuant to this Act;”</content></paragraph>
</quotedContent>; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e61d2b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in subsection (d)—</chapeau><subparagraph class="fontsize10" id="ye8e61d2c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>(4), or (5)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>(5), or (6)</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e61d2d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in paragraph (2)(A)—</chapeau><clause class="fontsize10" id="ye8e61d2e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/2/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Paragraphs (2)(A), (2)(B), and (5)(C)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Paragraphs (2)(B), (2)(C), and (6)(C)</quotedText>”; and</content></clause>
<clause class="fontsize10" id="ye8e6443f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/2/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="insert">inserting</amendingAction> before the period at the end the following: “<quotedText>, except with respect to information required under paragraph (2) relating to orders issued under section 702(f)(2)</quotedText>”; and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8e64440-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s102/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>in paragraph (3)(A), in the matter preceding clause (i), by <amendingAction type="delete">striking</amendingAction> “<quotedText>subsection (b)(2)(B)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subsection (b)(2)(C)</quotedText>”.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section id="d182181e1494" identifier="/us/pl/115/118/tI/s103" style="-uslm-lc:I658143"><num class="fontsize12" value="103">SEC. 103. </num><heading>CONGRESSIONAL REVIEW AND OVERSIGHT OF ABOUTS COLLECTION.</heading><subsection class="firstIndent0 fontsize10" id="ye8e755b1-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Section 702(b) (<ref href="/us/usc/t50/s1881a/b">50 U.S.C. 1881a(b)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8e755b2-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in paragraph (4), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” at the end;</content></paragraph>
<paragraph class="fontsize10" id="ye8e755b3-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraph (5) as paragraph (6); and</content></paragraph>
<paragraph class="fontsize10" id="ye8e755b4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="insert">inserting</amendingAction> after paragraph (4) the following:<quotedContent><paragraph class="indentUp0 fontsize10" id="ye8e755b5-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><content>may not intentionally acquire communications that contain a reference to, but are not to or from, a target of an acquisition authorized under subsection (a), except as provided under section 103(b) of the FISA Amendments Reauthorization Act of 2017; and”</content></paragraph>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8e755b6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e755b7-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s1881a">50 USC 1881a note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Congressional Review and Oversight of Abouts Collection</inline>.—</heading><paragraph class="fontsize10" id="ye8e755b8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this subsection:</chapeau><subparagraph class="fontsize10" id="ye8e755b9-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/1/A" role="definitions" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>The term “<term>abouts communication</term>” means a communication that contains a reference to, but is not to or from, a target of an acquisition authorized under section 702(a) of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881a/a">50 U.S.C. 1881a(a)</ref>).</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755ba-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/1/B" role="definitions" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>The term “<term>material breach</term>” means significant noncompliance with applicable law or an order of the Foreign Intelligence Surveillance Court concerning any acquisition of abouts communications.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e755bb-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Submission to congress</inline>.—</heading><subparagraph class="fontsize10" id="ye8e755bc-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e755bd-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Notice.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Requirement</inline>.—</heading><content>Notwithstanding any other provision of law, and except as provided in paragraph (4), if <page identifier="/us/stat/132/11">132 STAT. 11</page>
the Attorney General and the Director of National Intelligence intend to implement the authorization of the intentional acquisition of abouts communications, before the first such implementation after the date of enactment of this Act, the Attorney General and the Director of National Intelligence shall submit to the Committee on the Judiciary and the Select Committee on Intelligence of the Senate and the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives a written notice of the intent to implement the authorization of such an acquisition, and any supporting materials in accordance with this subsection.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755be-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e755bf-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Effective date.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8e755c0-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Hearings.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8e755c1-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Briefings.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Congressional review period</inline>.—</heading><content>During the 30-day period beginning on the date written notice is submitted under subparagraph (A), the Committee on the Judiciary and the Select Committee on Intelligence of the Senate and the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives shall, as appropriate, hold hearings and briefings and otherwise obtain information in order to fully review the written notice.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755c2-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e755c3-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Limitation on action during congressional review period</inline>.—</heading><content>Notwithstanding any other provision of law, and subject to paragraph (4), unless the Attorney General and the Director of National Intelligence make a determination pursuant to section 702(c)(2) of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881a/c/2">50 U.S.C. 1881a(c)(2)</ref>), the Attorney General and the Director of National Intelligence may not implement the authorization of the intentional acquisition of abouts communications before the end of the period described in subparagraph (B).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e755c4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e755c5-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Records.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Written notice</inline>.—</heading><chapeau>Written notice under paragraph (2)(A) shall include the following:</chapeau><subparagraph class="fontsize10" id="ye8e755c6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e755c7-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Certification.</p></sidenote><content>A copy of any certification submitted to the Foreign Intelligence Surveillance Court pursuant to section 702 of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881a">50 U.S.C. 1881a</ref>), or amendment thereto, authorizing the intentional acquisition of abouts communications, including all affidavits, procedures, exhibits, and attachments submitted therewith.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755c8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>The decision, order, or opinion of the Foreign Intelligence Surveillance Court approving such certification, and any pleadings, applications, or memoranda of law associated with such decision, order, or opinion.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755c9-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>A summary of the protections in place to detect any material breach.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755ca-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/3/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>Data or other results of modeling, simulation, or auditing of sample data demonstrating that any acquisition method involving the intentional acquisition of abouts communications shall be conducted in accordance with title VII of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881/etseq">50 U.S.C. 1881 et seq.</ref>), if such data or other results exist at the time the written notice is submitted and were provided to the Foreign Intelligence Surveillance Court.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755cb-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/3/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>Except as provided under paragraph (4), a statement that no acquisition authorized under subsection (a) <page identifier="/us/stat/132/12">132 STAT. 12</page>
of such section 702 shall include the intentional acquisition of an abouts communication until after the end of the 30-day period described in paragraph (2)(B).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e755cc-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Exception for emergency acquisition</inline>.—</heading><subparagraph class="fontsize10" id="ye8e755cd-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e755ce-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Notice of determination</inline>.—</heading><content>If the Attorney General and the Director of National Intelligence make a determination pursuant to section 702(c)(2) of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881a/c/2">50 U.S.C. 1881a(c)(2)</ref>) with respect to the intentional acquisition of abouts communications, the Attorney General and the Director of National Intelligence shall notify the Committee on the Judiciary and the Select Committee on Intelligence of the Senate and the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives as soon as practicable, but not later than 7 days after the determination is made.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e755cf-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><heading class="fontsize10"><inline class="smallCaps">Implementation or continuation</inline>.—</heading><clause class="fontsize10" id="ye8e755d0-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/4/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e77ce1-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Certification.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8e77ce2-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>If the Foreign Intelligence Surveillance Court approves a certification that authorizes the intentional acquisition of abouts communications before the end of the 30-day period described in paragraph (2)(B), the Attorney General and the Director of National Intelligence may authorize the immediate implementation or continuation of that certification if the Attorney General and the Director of National Intelligence jointly determine that exigent circumstances exist such that without such immediate implementation or continuation intelligence important to the national security of the United States may be lost or not timely acquired.</content></clause>
<clause class="fontsize10" id="ye8e77ce3-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/4/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e77ce4-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8e77ce5-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Notice</inline>.—</heading><content>The Attorney General and the Director of National Intelligence shall submit to the Committee on the Judiciary and the Select Committee on Intelligence of the Senate and the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives notification of a determination pursuant to clause (i) as soon as practicable, but not later than 3 days after the determination is made.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e77ce6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/5" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><heading class="fontsize10"><inline class="smallCaps">Reporting of material breach</inline>.—</heading><chapeau>Subsection (m) of section 702 (<ref href="/us/usc/t50/s1881a">50 U.S.C. 1881a</ref>), as redesignated by section 101, <amendingAction type="amend">is amended</amendingAction>—</chapeau><subparagraph class="fontsize10" id="ye8e77ce7-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/5/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in the heading by <amendingAction type="delete">striking</amendingAction> “<quotedText><headingText class="smallCaps">and Reviews</headingText></quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText><headingText class="smallCaps">Reviews, and Reporting</headingText></quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e77ce8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/5/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentDown1 fontsize10" id="ye8e77ce9-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Reporting of material breach</inline>.—</heading><subparagraph class="fontsize10" id="ye8e77cea-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The head of each element of the intelligence community involved in the acquisition of abouts communications shall fully and currently inform the Committees on the Judiciary of the House of Representatives and the Senate and the congressional intelligence committees of a material breach.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e77ceb-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this paragraph:</chapeau><clause class="fontsize10" id="ye8e77cec-e839-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>The term ‘<term>abouts communication</term>’ means a communication that contains a reference to, but is not to or from, a target of an acquisition authorized under subsection (a).<page identifier="/us/stat/132/13">132 STAT. 13</page></content></clause>
<clause class="fontsize10" id="ye8e77ced-e839-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>The term ‘<term>material breach</term>’ means significant noncompliance with applicable law or an order of the Foreign Intelligence Surveillance Court concerning any acquisition of abouts communications.”</content></clause>
</subparagraph>
</paragraph>
</quotedContent>.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e77cee-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s103/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><heading class="fontsize10"><inline class="smallCaps">Appointment of amici curiae by foreign intelligence surveillance court</inline>.—</heading><content>For purposes of section 103(i)(2)(A) of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1803/i/2/A">50 U.S.C. 1803(i)(2)(A)</ref>), the Foreign Intelligence Surveillance Court shall treat the first certification under section 702(h) of such Act (<ref href="/us/usc/t50/s1881a/h">50 U.S.C. 1881a(h)</ref>) or amendment thereto that authorizes the acquisition of abouts communications as presenting a novel or significant interpretation of the law, unless the court determines otherwise.</content></paragraph>
</subsection>
</section>
<section id="d182181e1855" identifier="/us/pl/115/118/tI/s104" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="104">SEC. 104. </num><heading>PUBLICATION OF MINIMIZATION PROCEDURES UNDER SECTION 702.</heading><content class="firstIndent0 fontsize10" id="xe8e7a3ff-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Section 702(e) (<ref href="/us/usc/t50/s1881a/e">50 U.S.C. 1881a(e)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="fontsize10" id="ye8e7a400-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e7a401-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Publication</inline>.—</heading><chapeau>The Director of National Intelligence, in consultation with the Attorney General, shall—</chapeau><subparagraph class="fontsize10" id="ye8e7a402-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>conduct a declassification review of any minimization procedures adopted or amended in accordance with paragraph (1); and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e7a403-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>consistent with such review, and not later than 180 days after conducting such review, make such minimization procedures publicly available to the greatest extent practicable, which may be in redacted form.”</content></subparagraph>
</paragraph>
</quotedContent>.</content></section>
<section id="d182181e1897" identifier="/us/pl/115/118/tI/s105" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="105">SEC. 105. </num><heading>SECTION 705 EMERGENCY PROVISION.</heading><content class="firstIndent0 fontsize10" id="xe8e7cb14-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Section 705 (<ref href="/us/usc/t50/s1881d">50 U.S.C. 1881d</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="firstIndent0 fontsize10" id="ye8e7cb15-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Emergency Authorization</inline>.—</heading><paragraph class="fontsize10" id="ye8e7f226-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Concurrent authorization</inline>.—</heading><content>If the Attorney General authorized the emergency employment of electronic surveillance or a physical search pursuant to section 105 or 304, the Attorney General may authorize, for the effective period of the emergency authorization and subsequent order pursuant to section 105 or 304, without a separate order under section 703 or 704, the targeting of a United States person subject to such emergency employment for the purpose of acquiring foreign intelligence information while such United States person is reasonably believed to be located outside the United States.</content></paragraph>
<paragraph class="fontsize10" id="ye8e7f227-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Use of information</inline>.—</heading><content>If an application submitted to the Court pursuant to section 104 or 303 is denied, or in any other case in which the acquisition pursuant to paragraph (1) is terminated and no order with respect to the target of the acquisition is issued under section 105 or 304, all information obtained or evidence derived from such acquisition shall be handled in accordance with section 704(d)(4).”</content></paragraph>
</subsection>
</quotedContent>.</content></section>
<section id="d182181e1942" identifier="/us/pl/115/118/tI/s106" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="106">SEC. 106. </num><heading>COMPENSATION OF AMICI CURIAE AND TECHNICAL EXPERTS.</heading><content class="firstIndent0 fontsize10" id="xe8e7f228-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Subsection (i) of section 103 (<ref href="/us/usc/t50/s1803">50 U.S.C. 1803</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><paragraph class="fontsize10" id="ye8e7f229-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="11">“(11) </num><heading class="fontsize10"><inline class="smallCaps">Compensation</inline>.—</heading><content>Notwithstanding any other provision of law, a court established under subsection (a) or (b) may compensate an amicus curiae appointed under paragraph <page identifier="/us/stat/132/14">132 STAT. 14</page>
(2) for assistance provided under such paragraph as the court considers appropriate and at such rate as the court considers appropriate.”</content></paragraph>
</quotedContent>.</content></section>
<section id="d182181e1974" identifier="/us/pl/115/118/tI/s107" style="-uslm-lc:I658143"><num class="fontsize12" value="107">SEC. 107. </num><heading>ADDITIONAL REPORTING REQUIREMENTS.</heading><subsection class="firstIndent0 fontsize10" id="ye8e8404a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s107/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Electronic Surveillance</inline>.—</heading><content>Section 107 (<ref href="/us/usc/t50/s1807">50 U.S.C. 1807</ref>) <amendingAction type="amend">is amended</amendingAction> to read as follows:<quotedContent><section class="centered fontsize12" id="ye8e8675b-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658143"><num class="fontsize12" value="107">“SEC. 107. </num><heading class="fontsize12">REPORT OF ELECTRONIC SURVEILLANCE.</heading><subsection class="firstIndent0 fontsize10" id="ye8e8675c-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Annual Report</inline>.—</heading><chapeau>In April of each year, the Attorney General shall transmit to the Administrative Office of the United States Courts and to the congressional intelligence committees and the Committees on the Judiciary of the House of Representatives and the Senate a report setting forth with respect to the preceding calendar year—</chapeau><paragraph class="fontsize10" id="ye8e8675d-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>the total number of applications made for orders and extensions of orders approving electronic surveillance under this title;</content></paragraph>
<paragraph class="fontsize10" id="ye8e8675e-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>the total number of such orders and extensions either granted, modified, or denied; and</content></paragraph>
<paragraph class="fontsize10" id="ye8e8675f-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>the total number of subjects targeted by electronic surveillance conducted under an order or emergency authorization under this title, rounded to the nearest 500, including the number of such individuals who are United States persons, reported to the nearest band of 500, starting with 0–499.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8e86760-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Form</inline>.—</heading><content>Each report under subsection (a) shall be submitted in unclassified form, to the extent consistent with national security. Not later than 7 days<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e86761-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Public information.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8e86762-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote> after the date on which the Attorney General submits each such report, the Attorney General shall make the report publicly available, or, if the Attorney General determines that the report cannot be made publicly available consistent with national security, the Attorney General may make publicly available an unclassified summary of the report or a redacted version of the report.”</content></subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="ye8e86763-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s107/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Pen Registers and Trap and Trace Devices</inline>.—</heading><chapeau>Section 406 (<ref href="/us/usc/t50/s1846">50 U.S.C. 1846</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8e86764-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s107/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in subsection (b)—</chapeau><subparagraph class="fontsize10" id="ye8e86765-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s107/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (4), by <amendingAction type="delete">striking</amendingAction> “<quotedText>; and</quotedText>” and <amendingAction type="insert">inserting</amendingAction> a semicolon;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e86766-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s107/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in paragraph (5), by <amendingAction type="delete">striking</amendingAction> the period at the end and <amendingAction type="insert">inserting</amendingAction> “<quotedText>; and</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e86767-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s107/b/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentDown1 fontsize10" id="ye8e88e78-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><chapeau>a good faith estimate of the total number of subjects who were targeted by the installation and use of a pen register or trap and trace device under an order or emergency authorization issued under this title, rounded to the nearest 500, including—</chapeau><subparagraph class="fontsize10" id="ye8e88e79-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>the number of such subjects who are United States persons, reported to the nearest band of 500, starting with 0–499; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e88e7a-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>of the number of United States persons described in subparagraph (A), the number of persons whose information acquired pursuant to such order was reviewed or accessed by a Federal officer, employee, or agent, reported to the nearest band of 500, starting with 0–499.”</content></subparagraph>
</paragraph>
</quotedContent>; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8e88e7b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s107/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following new subsection:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="ye8e88e7c-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><content>Each report under subsection (b) shall be submitted in unclassified form, to the extent consistent with national security. <page identifier="/us/stat/132/15">132 STAT. 15</page>
Not later than 7 days<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8e88e7d-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8e88e7e-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote> after the date on which the Attorney General submits such a report, the Attorney General shall make the report publicly available, or, if the Attorney General determines that the report cannot be made publicly available consistent with national security, the Attorney General may make publicly available an unclassified summary of the report or a redacted version of the report.”</content></subsection>
</quotedContent>.</content></paragraph>
</subsection>
</section>
<section id="d182181e2140" identifier="/us/pl/115/118/tI/s108" style="-uslm-lc:I658143"><num class="fontsize12" value="108">SEC. 108. </num><heading>IMPROVEMENTS TO PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD.</heading><subsection class="firstIndent0 fontsize10" id="ye8e8dc9f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Appointment of Staff</inline>.—</heading><chapeau>Subsection (j) of section 1061 of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t42/s2000ee/j">42 U.S.C. 2000ee(j)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8e8dca0-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraphs (2) and (3) as paragraphs (3) and (4), respectively; and</content></paragraph>
<paragraph class="fontsize10" id="ye8e8dca1-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="insert">inserting</amendingAction> after paragraph (1) the following new paragraph:<quotedContent><paragraph class="indentUp0 fontsize10" id="ye8e903b2-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Appointment in absence of chairman</inline>.—</heading><content>If the position of chairman of the Board is vacant, during the period of the vacancy, the Board, at the direction of the unanimous vote of the serving members of the Board, may exercise the authority of the chairman under paragraph (1).”</content></paragraph>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8e903b3-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Meetings</inline>.—</heading><chapeau>Subsection (f) of such section (<ref href="/us/usc/t42/s2000ee/f">42 U.S.C. 2000ee(f)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8e903b4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>The Board shall</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>The Board</quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="ye8e903b5-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in paragraph (1) by <amendingAction type="delete">striking</amendingAction> “<quotedText>make its</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>shall make its</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="ye8e903b6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><chapeau>in paragraph (2)—</chapeau><subparagraph class="fontsize10" id="ye8e903b7-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>hold public</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>shall hold public</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e903b8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s108/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="insert">inserting</amendingAction> before the period at the end the following: “<quotedText>, but may, notwithstanding <ref href="/us/usc/t5/s552b">section 552b of title 5, United States Code</ref>, meet or otherwise communicate in any number to confer or deliberate in a manner that is closed to the public</quotedText>”.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section id="d182181e2259" identifier="/us/pl/115/118/tI/s109" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="109">SEC. 109. </num><heading>PRIVACY AND CIVIL LIBERTIES OFFICERS.</heading><content style="-uslm-lc:I658120">  Section 1062(a) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t42/s2000ee–1/a">42 U.S.C. 2000ee–1(a)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> “<quotedText>, the Director of the National Security Agency, the Director of the Federal Bureau of Investigation</quotedText>” after “<quotedText>the Director of the Central Intelligence Agency</quotedText>”.</content></section>
<section id="d182181e2275" identifier="/us/pl/115/118/tI/s110" style="-uslm-lc:I658143"><num class="fontsize12" value="110">SEC. 110. </num><heading>WHISTLEBLOWER PROTECTIONS FOR CONTRACTORS OF THE INTELLIGENCE COMMUNITY.</heading><subsection class="firstIndent0 fontsize10" id="ye8e9ee19-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Prohibited Personnel Practices in the Intelligence Community</inline>.—</heading><chapeau>Section 1104 of the National Security Act of 1947 (<ref href="/us/usc/t50/s3234">50 U.S.C. 3234</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8e9ee1a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in subsection (a)—</chapeau><subparagraph class="fontsize10" id="ye8e9ee1b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (3), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>or a contractor employee</quotedText>” after “<quotedText>character)</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8e9ee1c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentDown1 fontsize10" id="ye8ea152d-e839-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8ea152e-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Definition.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Contractor employee</inline>.—</heading><content>The term ‘<term>contractor employee</term>’ means an employee of a contractor, subcontractor, grantee, subgrantee, or personal services contractor, of a covered intelligence community element.”</content></paragraph>
</quotedContent>;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8ea152f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsections (c) and (d) as subsections (d) and (e), respectively;<page identifier="/us/stat/132/16">132 STAT. 16</page></content></paragraph>
<paragraph class="fontsize10" id="ye8ea1530-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="insert">inserting</amendingAction> after subsection (b) the following new subsection (c):<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="ye8ea3c41-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Contractor Employees</inline>.—</heading><paragraph class="inline" id="ye8ea3c42-e839-11f0-a1e4-69761a48a15a"><num value="1">(1) </num><chapeau>Any employee of a contractor, subcontractor, grantee, subgrantee, or personal services contractor, of a covered intelligence community element who has authority to take, direct others to take, recommend, or approve any personnel action, shall not, with respect to such authority, take or fail to take a personnel action with respect to any contractor employee as a reprisal for a lawful disclosure of information by the contractor employee to the Director of National Intelligence (or an employee designated by the Director of National Intelligence for such purpose), the Inspector General of the Intelligence Community, the head of the contracting agency (or an employee designated by the head of that agency for such purpose), the appropriate inspector general of the contracting agency, a congressional intelligence committee, or a member of a congressional intelligence committee, which the contractor employee reasonably believes evidences—</chapeau><subparagraph class="fontsize10" id="ye8ea3c43-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>a violation of any Federal law, rule, or regulation (including with respect to evidence of another employee or contractor employee accessing or sharing classified information without authorization); or</content></subparagraph>
<subparagraph class="fontsize10" id="ye8ea3c44-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>gross mismanagement, a gross waste of funds, an abuse of authority, or a substantial and specific danger to public health or safety.</content></subparagraph>
</paragraph>
<paragraph class="indentUp0 firstIndent0 fontsize10" id="ye8ea3c45-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>A personnel action under paragraph (1) is prohibited even if the action is undertaken at the request of an agency official, unless the request takes the form of a nondiscretionary directive and is within the authority of the agency official making the request.”</content></paragraph>
</subsection>
</quotedContent>;</content></paragraph>
<paragraph class="fontsize10" id="ye8ea3c46-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>in subsection (b), by <amendingAction type="delete">striking</amendingAction> the heading and <amendingAction type="insert">inserting</amendingAction> “<quotedText><headingText class="smallCaps">Agency Employees</headingText>.—</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="ye8ea3c47-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/a/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>in subsection (e), as redesignated by paragraph (2), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>contractor employee,</quotedText>” after “<quotedText>any employee,</quotedText>”.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ea3c48-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8ea3c49-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t5/s2303">5 USC 2303 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Federal Bureau of Investigation</inline>.—</heading><paragraph class="fontsize10" id="ye8ea3c4a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Any employee of a contractor, subcontractor, grantee, subgrantee, or personal services contractor, of the Federal Bureau of Investigation who has authority to take, direct others to take, recommend, or approve any personnel action, shall not, with respect to such authority, take or fail to take a personnel action with respect to a contractor employee as a reprisal for a disclosure of information—</chapeau><subparagraph class="fontsize10" id="ye8ea3c4b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>made—</chapeau><clause class="fontsize10" id="ye8ea3c4c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>to a supervisor in the direct chain of command of the contractor employee;</content></clause>
<clause class="fontsize10" id="ye8ea3c4d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>to the Inspector General;</content></clause>
<clause class="fontsize10" id="ye8ea3c4e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>to the Office of Professional Responsibility of the Department of Justice;</content></clause>
<clause class="fontsize10" id="ye8ea3c4f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>to the Office of Professional Responsibility of the Federal Bureau of Investigation;</content></clause>
<clause class="fontsize10" id="ye8ea3c50-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><content>to the Inspection Division of the Federal Bureau of Investigation;</content></clause>
<clause class="fontsize10" id="ye8ea3c51-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A/vi" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">(vi) </num><content>to the Office of Special Counsel; or</content></clause>
<clause class="fontsize10" id="ye8ea3c52-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/A/vii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vii">(vii) </num><content>to an employee designated by any officer, employee, office, or division described in clauses (i) through (vii) for the purpose of receiving such disclosures; and<page identifier="/us/stat/132/17">132 STAT. 17</page></content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="ye8ea3c53-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>which the contractor employee reasonably believes evidences—</chapeau><clause class="fontsize10" id="ye8ea3c54-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>any violation of any law, rule, or regulation (including with respect to evidence of another employee or contractor employee accessing or sharing classified information without authorization); or</content></clause>
<clause class="fontsize10" id="ye8ea3c55-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/1/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>gross mismanagement, a gross waste of funds, an abuse of authority, or a substantial and specific danger to public health or safety.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8ea3c56-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Actions by request</inline>.—</heading><content>A personnel action under paragraph (1) is prohibited even if the action is undertaken at the request of an official of the Federal Bureau of Investigation, unless the request takes the form of a nondiscretionary directive and is within the authority of the official making the request.</content></paragraph>
<paragraph class="fontsize10" id="ye8ea3c57-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Regulations</inline>.—</heading><content>The Attorney General shall prescribe regulations to ensure that a personnel action described in paragraph (1) shall not be taken against a contractor employee of the Federal Bureau of Investigation as a reprisal for any disclosure of information described in subparagraph (A) of such paragraph.</content></paragraph>
<paragraph class="fontsize10" id="ye8ea3c58-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8ea3c59-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">President.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Enforcement</inline>.—</heading><content>The President shall provide for the enforcement of this subsection.</content></paragraph>
<paragraph class="fontsize10" id="ye8ea3c5a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this subsection:</chapeau><subparagraph class="fontsize10" id="ye8ea3c5b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/5/A" role="definitions" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>The term “<term>contractor employee</term>” means an employee of a contractor, subcontractor, grantee, subgrantee, or personal services contractor, of the Federal Bureau of Investigation.</content></subparagraph>
<subparagraph class="fontsize10" id="ye8ea3c5c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/b/5/B" role="definitions" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>The term “<term>personnel action</term>” means any action described in clauses (i) through (x) of <ref href="/us/usc/t5/s2302/a/2/A">section 2302(a)(2)(A) of title 5, United States Code</ref>, with respect to a contractor employee.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ea3c5d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s110/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Retaliatory Revocation of Security Clearances and Access Determinations</inline>.—</heading><content>Section 3001(j) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<ref href="/us/usc/t50/s3341/j">50 U.S.C. 3341(j)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="fontsize10" id="ye8ea3c5e-e839-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">“(8) </num><heading class="fontsize10"><inline class="smallCaps">Inclusion of contractor employees</inline>.—</heading><content>In this subsection, the term ‘<term>employee</term>’ includes an employee of a contractor, subcontractor, grantee, subgrantee, or personal services contractor, of an agency. With respect to such employees, the term ‘<term>employing agency</term>’ shall be deemed to be the contracting agency.”</content></paragraph>
</quotedContent>.</content></subsection>
</section>
<section id="d182181e2574" identifier="/us/pl/115/118/tI/s111" style="-uslm-lc:I658143"><num class="fontsize12" value="111">SEC. 111. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8ea626f-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xe8ea6270-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading>BRIEFING ON NOTIFICATION REQUIREMENTS.</heading><content style="-uslm-lc:I658120">  Not later than 180 days after the date of the enactment of this Act, the Attorney General, in consultation with the Director of National Intelligence, shall provide to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate a briefing with respect to how the Department of Justice interprets the requirements under sections 106(c), 305(d), and 405(c) of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1806/c">50 U.S.C. 1806(c)</ref>, 1825(d), and 1845(c)) to notify an aggrieved person under such sections of the use of information obtained or derived from electronic surveillance, physical search, or the use of a pen register or trap and trace device. The briefing shall focus on how the Department interprets the phrase “obtained or derived from” in such sections.<page identifier="/us/stat/132/18">132 STAT. 18</page></content></section>
<section id="d182181e2591" identifier="/us/pl/115/118/tI/s112" style="-uslm-lc:I658143"><num class="fontsize12" value="112">SEC. 112. </num><heading>INSPECTOR GENERAL REPORT ON QUERIES CONDUCTED BY FEDERAL BUREAU OF INVESTIGATION.</heading><subsection class="firstIndent0 fontsize10" id="ye8eafeb1-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><content>Not later than 1 year after the date on which the Foreign Intelligence Surveillance Court first approves the querying procedures adopted pursuant to section 702(f) of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881a/f">50 U.S.C. 1881a(f)</ref>), as added by section 101, the Inspector General of the Department of Justice shall submit to the Committee on the Judiciary and the Select Committee on Intelligence of the Senate and the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives a report containing a review by the Inspector General of the interpretation of, and compliance with, such procedures by the Federal Bureau of Investigation.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="ye8eafeb2-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Matters Included</inline>.—</heading><chapeau>The report under subsection (a) shall include, at a minimum, an assessment of the following:</chapeau><paragraph class="fontsize10" id="ye8eafeb3-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The interpretations by the Federal Bureau of Investigation and the National Security Division of the Department of Justice, respectively, relating to the querying procedures adopted under subsection (f) of section 702 of the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1881a/f">50 U.S.C. 1881a(f)</ref>), as added by section 101.</content></paragraph>
<paragraph class="fontsize10" id="ye8eafeb4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The handling by the Federal Bureau of Investigation of individuals whose citizenship status is unknown at the time of a query conducted under such section 702.</content></paragraph>
<paragraph class="fontsize10" id="ye8eafeb5-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The practice of the Federal Bureau of Investigation with respect to retaining records of queries conducted under such section 702 for auditing purposes.</content></paragraph>
<paragraph class="fontsize10" id="ye8eafeb6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The training or other processes of the Federal Bureau of Investigation to ensure compliance with such querying procedures.</content></paragraph>
<paragraph class="fontsize10" id="ye8eafeb7-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>The implementation of such querying procedures with respect to queries conducted when evaluating whether to open an assessment or predicated investigation relating to the national security of the United States.</content></paragraph>
<paragraph class="fontsize10" id="ye8eafeb8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>The scope of access by the criminal division of the Federal Bureau of Investigation to information obtained pursuant to the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801/etseq">50 U.S.C. 1801 et seq.</ref>), including with respect to information acquired under subsection (a) of such section 702 based on queries conducted by the criminal division.</content></paragraph>
<paragraph class="fontsize10" id="ye8eafeb9-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>The frequency and nature of the reviews conducted by the National Security Division of the Department of Justice and the Office of the Director of National Intelligence relating to the compliance by the Federal Bureau of Investigation with such querying procedures.</content></paragraph>
<paragraph class="fontsize10" id="ye8eafeba-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><chapeau>Any impediments, including operational, technical, or policy impediments, for the Federal Bureau of Investigation to count—</chapeau><subparagraph class="fontsize10" id="ye8eafebb-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/8/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the total number of queries where the Federal Bureau of Investigation subsequently accessed information acquired under subsection (a) of such section 702;</content></subparagraph>
<subparagraph class="fontsize10" id="ye8eafebc-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/8/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the total number of such queries that used known United States person identifiers; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8eafebd-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/b/8/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>the total number of queries for which the Federal Bureau of Investigation received an order of the Foreign <page identifier="/us/stat/132/19">132 STAT. 19</page>
Intelligence Surveillance Court pursuant to subsection (f)(2) of such section 702.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8eafebe-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tI/s112/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Form</inline>.—</heading><content>The report under subsection (a) shall be submitted in unclassified form to the extent consistent with national security, but may include a classified annex.</content></subsection>
</section>
</title>
<title id="d182181e2697" identifier="/us/pl/115/118/tII" style="-uslm-lc:I658178"><num value="II">TITLE II—</num><heading>EXTENSION OF AUTHORITIES, INCREASED PENALTIES, REPORTS, AND OTHER MATTERS</heading>
<section id="d182181e2702" identifier="/us/pl/115/118/tII/s201" style="-uslm-lc:I658143"><num class="fontsize12" value="201">SEC. 201. </num><heading>EXTENSION OF TITLE VII OF FISA; EFFECTIVE DATES.</heading><subsection class="firstIndent0 fontsize10" id="ye8eb73ef-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Extension</inline>.—</heading><chapeau>Section 403(b) of the FISA Amendments Act of 2008 (<ref href="/us/pl/110/261">Public Law 110–261</ref>; <ref href="/us/stat/122/2474">122 Stat. 2474</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye8eb73f0-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8eb73f1-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s1881">50 USC 1881</ref></p><p class="leftAlign firstIndent0 fontsize8" id="xe8eb73f2-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">and note,</p><p class="leftAlign firstIndent0 fontsize8" id="xe8eb73f3-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">1881a–1881g.</p></sidenote><chapeau>in paragraph (1)—</chapeau><subparagraph class="fontsize10" id="ye8eb73f4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>December 31, 2017</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>December 31, 2023</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8eb73f5-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>and by the FISA Amendments Reauthorization Act of 2017</quotedText>” after “<quotedText>section 101(a)</quotedText>”; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8eb73f6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8eb73f7-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s2511">50 USC 2511 note</ref>.</p></sidenote><content>in paragraph (2) in the matter preceding subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>December 31, 2017</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>December 31, 2023</quotedText>”.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8eb73f8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Conforming Amendments</inline>.—</heading><chapeau>Section 404(b) of the FISA Amendments Act of 2008 (<ref href="/us/pl/110/261">Public Law 110–261</ref>; <ref href="/us/stat/122/2476">122 Stat. 2476</ref>), as amended by section 101,<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8eb73f9-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s1801">50 USC 1801 note</ref>.</p></sidenote> is further amended—</chapeau><paragraph class="fontsize10" id="ye8eb73fa-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in paragraph (1)—</chapeau><subparagraph class="fontsize10" id="ye8eb73fb-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b/1/A" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in the heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><headingText class="smallCaps">December 31, 2017</headingText></quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText><headingText class="smallCaps">December 31, 2023</headingText></quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8eb73fc-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b/1/B" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>and by the FISA Amendments Reauthorization Act of 2017</quotedText>” after “<quotedText>section 101(a)</quotedText>”;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8eb73fd-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b/2" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in paragraph (2), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>and by the FISA Amendments Reauthorization Act of 2017</quotedText>” after “<quotedText>section 101(a)</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="ye8eb73fe-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><chapeau>in paragraph (4)—</chapeau><subparagraph class="fontsize10" id="ye8eb73ff-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b/3/A" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>and amended by the FISA Amendments Reauthorization Act of 2017</quotedText>” after “<quotedText>as added by section 101(a)</quotedText>” both places it appears; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8eb7400-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/b/3/B" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>and by the FISA Amendments Reauthorization Act of 2017</quotedText>” after “<quotedText>as amended by section 101(a)</quotedText>” both places it appears.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8eb7401-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s201/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8eb7402-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s1881">50 USC 1881 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Effective Date of Amendments to FAA</inline>.—</heading><content>The amendments made to the FISA Amendments Act of 2008 (<ref href="/us/pl/110/261">Public Law 110–261</ref>) by this section shall take effect on December 31, 2017.</content></subsection>
</section>
<section id="d182181e2881" identifier="/us/pl/115/118/tII/s202" role="instruction" style="-uslm-lc:I658143"><num class="fontsize12" value="202">SEC. 202. </num><heading>INCREASED PENALTY FOR UNAUTHORIZED REMOVAL AND RETENTION OF CLASSIFIED DOCUMENTS OR MATERIAL.</heading><content style="-uslm-lc:I658120">  <ref href="/us/usc/t18/s1924/a">Section 1924(a) of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> “<quotedText>one year</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>five years</quotedText>”.</content></section>
<section id="d182181e2900" identifier="/us/pl/115/118/tII/s203" style="-uslm-lc:I658143"><num class="fontsize12" value="203">SEC. 203. </num><heading>REPORT ON CHALLENGES TO THE EFFECTIVENESS OF FOREIGN INTELLIGENCE SURVEILLANCE.</heading><subsection class="firstIndent0 fontsize10" id="ye8ec1043-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8ec1044-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><content>Not later than 270 days after the date of the enactment of this Act, the Attorney General, in coordination with the Director of National Intelligence, shall submit to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate <page identifier="/us/stat/132/20">132 STAT. 20</page>
a report on current and future challenges to the effectiveness of the foreign intelligence surveillance activities of the United States authorized under the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801/etseq">50 U.S.C. 1801 et seq.</ref>).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ec1045-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8ec1046-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="xe8ec1047-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Matters Included</inline>.—</heading><chapeau>The report under subsection (a) shall include, at a minimum, the following:</chapeau><paragraph class="indentUp0 firstIndent2 fontsize10" id="ye8ec1048-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>A discussion of any trends that currently challenge the effectiveness of the foreign intelligence surveillance activities of the United States, or could foreseeably challenge such activities during the decade following the date of the report, including with respect to—</chapeau><subparagraph class="indentUp2 fontsize10" id="ye8ec1049-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the extraordinary and surging volume of data occurring worldwide;</content></subparagraph>
<subparagraph class="indentUp2 fontsize10" id="ye8ec104a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the use of encryption;</content></subparagraph>
<subparagraph class="indentUp2 fontsize10" id="ye8ec104b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>changes to worldwide telecommunications patterns or infrastructure;</content></subparagraph>
<subparagraph class="indentUp2 fontsize10" id="ye8ec104c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>technical obstacles in determining the location of data or persons;</content></subparagraph>
<subparagraph class="indentUp2 fontsize10" id="ye8ec104d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>the increasing complexity of the legal regime, including regarding requests for data in the custody of foreign governments;</content></subparagraph>
<subparagraph class="indentUp2 fontsize10" id="ye8ec104e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>the current and future ability of the United States to obtain, on a compulsory or voluntary basis, assistance from telecommunications providers or other entities; and</content></subparagraph>
<subparagraph class="indentUp2 fontsize10" id="ye8ec104f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/1/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><content>any other matters the Attorney General and the Director of National Intelligence determine appropriate.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8ec1050-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>Recommendations for changes, including, as appropriate, fundamental changes, to the foreign intelligence surveillance activities of the United States to address the challenges identified under paragraph (1) and to ensure the long-term effectiveness of such activities.</content></paragraph>
<paragraph class="fontsize10" id="ye8ec1051-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>Recommendations for any changes to the Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801/etseq">50 U.S.C. 1801 et seq.</ref>) that the Attorney General and the Director of National Intelligence determine necessary to address the challenges identified under paragraph (1).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ec1052-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s203/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Form</inline>.—</heading><content>The report under subsection (a) may be submitted in classified or unclassified form.</content></subsection>
</section>
<section id="d182181e3002" identifier="/us/pl/115/118/tII/s204" style="-uslm-lc:I658143"><num class="fontsize12" value="204">SEC. 204. </num><heading>COMPTROLLER GENERAL STUDY ON THE CLASSIFICATION SYSTEM AND PROTECTION OF CLASSIFIED INFORMATION.</heading><subsection class="firstIndent0 fontsize10" id="ye8ec8583-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Study</inline>.—</heading><content>The Comptroller General of the United States shall conduct a study of the classification system of the United States and the methods by which the intelligence community (as defined in section 3(4) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>)) protects classified information.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ec8584-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Matters Included</inline>.—</heading><chapeau>The study under subsection (a) shall address the following:</chapeau><paragraph class="fontsize10" id="ye8ec8585-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>Whether sensitive information is properly classified.</content></paragraph>
<paragraph class="fontsize10" id="ye8ec8586-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>The effect of modern technology on the storage and protection of classified information, including with respect to—</chapeau><subparagraph class="fontsize10" id="ye8ec8587-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>using cloud storage for classified information; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8ec8588-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>any technological means to prevent or detect unauthorized access to such information.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8ec8589-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>Any ways to improve the classification system of the United States, including with respect to changing the levels <page identifier="/us/stat/132/21">132 STAT. 21</page>
of classification used in such system and to reduce overclassification.</content></paragraph>
<paragraph class="fontsize10" id="ye8ec858a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>How to improve the authorized sharing of classified information, including with respect to sensitive compartmented information.</content></paragraph>
<paragraph class="fontsize10" id="ye8ec858b-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>The value of polygraph tests in determining who is authorized to access classified information and in investigating unauthorized disclosures of classified information.</content></paragraph>
<paragraph class="fontsize10" id="ye8ec858c-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><chapeau>Whether each element of the intelligence community—</chapeau><subparagraph class="fontsize10" id="ye8ec858d-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/6/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>applies uniform standards in determining who is authorized to access classified information; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8ec858e-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/b/6/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>provides proper training with respect to the handling of classified information and the avoidance of overclassification.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ec858f-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Comptroller General shall submit to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate a report containing the study under subsection (a).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ec8590-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s204/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Form</inline>.—</heading><content>The report under subsection (c) shall be submitted in unclassified form, but may include a classified annex.</content></subsection>
</section>
<section id="d182181e3103" identifier="/us/pl/115/118/tII/s205" style="-uslm-lc:I658143"><num class="fontsize12" value="205">SEC. 205. </num><heading>TECHNICAL AMENDMENTS AND AMENDMENTS TO IMPROVE PROCEDURES OF THE FOREIGN INTELLIGENCE SURVEILLANCE COURT OF REVIEW.</heading><subsection class="firstIndent0 fontsize10" id="ye8ed48e1-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Technical Amendments</inline>.—</heading><chapeau>The Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801/etseq">50 U.S.C. 1801 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> as follows:</chapeau><paragraph class="fontsize10" id="ye8ed48e2-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>In section 103(b) (<ref href="/us/usc/t50/s1803/b">50 U.S.C. 1803(b)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>designate as the</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>designated as the</quotedText>”.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed48e3-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>In section 302(a)(1)(A)(iii) (<ref href="/us/usc/t50/s1822/a/1/A/iii">50 U.S.C. 1822(a)(1)(A)(iii)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>paragraphs (1) through (4)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>subparagraphs (A) through (D)</quotedText>”.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed48e4-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>In section 406(b) (<ref href="/us/usc/t50/s1846/b">50 U.S.C. 1846(b)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and to the Committees on the Judiciary of the House of Representatives and the Senate</quotedText>”.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed48e5-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>In section 604(a) (<ref href="/us/usc/t50/s1874/a">50 U.S.C. 1874(a)</ref>)—</chapeau><subparagraph class="fontsize10" id="ye8ed48e6-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (1)(D), by <amendingAction type="delete">striking</amendingAction> “<quotedText>contents</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>contents,</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8ed48e7-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in paragraph (3), by <amendingAction type="delete">striking</amendingAction> “<quotedText>comply in the into</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>comply into</quotedText>”.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8ed48e8-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><chapeau>In section 701 (<ref href="/us/usc/t50/s1881">50 U.S.C. 1881</ref>)—</chapeau><subparagraph class="fontsize10" id="ye8ed48e9-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/5/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in subsection (a), by <amendingAction type="delete">striking</amendingAction> “<quotedText>The terms</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>In this title, the terms</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8ed48ea-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/5/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in subsection (b)—</chapeau><clause class="fontsize10" id="ye8ed48eb-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/5/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="insert">inserting</amendingAction> “<quotedText>In this title:</quotedText>” after the subsection heading; and</content></clause>
<clause class="fontsize10" id="ye8ed48ec-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/5/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in paragraph (5), by <amendingAction type="delete">striking</amendingAction> “<quotedText>(<ref href="/us/usc/t50/s401a/4">50 U.S.C. 401a(4)</ref>)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>(<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>)</quotedText>”.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8ed48ed-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>In section 702(h)(2)(A)(i) (<ref href="/us/usc/t50/s1881a/h/2/A/i">50 U.S.C. 1881a(h)(2)(A)(i)</ref>), as redesignated by section 101, by <amendingAction type="insert">inserting</amendingAction> “<quotedText>targeting</quotedText>” before “<quotedText>procedures in place</quotedText>”.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed48ee-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/a/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>In section 801(7) (<ref href="/us/usc/t50/s1885/7">50 U.S.C. 1885(7)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>(<ref href="/us/usc/t50/s401a/4">50 U.S.C. 401a(4)</ref>)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>(<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>)</quotedText>”.<page identifier="/us/stat/132/22">132 STAT. 22</page></content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye8ed48ef-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Court-related Amendments</inline>.—</heading><chapeau>The Foreign Intelligence Surveillance Act of 1978 (<ref href="/us/usc/t50/s1801/etseq">50 U.S.C. 1801 et seq.</ref>) is further amended as follows:</chapeau><paragraph class="fontsize10" id="ye8ed48f0-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>In section 103 (<ref href="/us/usc/t50/s1803">50 U.S.C. 1803</ref>)—</chapeau><subparagraph class="fontsize10" id="ye8ed48f1-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/1/A" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in subsection (b), by <amendingAction type="delete">striking</amendingAction> “<quotedText>immediately</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye8ed48f2-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/1/B" role="instruction" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in subsection (h), by <amendingAction type="delete">striking</amendingAction> “<quotedText>the court established under subsection (a)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>a court established under this section</quotedText>”.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye8ed48f3-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/2" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>In section 105(d) (<ref href="/us/usc/t50/s1805/d">50 U.S.C. 1805(d)</ref>), by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentDown1 firstIndent0 fontsize10" id="ye8ed48f4-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>A denial of the application made under section 104 may be reviewed as provided in section 103.”</content></paragraph>
</quotedContent>.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed7005-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/3" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>In section 302(d) (<ref href="/us/usc/t50/s1822/d">50 U.S.C. 1822(d)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>immediately</quotedText>”.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed7006-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/4" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>In section 402(d) (<ref href="/us/usc/t50/s1842/d">50 U.S.C. 1842(d)</ref>), by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentDown1 firstIndent0 fontsize10" id="ye8ed7007-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>A denial of the application made under this subsection may be reviewed as provided in section 103.”</content></paragraph>
</quotedContent>.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed7008-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/5" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>In section 403(c) (<ref href="/us/usc/t50/s1843/c">50 U.S.C. 1843(c)</ref>), by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentDown1 firstIndent0 fontsize10" id="ye8ed7009-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>A denial of the application made under subsection (a)(2) may be reviewed as provided in section 103.”</content></paragraph>
</quotedContent>.</content></paragraph>
<paragraph class="fontsize10" id="ye8ed700a-e839-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/118/tII/s205/b/6" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>In section 501(c) (<ref href="/us/usc/t50/s1861/c">50 U.S.C. 1861(c)</ref>), by <amendingAction type="add">adding</amendingAction> at the end the following new paragraph:<quotedContent><paragraph class="indentUp0 fontsize10" id="ye8ed700b-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>A denial of the application made under this subsection may be reviewed as provided in section 103.”</content></paragraph>
</quotedContent>.</content></paragraph>
</subsection>
</section>
<section id="d182181e3421" identifier="/us/pl/115/118/tII/s206" style="-uslm-lc:I658143"><num class="fontsize12" value="206">SEC. 206. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe8ed700c-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t50/s1801">50 USC 1801 note</ref>.</p></sidenote><heading>SEVERABILITY.</heading><content style="-uslm-lc:I658120">  If any provision of this Act, any amendment made by this Act, or the application thereof to any person or circumstances is held invalid, the validity of the remainder of the Act, of any such amendments, and of the application of such provisions to other persons and circumstances shall not be affected thereby.</content></section>
</title>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2018-01-19">January 19, 2018</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/115/s/139">S. 139</ref>:</heading>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD:</heading>
<subheading style="-uslm-lc:I658033">Vol. 163 (2017):</subheading>
<p class="indentUp2 firstIndent-1" id="xe8ed700d-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">May 16, considered and passed Senate.</p><subheading style="-uslm-lc:I658033">Vol. 164 (2018):</subheading>
<p class="indentUp2 firstIndent-1" id="xe8ed700e-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Jan. 11, considered and passed House, amended. Considered in Senate.</p><p class="indentUp2 firstIndent-1" id="xe8ed700f-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Jan. 16–18, Senate considered and concurred in House amendment.</p></note>
<note>
<heading style="-uslm-lc:I658032">DAILY COMPILATION OF PRESIDENTIAL DOCUMENTS (2018):</heading>
<p class="indentUp4 firstIndent-1" id="xe8ed9720-e839-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Jan. 19, Presidential statement.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>