<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Placed-on-Calendar-Senate" dms-id="A1" public-private="public">
	<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>115 S3153 PCS: Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018 and 2019</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date></dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
		<distribution-code display="yes">II</distribution-code>
		<calendar>Calendar No. 494</calendar>
		<congress>115th CONGRESS</congress><session>2d Session</session>
		<legis-num>S. 3153</legis-num>
		<current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber>
		<action>
			<action-date>June 28, 2018</action-date>
			<action-desc><sponsor name-id="S300">Mr. Burr</sponsor>, from the <committee-name committee-id="SLIN00">Select Committee on Intelligence</committee-name>, reported the following original bill; which was read twice and placed on the calendar</action-desc>
		</action>
		<legis-type>A BILL</legis-type>
		<official-title>To authorize appropriations for fiscal years 2018 and 2019 for intelligence and
			 intelligence-related activities of the United States Government, the
			 Community Management Account, and the Central Intelligence Agency
			 Retirement and Disability System, and for other purposes.</official-title>
	</form>
	<legis-body>
		<section id="id8F3DB53621F1402AAA4F3A6DB875676B" section-type="section-one"><enum>1.</enum><header>Short title; table of contents</header>
 <subsection id="idCAA84F277E9048869B17B1885AA03B8A"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018 and 2019</short-title></quote>.</text>
 </subsection><subsection commented="no" display-inline="no-display-inline" id="HD012E43D75004BB8B8F46BC96F700850"><enum>(b)</enum><header display-inline="yes-display-inline">Table of contents</header><text display-inline="yes-display-inline">The table of contents for this Act is as follows:</text><toc><toc-entry idref="id8F3DB53621F1402AAA4F3A6DB875676B" level="section">Sec. 1. Short title; table of contents.</toc-entry> <toc-entry idref="HDBC2F4B326AE441E8243AA8A5C78C55A" level="section">Sec. 2. Definitions.</toc-entry> <toc-entry idref="HCBEB5522E6AA40EEA6EE65F9AD01D507" level="title">TITLE I—Intelligence Activities</toc-entry> <toc-entry idref="H2CE967185B4B481F94C34E4EA9E80B31" level="section">Sec. 101. Authorization of appropriations.</toc-entry> <toc-entry idref="HC376624968924B2CAC0E289F3D6EAA4B" level="section">Sec. 102. Classified Schedules of Authorizations.</toc-entry> <toc-entry idref="HE4A81C9E59304F3D8919154DE3C99902" level="section">Sec. 103. Personnel ceiling adjustments.</toc-entry> <toc-entry idref="HC0A23AF50B2145F6A9AD09ADF3EE0861" level="section">Sec. 104. Intelligence Community Management Account.</toc-entry> <toc-entry idref="HA008175EC88345F1BB4A010A539CB3AA" level="title">TITLE II—Central Intelligence Agency Retirement and Disability System</toc-entry> <toc-entry idref="H2503AD8E26094BC7991C6E094BB21C8E" level="section">Sec. 201. Authorization of appropriations.</toc-entry> <toc-entry idref="HA8F609FCA8DD4760AD8E72710B9FF27C" level="section">Sec. 202. Computation of annuities for employees of the Central Intelligence Agency.</toc-entry> <toc-entry idref="HDB5694AC2AF1454E81C6D2E1428660D1" level="title">TITLE III—General Intelligence Community Matters</toc-entry> <toc-entry idref="H6688A0FF57E34BEDB123B47BFCD4D468" level="section">Sec. 301. Restriction on conduct of intelligence activities.</toc-entry> <toc-entry idref="H588B66548A714D07B62DC70FEA084FA1" level="section">Sec. 302. Increase in employee compensation and benefits authorized by law.</toc-entry> <toc-entry idref="H2C29A5B8DBC14C158F1C7D65A3B62203" level="section">Sec. 303. Modification of special pay authority for science, technology, engineering, or mathematics positions and addition of special pay authority for cyber positions.</toc-entry> <toc-entry idref="H9526AF17BC0340188BD8815B16879B44" level="section">Sec. 304. Modification of appointment of Chief Information Officer of the Intelligence Community.</toc-entry> <toc-entry idref="HCADCB55544824CB9BC96EAA917C351BD" level="section">Sec. 305. Director of National Intelligence review of placement of positions within the intelligence community on the Executive Schedule.</toc-entry> <toc-entry idref="H74DF571A80E4489A854CBD69D3432CE4" level="section">Sec. 306. Supply Chain and Counterintelligence Risk Management Task Force.</toc-entry> <toc-entry idref="id8791FB886AA64C94A5EB9D106EFB0857" level="section">Sec. 307. Consideration of adversarial telecommunications and cybersecurity infrastructure when sharing intelligence with foreign governments and entities.</toc-entry> <toc-entry idref="id1ee18fbfa26842f2ba17ffd9dbe0ee97" level="section">Sec. 308. Cyber protection support for the personnel of the intelligence community in positions highly vulnerable to cyber attack.</toc-entry> <toc-entry idref="id51A8DA750D8240C2BA3D1C1125106A8F" level="section">Sec. 309. Modification of authority relating to management of supply-chain risk.</toc-entry> <toc-entry idref="id4BE3E5BEDC6D417EAF14045BFBEB1720" level="section">Sec. 310. Limitations on determinations regarding certain security classifications.</toc-entry> <toc-entry idref="id65E350E682AC40A8BC41ED810DF140F7" level="title">TITLE IV—Matters relating to elements of the intelligence community</toc-entry> <toc-entry idref="idB164F28942184255A7A5C363B4E1EA37" level="subtitle">Subtitle A—Office of the Director of National Intelligence</toc-entry> <toc-entry idref="HB7F3C9E347D742BCA480B1B55857EEFC" level="section">Sec. 401. Authority for protection of current and former employees of the Office of the Director of National Intelligence.</toc-entry> <toc-entry idref="HBFA8A7FA17504AD9A3A10F48723A5D9C" level="section">Sec. 402. Designation of the program manager-information sharing environment.</toc-entry> <toc-entry idref="HDB829C28FB1D44F9864829855F58A6DB" level="section">Sec. 403. Modification to the executive schedule.</toc-entry> <toc-entry idref="idCAB5B6FBAF2E447A8968AE9D00722797" level="subtitle">Subtitle B—Other elements</toc-entry> <toc-entry idref="HCF1676353F414086A748EABDC18A1F43" level="section">Sec. 411. Repeal of foreign language proficiency requirement for certain senior level positions in the Central Intelligence Agency.</toc-entry> <toc-entry idref="H1BA06C26ECC54C9ABA2DA8DF89BB385C" level="section">Sec. 412. Plan for designation of counterintelligence component of Defense Security Service as an element of intelligence community.</toc-entry> <toc-entry idref="idEAD9D6C568EE4ADE98440A23FB11D325" level="section">Sec. 413. Notice not required for private entities.</toc-entry> <toc-entry idref="idC21B85C788EA4E9B9EBC6BBE63B913FD" level="title">TITLE V—Election matters</toc-entry> <toc-entry idref="HD2556C8BBE1B4109BAF1924FD20D5067" level="section">Sec. 501. Report on cyber attacks by foreign governments against United States election infrastructure.</toc-entry> <toc-entry idref="HD39EECC2F993471BBD6A5DD603D4D428" level="section">Sec. 502. Review of intelligence community's posture to collect against and analyze Russian efforts to influence the Presidential election.</toc-entry> <toc-entry idref="HB53ECF30DC744F7AAF80BC7EF0D20D63" level="section">Sec. 503. Assessment of foreign intelligence threats to Federal elections.</toc-entry> <toc-entry idref="HDDA67264A5964802AEEB9A4F04C54074" level="section">Sec. 504. Strategy for countering Russian cyber threats to United States elections.</toc-entry> <toc-entry idref="H6F4F458013154CC683D34F181A17982C" level="section">Sec. 505. Information sharing with State election officials.</toc-entry> <toc-entry idref="id15C93A65999D423AA61624AD24042631" level="section">Sec. 506. Designation of counterintelligence officer to lead election security matters.</toc-entry> <toc-entry idref="id7F848A1F3CAE4E6ABE1C8E5097CE780E" level="title">TITLE VI—Security clearances</toc-entry> <toc-entry idref="id28ea5b4644ab421ba4d777466e28183c" level="section">Sec. 601. Definitions.</toc-entry> <toc-entry idref="id383b62bc8e0d41f69a0b8a158b7bf1fd" level="section">Sec. 602. Reports and plans relating to security clearances and background investigations.</toc-entry> <toc-entry idref="id8c0ace43367142b8aa8efdaa4486cf17" level="section">Sec. 603. Improving the process for security clearances.</toc-entry> <toc-entry idref="id3da504773dc1468b86f579a90eca00d1" level="section">Sec. 604. Goals for promptness of determinations regarding security clearances.</toc-entry> <toc-entry idref="id52DD1A625B6F4FC19D411D9E176279BD" level="section">Sec. 605. Security Executive Agent.</toc-entry> <toc-entry idref="idb2694c7b31c849a59b7706159c215200" level="section">Sec. 606. Report on unified, simplified, governmentwide standards for positions of trust and security clearances.</toc-entry> <toc-entry idref="id394ca3afbc39441d82d9ab8446160b68" level="section">Sec. 607. Report on clearance in person concept.</toc-entry> <toc-entry idref="id35c28829e838498fae5440e3640e02fd" level="section">Sec. 608. Budget request documentation on funding for clearances.</toc-entry> <toc-entry idref="idFA07682BFD3A4813ABC8064CADF22050" level="section">Sec. 609. Reports on reciprocity for security clearances inside of departments and agencies.</toc-entry> <toc-entry idref="id4a9020a643ec48b2ad3c13957b67b40c" level="section">Sec. 610. Intelligence community reports on security clearances.</toc-entry> <toc-entry idref="id76E491BFE47F4CCBA921E80B106E64AC" level="section">Sec. 611. Periodic report on positions in the intelligence community which can be conducted without access to classified information, networks, or facilities.</toc-entry> <toc-entry idref="id34dd33b1a2ed4b688f56f696e31beea4" level="section">Sec. 612. Information sharing program for positions of trust.</toc-entry> <toc-entry idref="idFAEDD3EC0A3C4E58BD581F2D1ADB2FF2" level="section">Sec. 613. Report on protections for confidentiality of whistleblower-related communications.</toc-entry> <toc-entry idref="idE3EDB7FC84764B6EB4E959F69327FEF9" level="title">TITLE VII—Reports and other matters</toc-entry> <toc-entry idref="idC943857FA0B64911BC6BE26755D0418D" level="subtitle">Subtitle A—Matters relating to Russia and other foreign powers</toc-entry> <toc-entry idref="H2F0B799FD3E743DE9DE829AF780803C1" level="section">Sec. 701. Limitation relating to establishment or support of cybersecurity unit with the Government of Russia.</toc-entry> <toc-entry idref="H17C81FB3B20C486F81DDF69C9AD8F7EB" level="section">Sec. 702. Report on returning Russian compounds.</toc-entry> <toc-entry idref="H95C2AB39EA9640F99B6DEA874DD0B983" level="section">Sec. 703. Assessment of threat finance relating to Russia.</toc-entry> <toc-entry idref="H209BDA5670A646CA8170A97229735FDC" level="section">Sec. 704. Notification of an active measures campaign.</toc-entry> <toc-entry idref="H7850D8BBA986435882F8AAE28D2FF19C" level="section">Sec. 705. Notification of travel by accredited diplomatic and consular personnel of the Russian Federation in the United States.</toc-entry> <toc-entry idref="id5FD92BCDCAB344A090AB43537A5394FA" level="subtitle">Subtitle B—Reports</toc-entry> <toc-entry idref="HE6D25676F983488783EBE633B9CC6F55" level="section">Sec. 711. Technical correction to Inspector General study.</toc-entry> <toc-entry idref="H68670F3136A948018871399C7CA2831D" level="section">Sec. 712. Reports on authorities of the Chief Intelligence Officer of the Department of Homeland Security.</toc-entry> <toc-entry idref="HBEF37A9BBBDD4DF98A093256134DF66D" level="section">Sec. 713. Report on cyber exchange program.</toc-entry> <toc-entry idref="H38BB17BF5EF843F2B738684CFEA41237" level="section">Sec. 714. Report on role of Director of National Intelligence with respect to certain foreign investments.</toc-entry> <toc-entry idref="H25CB6456ABF041F8B094D40167CD4BD8" level="section">Sec. 715. Report on surveillance by foreign governments against United States telecommunications networks.</toc-entry> <toc-entry idref="HC15E20CE5FA740A1A27155F596D0F6D0" level="section">Sec. 716. Biennial report on foreign investment risks.</toc-entry> <toc-entry idref="H062A70000AD9483193D9DE02676EEE79" level="section">Sec. 717. Modification of certain reporting requirement on travel of foreign diplomats.</toc-entry> <toc-entry idref="H8DAB3AF5F7E44870ABF6D07BCE58366B" level="section">Sec. 718. Semiannual reports on investigations of unauthorized disclosures of classified information.</toc-entry> <toc-entry idref="id2977376B9E63420B90BC59D76981BE00" level="section">Sec. 719. Congressional notification of designation of covered intelligence officer as persona non grata.</toc-entry> <toc-entry idref="HB47DF4B73E0445C89F6CF10754E940B5" level="section">Sec. 720. Inspectors General reports on classification.</toc-entry> <toc-entry idref="H6819DAA3ADCD4904B428981834CDB580" level="section">Sec. 721. Reports on intelligence community participation in vulnerabilities equities process of Federal Government.</toc-entry> <toc-entry idref="id2B83A1B4652E4386A8E22A9457906205" level="section">Sec. 722. Reports on global water insecurity and national security implications.</toc-entry> <toc-entry idref="id02566CB4BD894E638CB84CE90CF2EEC4" level="section">Sec. 723. Annual report on memoranda of understanding between elements of intelligence community and other entities of the United States Government regarding significant operational activities or policy.</toc-entry> <toc-entry idref="idA3A6020804B943F38C4453529A3B22A8" level="section">Sec. 724. Repeal of report requirement for inspectors general of certain elements of intelligence community.</toc-entry> <toc-entry idref="idA00325E7A6314C3ABBCA019C669AC2DE" level="section">Sec. 725. Repeal of requirement for annual personnel level assessments for the intelligence community.</toc-entry> <toc-entry idref="idd6c11233ec94461fac36b2bc90866722" level="section">Sec. 726. Report on outreach strategy addressing threats from United States adversaries to the United States technology sector.</toc-entry> <toc-entry idref="idDD3F0010FC1E42728328251D24D70EC6" level="section">Sec. 727. Study on the feasibility of encrypting unclassified wireline and wireless telephone calls.</toc-entry> <toc-entry idref="idE097FBBDFED24536B3C16D8DE642389D" level="section">Sec. 728. Modification of requirement for annual report on hiring and retention of minority employees.</toc-entry> <toc-entry idref="id411DD04CB60841FEBB8BA1536048E82C" level="subtitle">Subtitle C—Other matters</toc-entry> <toc-entry idref="H1A53023D85D442FCA836ECCB70E856A3" level="section">Sec. 731. Technical amendments related to the Department of Energy.</toc-entry> <toc-entry idref="H1158EA6F89814F949766368DB69AC8E7" level="section">Sec. 732. Securing energy infrastructure.</toc-entry> <toc-entry idref="H7DCA77624F6B437A88D84725342C7159" level="section">Sec. 733. Sense of Congress on WikiLeaks.</toc-entry> <toc-entry idref="HD0735223E2FF453498DBBBF681F4EF1D" level="section">Sec. 734. Bug bounty programs.</toc-entry> <toc-entry idref="id82092BC3CC3940499A7DC8C6F026CE15" level="section">Sec. 735. Sense of Congress on consideration of espionage activities when considering whether or not to provide visas to foreign individuals to be accredited to a United Nations mission in the United States.</toc-entry> <toc-entry idref="id7321AF97D7964C8092A4A5343097D4A1" level="section">Sec. 736. Public Interest Declassification Board.</toc-entry> <toc-entry idref="id4411364217EC42D1848D7938BF1607DD" level="section">Sec. 737. Modification of authorities relating to the National Intelligence University.</toc-entry> </toc> </subsection></section><section commented="no" display-inline="no-display-inline" id="HDBC2F4B326AE441E8243AA8A5C78C55A" section-type="subsequent-section"><enum>2.</enum><header display-inline="yes-display-inline">Definitions</header><text display-inline="no-display-inline">In this Act:</text>
 <paragraph commented="no" display-inline="no-display-inline" id="H5D6D05BB9DCD4947BAB2637317A8EF9A"><enum>(1)</enum><header>Congressional intelligence committees</header><text display-inline="yes-display-inline">The term <term>congressional intelligence committees</term> has the meaning given such term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H96D6E4E9C1354138AB06D414AF75C006"><enum>(2)</enum><header>Intelligence community</header><text display-inline="yes-display-inline">The term <term>intelligence community</term> has the meaning given such term in such section.</text> </paragraph></section><title commented="no" id="HCBEB5522E6AA40EEA6EE65F9AD01D507" level-type="subsequent"><enum>I</enum><header display-inline="yes-display-inline">Intelligence Activities</header> <section commented="no" display-inline="no-display-inline" id="H2CE967185B4B481F94C34E4EA9E80B31" section-type="subsequent-section"><enum>101.</enum><header display-inline="yes-display-inline">Authorization of appropriations</header> <subsection id="H7BFBB09D5D0244EE98368CEC9AA62536"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Funds are hereby authorized to be appropriated for fiscal years 2018 and 2019 for the conduct of the intelligence and intelligence-related activities of the following elements of the United States Government:</text>
 <paragraph commented="no" display-inline="no-display-inline" id="HB1F0ADE1328E4DED99586C9B0EB9FC2E"><enum>(1)</enum><text display-inline="yes-display-inline">The Office of the Director of National Intelligence.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H33D08D14451A4598B8A80C63F3A97556"><enum>(2)</enum><text display-inline="yes-display-inline">The Central Intelligence Agency.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H56B2D43E6C3F44238C89114EF87E5421"><enum>(3)</enum><text display-inline="yes-display-inline">The Department of Defense.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H02DFCE73D7B849EEB804C2205069DAE1"><enum>(4)</enum><text display-inline="yes-display-inline">The Defense Intelligence Agency.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H3F4F4A2112694E7C82AE893B0A3A1217"><enum>(5)</enum><text display-inline="yes-display-inline">The National Security Agency.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H4900CBF106F04B3CA4EF42C3B9015346"><enum>(6)</enum><text display-inline="yes-display-inline">The Department of the Army, the Department of the Navy, and the Department of the Air Force.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="HDAA6A1FA27184BBAAA2F50765070B7ED"><enum>(7)</enum><text display-inline="yes-display-inline">The Coast Guard.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H2FCB79D0411B4343A6E01C8A63EF87AC"><enum>(8)</enum><text display-inline="yes-display-inline">The Department of State.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="HBBAE06D1712446B29451ED937CAACD6D"><enum>(9)</enum><text display-inline="yes-display-inline">The Department of the Treasury.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H047C5B9918B142028BBFC1DEA1853892"><enum>(10)</enum><text display-inline="yes-display-inline">The Department of Energy.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="HDAF26E5594084AE2B6DA11C535236BB3"><enum>(11)</enum><text display-inline="yes-display-inline">The Department of Justice.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H0632D90101034BFAAFE05F24DC98B651"><enum>(12)</enum><text display-inline="yes-display-inline">The Federal Bureau of Investigation.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H466A8179ABEF4A278DE56BC526A9D6DC"><enum>(13)</enum><text display-inline="yes-display-inline">The Drug Enforcement Administration.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H930804BAD0BD4705ACC43E245BD8CFAA"><enum>(14)</enum><text display-inline="yes-display-inline">The National Reconnaissance Office.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H5CDED1C426B8485681CD8188113004A8"><enum>(15)</enum><text display-inline="yes-display-inline">The National Geospatial-Intelligence Agency.</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H708B12E3CB254B15A2E654F8CE92A896"><enum>(16)</enum><text display-inline="yes-display-inline">The Department of Homeland Security.</text>
 </paragraph></subsection><subsection id="H93FCAA346F904CA3A61EC2A8EE3233FB"><enum>(b)</enum><header>Certain specific authorization</header><text display-inline="yes-display-inline">Funds appropriated by the Department of Defense Missile Defeat and Defense Enhancements Appropriations Act, 2018 (division B of <external-xref legal-doc="public-law" parsable-cite="pl/115/96">Public Law 115–96</external-xref>) for intelligence or intelligence-related activities are specifically authorized by Congress for purposes of section 504 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3094">50 U.S.C. 3094</external-xref>), as specified in the classified Schedule of Authorizations pursuant to section 102, and are subject to such section 504.</text>
				</subsection><subsection id="id665909320F0C4EAE8B33DFCDF9774396"><enum>(c)</enum><header>Limitation on certain waivers from limitations on funding of intelligence activities</header>
 <paragraph id="id47DF0F89E68E42D4B5E5D5E5B4750CBE"><enum>(1)</enum><header>Waivers for covert actions</header><text display-inline="yes-display-inline">Section 504 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3094">50 U.S.C. 3094</external-xref>) is amended—</text> <subparagraph id="id5A944D6DADF048C88339759D02AFDF84"><enum>(A)</enum><text>by redesignating subsection (e) as subsection (f); and</text>
 </subparagraph><subparagraph id="id22280FE9E36C47E49C9189AA6A086E39"><enum>(B)</enum><text>by inserting after subsection (d) the following:</text> <quoted-block display-inline="no-display-inline" id="idDAA9381CD0F540F281E019BD1671D524" style="OLC"> <subsection id="id1F4D444BD02D476892AA3D5A4A0E3316"><enum>(e)</enum><text>This section cannot be waived for any covert action (as defined in section 503(e)) unless and until the Director of National Intelligence notifies the congressional intelligence committees that the action is urgent for national security purposes.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
 </subparagraph></paragraph><paragraph id="idaf94ec861852496cb80a267d145bef51"><enum>(2)</enum><header>Waivers for major systems acquisitions</header><text>Such section, as amended by paragraph (1), is further amended—</text> <subparagraph id="id48aa86ea4d014f83a484fe01c1a4767a"><enum>(A)</enum><text>by redesignating subsection (f) as subsection (g); and</text>
 </subparagraph><subparagraph id="idb0a965843ffc4ee58b87d63dd55db6a7"><enum>(B)</enum><text>by inserting after subsection (e), as added by paragraph (1), the following:</text> <quoted-block display-inline="no-display-inline" id="id396735187311493ca69dcb327470521d" style="OLC"> <subsection id="id4347874ee4af495d91733cc68781f616"><enum>(f)</enum><text>This section cannot be waived for any major system (as defined in section 506A(e)) acquisition unless and until the Director of National Intelligence notifies the congressional intelligence committees that the action is urgent for national security purposes.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
						</subparagraph></paragraph></subsection></section><section id="HC376624968924B2CAC0E289F3D6EAA4B"><enum>102.</enum><header>Classified Schedules of Authorizations</header>
				<subsection id="H7027F807078F403B812FB209AC938D2A"><enum>(a)</enum><header>Specifications of amounts and personnel levels</header>
 <paragraph id="idCC657A2392644C2F8A28D910A1289218"><enum>(1)</enum><header>Fiscal year 2018</header><text>The amounts authorized to be appropriated under section 101 and, subject to section 103, the authorized personnel ceilings as of September 30, 2018, for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations for fiscal year 2018 prepared to accompany this Act.</text>
 </paragraph><paragraph id="id258B202FF54145CB8D1A731D9D149837"><enum>(2)</enum><header>Fiscal year 2019</header><text>The amounts authorized to be appropriated under section 101 and, subject to section 103, the authorized personnel ceilings as of September 30, 2019, for the conduct of the intelligence activities of the elements listed in paragraphs (1) through (16) of section 101, are those specified in the classified Schedule of Authorizations for fiscal year 2019 prepared to accompany this Act.</text>
					</paragraph></subsection><subsection id="H0061358228F94297B391CFA9CD576536"><enum>(b)</enum><header>Availability of classified schedules of authorizations</header>
 <paragraph id="H384BEB619E234B97892649FD849E1E10"><enum>(1)</enum><header>Availability</header><text>The classified Schedules of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President.</text>
 </paragraph><paragraph id="H251F0CD366874C9988E726EA08E3C9B9"><enum>(2)</enum><header>Distribution by the President</header><text>Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedules of Authorizations referred to in subsection (a), or of appropriate portions of such Schedule, within the executive branch.</text>
 </paragraph><paragraph id="HC58E1BC461584CB89C184FAAC08D3361"><enum>(3)</enum><header>Limits on disclosure</header><text>The President shall not publicly disclose the classified Schedules of Authorizations or any portion of such Schedule except—</text>
 <subparagraph id="H7DFE8ED17DE84564A148B1FCF3A01A43"><enum>(A)</enum><text>as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (<external-xref legal-doc="usc" parsable-cite="usc/50/3306">50 U.S.C. 3306(a)</external-xref>);</text>
 </subparagraph><subparagraph id="H4B070DA13F17495EA81142ECF43D6BCE"><enum>(B)</enum><text>to the extent necessary to implement the budget; or</text> </subparagraph><subparagraph id="HAB5F28082C7944888A7FBDB8A8F137A2"><enum>(C)</enum><text>as otherwise required by law.</text>
						</subparagraph></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="HE4A81C9E59304F3D8919154DE3C99902" section-type="subsequent-section"><enum>103.</enum><header>Personnel ceiling adjustments</header>
 <subsection commented="no" display-inline="no-display-inline" id="H5A724278CBA645F7B3494E342DAB74D5"><enum>(a)</enum><header>Authority for increases</header><text>The Director of National Intelligence may authorize employment of civilian personnel in excess of the number authorized for fiscal year 2018 by the classified Schedules of Authorizations referred to in section 102(a) if the Director of National Intelligence determines that such action is necessary to the performance of important intelligence functions, except that the number of personnel employed in excess of the number authorized under such section may not, for any element of the intelligence community, exceed—</text>
 <paragraph commented="no" id="HAA44A3723CF442278D3843BE24AE9532"><enum>(1)</enum><text>3 percent of the number of civilian personnel authorized under such schedule for such element; or</text> </paragraph><paragraph commented="no" id="HE664757E9EB04891A1F230B398F8ABE6"><enum>(2)</enum><text>10 percent of the number of civilian personnel authorized under such schedule for such element for the purposes of converting the performance of any function by contractors to performance by civilian personnel.</text>
 </paragraph></subsection><subsection commented="no" id="H2B0970C64FE544BFBCF43E027E52EDF2"><enum>(b)</enum><header>Treatment of certain personnel</header><text>The Director of National Intelligence shall establish guidelines that govern, for each element of the intelligence community, the treatment under the personnel levels authorized under section 102(a), including any exemption from such personnel levels, of employment or assignment in—</text>
 <paragraph commented="no" id="H1CA180E2377E4CC886E271C4690B787D"><enum>(1)</enum><text>a student program, trainee program, or similar program;</text> </paragraph><paragraph commented="no" id="H44DA22B6C26D4BDA8F8D20E533441F5E"><enum>(2)</enum><text>a reserve corps or as a reemployed annuitant; or</text>
 </paragraph><paragraph commented="no" id="H065C052BD9F547AAB215B5C0458C330C"><enum>(3)</enum><text>details, joint duty, or long-term, full-time training.</text> </paragraph></subsection><subsection commented="no" id="HC67FD863A7F94E6FA306ED221F944229"><enum>(c)</enum><header>Notice to congressional intelligence committees</header><text display-inline="yes-display-inline">Not later than 15 days prior to the exercise of an authority described in subsection (a), the Director of National Intelligence shall submit to the congressional intelligence committees—</text>
 <paragraph id="H45C553E80EB041318AAD1BFC291BBD26"><enum>(1)</enum><text display-inline="yes-display-inline">a written notice of the exercise of such authority; and</text> </paragraph><paragraph id="HD242914A0E894E55A46C2D4062C1D2F5"><enum>(2)</enum><text display-inline="yes-display-inline">in the case of an exercise of such authority subject to the limitation in subsection (a)(2), a written justification for the contractor conversion that includes a comparison of whole-of-government costs.</text>
					</paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="HC0A23AF50B2145F6A9AD09ADF3EE0861" section-type="subsequent-section"><enum>104.</enum><header display-inline="yes-display-inline">Intelligence Community Management Account</header>
				<subsection commented="no" display-inline="no-display-inline" id="HD76716F948A54444ADFE329388AF765A"><enum>(a)</enum><header display-inline="yes-display-inline">Authorization of appropriations</header>
 <paragraph commented="no" display-inline="no-display-inline" id="id10EF75BE8C7F4E0D8969985E5E49409C"><enum>(1)</enum><header>Fiscal year 2018</header><text display-inline="yes-display-inline">There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2018 the sum of $546,900,000. Within such amount, funds identified in the classified Schedule of Authorizations referred to in section 102(a) for advanced research and development shall remain available until September 30, 2019.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5F037FADEF4342E9BC568B51EEFF6B8C"><enum>(2)</enum><header>Fiscal year 2019</header><text display-inline="yes-display-inline">There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2019 the sum of $539,624,000. Within such amount, funds identified in the classified Schedule of Authorizations referred to in section 102(a) for advanced research and development shall remain available until September 30, 2020.</text>
 </paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H22872C81C2F5404FB3AA02B1B27ADB90"><enum>(b)</enum><header>Authorized personnel levels</header><text>The elements within the Intelligence Community Management Account of the Director of National Intelligence are authorized 797 positions as of September 30, 2018. Personnel serving in such elements may be permanent employees of the Office of the Director of National Intelligence or personnel detailed from other elements of the United States Government.</text>
				</subsection><subsection commented="no" display-inline="no-display-inline" id="H96EEB8FEAEB24B39BA258C5AA65335E7"><enum>(c)</enum><header display-inline="yes-display-inline">Classified authorizations</header>
					<paragraph commented="no" display-inline="no-display-inline" id="HC9CFEB96DFB7422C90B89F89BC28EB03"><enum>(1)</enum><header>Authorization of appropriations</header>
 <subparagraph commented="no" display-inline="no-display-inline" id="idF4F4141B06394F389AA49FC87172AE8F"><enum>(A)</enum><header>Fiscal year 2018</header><text display-inline="yes-display-inline">In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Intelligence Community Management Account for fiscal year 2018 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). Such additional amounts made available for advanced research and development shall remain available until September 30, 2019.</text>
 </subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idE23C7BEA4DDB42CDADF2A8ADE2912EF4"><enum>(B)</enum><header>Fiscal year 2019</header><text>In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Intelligence Community Management Account for fiscal year 2019 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a). Such additional amounts made available for advanced research and development shall remain available until September 30, 2020.</text>
 </subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HA59C3A8DE51A47A19A27A80B4665A063"><enum>(2)</enum><header>Authorization of personnel</header><text>In addition to the personnel authorized by subsection (b) for elements of the Intelligence Community Management Account as of September 30, 2018, there are authorized such additional personnel for the Community Management Account as of that date as are specified in the classified Schedule of Authorizations referred to in section 102(a).</text>
					</paragraph></subsection></section></title><title commented="no" id="HA008175EC88345F1BB4A010A539CB3AA" level-type="subsequent"><enum>II</enum><header display-inline="yes-display-inline">Central Intelligence Agency Retirement and Disability System</header>
 <section commented="no" display-inline="no-display-inline" id="H2503AD8E26094BC7991C6E094BB21C8E" section-type="subsequent-section"><enum>201.</enum><header display-inline="yes-display-inline">Authorization of appropriations</header><text display-inline="no-display-inline">There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund $514,000,000 for each of fiscal years 2018 and 2019.</text>
			</section><section id="HA8F609FCA8DD4760AD8E72710B9FF27C"><enum>202.</enum><header>Computation of annuities for employees of the Central Intelligence Agency</header>
				<subsection id="H4BE8499A4E69442EAFF38FDC87EE35A7"><enum>(a)</enum><header>Computation of annuities</header>
 <paragraph id="H53A1B1360EB949AFA39E063945A1FD22"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Section 221 of the Central Intelligence Agency Retirement Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2031">50 U.S.C. 2031</external-xref>) is amended—</text> <subparagraph id="HD4755D0B554643E59A086048AFE5858E"><enum>(A)</enum><text display-inline="yes-display-inline">in subsection (a)(3)(B), by striking the period at the end and inserting <quote>, as determined by using the annual rate of basic pay that would be payable for full-time service in that position.</quote>;</text>
 </subparagraph><subparagraph id="H3D6DE79E88E6465D96797CEA3C70B0EA"><enum>(B)</enum><text display-inline="yes-display-inline">in subsection (b)(1)(C)(i), by striking <quote>12-month</quote> and inserting <quote>2-year</quote>;</text> </subparagraph><subparagraph id="H0AF190EBF97848AC9A44CEC007CCFD3C"><enum>(C)</enum><text>in subsection (f)(2), by striking <quote>one year</quote> and inserting <quote>two years</quote>;</text>
 </subparagraph><subparagraph id="H81CA239AADEA4792B1026533D54A32BF"><enum>(D)</enum><text>in subsection (g)(2), by striking <quote>one year</quote> each place such term appears and inserting <quote>two years</quote>;</text> </subparagraph><subparagraph commented="no" id="H7DBC50DB2C0642E4909E4C794757E207"><enum>(E)</enum><text>by redesignating subsections (h), (i), (j), (k), and (l) as subsections (i), (j), (k), (l), and (m), respectively; and</text>
 </subparagraph><subparagraph commented="no" id="H93FC2460429C41A190D6EC6D0E5E84FE"><enum>(F)</enum><text>by inserting after subsection (g) the following:</text> <quoted-block display-inline="no-display-inline" id="H283E706EF30543C68638C2DA5B883A78" style="OLC"> <subsection id="HC621E184BECE41D98114BC705636D60F"><enum>(h)</enum><header>Conditional election of insurable interest survivor annuity by participants married at the time of retirement</header> <paragraph id="H9ACAE4404C7D48F3B6B4D164C310E182"><enum>(1)</enum><header> Authority to make designation</header><text>Subject to the rights of former spouses under subsection (b) and section 222, at the time of retirement a married participant found by the Director to be in good health may elect to receive an annuity reduced in accordance with subsection (f)(1)(B) and designate in writing an individual having an insurable interest in the participant to receive an annuity under the system after the participant's death, except that any such election to provide an insurable interest survivor annuity to the participant's spouse shall only be effective if the participant's spouse waives the spousal right to a survivor annuity under this Act. The amount of the annuity shall be equal to 55 percent of the participant's reduced annuity.</text>
 </paragraph><paragraph id="H28A2395E12524BA9BA6434B507931420"><enum>(2)</enum><header>Reduction in participant's annuity</header><text>The annuity payable to the participant making such election shall be reduced by 10 percent of an annuity computed under subsection (a) and by an additional 5 percent for each full 5 years the designated individual is younger than the participant. The total reduction under this subparagraph may not exceed 40 percent.</text>
 </paragraph><paragraph id="H5C8E97445FD046159283A6C6AD4C041A"><enum>(3)</enum><header>Commencement of survivor annuity</header><text>The annuity payable to the designated individual shall begin on the day after the day that the retired participant dies and terminate on the last day of the month before the designated individual dies.</text>
 </paragraph><paragraph id="H207243AA9289405CAD64A7D3DECAB241"><enum>(4)</enum><header>Recomputation of participant's annuity on death of designated individual</header><text>An annuity that is reduced under this subsection shall, effective the first day of the month following the death of the designated individual, be recomputed and paid as if the annuity had not been so reduced.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
						</subparagraph></paragraph><paragraph commented="no" id="HB277CAA9E2734383A47C254E036FB224"><enum>(2)</enum><header>Conforming amendments</header>
 <subparagraph commented="no" id="HF461A8F5B3CE41E99B8C91F8B50DA99D"><enum>(A)</enum><header>Central Intelligence Agency Retirement Act</header><text>The Central Intelligence Agency Retirement Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2001">50 U.S.C. 2001</external-xref> et seq.) is amended—</text> <clause commented="no" id="H7DA83EF16571475193C6CE54D3BE91BC"><enum>(i)</enum><text>in section 232(b)(1) (<external-xref legal-doc="usc" parsable-cite="usc/50/2052">50 U.S.C. 2052(b)(1)</external-xref>), by striking <quote>221(h),</quote> and inserting <quote>221(i),</quote>; and</text>
 </clause><clause commented="no" id="HCF7AE65165644391AAB4BFD4E63C4434"><enum>(ii)</enum><text>in section 252(h)(4) (<external-xref legal-doc="usc" parsable-cite="usc/50/2082">50 U.S.C. 2082(h)(4)</external-xref>), by striking <quote>221(k)</quote> and inserting <quote>221(l)</quote>.</text> </clause></subparagraph><subparagraph commented="no" id="H65A75D6187F84400A7292A01A4F38672"><enum>(B)</enum><header>Central Intelligence Agency Act of 1949</header><text>Subsection (a) of section 14 of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3514">50 U.S.C. 3514(a)</external-xref>) is amended by striking <quote>221(h)(2), 221(i), 221(l),</quote> and inserting <quote>221(i)(2), 221(j), 221(m),</quote>.</text>
 </subparagraph></paragraph></subsection><subsection commented="no" id="HD8962165092C4CE183A9E6E3B1EBEF24"><enum>(b)</enum><header>Annuities for former spouses</header><text>Subparagraph (B) of section 222(b)(5) of the Central Intelligence Agency Retirement Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2032">50 U.S.C. 2032(b)(5)(B)</external-xref>) is amended by striking <quote>one year</quote> and inserting <quote>two years</quote>.</text>
 </subsection><subsection commented="no" id="HDEA5BBE9CB404218B2D9EE18C0A8E7CA"><enum>(c)</enum><header>Prior service credit</header><text>Subparagraph (A) of section 252(b)(3) of the Central Intelligence Agency Retirement Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2082">50 U.S.C. 2082(b)(3)(A)</external-xref>) is amended by striking <quote>October 1, 1990</quote> both places that term appears and inserting <quote>March 31, 1991</quote>.</text>
 </subsection><subsection commented="no" id="H07D8AEE609BE442FA0F1ED930AD05573"><enum>(d)</enum><header>Reemployment compensation</header><text>Section 273 of the Central Intelligence Agency Retirement Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2113">50 U.S.C. 2113</external-xref>) is amended—</text> <paragraph commented="no" id="HD7F8D01CAA56412DBB582903ED2B1603"><enum>(1)</enum><text>by redesignating subsections (b) and (c) as subsections (c) and (d), respectively; and</text>
 </paragraph><paragraph commented="no" id="H49615DBD85CC49AF91B5736D918CAF02"><enum>(2)</enum><text>by inserting after subsection (a) the following:</text> <quoted-block display-inline="no-display-inline" id="H36A80B5590DC48DE855CBD5E4968A720" style="OLC"> <subsection commented="no" id="H80CA9940D494430187A791510D68F356"><enum>(b)</enum><header>Part-Time reemployed annuitants</header><text>The Director shall have the authority to reemploy an annuitant on a part-time basis in accordance with section 8344(l) of title 5, United States Code.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph></subsection><subsection commented="no" id="H09540E7CCD7A42E285533BF5706563FE"><enum>(e)</enum><header>Effective date and application</header><text>The amendments made by subsection (a)(1)(A) and subsection (c) shall take effect as if enacted on October 28, 2009, and shall apply to computations or participants, respectively, as of such date.</text>
				</subsection></section></title><title id="HDB5694AC2AF1454E81C6D2E1428660D1"><enum>III</enum><header>General Intelligence Community Matters</header>
 <section commented="no" display-inline="no-display-inline" id="H6688A0FF57E34BEDB123B47BFCD4D468" section-type="subsequent-section"><enum>301.</enum><header>Restriction on conduct of intelligence activities</header><text display-inline="no-display-inline">The authorization of appropriations by this Act shall not be deemed to constitute authority for the conduct of any intelligence activity that is not otherwise authorized by the Constitution or the laws of the United States.</text>
 </section><section commented="no" display-inline="no-display-inline" id="H588B66548A714D07B62DC70FEA084FA1" section-type="subsequent-section"><enum>302.</enum><header>Increase in employee compensation and benefits authorized by law</header><text display-inline="no-display-inline">Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law.</text>
			</section><section display-inline="no-display-inline" id="H2C29A5B8DBC14C158F1C7D65A3B62203"><enum>303.</enum><header>Modification of special pay authority for science, technology, engineering, or mathematics
 positions and addition of special pay authority for cyber positions</header><text display-inline="no-display-inline">Section 113B of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3049a">50 U.S.C. 3049a</external-xref>) is amended—</text> <paragraph display-inline="no-display-inline" id="HAE1A5F436821478394ACC997D1A739DC"><enum>(1)</enum><text display-inline="yes-display-inline">by amending subsection (a) to read as follows:</text>
					<quoted-block display-inline="no-display-inline" id="H5B352F2033A644D49C52A2AA3113E8AE" style="OLC">
						<subsection commented="no" display-inline="no-display-inline" id="H5ED5AE8B2B43411DA6CA32C790D3BFEF"><enum>(a)</enum><header display-inline="yes-display-inline">Special rates of pay for positions requiring expertise in science, technology, engineering, or
			 mathematics</header>
 <paragraph commented="no" display-inline="no-display-inline" id="H2FBC59177609480DA3DAA56827980710"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Notwithstanding part III of title 5, United States Code, the head of each element of the intelligence community may, for 1 or more categories of positions in such element that require expertise in science, technology, engineering, or mathematics—</text>
 <subparagraph commented="no" display-inline="no-display-inline" id="H43CC1497FBF74BFCBA4E85D56ABD791A"><enum>(A)</enum><text display-inline="yes-display-inline">establish higher minimum rates of pay; and</text> </subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H5C4D2EF4220A4DA09A31DE9387941D48"><enum>(B)</enum><text display-inline="yes-display-inline">make corresponding increases in all rates of pay of the pay range for each grade or level, subject to subsection (b) or (c), as applicable.</text>
 </subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HAC534A51F6CA432F83D68DC93FF911A3"><enum>(2)</enum><header>Treatment</header><text display-inline="yes-display-inline">The special rate supplements resulting from the establishment of higher rates under paragraph (1) shall be basic pay for the same or similar purposes as those specified in section 5305(j) of title 5, United States Code.</text></paragraph></subsection><after-quoted-block>;</after-quoted-block></quoted-block>
 </paragraph><paragraph display-inline="no-display-inline" id="H8EFBB31E491243CF80EB0EAECE2289DF"><enum>(2)</enum><text>by redesignating subsections (b) through (f) as subsections (c) through (g), respectively;</text> </paragraph><paragraph display-inline="no-display-inline" id="HB4900621BDB746E2A84B90BC6E3F9950"><enum>(3)</enum><text>by inserting after subsection (a) the following:</text>
					<quoted-block display-inline="no-display-inline" id="H2DE69DD05EC940449C3B384B0FFDF153" style="OLC">
						<subsection id="H6B0B9CFC78D749B58A0E4CC3629FA7BF"><enum>(b)</enum><header>Special rates of pay for cyber positions</header>
 <paragraph id="H5D0C9391B2C542A4AFB4C660EDC6A341"><enum>(1)</enum><header>In general</header><text>Notwithstanding subsection (c), the Director of the National Security Agency may establish a special rate of pay—</text>
 <subparagraph id="HAFB56F409CDE4E6A821FE41238765CB1"><enum>(A)</enum><text>not to exceed the rate of basic pay payable for level II of the Executive Schedule under section 5313 of title 5, United States Code, if the Director certifies to the Under Secretary of Defense for Intelligence, in consultation with the Under Secretary of Defense for Personnel and Readiness, that the rate of pay is for positions that perform functions that execute the cyber mission of the Agency; or</text>
 </subparagraph><subparagraph id="H33300332AB41478F9E9E87E858A94012"><enum>(B)</enum><text>not to exceed the rate of basic pay payable for the Vice President of the United States under section 104 of title 3, United States Code, if the Director certifies to the Secretary of Defense, by name, individuals that have advanced skills and competencies and that perform critical functions that execute the cyber mission of the Agency.</text>
 </subparagraph></paragraph><paragraph id="H00B8F0D48FB1485089563EAB8CDA0E8D"><enum>(2)</enum><header>Pay limitation</header><text>Employees receiving a special rate under paragraph (1) shall be subject to an aggregate pay limitation that parallels the limitation established in section 5307 of title 5, United States Code, except that—</text>
 <subparagraph id="H1101343A063C4151B96D5ED5E107DEFA"><enum>(A)</enum><text display-inline="yes-display-inline">any allowance, differential, bonus, award, or other similar cash payment in addition to basic pay that is authorized under title 10, United States Code (or any other applicable law in addition to title 5 of such Code, excluding the Fair Labor Standards Act of 1938 (<external-xref legal-doc="usc" parsable-cite="usc/29/201">29 U.S.C. 201</external-xref> et seq.)) shall also be counted as part of aggregate compensation; and</text>
 </subparagraph><subparagraph id="H08A14C02FDE04E378CCE94EE4E35B3DA"><enum>(B)</enum><text>aggregate compensation may not exceed the rate established for the Vice President of the United States under section 104 of title 3, United States Code.</text>
 </subparagraph></paragraph><paragraph id="HCF0AC0160B034B5592EB2B21E591AE25"><enum>(3)</enum><header>Limitation on number of recipients</header><text>The number of individuals who receive basic pay established under paragraph (1)(B) may not exceed 100 at any time.</text>
 </paragraph><paragraph id="H95B90F9AC4B1438BBE72F9EC2F230E8B"><enum>(4)</enum><header>Limitation on use as comparative reference</header><text>Notwithstanding any other provision of law, special rates of pay and the limitation established under paragraph (1)(B) may not be used as comparative references for the purpose of fixing the rates of basic pay or maximum pay limitations of qualified positions under section 1599f of title 10, United States Code, or section 226 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/147">6 U.S.C. 147</external-xref>).</text></paragraph></subsection><after-quoted-block>;</after-quoted-block></quoted-block>
 </paragraph><paragraph display-inline="no-display-inline" id="H0983CB45728C45B5A2641E823BE75D92"><enum>(4)</enum><text>in subsection (c), as redesignated by paragraph (2), by striking <quote>A minimum</quote> and inserting <quote>Except as provided in subsection (b), a minimum</quote>;</text> </paragraph><paragraph id="H807215CA21AB42AEA56B35CF4889F3DF"><enum>(5)</enum><text display-inline="yes-display-inline">in subsection (d), as redesignated by paragraph (2), by inserting <quote>or (b)</quote> after <quote>by subsection (a)</quote>; and</text>
 </paragraph><paragraph id="H4AD1E91D2FDC4FAD9B59F83201C56295"><enum>(6)</enum><text>in subsection (g), as redesignated by paragraph (2)—</text> <subparagraph id="H4FFFF090FF994AAD936EDEBAE9736A27"><enum>(A)</enum><text display-inline="yes-display-inline">in paragraph (1), by striking <quote>Not later than 90 days after the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2017</quote> and inserting <quote>Not later than 90 days after the date of the enactment of the <short-title>Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018 and 2019</short-title></quote>; and</text>
 </subparagraph><subparagraph commented="no" id="HD61E88E3062F4B4BBE78092124CE5295"><enum>(B)</enum><text>in paragraph (2)(A), by inserting <quote>or (b)</quote> after <quote>subsection (a)</quote>.</text> </subparagraph></paragraph></section><section commented="no" display-inline="no-display-inline" id="H9526AF17BC0340188BD8815B16879B44" section-type="subsequent-section"><enum>304.</enum><header display-inline="yes-display-inline">Modification of appointment of Chief Information Officer of the Intelligence Community</header><text display-inline="no-display-inline">Section 103G(a) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3032">50 U.S.C. 3032(a)</external-xref>) is amended by striking <quote>President</quote> and inserting <quote>Director</quote>.</text>
			</section><section id="HCADCB55544824CB9BC96EAA917C351BD"><enum>305.</enum><header>Director of National Intelligence review of placement of positions within the intelligence
			 community on the Executive Schedule</header>
 <subsection id="H58045209603B484A9DE15E8FFD9899DB"><enum>(a)</enum><header>Review</header><text display-inline="yes-display-inline">The Director of National Intelligence, in coordination with the Director of the Office of Personnel Management, shall conduct a review of positions within the intelligence community regarding the placement of such positions on the Executive Schedule under subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/5/53">chapter 53</external-xref> of title 5, United States Code. In carrying out such review, the Director of National Intelligence, in coordination with the Director of the Office of Personnel Management, shall determine—</text>
 <paragraph id="H204D78EF0055468BBD9CCD46BDC324E2"><enum>(1)</enum><text display-inline="yes-display-inline">the standards under which such review will be conducted;</text> </paragraph><paragraph id="H3696C4F510434BBE953C01C84E35823D"><enum>(2)</enum><text>which positions should or should not be on the Executive Schedule; and</text>
 </paragraph><paragraph id="HA3FC8CBE633349D790F0BD24A4F34675"><enum>(3)</enum><text>for those positions that should be on the Executive Schedule, the level of the Executive Schedule at which such positions should be placed.</text>
 </paragraph></subsection><subsection id="H8595CBEF6B014794A3A367C7098EA494"><enum>(b)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 60 days after the date on which the review under subsection (a) is completed, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Oversight and Government Reform of the House of Representatives an unredacted report describing the standards by which the review was conducted and the outcome of the review.</text>
				</subsection></section><section id="H74DF571A80E4489A854CBD69D3432CE4"><enum>306.</enum><header>Supply Chain and Counterintelligence Risk Management Task Force</header>
 <subsection id="H306F5BFB18D34E30AA48FDC2BB804873"><enum>(a)</enum><header>Requirement to establish</header><text>The Director of National Intelligence shall establish a Supply Chain and Counterintelligence Risk Management Task Force to standardize information sharing between the intelligence community and the acquisition community of the United States Government with respect to the supply chain and counterintelligence risks.</text>
 </subsection><subsection id="H458AA82007424788B870D5E852B7B2F0"><enum>(b)</enum><header>Members</header><text>The Supply Chain and Counterintelligence Risk Management Task Force established under subsection (a) shall be composed of—</text>
 <paragraph id="H5CABEE97B70046319E431202E6496DE3"><enum>(1)</enum><text>a representative of the Defense Security Service of the Department of Defense;</text> </paragraph><paragraph id="HA72066B91F0745219E6D934A9DDDE3F9"><enum>(2)</enum><text>a representative of the General Services Administration;</text>
 </paragraph><paragraph id="HEB8B4086275D4A0794CE9F63F14CEA8F"><enum>(3)</enum><text>a representative of the Office of Federal Procurement Policy of the Office of Management and Budget;</text>
 </paragraph><paragraph id="H77E06ADAE0A740DC8D04684035C567D2"><enum>(4)</enum><text>a representative of the Department of Homeland Security;</text> </paragraph><paragraph id="H236099C2E0C44C1994A3A61B3A2113D7"><enum>(5)</enum><text display-inline="yes-display-inline">the Director of the National Counterintelligence and Security Center; and</text>
 </paragraph><paragraph id="H8654B59B4F5A4EAB8B2877E84C6D48F1"><enum>(6)</enum><text>such other members as the Director of National Intelligence determines appropriate.</text> </paragraph></subsection><subsection id="HF526F63B9A31415891C65C3371BB1E29"><enum>(c)</enum><header>Security clearances</header><text display-inline="yes-display-inline">Each member of the Supply Chain and Counterintelligence Risk Management Task Force established under subsection (a) shall have a security clearance at the top secret level and be able to access sensitive compartmented information.</text>
				</subsection><subsection id="HCB5421055DFA470AAF96CBD6461E681D"><enum>(d)</enum><header>Annual report</header>
 <paragraph id="id81FEF57BC0DE4078AF79357FDF95A095"><enum>(1)</enum><header>In general</header><text>Not less frequently than once each year, the Supply Chain and Counterintelligence Risk Management Task Force established under subsection (a) shall submit to the appropriate congressional committees a report that describes the activities of the Task Force during the previous year, including identification of the supply chain and counterintelligence risks shared with the acquisition community of the United States Government by the intelligence community.</text>
 </paragraph><paragraph id="H99CCC41AE6EF4687B01701D3ABE613C2"><enum>(2)</enum><header>Appropriate congressional committees defined</header><text>In this subsection, the term <term>appropriate congressional committees</term> means the following:</text> <subparagraph id="HF32973D196124AB88F27107D872A707C"><enum>(A)</enum><text display-inline="yes-display-inline">The congressional intelligence committees.</text>
 </subparagraph><subparagraph id="H0629D6FB92F8468CB0D5E59D8FC71613"><enum>(B)</enum><text display-inline="yes-display-inline">The Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate.</text>
 </subparagraph><subparagraph id="HD43A707D2E384729A4CEB2102B295900"><enum>(C)</enum><text display-inline="yes-display-inline">The Committee on Armed Services, the Committee on Homeland Security, and the Committee on Oversight and Government Reform of the House of Representatives.</text>
						</subparagraph></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="id8791FB886AA64C94A5EB9D106EFB0857" section-type="subsequent-section"><enum>307.</enum><header display-inline="yes-display-inline">Consideration of adversarial telecommunications and cybersecurity
			 infrastructure when
			 sharing intelligence with foreign
 governments and entities</header><text display-inline="no-display-inline">Whenever the head of an element of the intelligence community enters into an intelligence sharing agreement with a foreign government or any other foreign entity, the head of the element shall consider the pervasiveness of telecommunications and cybersecurity infrastructure, equipment, and services provided by adversaries of the United States, particularly China and Russia, or entities of such adversaries in the country or region of the foreign government or other foreign entity entering into the agreement.</text>
			</section><section id="id1ee18fbfa26842f2ba17ffd9dbe0ee97"><enum>308.</enum><header>Cyber protection support for the personnel of the intelligence community in positions highly
			 vulnerable to cyber attack</header>
 <subsection id="id5894a83c28d64ebba8c8c4bee9e9aaef"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="idEE7AB7C950934620BFAECD4F8A2A5C12"><enum>(1)</enum><header>Personal accounts</header><text>The term <term>personal accounts</term> means accounts for online and telecommunications services, including telephone, residential Internet access, email, text and multimedia messaging, cloud computing, social media, health care, and financial services, used by personnel of the intelligence community outside of the scope of their employment with elements of the intelligence community.</text>
 </paragraph><paragraph id="id16A238BB974E44EA858C27005EBAA6A0"><enum>(2)</enum><header>Personal technology devices</header><text>The term <term>personal technology devices</term> means technology devices used by personnel of the intelligence community outside of the scope of their employment with elements of the intelligence community, including networks to which such devices connect.</text>
					</paragraph></subsection><subsection id="id3AF3AFC415E44BAAAC358FBE80B16179"><enum>(b)</enum><header>Authority to provide cyber protection support</header>
 <paragraph id="id4fbfca9cf90247969351248c85b3f5e5"><enum>(1)</enum><header>In general</header><text>Subject to a determination by the Director of National Intelligence, the Director may provide cyber protection support for the personal technology devices and personal accounts of the personnel described in paragraph (2).</text>
 </paragraph><paragraph id="id043379aa40cf4c75bd72a5992bc3c5a1"><enum>(2)</enum><header>At-risk personnel</header><text>The personnel described in this paragraph are personnel of the intelligence community—</text> <subparagraph id="id991a836bf2d6457084e463fa3983d773"><enum>(A)</enum><text>who the Director determines to be highly vulnerable to cyber attacks and hostile information collection activities because of the positions occupied by such personnel in the intelligence community; and</text>
 </subparagraph><subparagraph id="id0425691359da45bf93bc1626877c76bf"><enum>(B)</enum><text>whose personal technology devices or personal accounts are highly vulnerable to cyber attacks and hostile information collection activities.</text>
 </subparagraph></paragraph></subsection><subsection id="id826bb27bf0314232b9452caf59261d79"><enum>(c)</enum><header>Nature of cyber protection support</header><text>Subject to the availability of resources, the cyber protection support provided to personnel under subsection (a) may include training, advice, assistance, and other services relating to cyber attacks and hostile information collection activities.</text>
 </subsection><subsection id="id9218648fb0264e5584bed34f072ad1d1"><enum>(d)</enum><header>Limitation on support</header><text>Nothing in this section shall be construed—</text> <paragraph id="idC492D5698E72426F9F5444FB85949AF3"><enum>(1)</enum><text>to encourage personnel of the intelligence community to use personal technology devices for official business; or</text>
 </paragraph><paragraph id="ida4afba7b898c4c6b9b23e4c76e707fa6"><enum>(2)</enum><text>to authorize cyber protection support for senior intelligence community personnel using personal devices, networks, and personal accounts in an official capacity.</text>
 </paragraph></subsection><subsection id="idccfcafaf9f7f407ca1bc21836018fef5"><enum>(e)</enum><header>Report</header><text>Not later than 180 days after the date of the enactment of this Act, the Director shall submit to the congressional intelligence committees a report on the provision of cyber protection support under subsection (a). The report shall include—</text>
 <paragraph id="idd2ab69cac7654bb4920f192ccddd5f2b"><enum>(1)</enum><text>a description of the methodology used to make the determination under subsection (a)(2); and</text> </paragraph><paragraph id="id0a53a826805f48b8ac61da99b7a9aa2c"><enum>(2)</enum><text>guidance for the use of cyber protection support and tracking of support requests for personnel receiving cyber protection support under subsection (a).</text>
					</paragraph></subsection></section><section id="id51A8DA750D8240C2BA3D1C1125106A8F"><enum>309.</enum><header>Modification of authority relating to management of supply-chain risk</header>
 <subsection id="idBDCE850E373E45A688D19EDD8E390D2B"><enum>(a)</enum><header>Modification of effective date</header><text>Subsection (f) of section 309 of the Intelligence Authorization Act for Fiscal Year 2012 (<external-xref legal-doc="public-law" parsable-cite="pl/112/87">Public Law 112–87</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/50/3329">50 U.S.C. 3329</external-xref> note) is amended by striking <quote>the date that is 180 days after</quote>.</text>
 </subsection><subsection id="id232EED3D16B04D50ADAB6639821487A5"><enum>(b)</enum><header>Extension</header><text display-inline="yes-display-inline">Subsection (g) of such section is amended by striking <quote>the date</quote> and all that follows through the period and inserting <quote>September 30, 2023.</quote>.</text> </subsection><subsection id="id312DD55EB0924E9D8D1DCBE2A7720BA6"><enum>(c)</enum><header>Reports</header><text>Such section is amended—</text>
 <paragraph id="id5510F58603D749F7986622CC91E78228"><enum>(1)</enum><text>by redesignating subsections (f) and (g), as amended by subsections (a) and (b), as subsections (g) and (h), respectively; and</text>
 </paragraph><paragraph id="id8B62B1B0896A4369AC55B1E624AC66FA"><enum>(2)</enum><text>by inserting after subsection (e) the following:</text> <quoted-block display-inline="no-display-inline" id="idC024FA9B20C74DE0B3D412799CF988D7" style="OLC"> <subsection id="id976860F5CC2946308743E0831B0E68EC"><enum>(f)</enum><header>Annual reports</header> <paragraph id="id38919B4F58E6465EBDDE439FDBDCC39F"><enum>(1)</enum><header>In general</header><text>Except as provided in paragraph (2), not later than 180 days after the date of the enactment of the <short-title>Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018 and 2019</short-title> and not less frequently than once each calendar year thereafter, the Director of National Intelligence shall, in consultation with each head of a covered agency, submit to the congressional intelligence committees (as defined in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>)), a report that details the determinations and notifications made under subsection (c) during the most recently completed calendar year.</text>
 </paragraph><paragraph id="id5FDDE88E7EFA40F9A246FBDD9229ADC7"><enum>(2)</enum><header>Initial report</header><text>The first report submitted under paragraph (1) shall detail all the determinations and notifications made under subsection (c) before the date of the submittal of the report.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="id4BE3E5BEDC6D417EAF14045BFBEB1720" section-type="subsequent-section"><enum>310.</enum><header display-inline="yes-display-inline">Limitations on determinations regarding certain security classifications</header>
 <subsection commented="no" display-inline="no-display-inline" id="id0984A5B893F34FE0B842B7C9091A7E56"><enum>(a)</enum><header>Prohibition</header><text display-inline="yes-display-inline">An officer of an element of the intelligence community who has been nominated by the President for a position that requires the advice and consent of the Senate may not make a classification decision with respect to information related to such officer.</text>
				</subsection><subsection id="id1fdc6a08a0cf4a929061eac7e5640c3c"><enum>(b)</enum><header>Classification determinations</header>
 <paragraph id="id00711EAB92884DDA9C8E414E6C218208"><enum>(1)</enum><header>In general</header><text>Except as provided in paragraph (2), in a case in which an officer described in subsection (a) has been nominated as described in such subsection and classification authority rests with the officer or another officer who reports directly to such officer, a classification decision with respect to information relating to the officer shall be made by the Director of National Intelligence.</text>
 </paragraph><paragraph id="id1ECE542665E9413981C517277FEFEBBA"><enum>(2)</enum><header>Nominations of Director of National Intelligence</header><text>In a case described in paragraph (1) in which the officer nominated is the Director of National Intelligence, the classification decision shall be made by the Principal Deputy Director of National Intelligence.</text>
 </paragraph></subsection><subsection id="id8B428986FA1E42FEB871DB6C95AD79D0"><enum>(c)</enum><header>Reports</header><text>Whenever the Director or the Principal Deputy Director makes a decision under subsection (b), the Director or the Principal Deputy Director, as the case may be, shall submit to the congressional intelligence committees a report detailing the reasons for the decision.</text>
				</subsection></section></title><title id="id65E350E682AC40A8BC41ED810DF140F7" style="OLC"><enum>IV</enum><header>Matters relating to elements of the intelligence community</header>
			<subtitle id="idB164F28942184255A7A5C363B4E1EA37" style="OLC"><enum>A</enum><header>Office of the Director of National Intelligence</header>
				<section commented="no" display-inline="no-display-inline" id="HB7F3C9E347D742BCA480B1B55857EEFC" section-type="subsequent-section"><enum>401.</enum><header display-inline="yes-display-inline">Authority for protection of current and former employees of the Office of the Director of National
 Intelligence</header><text display-inline="no-display-inline">Section 5(a)(4) of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3506">50 U.S.C. 3506(a)(4)</external-xref>) is amended by striking <quote>such personnel of the Office of the Director of National Intelligence as the Director of National Intelligence may designate;</quote> and inserting <quote>current and former personnel of the Office of the Director of National Intelligence and their immediate families as the Director of National Intelligence may designate;</quote>.</text>
				</section><section id="HBFA8A7FA17504AD9A3A10F48723A5D9C"><enum>402.</enum><header>Designation of the program manager-information sharing environment</header>
 <subsection id="HA01DF5E1B8A64345BA79A0754946A52B"><enum>(a)</enum><header>Information sharing environment</header><text>Section 1016(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/6/485">6 U.S.C. 485(b)</external-xref>) is amended—</text>
 <paragraph id="H82F97742A69B4012900BC0F0F9A7F2B2"><enum>(1)</enum><text>in paragraph (1), by striking <quote>President</quote> and inserting <quote>Director of National Intelligence</quote>; and</text> </paragraph><paragraph id="HE18E83A7E34B4CEEB19CD60B78542D40"><enum>(2)</enum><text>in paragraph (2), by striking <quote>President</quote> both places that term appears and inserting <quote>Director of National Intelligence</quote>.</text>
 </paragraph></subsection><subsection id="H972DEDD300AC493D84054DE9F2C55134"><enum>(b)</enum><header>Program manager</header><text>Section 1016(f)(1) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/6/485">6 U.S.C. 485(f)(1)</external-xref>) is amended by striking <quote>The individual designated as the program manager shall serve as program manager until removed from service or replaced by the President (at the President's sole discretion).</quote> and inserting <quote>Beginning on the date of the enactment of the <short-title>Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018 and 2019</short-title>, each individual designated as the program manager shall be appointed by the Director of National Intelligence.</quote>.</text>
 </subsection></section><section id="HDB829C28FB1D44F9864829855F58A6DB"><enum>403.</enum><header>Modification to the executive schedule</header><text display-inline="no-display-inline">Section 5315 of title 5, United States Code, is amended by adding at the end the following:</text> <quoted-block display-inline="no-display-inline" id="H1721937E221940688EC27B223E6B1260" style="OLC"><list level="section"> <list-item>Director of the National Counterintelligence and Security Center.</list-item></list><after-quoted-block>.</after-quoted-block></quoted-block> </section></subtitle><subtitle id="idCAB5B6FBAF2E447A8968AE9D00722797" style="OLC"><enum>B</enum><header>Other elements</header> <section id="HCF1676353F414086A748EABDC18A1F43"><enum>411.</enum><header>Repeal of foreign language proficiency requirement for certain senior level positions in the Central Intelligence Agency</header> <subsection id="HACAE512B01A448D181E46FB71B4CBF59"><enum>(a)</enum><header>Repeal of foreign language proficiency requirement</header><text>Section 104A of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3036">50 U.S.C. 3036</external-xref>) is amended by striking subsection (g).</text>
 </subsection><subsection id="H60A8FB3A1F8C42F8B83C61F6E8AEE1D0"><enum>(b)</enum><header>Conforming repeal of report requirement</header><text display-inline="yes-display-inline">Section 611 of the Intelligence Authorization Act for Fiscal Year 2005 (<external-xref legal-doc="public-law" parsable-cite="pl/108/487">Public Law 108–487</external-xref>) is amended by striking subsection (c).</text>
					</subsection></section><section id="H1BA06C26ECC54C9ABA2DA8DF89BB385C"><enum>412.</enum><header>Plan for designation of counterintelligence component of Defense Security Service as an element of
 intelligence community</header><text display-inline="no-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence and Under Secretary of Defense for Intelligence, in coordination with the Director of the National Counterintelligence and Security Center, shall submit to the congressional intelligence committees, the Committee on Armed Services of the Senate, and the Committee on Armed Services of the House of Representatives a plan to designate the counterintelligence component of the Defense Security Service of the Department of Defense as an element of the intelligence community by not later than January 1, 2020. Such plan shall—</text>
 <paragraph id="H4A34CB948576433EB0E7FCB496A5C700"><enum>(1)</enum><text>address the implications of such designation on the authorities, governance, personnel, resources, information technology, collection, analytic products, information sharing, and business processes of the Defense Security Service and the intelligence community; and</text>
 </paragraph><paragraph id="H3A22FF448D504FF49206D5E254BF30C5"><enum>(2)</enum><text display-inline="yes-display-inline">not address the personnel security functions of the Defense Security Service.</text> </paragraph></section><section id="idEAD9D6C568EE4ADE98440A23FB11D325"><enum>413.</enum><header>Notice not required for private entities</header><text display-inline="no-display-inline">Section 3553 of title 44, United States Code, is amended—</text>
 <paragraph id="idC94884C2459246729BCF63BB12304CBA"><enum>(1)</enum><text>by redesignating subsection (j) as subsection (k); and</text> </paragraph><paragraph id="id63254EE24A75450B80B9C3E185E89FE8"><enum>(2)</enum><text>by inserting after subsection (i) the following:</text>
						<quoted-block display-inline="no-display-inline" id="id2F9C970ECAB74E1A8B15B1BBD88B5D8D" style="OLC">
 <subsection commented="no" display-inline="no-display-inline" id="id289E405F41C14C5796D5EE4ABCE32C3F"><enum>(j)</enum><header>Rule of construction</header><text>Nothing in this section shall be construed to require the Secretary to provide notice to any private entity before the Secretary issues a binding operational directive under subsection (b)(2).</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph></section></subtitle></title><title id="idC21B85C788EA4E9B9EBC6BBE63B913FD" style="OLC"><enum>V</enum><header>Election matters</header>
			<section id="HD2556C8BBE1B4109BAF1924FD20D5067"><enum>501.</enum><header>Report on cyber attacks by foreign governments against United States election infrastructure</header>
 <subsection id="H13906029211D4F85A2ABB8C6D9635142"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="H3F68A82186184EF8BD547450CB2090AB"><enum>(1)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text>
 <subparagraph id="H8A6B59D38BF0473EABA0BD1FB8F0DD99"><enum>(A)</enum><text display-inline="yes-display-inline">the congressional intelligence committees;</text> </subparagraph><subparagraph id="H58101CBD983948139A4C42756F6FECF8"><enum>(B)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security and Governmental Affairs of the Senate; and</text>
 </subparagraph><subparagraph id="H589DBB0D132E4729A0E4DFC5EE1EB2BD"><enum>(C)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security of the House of Representatives.</text>
 </subparagraph></paragraph><paragraph id="H4529683790AB4497B472A96130690B12"><enum>(2)</enum><header>Congressional leadership</header><text>The term <term>congressional leadership</term> includes the following:</text> <subparagraph id="HCBA6AE0024A9479D99D93FF80E5E13A8"><enum>(A)</enum><text>The majority leader of the Senate.</text>
 </subparagraph><subparagraph id="HF5A64A8B033D4656945F0FA8A3A06A16"><enum>(B)</enum><text>The minority leader of the Senate.</text> </subparagraph><subparagraph id="HC2581A0AA8254927A8C745E22EA13DD5"><enum>(C)</enum><text>The Speaker of the House of Representatives.</text>
 </subparagraph><subparagraph id="H6F5C3B14227A49A388D4C659DE4F7799"><enum>(D)</enum><text>The minority leader of the House of Representatives.</text> </subparagraph></paragraph><paragraph id="H2CA92DFE4FAA4DD5B6204B5ECFF10A65"><enum>(3)</enum><header>State</header><text>The term <term>State</term> means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, and any territory or possession of the United States.</text>
 </paragraph></subsection><subsection id="HFBF934AE3C644803B2DFB8B93745470A"><enum>(b)</enum><header>Report required</header><text>Not later than 60 days after the date of the enactment of this Act, the Under Secretary of Homeland Security for Intelligence and Analysis shall submit to congressional leadership and the appropriate congressional committees a report on cyber attacks and attempted cyber attacks by foreign governments on United States election infrastructure in States and localities in connection with the Presidential election in the United States and such cyber attacks (or attempted cyber attacks) as the Under Secretary anticipates against such infrastructure. Such report shall identify the States and localities affected and shall include cyber attacks and attempted cyber attacks against voter registration databases, voting machines, voting-related computer networks, and the networks of Secretaries of State and other election officials of the various States.</text>
 </subsection><subsection id="HEA632C58AC274FBE9D13C2B85CD7159A"><enum>(c)</enum><header>Form</header><text>The report submitted under subsection (b) shall be submitted in unclassified form, but may include a classified annex.</text>
				</subsection></section><section id="HD39EECC2F993471BBD6A5DD603D4D428"><enum>502.</enum><header>Review of intelligence community's posture to collect against and analyze Russian efforts to
			 influence the Presidential election</header>
 <subsection id="HE70136F8948947718265A5FB0ECDC042"><enum>(a)</enum><header>Review required</header><text>Not later than 1 year after the date of the enactment of this Act, the Director of National Intelligence shall—</text>
 <paragraph id="H8E20B66009AB43B2B47A8C434B4EAF42"><enum>(1)</enum><text>complete an after action review of the posture of the intelligence community to collect against and analyze efforts of the Government of Russia to interfere in the 2016 Presidential election in the United States; and</text>
 </paragraph><paragraph id="H2D2BFD14AB9344E6874C28663E1FF72B"><enum>(2)</enum><text>submit to the congressional intelligence committees a report on the findings of the Director with respect to such review.</text>
 </paragraph></subsection><subsection id="HF4B7DA21F1E3444B9E3289B4A076979B"><enum>(b)</enum><header>Elements</header><text>The review required by subsection (a) shall include, with respect to the posture and efforts described in paragraph (1) of such subsection, the following:</text>
 <paragraph id="H8579E7F4F6114B3283FD12356E991AED"><enum>(1)</enum><text>An assessment of whether the resources of the intelligence community were properly aligned to detect and respond to the efforts described in subsection (a)(1).</text>
 </paragraph><paragraph id="H85A8DEC8DDC04B9E80BCC15A1EF15398"><enum>(2)</enum><text>An assessment of the information sharing that occurred within elements of the intelligence community.</text>
 </paragraph><paragraph id="HA5798236CC034FC48A6CD2CAB08094B3"><enum>(3)</enum><text>An assessment of the information sharing that occurred between elements of the intelligence community.</text>
 </paragraph><paragraph id="HA81E29B6662245BB89111AFCDABA07D0"><enum>(4)</enum><text>An assessment of applicable authorities necessary to collect on any such efforts and any deficiencies in those authorities.</text>
 </paragraph><paragraph id="HFA7E10C7C95E429E9599511868730A4A"><enum>(5)</enum><text>A review of the use of open source material to inform analysis and warning of such efforts.</text> </paragraph><paragraph id="H7BDD34356FF24DC0BAD6350DAF5B1013"><enum>(6)</enum><text>A review of the use of alternative and predictive analysis.</text>
 </paragraph></subsection><subsection id="HB07A34EB789E4AD7848E1F04E35D75C6"><enum>(c)</enum><header>Form of report</header><text>The report required by subsection (a)(2) shall be submitted to the congressional intelligence committees in classified form.</text>
				</subsection></section><section id="HB53ECF30DC744F7AAF80BC7EF0D20D63"><enum>503.</enum><header>Assessment of foreign intelligence threats to Federal elections</header>
 <subsection id="H5307BDA54D414022949544579FC8C7F5"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph display-inline="no-display-inline" id="H9C7E02D9DE43465A8DFD5FDE2122175B"><enum>(1)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text>
 <subparagraph id="HE151638CD94743AEBE594AC16F66D92C"><enum>(A)</enum><text display-inline="yes-display-inline">the congressional intelligence committees;</text> </subparagraph><subparagraph id="HB2057B68DEEE43FCBF2BB2016D9BC1AB"><enum>(B)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security and Governmental Affairs of the Senate; and</text>
 </subparagraph><subparagraph id="H7C350A53480F4D5DA3749CF13FB7454E"><enum>(C)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security of the House of Representatives.</text>
 </subparagraph></paragraph><paragraph id="HD2CB1EE0E71743C7995FCDCDB35FEA55"><enum>(2)</enum><header>Congressional leadership</header><text>The term <term>congressional leadership</term> includes the following:</text> <subparagraph id="HE89651F9EA0D4CB7A100D2C476D76E68"><enum>(A)</enum><text>The majority leader of the Senate.</text>
 </subparagraph><subparagraph id="H9D5D90D064CF4A15BAAF4BF8094F091F"><enum>(B)</enum><text>The minority leader of the Senate.</text> </subparagraph><subparagraph id="H8FCC81F3619E4E65A069E4C44B27EADC"><enum>(C)</enum><text>The Speaker of the House of Representatives.</text>
 </subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H566E3FB2DEE04394B5DC86A130F5E34E"><enum>(D)</enum><text>The minority leader of the House of Representatives.</text> </subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H3F7BC86801B84EDB8DF6A81EC2A0FC58"><enum>(3)</enum><header>Security vulnerability</header><text>The term <term>security vulnerability</term> has the meaning given such term in section 102 of the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text>
 </paragraph></subsection><subsection id="H520C309CE44B46238F455C938FA6CBB1"><enum>(b)</enum><header>Assessment and report</header><text>The Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency, the Director of the National Security Agency, the Director of the Federal Bureau of Investigation, the Secretary of Homeland Security, and the heads of other relevant elements of the intelligence community, shall—</text>
 <paragraph id="HBCF87E5A72AC4D01A7DD7BED87F6A8F0"><enum>(1)</enum><text>commence not later than 1 year before any regularly scheduled Federal election and complete not later than 180 days before such election, an assessment of security vulnerabilities of State election systems; and</text>
 </paragraph><paragraph id="HE901684787D141E18F36193DFD1CDE73"><enum>(2)</enum><text>not later than 180 days before any regularly scheduled Federal election, submit a report on such security vulnerabilities and an assessment of foreign intelligence threats to the election to—</text>
 <subparagraph id="H7AB2B0C8A8F847729B88ED3918D41D4B"><enum>(A)</enum><text>congressional leadership; and</text> </subparagraph><subparagraph id="H6DBF3073D463422DBB33C82498BB9D11"><enum>(B)</enum><text display-inline="yes-display-inline">the appropriate congressional committees.</text>
 </subparagraph></paragraph></subsection><subsection id="H9E10408DE1E14ECE9D1C4EA70B257787"><enum>(c)</enum><header>Update</header><text>Not later than 90 days before any regularly scheduled Federal election, the Director of National Intelligence shall—</text>
 <paragraph id="H07B6EF16D31B450AA4D21343FE5C9EED"><enum>(1)</enum><text>update the assessment of foreign intelligence threats to that election; and</text> </paragraph><paragraph id="HD82E75394FEF4DFFA9769E1D002E94C3"><enum>(2)</enum><text>submit the updated assessment to—</text>
 <subparagraph id="HE51D42BCB7DE4D019EF0E072FC293275"><enum>(A)</enum><text>congressional leadership; and</text> </subparagraph><subparagraph id="H6D81D863F32F4E60BBDE63827CBF3CE7"><enum>(B)</enum><text display-inline="yes-display-inline">the appropriate congressional committees.</text>
						</subparagraph></paragraph></subsection></section><section id="HDDA67264A5964802AEEB9A4F04C54074"><enum>504.</enum><header>Strategy for countering Russian cyber threats to United States elections</header>
 <subsection id="H423B809DFE644BABAB059CF8D6C06846"><enum>(a)</enum><header>Requirement for a strategy</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Secretary of Homeland Security, the Director of the Federal Bureau of Investigation, the Director of the Central Intelligence Agency, the Secretary of State, the Secretary of Defense, and the Secretary of the Treasury, shall develop a whole-of-government strategy for countering the threat of Russian cyber attacks and attempted cyber attacks against electoral systems and processes in the United States, including Federal, State, and local election systems, voter registration databases, voting tabulation equipment, and equipment and processes for the secure transmission of election results.</text>
 </subsection><subsection id="H11D38C013F744665A4D2CF2D7A4C4C0F"><enum>(b)</enum><header>Elements of the strategy</header><text>The strategy required by subsection (a) shall include the following elements:</text> <paragraph id="HE4D7AC6CF7014D7894345F38BF4CF07E"><enum>(1)</enum><text>A whole-of-government approach to protecting United States electoral systems and processes that includes the agencies and departments indicated in subsection (a) as well as any other agencies and departments of the United States, as determined appropriate by the Director of National Intelligence and the Secretary of Homeland Security.</text>
 </paragraph><paragraph id="H79BE248B80684F6AA2D47EE56AE96500"><enum>(2)</enum><text>Input solicited from Secretaries of State of the various States and the chief election officials of the States.</text>
 </paragraph><paragraph id="H286094ADC346473C8646D3A0CD6A43AE"><enum>(3)</enum><text>Technical security measures, including auditable paper trails for voting machines, securing wireless and Internet connections, and other technical safeguards.</text>
 </paragraph><paragraph id="HD35F9CD6091548F985941634002DF8A0"><enum>(4)</enum><text>Detection of cyber threats, including attacks and attempted attacks by Russian government or nongovernment cyber threat actors.</text>
 </paragraph><paragraph id="HABFC9604013948A5B42264FB95944023"><enum>(5)</enum><text>Improvement in the identification and attribution of Russian government or nongovernment cyber threat actors.</text>
 </paragraph><paragraph id="H343070356421400C960535EC73455D72"><enum>(6)</enum><text>Deterrence, including actions and measures that could or should be undertaken against or communicated to the Government of Russia or other entities to deter attacks against, or interference with, United States election systems and processes.</text>
 </paragraph><paragraph id="H3AC2604770FF481D98FD53D19CAD6259"><enum>(7)</enum><text>Improvement in Federal Government communications with State and local election officials.</text> </paragraph><paragraph id="H9D5E744954A74E959C4D610849DD6887"><enum>(8)</enum><text>Public education and communication efforts.</text>
 </paragraph><paragraph id="H9DF084702AA74A7886D8E397D6753B03"><enum>(9)</enum><text>Benchmarks and milestones to enable the measurement of concrete steps taken and progress made in the implementation of the strategy.</text>
					</paragraph></subsection><subsection id="H5918D14B5A974B5FB26007063D961312"><enum>(c)</enum><header>Congressional briefing</header>
 <paragraph id="idF73EF6B160CB44B4A701ADFD5DF35E5E"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence and the Secretary of Homeland Security shall jointly brief the appropriate congressional committees on the strategy developed under subsection (a).</text>
 </paragraph><paragraph id="HE0C22B7DF529431D83146A4F74CA9CBD"><enum>(2)</enum><header>Appropriate congressional committees defined</header><text>In this subsection, the term <term>appropriate congressional committees</term> means the following:</text> <subparagraph id="H7FDF9CC121EC4D6F862A3D7003C5B145"><enum>(A)</enum><text display-inline="yes-display-inline">The congressional intelligence committees.</text>
 </subparagraph><subparagraph id="H5DE6FD88F2664527B9FC1A4B0D586807"><enum>(B)</enum><text display-inline="yes-display-inline">The Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate.</text>
 </subparagraph><subparagraph id="HB8A0DAF657F14D4EAE190EEF6FD11C4C"><enum>(C)</enum><text display-inline="yes-display-inline">The Committee on Armed Services and the Committee on Homeland Security of the House of Representatives.</text>
						</subparagraph></paragraph></subsection></section><section id="H6F4F458013154CC683D34F181A17982C"><enum>505.</enum><header>Information sharing with State election officials</header>
				<subsection id="H99D9C54B2272453C8722FA9328F57AC6"><enum>(a)</enum><header>Security clearances</header>
 <paragraph id="HAB840B47912C44D097D71206F7FCFCFB"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 30 days after the date of the enactment of this Act, the Director of National Intelligence shall support the Under Secretary of Homeland Security for Intelligence and Analysis, and any other official of the Department of Homeland Security designated by the Secretary of Homeland Security, in sponsoring a security clearance up to the top secret level for each eligible chief election official of a State or the District of Columbia, and additional eligible designees of such election official as appropriate, at the time that such election official assumes such position.</text>
 </paragraph><paragraph id="H5CE92F21BD374A2D90C83A19ED913A44"><enum>(2)</enum><header>Interim clearances</header><text display-inline="yes-display-inline">Consistent with applicable policies and directives, the Director of National Intelligence may issue interim clearances, for a period to be determined by the Director, to a chief election official as described in paragraph (1) and up to 1 designee of such official under such paragraph.</text>
					</paragraph></subsection><subsection id="H3CFF25227C3A4AD6B88314B1185A59BF"><enum>(b)</enum><header>Information sharing</header>
 <paragraph id="H9AEBB3C443B24EF6BCE453061F9E8599"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Director of National Intelligence shall assist the Under Secretary of Homeland Security for Intelligence and Analysis with sharing any appropriate classified information related to threats to election systems and to the integrity of the election process with chief election officials and such designees who have received a security clearance under subsection (a).</text>
 </paragraph><paragraph id="HC84B5ED7A4C942AC9C048CA60C58A411"><enum>(2)</enum><header>Coordination</header><text display-inline="yes-display-inline">The Under Secretary of Homeland Security for Intelligence and Analysis shall coordinate with the Director of National Intelligence to facilitate the sharing of information to the affected Secretaries of State or States.</text>
 </paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="HD8AF39BA8DD045AFB688E5F5C3D378C1"><enum>(c)</enum><header>State defined</header><text>In this section, the term <term>State</term> means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, and any territory or possession of the United States.</text>
				</subsection></section><section id="id15C93A65999D423AA61624AD24042631"><enum>506.</enum><header>Designation of counterintelligence officer to lead election security matters</header>
 <subsection id="idCFDD2170693E4E7985660E93E3024151"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The Director of National Intelligence shall designate a national counterintelligence officer within the National Counterintelligence and Security Center to lead, manage, and coordinate counterintelligence matters relating to election security.</text>
 </subsection><subsection id="id5E7E307C8F494E41B75F4B79223A7BE3"><enum>(b)</enum><header>Additional responsibilities</header><text>The person designated under subsection (a) shall also lead, manage, and coordinate counterintelligence matters relating to risks posed by interference from foreign powers (as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1801">50 U.S.C. 1801</external-xref>)) to the following:</text>
 <paragraph id="idB64D9818B97F4CC680569B847D44BE4F"><enum>(1)</enum><text>The Federal Government election security supply chain.</text> </paragraph><paragraph id="id8F31EAB602EB459AAFB9FBA4A6ADE097"><enum>(2)</enum><text>Election voting systems and software.</text>
 </paragraph><paragraph id="id9D02A2D912C248CCB7B8E29125954A09"><enum>(3)</enum><text>Voter registration databases.</text> </paragraph><paragraph id="idB47F68E7F58544A0988B045271B15E88"><enum>(4)</enum><text>Critical infrastructure related to elections.</text>
 </paragraph><paragraph id="idC32C4D71D0A6431593272B657D30341D"><enum>(5)</enum><text>Such other Government goods and services as the Director of National Intelligence considers appropriate.</text>
					</paragraph></subsection></section></title><title id="id7F848A1F3CAE4E6ABE1C8E5097CE780E" style="OLC"><enum>VI</enum><header>Security clearances</header>
 <section id="id28ea5b4644ab421ba4d777466e28183c"><enum>601.</enum><header>Definitions</header><text display-inline="no-display-inline">In this title:</text> <paragraph id="idfb71c8652653429793cbfc12c6de37d0"><enum>(1)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text>
 <subparagraph id="idd8604822c9e54469bc18e087b5baf653"><enum>(A)</enum><text>the congressional intelligence committees;</text> </subparagraph><subparagraph id="id6fe6ec3b6cfd429f9aa991b03dae896a"><enum>(B)</enum><text>the <committee-name committee-id="SSAS00">Committee on Armed Services of the Senate</committee-name>;</text>
 </subparagraph><subparagraph id="idC4EB93A23AC34045B8093BCC09979993"><enum>(C)</enum><text>the <committee-name committee-id="SSAP00">Committee on Appropriations of the Senate</committee-name>;</text> </subparagraph><subparagraph id="id1A8CF9078ED2499C86E4C9FC205EFEBB"><enum>(D)</enum><text>the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs of the Senate</committee-name>;</text>
 </subparagraph><subparagraph id="idcdf2acbd79d34e6c96d86e2deb500901"><enum>(E)</enum><text>the <committee-name committee-id="">Committee on Armed Services of the House of Representatives</committee-name>;</text> </subparagraph><subparagraph id="id5F6AD7D8DFE84C82965C76EE88BFF98A"><enum>(F)</enum><text>the <committee-name committee-id="">Committee on Appropriations of the House of Representatives</committee-name>;</text>
 </subparagraph><subparagraph id="id2D6524917FA04A909B98BF12E5C99447"><enum>(G)</enum><text>the <committee-name committee-id="">Committee on Homeland Security of the House of Representatives</committee-name>; and</text> </subparagraph><subparagraph id="id91C5ADB60CA941E2B7B3E57B230FCFA0"><enum>(H)</enum><text>the <committee-name committee-id="">Committee on Oversight and Government Reform of the House of Representatives</committee-name>.</text>
 </subparagraph></paragraph><paragraph id="idc2868de0052347069dca6ac8db32a569"><enum>(2)</enum><header>Council</header><text>The term <term>Council</term> means the Security, Suitability, and Credentialing Performance Accountability Council established pursuant to Executive Order 13467 (73 Fed. Reg. 38103; <external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note), or any successor entity.</text>
 </paragraph><paragraph id="id95B00EFCE8084169806DCC84E24FEC7A"><enum>(3)</enum><header>Security Executive Agent</header><text>The term <term>Security Executive Agent</term> means the Director of National Intelligence acting as the Security Executive Agent in accordance with section 605.</text>
				</paragraph><paragraph id="idEF520800853940D1BDC937C5D201AC24"><enum>(4)</enum><header>Suitability and
 Credentialing Executive Agent</header><text>The term <term>Suitability and Credentialing Executive Agent</term> means the Director of the Office of Personnel Management acting as the Suitability and Credentialing Executive Agent in accordance with Executive Order 13467 (73 Fed. Reg. 38103; <external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note), or any successor entity.</text>
				</paragraph></section><section id="id383b62bc8e0d41f69a0b8a158b7bf1fd"><enum>602.</enum><header>Reports and plans relating to security clearances and background investigations</header>
 <subsection id="id416b1b3525f94adc8654631da2ba15e5"><enum>(a)</enum><header>Sense of Congress</header><text>It is the sense of Congress that—</text> <paragraph id="iddba5c5ef157e4f19a219480658959f09"><enum>(1)</enum><text>ensuring the trustworthiness and security of the workforce, facilities, and information of the Federal Government is of the highest priority to national security and public safety;</text>
 </paragraph><paragraph id="ida4e5956ce7e8445984c0f54d66d52cad"><enum>(2)</enum><text>the President and Congress should prioritize the modernization of the personnel security framework to improve its efficiency, effectiveness, and accountability;</text>
 </paragraph><paragraph id="id774c3c37109942efaf804f6184e7c313"><enum>(3)</enum><text>the current system for security clearance, suitability and fitness for employment, and credentialing lacks efficiencies and capabilities to meet the current threat environment, recruit and retain a trusted workforce, and capitalize on modern technologies; and</text>
 </paragraph><paragraph id="id59e25de72b4043718d19db2ada7abab1"><enum>(4)</enum><text>changes to policies or processes to improve this system should be vetted through the Council to ensure standardization, portability, and reciprocity in security clearances across the Federal Government.</text>
					</paragraph></subsection><subsection id="ida0223c430200470f92dacf6fe7ba1fc3"><enum>(b)</enum><header>Accountability plans and reports</header>
 <paragraph id="id109f3a63bb654dfe83d40c48f31c26bb"><enum>(1)</enum><header>Plans</header><text>Not later than 90 days after the date of the enactment of this Act, the Council shall submit to the appropriate congressional committees the following:</text>
 <subparagraph id="idcd0abcb6268b4cd9804a2ab598abd952"><enum>(A)</enum><text>A plan to reduce the background investigation inventory to 500,000 by the end of year 2018 and to 200,000 or an otherwise sustainable steady-level by the end of year 2019. Such plan shall include notes of any required changes in investigative and adjudicative standards or resources.</text>
 </subparagraph><subparagraph id="id29434f8111734ddbb53f0b83580af557"><enum>(B)</enum><text>A plan to consolidate the conduct of background investigations associated with the processing for positions of trust in the most effective and efficient manner between the National Background Investigation Bureau and the Defense Security Service, or a successor organization. Such plan shall address required funding, personnel, contracts, information technology, field office structure, policy, governance, schedule, transition costs, and effects on stakeholders.</text>
						</subparagraph></paragraph><paragraph id="id467d9cbd6239400a9552e3eb410a4741"><enum>(2)</enum><header>Report on the future of personnel security</header>
 <subparagraph id="id51152c9136494649910887c926fb2fa3"><enum>(A)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Chairman of the Council, in coordination with the members of the Council, shall submit to the appropriate congressional committees a report on the future of personnel security to reflect changes in threats, the workforce, and technology.</text>
 </subparagraph><subparagraph id="ideb0759a517414eaea89811b9ec298864"><enum>(B)</enum><header>Contents</header><text>The report submitted under subparagraph (A) shall include the following:</text> <clause id="id9b1034b20aa646c183850787287a9ddb"><enum>(i)</enum><text>A risk framework for granting and renewing access to classified information.</text>
 </clause><clause id="idfd989465599044ff9ca7aec7f7d1afdc"><enum>(ii)</enum><text>A discussion of the use of technologies to prevent, detect, and monitor threats.</text> </clause><clause id="idbb92cd4f5b9b46d182539566b6555b82"><enum>(iii)</enum><text>A discussion of efforts to address reciprocity and portability.</text>
 </clause><clause id="id7b31cd01b5cb4f2b9e22d20bc504801b"><enum>(iv)</enum><text>A discussion of the characteristics of effective insider threat programs.</text> </clause><clause id="id9B24F533362947C09DF871CFB15D5605"><enum>(v)</enum><text>An analysis of how to integrate data from continuous vetting, insider threat programs, and human resources data.</text>
 </clause><clause id="idDE1D5E26BE8F4C57A39B29D500692E92"><enum>(vi)</enum><text>Recommendations on interagency governance.</text> </clause></subparagraph></paragraph><paragraph id="id1E8E0F09094D424EB861011C156B1477"><enum>(3)</enum><header>Plan for implementation</header><text>Not later than 180 days after the date of the enactment of this Act, the Chairman of the Council, in coordination with the members of the Council, shall submit to the appropriate congressional committees a plan to implement the report’s framework and recommendations submitted under paragraph (2)(A).</text>
 </paragraph><paragraph id="id52b6b554b3cb404aadd4b8c8917232c6"><enum>(4)</enum><header>Congressional notifications</header><text>Not less frequently than monthly, the Security Executive Agent shall submit a report to the appropriate congressional committees regarding the status of the disposition of requests received from departments and agencies of the Federal Government for a change to, or approval under, the Federal investigative standards, the national adjudicative guidelines, continuous evaluation, or other national policy regarding personnel security.</text>
					</paragraph></subsection></section><section id="id8c0ace43367142b8aa8efdaa4486cf17"><enum>603.</enum><header>Improving the process for security clearances</header>
 <subsection id="id847a9201e8df4df2982e1ab32d3124ee"><enum>(a)</enum><header>Reviews</header><text>Not later than 180 days after the date of the enactment of this Act, the Security Executive Agent, in coordination with the members of the Council, shall submit to the appropriate congressional committees a report that includes the following:</text>
 <paragraph id="id7df20197ff9c418fb47e515b7a89fb23"><enum>(1)</enum><text>A review of whether the information requested on the Questionnaire for National Security Positions (Standard Form 86) and by the Federal Investigative Standards prescribed by the Office of Personnel Management and the Office of the Director of National Intelligence appropriately support the adjudicative guidelines under Security Executive Agent Directive 4 (known as the <quote>National Security Adjudicative Guidelines</quote>). Such review shall include identification of whether any such information currently collected is unnecessary to support the adjudicative guidelines.</text>
 </paragraph><paragraph id="id7c25e3c013a54d1282660cb28659edf0"><enum>(2)</enum><text>An assessment of whether such Questionnaire, Standards, and guidelines should be revised to account for the prospect of a holder of a security clearance becoming an insider threat.</text>
 </paragraph><paragraph id="id617c4c9cccbc439d9b053635b6b68f0b"><enum>(3)</enum><text>Recommendations to improve the background investigation process by—</text> <subparagraph id="id589195e835b04f8d8ad028def4056dcb"><enum>(A)</enum><text>simplifying the Questionnaire for National Security Positions (Standard Form 86) and increasing customer support to applicants completing such Questionnaire;</text>
 </subparagraph><subparagraph id="id46c7afcf8b1e4772b9be69efcd688d7f"><enum>(B)</enum><text>using remote techniques and centralized locations to support or replace field investigation work;</text> </subparagraph><subparagraph id="idab6891abdf5f4e2a9783605c9277a923"><enum>(C)</enum><text>using secure and reliable digitization of information obtained during the clearance process;</text>
 </subparagraph><subparagraph id="id7b7df781c0354113a73b6cdeaecb42b6"><enum>(D)</enum><text>building the capacity of the background investigation labor sector; and</text> </subparagraph><subparagraph id="id43cb59214fb54376b01927639c86306c"><enum>(E)</enum><text>replacing periodic reinvestigations with continuous evaluation techniques in all appropriate circumstances.</text>
 </subparagraph></paragraph></subsection><subsection id="id57596ac61b2541debcaf039e81284571"><enum>(b)</enum><header>Policy, strategy, and implementation</header><text>Not later than 180 days after the date of the enactment of this Act, the Security Executive Agent shall, in coordination with the members of the Council, establish the following:</text>
 <paragraph id="id68d54b4019e043199e058d050c1ab7f4"><enum>(1)</enum><text>A policy and implementation plan for the issuance of interim security clearances.</text> </paragraph><paragraph id="idfa26e10c7c0a4d0eba9591bb2b9d2e51"><enum>(2)</enum><text>A policy and implementation plan to ensure contractors are treated consistently in the security clearance process across agencies and departments of the United States as compared to employees of such agencies and departments. Such policy shall address—</text>
 <subparagraph id="id7b0e927797b741f68c5eba29e1a0da8d"><enum>(A)</enum><text>prioritization of processing security clearances based on the mission the contractors will be performing;</text>
 </subparagraph><subparagraph id="id1fd1c7836f5749248a882923d069bf10"><enum>(B)</enum><text>standardization of how requests for clearance sponsorship are issued;</text> </subparagraph><subparagraph id="idd205120c9ad34f83ac7068a7092cb82c"><enum>(C)</enum><text>digitization of background investigation-related forms;</text>
 </subparagraph><subparagraph id="id4a79a02404a748fa99d64ddcfb1795cf"><enum>(D)</enum><text>use of the polygraph;</text> </subparagraph><subparagraph id="id7a6f10d80f9f4c36863a51e401c13ef1"><enum>(E)</enum><text>the application of the adjudicative guidelines under Security Executive Agent Directive 4 (known as the <quote>National Security Adjudicative Guidelines</quote>);</text>
 </subparagraph><subparagraph id="id9898fee81f1a4beabe877642b3c29bed"><enum>(F)</enum><text>reciprocal recognition of clearances across agencies and departments of the United States, regardless of status of periodic reinvestigation;</text>
 </subparagraph><subparagraph id="id1eb9655f98604846b70459326696e52b"><enum>(G)</enum><text>tracking of clearance files as individuals move from employment with an agency or department of the United States to employment in the private sector;</text>
 </subparagraph><subparagraph id="idad69e9f7954d436abd4c5f18a3105bcd"><enum>(H)</enum><text>collection of timelines for movement of contractors across agencies and departments;</text> </subparagraph><subparagraph id="id63f82241118e4d3db189f7027b158c6d"><enum>(I)</enum><text>reporting on security incidents and job performance that affect the ability to hold a security clearance;</text>
 </subparagraph><subparagraph id="id00be7228d7da4dad9ac926b8a06d59c1"><enum>(J)</enum><text>any recommended changes to the Federal Acquisition Regulations (FAR) necessary to ensure that information affecting contractor clearances or suitability is appropriately and expeditiously shared between and among agencies and contractors; and</text>
 </subparagraph><subparagraph id="idfdd10a1947434c70a1158c4b726ae1c1"><enum>(K)</enum><text>portability of contractor security clearances between or among contracts at the same agency and between or among contracts at different agencies that require the same level of clearance.</text>
 </subparagraph></paragraph><paragraph id="idd2139002ddc44727902a96fd35f58e7c"><enum>(3)</enum><text>A strategy and implementation plan that—</text> <subparagraph id="iddcb5e3e34c5b43d199ae67b386698f5c"><enum>(A)</enum><text>provides for periodic reinvestigations as part of a security clearance determination only on an as-needed, risk-based basis;</text>
 </subparagraph><subparagraph id="ida7ba9c2f332942a9a9b134035496c1be"><enum>(B)</enum><text>includes actions to assess the extent to which automated records checks and other continuous evaluation methods may be used to expedite or focus reinvestigations; and</text>
 </subparagraph><subparagraph id="id58fe5a6fbc7244e4bad18777bb6125b7"><enum>(C)</enum><text>provides an exception for certain populations if the Security Executive Agent—</text> <clause id="id02a5982226ef4455b1a380135da976fa"><enum>(i)</enum><text>determines such populations require reinvestigations at regular intervals; and</text>
 </clause><clause id="idc79ac342a0dd416b9ab527f9e7f1b589"><enum>(ii)</enum><text>provides written justification to the appropriate congressional committees for any such determination.</text>
 </clause></subparagraph></paragraph><paragraph id="idd4a2c155037841ce9aa3fafddb02b026"><enum>(4)</enum><text>A policy and implementation plan for agencies and departments of the United States, as a part of the security clearance process, to accept automated records checks generated pursuant to a security clearance applicant’s employment with a prior employer.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="idd1eb6548dee24fa3b11bb8f7328c1b0e"><enum>(5)</enum><text>A policy for the use of certain background materials on individuals collected by the private sector for background investigation purposes.</text>
					</paragraph></subsection></section><section id="id3da504773dc1468b86f579a90eca00d1"><enum>604.</enum><header>Goals for promptness of determinations regarding security clearances</header>
 <subsection commented="no" display-inline="no-display-inline" id="idBF3D5E4819F447E0A6C5A74CC3049B49"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The Council shall take such actions as may be necessary to ensure that, by December 31, 2021, 90 percent of all determinations regarding—</text>
 <paragraph commented="no" display-inline="no-display-inline" id="id89C890F24DD3406193FB833938E3D0EC"><enum>(1)</enum><text display-inline="yes-display-inline">security clearances—</text> <subparagraph id="idCA20D55FE5C34FA09FA1E89A90A2BFD8"><enum>(A)</enum><text>at the secret level are issued in 30 days or fewer; and</text>
 </subparagraph><subparagraph id="id6cc65243d40c4c5f92082dd1a2f937b9"><enum>(B)</enum><text>at the top secret level are issued in 90 days or fewer; and</text> </subparagraph></paragraph><paragraph id="id28ff41a0351743008e105ffb1849efbc"><enum>(2)</enum><text>reciprocity of a security clearance at the same level are recognized in 2 weeks or fewer.</text>
 </paragraph></subsection><subsection id="id8500c5684aae4de2975f70e119baf382"><enum>(b)</enum><header>Certain reinvestigations</header><text>The Council shall ensure that by December 31, 2021, reinvestigation on a set periodicity is not be required for more than 10 percent of the population that holds a security clearance.</text>
 </subsection><subsection id="idFCACCA93A8044DDDABAC4ECE79568E91"><enum>(c)</enum><header>Plan</header><text>Not later than 180 days after the date of the enactment of this Act, the Council shall submit a plan to carry out this section to the appropriate congressional committees. Such plan shall include recommended interim milestones for the goals set forth in subsections (a) and (b) for 2019, 2020, and 2021.</text>
 </subsection><subsection id="idB64D256293D942C390DA3959ABCEBA2D"><enum>(d)</enum><header>Reciprocity defined</header><text>In this section, the term <term>reciprocity</term> means reciprocal recognition by Federal departments and agencies of eligibility for access to classified information.</text>
				</subsection></section><section id="id52DD1A625B6F4FC19D411D9E176279BD"><enum>605.</enum><header>Security Executive Agent</header>
 <subsection id="id212424e7c1ed408fad1d107851a337ce"><enum>(a)</enum><header>In general</header><text>The Director of National Intelligence shall serve as the Security Executive Agent for all departments and agencies of the United States.</text>
 </subsection><subsection id="id25931cbd742c46538076155af79bb911"><enum>(b)</enum><header>Duties</header><text>The duties of the Security Executive Agent are as follows:</text> <paragraph id="id685bc3a9af2f4f2995f9cdab9b684d48"><enum>(1)</enum><text>To direct the oversight of investigations, reinvestigations, adjudications, and, as applicable, polygraphs for eligibility for access to classified information or eligibility to hold a sensitive position made by any Federal agency.</text>
 </paragraph><paragraph id="id255dcb06d7e743e9b62fa487d2a75edb"><enum>(2)</enum><text>To review the national security background investigation and adjudication programs of Federal agencies to determine whether such programs are being implemented in accordance with this section.</text>
 </paragraph><paragraph id="id7de8dc2f93aa4e10a45d3ad5933f66fd"><enum>(3)</enum><text>To develop and issue uniform and consistent policies and procedures to ensure the effective, efficient, timely, and secure completion of investigations, polygraphs, and adjudications relating to determinations of eligibility for access to classified information or eligibility to hold a sensitive position.</text>
 </paragraph><paragraph id="id26db06d290d248f492ececad521c4e99"><enum>(4)</enum><text>Unless otherwise designated by law, to serve as the final authority to designate a Federal agency or agencies to conduct investigations of persons who are proposed for access to classified information or for eligibility to hold a sensitive position to ascertain whether such persons satisfy the criteria for obtaining and retaining access to classified information or eligibility to hold a sensitive position, as applicable.</text>
 </paragraph><paragraph id="idb1159bafc5d245f1a1707603af568817"><enum>(5)</enum><text>Unless otherwise designated by law, to serve as the final authority to designate a Federal agency or agencies to determine eligibility for access to classified information or eligibility to hold a sensitive position in accordance with Executive Order 12968 of August 2, 1995, as amended.</text>
 </paragraph><paragraph id="id61df9dc95d134baba427f32906fac2c5"><enum>(6)</enum><text>To ensure reciprocal recognition of eligibility for access to classified information or eligibility to hold a sensitive position among Federal agencies, including acting as the final authority to arbitrate and resolve disputes among such agencies involving the reciprocity of investigations and adjudications of eligibility.</text>
 </paragraph><paragraph id="id38cee0444a8741ad99c064c017b30893"><enum>(7)</enum><text>To execute all other duties assigned to the Security Executive Agent by law.</text> </paragraph></subsection><subsection id="id77854e7b337148bcb1f8018f6771e029"><enum>(c)</enum><header>Authorities</header><text>The Security Executive Agent shall—</text>
 <paragraph id="idb4f0a1c008464b14811a6762814ccf7f"><enum>(1)</enum><text>issue guidelines and instructions to the heads of Federal agencies to ensure appropriate uniformity, centralization, efficiency, effectiveness, timeliness, and security in processes relating to determinations by such agencies of eligibility for access to classified information or eligibility to hold a sensitive position, including such matters as investigations, polygraphs, adjudications, and reciprocity;</text>
 </paragraph><paragraph id="idc6cfc32b052d40d89bc84bb31155cc8b"><enum>(2)</enum><text>have the authority to grant exceptions to, or waivers of, national security investigative requirements, including issuing implementing or clarifying guidance, as necessary;</text>
 </paragraph><paragraph id="idd18285ae5e054daab1e2a29f74a3ef8c"><enum>(3)</enum><text>have the authority to assign, in whole or in part, to the head of any Federal agency (solely or jointly) any of the duties of the Security Executive Agent described in subsection (b) or the authorities described in paragraphs (1) and (2), provided that the exercise of such assigned duties or authorities is subject to the oversight of the Security Executive Agent, including such terms and conditions (including approval by the Security Executive Agent) as the Security Executive Agent determines appropriate; and</text>
 </paragraph><paragraph id="ide713ba42c7d44c7a93912d2ca4085573"><enum>(4)</enum><text>define and set standards for continuous evaluation for continued access to classified information and for eligibility to hold a sensitive position.</text>
					</paragraph></subsection></section><section id="idb2694c7b31c849a59b7706159c215200"><enum>606.</enum><header>Report on unified, simplified, governmentwide standards for positions of trust and security
 clearances</header><text display-inline="no-display-inline">Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent and the Suitability and Credentialing Executive Agent, in coordination with the other members of the Council, shall jointly issue a report regarding the advisability and the risks, benefits, and costs to the Government and to industry of consolidating to not more than 3 tiers for positions of trust and security clearances.</text>
			</section><section id="id394ca3afbc39441d82d9ab8446160b68"><enum>607.</enum><header>Report on clearance in person concept</header>
 <subsection id="idc30651c237294dab9c147a8611713767"><enum>(a)</enum><header>Sense of congress</header><text>It is the sense of Congress that to reflect the greater mobility of the modern workforce, alternative methodologies merit analysis to allow greater flexibility for individuals moving in and out of positions that require access to classified information, while still preserving security.</text>
 </subsection><subsection id="id5E2DFCF93BE54BC19A432BBCC2C32B7B"><enum>(b)</enum><header>Report required</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent shall submit a report to the appropriate congressional committees that describes the requirements, feasibility, and advisability of implementing a clearance in person concept described in subsection (c) for maintaining access to classified information.</text>
 </subsection><subsection id="id3245B133481943C2B2E16882CFB05A96"><enum>(c)</enum><header>Clearance in person concept</header><text display-inline="yes-display-inline">The clearance in person concept—</text> <paragraph id="idCD60BBE9C9F44EF29AC32F13718B8E77"><enum>(1)</enum><text display-inline="yes-display-inline">permits an individual to maintain his or her eligibility for access to classified information, networks, and facilities for up to 3 years after the individual’s access to classified information would otherwise lapse; and</text>
 </paragraph><paragraph id="id7BB7DD8E4E23451F9284169D43E9D56E"><enum>(2)</enum><text display-inline="yes-display-inline">unless otherwise directed by the Security Executive Agent, recognizes an individual’s security clearance and background investigation as current, regardless of employment status.</text>
 </paragraph></subsection><subsection id="idEEBB46AEBBE946FAA9E63D47FE775FBF"><enum>(d)</enum><header>Contents</header><text display-inline="yes-display-inline">The report required under subsection (b) shall address—</text> <paragraph id="idd3f2e940143e431680d17fd0eef08dc6"><enum>(1)</enum><text>requirements for an individual to voluntarily remain in a continuous evaluation program validated by the Security Executive Agent even if the individual is not in a position requiring access to classified information;</text>
 </paragraph><paragraph id="idc1292a1cb1304e74a85140d8ead749c0"><enum>(2)</enum><text>appropriate safeguards for privacy;</text> </paragraph><paragraph id="idC0036B753A8445B29227F449086ECDEB"><enum>(3)</enum><text>advantages to government and industry;</text>
 </paragraph><paragraph id="id988385ab692140c7a8be6a09455fe112"><enum>(4)</enum><text>the costs and savings associated with implementation;</text> </paragraph><paragraph id="id572C25F8003149D8BAD432678098D838"><enum>(5)</enum><text>the risks of such implementation, including security and counterintelligence risks;</text>
 </paragraph><paragraph id="id2708099D755D49C3B2BC6E658B1939F1"><enum>(6)</enum><text>an appropriate funding model; and</text> </paragraph><paragraph id="id885229cf809147e8847f7984b82a3466"><enum>(7)</enum><text>fairness to small companies and independent contractors.</text>
					</paragraph></subsection></section><section id="id35c28829e838498fae5440e3640e02fd"><enum>608.</enum><header>Budget request documentation on funding for clearances</header>
 <subsection id="idB238418CAE694317B8E2239D958B661B"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">As part of the fiscal year 2020 budget request submitted to Congress pursuant to section 1105(a) of title 31, United States Code, the President shall include exhibits that identify the resources allocated by each agency to processing security clearances, disaggregated by type of security clearance.</text>
 </subsection><subsection id="idEFEF592A84CB4312A6BECAB5C927589A"><enum>(b)</enum><header>Contents</header><text display-inline="yes-display-inline">Each exhibit submitted under subsection (a) shall include, with respect to security clearances, details on the costs of—</text>
 <paragraph id="idFF336EC892644182B2CA0AFD5E4EFAFD"><enum>(1)</enum><text display-inline="yes-display-inline">background investigations and reinvestigations;</text>
 </paragraph><paragraph id="idBB872D3B9D4849D4A888E228906056BE"><enum>(2)</enum><text display-inline="yes-display-inline">additional screening mechanisms, such as polygraphs, medical exams, and psychological exams;</text>
 </paragraph><paragraph id="id660DD3A6D1844726A688AD9B3CE4486D"><enum>(3)</enum><text display-inline="yes-display-inline">adjudications;</text> </paragraph><paragraph id="idD8BA22BEC47B476A94940C5872F65210"><enum>(4)</enum><text display-inline="yes-display-inline">other means of continuous vetting, such as continuous evaluation and user activity monitoring; and</text>
 </paragraph><paragraph id="idA8B0269D28444B85BB43D4ADF9F6F1C1"><enum>(5)</enum><text>the average per person cost for each type of security clearance.</text> </paragraph></subsection></section><section id="idFA07682BFD3A4813ABC8064CADF22050"><enum>609.</enum><header>Reports on reciprocity for security clearances inside of departments and agencies</header> <subsection id="idB6BF85B259194421954AF8AF574018FD"><enum>(a)</enum><header>Reports to Security Executive Agent</header><text>The head of each Federal department or agency shall submit an annual report to the Security Executive Agent that—</text>
 <paragraph id="id6EEA7D39959A4965994F1B05A65DF654"><enum>(1)</enum><text>identifies the number of individuals whose security clearances take more than 2 weeks to be reciprocally recognized after such individuals move to another part of such department or agency; and</text>
 </paragraph><paragraph id="id0525961588F94A6E988AF03F02829F95"><enum>(2)</enum><text>breaks out the information described in paragraph (1) by type of clearance and the reasons for any delays.</text>
 </paragraph></subsection><subsection id="idC8F80FB5BDC94DE99439B1DB577F1799"><enum>(b)</enum><header>Annual report</header><text>Not less frequently than once each year, the Security Executive Agent shall submit to the appropriate congressional committees an annual report that summarizes the information received pursuant to subsection (a) during the period covered by such report.</text>
 </subsection><subsection id="id6577B682295847BDBC6416F3ED21000F"><enum>(c)</enum><header>Reciprocally recognized defined</header><text>In this section, the term <term>reciprocally recognized</term> means reciprocal recognition by Federal departments and agencies of eligibility for access to classified information.</text>
 </subsection></section><section id="id4a9020a643ec48b2ad3c13957b67b40c"><enum>610.</enum><header>Intelligence community reports on security clearances</header><text display-inline="no-display-inline">Section 506H of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3104">50 U.S.C. 3104</external-xref>) is amended—</text> <paragraph id="id7a50f18a00ef4a05a0d80dfb3974f1f1"><enum>(1)</enum><text>in subsection (a)(1)—</text>
 <subparagraph id="idd9e5934a5ab1431ab084a26bfc656396"><enum>(A)</enum><text>in subparagraph (A)(ii), by adding <quote>and</quote> at the end;</text> </subparagraph><subparagraph id="idb25e2e67d9574d64b4b5e67d1a6f78a1"><enum>(B)</enum><text>in subparagraph (B)(ii), by striking <quote>; and</quote> and inserting a period; and</text>
 </subparagraph><subparagraph id="id5cc2532d972d404aa9512cfe7c5b4206"><enum>(C)</enum><text>by striking subparagraph (C);</text> </subparagraph></paragraph><paragraph id="id7f49a9dfdc6d4840a41a40d8780a7617"><enum>(2)</enum><text>by redesignating subsection (b) as subsection (c);</text>
 </paragraph><paragraph id="id2390abc4dc0a435aac2d7dc7bf0cf766"><enum>(3)</enum><text>by inserting after subsection (a) the following:</text> <quoted-block display-inline="no-display-inline" id="id2dc57fae907b4b06a6e25290a93bb3c6" style="OLC"> <subsection id="id623c1e68888b42328c92904c9e3c4521"><enum>(b)</enum><header>Intelligence community reports</header><paragraph commented="no" display-inline="yes-display-inline" id="idF73CBB1D5B594DBCA82178476B9ABCE5"><enum>(1)</enum><text>Not later than March 1 of each year, the Director of National Intelligence shall submit a report to the congressional intelligence committees, the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs of the Senate</committee-name>, and the <committee-name committee-id="">Committee on Homeland Security of the House of Representatives</committee-name> regarding the security clearances processed by each element of the intelligence community during the preceding fiscal year. Each report submitted under this paragraph shall separately identify security clearances processed for Federal employees and contractor employees sponsored by each such element.</text>
 </paragraph><paragraph id="idc5b979db021548d2929d96c414e04ef6" indent="up1"><enum>(2)</enum><text>Each report submitted under paragraph (1) shall include, for each element of the intelligence community for the fiscal year covered by the report, the following:</text>
 <subparagraph id="id4C3C4C05B7ED4B08847DD2FAE07AC0D8"><enum>(A)</enum><text>The total number of initial security clearance background investigations sponsored for new applicants.</text>
 </subparagraph><subparagraph id="id4B62AFCF3DAF478DB5E512443103B876"><enum>(B)</enum><text>The total number of security clearance periodic reinvestigations sponsored for existing employees.</text> </subparagraph><subparagraph id="id1FDD91F8037D48CFB26E489BC3A377DF"><enum>(C)</enum><text>The total number of initial security clearance background investigations for new applicants that were adjudicated with notice of a determination provided to the prospective applicant, including—</text>
 <clause id="idA559BEAD550F4EE88211039FB00CECD8"><enum>(i)</enum><text>the total number of such adjudications that were adjudicated favorably and granted access to classified information; and</text>
 </clause><clause id="id14126FAE53564B22A615A1C6999FD989"><enum>(ii)</enum><text>the total number of such adjudications that were adjudicated unfavorably and resulted in a denial or revocation of a security clearance.</text>
 </clause></subparagraph><subparagraph id="id2F5B2986850A49468D8C58C89756F7AF"><enum>(D)</enum><text>The total number of security clearance periodic background investigations that were adjudicated with notice of a determination provided to the existing employee, including—</text>
 <clause id="id82BA0CCEC5304BE6BD3A667A337FC628"><enum>(i)</enum><text>the total number of such adjudications that were adjudicated favorably; and</text> </clause><clause id="id39C915FF3068466F804C1CE6BB780F23"><enum>(ii)</enum><text>the total number of such adjudications that were adjudicated unfavorably and resulted in a denial or revocation of a security clearance.</text>
 </clause></subparagraph><subparagraph id="id492EF4E3E1144ED4AC80D7D277D5D1DA"><enum>(E)</enum><text>The total number of pending security clearance background investigations, including initial applicant investigations and periodic reinvestigations, that were not adjudicated as of the last day of such year and that remained pending, categorized as follows:</text>
 <clause id="id876A954B347E41D28CC93337A5AF0473"><enum>(i)</enum><text>For 180 days or shorter.</text> </clause><clause id="id577BA93A530943BCA265F12B8D71FEFB"><enum>(ii)</enum><text>For longer than 180 days, but shorter than 12 months.</text>
 </clause><clause id="id3EC6BCDC379144B4819B1B9A9219B3CC"><enum>(iii)</enum><text>For 12 months or longer, but shorter than 18 months.</text> </clause><clause id="id1BA5DD71EBB145A0927868D21C2FD5CF"><enum>(iv)</enum><text>For 18 months or longer, but shorter than 24 months.</text>
 </clause><clause id="id05F120AFDA69472982FBF279FCA4A067"><enum>(v)</enum><text>For 24 months or longer.</text> </clause></subparagraph><subparagraph id="id53A9DD1B06934B668393F6ABD4BC2C7A"><enum>(F)</enum><text>For any security clearance determinations completed or pending during the year preceding the year for which the report is submitted that have taken longer than 12 months to complete—</text>
 <clause id="idB091F2C2A5564C60B8F217BAAAEA91A0"><enum>(i)</enum><text>an explanation of the causes for the delays incurred during the period covered by the report; and</text> </clause><clause id="id5283A53EA08D432DAC785572F7C8F7E8"><enum>(ii)</enum><text>the number of such delays involving a polygraph requirement.</text>
 </clause></subparagraph><subparagraph id="id5EE4E64D7869479091D19941CF4FA70C"><enum>(G)</enum><text>The percentage of security clearance investigations, including initial and periodic reinvestigations, that resulted in a denial or revocation of a security clearance.</text>
 </subparagraph><subparagraph id="id81C8E3A3640747DBA75D920C459EB551"><enum>(H)</enum><text>The percentage of security clearance investigations that resulted in incomplete information.</text> </subparagraph><subparagraph id="idE07EBD0C19084B598BDE7163463EC225"><enum>(I)</enum><text>The percentage of security clearance investigations that did not result in enough information to make a decision on potentially adverse information.</text>
 </subparagraph></paragraph><paragraph id="idca10acedd4b3431f9d2d30259b4b9bf9" indent="up1"><enum>(3)</enum><text>The report required under this subsection shall be submitted in unclassified form, but may include a classified annex.</text></paragraph></subsection><after-quoted-block>; and</after-quoted-block></quoted-block>
 </paragraph><paragraph id="idb29637139ff44940888b50962273ccc1"><enum>(4)</enum><text>in subsection (c), as redesignated, by striking <quote>subsection (a)(1)</quote> and inserting <quote>subsections (a)(1) and (b)</quote>.</text> </paragraph></section><section commented="no" display-inline="no-display-inline" id="id76E491BFE47F4CCBA921E80B106E64AC" section-type="subsequent-section"><enum>611.</enum><header display-inline="yes-display-inline">Periodic report on positions in the intelligence community which can be conducted without access to classified information, networks, or facilities</header><text display-inline="no-display-inline">Not later than 180 days after the date of the enactment of this Act and not less frequently than once every 5 years thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees a report that reviews the intelligence community for which positions can be conducted without access to classified information, networks, or facilities, or may only require a security clearance at the secret level.</text>
			</section><section id="id34dd33b1a2ed4b688f56f696e31beea4"><enum>612.</enum><header>Information sharing program for positions of trust</header>
 <subsection id="id9CCC85ECC71C4EE386CD80BF2BA89DFF"><enum>(a)</enum><header>Agency defined</header><text>In this section, the term <term>agency</term> has the meaning given the term <term>Executive agency</term> in section 105 of title 5, United Stats Code.</text> </subsection><subsection id="id397A6D88BB8F45F3AFDCA615EB84B40A"><enum>(b)</enum><header>Program required</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent shall establish a program to share between and among agencies and industry partners of the Federal Government information regarding individuals applying for and in positions of trust, including derogatory and suitability information.</text>
 </subsection><subsection id="idaef35180c87a41f184192b1583c2e2e9"><enum>(c)</enum><header>Goal</header><text>The goal of the program required by subsection (b) shall be to alert agencies and industry partners as to individuals who may require further vetting or should be subject to certain insider threat programs regarding granted access, or continued access, to classified information, especially when such individuals change agencies, employers, or contracts.</text>
 </subsection><subsection id="id2C92D608FD9D4115987B8145CB1D6177"><enum>(d)</enum><header>Privacy safeguards</header><text display-inline="yes-display-inline">The Security Executive Agent shall ensure that the program required by subsection (b) includes such safeguards for privacy as the Security Executive Agent considers appropriate.</text>
 </subsection><subsection id="id12C3D8870BE549098F0697B485B3A559"><enum>(e)</enum><header>Provision of information to the private sector</header><text>The Security Executive Agent shall ensure that under the program required by subsection (b)—</text> <paragraph id="idE782D20A3D5148049E1AB473EAB5A197"><enum>(1)</enum><text>sufficient information is provided to the private sector so that employers in the private sector can make informed decisions about hiring and retention in positions of trust; and</text>
 </paragraph><paragraph id="id12D4A393D54C4CC4973D3E055BEF6254"><enum>(2)</enum><text>agencies and private sector entities that receive information under the program have the capabilities in place to safeguard personnel privacy in compliance with applicable law and policy.</text>
					</paragraph></subsection><subsection id="id44277b211ffe44d098f2a355c6e90741"><enum>(f)</enum><header>Implementation plan</header>
 <paragraph id="id068508DFBE154319B4B516D52166A74E"><enum>(1)</enum><header>In general</header><text>Not later than 90 days after the date of the enactment of this Act, the Security Executive Agent shall submit a plan to the appropriate congressional committees for the implementation of the program required under subsection (b).</text>
 </paragraph><paragraph id="idFF01AA99C8FF4D18809143555641910D"><enum>(2)</enum><header>Contents</header><text>The plan required under paragraph (1) shall include—</text> <subparagraph id="id0D2F460721B34B759A7DC1B3702B70D5"><enum>(A)</enum><text>matters that address privacy, security, and human resources processes; and</text>
 </subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id245DBD36169B493496BC899A32AEDB81"><enum>(B)</enum><text>any recommendations of the Security Executive Agent for legislative or administrative action to carry out or improve the program.</text>
 </subparagraph></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="idFAEDD3EC0A3C4E58BD581F2D1ADB2FF2" section-type="subsequent-section"><enum>613.</enum><header>Report on protections for confidentiality of whistleblower-related communications</header><text display-inline="no-display-inline">Not later than 180 days after the date of the enactment of this Act, the Security Executive Agent shall, in coordination with the Inspector General of the Intelligence Community, submit to the appropriate congressional committees a report detailing the controls employed by the intelligence community to ensure that continuous evaluation programs, including those involving user activity monitoring, protect the confidentiality of whistleblower-related communications.</text>
			</section></title><title id="idE3EDB7FC84764B6EB4E959F69327FEF9" style="OLC"><enum>VII</enum><header>Reports and other matters</header>
			<subtitle id="idC943857FA0B64911BC6BE26755D0418D" style="OLC"><enum>A</enum><header>Matters relating to Russia and other foreign powers</header>
				<section id="H2F0B799FD3E743DE9DE829AF780803C1"><enum>701.</enum><header>Limitation relating to establishment or support of cybersecurity unit with the Government of Russia</header>
 <subsection id="HA021DA244BC44842B36F402115F3BAAA"><enum>(a)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text> <paragraph id="HEE136516046C4DDAB4BA61A5F60DB35F"><enum>(1)</enum><text>the congressional intelligence committees; and</text>
 </paragraph><paragraph id="H3207F1788EFE42A2A7A85E8AFCA06ED5"><enum>(2)</enum><text>the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives.</text>
						</paragraph></subsection><subsection id="H41D39863AFD1414FA7A07FEDF51DA68C"><enum>(b)</enum><header>Limitation</header>
 <paragraph id="H809127F9DCB3440893DA3530EE378565"><enum>(1)</enum><header>In general</header><text>No amount may be expended by the Federal Government, other than the Department of Defense, to enter into or implement any bilateral agreement between the United States and the Russian Federation regarding cybersecurity, including the establishment or support of any cybersecurity unit, unless, at least 30 days prior to the conclusion of any such agreement, the Director of National Intelligence submits to the appropriate congressional committees a report on such agreement that includes the elements required by subsection (c).</text>
 </paragraph><paragraph id="HFA6DE10157F1408B9BF942CB0A4707F4"><enum>(2)</enum><header>Department of Defense agreements</header><text display-inline="yes-display-inline">Any agreement between the Department of Defense and the Russian Federation regarding cybersecurity shall be conducted in accordance with section 1232 of the National Defense Authorization Act for Fiscal Year 2017 (<external-xref legal-doc="public-law" parsable-cite="pl/114/328">Public Law 114–328</external-xref>), as amended by section 1231 of the National Defense Authorization Act for Fiscal Year 2018 (<external-xref legal-doc="public-law" parsable-cite="pl/115/91">Public Law 115–91</external-xref>).</text>
 </paragraph></subsection><subsection id="H6C7C867D90C8444F8A678900C60F3065"><enum>(c)</enum><header>Elements</header><text>If the Director submits a report under subsection (a) with respect to an agreement, such report shall include a description of each of the following:</text>
 <paragraph id="HDC448466704749799E9F1C4347AD882C"><enum>(1)</enum><text>The purpose of the agreement.</text> </paragraph><paragraph id="H14C529928E0749469100FA61FDAC238C"><enum>(2)</enum><text>The nature of any intelligence to be shared pursuant to the agreement.</text>
 </paragraph><paragraph id="HF5B72045F0814EB8AFD9E3306FA0D7BB"><enum>(3)</enum><text>The expected value to national security resulting from the implementation of the agreement.</text> </paragraph><paragraph id="HC6569073500244BCB98AAC5DB0D56D79"><enum>(4)</enum><text>Such counterintelligence concerns associated with the agreement as the Director may have and such measures as the Director expects to be taken to mitigate such concerns.</text>
 </paragraph></subsection><subsection id="HBCCC0372B1804E9988C55B0C9675604D"><enum>(d)</enum><header>Rule of construction</header><text display-inline="yes-display-inline">This section shall not be construed to affect any existing authority of the Director of National Intelligence, the Director of the Central Intelligence Agency, or any other head of an element of the intelligence community, to share or receive foreign intelligence on a case-by-case basis.</text>
					</subsection></section><section id="H17C81FB3B20C486F81DDF69C9AD8F7EB"><enum>702.</enum><header>Report on returning Russian compounds</header>
 <subsection id="HC4EDBD76FD8843608145A08F427CDEDC"><enum>(a)</enum><header>Covered compounds defined</header><text display-inline="yes-display-inline">In this section, the term <term>covered compounds</term> means the real property in New York, the real property in Maryland, and the real property in San Francisco, California, that were under the control of the Government of Russia in 2016 and were removed from such control in response to various transgressions by the Government of Russia, including the interference by the Government of Russia in the 2016 election in the United States.</text>
 </subsection><subsection id="H0F0B61246CB2439899076D435672A4F6"><enum>(b)</enum><header>Requirement for report</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the intelligence risks of returning the covered compounds to Russian control.</text>
 </subsection><subsection id="H03D7BF74EF5C420E9F075BDF79814253"><enum>(c)</enum><header>Form of report</header><text display-inline="yes-display-inline">The report required by this section shall be submitted in classified and unclassified forms.</text> </subsection></section><section id="H95C2AB39EA9640F99B6DEA874DD0B983"><enum>703.</enum><header>Assessment of threat finance relating to Russia</header> <subsection id="H45E46BEF50D245738136B79BAF12043E"><enum>(a)</enum><header>Threat finance defined</header><text>In this section, the term <term>threat finance</term> means—</text>
 <paragraph id="H995BC60DCCF64D0DA9858BEF619B0190"><enum>(1)</enum><text display-inline="yes-display-inline">the financing of cyber operations, global influence campaigns, intelligence service activities, proliferation, terrorism, or transnational crime and drug organizations;</text>
 </paragraph><paragraph id="H3F8D49E41BB84E9590ABA21ECC907971"><enum>(2)</enum><text>the methods and entities used to spend, store, move, raise, conceal, or launder money or value, on behalf of threat actors;</text>
 </paragraph><paragraph id="HE34F809109864FDDB629448EDD6C4D3F"><enum>(3)</enum><text>sanctions evasion; and</text> </paragraph><paragraph id="H54C56353ACC74113B06B5A4673781FE6"><enum>(4)</enum><text>other forms of threat finance activity domestically or internationally, as defined by the President.</text>
 </paragraph></subsection><subsection id="HF83F4149A9F8465D9546A3479D9E3023"><enum>(b)</enum><header>Report required</header><text display-inline="yes-display-inline">Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Assistant Secretary of the Treasury for Intelligence and Analysis, shall submit to the congressional intelligence committees a report containing an assessment of Russian threat finance. The assessment shall be based on intelligence from all sources, including from the Office of Terrorism and Financial Intelligence of the Department of the Treasury.</text>
 </subsection><subsection id="H9D1715097F044604A4FE650AD3E11613"><enum>(c)</enum><header>Elements</header><text display-inline="yes-display-inline">The report required by subsection (b) shall include each of the following:</text> <paragraph id="H2BA7C29DF08B4F7CA6E08508E1FE720F"><enum>(1)</enum><text display-inline="yes-display-inline">A summary of leading examples from the 3-year period preceding the date of the submittal of the report of threat finance activities conducted by, for the benefit of, or at the behest of—</text>
 <subparagraph id="H0BFCEFEE24E54889BEF0E2602D148AB4"><enum>(A)</enum><text>officials of the Government of Russia;</text> </subparagraph><subparagraph id="H0505DE0F6A2A4B17B5F8A91F8C9AB14D"><enum>(B)</enum><text>persons subject to sanctions under any provision of law imposing sanctions with respect to Russia;</text>
 </subparagraph><subparagraph id="H232CBE89350244A69FFC2F4400D614FE"><enum>(C)</enum><text>Russian nationals subject to sanctions under any other provision of law; or</text> </subparagraph><subparagraph id="H4297BF4754BE474599198405918A0372"><enum>(D)</enum><text>Russian oligarchs or individuals involved in organized crime.</text>
 </subparagraph></paragraph><paragraph id="H279A3E1C3D2E4E1DB96941A9A146EE27"><enum>(2)</enum><text display-inline="yes-display-inline">An assessment with respect to any trends or patterns in threat finance activities relating to Russia, including common methods of conducting such activities and global nodes of money laundering used by Russian threat actors described in paragraph (1) and associated entities.</text>
 </paragraph><paragraph id="HB9B583C3DE21419C83752CCB8AAA6A73"><enum>(3)</enum><text display-inline="yes-display-inline">An assessment of any connections between Russian individuals involved in money laundering and the Government of Russia.</text>
 </paragraph><paragraph id="HE92BC92AFD48404C988AAD3480B450AB"><enum>(4)</enum><text>A summary of engagement and coordination with international partners on threat finance relating to Russia, especially in Europe, including examples of such engagement and coordination.</text>
 </paragraph><paragraph id="HF8627F55B94F4FAF9FB6BFFBCCBAC434"><enum>(5)</enum><text>An identification of any resource and collection gaps.</text> </paragraph><paragraph id="HB48846C177EE454B934A8790F3BADC26"><enum>(6)</enum><text display-inline="yes-display-inline">An identification of—</text>
 <subparagraph id="HD1A08B1E5D6A44A2963A7E0F0E4FDC71"><enum>(A)</enum><text>entry points of money laundering by Russian and associated entities into the United States;</text> </subparagraph><subparagraph id="H5BE29D3AE28F4EADAD008ACF59C09562"><enum>(B)</enum><text>any vulnerabilities within the United States legal and financial system, including specific sectors, which have been or could be exploited in connection with Russian threat finance activities; and</text>
 </subparagraph><subparagraph id="H744578A611344FBD9B33C178B4D687A4"><enum>(C)</enum><text>the counterintelligence threat posed by Russian money laundering and other forms of threat finance, as well as the threat to the United States financial system and United States efforts to enforce sanctions and combat organized crime.</text>
 </subparagraph></paragraph><paragraph id="H2F6989FB0CB94232AF9EB8B2485A104C"><enum>(7)</enum><text>Any other matters the Director determines appropriate.</text> </paragraph></subsection><subsection id="H497FAED953DA49998CEA0EEF9C2F3647"><enum>(d)</enum><header>Form of report</header><text display-inline="yes-display-inline">The report required under subsection (b) may be submitted in classified form.</text>
					</subsection></section><section id="H209BDA5670A646CA8170A97229735FDC"><enum>704.</enum><header>Notification of an active measures campaign</header>
 <subsection id="H568EC875F18B4B248F66CA51775240B0"><enum>(a)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text> <paragraph id="HB30D7E67B8BC4B328E068EC31C80B9CD"><enum>(1)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text>
 <subparagraph id="H939A0FD67CB541A2AF32ECB93B12F94F"><enum>(A)</enum><text>the congressional intelligence committees; and</text> </subparagraph><subparagraph id="H87F9564D633841139371A2A9E12B5553"><enum>(B)</enum><text>the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives.</text>
 </subparagraph></paragraph><paragraph display-inline="no-display-inline" id="H62BCD5ABA37C47079904E64DAC20513D"><enum>(2)</enum><header>Congressional leadership</header><text>The term <term>congressional leadership</term> includes the following:</text> <subparagraph id="H04913191E2834500A10A98C7DBE35262"><enum>(A)</enum><text>The majority leader of the Senate.</text>
 </subparagraph><subparagraph id="H67201BF1B37B4A5F8C12F885EFE47F7D"><enum>(B)</enum><text>The minority leader of the Senate.</text> </subparagraph><subparagraph id="HB21396BB3E4948A7B1B2BF620BB7E150"><enum>(C)</enum><text>The Speaker of the House of Representatives.</text>
 </subparagraph><subparagraph id="HD9C1EE7A9DDA472390EAD37E8C250D36"><enum>(D)</enum><text>The minority leader of the House of Representatives.</text> </subparagraph></paragraph></subsection><subsection id="H8DAA52760DE44460A7A6A387CFF7D514"><enum>(b)</enum><header>Requirement for notification</header><text display-inline="yes-display-inline">The Director of National Intelligence, in cooperation with the Director of the Federal Bureau of Investigation and the head of any other relevant agency, shall notify the congressional leadership and the Chairman and Vice Chairman or Ranking Member of each of the appropriate congressional committees, and of other relevant committees of jurisdiction, each time the Director of National Intelligence determines there is credible information that a foreign power has, is, or will attempt to employ a covert influence or active measures campaign with regard to the modernization, employment, doctrine, or force posture of the nuclear deterrent or missile defense.</text>
 </subsection><subsection id="H078E5D5B1B2145A2B20907709C065833"><enum>(c)</enum><header>Content of notification</header><text>Each notification required by subsection (a) shall include information concerning actions taken by the United States to expose or halt an attempt referred to in subsection (a).</text>
					</subsection></section><section id="H7850D8BBA986435882F8AAE28D2FF19C"><enum>705.</enum><header>Notification of travel by accredited diplomatic and consular personnel of the Russian Federation in
 the United States</header><text display-inline="no-display-inline">In carrying out the advance notification requirements set out in section 502 of the Intelligence Authorization Act for Fiscal Year 2017 (division N of <external-xref legal-doc="public-law" parsable-cite="pl/115/31">Public Law 115–31</external-xref>; 131 Stat. 825; <external-xref legal-doc="usc" parsable-cite="usc/22/254a">22 U.S.C. 254a</external-xref> note), the Secretary of State shall—</text>
 <paragraph id="H5E96AF0EA7EF4A3490D4C06402088DF8"><enum>(1)</enum><text display-inline="yes-display-inline">ensure that the Russian Federation provides notification to the Secretary of State at least 2 business days in advance of all travel that is subject to such requirements by accredited diplomatic and consular personnel of the Russian Federation in the United States, and take necessary action to secure full compliance by Russian personnel and address any noncompliance; and</text>
 </paragraph><paragraph id="HA220A5CBC061441FA01A259D7EBAD921"><enum>(2)</enum><text>provide notice of travel described in paragraph (1) to the Director of National Intelligence and the Director of the Federal Bureau of Investigation within 1 hour of receiving notice of such travel.</text>
					</paragraph></section></subtitle><subtitle id="id5FD92BCDCAB344A090AB43537A5394FA" style="OLC"><enum>B</enum><header>Reports</header>
 <section id="HE6D25676F983488783EBE633B9CC6F55"><enum>711.</enum><header>Technical correction to Inspector General study</header><text display-inline="no-display-inline">Section 11001(d) of title 5, United States Code, is amended—</text> <paragraph id="H23A90AB32B664D00AB018323DA685C7D"><enum>(1)</enum><text>in the subsection heading, by striking <quote><header-in-text level="subsection" style="OLC">Audit</header-in-text></quote> and inserting <quote><header-in-text level="subsection" style="OLC">Review</header-in-text></quote>;</text>
 </paragraph><paragraph id="HE7DFB43597C341CF850C4773DF3AE5BD"><enum>(2)</enum><text>in paragraph (1), by striking <quote>audit</quote> and inserting <quote>review</quote>; and</text> </paragraph><paragraph id="H017FBEC1AF0A45599A9CE57A329DB69C"><enum>(3)</enum><text>in paragraph (2), by striking <quote>audit</quote> and inserting <quote>review</quote>.</text>
					</paragraph></section><section id="H68670F3136A948018871399C7CA2831D"><enum>712.</enum><header>Reports on authorities of the Chief Intelligence Officer of the Department of Homeland Security</header>
 <subsection id="HC865F962A3F842EF8FD4B25FA02581A0"><enum>(a)</enum><header>Homeland Security Intelligence Enterprise defined</header><text>In this section, the term <term>Homeland Security Intelligence Enterprise</term> has the meaning given such term in Department of Homeland Security Instruction Number 264–01–001, or successor authority.</text>
 </subsection><subsection id="H3ADFD078296641A99E4733A2F73D00FE"><enum>(b)</enum><header>Requirement for report</header><text display-inline="yes-display-inline">Not later than 120 days after the date of the enactment of this Act, the Secretary of Homeland Security, in consultation with the Under Secretary of Homeland Security for Intelligence and Analysis, shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Homeland Security of the House of Representatives a report on the authorities of the Under Secretary.</text>
 </subsection><subsection id="H9507C0415320478B915661A251084343"><enum>(c)</enum><header>Elements</header><text>The report required by subsection (b) shall include each of the following:</text> <paragraph id="H542938C39BBE43F1B3CC088BDA0E01D2"><enum>(1)</enum><text>An analysis of whether the Under Secretary has the legal and policy authority necessary to organize and lead the Homeland Security Intelligence Enterprise, with respect to intelligence, and, if not, a description of—</text>
 <subparagraph id="H2D8EB923F0654077A39572F4C18965A2"><enum>(A)</enum><text>the obstacles to exercising the authorities of the Chief Intelligence Officer of the Department and the Homeland Security Intelligence Council, of which the Chief Intelligence Officer is the chair; and</text>
 </subparagraph><subparagraph id="H67A588BA6D26472FB0CA8F6AA9241145"><enum>(B)</enum><text>the legal and policy changes necessary to effectively coordinate, organize, and lead intelligence activities of the Department of Homeland Security.</text>
 </subparagraph></paragraph><paragraph id="HC29D18CE766F450FAFD747B9EC508643"><enum>(2)</enum><text>A description of the actions that the Secretary has taken to address the inability of the Under Secretary to require components of the Department, other than the Office of Intelligence and Analysis of the Department to—</text>
 <subparagraph id="H1A3EA6ACE8CA4D8E847B7357E3EC54D2"><enum>(A)</enum><text>coordinate intelligence programs; and</text> </subparagraph><subparagraph id="H68F06AF2262045EB88AEAA687EE15E3B"><enum>(B)</enum><text>integrate and standardize intelligence products produced by such other components.</text>
							</subparagraph></paragraph></subsection></section><section id="HBEF37A9BBBDD4DF98A093256134DF66D" section-type="subsequent-section"><enum>713.</enum><header>Report on cyber exchange program</header>
 <subsection id="H12742C608DD14F6FB474FC9DB9395BE2"><enum>(a)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the potential establishment of a fully voluntary exchange program between elements of the intelligence community and private technology companies under which—</text>
 <paragraph id="H66D624AAB71545D59B7D55CA06B607CB"><enum>(1)</enum><text display-inline="yes-display-inline">an employee of an element of the intelligence community with demonstrated expertise and work experience in cybersecurity or related disciplines may elect to be temporarily detailed to a private technology company that has elected to receive the detailee; and</text>
 </paragraph><paragraph id="H2F665BDE77FC49CC989C141987CA70C2"><enum>(2)</enum><text display-inline="yes-display-inline">an employee of a private technology company with demonstrated expertise and work experience in cybersecurity or related disciplines may elect to be temporarily detailed to an element of the intelligence community that has elected to receive the detailee.</text>
 </paragraph></subsection><subsection id="HF66C2288CDCD46F990364BA332B1B8A2"><enum>(b)</enum><header>Elements</header><text>The report under subsection (a) shall include the following:</text> <paragraph id="HF8E91026999C43828BCE00F6E609879B"><enum>(1)</enum><text>An assessment of the feasibility of establishing the exchange program described in such subsection.</text>
 </paragraph><paragraph id="H94B443324F6B4B45B03A43DC57081C2C"><enum>(2)</enum><text>Identification of any challenges in establishing the exchange program.</text> </paragraph><paragraph id="H8A66F1F04A5747169A5670D4B849BC52"><enum>(3)</enum><text>An evaluation of the benefits to the intelligence community that would result from the exchange program.</text>
						</paragraph></subsection></section><section id="H38BB17BF5EF843F2B738684CFEA41237" section-type="subsequent-section"><enum>714.</enum><header>Report on role of Director of National Intelligence with respect to certain foreign investments</header>
 <subsection id="HED9405D8FEB44D5B95B1D3CAAFE73F20"><enum>(a)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the heads of the elements of the intelligence community determined appropriate by the Director, shall submit to the congressional intelligence committees a report on the role of the Director in preparing analytic materials in connection with the evaluation by the Federal Government of national security risks associated with potential foreign investments into the United States.</text>
 </subsection><subsection id="HDA806B966762490E92106EBC68D7E213"><enum>(b)</enum><header>Elements</header><text>The report under subsection (a) shall include—</text> <paragraph id="H3904D27BCDA945D682CD35CB9FC3E8C4"><enum>(1)</enum><text display-inline="yes-display-inline">a description of the current process for the provision of the analytic materials described in subsection (a);</text>
 </paragraph><paragraph id="HC13B1E86811B4CC4A6C745361AF6D0F9"><enum>(2)</enum><text display-inline="yes-display-inline">identification of the most significant benefits and drawbacks of such process with respect to the role of the Director, including any benefits or drawbacks relating to the time allotted to the Director to prepare such materials; and</text>
 </paragraph><paragraph id="H964DE97503FF4F7CAF1431818F1C731C"><enum>(3)</enum><text>recommendations to improve such process.</text> </paragraph></subsection></section><section id="H25CB6456ABF041F8B094D40167CD4BD8"><enum>715.</enum><header>Report on surveillance by foreign governments against United States telecommunications networks</header> <subsection id="HB6320CABFB5742889A250D33D6EAF9B1"><enum>(a)</enum><header>Appropriate congressional committees defined</header><text>In this section, the term <term>appropriate congressional committees</term> means the following:</text>
 <paragraph id="HC9F06238CCD64A55906D743A6570B7D8"><enum>(1)</enum><text display-inline="yes-display-inline">The congressional intelligence committees.</text> </paragraph><paragraph id="H75C1FFB1BE7B46A38E1D52CAE831BFF5"><enum>(2)</enum><text display-inline="yes-display-inline">The Committee on the Judiciary and the Committee on Homeland Security and Governmental Affairs of the Senate.</text>
 </paragraph><paragraph id="HC6CE68EDDCD14B1E931A222B4A1B37ED"><enum>(3)</enum><text display-inline="yes-display-inline">The Committee on the Judiciary and the Committee on Homeland Security of the House of Representatives.</text>
 </paragraph></subsection><subsection id="H444D49F00D0A4BE08D12978E7528F5D3"><enum>(b)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall, in coordination with the Director of the Central Intelligence Agency, the Director of the National Security Agency, the Director of the Federal Bureau of Investigation, and the Secretary of Homeland Security, submit to the appropriate congressional committees a report describing—</text>
 <paragraph id="HB5859ADCE08342BC81BE0740D7F6E00E"><enum>(1)</enum><text>any attempts known to the intelligence community by foreign governments to exploit cybersecurity vulnerabilities in United States telecommunications networks (including Signaling System No. 7) to target for surveillance of United States persons, including employees of the Federal Government; and</text>
 </paragraph><paragraph id="H3552B40BC68943AAA81C03B72664D1A0"><enum>(2)</enum><text>any actions, as of the date of the enactment of this Act, taken by the intelligence community to protect agencies and personnel of the United States Government from surveillance conducted by foreign governments.</text>
						</paragraph></subsection></section><section id="HC15E20CE5FA740A1A27155F596D0F6D0"><enum>716.</enum><header>Biennial report on foreign investment risks</header>
					<subsection id="H78F67131E93041979FC0353E8E9CF461"><enum>(a)</enum><header>Intelligence community interagency working group</header>
 <paragraph id="HF6F74D7D3F2840E38F4A230B4025B800"><enum>(1)</enum><header>Requirement to establish</header><text display-inline="yes-display-inline">The Director of National Intelligence shall establish an intelligence community interagency working group to prepare the biennial reports required by subsection (b).</text>
 </paragraph><paragraph id="H2462A35DAC964D518E6D94B4B60322F7"><enum>(2)</enum><header>Chairperson</header><text display-inline="yes-display-inline">The Director of National Intelligence shall serve as the chairperson of such interagency working group.</text>
 </paragraph><paragraph id="H52EC94FB553C427AB6B4FC4A4B624ABF"><enum>(3)</enum><header>Membership</header><text display-inline="yes-display-inline">Such interagency working group shall be composed of representatives of each element of the intelligence community that the Director of National Intelligence determines appropriate.</text>
						</paragraph></subsection><subsection id="H632E30BBF0AD402B9319E9000D43143D"><enum>(b)</enum><header>Biennial report on foreign investment risks</header>
 <paragraph id="HD46F1A0CEA124F5FA52C7BE61DAE5836"><enum>(1)</enum><header>Report required</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, and biennially thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Homeland Security of the House of Representatives a report on foreign investment risks prepared by the interagency working group established under subsection (a).</text>
 </paragraph><paragraph id="HCD6A56C8D38446768EE41C846CFC9C0A"><enum>(2)</enum><header>Elements</header><text>Each report required by paragraph (1) shall include an identification, analysis, and explanation of the following:</text>
 <subparagraph id="H5D5781FBCD7E42C1867C1B5BD0C94DE1"><enum>(A)</enum><text>Any current or projected major threats to the national security of the United States with respect to foreign investment.</text>
 </subparagraph><subparagraph id="H5BEF5FFBB41348BE8CF3C710B2185348"><enum>(B)</enum><text>Any strategy used by a foreign country that such interagency working group has identified to be a country of special concern to use foreign investment to target the acquisition of critical technologies, critical materials, or critical infrastructure.</text>
 </subparagraph><subparagraph id="HE177579B80FA4946979CFB8D6EEB6807"><enum>(C)</enum><text display-inline="yes-display-inline">Any economic espionage efforts directed at the United States by a foreign country, particularly such a country of special concern.</text>
 </subparagraph></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="H062A70000AD9483193D9DE02676EEE79" section-type="subsequent-section"><enum>717.</enum><header display-inline="yes-display-inline">Modification of certain reporting requirement on travel of foreign diplomats</header><text display-inline="no-display-inline">Section 502(d)(2) of the Intelligence Authorization Act for Fiscal Year 2017 (<external-xref legal-doc="public-law" parsable-cite="pl/115/31">Public Law 115–31</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/22/254a">22 U.S.C. 254a</external-xref> note) is amended by striking <quote>the number</quote> and inserting <quote>a best estimate</quote>.</text>
				</section><section id="H8DAB3AF5F7E44870ABF6D07BCE58366B"><enum>718.</enum><header>Semiannual reports on investigations of unauthorized disclosures of classified information</header>
 <subsection id="HAD8242C453C540C68B7CF9C39249465D"><enum>(a)</enum><header>In general</header><text>Title XI of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3231">50 U.S.C. 3231</external-xref> et seq.) is amended by adding at the end the following new section:</text>
						<quoted-block display-inline="no-display-inline" id="HEFF8A0CC219F4DACA50E0D57DF75FB15" style="OLC">
							<section id="HABA9CD4ED71441F294280417DE10AA7E"><enum>1105.</enum><header>Semiannual reports on investigations of unauthorized disclosures of classified information</header>
 <subsection id="id31E59C1F826D405D8E22F11262EB73A5"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="id2A5EFC4EB85746B19A8C9BDEAF39B436"><enum>(1)</enum><header>Covered official</header><text>The term <term>covered official</term> means—</text>
 <subparagraph id="idF9F70F3C2B8B426E9EE347891BA6B5A3"><enum>(A)</enum><text>the heads of each element of the intelligence community; and</text> </subparagraph><subparagraph id="id56B96E40F2E044E7B5BCF45206FAAA16"><enum>(B)</enum><text>the inspectors general with oversight responsibility for an element of the intelligence community.</text>
 </subparagraph></paragraph><paragraph id="idBE83CA7E52C4436D9DD4B8F7E7CE75E2"><enum>(2)</enum><header>Investigation</header><text>The term <term>investigation</term> means any inquiry, whether formal or informal, into the existence of an unauthorized public disclosure of classified information.</text>
 </paragraph><paragraph id="idCD2A956F76944C02B27FBBD3E528DA8D"><enum>(3)</enum><header>Unauthorized disclosure of classified information</header><text>The term <term>unauthorized disclosure of classified information</term> means any unauthorized disclosure of classified information to any recipient.</text> </paragraph><paragraph id="idCF26F33358BF46378C604D9A87439034"><enum>(4)</enum><header>Unauthorized public disclosure of classified information</header><text>The term <term>unauthorized public disclosure of classified information</term> means the unauthorized disclosure of classified information to a journalist or media organization.</text>
									</paragraph></subsection><subsection id="HCC2800B3E00E424F9B2623C0834AE46D"><enum>(b)</enum><header>Intelligence community reporting</header>
 <paragraph id="HCA96CFD18D3446E0A65B11A6BE120E89"><enum>(1)</enum><header>In general</header><text>Not less frequently than once every 6 months, each covered official shall submit to the congressional intelligence committees a report on investigations of unauthorized public disclosures of classified information.</text>
 </paragraph><paragraph id="H4F6ED92E71AA4478B3C3D1042A8BF627"><enum>(2)</enum><header>Elements</header><text>Each report submitted under paragraph (1) shall include, with respect to the preceding 6-month period, the following:</text>
 <subparagraph id="H64C7A0A3AC594DA69F9D02B1E78AEDAE"><enum>(A)</enum><text>The number of investigations opened by the covered official regarding an unauthorized public disclosure of classified information.</text>
 </subparagraph><subparagraph id="HAFC90D746F634E57B657B1A65CBE03F0"><enum>(B)</enum><text>The number of investigations completed by the covered official regarding an unauthorized public disclosure of classified information.</text>
 </subparagraph><subparagraph id="HF2FD2A21F562471B9C8F7C15384F4C25"><enum>(C)</enum><text>Of the number of such completed investigations identified under subparagraph (B), the number referred to the Attorney General for criminal investigation.</text>
										</subparagraph></paragraph></subsection><subsection id="H77477C43D56B4DDCBDF18361DEE7398A"><enum>(c)</enum><header>Department of Justice reporting</header>
 <paragraph id="H17AC7E9FCC2E44C28EA892388419F445"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not less frequently than once every 6 months, the Assistant Attorney General for National Security of the Department of Justice, in consultation with the Director of the Federal Bureau of Investigation, shall submit to the congressional intelligence committees, the Committee on the Judiciary of the Senate, and the Committee on the Judiciary of the House of Representatives a report on the status of each referral made to the Department of Justice from any element of the intelligence community regarding an unauthorized disclosure of classified information made during the most recent 365-day period or any referral that has not yet been closed, regardless of the date the referral was made.</text>
 </paragraph><paragraph id="H356005ACF2B646FB8C919C503797823D"><enum>(2)</enum><header>Contents</header><text>Each report submitted under paragraph (1) shall include, for each referral covered by the report, at a minimum, the following:</text>
 <subparagraph id="HA76DD4AFE19D406A8CDBFF40AF839E76"><enum>(A)</enum><text>The date the referral was received.</text> </subparagraph><subparagraph id="H68F7B97BBEA6460DA3B5700AFC4458BF"><enum>(B)</enum><text>A statement indicating whether the alleged unauthorized disclosure described in the referral was substantiated by the Department of Justice.</text>
 </subparagraph><subparagraph id="HD33C1378B2794F9A8F3E64433BA487A8"><enum>(C)</enum><text>A statement indicating the highest level of classification of the information that was revealed in the unauthorized disclosure.</text>
 </subparagraph><subparagraph id="H0C614B1C79354B079D894AF2A94AB40C"><enum>(D)</enum><text>A statement indicating whether an open criminal investigation related to the referral is active.</text> </subparagraph><subparagraph id="H1E1B3F81E37F4524B631F8D9335F1381"><enum>(E)</enum><text>A statement indicating whether any criminal charges have been filed related to the referral.</text>
 </subparagraph><subparagraph id="HAD0B1568267442218FB0CF841F85DC6C"><enum>(F)</enum><text>A statement indicating whether the Department of Justice has been able to attribute the unauthorized disclosure to a particular entity or individual.</text>
 </subparagraph></paragraph></subsection><subsection id="HC850DA68B57241E98C1A04BCFA840E60"><enum>(d)</enum><header>Form of reports</header><text>Each report submitted under this section shall be submitted in unclassified form, but may have a classified annex.</text>
								</subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="HAEA0053C0FFE4698815A4C11D1682365"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents in the first section of the National Security Act of 1947 is amended by inserting after the item relating to section 1104 the following new item:</text>
						<quoted-block id="HF508C810B3BD4FC1B476FB1D7695B8C2" style="OLC">
							<toc>
								<toc-entry idref="HABA9CD4ED71441F294280417DE10AA7E" level="section">Sec. 1105. Semiannual reports on investigations of unauthorized disclosures of classified
			 information.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
					</subsection></section><section id="id2977376B9E63420B90BC59D76981BE00"><enum>719.</enum><header>Congressional notification of designation of covered intelligence officer as persona non grata</header>
 <subsection id="H19E7792BD9A04B5AA5F0906D230D2212"><enum>(a)</enum><header>Intelligence officer defined</header><text>In this section, the term <term>covered intelligence officer</term> means—</text> <paragraph id="HE6C6664F9CCC41E6AD3CA2861FF09228"><enum>(1)</enum><text>a United States intelligence officer serving in a post in a foreign country; or</text>
 </paragraph><paragraph id="H09B955622BD044F29250934FDD5F84DB"><enum>(2)</enum><text>a known or suspected foreign intelligence officer serving in a United States post.</text> </paragraph></subsection><subsection id="H7E724D8C1100446995D3482170A0C7C6"><enum>(b)</enum><header>Requirement for reports</header><text>Not later than 72 hours after a covered intelligence officer is designated as a persona non grata, the Director of National Intelligence, in consultation with the Secretary of State, shall submit to the congressional intelligence committees a notification of that designation. Each such notification shall include—</text>
 <paragraph id="H895772D8E13540319EC16ABE513A5A2F"><enum>(1)</enum><text>the date of the designation;</text> </paragraph><paragraph id="H9779E3B0E25344C3A4ABE0718A49BFA9"><enum>(2)</enum><text>the basis for the designation; and</text>
 </paragraph><paragraph id="H7FCA4B1880324A84A023B027BF324B73"><enum>(3)</enum><text>a justification for the expulsion.</text> </paragraph></subsection></section><section display-inline="no-display-inline" id="HB47DF4B73E0445C89F6CF10754E940B5" section-type="subsequent-section"><enum>720.</enum><header>Inspectors General reports on classification</header> <subsection id="H218EE7B4D67542AA8F7439A81D31271C"><enum>(a)</enum><header>Reports</header><text display-inline="yes-display-inline">Not later than October 1, 2019, each Inspector General listed in subsection (b) shall submit to the congressional intelligence committees a report that includes, with respect to the department or agency of the Inspector General, analyses of the following:</text>
 <paragraph id="H72A5A2ABE9E344E8809D18CBABBA890D"><enum>(1)</enum><text display-inline="yes-display-inline">The accuracy of the application of classification and handling markers on a representative sample of finished reports, including such reports that are compartmented.</text>
 </paragraph><paragraph id="H76B6DC7D274E41B5AA36A87549A3877D"><enum>(2)</enum><text display-inline="yes-display-inline">Compliance with declassification procedures.</text> </paragraph><paragraph id="H2AB432DB643D40C3801CABE4E4D46F5D"><enum>(3)</enum><text display-inline="yes-display-inline">The effectiveness of processes for identifying topics of public or historical importance that merit prioritization for a declassification review.</text>
 </paragraph></subsection><subsection id="H6054D095C5BD45DB89E4FC52974B25EC"><enum>(b)</enum><header>Inspectors General</header><text>The Inspectors General listed in this subsection are as follows:</text> <paragraph id="H0825CD7B32A341D08CC8EBC501ACFD76"><enum>(1)</enum><text>The Inspector General of the Intelligence Community.</text>
 </paragraph><paragraph id="H4629EC2CB71C42679727DADF365087B2"><enum>(2)</enum><text>The Inspector General of the Central Intelligence Agency.</text> </paragraph><paragraph id="H363A7434F90F4EFFBEC5AD00BCB346F8"><enum>(3)</enum><text>The Inspector General of the National Security Agency.</text>
 </paragraph><paragraph id="H5527DCB3CF444692BE27A82483D2AD57"><enum>(4)</enum><text>The Inspector General of the Defense Intelligence Agency.</text> </paragraph><paragraph id="HCA4F61AC982D41C99D7B6000996E0290"><enum>(5)</enum><text>The Inspector General of the National Reconnaissance Office.</text>
 </paragraph><paragraph id="H08C9DA12DCD04B16818244FFC68596A0"><enum>(6)</enum><text>The Inspector General of the National Geospatial-Intelligence Agency.</text> </paragraph></subsection></section><section id="H6819DAA3ADCD4904B428981834CDB580"><enum>721.</enum><header>Reports on intelligence community participation in vulnerabilities equities process of Federal Government</header> <subsection id="H5D60007FCC9C4A2E901020684E896F9E"><enum>(a)</enum><header>Definitions</header><text>In this section:</text>
 <paragraph id="HB840E406CA8E47838F8F47DA293919EC"><enum>(1)</enum><header>Vulnerabilities Equities Policy and Process document</header><text>The term <term>Vulnerabilities Equities Policy and Process document</term> means the executive branch document entitled <quote>Vulnerabilities Equities Policy and Process</quote> dated November 15, 2017.</text> </paragraph><paragraph id="H5CF106DEBCCE4540AB40B47816AEDA44"><enum>(2)</enum><header>Vulnerabilities Equities Process</header><text>The term <term>Vulnerabilities Equities Process</term> means the interagency review of vulnerabilities, pursuant to the Vulnerabilities Equities Policy and Process document or any successor document.</text>
 </paragraph><paragraph id="H1FE65144B0444E689A2A89891C778531"><enum>(3)</enum><header>Vulnerability</header><text>The term <term>vulnerability</term> means a weakness in an information system or its components (for example, system security procedures, hardware design, and internal controls) that could be exploited or could affect confidentiality, integrity, or availability of information.</text>
						</paragraph></subsection><subsection id="HD3CAF6737068427C98CD06462E0EA9E2"><enum>(b)</enum><header>Reports on process and criteria under Vulnerabilities Equities Policy and Process</header>
 <paragraph id="HC92D764026814E508150A05E65A824FB"><enum>(1)</enum><header>In general</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a written report describing—</text>
 <subparagraph id="HDF3E1775B985489B9D686E1314669BBC"><enum>(A)</enum><text>with respect to each element of the intelligence community—</text> <clause id="H60DAFA7BD71A4D43B2B4EC2112911CFF"><enum>(i)</enum><text>the title of the official or officials responsible for determining whether, pursuant to criteria contained in the Vulnerabilities Equities Policy and Process document or any successor document, a vulnerability must be submitted for review under the Vulnerabilities Equities Process; and</text>
 </clause><clause id="H9995428A721D4031A06768D3A874B86A"><enum>(ii)</enum><text>the process used by such element to make such determination; and</text> </clause></subparagraph><subparagraph id="HF1F07CC051084646B4391F01E2FBAB6B"><enum>(B)</enum><text>the roles or responsibilities of that element during a review of a vulnerability submitted to the Vulnerabilities Equities Process.</text>
 </subparagraph></paragraph><paragraph id="H7411C06342AF447FB6D6DA0FF01EB767"><enum>(2)</enum><header>Changes to process or criteria</header><text>Not later than 30 days after any significant change is made to the process and criteria used by any element of the intelligence community for determining whether to submit a vulnerability for review under the Vulnerabilities Equities Process, such element shall submit to the congressional intelligence committees a report describing such change.</text>
 </paragraph><paragraph id="H73827D1259E04772B7672BB77C4A391E"><enum>(3)</enum><header>Form of reports</header><text>Each report submitted under this subsection shall be submitted in unclassified form, but may include a classified annex.</text>
						</paragraph></subsection><subsection id="HE26AE0EB93BE4C7880AEB21186F3C024"><enum>(c)</enum><header>Annual reports</header>
 <paragraph id="H2110D7FADD644AA39DB359FB3120801E"><enum>(1)</enum><header>In general</header><text>Not less frequently than once each calendar year, the Director of National Intelligence shall submit to the congressional intelligence committees a classified report containing, with respect to the previous year—</text>
 <subparagraph id="H604FF650C7AD4265A9DB865C3CB7CE21"><enum>(A)</enum><text>the number of vulnerabilities submitted for review under the Vulnerabilities Equities Process;</text> </subparagraph><subparagraph id="H023B15C3F83248989715AA5BBE8E3736"><enum>(B)</enum><text>the number of vulnerabilities described in subparagraph (A) disclosed to each vendor responsible for correcting the vulnerability, or to the public, pursuant to the Vulnerabilities Equities Process; and</text>
 </subparagraph><subparagraph id="HAD15747DE9F04141A1886547447739BA"><enum>(C)</enum><text display-inline="yes-display-inline">the aggregate number, by category, of the vulnerabilities excluded from review under the Vulnerabilities Equities Process, as described in paragraph 5.4 of the Vulnerabilities Equities Policy and Process document.</text>
 </subparagraph></paragraph><paragraph id="HB7CCE4FD179F421DBE493B725C853EA6"><enum>(2)</enum><header>Unclassified information</header><text>Each report submitted under paragraph (1) shall include an unclassified appendix that contains—</text> <subparagraph id="HCFD07A917AC74883AE72731ED50A2037"><enum>(A)</enum><text>the aggregate number of vulnerabilities disclosed to vendors or the public pursuant to the Vulnerabilities Equities Process; and</text>
 </subparagraph><subparagraph id="HFF845DE3B4E542DD982D4B022019D194"><enum>(B)</enum><text>the aggregate number of vulnerabilities disclosed to vendors or the public pursuant to the Vulnerabilities Equities Process known to have been patched.</text>
 </subparagraph></paragraph><paragraph id="HB3E6F86582A94CB4BBF5EE4AA57894B6"><enum>(3)</enum><header>Non-duplication</header><text>The Director of National Intelligence may forgo submission of an annual report required under this subsection for a calendar year, if the Director notifies the intelligence committees in writing that, with respect to the same calendar year, an annual report required by paragraph 4.3 of the Vulnerabilities Equities Policy and Process document already has been submitted to Congress, and such annual report contains the information that would otherwise be required to be included in an annual report under this subsection.</text>
						</paragraph></subsection></section><section id="id2B83A1B4652E4386A8E22A9457906205"><enum>722.</enum><header>Reports on global water insecurity and national
			 security
			 implications</header>
 <subsection id="id2E8967E81B53467DB84B3CDF01AD6AA1"><enum>(a)</enum><header>Reports required</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act and not less frequently than once every 5 years thereafter, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the implications of water insecurity on the national security interest of the United States, including consideration of social, economic, agricultural, and environmental factors.</text>
 </subsection><subsection id="id78773934269A49DA885021D8208D19FE"><enum>(b)</enum><header>Assessment scope and focus</header><text>Each report submitted under subsection (a) shall include an assessment of water insecurity described in such subsection with a global scope, but focus on areas of the world—</text>
 <paragraph id="id97ff935e01d44f899f1100052c8d9f4b"><enum>(1)</enum><text>of strategic, economic, or humanitarian interest to the United States—</text> <subparagraph id="idAF19D513289A4F08BEDC31CEA4CAEA40"><enum>(A)</enum><text>that are, as of the date of the report, at the greatest risk of instability, conflict, human insecurity, or mass displacement; or</text>
 </subparagraph><subparagraph id="id724C3E94B3EF46159C97D4D9489A8D38"><enum>(B)</enum><text>where challenges relating to water insecurity are likely to emerge and become significant during the 5-year or the 20-year period beginning on the date of the report; and</text>
 </subparagraph></paragraph><paragraph id="id8C5662E0993D48679DFFEA9FC2E241B7"><enum>(2)</enum><text>where challenges relating to water insecurity are likely to imperil the national security interests of the United States or allies of the United States.</text>
 </paragraph></subsection><subsection id="id9B1D5CFA57804505BD1D5FB164EB17B1"><enum>(c)</enum><header>Consultation</header><text>In researching a report required by subsection (a), the Director shall consult with—</text> <paragraph id="id102A01F5B4634BBA9BFEA198774626F0"><enum>(1)</enum><text>such stakeholders within the intelligence community, the Department of Defense, and the Department of State as the Director considers appropriate; and</text>
 </paragraph><paragraph id="id6FF3235A2AC74AF38AB0CE8AAA49CE76"><enum>(2)</enum><text>such additional Federal agencies and persons in the private sector as the Director considers appropriate.</text>
 </paragraph></subsection><subsection id="idA46EB069A0E3453EAB1D5DD5682EB4B3"><enum>(d)</enum><header>Form</header><text>Each report submitted under subsection (a) shall be submitted in unclassified form, but may include a classified annex.</text>
					</subsection></section><section id="id02566CB4BD894E638CB84CE90CF2EEC4"><enum>723.</enum><header>Annual report on memoranda of understanding between elements of intelligence community and other
			 entities of the United States Government regarding significant operational
 activities or policy</header><text display-inline="no-display-inline">Section 311 of the Intelligence Authorization Act for Fiscal Year 2017 (<external-xref legal-doc="usc" parsable-cite="usc/50/3313">50 U.S.C. 3313</external-xref>) is amended—</text> <paragraph id="idD4BD4FF7664C4B63902901ECB2B3029D"><enum>(1)</enum><text>by redesignating subsection (b) as subsection (c); and</text>
 </paragraph><paragraph id="id39E31F58F8C042F296D1068C8EA98FC4"><enum>(2)</enum><text>by striking subsection (a) and inserting the following:</text> <quoted-block display-inline="no-display-inline" id="ida073b0edc9a849e4b2871495a9e4f113" style="OLC"> <subsection id="idcae0d65cf5e74ca3a1c9e785b0cf0786"><enum>(a)</enum><header>In general</header><text>Each year, concurrent with the annual budget request submitted by the President to Congress under section 1105 of title 31, United States Code, each head of an element of the intelligence community shall submit to the congressional intelligence committees a report that lists each memorandum of understanding or other agreement regarding significant operational activities or policy entered into during the most recently completed fiscal year between or among such element and any other entity of the United States Government.</text>
 </subsection><subsection id="id69b85a52c6024e98bcb694a4b3567f65"><enum>(b)</enum><header>Provision of documents</header><text>Each head of an element of an intelligence community who receives a request from the Select Committee on Intelligence of the Senate or the Permanent Select Committee on Intelligence of the House of Representatives for a copy of a memorandum of understanding or other document listed in a report submitted by the head under subsection (a) shall submit to such committee the requested copy as soon as practicable after receiving such request.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph></section><section id="idA3A6020804B943F38C4453529A3B22A8"><enum>724.</enum><header>Repeal of report requirement for inspectors general of certain elements of intelligence community</header>
 <subsection id="idE6CA105A3D124E689DCD137BF44AD25D"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Section 8H of the Inspector General Act of 1978 (5 U.S.C. App.) is amended—</text> <paragraph id="idFDAB7B1AF9744F2BB435D70645824654"><enum>(1)</enum><text>by striking subsection (g); and</text>
 </paragraph><paragraph id="id89E26E4A47F44CAFA47EA73E8C020E92"><enum>(2)</enum><text>by redesignating subsections (h) and (i) as subsections (g) and (h), respectively.</text> </paragraph></subsection><subsection id="id8A2DBAB9BC1543A1B46089E8995D0A38"><enum>(b)</enum><header>Conforming amendments</header> <paragraph id="idAB6CA7B152C54975A072C6AB18D9E08D"><enum>(1)</enum><header>National Security Act of 1947</header><text>Section 507(a) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3106">50 U.S.C. 3106(a)</external-xref>) is amended—</text>
 <subparagraph id="id2C59B423B6514C2187F0EF0C2E1C4228"><enum>(A)</enum><text>by striking paragraph (1); and</text> </subparagraph><subparagraph id="id2575122CBD614593AD9F9C85D9E63D57"><enum>(B)</enum><text>by redesignating paragraphs (2) through (5) as paragraphs (1) through (4).</text>
 </subparagraph></paragraph><paragraph id="id5DB3AA1D1D814347BEEB862E136B654C"><enum>(2)</enum><header>Intelligence Reform and Terrorism Prevention Act of 2004</header><text>Section 3001(j)(1)(C) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/50/3341">50 U.S.C. 3341(j)(1)(C)</external-xref>) is amended by striking <quote>and (h)</quote> and inserting <quote>and (g)</quote>.</text>
 </paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="idA00325E7A6314C3ABBCA019C669AC2DE" section-type="subsequent-section"><enum>725.</enum><header display-inline="yes-display-inline">Repeal of requirement for annual personnel level assessments for the intelligence community</header><text display-inline="no-display-inline">Section 506B of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3098">50 U.S.C. 3098</external-xref>) is hereby repealed.</text> </section><section id="idd6c11233ec94461fac36b2bc90866722"><enum>726.</enum> <header>Report on outreach strategy addressing threats from United States adversaries to the United States technology sector</header> <subsection id="idc20315617d1e40a7a8626ffac474b261"><enum>(a)</enum><header>Report required</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate committees of Congress a report detailing outreach by the intelligence community and the Defense Intelligence Enterprise to United States industrial, commercial, scientific, technical, and academic communities on matters relating to the efforts of adversaries of the United States to acquire critical United States technology, intellectual property, and research and development information.</text>
 </subsection><subsection id="id27acc35f60274bf983b2cac40dd566d4"><enum>(b)</enum><header>Contents</header><text>The report required by subsection (a) shall include the following:</text> <paragraph id="ide62b7cf32ec54b21a42163030fd41205"><enum>(1)</enum><text>A review of the current outreach efforts of the intelligence community and the Defense Intelligence Enterprise described in subsection (a), including the type of information conveyed in the outreach.</text>
 </paragraph><paragraph id="id90a32309e4ae452eb244365c9071bc60"><enum>(2)</enum><text>A determination of the appropriate element of the intelligence community to lead such outreach efforts.</text>
 </paragraph><paragraph id="idf5d25e714e6a40bab06990c0f96970de"><enum>(3)</enum><text>An assessment of potential methods for improving the effectiveness of such outreach, including an assessment of the following:</text>
 <subparagraph id="idc1a68f8785df49d39de88384191600b4"><enum>(A)</enum><text>Those critical technologies, infrastructure, or related supply chains that are at risk from the efforts of adversaries described in subsection (a).</text>
 </subparagraph><subparagraph id="idcd57a8eaae744f5b96bf5211302e545c"><enum>(B)</enum><text>The necessity and advisability of granting security clearances to company or community leadership, when necessary and appropriate, to allow for tailored classified briefings on specific targeted threats.</text>
 </subparagraph><subparagraph id="id717fc41c23cc4791ba5ebfe53b3e4289"><enum>(C)</enum><text>The advisability of partnering with entities of the Federal Government that are not elements of the intelligence community and relevant regulatory and industry groups described in subsection (a), to convey key messages across sectors targeted by United States adversaries.</text>
 </subparagraph><subparagraph id="id26684a2d8877401288169e669152843c"><enum>(D)</enum><text>Strategies to assist affected elements of the communities described in subparagraph (C) in mitigating, deterring, and protecting against the broad range of threats from the efforts of adversaries described in subsection (a), with focus on producing information that enables private entities to justify business decisions related to national security concerns.</text>
 </subparagraph><subparagraph id="id9188f76be379407da3f6fbd5d337da4a"><enum>(E)</enum><text>The advisability of the establishment of a United States Government-wide task force to coordinate outreach and activities to combat the threats from efforts of adversaries described in subsection (a).</text>
 </subparagraph><subparagraph id="id3062f68d753f4c529331e4b6fb22d555"><enum>(F)</enum><text>Such other matters as the Director of National Intelligence may consider necessary.</text> </subparagraph></paragraph></subsection><subsection id="id07A5A3DB770749DE85A4EC34C9969D11"><enum>(c)</enum><header>Consultation encouraged</header><text>In preparing the report required by subsection (a), the Director is encouraged to consult with other government agencies, think tanks, academia, representatives of the financial industry, or such other entities as the Director considers appropriate.</text>
 </subsection><subsection id="id932584BF4A834992A7865FF20DA47082"><enum>(d)</enum><header>Form</header><text>The report required by subsection (a) shall be submitted in unclassified form, but may include a classified annex as necessary.</text>
 </subsection><subsection commented="no" id="idf60824c3609d401d8c574e0f30b21ce0"><enum>(e)</enum><header>Appropriate committees of Congress defined</header><text>In this section, the term <term>appropriate committees of Congress</term> means—</text> <paragraph commented="no" id="idFC4413D4BA0E4965A101BF83E3A4729E"><enum>(1)</enum><text>the congressional intelligence committees;</text>
 </paragraph><paragraph commented="no" id="id45D721AA741E4221B2F5EE3A8FFEBC4C"><enum>(2)</enum><text>the Committee on Armed Services and the Committee on Homeland Security and Governmental Affairs of the Senate; and</text>
 </paragraph><paragraph commented="no" id="id8B8D2B95C7EA436AAAEA8043ACE1F36C"><enum>(3)</enum><text>the Committee on Armed Services, Committee on Homeland Security, and the Committee on Oversight and Government Reform of the House of Representatives.</text>
						</paragraph></subsection></section><section id="idDD3F0010FC1E42728328251D24D70EC6"><enum>727.</enum><header>Study on the feasibility of encrypting unclassified wireline and wireless telephone calls</header>
 <subsection id="id293302E6FD5C42B1A1D468AF9B30DC3C"><enum>(a)</enum><header>Study required</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall complete a study on the feasibility of encrypting unclassified wireline and wireless telephone calls between personnel in the intelligence community.</text>
 </subsection><subsection id="id46B460C6954447EF94CCF69915D11451"><enum>(b)</enum><header>Report</header><text>Not later than 90 days after the date on which the Director completes the study required by subsection (a), the Director shall submit to the congressional intelligence committees a report on the Director's findings with respect to such study.</text>
					</subsection></section><section commented="no" display-inline="no-display-inline" id="idE097FBBDFED24536B3C16D8DE642389D" section-type="subsequent-section"><enum>728.</enum><header display-inline="yes-display-inline">Modification of requirement for annual report on hiring and retention of
			 minority employees</header>
 <subsection commented="no" display-inline="no-display-inline" id="id12653D4DAA684D8EB0934CB463C8FCD1"><enum>(a)</enum><header display-inline="yes-display-inline">Expansion of period of report</header><text>Subsection (a) of section 114 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3050">50 U.S.C. 3050</external-xref>) is amended by inserting <quote>and the preceding 5 fiscal years</quote> after <quote>fiscal year</quote>.</text>
 </subsection><subsection commented="no" display-inline="no-display-inline" id="idD863F37EDD844A3394AD4600724E5A5D"><enum>(b)</enum><header display-inline="yes-display-inline">Clarification on disaggregation of data</header><text display-inline="yes-display-inline">Subsection (b) of such section is amended, in the matter before paragraph (1), by striking <quote>disaggregated data by category of covered person from each element of the intelligence community</quote> and inserting <quote>data, disaggregated by category of covered person and by element of the intelligence community,</quote>.</text>
					</subsection></section></subtitle><subtitle id="id411DD04CB60841FEBB8BA1536048E82C" style="OLC"><enum>C</enum><header>Other matters</header>
				<section id="H1A53023D85D442FCA836ECCB70E856A3"><enum>731.</enum><header>Technical amendments related to the Department of Energy</header>
					<subsection id="HE0536DE14FC34CB6B41E5D6CB7FFFC81"><enum>(a)</enum><header>National Nuclear Security Administration Act</header>
 <paragraph id="HB627306022364F5EBAEF6B05E4523E73"><enum>(1)</enum><header>Clarification of functions of the Administrator for Nuclear Security</header><text>Subsection (b) of section 3212 of the National Nuclear Security Administration Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2402">50 U.S.C. 2402(b)</external-xref>) is amended—</text>
 <subparagraph id="HCAD0EC124BD547A8A5ED63E0F6CD78FB"><enum>(A)</enum><text>by striking paragraphs (11) and (12); and</text> </subparagraph><subparagraph id="HA901E023FB2A45A7B2DC69A1D1121DDE"><enum>(B)</enum><text>by redesignating paragraphs (13) through (19) as paragraphs (11) through (17), respectively.</text>
 </subparagraph></paragraph><paragraph id="HA987C106A8024189949A214D148437B0"><enum>(2)</enum><header>Counterintelligence programs</header><text>Section 3233(b) of the National Nuclear Security Administration Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2423">50 U.S.C. 2423(b)</external-xref>) is amended—</text> <subparagraph id="H548EA07D1FE34B58BE76A438C86DF95A"><enum>(A)</enum><text>by striking <quote>Administration</quote> and inserting <quote>Department</quote>; and</text>
 </subparagraph><subparagraph id="H9FA0BBF72C5F474588B5315863C1845C"><enum>(B)</enum><text>by inserting <quote>Intelligence and</quote> after <quote>the Office of</quote>.</text> </subparagraph></paragraph></subsection><subsection id="H48F1FF11DBBA4D2D9F42804AF0C60868"><enum>(b)</enum><header>Atomic Energy Defense Act</header><text>Section 4524(b)(2) of the Atomic Energy Defense Act (<external-xref legal-doc="usc" parsable-cite="usc/50/2674">50 U.S.C. 2674(b)(2)</external-xref>) is amended by inserting <quote>Intelligence and</quote> after <quote>The Director of</quote>.</text>
 </subsection><subsection id="H68B0A9D5CB374D8895ED72C7680FF9F6"><enum>(c)</enum><header>National Security Act of 1947</header><text>Paragraph (2) of section 106(b) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3041">50 U.S.C. 3041(b)(2)</external-xref>) is amended—</text>
 <paragraph id="H35B62763E7284567AE410103D59A11BA"><enum>(1)</enum><text>in subparagraph (E), by inserting <quote>and Counterintelligence</quote> after <quote>Office of Intelligence</quote>;</text> </paragraph><paragraph id="HB2CBF4784CAD4823ABA38CE6CEE40C75"><enum>(2)</enum><text>by striking subparagraph (F);</text>
 </paragraph><paragraph id="H8AC2E795A7C74DA79033074D9EBF2489"><enum>(3)</enum><text>by redesignating subparagraphs (G), (H), and (I) as subparagraphs (F), (G), and (H), respectively; and</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H2D061AE9E5E5464FACA8B7ACDD45C3F4"><enum>(4)</enum><text>in subparagraph (H), as so redesignated, by realigning the margin of such subparagraph 2 ems to the left.</text>
						</paragraph></subsection></section><section id="H1158EA6F89814F949766368DB69AC8E7"><enum>732.</enum><header>Securing energy infrastructure</header>
 <subsection id="HFDEE3D1D7A9D47FEB877E4CCAB8894CD"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph display-inline="no-display-inline" id="H04053D3632D94AEFB3A7DB6FDDCA321B"><enum>(1)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text>
 <subparagraph id="H3186E3BA6848411AB429EBC8EA5F9A49"><enum>(A)</enum><text>the congressional intelligence committees;</text> </subparagraph><subparagraph id="H41B706D0AF1A49B69BC50FFB933ADF54"><enum>(B)</enum><text>the Committee on Homeland Security and Governmental Affairs and the <committee-name>Committee on Energy and Natural Resources of the Senate</committee-name>; and</text>
 </subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HBCB3DEA70E484DD6ABED1233E6D9E668"><enum>(C)</enum><text>the Committee on Homeland Security and the <committee-name>Committee on Energy and Commerce of the House of Representatives</committee-name>.</text> </subparagraph></paragraph><paragraph id="H02037FDC6218421CB26C85B5DD22F41D"><enum>(2)</enum><header>Covered entity</header><text>The term <term>covered entity</term> means an entity identified pursuant to section 9(a) of Executive Order 13636 of February 12, 2013 (78 Fed. Reg. 11742), relating to identification of critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.</text>
 </paragraph><paragraph id="HB7D0D992D42C44EFA534CCFE393F6DA3"><enum>(3)</enum><header>Exploit</header><text>The term <term>exploit</term> means a software tool designed to take advantage of a security vulnerability.</text> </paragraph><paragraph id="H472BDA3649A642C0AF62A278E535826C"><enum>(4)</enum> <header>Industrial control system</header><text display-inline="yes-display-inline">The term <term>industrial control system</term> means an operational technology used to measure, control, or manage industrial functions, and includes supervisory control and data acquisition systems, distributed control systems, and programmable logic or embedded controllers.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="H7CC0D38EDEAB4CEEA7C955ECE64BD6E5"><enum>(5)</enum><header>National Laboratory</header><text>The term <term>National Laboratory</term> has the meaning given the term in section 2 of the Energy Policy Act of 2005 (<external-xref legal-doc="usc" parsable-cite="usc/42/15801">42 U.S.C. 15801</external-xref>).</text> </paragraph><paragraph commented="no" display-inline="no-display-inline" id="HD4FAC45AA05349DFB12F9C0D1B094BC8"><enum>(6)</enum><header>Program</header><text>The term <term>Program</term> means the pilot program established under subsection (b).</text>
 </paragraph><paragraph id="HD574BBEF6BCD43B99F33E7EAB8A1C56D"><enum>(7)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Energy.</text> </paragraph><paragraph id="H5A390539328D4468A2051616AC2A00C8"><enum>(8)</enum><header>Security vulnerability</header><text>The term <term>security vulnerability</term> means any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control.</text>
 </paragraph></subsection><subsection id="HE6C59A4B1D7748C08534E1826D4E0FBD"><enum>(b)</enum><header>Pilot program for securing energy infrastructure</header><text>Not later than 180 days after the date of the enactment of this Act, the Secretary shall establish a 2-year control systems implementation pilot program within the National Laboratories for the purposes of—</text>
 <paragraph id="H352C1CDB0CCE4DC8A4CCC5919F2E684C"><enum>(1)</enum><text>partnering with covered entities in the energy sector (including critical component manufacturers in the supply chain) that voluntarily participate in the Program to identify new classes of security vulnerabilities of the covered entities; and</text>
 </paragraph><paragraph id="H4C25207B20E745198BF2A0D69C40442C"><enum>(2)</enum><text display-inline="yes-display-inline">evaluating technology and standards, in partnership with covered entities, to isolate and defend industrial control systems of covered entities from security vulnerabilities and exploits in the most critical systems of the covered entities, including—</text>
 <subparagraph id="H4569DC0661BE4A54B07AD3A619FA7701"><enum>(A)</enum><text>analog and nondigital control systems;</text> </subparagraph><subparagraph id="HE0727275ECA8405482729885C8F11E3B"><enum>(B)</enum><text>purpose-built control systems; and</text>
 </subparagraph><subparagraph id="HB956CDA9540643B88E2296124F86877A"><enum>(C)</enum><text>physical controls.</text> </subparagraph></paragraph></subsection><subsection id="H8C95AD400FDB43539D9FF12C7342EB60"><enum>(c)</enum><header>Working group to evaluate program standards and develop strategy</header> <paragraph id="H79758A8989884A20A499CF5096B7CBA2"><enum>(1)</enum><header>Establishment</header><text>The Secretary shall establish a working group—</text>
 <subparagraph id="H79FB50668E6F4BB6A2C39D299B32469E"><enum>(A)</enum><text>to evaluate the technology and standards used in the Program under subsection (b)(2); and</text> </subparagraph><subparagraph id="H6CAE0C420F624094A0BE6AC7609D9A43"><enum>(B)</enum><text>to develop a national cyber-informed engineering strategy to isolate and defend covered entities from security vulnerabilities and exploits in the most critical systems of the covered entities.</text>
 </subparagraph></paragraph><paragraph id="HB33A91C7B3F948FBBF98011C1859A567"><enum>(2)</enum><header>Membership</header><text>The working group established under paragraph (1) shall be composed of not fewer than 10 members, to be appointed by the Secretary, at least 1 member of which shall represent each of the following:</text>
 <subparagraph id="H56744BE98A4D4115842299CFB01F9131"><enum>(A)</enum><text>The Department of Energy.</text> </subparagraph><subparagraph id="HD5B1D26A385540B2B46C3638E1BD1002"><enum>(B)</enum><text>The energy industry, including electric utilities and manufacturers recommended by the Energy Sector coordinating councils.</text>
							</subparagraph><subparagraph id="HF73C3CEA38124242BC7220B9A17309DD"><enum>(C)</enum>
 <clause commented="no" display-inline="yes-display-inline" id="HA4BD068ABF0E4AC483843D4469513B03"><enum>(i)</enum><text>The Department of Homeland Security; or</text> </clause><clause id="HB7F2DDA7E47147C2AD60BB919A903E42" indent="up1"><enum>(ii)</enum><text>the Industrial Control Systems Cyber Emergency Response Team.</text>
 </clause></subparagraph><subparagraph id="HB139B0D082C640B29A0A53A9A704448C"><enum>(D)</enum><text>The North American Electric Reliability Corporation.</text> </subparagraph><subparagraph id="HB70DA6B3C8CE4579BD7E99CB630A7869"><enum>(E)</enum><text>The Nuclear Regulatory Commission.</text>
							</subparagraph><subparagraph id="H23C86302611549A99378B42640195A4D"><enum>(F)</enum>
 <clause commented="no" display-inline="yes-display-inline" id="HE838611487A74092BD1D5455F1707267"><enum>(i)</enum><text>The Office of the Director of National Intelligence; or</text> </clause><clause id="HD2AB85662E2A4AAFAD97EC0D1FDA4229" indent="up1"><enum>(ii)</enum><text>the intelligence community.</text>
								</clause></subparagraph><subparagraph id="H113B14E53A2B496B80D46F258BCBFC69"><enum>(G)</enum>
 <clause commented="no" display-inline="yes-display-inline" id="H20F93C91A78E46859151C0E7816BED4A"><enum>(i)</enum><text>The Department of Defense; or</text> </clause><clause id="HFF1D3B8F67E34C1898437462FE567903" indent="up1"><enum>(ii)</enum><text>the Assistant Secretary of Defense for Homeland Security and America's Security Affairs.</text>
 </clause></subparagraph><subparagraph id="HBC8732460AFE4F67ACBFC2A5298CAB68"><enum>(H)</enum><text>A State or regional energy agency.</text> </subparagraph><subparagraph id="HFA78DEAA4DFC49199F9F3088F47BD88F"><enum>(I)</enum><text>A national research body or academic institution.</text>
 </subparagraph><subparagraph id="H1AEE289EC6124F6694C2CED1A12A6394"><enum>(J)</enum><text>The National Laboratories.</text> </subparagraph></paragraph></subsection><subsection id="H8CF1760104CE43589FA05D0FE352A342"><enum>(d)</enum><header>Reports on the Program</header> <paragraph id="H52D392F37E2C415F9113E2B84B8C6BFD"><enum>(1)</enum><header>Interim report</header><text>Not later than 180 days after the date on which funds are first disbursed under the Program, the Secretary shall submit to the appropriate congressional committees an interim report that—</text>
 <subparagraph id="HCEC421D7ED1040B6A6961F0FA645B19B"><enum>(A)</enum><text display-inline="yes-display-inline">describes the results of the Program;</text> </subparagraph><subparagraph id="H41FA1E307F0F4B66A1223CF89772601B"><enum>(B)</enum><text display-inline="yes-display-inline">includes an analysis of the feasibility of each method studied under the Program; and</text>
 </subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H1B9E61CD96BF49D297C6D059437D25B7"><enum>(C)</enum><text display-inline="yes-display-inline">describes the results of the evaluations conducted by the working group established under subsection (c)(1).</text>
 </subparagraph></paragraph><paragraph id="HA106E79AC5DE4E79B44DDA097A69F91B"><enum>(2)</enum><header>Final report</header><text display-inline="yes-display-inline">Not later than 2 years after the date on which funds are first disbursed under the Program, the Secretary shall submit to the appropriate congressional committees a final report that—</text>
 <subparagraph id="H0C32C8F97CE44A96A742FA31F50BE6F9"><enum>(A)</enum><text display-inline="yes-display-inline">describes the results of the Program;</text> </subparagraph><subparagraph id="H4A8B6F743EEF467C989E9A1DBF6EE50C"><enum>(B)</enum><text display-inline="yes-display-inline">includes an analysis of the feasibility of each method studied under the Program; and</text>
 </subparagraph><subparagraph id="H01945421937143C1AD566FD31793F6B8"><enum>(C)</enum><text display-inline="yes-display-inline">describes the results of the evaluations conducted by the working group established under subsection (c)(1).</text>
 </subparagraph></paragraph></subsection><subsection id="HA586300E3FDC458CAA4A8642154E7E55"><enum>(e)</enum><header>Exemption from disclosure</header><text>Information shared by or with the Federal Government or a State, Tribal, or local government under this section—</text>
 <paragraph id="HEE94749ED519427FA0A8F5923040EE72"><enum>(1)</enum><text>shall be deemed to be voluntarily shared information;</text> </paragraph><paragraph id="H620958CBE63741A9AEDF1DAD3380244B"><enum>(2)</enum><text>shall be exempt from disclosure under section 552 of title 5, United States Code, or any provision of any State, Tribal, or local freedom of information law, open government law, open meetings law, open records law, sunshine law, or similar law requiring the disclosure of information or records; and</text>
 </paragraph><paragraph id="HE74E0410D4684609A25ABC991064D2B9"><enum>(3)</enum><text display-inline="yes-display-inline">shall be withheld from the public, without discretion, under section 552(b)(3) of title 5, United States Code, and any provision of any State, Tribal, or local law requiring the disclosure of information or records.</text>
						</paragraph></subsection><subsection id="H1A2CCC70DDBB425C8FC754498E7A6184"><enum>(f)</enum><header>Protection from liability</header>
 <paragraph id="HD0A82A825DAC4B2280854147FC0F71FA"><enum>(1)</enum><header>In general</header><text>A cause of action against a covered entity for engaging in the voluntary activities authorized under subsection (b)—</text>
 <subparagraph id="H118B90CB7EF5452C85CDA094C72BD75D"><enum>(A)</enum><text>shall not lie or be maintained in any court; and</text> </subparagraph><subparagraph id="HAC4EF24452C14E6FA9A14C28565D0B14"><enum>(B)</enum><text>shall be promptly dismissed by the applicable court.</text>
 </subparagraph></paragraph><paragraph id="HBADFE2A598D24D89B98D030836568354"><enum>(2)</enum><header>Voluntary activities</header><text>Nothing in this section subjects any covered entity to liability for not engaging in the voluntary activities authorized under subsection (b).</text>
 </paragraph></subsection><subsection id="HD3A83EB2766A4BC6BEC223AEF64CAFBC"><enum>(g)</enum><header>No new regulatory authority for Federal agencies</header><text>Nothing in this section authorizes the Secretary or the head of any other department or agency of the Federal Government to issue new regulations.</text>
					</subsection><subsection id="HBB4529B6520E4289A2E63C1D86D9BD2A"><enum>(h)</enum><header>Authorization of appropriations</header>
 <paragraph id="H41DDC063D5A741588CA2FFEDE06910A0"><enum>(1)</enum><header>Pilot Program</header><text>There is authorized to be appropriated $10,000,000 to carry out subsection (b).</text> </paragraph><paragraph id="HF4C3F3E15BDB48BC8B7007F7C0D17023"><enum>(2)</enum><header>Working Group and Report</header><text>There is authorized to be appropriated $1,500,000 to carry out subsections (c) and (d).</text>
 </paragraph><paragraph id="H6CFD7B5B426E4662A51A4B004D7B8B91"><enum>(3)</enum><header>Availability</header><text>Amounts made available under paragraphs (1) and (2) shall remain available until expended.</text> </paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="H7DCA77624F6B437A88D84725342C7159" section-type="subsequent-section"><enum>733.</enum><header display-inline="yes-display-inline">Sense of Congress on WikiLeaks</header><text display-inline="no-display-inline">It is the sense of Congress that WikiLeaks and the senior leadership of WikiLeaks resemble a nonstate hostile intelligence service often abetted by state actors and should be treated as such a service by the United States.</text>
				</section><section id="HD0735223E2FF453498DBBBF681F4EF1D"><enum>734.</enum><header>Bug bounty programs</header>
 <subsection id="H2D1DBB1D58014922BE4791D456B81C4D"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="H6E481AE49D9843C79A1A3444F6B0E8BD"><enum>(1)</enum><header>Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text>
 <subparagraph id="id2D453365A65E4E91808DEAD633B1A7C1"><enum>(A)</enum><text>the congressional intelligence committees;</text> </subparagraph><subparagraph id="id44961F33A7324ACB90739E3004315BBE"><enum>(B)</enum><text>the Committee on Homeland Security and Governmental Affairs and the Committee on Armed Services of the Senate; and</text>
 </subparagraph><subparagraph id="idE16C50AC5D9E439681BBCFEB28761B39"><enum>(C)</enum><text>the Committee on Homeland Security and the Committee on Armed Services of the House of Representatives.</text>
 </subparagraph></paragraph><paragraph id="idE7329A1C420D4BAE99AAB20DFD6CE9DF"><enum>(2)</enum><header>Bug bounty program</header><text>The term <term>bug bounty program</term> means a program under which an approved computer security specialist or security researcher is temporarily authorized to identify and report vulnerabilities within the information system of an agency or department of the United States in exchange for compensation.</text>
 </paragraph><paragraph id="HBAFD726D6BA84C0BA47BE7794B8766E8"><enum>(3)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given such term in section 3502 of title 44, United States Code.</text> </paragraph></subsection><subsection id="H6D3DC80AB6DC49B6916E702C147FCDD7"><enum>(b)</enum><header>Bug bounty program plan</header> <paragraph id="H019FC09C2CF04F7A8E6E37C37334AF39"><enum>(1)</enum><header>Requirement</header><text>Not later than 180 days after the date of the enactment of this Act, the Secretary of Homeland Security, in consultation with the Secretary of Defense, shall submit to the appropriate committees of Congress a strategic plan for appropriate agencies and departments of the United States to implement bug bounty programs.</text>
 </paragraph><paragraph id="H5E26D54C1F5745B79882826E066CB4C7"><enum>(2)</enum><header>Contents</header><text>The plan required by paragraph (1) shall include—</text> <subparagraph id="HF285C69254BF4425A6C2D4FEC3C926B1"><enum>(A)</enum><text>an assessment of—</text>
 <clause id="HB2C70F998F9747D0BB7459DAB096EFA5"><enum>(i)</enum><text>the <quote>Hack the Pentagon</quote> pilot program carried out by the Department of Defense in 2016 and subsequent bug bounty programs in identifying and reporting vulnerabilities within the information systems of the Department of Defense; and</text>
 </clause><clause id="H5D44929A490A4087B632F29F7F23DD87"><enum>(ii)</enum><text>private sector bug bounty programs, including such programs implemented by leading technology companies in the United States; and</text>
 </clause></subparagraph><subparagraph id="H945B85AA6806409DA4E1482F0723B1DE"><enum>(B)</enum><text>recommendations on the feasibility of initiating bug bounty programs at appropriate agencies and departments of the United States.</text>
							</subparagraph></paragraph></subsection></section><section id="id82092BC3CC3940499A7DC8C6F026CE15"><enum>735.</enum><header>Sense of Congress on consideration of espionage activities when considering whether or not to
			 provide visas to foreign individuals to be accredited to a United Nations
 mission in the United States</header><text display-inline="no-display-inline">It is the sense of the Congress that the Secretary of State, in considering whether or not to provide a visa to a foreign individual to be accredited to a United Nations mission in the United States, should consider—</text>
 <paragraph id="idC0378ECD5DC24EA79B6D9F9AD69675BF"><enum>(1)</enum><text display-inline="yes-display-inline">known and suspected intelligence activities, espionage activities, including activities constituting precursors to espionage, carried out by the individual against the United States, foreign allies of the United States, or foreign partners of the United States; and</text>
 </paragraph><paragraph id="id5C5D955E98D34DD9A5A637126D63CA59"><enum>(2)</enum><text display-inline="yes-display-inline">the status of an individual as a known or suspected intelligence officer for a foreign adversary.</text> </paragraph></section><section commented="no" display-inline="no-display-inline" id="id7321AF97D7964C8092A4A5343097D4A1" section-type="subsequent-section"><enum>736.</enum><header display-inline="yes-display-inline">Public Interest Declassification Board</header><text display-inline="no-display-inline">Section 710(b) of the Public Interest Declassification Act of 2000 (<external-xref legal-doc="public-law" parsable-cite="pl/106/567">Public Law 106–567</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note) is amended by striking <quote>December 31, 2018</quote> and inserting <quote>December 31, 2022</quote>.</text>
				</section><section id="id4411364217EC42D1848D7938BF1607DD"><enum>737.</enum><header>Modification of authorities relating to the National Intelligence University</header>
					<subsection id="idBB8DD00CCED745DC8173D966513D860D"><enum>(a)</enum><header>Civilian faculty members; employment and compensation</header>
 <paragraph id="id103E73FD52184BA58282BAAD15728D90"><enum>(1)</enum><header>In general</header><text>Section 1595(c) of title 10, United States Code, is amended by adding at the end the following:</text> <quoted-block display-inline="no-display-inline" id="id8258131B85E64F55B316E39613A5D25E" style="OLC"> <paragraph id="id15F929B5639544BCB86EA5CFB8936CBA"><enum>(5)</enum><text>The National Intelligence University.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph><paragraph id="id9BF1BDA9544A4100B23ADAACB698001E"><enum>(2)</enum><header>Compensation plan</header><text>The Secretary of Defense shall provide each person employed as a professor, instructor, or lecturer at the National Intelligence University on the date of the enactment of this Act an opportunity to elect to be paid under the compensation plan in effect on the day before the date of the enactment of this Act (with no reduction in pay) or under the authority of section 1595 of title 10, United States Code, as amended by paragraph (1).</text>
 </paragraph></subsection><subsection id="id29052949AC0647429E7BBEEB2702A384"><enum>(b)</enum><header>Acceptance of faculty research grants</header><text>Section 2161 of such title is amended by adding at the end the following:</text> <quoted-block display-inline="no-display-inline" id="id61470087A3EA462D9F6A8B08873040EB" style="OLC"> <subsection id="idF349F49EB30B4C42A5F73288AAA589A2"><enum>(d)</enum><header>Acceptance of faculty research grants</header><text>The Secretary of Defense may authorize the President of the National Intelligence University to accept qualifying research grants in the same manner and to the same degree as the President of the National Defense University under section 2165(e) of this title.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
					</subsection><subsection id="id9C911D26C7814C1292AA36902986B9C6"><enum>(c)</enum><header>Admission of private sector civilians</header>
 <paragraph id="id72FADF9BF38E427BA5CAD975FF2F3F56"><enum>(1)</enum><header>In general</header><text>Chapter 108 of such title is amended by inserting after section 2167a the following:</text> <quoted-block display-inline="no-display-inline" id="id33ED43F708244D7A92BEEFC5E85A2916" style="USC"> <section commented="no" display-inline="no-display-inline" id="HA5D5C9C24244977F3F0616963CC198B" section-type="subsequent-section"><enum>2167b.<?LEXA-Enum 2167b.?></enum><header display-inline="yes-display-inline">National Intelligence University: admission of private sector civilians to receive instruction</header> <subsection commented="no" display-inline="no-display-inline" id="HC3C059A4471FF4C22C07809604523FF"><enum>(a)</enum><header>Authority for admission</header><paragraph commented="no" display-inline="yes-display-inline" id="id44093E6740C6490691D8EE3CDAE913A3"><enum>(1)</enum><text>The Secretary of Defense may permit eligible private sector employees who work in organizations relevant to national security to receive instruction at the National Intelligence University in accordance with this section.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="idC2323976A4A643DAAF293737CFF49C8C" indent="up1"><enum>(2)</enum><text>No more than the equivalent of 35 full-time student positions may be filled at any one time by private sector employees enrolled under this section.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="id90EA913D0BE145309B99B95F4A62D9A8" indent="up1"><enum>(3)</enum><text>Upon successful completion of the course of instruction in which enrolled, any such private sector employee may be awarded an appropriate diploma or degree under section 2161 of this title.</text>
 </paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H5F8CCAB44DDAF13208E3D48050B8B72"><enum>(b)</enum><header>Eligible private sector employees</header><paragraph commented="no" display-inline="yes-display-inline" id="id43CC6B8FB04B455D8452A46C50A0CD72"><enum>(1)</enum><text>For purposes of this section, an eligible private sector employee is an individual employed by a private firm that is engaged in providing to the Department of Defense, the intelligence community, or other Government departments or agencies significant and substantial intelligence or defense-related systems, products, or services or whose work product is relevant to national security policy or strategy.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="id79629FBFDBD44D1C92BE88A5E4535495" indent="up1"><enum>(2)</enum><text>A private sector employee admitted for instruction at the National Intelligence University remains eligible for such instruction only so long as that person remains employed by the same firm, holds appropriate security clearances, and complies with any other applicable security protocols.</text>
 </paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H3DB2CBD34B7C956FE941449A06B6CE3"><enum>(c)</enum><header>Annual certification by Secretary of Defense</header><text>Private sector employees may receive instruction at the National Intelligence University during any academic year only if, before the start of that academic year, the Secretary of Defense determines, and certifies to the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives, that providing instruction to private sector employees under this section during that year will further the national security interests of the United States.</text>
 </subsection><subsection commented="no" display-inline="no-display-inline" id="H3613188048E0D5E5C1233897496989B"><enum>(d)</enum><header>Program requirements</header><text>The Secretary of Defense shall ensure that—</text> <paragraph id="HD920556D4EBEC024C5AA50B8AA0080D"><enum>(1)</enum><text>the curriculum in which private sector employees may be enrolled under this section is not readily available through other schools and concentrates on national security relevant issues; and</text>
 </paragraph><paragraph id="H19943E584FB457EAC2E522971DE7B39"><enum>(2)</enum><text>the course offerings at the National Intelligence University are determined by the needs of the Department of Defense and the intelligence community.</text>
 </paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H33C0B8FB44B34867D3B6A6AD6225D41"><enum>(e)</enum><header>Tuition</header><text>The President of the National Intelligence University shall charge students enrolled under this section a rate that—</text>
 <paragraph id="H4EE76F004230C1B74EE13C8AAC86E63"><enum>(1)</enum><text>is at least the rate charged for employees of the United States outside the Department of Defense, less infrastructure costs; and</text>
 </paragraph><paragraph id="H580E52144DA8E865F292E4956153B3A"><enum>(2)</enum><text>considers the value to the school and course of the private sector student.</text> </paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H0159196C4E708D44A77CAE80A42EA0F"><enum>(f)</enum><header>Standards of conduct</header><text>While receiving instruction at the National Intelligence University, students enrolled under this section, to the extent practicable, are subject to the same regulations governing academic performance, attendance, norms of behavior, and enrollment as apply to Government civilian employees receiving instruction at the university.</text>
 </subsection><subsection commented="no" display-inline="no-display-inline" id="H3E597804454A6A0DB9801B8A8675B4B"><enum>(g)</enum><header>Use of funds</header><paragraph commented="no" display-inline="yes-display-inline" id="idD09FE5ED286049BC8F441ED1F9A6AA9A"><enum>(1)</enum><text>Amounts received by the National Intelligence University for instruction of students enrolled under this section shall be retained by the university to defray the costs of such instruction.</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="id6AF8F9D12A6C412FB80451FB33F60D33" indent="up1"><enum>(2)</enum><text>The source, and the disposition, of such funds shall be specifically identified in records of the university.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph><paragraph id="id6E454B3F64664594A07D78DC8AB6A543"><enum>(2)</enum><header>Clerical amendment</header><text>The table of sections at the beginning of chapter 108 of such title is amended by inserting after the item relating to section 2167a the following:</text>
							<quoted-block display-inline="no-display-inline" id="idE93C9ED2AEF24F3F9369B2B163F93180" style="OLC"><toc><toc-entry bold="off" level="section">2167b. National Intelligence University: admission of private sector civilians to receive
			 instruction.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
						</paragraph></subsection></section></subtitle></title></legis-body>
	<endorsement><action-date>June 28, 2018</action-date><action-desc>Read twice and placed on the calendar</action-desc></endorsement></bill>


