<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-OLL21559-4LF-63-WNW"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S1245 IS: Combating Chinese Purloining of Trade Secrets Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-04-20</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 1245</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20210420">April 20, 2021</action-date><action-desc><sponsor name-id="S293">Mr. Graham</sponsor> introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSJU00">Committee on the Judiciary</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To combat the theft of trade secrets by China, and for other purposes.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="S1"><enum>1.</enum><header>Short title; table of contents</header><subsection id="idD617A43B5F30464494A35E3083323E30"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Combating Chinese Purloining of Trade Secrets Act</short-title></quote> or the <quote><short-title>CCP Trade Secrets Act</short-title></quote>.</text></subsection><subsection id="idC115F55C0FA7425986A5A710AB4D11BF"><enum>(b)</enum><header>Table of contents</header><text>The table of contents for this Act is as follows:</text><toc><toc-entry level="section" idref="S1">Sec. 1. Short title; table of contents.</toc-entry><toc-entry level="title" idref="id3186AE9049604C749E9CB6C1D5A1308B">TITLE I—Increased penalties for violations of section 2512 of title 18, United States Code, involving a foreign government</toc-entry><toc-entry level="section" idref="ID44a99c08058a45ddb3fd26b6d1614126">Sec. 101. Manufacture, distribution, possession, and advertising of wire, oral, or electronic communication intercepting devices prohibited.</toc-entry><toc-entry level="title" idref="id9969EE9E8F9F43BEBF784604ED2599FF">TITLE II—Protecting U.S. businesses from foreign trade secret theft</toc-entry><toc-entry level="section" idref="IDf86c9612a871417596a5614311bf0d65">Sec. 201. Short title.</toc-entry><toc-entry level="section" idref="IDc93b943117ca440ba536cdce006a3297">Sec. 202. Prohibition on misappropriating U.S. trade secrets.</toc-entry><toc-entry level="title" idref="id1B98C1B666AB4046A4F0808FD5387D0A">TITLE III—Combating cybercrime</toc-entry><toc-entry level="section" idref="IDd87be62ee08e4e7481707cc11c91b40c">Sec. 301. Short title.</toc-entry><toc-entry level="section" idref="ID8b1484eb7f6a43fca60d662727a1dc5a">Sec. 302. Predicate offenses.</toc-entry><toc-entry level="section" idref="IDd4a8bbdc1dfc4c7c9f7b41518da0ed11">Sec. 303. Forfeiture.</toc-entry><toc-entry level="section" idref="ID682f16aaaf9646bfa9563697cd7b5e15">Sec. 304. Shutting down botnets.</toc-entry><toc-entry level="section" idref="IDc05bdad8da6d456da422ac7fd35fa962">Sec. 305. Aggravated damage to a critical infrastructure computer.</toc-entry><toc-entry level="section" idref="idec19824d53254045a8dae23516470612">Sec. 306. Stopping trafficking in botnets; fraud and related activity in connection with computers.</toc-entry><toc-entry level="title" idref="id5C53A02CE57A40C8BFF72A9B2553F34F">TITLE IV—Espionage, theft of trade secrets, and improper interference in United States elections</toc-entry><toc-entry level="section" idref="id60A18F16F19D40A187AA1A8C39686589">Sec. 401. Espionage, theft of trade secrets, theft of intellectual property, involvement in commercial fraud schemes, and improper interference in United States elections.</toc-entry><toc-entry level="section" idref="id69B7E93EEA5E4398BA24FE7BE430A6EB">Sec. 402. Visa and nonimmigrant status restrictions.</toc-entry><toc-entry level="title" idref="idb980e9f4e2f34f12b85c411c9643f3ac">TITLE V—Government-funded research projects</toc-entry><toc-entry level="section" idref="idc0587b323a8a4e5b9c912da8d8daeca8">Sec. 501. Findings.</toc-entry><toc-entry level="section" idref="idAE962E21515842D6BB2E65EC2838E1CF">Sec. 502. Definitions.</toc-entry><toc-entry level="section" idref="id6AAF5EB12A8B4A398E44D328F3CFAFF2">Sec. 503. Approval of covered persons in sensitive Government-funded research projects.</toc-entry><toc-entry level="section" idref="id0B3215D9B59E45F8BC198B8268B79F7B">Sec. 504. Disclosure of research assistance from foreign governments.</toc-entry></toc></subsection></section><title id="id3186AE9049604C749E9CB6C1D5A1308B" style="OLC"><enum>I</enum><header>Increased penalties for violations of section 2512 of title 18, United States Code, involving a foreign government</header><section id="ID44a99c08058a45ddb3fd26b6d1614126"><enum>101.</enum><header>Manufacture, distribution, possession, and advertising of wire, oral, or electronic communication intercepting devices prohibited</header><subsection id="IDbdd82d7695fc447a8276d09b2a8b2139"><enum>(a)</enum><header>In general</header><text>Section 2512 of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id438210F957114C3581F86B282D47B0C4"><subsection id="id3CDCE93329A4408583F12C2F4E9F969B"><enum>(4)<?LEXA-Enum (4)?></enum><text>Any person who violates this section with the intent to benefit any government of a foreign country (as defined in section 1 of the Foreign Agents Registration Act of 1938, as amended (<external-xref legal-doc="usc" parsable-cite="usc/22/611">22 U.S.C. 611</external-xref>)), agency or instrumentality of a foreign state (as defined in section 1603(b) of title 28, United States Code), or agent of a foreign principal (as defined in section 1 of the Foreign Agents Registration Act of 1938, as amended (<external-xref legal-doc="usc" parsable-cite="usc/22/611">22 U.S.C. 611</external-xref>)) shall be fined under this title, imprisoned for not more than 20 years, or both.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="ID32264c9f3ec640afb932b89b050064a2"><enum>(b)</enum><header>Sentencing enhancement for foreign involvement in violations of section 2512 of title 18, United States Code</header><text>Pursuant to its authority under section 994 of title 28, United States Code, the United States Sentencing Commission shall review and amend the Federal sentencing guidelines to ensure that the guidelines provide an additional penalty increase of not fewer than 4 offense levels if the defendant violated section 2512 of title 18, United States Code, with the intent to benefit any government of a foreign country, agency or instrumentality of a foreign state, or agent of a foreign principal.</text></subsection></section></title><title id="id9969EE9E8F9F43BEBF784604ED2599FF" style="OLC"><enum>II</enum><header>Protecting U.S. businesses from foreign trade secret theft</header><section id="IDf86c9612a871417596a5614311bf0d65"><enum>201.</enum><header>Short title</header><text display-inline="no-display-inline"> This title may be cited as the <quote><short-title>Protecting U.S. Businesses from Foreign Trade Secrets Theft Act of 2021</short-title></quote>.</text></section><section id="IDc93b943117ca440ba536cdce006a3297"><enum>202.</enum><header>Prohibition on misappropriating U.S. trade secrets</header><subsection id="ID43e6982ae70d4d34a4abaffc77200db9"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/90">Chapter 90</external-xref> of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="id2A3CC3CC3D9148B9AB8346C058392775"><section id="ID677b1097732b44f3ac7ed094e5c41773"><enum>1840.</enum><header>Applicability to foreign persons</header><subsection id="IDc42e7d73670144359afe9261217fc1a4"><enum>(a)</enum><header>Definitions</header><text>In this section—</text><paragraph id="ID22a0c427bdd340dfbd855b33991145fa"><enum>(1)</enum><text>the term <term>critical technology</term> has the meaning given the term <term>critical technologies</term> in section 721 of the Defense Production Act of 1950 (<external-xref legal-doc="usc" parsable-cite="usc/50/4565">50 U.S.C. 4565</external-xref>);</text></paragraph><paragraph id="IDa0ab223582584147a0e54f6116fa8a78"><enum>(2)</enum><text>the term <term>designated Federal agency</term> means—</text><subparagraph id="idC13B0A63E1A84C51A36E5C042EB353B4"><enum>(A)</enum><text>the Department of Homeland Security;</text></subparagraph><subparagraph id="idDC5A88F633194535B50B51DAD9F6C7EF"><enum>(B)</enum><text>U.S. Customs and Border Protection;</text></subparagraph><subparagraph id="id42C8CB24F4864FC5A6A1BF694FDE5BC4"><enum>(C)</enum><text>the Department of Commerce;</text></subparagraph><subparagraph id="id7A6368029AA64F70B89D6EB589BA478B"><enum>(D)</enum><text>the Securities and Exchange Commission;</text></subparagraph><subparagraph id="idB637929D3325434D8D0FEA40A88CC49E"><enum>(E)</enum><text>the Export-Import Bank of the United States;</text></subparagraph><subparagraph id="id4EF7123656044338803B831A70A69A49"><enum>(F)</enum><text>the Department of State; and</text></subparagraph><subparagraph id="id2556F88D3B554FDAAADC95162C041421"><enum>(G)</enum><text>the United States Patent and Trademark Office;</text></subparagraph></paragraph><paragraph id="IDff1286d2e53742248e2bbb65438fc254"><enum>(3)</enum><text>the term <term>foreign person</term> means a person that is not a United States person;</text></paragraph><paragraph id="id490543D95B2E448B9D5ED6F78EFE329F"><enum>(4)</enum><text>the term <term>International Trade Commission</term> means the United States International Trade Commission;</text></paragraph><paragraph id="id1106b314ac4b4da0a2fa6f0e7e615d86"><enum>(5)</enum><text>the term <term>offending foreign person</term> means a foreign person—</text><subparagraph id="id154413D3FDA14DC494369A7CF174EDE0"><enum>(A)</enum><text>who misappropriates a trade secret; and</text></subparagraph><subparagraph id="id626F542956E74D84B5A04BF0B31E547F"><enum>(B)</enum><text>with respect to whom a petition submitted under subsection (b)(1) satisfies the requirements under that subsection, as determined by the Attorney General;</text></subparagraph></paragraph><paragraph id="IDf6facff816e84a6490ccd2150f96127f"><enum>(6)</enum><text>the term <term>person</term> means—</text><subparagraph id="IDdaabbce6b8604acea94cde604e5ed57c"><enum>(A)</enum><text>an individual; and</text></subparagraph><subparagraph id="IDcdff70ed69c04b7e891c3ecac6b94293"><enum>(B)</enum><text>a corporation, business association, partnership, society, or trust, any other nongovernmental entity, organization, or group, and any governmental entity operating as a business enterprise; and</text></subparagraph></paragraph><paragraph id="ID908a8939d04445309b7000eaa3e5cab1"><enum>(7)</enum><text>the term <term>United States person</term> means—</text><subparagraph id="IDacdee5e26f6a4000a3c59d2975b579dd"><enum>(A)</enum><text>a United States citizen or an alien lawfully admitted for permanent residence to the United States;</text></subparagraph><subparagraph id="ID8e2141fc4f3042318c665646f2bf9670"><enum>(B)</enum><text>a corporation or other legal entity that is organized under the laws of the United States, any State or territory thereof, or the District of Columbia; and</text></subparagraph><subparagraph id="IDa5bd4cba2b544574b58b91fe14d10979"><enum>(C)</enum><text>a corporation or other legal entity—</text><clause id="idF8FD81AB251A4D08BB2C789FD8BD96B2"><enum>(i)</enum><text>organized under the laws of a jurisdiction outside of the United States; and</text></clause><clause id="idE78A2A4C88564BC7BDF47E4D42B87AA7"><enum>(ii)</enum><text>with respect to which a United States person described in subparagraph (A) or (B)—</text><subclause id="id105E81ECB04A418BAD518637292D8E78"><enum>(I)</enum><text>holds more than 50 percent of the equity interest by vote or value;</text></subclause><subclause id="id7497EF31A5364E1D99236C3FA17EE4B9"><enum>(II)</enum><text>holds a majority of seats on the board of directors; or</text></subclause><subclause id="idB0E010E491D24116B059D45ADC2FC002"><enum>(III)</enum><text>otherwise controls the actions, policies, or personnel decisions.</text></subclause></clause></subparagraph></paragraph></subsection><subsection id="id342C02A8647B4779914DD1AB30A37255"><enum>(b)</enum><header>Petition for relief</header><paragraph id="IDd91116fb2ea24843a5e857ad9ed726e5"><enum>(1)</enum><header>Demonstration of misappropriation</header><text>If an owner of a trade secret, who is a United States person, wishes to have the Attorney General or the head of the applicable designated Federal agency apply a penalty under subsection (c) to a foreign person who has misappropriated the trade secret, the owner shall submit to the Attorney General a petition demonstrating that—</text><subparagraph id="IDcc300312e3004ef99b0d5b6380665ece"><enum>(A)</enum><clause commented="no" display-inline="yes-display-inline" id="idDC90D6E25C5A4CBE9319A57162534150"><enum>(i)</enum><text>a court has entered a temporary restraining order, preliminary injunction, or final judgment under section 1836 of this title against the foreign person for misappropriating a trade secret of the owner;</text></clause><clause id="idE33036AEBDE14A709402BACE0C16346D" indent="up1"><enum>(ii)</enum><text>the International Trade Commission has issued a temporary exclusion order or final exclusion order under section 337 of the Tariff Act of 1930 (<external-xref legal-doc="usc" parsable-cite="usc/19/1337">19 U.S.C. 1337</external-xref>) against the foreign person for misappropriating a trade secret of the owner; or </text></clause><clause indent="up1" id="idB018899E5C684E8193ACB87ECADBDC48"><enum>(iii)</enum><text>an indictment has been issued under section 1831 or 1832 of this title against the foreign person for misappropriating a trade secret of the owner;</text></clause></subparagraph><subparagraph id="ID6e86e285d5654ea79a955be9cffbca4c"><enum>(B)</enum><text>the trade secret described in the applicable clause of subparagraph (A) involves or is a component of critical technology; and </text></subparagraph><subparagraph id="ID7cb0959bee4a4040b1727eda0ab0cd10"><enum>(C)</enum><text>the remedies available to the owner under section 1836 of this title or section 337 of the Tariff Act of 1930 (<external-xref legal-doc="usc" parsable-cite="usc/19/1337">19 U.S.C. 1337</external-xref>), as applicable, are unlikely to provide complete relief to the owner because the foreign person has used or is reasonably likely to use the misappropriated trade secret in the home country of the foreign person or a third country, such that activities of the foreign person relevant to the determinations under subparagraph (A) take place outside the United States.</text></subparagraph></paragraph><paragraph id="ID94a096ebce7a4acb984fecfde37d29a1"><enum>(2)</enum><header>Review</header><text>Not later than 60 days after the date on which an owner who is a United States person submits a petition to the Attorney General under paragraph (1), the Attorney General shall determine whether the petition satisfies the requirements under that paragraph.</text></paragraph><paragraph id="id6C73A6ADE9714C2EBF3C0CF27C9AF3DC"><enum>(3)</enum><header>Notification</header><text>If the Attorney General determines under paragraph (2) that a petition satisfies the requirements under paragraph (1), the Attorney General shall so notify the head of each designated Federal agency not later than 30 days after the date of the determination.</text></paragraph><paragraph commented="no" id="id332c897895084ce4b817412fdfbf8520"><enum>(4)</enum><header>Sense of Congress</header><text>It is the sense of Congress that if the Attorney General determines under paragraph (2) that a petition relating to a foreign person satisfies the requirements under paragraph (1), the Attorney General and the head of each designated Federal agency should impose 1 or more penalties on the foreign person under subsection (c), to the extent that the penalties are applicable.</text></paragraph></subsection><subsection id="ID9ae57326884d42bf84165d38e7b748fc"><enum>(c)</enum><header>Penalties</header><paragraph id="ID2dc0940d9fdd4cd3aa436dc5e8ba93ad"><enum>(1)</enum><header>In general</header><text>Subject to paragraphs (2) and (3), not later than 90 days after the date on which the Attorney General provides notice to the head of each designated Federal agency under subsection (b)(3) with respect to an offending foreign person, the Attorney General or the head of a designated Federal agency, as applicable, may impose 1 or more of the following penalties on the offending foreign person:</text><subparagraph id="ID609640dae2284b9888426997fcd84437"><enum>(A)</enum><header>Import restriction</header><text>The Commissioner of U.S. Customs and Border Protection may exclude from entry into the United States any articles produced by the offending foreign person.</text></subparagraph><subparagraph id="id8f83bfa0c2f64f06a0ba5035eac63140"><enum>(B)</enum><header>Export licenses</header><clause id="id691f4b0f85464008be1835859c67a754"><enum>(i)</enum><header>Dual-use exports</header><text>The Secretary of Commerce may refuse to issue any specific license, or grant any other specific permission or authority, for the export, reexport, or in-country transfer of items to the offending foreign person under the Export Control Reform Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/50/4801">50 U.S.C. 4801</external-xref> et seq.).</text></clause><clause id="idce4ffb087afe4447984bfb63b9d25e18"><enum>(ii)</enum><header>Defense articles and defense services</header><text>The Secretary of State may refuse to issue any license or other approval for the export of defense articles or defense services to the offending foreign person under the Arms Export Control Act (<external-xref legal-doc="usc" parsable-cite="usc/22/2751">22 U.S.C. 2751</external-xref> et seq.).</text></clause></subparagraph><subparagraph id="ID7290e06dcd2e484ca25c5abfdc48137c"><enum>(C)</enum><header>Restricted parties</header><clause id="idaea3cd155d054e1fb4bc57179541869e"><enum>(i)</enum><header>Commerce lists</header><text>The Secretary of Commerce may add the offending foreign person to one of the following lists maintained by the Bureau of Industry and Secretary of the Department of Commerce:</text><subclause id="id584de741eac14f0dbebf371b3c811137"><enum>(I)</enum><text>The Entity List set forth in Supplement No. 4 to part 744 of the Export Administration Regulations under subchapter C of chapter VII of title 15, Code of Federal Regulations.</text></subclause><subclause id="id55b4cfa9881141b6b2a51214d1dbeeec"><enum>(II)</enum><text>The Denied Persons List maintained pursuant to section 764.3 of the Export Administration Regulations.</text></subclause></clause><clause id="id574A4E58735745A79737A856791FCAC7"><enum>(ii)</enum><header>Treasury list</header><text>The Secretary of the Treasury may add the offending foreign person to the list of specially designated nationals and blocked persons maintained by the Office of Foreign Assets Control of the Department of the Treasury.</text></clause></subparagraph><subparagraph id="ID35fd7f9f3e544d79afa8ee71b8b40553"><enum>(D)</enum><header>Securities reporting</header><text>The Securities and Exchange Commission may determine whether the use by the offending foreign person of the misappropriated trade secret is a reportable material condition in any filing by the offending foreign person required under applicable securities laws of the United States.</text></subparagraph><subparagraph id="ID9b1c2e3320194dcd807d6122dde7d5c2"><enum>(E)</enum><header>Patent protection</header><text>The Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office may prohibit the offending foreign person from applying for patent protection, being listed as an inventor on a patent application, or continuing a patent application under title 35, United States Code.</text></subparagraph><subparagraph id="IDca04637015b84d0a8950be769ae40c47"><enum>(F)</enum><header>Export-Import Bank assistance for exports to foreign person</header><text>The Export-Import Bank of the United States may refuse to approve the issuance of any guarantee, insurance, extension of credit, or participation in the extension of credit in connection with the export of any goods or services to the offending foreign person.</text></subparagraph><subparagraph id="idb695a1e1051b4dc6940fa360a8e9f3cb"><enum>(G)</enum><header>Exclusion of corporate officers</header><text>The Secretary of State may deny a visa application, and the Secretary of Homeland Security may deny an application for admission to the United States, of any alien that the applicable Secretary determines is a corporate officer or principal of, or a shareholder with a controlling interest in, the offending foreign person.</text></subparagraph><subparagraph id="id1ebca4099ebc40e4ae98e439136247d4"><enum>(H)</enum><header>Other penalties</header><text>The Attorney General or the head of a designated Federal agency—</text><clause id="id9058acc1194b4d7d8a368a672f50a137"><enum>(i)</enum><text>may not procure, or enter into a contract for the procurement of, any goods or services from the offending foreign person;</text></clause><clause id="idb3656c69a48f4c51ae6650403766facb"><enum>(ii)</enum><text>may prohibit, pursuant to notice issued by the Attorney General, a United States person from knowingly investing in or purchasing significant amounts of equity or debt instruments of the offending foreign person;</text></clause><clause id="ida5e4e3224351457594293877df850f14"><enum>(iii)</enum><text>may impose on a principal executive officer of the offending foreign person, or on an individual performing similar functions and with similar authorities as such an officer, any penalty under this subsection that could be imposed on the offending foreign person; and</text></clause><clause id="id2920a4b7ff58409eaa1ce55fd34467c0"><enum>(iv)</enum><text>may impose on the offending foreign person any other penalty authorized under any provision of Federal law, as determined appropriate.</text></clause></subparagraph></paragraph><paragraph id="ID19c494266b724971b477d50feb98d0a7"><enum>(2)</enum><header>Duration of penalties</header><subparagraph id="idB1A93E9B1FD44B70ABF012AF4BFE8B45"><enum>(A)</enum><header>Temporary penalty</header><text>If a court enters a temporary restraining order or preliminary injunction under section 1836 of this title against an offending foreign person for misappropriating a trade secret, the International Trade Commission issues a temporary exclusion order under section 337 of the Tariff Act of 1930 (<external-xref legal-doc="usc" parsable-cite="usc/19/1337">19 U.S.C. 1337</external-xref>) against an offending foreign person for misappropriating a trade secret, or an indictment is issued under section 1831 or 1832 of this title against an offending foreign person for misappropriating a trade secret, the Attorney General or the head of a designated Federal agency may impose a penalty under paragraph (1) on the offending foreign person during the period during which the temporary restraining order, preliminary injunction, temporary exclusion order, or indictment remains in effect.</text></subparagraph><subparagraph id="ID876cd1c7066247b8bda0636c401aa3cb"><enum>(B)</enum><header>Permanent penalty</header><text>If a court enters a final judgment under section 1836 of this title against an offending foreign person for misappropriating a trade secret, the International Trade Commission issues a final exclusion order under section 337 of the Tariff Act of 1930 (<external-xref legal-doc="usc" parsable-cite="usc/19/1337">19 U.S.C. 1337</external-xref>) against an offending foreign person for misappropriating a trade secret, or an offending foreign person is convicted under section 1831or 1832 of this title of misappropriating a trade secret, the Attorney General or the head of a designated Federal agency may permanently impose a penalty under paragraph (1) on the foreign person.</text></subparagraph></paragraph><paragraph id="IDe034325fe51d41a2b297530911409af8"><enum>(3)</enum><header>Petition for review</header><subparagraph id="idb5a3856ef52740ccb849188aa2394520"><enum>(A)</enum><header>In general</header><text>If the Attorney General or the head of a designated Federal agency imposes a temporary penalty under paragraph (2)(A) or a permanent penalty under paragraph (2)(B) on an offending foreign person, the offending foreign person may submit to the Attorney General or the head of the designated Federal agency a petition for the revocation or modification of the penalty—</text><clause id="id99DACA669CE1450E95F0201BD4772B0D"><enum>(i)</enum><text>not later 45 days after the date on which the penalty is imposed; or</text></clause><clause id="idA9DA4263FA7E4B6BB37E4820BDED27F3"><enum>(ii)</enum><text>in the case of a permanent penalty, if the final judgment, final exclusion order, or conviction upon which the permanent penalty is based is reversed on appeal or otherwise vacated, not later than 45 days after the date of the reversal or vacatur.</text></clause></subparagraph><subparagraph id="ID30ddeb7ec8a342f8b1fd81bc77f26da5"><enum>(B)</enum><header>Contents of petition</header><clause id="id519727EAAA5A428391EF942E794B76FB"><enum>(i)</enum><header>In general</header><text>An offending foreign person shall include in a petition submitted under subparagraph (A) a full written statement in support of the position of the offending foreign person, including a precise statement of why—</text><subclause id="idBA5F43208EB7457FB7DE57550CDC3C66"><enum>(I)</enum><text>an insufficient basis exists for the penalty; or</text></subclause><subclause id="id4651936370AD49BEBB490AB0C9D3EC05"><enum>(II)</enum><text>the circumstances resulting in the penalty no longer apply.</text></subclause></clause><clause id="idA53D5D0A8B004AE39345D16FC805CB84"><enum>(ii)</enum><header>Remedial steps</header><text>An offending foreign person may, in a petition submitted under subparagraph (A), propose remedial steps that would negate the basis for the penalty.</text></clause></subparagraph><subparagraph id="IDa0b45f025fa041a0b852100a7b05ac6c"><enum>(C)</enum><header>Determination</header><text>The Attorney General or the head of a designated Federal agency, as applicable, shall make a determination with respect to a petition submitted under subparagraph (A).</text></subparagraph></paragraph></subsection><subsection id="ID8d727985d2bb42d4a4538df0bb74a1ae"><enum>(d)</enum><header>Report</header><paragraph id="IDa22c2f1c1644494fb4dba7de612b7a96"><enum>(1)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of this section, and each year thereafter, the Attorney General, in coordination with the head of each designated Federal agency, shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives a report that—</text><subparagraph id="id935DC146DBC243B5B1CDF44DECDE45C7"><enum>(A)</enum><text>with respect to the preceding year—</text><clause id="ID677bb1f39a9d4db6bf96abb02daaa6c6"><enum>(i)</enum><text>identifies foreign countries, state-owned and state-controlled entities, and other persons that engaged in the misappropriation of trade secrets owned by United States persons;</text></clause><clause id="ID1d3e67a7f66446d9acd4d9e4e907d638"><enum>(ii)</enum><text>describes any strategy used by a foreign country to undertake misappropriation of trade secrets owned by United States persons;</text></clause><clause id="IDd62352d1a3ee4fb1bfc5688cc2b524c9"><enum>(iii)</enum><text>identifies categories of technologies developed by, or trade secrets owned by, United States persons that were targeted for misappropriation;</text></clause><clause id="IDfaed585000314498a2e135aafd6ba2b2"><enum>(iv)</enum><text>lists legal actions taken under section 1836 of this title, section 337 of the Tariff Act of 1930 (<external-xref legal-doc="usc" parsable-cite="usc/19/1337">19 U.S.C. 1337</external-xref>), or section 1831 or 1832 of this title—</text><subclause id="idA338FE3AB2B0460580553FE468C2EB5F"><enum>(I)</enum><text>against an offending foreign person who misappropriated a trade secret owned by a United States person; and</text></subclause><subclause id="idA68705F301A54E708A539092A8E11D88"><enum>(II)</enum><text>as a result of which the products of the offending foreign person described in subclause (I) may never enter the United States; and</text></subclause></clause><clause id="IDb3275147863f4ccfa137c784409d31ec"><enum>(v)</enum><text>describes progress made in decreasing the prevalence of misappropriation of trade secrets owned by United States persons; and</text></clause></subparagraph><subparagraph id="ID23f07f1182e3478c8b560a22692be770"><enum>(B)</enum><text>recommends strategies to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives to decrease the misappropriation by foreign persons of trade secrets owned by United States persons.</text></subparagraph></paragraph><paragraph id="ID7c6a5d25c04d4f01a01d707621cfc866"><enum>(2)</enum><header>Form of report</header><text> A report submitted under paragraph (1) shall be submitted in unclassified form but may contain a classified annex.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" id="idC43E1D58723A4D91A35E7A4723988FE8"><enum>(b)</enum><header>Table of sections</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/90">chapter 90</external-xref> of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id53BC0412C18941A69A85E2F9EA1522BE"><toc><toc-entry bold="off" level="section">1840. Applicability to foreign persons.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section></title><title id="id1B98C1B666AB4046A4F0808FD5387D0A" style="OLC"><enum>III</enum><header>Combating cybercrime</header><section id="IDd87be62ee08e4e7481707cc11c91b40c"><enum>301.</enum><header>Short title</header><text display-inline="no-display-inline"> This title may be cited as the <quote><short-title>International Cybercrime Prevention Act</short-title></quote>. </text></section><section id="ID8b1484eb7f6a43fca60d662727a1dc5a"><enum>302.</enum><header>Predicate offenses</header><text display-inline="no-display-inline">Part I of title 18, United States Code, is amended—</text><paragraph id="idF53CF66EAC52443BAE4E6E3D3EA0F9A8"><enum>(1)</enum><text display-inline="yes-display-inline">in section 1956(c)(7)(D)—</text><subparagraph id="ID0c8e9fe032cb47c0b44bdd8a5af514e3"><enum>(A)</enum><text>by striking <quote>or section 2339D</quote> and inserting <quote>section 2339D</quote>; and</text></subparagraph><subparagraph id="IDc26341dedd884c3ba53a080d4dcd8407"><enum>(B)</enum><text>by striking <quote>of this title, section 46502</quote> and inserting <quote>, or section 2512 (relating to the manufacture, distribution, possession, and advertising of wire, oral, or electronic communication intercepting devices) of this title, section 46502</quote>; and</text></subparagraph></paragraph><paragraph id="IDe3fe947460074f86b4da80b3b380092a"><enum>(2)</enum><text>in section 1961(1), by inserting <quote>section 1030 (relating to fraud and related activity in connection with computers) if the act indictable under section 1030 is felonious,</quote> before <quote>section 1084</quote>.</text></paragraph></section><section id="IDd4a8bbdc1dfc4c7c9f7b41518da0ed11"><enum>303.</enum><header>Forfeiture</header><subsection id="ID8bcf573583d049c2b29a868032ac5744"><enum>(a)</enum><header>In general</header><text>Section 2513 of title 18, United States Code, is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id23F3458C6E014CAF99740ED654991FB2"><section id="ID15d267a514314757a42282f3b95c9e2e"><enum>2513.</enum><header>Confiscation of wire, oral, or electronic communication intercepting devices and other property</header><subsection id="ID97d2ceff125d429b99b2796d0606a780"><enum>(a)</enum><header>Criminal forfeiture</header><paragraph id="ID2d5d158400a548cfa4c4c50198297242"><enum>(1)</enum><header>In general</header><text>The court, in imposing a sentence on any person convicted of a violation of section 2511 or 2512, or convicted of conspiracy to violate section 2511 or 2512, shall order, in addition to any other sentence imposed and irrespective of any provision of State law, that such person forfeit to the United States—</text><subparagraph id="IDfcce023970b942389e43e2100d5828cb"><enum>(A)</enum><text>such person’s interest in any property, real or personal, that was used or intended to be used to commit or to facilitate the commission of such violation; and</text></subparagraph><subparagraph id="IDbdc3709897234f2d97c1be7b93f17a6c"><enum>(B)</enum><text>any property, real or personal, constituting or derived from any gross proceeds, or any property traceable to such property, that such person obtained or retained directly or indirectly as a result of such violation.</text></subparagraph></paragraph><paragraph id="IDdcd71c2869aa46afa1b0f8eb2d39ee2a"><enum>(2)</enum><header>Forfeiture procedures</header><text>Pursuant to section 2461(c) of title 28, the provisions of section 413 of the Controlled Substances Act (<external-xref legal-doc="usc" parsable-cite="usc/21/853">21 U.S.C. 853</external-xref>), other than subsection (d) thereof, shall apply to criminal forfeitures under this subsection.</text></paragraph></subsection><subsection id="IDfcb8f275d7f14c3b8f2d940cc1843b52"><enum>(b)</enum><header>Civil forfeiture</header><paragraph id="ID4595aa42361c4ba580d93aed82325614"><enum>(1)</enum><header>In general</header><text>The following shall be subject to forfeiture to the United States in accordance with provisions of chapter 46 and no property right shall exist in them:</text><subparagraph id="ID65bc07fe4c2d43cd9c7456529634fee2"><enum>(A)</enum><text>Any property, real or personal, used or intended to be used, in any manner, to commit, or facilitate the commission of a violation of section 2511 or 2512, or a conspiracy to violate section 2511 or 2512.</text></subparagraph><subparagraph id="IDeb8a67ce01ea410f82e70b92a42a3470"><enum>(B)</enum><text>Any property, real or personal, constituting, or traceable to the gross proceeds taken, obtained, or retained in connection with or as a result of a violation of section 2511 or 2512, or a conspiracy to violate section 2511 or 2512.</text></subparagraph></paragraph><paragraph id="IDb78c96b02f904e51a5776233da7b283e"><enum>(2)</enum><header>Forfeiture procedures</header><text>Seizures and forfeitures under this subsection shall be governed by the provisions of chapter 46 relating to civil forfeitures, except that such duties as are imposed on the Secretary of the Treasury under the customs laws described in section 981(d) shall be performed by such officers, agents, and other persons as may be designated for that purpose by the Secretary of Homeland Security or the Attorney General.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="IDac3805429bda4aff9eab30dadf719f2b"><enum>(b)</enum><header>Technical and conforming amendment</header><text>The table of sections for chapter 119 is amended by striking the item relating to section 2513 and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8D7804305A3942878A5588EF8FC50ADE"><toc><toc-entry bold="off" level="section">2513. Confiscation of wire, oral, or electronic communication intercepting devices and other property.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="ID682f16aaaf9646bfa9563697cd7b5e15"><enum>304.</enum><header>Shutting down botnets</header><subsection id="IDb5adaa1f48e84292859c07cfa597dff3"><enum>(a)</enum><header>In general</header><text>Section 1345 of title 18, United States Code, is amended—</text><paragraph id="ID2cb0c6d78e7e4a3d83cd8c38296ad65e"><enum>(1)</enum><text>in the heading, by inserting <quote><header-in-text level="section" style="OLC">and abuse</header-in-text></quote> after <quote><header-in-text level="section" style="OLC">fraud</header-in-text></quote>;</text></paragraph><paragraph id="ID30383b931d744208b8bf3768ead10c56"><enum>(2)</enum><text>in subsection (a)—</text><subparagraph id="ID87d8a98b4d0e4af98fd56f2305abe79c"><enum>(A)</enum><text>in paragraph (1)—</text><clause id="IDa46a2a46970445b5aa5c7348ad7cb148"><enum>(i)</enum><text>in subparagraph (B), by striking <quote>or</quote> at the end;</text></clause><clause id="IDef087062cc8d4ccb9b03bc8d29b4eaf6"><enum>(ii)</enum><text>in subparagraph (C), by inserting <quote>or</quote> after the semicolon; and</text></clause><clause id="ID9e1f8d2f45454f45b0dab53b1bb51964"><enum>(iii)</enum><text>by inserting after subparagraph (C) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id55489F644BA34389AFD76362D4BBA077"><subparagraph id="ID71c83ad1e8a847978290de185c6be12d"><enum>(D)</enum><text>violating or about to violate section 1030(a)(5) of this title where such conduct has caused or would cause damage (as defined in section 1030) without authorization to 100 or more protected computers (as defined in section 1030) during any 1-year period, including by—</text><clause id="ID91e793acad9a443d89324638346062ec"><enum>(i)</enum><text>impairing the availability or integrity of the protected computers without authorization; or</text></clause><clause id="ID2cc5df6010554ed3bf8ab5b1dffc79f4"><enum>(ii)</enum><text>installing or maintaining control over malicious software on the protected computers that, without authorization, has caused or would cause damage to the protected computers;</text></clause></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="ID45eeb8ce1e37412c8a9c647327978eb0"><enum>(B)</enum><text>in paragraph (2), in the matter preceding subparagraph (A), by inserting <quote>, a violation described in subsection (a)(1)(D),</quote> before <quote>or a Federal</quote>; and</text></subparagraph></paragraph><paragraph id="IDdcb217285ce3430897aa66a7c0b67b9f"><enum>(3)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id61E14B9E5B4A4A5C908164E29D194BE2"><subsection id="ID33255b16978c4e88a3b1281e29b2f904"><enum>(c)</enum><text>A restraining order, prohibition, or other action described in subsection (b), if issued in circumstances described in subsection (a)(1)(D), may, upon application of the Attorney General—</text><paragraph id="ID6175cbe5589a4c0ebf4cd1366602cfee"><enum>(1)</enum><text>specify that no cause of action shall lie in any court against a person for complying with the restraining order, prohibition, or other action; and</text></paragraph><paragraph id="ID5e96bb15dcb24c6eb740d2e92bd3eefd"><enum>(2)</enum><text>provide that the United States shall pay to such person a fee for reimbursement for such costs as are reasonably necessary and which have been directly incurred in complying with the restraining order, prohibition, or other action.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="ID4b9b8de95b74431485c2ff17635dc5aa"><enum>(b)</enum><header>Technical and conforming amendment</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/63">chapter 63</external-xref> of title 18, United States Code, is amended by striking the item relating to section 1345 and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idA1DB3A4B744A4035BFD537A313F18C18"><toc><toc-entry bold="off" level="section">1345. Injunctions against fraud and abuse.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="IDc05bdad8da6d456da422ac7fd35fa962"><enum>305.</enum><header>Aggravated damage to a critical infrastructure computer</header><subsection id="IDa5248ba0a3604fec9cc94cda8db696b8"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">Chapter 47</external-xref> of title 18, United States Code, is amended by inserting after <external-xref legal-doc="usc" parsable-cite="usc/18/1030">section 1030</external-xref> the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="idb624c0eb19804056ad59cd0901ff7880"><section id="idF54CBDF43E1D44E6B8BBB1383226A973"><enum>1030A.</enum><header>Aggravated damage to a critical infrastructure computer</header><subsection id="id78c4c3fc3110412b82f61534c8007d3f"><enum>(a)</enum><header>Offense</header><text>It shall be unlawful, during and in relation to a felony violation of section 1030, to knowingly cause or attempt to cause damage to a critical infrastructure computer, if such damage results in (or, in the case of an attempted offense, would, if completed, have resulted in) the substantial impairment—</text><paragraph id="id5d2b51b4fc2d4a7ea1459cd6d816da19"><enum>(1)</enum><text>of the operation of the critical infrastructure computer; or</text></paragraph><paragraph id="id18ef2e2702314e6a8698cd76435d5341"><enum>(2)</enum><text>of the critical infrastructure associated with such computer.</text></paragraph></subsection><subsection id="id22e9f4677b024986ae38e9aa9d8073df"><enum>(b)</enum><header>Penalty</header><text>Any person who violates subsection (a) shall, in addition to the term of punishment provided for the felony violation of section 1030, be fined under this title, imprisoned for not more than 20 years, or both.</text></subsection><subsection id="ida7f3e958e3344f38a9d6c493050cc2e2"><enum>(c)</enum><header>Consecutive sentence</header><text>Notwithstanding any other provision of law—</text><paragraph id="id7b083543fd644060a4f0f9cdc2795c6e"><enum>(1)</enum><text>a court shall not place any person convicted of a violation of this section on probation;</text></paragraph><paragraph id="id985fc70f8008473c96fa97451835042a"><enum>(2)</enum><text>except as provided in paragraph (4), no term of imprisonment imposed on a person under this section shall run concurrently with any term of imprisonment imposed on the person under any other provision of law, including any term of imprisonment imposed for the felony violation of section 1030;</text></paragraph><paragraph id="idcf3fc76698094aed994e0cdfaaab7029"><enum>(3)</enum><text>in determining any term of imprisonment to be imposed for the felony violation of section 1030, a court shall not in any way reduce the term to be imposed for such violation to compensate for, or otherwise take into account, any separate term of imprisonment imposed or to be imposed for a violation of this section; and</text></paragraph><paragraph id="id08444d29f20e4d0aafa8c2577c0f2995"><enum>(4)</enum><text>a term of imprisonment imposed on a person for a violation of this section may, in the discretion of the court, run concurrently, in whole or in part, only with another term of imprisonment that is imposed by the court at the same time on that person for an additional violation of this section, if such discretion shall be exercised in accordance with any applicable guidelines and policy statements issued by the United States Sentencing Commission pursuant to section 994 of title 28.</text></paragraph></subsection><subsection id="id0213cc2ef544486dbf41c95c6b8635ed"><enum>(d)</enum><header>Definitions</header><text>In this section—</text><paragraph id="id276d8f9ad7d749259278382d2ccf9483"><enum>(1)</enum><text>the terms <term>computer</term> and <term>damage</term> have the meanings given the terms in section 1030; and</text></paragraph><paragraph id="id5653a7b028fc41fb97940b4f5a07f8ce"><enum>(2)</enum><text>the term <term>critical infrastructure</term> means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have catastrophic regional or national effects on public health or safety, economic security, or national security, including voter registration databases, voting machines, and other communications systems that manage the election process or report and display results on behalf of State and local governments.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id47a2c4ff4ef0441e89fceea2d329f085"><enum>(b)</enum><header>Table of sections</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">chapter 47</external-xref> of title 18, United States Code, is amended by inserting after the item relating to <external-xref legal-doc="usc" parsable-cite="usc/18/1030">section 1030</external-xref> the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id031AAD4182764BA7B7E41DBDBDB26D93"><toc><toc-entry bold="off" level="section">1030A. Aggravated damage to a critical infrastructure computer.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idec19824d53254045a8dae23516470612"><enum>306.</enum><header>Stopping trafficking in botnets; fraud and related activity in connection with computers</header><subsection id="id1880767D35B244E69D53066C7591685C"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Section 1030 of title 18, United States Code, is amended—</text><paragraph id="id905bcec890ed4459b9903a907b1ed992"><enum>(1)</enum><text>in subsection (a)—</text><subparagraph id="id09e2a0d7095e4a9ebb7905379f805497"><enum>(A)</enum><text>by striking paragraph (2) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idafa560f1d7724cc9911e3b3bdd63f3b5"><paragraph id="id93aff435ee6f47b980bbcca3027297a0"><enum>(2)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="idd2e3683193af48e6945257f44c35631f"><enum>(A)</enum><text>intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information, if—</text><clause id="id97ac14a797aa4894a2dfe609b7158ff7" indent="up1"><enum>(i)</enum><text>the conduct was undertaken in furtherance of any felony violation of the laws of the United States or of any State, unless an element of such violation would require proof that the information was obtained without authorization or in excess of authorization; or</text></clause><clause id="idb9284d0aabda4c859b4359dd89cd8afb" indent="up1"><enum>(ii)</enum><text>the protected computer is owned or operated by or on behalf of a State or local governmental entity responsible for the administration of justice, public health, or safety, or owned or operated by or on behalf of the United States Government; or</text></clause></subparagraph><subparagraph id="id58eab0e2453e4c95848cfe582af56d68" indent="up1"><enum>(B)</enum><text>intentionally accesses a computer without authorization, and thereby obtains information from any protected computer;</text></subparagraph></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="id75f7243e858e4d198d26a5df733a269b"><enum>(B)</enum><text>by striking paragraph (6) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id2868e82686d74e108c167a0f2f2f5766"><paragraph id="id7b18738561be4fe3a9f5a34d3105e8ea"><enum>(6)</enum><text>knowing such conduct to be wrongful, intentionally traffics in any password or similar information, or any other means of access, further knowing or having reason to know that a protected computer would be accessed or damaged without authorization in a manner prohibited by this section as the result of such trafficking;</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="idae90de3d3bd54583b46e91326d3dc9d2"><enum>(C)</enum><text>in paragraph (7), by adding <quote>or</quote> at the end; and</text></subparagraph><subparagraph id="idfc98f79092c74d51963106abf2bbd64e"><enum>(D)</enum><text>by inserting after paragraph (7) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9c3593caaace4a7894f4e06ef71feec4"><paragraph id="id9a17e99085994ae5b7795c872379840e"><enum>(8)</enum><text>intentionally traffics in the means of access to a protected computer, if—</text><subparagraph id="ide9b66bd958b0415085896c5da6a294a0"><enum>(A)</enum><text>the trafficker knows or has reason to know the protected computer has been damaged in a manner prohibited by this section; and</text></subparagraph><subparagraph id="id443b413aac534c5f923ff80ae4f0e9f1"><enum>(B)</enum><text>the promise or agreement to pay for the means of access is made by, or on behalf of, a person the trafficker knows or has reason to know intends to use the means of access to—</text><clause id="id2ca55d2e8cae46928afcd1f7c593dda2"><enum>(i)</enum><text>damage a protected computer without authorization; or</text></clause><clause id="id84e141d16d2f49948c28387def096cef"><enum>(ii)</enum><text>violate section 1037 or 1343;</text></clause></subparagraph></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id521aff5b03864e4d983da234ed5b2d89"><enum>(2)</enum><text>in subsection (c)—</text><subparagraph id="ida7b4a34708fc4ae888c39b2ffa0b4f8a"><enum>(A)</enum><text>in paragraph (2), by striking <quote>, (a)(3), or (a)(6)</quote> each place it appears and inserting <quote>or (a)(3)</quote>;</text></subparagraph><subparagraph id="id863df021b69147928b197f7f49f222b8"><enum>(B)</enum><text>in paragraph (3)—</text><clause id="idc2699720da084773addfd5fd6b59488e"><enum>(i)</enum><text>in subparagraph (A), by striking <quote>(a)(4) or (a)(7)</quote> and inserting <quote>(a)(4), (a)(7), or (a)(8)</quote>; and</text></clause><clause id="id5cac751538e7444e83923378a408603e"><enum>(ii)</enum><text>in subparagraph (B), by striking <quote>(a)(4), or (a)(7)</quote> and inserting <quote>(a)(4), (a)(7), or (a)(8)</quote>; and</text></clause></subparagraph><subparagraph id="idfa91cbd0046849598cefe2aec487d291"><enum>(C)</enum><text>in paragraph (4)—</text><clause id="iddbca959b8ced44e1b9ba8de9a71da113"><enum>(i)</enum><text>in subparagraph (C)(i), by striking <quote>or an attempt to commit an offense</quote>; and</text></clause><clause id="idd7b793ff8c9747eb8cb47e957d128a25"><enum>(ii)</enum><text>in subparagraph (D), by striking clause (ii) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id41334cb2b475452d862c61004ab7eb71"><clause id="id54cc1907a5b94fcc996fe30f285be4ac"><enum>(ii)</enum><text>an offense, or an attempt to commit an offense, under subsection (a)(6);</text></clause><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph></paragraph><paragraph id="id144fea373d6341769f1ab2f97c02fecb"><enum>(3)</enum><text>in subsection (e)—</text><subparagraph id="id1e1abee36d0742a9bc80d2e3c1640807"><enum>(A)</enum><text>by striking paragraph (6) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idf8eadc3dd6fb4ebea751155493b3eda2"><paragraph id="id9e2ac13118384cf3a7018b75012c7df3"><enum>(6)</enum><text>the term <term>exceeds authorized access</term> means—</text><subparagraph id="id03a6330f5d904f459f2d12332b4917ba"><enum>(A)</enum><clause commented="no" display-inline="yes-display-inline" id="id8fad8756c32847da9856314ecd28b23b"><enum>(i)</enum><text>to access a computer with authorization and thereby to knowingly obtain information from such computer that the accessor is not entitled to obtain; or</text></clause><clause id="id0420249891294874abb0abc7ca5da425" indent="up1"><enum>(ii)</enum><text>to knowingly obtain any information from such computer for a purpose that is prohibited by the computer owner; and</text></clause></subparagraph><subparagraph id="idca0e2c4291e84cf097afe2217a26633c"><enum>(B)</enum><text>provided that the limitation on access to or use of the information is not based solely on the terms governing use of an online service by customers or subscribers thereof, including terms set forth in an acceptable use policy or terms of service;</text></subparagraph></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="id1cd9c69e8c804b80bf9a530645ef8d04"><enum>(B)</enum><text>by striking paragraph (10);</text></subparagraph><subparagraph id="ida8e0b3e2b3b24b2182c757ee33bcf7e7"><enum>(C)</enum><text>by redesignating paragraphs (11) and (12) as paragraphs (10) and (11), respectively;</text></subparagraph><subparagraph id="idbed36676ff58484e83b0ef4f83ef7bd3"><enum>(D)</enum><text>in paragraph (10), as so redesignated, by striking <quote>and</quote>;</text></subparagraph><subparagraph id="idde65a501aa74487c93b376da1a57bdb1"><enum>(E)</enum><text>in paragraph (11), as so redesignated, by striking the period at the end and inserting a semicolon; and</text></subparagraph><subparagraph id="idfffddd4af4ed49009de877a5057c6d33"><enum>(F)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1b72b98275124a03b9c9763bf0f98ace"><paragraph id="id1715cf2969344f08a9ed2d0ead1a3c55"><enum>(12)</enum><text>the term <term>online service</term>—</text><subparagraph id="id30413fb4801e4986ab01594483ff383e"><enum>(A)</enum><text>means an electronic communication service (as defined in section 2510) to the public, a remote computing service (as defined in section 2711), or other service that provides content or computing services to the public over the Internet; and</text></subparagraph><subparagraph id="idb93b2f738ebf4053a5665669eba55ba3"><enum>(B)</enum><text>does not include an enterprise service;</text></subparagraph></paragraph><paragraph id="idf4ffa7cf74f54b28910eff3cb73d5951"><enum>(13)</enum><text>the term <term>enterprise service</term> means any electronic communication service (as defined in section 2510) to the public, remote computing service (as defined in section 2711), or other service that provides content or computing services to the public for which the user, customer, or subscriber has paid, or on whose behalf has been paid, more than $10,000 in a calendar year in exchange for the right to access or use the service; and</text></paragraph><paragraph id="idd349a8aac65249b89e59c6dce70fe82f"><enum>(14)</enum><text>the term <term>traffic</term>, except as provided in subsection (a)(6), means transfer, or otherwise dispose of, to another as consideration for the receipt of, or as consideration for a promise or agreement to pay, anything of pecuniary value.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id9aa0ed6964f845278e1393ca2e195385"><enum>(4)</enum><text>in subsection (g), in the first sentence, by inserting <quote>, except for a violation of subsection (a)(6),</quote> after <quote>of this section</quote>; and</text></paragraph><paragraph id="id34150191f2334a4c9b2e5c10c874f561"><enum>(5)</enum><text>by striking subsections (i) and (j) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idcfcf5c591b3a4b74a5e70f9d4069575f"><subsection id="id2d9c3541223e4de988c3151865544681"><enum>(i)</enum><header>Criminal forfeiture</header><paragraph id="ide520b0a7d2094c07b37d422bd9633c30"><enum>(1)</enum><header>In general</header><text>The court, in imposing a sentence on any person convicted of a violation of this section, or convicted of conspiracy to violate this section, shall order, in addition to any other sentence imposed and irrespective of any provision of State law, that such person forfeit to the United States—</text><subparagraph id="id85f1a2053f13499b9f1b467613aeda38"><enum>(A)</enum><text>such person’s interest in any property, real or personal, that was used or intended to be used to commit or to facilitate the commission of such violation; and</text></subparagraph><subparagraph id="id92a55e25f806433fba5c8e23796c78a2"><enum>(B)</enum><text>any property, real or personal, constituting or derived from any gross proceeds, or any property traceable to such property, that such person obtained or retained, directly or indirectly, as a result of such violation.</text></subparagraph></paragraph><paragraph id="id21ca9032f2bb4a8ba77b02e8688de369"><enum>(2)</enum><header>Forfeiture procedures</header><text>Pursuant to section 2461(c) of title 28, the provisions of section 413 of the Controlled Substances Act (<external-xref legal-doc="usc" parsable-cite="usc/21/853">21 U.S.C. 853</external-xref>), other than subsection (d) thereof, shall apply to criminal forfeitures under this subsection.</text></paragraph></subsection><subsection id="id37f06452d20e42b8975f9a583bca6d18"><enum>(j)</enum><header>Civil forfeiture</header><paragraph id="idd0e1a2e992164d9c9e413416c5133ade"><enum>(1)</enum><header>In general</header><text>The following shall be subject to forfeiture to the United States in accordance with chapter 46, and no property right shall exist in them:</text><subparagraph id="idf230b3b701714382935a1c0b4fbba8be"><enum>(A)</enum><text>Any property, real or personal, used or intended to be used, in any manner—</text><clause id="id340B690A46AF4AB6B26C4E47C9234028"><enum>(i)</enum><text>to commit, or facilitate the commission of, a violation of this section; or</text></clause><clause id="id4A5E24E82AA14C8099A4FBEA1EF9BD44"><enum>(ii)</enum><text>in a conspiracy to violate this section.</text></clause></subparagraph><subparagraph id="idf6544cf326904f62ab847dd5b66ba321"><enum>(B)</enum><text>Any property, real or personal, constituting or traceable to the gross proceeds taken, obtained, or retained in connection with or as a result of—</text><clause id="id574A87BF13FD454C81C38B840A89C946"><enum>(i)</enum><text>a violation of this section; or</text></clause><clause id="idD56D4FCC15AD4624991531F2F41B902A"><enum>(ii)</enum><text>a conspiracy to violate this section.</text></clause></subparagraph></paragraph><paragraph id="id75ffaaa980c944deb036e48fee3d99ca"><enum>(2)</enum><header>Forfeiture procedures</header><text>Seizures and forfeitures under this subsection shall be governed by the provisions of chapter 46 that apply to civil forfeitures, except that such duties as are imposed on the Secretary of the Treasury under the customs laws described in section 981(d) shall be performed by such officers, agents, and other persons as may be designated for that purpose by the Secretary of Homeland Security or the Attorney General.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idb78c639574494ae6b932906fba56a898"><enum>(b)</enum><header>Technical and conforming amendment</header><text><external-xref legal-doc="usc" parsable-cite="usc/26/7431">Section 7431(e)(3)</external-xref> of the Internal Revenue Code of 1986 is amended by striking <quote>subparagraph (B)</quote> and inserting <quote>subparagraph (B)(iii)</quote>.</text></subsection></section></title><title id="id5C53A02CE57A40C8BFF72A9B2553F34F" style="OLC"><enum>IV</enum><header>Espionage, theft of trade secrets, and improper interference in United States elections</header><section id="id60A18F16F19D40A187AA1A8C39686589"><enum>401.</enum><header>Espionage, theft of trade secrets, theft of intellectual property, involvement in commercial fraud schemes, and improper interference in United States elections</header><subsection id="idF0E39BC927CE495B96E3BC84343F65C2"><enum>(a)</enum><header>Definitions</header><text>Section 101(a) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1101">8 U.S.C. 1101(a)</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idBA39856908A74C60AB627C9034B8FFDA"><paragraph id="id1D15C9469E5F4E02B056CA0ABB206FC8"><enum>(53)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="idAA3E610AE4CD477EB6FB934E91ED4BEC"><enum>(A)</enum><text>The term <term>espionage</term> means conduct—</text><clause id="id98CF22AA868042A19C281DE23222D5B7" indent="up1"><enum>(i)</enum><text>in violation of—</text><subclause id="id2FE29E9C638A44D88DC4F8623206A0BC"><enum>(I)</enum><text>the Act of June 15, 1917 (40 Stat. 217, chapter 30) (commonly known as the <quote>Espionage Act of 1917</quote>);</text></subclause><subclause id="idDF6402420C8E46D7B29A7DF1F13C30B2"><enum>(II)</enum><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/90">chapter 90</external-xref> of title 18, United States Code (commonly known as the <quote>Economic Espionage Act of 1996</quote>); or</text></subclause><subclause id="id68FA4B2EE8174676BF78287E29A4544E"><enum>(III)</enum><text>any other Federal criminal law relating to an activity described in clause (ii); or</text></subclause></clause><clause id="id7D29602C6F9F48989AF1487E043D7F4F" indent="up1"><enum>(ii)</enum><subclause commented="no" display-inline="yes-display-inline" id="idA8557648D5034F67A59D6B579A4C63A5"><enum>(I)</enum><text>by an alien who is under the direction of—</text><item id="id8E973103941E4D8A9BCD46377749086B" indent="up1"><enum>(aa)</enum><text>a foreign government; or</text></item><item indent="up1" id="id761CD5005D854960B173DD758ECE8656"><enum>(bb)</enum><text>an intermediary individual or entity that seeks to serve, support, or benefit a foreign government; and</text></item></subclause><subclause id="id83BC427BE5034607BDCBCC28B5E505EA" indent="up1"><enum>(II)</enum><text>with respect to confidential information, that constitutes—</text><item id="id037E813B73C04BF0B31835B8AB339F48"><enum>(aa)</enum><text>stealing or, without authorization, appropriating, taking, carrying away, concealing, or, by fraud, artifice, or deception, obtaining such information;</text></item><item id="idB4469C2B11F34E859471A00319675605"><enum>(bb)</enum><text>without authorization, copying, duplicating, sketching, drawing, photographing, downloading, uploading, altering, destroying, photocopying, replicating, transmitting, delivering, sending, mailing, communicating, or conveying such information; or</text></item><item id="id374D8FC7C9FE4091AF49C60868138567"><enum>(cc)</enum><text>receiving, buying, or possessing such information, knowing that the information has been stolen or appropriated, obtained, or converted without authorization.</text></item></subclause></clause></subparagraph><subparagraph id="id4305158B91514ACC80D1AAED66024C8E" indent="up1"><enum>(B)</enum><text>The term <term>espionage</term> includes economic espionage.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idB9A0C55BE9424A10A456B6BF022F99F8"><enum>(54)</enum><text display-inline="yes-display-inline">The term <term>improper interference in a United States election</term> means conduct by an alien that—</text><subparagraph commented="no" display-inline="no-display-inline" id="id4111AEF174C746AABAC898552B2CCC0D"><enum>(A)</enum><clause commented="no" display-inline="yes-display-inline" id="id659EC374BA02480981EC036949BC2748"><enum>(i)</enum><text display-inline="yes-display-inline">violates Federal criminal, voting rights, or campaign finance law; or</text></clause><clause commented="no" display-inline="no-display-inline" id="id562B5960C4884C01B52F2255100DC2A0" indent="up1"><enum>(ii)</enum><text display-inline="yes-display-inline">is under the direction of—</text><subclause commented="no" id="id4AFA61F05C1F44D3AF9454845E0B8133"><enum>(I)</enum><text>a foreign government; or</text></subclause><subclause commented="no" id="id6492632BEA064EE0B2066A3D8935C12E"><enum>(II)</enum><text>an intermediary individual or entity that seeks to serve, support, or benefit a foreign government; and</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id59C2BC7603CB44509D419A276FFFA34E"><enum>(B)</enum><text display-inline="yes-display-inline">interferes with a general or primary Federal, State, or local election or caucus, including—</text><clause commented="no" display-inline="no-display-inline" id="idB750A151D2704CF69E8E8209DC128DB1"><enum>(i)</enum><text display-inline="yes-display-inline">the campaign of a candidate; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idA60110D4DA9944D2890F7DB4AC670712"><enum>(ii)</enum><text display-inline="yes-display-inline">a ballot measure, including—</text><subclause commented="no" display-inline="no-display-inline" id="id3A4014B2DA88430087F2A2DF3CF0387B"><enum>(I)</enum><text display-inline="yes-display-inline">an amendment;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idAE50E7AED8534D9290E062AFEE8FF92B"><enum>(II)</enum><text display-inline="yes-display-inline">a bond issue;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id2E91A94D079E412DAA4A2E729BA19291"><enum>(III)</enum><text display-inline="yes-display-inline">an initiative;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id7020A8B3FA23428CAD5457BF3809377F"><enum>(IV)</enum><text display-inline="yes-display-inline">a recall;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idABFD916C6A4145FBA157EBAB3A1AF907"><enum>(V)</enum><text display-inline="yes-display-inline">a referral; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id66B384597C614343B193209CCF8E16BC"><enum>(VI)</enum><text display-inline="yes-display-inline">a referendum. </text></subclause></clause></subparagraph></paragraph><paragraph id="id0563EDE08C43463D913373F8CDEA2845"><enum>(55)</enum><text>The term <term>theft of a trade secret</term> means conduct—</text><subparagraph id="idAA7EFC3B4B3248F58CC2D08C14C663F6"><enum>(A)</enum><text>in violation of—</text><clause id="id364E8587882F41619655B5B6F0BF153E"><enum>(i)</enum><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/90">chapter 90</external-xref> of title 18, United States Code (commonly known as the <quote>Economic Espionage Act of 1996</quote>); or</text></clause><clause commented="no" display-inline="no-display-inline" id="id8AB549654C314C008A3C9C7D81F1B1C5"><enum>(ii)</enum><text>any other Federal criminal law relating to an activity described in subparagraph (B); or</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idD1DCC3DEE65849448A9CF2BE4F171BBD"><enum>(B)</enum><clause commented="no" display-inline="yes-display-inline" id="idBB6EB817444242C98F1DFB27A03456CB"><enum>(i)</enum><text>by an alien who is under the direction of—</text><subclause commented="no" display-inline="no-display-inline" indent="up1" id="idF90FE53513C44E6A90181691D09C0ED1"><enum>(I)</enum><text>a foreign government; or</text></subclause><subclause commented="no" display-inline="no-display-inline" indent="up1" id="id033242877A3649A3952BEB66F6CE82A2"><enum>(II)</enum><text>an intermediary individual or entity that seeks to serve, support, or benefit a foreign government; and </text></subclause></clause><clause commented="no" display-inline="no-display-inline" id="id634E0AA0D7964118B164B34C0C81D16C" indent="up1"><enum>(ii)</enum><text>with respect to a trade secret relating to a product or service used or intended for use in interstate or foreign commerce, that constitutes—</text><subclause id="idDDDC7842F3794128A63FEE8940A1C7F8"><enum>(I)</enum><text>stealing or, without authorization, appropriating, taking, carrying away, concealing, or, by fraud, artifice, or deception, obtaining such trade secret for the economic benefit of any person other than the owner of the trade secret;</text></subclause><subclause id="id22BCC918562843B0802FDFE024CB5B7B"><enum>(II)</enum><text>without authorization, copying, duplicating, sketching, drawing, photographing, downloading, uploading, altering, destroying, photocopying, replicating, transmitting, delivering, sending, mailing, communicating, or conveying such trade secret; or</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id52C0C820A10B41BF8B19179D8BAB7F73"><enum>(III)</enum><text>receiving, buying, or possessing such trade secret, knowing that the trade secret has been stolen or appropriated, obtained, or converted without authorization.</text></subclause></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idF153039BDC82463EB57DD7BADD3935FF"><enum>(b)</enum><header>Inadmissibility</header><text display-inline="yes-display-inline">Section 212(a)(3) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1182">8 U.S.C. 1182(a)(3)</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idBCB40C4B0D92450ABE648DD6CA8DFC4C"><subparagraph commented="no" display-inline="no-display-inline" id="id94B8F77D6D2E4531AA504C6E5A1BBDF8"><enum>(H)</enum><header>Espionage and theft of trade secrets</header><text>An alien is inadmissible if a consular officer, the Secretary of Homeland Security, the Secretary of State, or the Attorney General knows, or has reasonable grounds to believe—</text><clause commented="no" display-inline="no-display-inline" id="id648EDE8BB373456080AB7E71DD9C224E"><enum>(i)</enum><text>the alien is seeking admission or sought admission to the United States to engage in espionage or theft of a trade secret; </text></clause><clause commented="no" display-inline="no-display-inline" id="id33AB667ECB8E4F0398D2DA1311EA8D76"><enum>(ii)</enum><text>the alien has engaged or intends to engage in espionage or theft of a trade secret; or</text></clause><clause commented="no" display-inline="no-display-inline" id="id3242D67A8A17436194A3B979E50DA5BB"><enum>(iii)</enum><text>the affiliation or activities of the alien with, or the control of the alien by, an individual, an entity, or a funding mechanism known or reasonably believed to be engaged in, or to have the intention of engaging in, espionage or theft of a trade secret.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id74B09B8CD7804777A43769A2CD5C95C4"><enum>(I)</enum><header display-inline="yes-display-inline">Improper interference in a United States election</header><text display-inline="yes-display-inline">Any alien who a consular officer, the Secretary of Homeland Security, the Secretary of State, or the Attorney General knows, or has reasonable grounds to believe, is seeking admission to the United States to engage in improper interference in a United States election, or who has engaged in improper interference in a United States election, is inadmissible.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id82F6F0854A9641498FD38F432F911D9A"><enum>(c)</enum><header>Deportability</header><text>Section 237(a) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1227">8 U.S.C. 1227(a)</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idAB6F61977B3141C6A784D1A4B54F071C"><paragraph id="id499482A0DAC44FBCB3406EFA652EDD28"><enum>(8)</enum><header>Espionage and theft of trade secrets</header><text>Any alien who has engaged, is engaged, or at any time after admission engages in espionage or theft of a trade secret is deportable.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8358108345A8462B848FC33107218A02"><enum>(9)</enum><header display-inline="yes-display-inline">Improper interference in a United States election</header><text display-inline="yes-display-inline">Any alien who has engaged, is engaged, or at any time after admission engages in improper interference in a United States election is deportable.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id69B7E93EEA5E4398BA24FE7BE430A6EB"><enum>402.</enum><header>Visa and nonimmigrant status restrictions</header><subsection id="ide4dcbddcadba477583ff8322209519d5"><enum>(a)</enum><header>Period of authorized stay for certain citizens and nationals of the People's Republic of China</header><text>Section 214(a)(2) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1184">8 U.S.C. 1184(a)(2)</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id38530C552E814DE9A2AA26FDA3432959"><subparagraph id="id7d56a97d40464fd78ec0250d9abfb470" indent="up1"><enum>(C)</enum><clause commented="no" display-inline="yes-display-inline" id="id9C3C2F9D5B8649BC819AF55008311252"><enum>(i)</enum><text>The period of authorized stay for a citizen or national of the People's Republic of China who seeks admission to the United States as a nonimmigrant described in subparagraph (F), (J), or (M) of section 101(a)(15) to study, research, teach, or work in any field described in the most recent technology alert list of the Department of State or in section 221(j)(1)—</text><subclause indent="up1" id="idBC07753719C445D28F561F792BFE8105"><enum>(I)</enum><text>shall be—</text><item id="id9EFC5C61818D488BAB62A08E339EE364"><enum>(aa)</enum><text>a fixed period of not more than 4 years; or</text></item><item id="id50C60FCAD37E49ED8838DEA3061527D1"><enum>(bb)</enum><text>the length of the program identified on the Form I–20, Certificate of Eligibility for Nonimmigrant Student Status, or the Form DS–2019, Certificate of Eligibility for Exchange Visitor Status, as applicable, of such citizen or national of the People's Republic of China; and</text></item></subclause><subclause indent="up1" id="id6585AAC7AB734568AB9DCEC96852153A"><enum>(II)</enum><text>may be extended by the Secretary of Homeland Security for 1 or more additional periods of not more than 2 years.</text></subclause></clause><clause indent="up1" id="id6E6C2584BE1A4EFD81679181CAEE7D6E"><enum>(ii)</enum><text>This subparagraph shall not apply to any national of Hong Kong or Macau.</text></clause></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idae0f5bd63c304c60b2a645fd9b317d82"><enum>(b)</enum><header>Prohibition on issuance of visas to certain citizens and nationals of the People's Republic of China</header><text>Section 221 of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1201">8 U.S.C. 1201</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id58be2d8202b44a8c8e014beb7dfd0ea7"><subsection id="ide4cd7d831cf148709704498b8811d20e"><enum>(j)</enum><header>Prohibition on issuance of visas to certain citizens and nationals of the People's Republic of China</header><paragraph id="id1EA5E084930E4156B68382C9D51F2ED2"><enum>(1)</enum><header>In general</header><text>The Secretary of State shall deny a visa to, and the Secretary of Homeland Security shall not admit into the United States, or grant a change of nonimmigrant status to, an alien who is a citizen or national of the People's Republic of China if the Secretary of State or the Secretary of Homeland Security determines that the alien—</text><subparagraph id="id976ACA444D454C2E82B9AB269A419C98"><enum>(A)</enum><text>presents a risk to national security; or</text></subparagraph><subparagraph id="id004DB3E884E044F1BC1FEE0CF281F498"><enum>(B)</enum><text>otherwise seeks to enter the United States to participate in graduate-level coursework or research at an institution of higher education (as defined in section 101(a) of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001(a)</external-xref>)) in a field described in paragraph (2).</text></subparagraph></paragraph><paragraph id="idF72F7503CCBB49468B6E2014EC0CF5E1"><enum>(2)</enum><header>Fields described</header><text>The fields described in this paragraph are—</text><subparagraph id="id42f90e6595c34129a2a53b1334002149"><enum>(A)</enum><text>the military or intelligence sector;</text></subparagraph><subparagraph id="idC1FD7F5A37274596B073C852FEC7F0EA"><enum>(B)</enum><text>the energy sector;</text></subparagraph><subparagraph id="id137ee201da1a43daa019bc77da3a768f"><enum>(C)</enum><text>nuclear science or nuclear engineering;</text></subparagraph><subparagraph id="id6f52905957da4938825fcd05248572ac"><enum>(D)</enum><text>high-end numerical control machinery and robotics;</text></subparagraph><subparagraph id="idFAD888625F414B0BBCF42EB43818A5E9"><enum>(E)</enum><text>autonomous systems or machine learning;</text></subparagraph><subparagraph id="id896ce2bbe5594055af7499fdf37fc599"><enum>(F)</enum><text>artificial intelligence;</text></subparagraph><subparagraph id="id55408e9eb9924b4182e6562ae87d161b"><enum>(G)</enum><text>production and application of high-performance medical devices;</text></subparagraph><subparagraph id="idf4d945526db846589a055d50d26c44f9"><enum>(H)</enum><text>semiconductors;</text></subparagraph><subparagraph id="id1a29f9bdce554fee937852bb0e6b126a"><enum>(I)</enum><text>new energy vehicles;</text></subparagraph><subparagraph id="id18ec22a1c8404c51b8c6612c3f1c76a3"><enum>(J)</enum><text>mobile phone technology;</text></subparagraph><subparagraph id="id919265a4ef124cf694674b25a41f2ba5"><enum>(K)</enum><text>next-generation information technology;</text></subparagraph><subparagraph id="idfe1f55e963874f5781e954d18355386f"><enum>(L)</enum><text>aviation, aeronautics, or space;</text></subparagraph><subparagraph id="id69317f948d0943439398e03fb1994ea4"><enum>(M)</enum><text>biomedicine; and</text></subparagraph><subparagraph id="id37894334d0174e1387b06dc08b9d59ae"><enum>(N)</enum><text>any related field, as determined by the Secretary of State or the Secretary of Homeland Security.</text></subparagraph></paragraph><paragraph id="idE405D2E385D646E38297747950425B49"><enum>(3)</enum><header>Termination of status</header><subparagraph id="idFA24A016CA1B4804A32060A818363180"><enum>(A)</enum><header>In general</header><text>With respect to an alien who is a citizen or national of the People's Republic of China who has been admitted to the United States as a nonimmigrant described in subparagraph (F), (J), or (M) of section 101(a)(15), the Secretary of Homeland Security shall terminate the status and employment authorization of, and revoke any petition approval of or on behalf of, the alien if the Secretary determines that after such admission the alien—</text><clause id="id3FF1366A239540888FBED9B1371B2515"><enum>(i)</enum><text>has engaged in an activity or affiliation that presents a risk to national security; or</text></clause><clause id="idB9BA2966FCBA4FEFBB2AC64C7233FA7B"><enum>(ii)</enum><text>has changed his or her program, course of study, research, or employment to graduate-level coursework or research at an institution of higher education in a field described in paragraph (2). </text></clause></subparagraph><subparagraph id="idABCC4D0E2C2347D5B4CF21B6D8E04D1B"><enum>(B)</enum><header>Failure to maintain nonimmigrant status</header><text>Any change or attempted change described in subparagraph (A) shall be considered to be a failure to maintain nonimmigrant status under this Act.</text></subparagraph></paragraph><paragraph id="idEAC00DA9FDAE49C89DE9F5731A09715D"><enum>(4)</enum><header>Inapplicability to nationals of Hong Kong and Macau</header><text>This subsection shall not apply to any national of Hong Kong or Macau.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id497808bfee7f41259a36b92b0f35f83d"><enum>(c)</enum><header>Applicability</header><text>The amendments made by this section shall apply with respect to—</text><paragraph id="ide89118fe13d041c6bf83af802ed70250"><enum>(1)</enum><text>any visa application filed on or after the date of the enactment of this Act; and</text></paragraph><paragraph id="ide257f80962024ec0add451ba54dccc80"><enum>(2)</enum><text>the status of any alien, except for a national of Hong Kong or Macau, who—</text><subparagraph id="id6D64FE4DB0CB4BD799A341BF0091A28E"><enum>(A)</enum><text>is a citizen or national of the People's Republic of China, regardless of the country of the passport presented by, or the country of residence of, the alien;</text></subparagraph><subparagraph id="idE13D7EFE94884CFA87BBA550ACF868B8"><enum>(B)</enum><text>before, on, or after the date of the enactment of this Act, has been or is admitted to the United States as a nonimmigrant described in subparagraph (F), (J), or (M) of section 101(a)(15) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1101">8 U.S.C. 1101(a)(15)</external-xref>); and</text></subparagraph><subparagraph id="idE2795810E6794307A07864A04C0864F0"><enum>(C)</enum><text>has changed or changes his or her program, course of study, research, or employment to graduate-level coursework or research at an institution of higher education (as defined in section 101(a) of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001(a)</external-xref>)) in a field described in section 221(j)(1) of the Immigration and Nationality Act (as added by subsection (b)). </text></subparagraph></paragraph></subsection></section></title><title id="idb980e9f4e2f34f12b85c411c9643f3ac"><enum>V</enum><header>Government-funded research projects</header><section id="idc0587b323a8a4e5b9c912da8d8daeca8"><enum>501.</enum><header>Findings</header><text display-inline="no-display-inline"> Congress find the following:</text><paragraph id="id8ed62923e78e42d0b59d469ad202abf7"><enum>(1)</enum><text>The People’s Republic of China (referred to in this subsection as <quote>the PRC</quote> or <quote>China</quote>) poses an existential threat to the economic interests and national security of the United States, in part due to the continued efforts of the PRC to steal sensitive technology and proprietary information from companies, academic institutions, and other organizations of the United States through economic espionage and other forms of nontraditional espionage.</text></paragraph><paragraph id="id6a3cfaf7837548eb8110218a04dfd59e"><enum>(2)</enum><text>The PRC, through the Chinese Communist Party (referred to in this subsection as the <quote>CCP</quote>), has long had an interest in replacing the United States as the world’s foremost superpower. China takes a holistic approach towards achieving its long-term goals, which are rooted in the concept of a comprehensive national power, including achieving dominance in economics, military affairs, science and technology, education, and global influence.</text></paragraph><paragraph commented="no" id="idec13bc184ba4483eb0f672bc861885c6"><enum>(3)</enum><text>Nontraditional forms of espionage serve as primary tools to further the goals of the CCP. Those tools include talent recruitment programs designed to recruit Chinese nationals to acquire knowledge about—and, often, steal—valuable and sensitive research at universities and research institutions abroad, and to lure foreign experts to China to work on key strategic programs. More broadly, the PRC uses mergers and acquisitions or joint ventures as a means to gain access to high-level technology, uses cyber intrusions to steal information, and uses front companies for PRC-related entities to acquire export-controlled technology.</text></paragraph><paragraph id="id5fb0ecd9cb3d4d4a8cfe8e0b4601fd24"><enum>(4)</enum><text>In 2015, President Xi Jinping of the PRC released the <quote>Made in China 2025</quote> initiative, a 10-year plan to update the manufacturing base of China by developing the following 10 high-tech industries:</text><subparagraph id="id10FAFD867573463BA875D2F2DBD87FDC"><enum>(A)</enum><text>Electric cars and other new energy vehicles.</text></subparagraph><subparagraph id="id9C5AFFB32EEF4E5292D195E592E4215A"><enum>(B)</enum><text>Next-generation information technology and telecommunications.</text></subparagraph><subparagraph id="id107A272F4C2A4F44A4C3DDBFBBB7995B"><enum>(C)</enum><text>Advanced robotics and artificial intelligence.</text></subparagraph><subparagraph id="idFC6C0234C1484E2482F468AB984CE0FF"><enum>(D)</enum><text>Aerospace equipment.</text></subparagraph><subparagraph id="id52213F40ADD24DD180EC6B6BFEDFD201"><enum>(E)</enum><text>Bio-medicine and high-end medical equipment.</text></subparagraph><subparagraph id="id16F6F2BA53CE4E478DDFF28FD83D5020"><enum>(F)</enum><text>Ocean engineering equipment and high-end vessels.</text></subparagraph><subparagraph id="idE980BF85646E41928AFE4B5140A7C55F"><enum>(G)</enum><text>High-end rail transportation equipment.</text></subparagraph><subparagraph id="idBDE5214E726444FE8BBC8CCBF6F0098F"><enum>(H)</enum><text>Electrical equipment.</text></subparagraph><subparagraph id="id2103B6B9ED984298B700CA3488414DAB"><enum>(I)</enum><text>Farming machines.</text></subparagraph><subparagraph id="id65812E2C5B1B4867B82C5E6EDBB0FB29"><enum>(J)</enum><text>New materials, such as polymers.</text></subparagraph></paragraph><paragraph id="id25813b3eb0e8445fa49e06076fdd5e7b"><enum>(5)</enum><text>In attempting to overtake the United States and achieve its Made in China 2025 goals, China has systematically sought to identify areas of American innovation, education, and technology that could be replicated, stolen, or appropriated.</text></paragraph><paragraph id="id98d96f9e808a4151bb30850bf8492365"><enum>(6)</enum><text>The very nature of the open society of the United States—a free market economy that incentivizes creativity and ingenuity and promotes the free flow of capital and ideas, a higher education system and scientific research community that encourages collaboration domestically and internationally, and a liberal democratic government that lacks a top-down, authoritarian structure—creates opportunities for the PRC to target the United States in ways that are either not adequately protected or not even anticipated as possible threats.</text></paragraph><paragraph id="id76117f1c9a174fed983d3137d2a977d4"><enum>(7)</enum><text>The Director of the Federal Bureau of Investigation has assessed that <quote>there’s no country that’s even close</quote> to the PRC when it comes to foreign espionage, in traditional or nontraditional forms.</text></paragraph><paragraph id="id7ada5965935448529b1b28f8195863e1"><enum>(8)</enum><text>As the 2018 Foreign Economic Espionage in Cyberspace report of the National Counterintelligence and Security Center (commonly known as the <quote>NCSC</quote>) stated, China has expansive efforts in place to acquire United States technology, including sensitive trade secrets and proprietary information. China continues to use cyber espionage to support its strategic development goals—science and technology advancement, military modernization, and economic policy objectives. Chinese companies and individuals often acquire United States technology for commercial and scientific purposes.</text></paragraph><paragraph id="id8fb96a32e9df4fb6bb4400d3a5bf7e63"><enum>(9)</enum><text>In April 2020, the Office of the United States Trade Representative (referred to in this subsection as the <quote>USTR</quote>) issued its annual Special 301 Report, in which the USTR reviews the state of intellectual property protection and enforcement in trading partners of the United States around the world. The USTR continues to place China on the Priority Watch List, which reflects <quote>United States concerns with China’s system of pressuring and coercing technology transfer, and the continued need for fundamental structural changes to strengthen IP protection and enforcement, including as to trade secret theft, obstacles to protecting trademarks, online piracy and counterfeiting, the high-volume manufacturing and export of counterfeit goods, and impediments to pharmaceutical innovation.</quote>.</text></paragraph><paragraph id="id67891dbddc364cc1ad85a16caf8a00aa"><enum>(10)</enum><text>The theft of intellectual property, trade secrets, sensitive technology, and scientific and other academic research all contribute to China’s goal of achieving preeminent superpower status. China’s failure to respect intellectual property rights, failure to adhere to the rule of law, and efforts to obtain intellectual property, trade secrets, technology, and research through improper or illicit means all pose a significant economic and national security threat to the United States.</text></paragraph><paragraph id="id1ee1ed7e80d244a48941f229a48ab73b"><enum>(11)</enum><text>In recent years, China has increased its use of nontraditional espionage to target colleges and universities in the United States, particularly with respect to cutting edge research and technologies being developed by such universities, including technology that has military applications.</text></paragraph><paragraph id="id8dbdfb5b60eb43e891937176addeb922"><enum>(12)</enum><text>The universities of the United States provide fertile ground for nontraditional espionage given the open, international, and collaborative nature of most university research and the legitimate interest of universities in encouraging international collaboration.</text></paragraph><paragraph id="id98e97e35c6694dd4b563b41458f6ef4b"><enum>(13)</enum><text>While the United States benefits from attracting the top research talent from around the world, universities nevertheless must take appropriate measures to ensure that China is not able to use academic collaboration to steal United States intellectual property or engage in other activities that might harm the national security of the United States.</text></paragraph><paragraph id="idb5bd1081e222421fa25dd659f47a0129"><enum>(14)</enum><text>In response to the increased wave of nontraditional espionage over recent years, the Department of Justice launched a China Initiative in 2018. The goal of the China Initiative is to identify and prosecute individuals and entities engaged in economic and other nontraditional espionage, trade secret theft, hacking, and other crimes, while protecting critical infrastructure against external threats and combating covert efforts to influence the American public.</text></paragraph><paragraph id="id89255723e5ba42dd9f88a4f14c1ef0e1"><enum>(15)</enum><text>Several recent criminal and civil enforcement actions taken by the Department of Justice highlight China’s pervasive and illegal targeting of intellectual property and valuable research from United States universities, including the following:</text><subparagraph id="idb16ac029bbbe4f559b378b587949b7da"><enum>(A)</enum><text>Dr. Qing Wang was a former employee of the Cleveland Clinic Foundation. He had received more than $3,000,000 in grant funding from the National Institutes of Health (commonly known as <quote>NIH</quote>). Dr. Wang was charged in a criminal complaint with knowingly failing to disclose to NIH that he was Dean of the College of Life Sciences and Technology at the Huazhong University of Science and Technology (referred to in this subparagraph as <quote>HUST</quote>) and received grant funds from the National Natural Science Foundation of China for some of the same scientific research funded by NIH. Dr. Wang also allegedly participated in the Thousand Talents Program, for which China provided $3,000,000 in research support to enhance the facilities and operations at HUST. Federal law enforcement agencies arrested Dr. Wang in May 2020.</text></subparagraph><subparagraph id="id3ea6a5ac9be64d298f315a4e050d20fa"><enum>(B)</enum><text>Dr. James Patrick Lewis was a tenured professor at West Virginia University in the physics department from 2006 to 2019. In July 2017, Dr. Lewis entered into a contract of employment with the PRC through its Global Experts Thousand Talents Plan. In March 2020, Dr. Lewis pled guilty to 1 count of Federal program fraud.</text></subparagraph><subparagraph id="id671bc6753e724eb48a874cfcfe604ccb"><enum>(C)</enum><text>Anming Hu, an Associate Professor in the Department of Mechanical, Aerospace, and Biomedical Engineering at the University of Tennessee, Knoxville (commonly known as <quote>UT</quote>), allegedly engaged in a scheme to defraud the National Aeronautics and Space Administration (commonly known as <quote>NASA</quote>) by concealing his affiliation with Beijing University of Technology (referred to in this subparagraph as <quote>BJUT</quote>). Hu’s false representations to UT about his affiliation with BJUT caused UT to falsely certify to NASA that UT was in compliance with Federal law. In February 2020, Mr. Hu was indicted on Federal charges of wire fraud and false statements.</text></subparagraph><subparagraph id="iddbff5f58fe914cafa9b07f5e0d4cd335"><enum>(D)</enum><text>Dr. Charles Lieber served as the Principal Investigator of the Lieber Research Group at Harvard University, which specialized in the area of nanoscience. Dr. Lieber had received more than $15,000,000 in grant funding from NIH and the Department of Defense since 2008. Unbeknownst to Harvard University, beginning in 2011, Lieber allegedly became a <quote>Strategic Scientist</quote> at Wuhan University of Technology in China (referred to in this subparagraph as <quote>WUT</quote>) and was a contractual participant in the Thousand Talents Plan from 2012 to 2017. Under the terms of the Thousand Talents contract, WUT paid Lieber $50,000 per month, paid him living expenses of up to approximately $158,000, and awarded him more than $1,500,000 to establish a research lab at WUT. In return, Lieber was obligated to work for WUT for 9 months per year. Lieber lied about his involvement with WUT to both Harvard University and Federal investigators. In January 2020, Lieber was arrested and charged with making a materially false, fictitious and fraudulent statement.</text></subparagraph><subparagraph id="id8708a80e547844caa4be35aef8675767"><enum>(E)</enum><text>In January 2020, Yanqing Ye, a Chinese national, Lieutenant of the People’s Liberation Army (referred to in this subparagraph as the <quote>PLA</quote>), and member of the CCP, was indicted on visa fraud, false statements, and acting as an agent of a foreign power without prior notification. Ye allegedly falsely identified as a student and lied about her ongoing military service at the National University of Defense Technology. While studying at Boston University’s Department of Physics, Chemistry, and Biomedical Engineering, Ye continued to work as a PLA Lieutenant and completed assignments from PLA officers, including conducting research, assessing United States military websites, and sending United States documents and information to China.</text></subparagraph><subparagraph id="id3236ad5798e84c9cbee277dc9ce910c1"><enum>(F)</enum><text>In January 2020, Zaoson Zheng, a Chinese national, was arrested at Logan Airport in Boston and charged with attempting to smuggle 21 vials of biological research to China. Zheng had allegedly entered the United States in 2018 on a J–1 visa and conducted cancer cell research at Beth Israel Deaconess Medical Center in Boston. Zheng admitted he stole the vials from a lab at Beth Israel, and that he intended to bring the vials to China, use them to conduct research in his own laboratory, and publish the results under his own name.</text></subparagraph><subparagraph id="idbcf592a5760e4497bf0fe329f8add191"><enum>(G)</enum><text>In December 2019, the Van Andel Research Institute (referred to in this subparagraph as <quote>VARI</quote>) reached a settlement with the Department of Justice to pay $5,500,000 to resolve allegations that it violated the law commonly known as the False Claims Act (section 3729 through 3733 of title 31, United States Code) by failing to disclose, in Federal grant applications and progress reports submitted to NIH, that the Chinese government funded 2 VARI researchers through grants. The VARI researchers were receiving research funding from Chinese sources while VARI was applying for and receiving NIH funding on their behalf.</text></subparagraph><subparagraph id="id8c884c909a9e4dcd9ee4aca12ea68a0a"><enum>(H)</enum><text>In September 2019, Yu Zhou and Li Chen were charged with crimes related to stealing exosome-related trade secrets. Zhou and Chen, spouses who worked in separate medical research labs at the Nationwide Children’s Hospital Research Institute, conspired to steal scientific trade secrets related to exosomes and exosome isolation from the Research Institute. The couple allegedly founded a company in China without the hospital’s knowledge. While employed at the Research Institute, they marketed products and services related to exosome isolation through their Chinese company. They also founded an American biotechnology company advertising products and services related to exosomes isolation, including a kit developed from a trade secret created at a Nationwide Children’s research lab. They eventually received more than $876,000 and stock related to an asset purchase agreement involving the American company.</text></subparagraph><subparagraph id="id5457dfc1f30d49ea9a80131c04ea10cc"><enum>(I)</enum><text>In August 2019, Feng Tao, an associate professor at Kansas University, was indicted on Federal charges for concealing the fact that he was a full-time employee for Fuzhou University in China while doing research at Kansas University funded by the United States Government. Tao allegedly defrauded the United States Government by unlawfully receiving Federal grant money at the same time that he was employed and paid by a Chinese research university.</text></subparagraph><subparagraph id="id828671b2724a46cb830013fab0d0d625"><enum>(J)</enum><text>Weiqiang Zhang, a Chinese national and United States legal permanent resident, acquired, without authorization, hundreds of rice seeds produced by his employer, Ventria Bioscience. Ventria is a Kansas biopharmaceutical research facility that develops genetically programmed rice to express recombinant human proteins, which are then extracted for use in the therapeutic and medical fields. Ventria spent millions of dollars and years of research developing its seeds and cost-effective methods to extract the proteins. Ventria used locked doors with magnetic card readers to restrict access to the temperature-controlled environment where the seeds were stored and processed. Zhang worked as a rice breeder for Ventria. In 2013, personnel from a crop research institute in China visited Zhang at his home in Kansas. Zhang drove the visitors to tour facilities in several States. United States Customs and Border Protection officers found seeds belonging to Ventria in the luggage of Zhang’s visitors as they prepared to leave the United States for China. In April 2018, Zhang was sentenced to 121 months in a Federal prison after having been convicted in February 2017 of 1 count of conspiracy to steal trade secrets, 1 count of conspiracy to commit interstate transportation of stolen property, and 1 count of interstate transportation of stolen property.</text></subparagraph></paragraph><paragraph id="idbaa69c673cca4a369ebd505cdd4c3e1a"><enum>(16)</enum><text>It remains a national security priority for the United States to protect the research and innovation developed in United States colleges and universities from misappropriation by any country, including the PRC.</text></paragraph></section><section id="idAE962E21515842D6BB2E65EC2838E1CF"><enum>502.</enum><header>Definitions</header><text display-inline="no-display-inline">In this title:</text><paragraph id="idf9aef0bf4fe84814874a9ed9ad61e466"><enum>(1)</enum><header>Agency head</header><text>The term <term>agency head</term>, with respect to a covered research project, means the head of the covered agency providing the funding for the covered research project. </text></paragraph><paragraph id="id172E4227A0E74B3BA128A21091478114"><enum>(2)</enum><header>Covered agency</header><text>The term <term>covered agency</term> means—</text><subparagraph id="id1b8011868e8a4a9ebb8f1adabcc86dc2"><enum>(A)</enum><text>the Department of Defense;</text></subparagraph><subparagraph id="id4640b416cca349bcb9bedbd9e13a6376"><enum>(B)</enum><text>the Department of Energy; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf30d9cb3f5df4c2982fe57ea514844fe"><enum>(C)</enum><text>an element of the intelligence community, as defined in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></subparagraph></paragraph><paragraph id="id548AA84AAC18457D992658CD0D082DB4"><enum>(3)</enum><header>Covered country</header><text>The term <term>covered country</term> means—</text><subparagraph id="id47F5431B93764C2D9024D7A9BDADA329"><enum>(A)</enum><text>the People’s Republic of China; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idCDF92098E2AA47DDA0147869D855E154"><enum>(B)</enum><text>any other country designated by the Director, based on findings similar to the findings under subsection (a), which shall include consideration of— </text><clause id="idf32bc002a9484974be6d19a320d19b9e"><enum>(i)</enum><text>whether the country poses an existential threat to the economic interests and national security of the United States;</text></clause><clause id="ida21766d00e904cb9997c75f41126e96e"><enum>(ii)</enum><text>whether the country engages in persistent efforts to steal sensitive technology and proprietary information from companies, academic institutions, and other organizations of the United States through economic espionage and other forms of nontraditional espionage;</text></clause><clause id="ida8745fc9383d404ba24662932f870fab"><enum>(iii)</enum><text>whether nontraditional forms of espionage serve as primary tools to further the goals of the country;</text></clause><clause id="id02f7bbf852b54e42b589e22f0255e9d2"><enum>(iv)</enum><text>whether the nontraditional forms of espionage described in clause (iii) include—</text><subclause id="id318e9b726f794f0190646bb52f842574"><enum>(I)</enum><text>talent recruitment programs designed to recruit the country’s nationals to acquire knowledge about—and, often, steal—valuable and sensitive research at universities and research institutions abroad;</text></subclause><subclause id="id970ac69cf7e54a7ab60d0ff6e7c83628"><enum>(II)</enum><text>luring foreign experts to the country to work on key strategic programs;</text></subclause><subclause id="idfcb49cdd98b74086b6181428edf42917"><enum>(III)</enum><text>using mergers and acquisitions or joint ventures as a means to gain access to high-level technology;</text></subclause><subclause id="idece03a70144d4881abd28463a2b510ed"><enum>(IV)</enum><text>using cyber intrusions to steal information; and</text></subclause><subclause id="id21836b6acd404595ba367af93b6dac23"><enum>(V)</enum><text>using front companies for state-affiliated entities to acquire export-controlled technology;</text></subclause></clause><clause id="id28a697a1acba46fc930aecd62fdd43dc"><enum>(v)</enum><text>whether the country has systematically sought to identify areas of United States innovation, education, and technology that could be replicated, stolen, or appropriated; and</text></clause><clause id="id30851136eeb944ea8894cde7bfa7dc22"><enum>(vi)</enum><text>whether the Office of the United States Trade Representative has placed the country on the Priority Watch List.</text></clause></subparagraph></paragraph><paragraph id="id4dbd4aa1e9d44264b97169809e30a640"><enum>(4)</enum><header>Covered person</header><text>The term <term>covered person</term> means an individual or institution of higher education that has a financial relationship with—</text><subparagraph id="id6c1236a88c31429d9d4f08afed6e2187"><enum>(A)</enum><text>a covered country;</text></subparagraph><subparagraph id="idf7861d663e1242f88f740b7438e41118"><enum>(B)</enum><text>a political party within a covered country;</text></subparagraph><subparagraph id="id88573924523d4938be5d7eeadc1e8953"><enum>(C)</enum><text>a person who acts as an agent, representative, employee, or servant of a covered country; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id90fba7bea9824403a14201cf4ac640d8"><enum>(D)</enum><text>a person who acts in any other capacity at the order or request, or under the direction or control, of a covered country.</text></subparagraph></paragraph><paragraph id="idd78e3b6f5ede48f7831a170d596f266d"><enum>(5)</enum><header>Covered research project</header><text>The term <term>covered research project</term> means a research project at an institution of higher education—</text><subparagraph id="id283C46173B98472DA6E64A088E897268"><enum>(A)</enum><text>that is funded in whole or in part by a covered agency; and</text></subparagraph><subparagraph id="idc6d4407982b74947ab03ed6c71557bfc"><enum>(B)</enum><text>the subject of which is—</text><clause id="id7a01e14ab4d14074a82ddb06ade12bcf"><enum>(i)</enum><text>an item subject to the Export Control Reform Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/20/4801">20 U.S.C. 4801</external-xref> et seq.);</text></clause><clause id="id8bce9edbd8db4d349f4ebac10632f23e"><enum>(ii)</enum><text>an item listed on the Commerce Control List (commonly known as the <quote>CCL</quote>) set forth in Supplement No. 1 to part 774 of title 15, Code of Federal Regulations; or</text></clause><clause id="idb0ae3f52f4a643e3ba8189dc2deccd87"><enum>(iii)</enum><text>an item listed on the United States Munitions List under section 38(a)(1) of the Arms Export Control Act (<external-xref legal-doc="usc" parsable-cite="usc/22/2778">22 U.S.C. 2778(a)(1)</external-xref>).</text></clause></subparagraph></paragraph><paragraph id="idB08BF2E1399849F9BF6EC0C9E77FC09D"><enum>(6)</enum><header>Director</header><text>The term <term>Director</term> means the Director of National Intelligence.</text></paragraph><paragraph id="idf45aaa9b6c2141a28b95739b4459520b"><enum>(7)</enum><header>Financial relationship</header><text>The term <term>financial relationship</term> means—</text><subparagraph id="idb3fefbbde0b941c3ad56585b85eac090"><enum>(A)</enum><text>any arrangement under which compensation is provided, directly or indirectly, by a covered country, or another entity or person described in subparagraph (B), (C), or (D) of paragraph (4), to—</text><clause id="id081e570d6b8c4b11a109be96c1239b3c"><enum>(i)</enum><text>a covered person; or</text></clause><clause id="ide8fafb4c999e41ef816a3a67e46db2d8"><enum>(ii)</enum><text>an institution of higher education; or</text></clause></subparagraph><subparagraph id="id83fea5019cba42e183778a4b89dc7f80"><enum>(B)</enum><text>any direct or indirect ownership or investment interest by a covered country, or another entity or person described in subparagraph (B), (C), or (D) of paragraph (4), in an institution of higher education.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id72A7D4246FB3473AB96E747B377270E9"><enum>(8)</enum><header>Institution of higher education</header><text>The term <term>institution of higher education</term> has the meaning given the term in section 101(a) of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001(a)</external-xref>).</text></paragraph></section><section id="id6AAF5EB12A8B4A398E44D328F3CFAFF2"><enum>503.</enum><header>Approval of covered persons in sensitive Government-funded research projects</header><subsection id="id6820B2C4ED6F4834A7407CB0B9C7910E"><enum>(a)</enum><header>Approval required</header><paragraph id="id5A224DA6FE1142A8BB78573A969A2DE1"><enum>(1)</enum><header>In general</header><text>A covered person may not participate in a covered research project unless the covered person applies for and receives approval from the agency head to participate.</text></paragraph><paragraph id="idFAD8E458189E4D46940C1A6E3B10CECF"><enum>(2)</enum><header>Requirements</header><text>An agency head may not approve a covered person to participate in a covered research project unless the agency head—</text><subparagraph id="idDF67E8F1C26E4A36A73D02D6325E077F"><enum>(A)</enum><text>performs a background check on the covered person in consultation with the Director; and</text></subparagraph><subparagraph id="id3A19F51FEBCD4D4B8BAE6FF9E602FAAF"><enum>(B)</enum><text>collects any other relevant information about the covered person that the agency head determines appropriate, except any information pertaining to United States persons that the agency head is prohibited by law from collecting.</text></subparagraph></paragraph></subsection><subsection id="id905938ca94bd4ff4a67621bc1920acab"><enum>(b)</enum><header>Penalty</header><text>If an agency head determines that a covered person participating in a covered research project commenced on the date of enactment of this section has violated subsection (a), the agency head may— </text><paragraph id="idabec3ad2f6054a57aa225591204d88bf"><enum>(1)</enum><text>impose a probationary period, not to exceed 6 months, on the head of the project or the project;</text></paragraph><paragraph id="id7d9421cad5704972bec316c2431dcbfa"><enum>(2)</enum><text>reduce, limit, or eliminate the funding for the project until the violation is remedied;</text></paragraph><paragraph id="id32da8878cd904703a905340931093e89"><enum>(3)</enum><text>permanently eliminate the funding for the project; or</text></paragraph><paragraph id="idd946fecc28af4c0aa6ddea8a48061cea"><enum>(4)</enum><text>take any other action determined appropriate by the agency head.</text></paragraph></subsection></section><section id="id0B3215D9B59E45F8BC198B8268B79F7B"><enum>504.</enum><header>Disclosure of research assistance from foreign governments</header><subsection id="idcc0972ce59124f12a96e46f53d36b431"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/45">Chapter 45</external-xref> of title 18, United States Code, is amended by inserting after <external-xref legal-doc="usc" parsable-cite="usc/18/951">section 951</external-xref> the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="id3ed8540d46584fcfb2e214ec8fee0963"><section id="id1EB251264AD4487F9C55EAF48356D15F"><enum>951A.</enum><header>Disclosure of research assistance from foreign governments</header><subsection id="iddbe797334aab4ca9b451e2555d70f0cb"><enum>(a)</enum><header>Definitions</header><text>In this section—</text><paragraph id="id86c35b4b822348e9b40a9420bd8b316a"><enum>(1)</enum><text>the terms <term>agent of a foreign principal</term> and <term>foreign principal</term> have the meanings given those terms in section 1 of the Foreign Agents Registration Act of 1938, as amended (<external-xref legal-doc="usc" parsable-cite="usc/22/611">22 U.S.C. 611</external-xref>);</text></paragraph><paragraph id="ide95212620a0347d0981abbdce1e71676"><enum>(2)</enum><text>the term <term>covered research project</term> has the meaning given the term in section 502 of the <short-title>Combating Chinese Purloining of Trade Secrets Act</short-title>; and</text></paragraph><paragraph id="ida9feb0826f774e79a9441ab2dbd08497"><enum>(3)</enum><text>the term <term>institution of higher education</term> has the meaning given the term in section 101 of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001</external-xref>).</text></paragraph></subsection><subsection id="id84fcc1fb4a1a4546b0089d0539495b6d"><enum>(b)</enum><header>Funding and other assistance</header><paragraph id="id52461e45d988479aa0152f320e2aefe3"><enum>(1)</enum><header>Failure to disclose foreign funding</header><subparagraph id="id99c8e127a0b545e1bfc616c3b5026950"><enum>(A)</enum><header>Offense</header><text>It shall be unlawful for a person, while applying for or accepting a grant or other funding from an agency of the United States for a covered research project, to knowingly and willfully fail to disclose to the agency any grant or other funding that the person has received or will receive for the same project from a foreign principal or an agent of a foreign principal, including through an intermediary.</text></subparagraph><subparagraph id="id4100457192af44c4ad69fa7411abca4a"><enum>(B)</enum><header>Penalty</header><text>Any person who violates subparagraph (A) shall be fined under this title, imprisoned for not more than 3 years, or both.</text></subparagraph></paragraph><paragraph id="id632f88d7ef034290b0fbc4447fa3c7c3"><enum>(2)</enum><header>Failure to disclose material facts</header><subparagraph id="id55db863fea5a446f8c3edfdb29de8b21"><enum>(A)</enum><header>Offense</header><text>It shall be unlawful for a person, while applying for or accepting a grant or other funding from an agency of the United States for a covered research project, to knowingly and willfully fail to disclose to the agency a material fact relating to a connection between a foreign country and the project that might substantially impact the decision of the agency to provide funding to the project, including the fact that a person providing any assistance, including financial assistance, to the project is—</text><clause id="id5dc37028d26f451690393b06ba091e57"><enum>(i)</enum><text>a national of a foreign country;</text></clause><clause id="iddf5b5a746c3b48798674dfdb585e123d"><enum>(ii)</enum><text>affiliated with an institution comparable to an institution of higher education of higher learning, or another organization, that is headquartered in or substantially funded by a foreign country; or</text></clause><clause id="id2dec725afc444165967db3e21cd01e31"><enum>(iii)</enum><text>engaging in research activities for the project in a foreign country.</text></clause></subparagraph><subparagraph id="ida152a239c3a74ccbb11b986532c65a58"><enum>(B)</enum><header>Penalty</header><text>Any person who violates subparagraph (A) shall be fined under this title, imprisoned for not more than 1 year, or both.</text></subparagraph></paragraph><paragraph id="ide4d070123f7744908094bf4170d8e5cf"><enum>(3)</enum><header>Institutions of higher education</header><text>Any institution of higher education that knowingly and willfully fails to disclose to the appropriate agency of the United States that an officer, agent, or employee of the institution of higher education violated this subsection shall be fined not more than $1,000,000 for each such violation.</text></paragraph></subsection><subsection id="id6ef737bed6af4812a804d429500a7446"><enum>(c)</enum><header>Transmission of information</header><paragraph id="id0bd8e8b870ff46bf89db7175689a2c2f"><enum>(1)</enum><header>Offense</header><text>It shall be unlawful for any person, while applying for or accepting a grant or other funding from an agency of the United States for a covered research project, to knowingly transmit or attempt to transmit information gained in violation of a contract to which the person is a party, including a contract regarding nondisclosure of information, employment, or the provision of goods or services, intending or knowing that the transmission will benefit a foreign principal or an agent of a foreign principal.</text></paragraph><paragraph id="idfe9656fa3b654cfbabd57ec2c76c828a"><enum>(2)</enum><header>Penalty</header><text>Any person who violates paragraph (1) shall be fined under this title, imprisoned for not more than 10 years, or both.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id5add610dec754d06ade89bdf2a6d77e6"><enum>(b)</enum><header>Technical and conforming amendment</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/45">chapter 45</external-xref> of title 18, United States Code, is amended by inserting after the item relating to <external-xref legal-doc="usc" parsable-cite="usc/18/950">section 950</external-xref> the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id057147BD34E34C34A14A74E0DB547DBC"><toc><toc-entry bold="off" level="section">951A. Disclosure of research assistance from foreign governments.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section></title></legis-body></bill> 

