<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Reported-in-Senate" dms-id="A1" public-private="public" slc-id="S1-BAG24915-8XJ-K4-V52"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>112 S4443 RS: Intelligence Authorization Act for Fiscal Year 2025</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2024-06-03</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><calendar>Calendar No. 412</calendar><congress>118th CONGRESS</congress><session>2d Session</session><legis-num>S. 4443</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20240603">June 3, 2024</action-date><action-desc><sponsor name-id="S327">Mr. Warner</sponsor>, from the <committee-name committee-id="SLIN00">Select Committee on Intelligence</committee-name>, reported the following original bill; which was read twice and placed on the calendar</action-desc></action><legis-type>A BILL</legis-type><official-title>To authorize appropriations for fiscal year 2025 for intelligence and intelligence-related activities of the United States Government, the Intelligence Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes.</official-title></form><legis-body><section id="S1" section-type="section-one"><enum>1.</enum><header>Short title; table of contents</header><subsection commented="no" display-inline="no-display-inline" id="id89b5ed9b8ac043c0a8ec79f4fbd7f4c3"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Intelligence Authorization Act for Fiscal Year 2025</short-title></quote>.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id26f5421a345f4e9eb3ce9165cfa7ae6e"><enum>(b)</enum><header>Table of contents</header><text>The table of contents for this Act is as follows:</text><toc><toc-entry level="section" idref="S1">Sec. 1. Short title; table of contents.</toc-entry><toc-entry level="section" idref="HDEBA88C4C9224B639D37B2BF0B5EE0D9">Sec. 2. Definitions.</toc-entry><toc-entry level="title" idref="idd0efadbe16334b8aabb41f68f7679691">TITLE I—Intelligence activities</toc-entry><toc-entry level="section" idref="HC4C024E7DCBB4402940B0177F2F43356">Sec. 101. Authorization of appropriations.</toc-entry><toc-entry level="section" idref="HA95BC11DB0A24448910F9AA770957986">Sec. 102. Classified Schedule of Authorizations.</toc-entry><toc-entry level="section" idref="H692FEA0C6BD5415F98D109012804658B">Sec. 103. Intelligence Community Management Account.</toc-entry><toc-entry level="section" idref="HB083673E36534422907D4F486CD827C2">Sec. 104. Increase in employee compensation and benefits authorized by law.</toc-entry><toc-entry level="title" idref="id8362f381719e4b6f83ae363520317b8e">TITLE II—Central Intelligence Agency retirement and disability system</toc-entry><toc-entry level="section" idref="H44FFC8AAFA5F493A9CB25523C8E49D95">Sec. 201. Authorization of appropriations.</toc-entry><toc-entry level="title" idref="idd99c7e8ccae7470787a15b1cb82b390b">TITLE III—Intelligence community matters</toc-entry><toc-entry level="section" idref="id22b8df1cfdea4d599eecbf747244c982">Sec. 301. Improvements relating to conflicts of interest in the Intelligence Innovation Board.</toc-entry><toc-entry level="section" idref="idECBFAA2C03BE4C61884637A513E47837">Sec. 302. National Threat Identification and Prioritization Assessment and National Counterintelligence Strategy.</toc-entry><toc-entry level="section" idref="id45cca36ced52434eaca2cb7184e72e7e">Sec. 303. Open Source Intelligence Division of Office of Intelligence and Analysis personnel.</toc-entry><toc-entry level="section" idref="idd33178b205dc4495b411d6ef1e34dcd9">Sec. 304. Appointment of Director of the Office of Intelligence and Counterintelligence.</toc-entry><toc-entry level="section" idref="idceee71c70b4e4e44a867daea0353c712">Sec. 305. Improvements to advisory board of National Reconnaissance Office.</toc-entry><toc-entry level="section" idref="id68E51D240E244C6B9B5F4736876681D4">Sec. 306. National Intelligence University acceptance of grants.</toc-entry><toc-entry level="section" idref="idabf2b38942ed407eb084635db4a02991">Sec. 307. Protection of Central Intelligence Agency facilities and assets from unmanned aircraft.</toc-entry><toc-entry level="section" idref="idc1c489efaf1a421e9366cb05b60cd237">Sec. 308. Limitation on availability of funds for new controlled access programs.</toc-entry><toc-entry level="section" idref="id639ee493baf24b54ad400052c5eb704b">Sec. 309. Limitation on transfers from controlled access programs.</toc-entry><toc-entry level="section" idref="id08682BC5BECB4B20B19E4DCB687BF0C4">Sec. 310. Expenditure of funds for certain intelligence and counterintelligence activities of the Coast Guard.</toc-entry><toc-entry level="section" idref="idC3FA8206089942A7B965E78474649433">Sec. 311. Unauthorized access to intelligence community property.</toc-entry><toc-entry level="section" idref="id51600ff5af87409fb760aee93022788d">Sec. 312. Strengthening of Office of Intelligence and Analysis.</toc-entry><toc-entry level="section" idref="id0AC00582B8EE4C3287C813C370AC8872">Sec. 313. Report on sensitive commercially available information.</toc-entry><toc-entry level="section" idref="id1ed2d653102d4b288271753b2378570c">Sec. 314. Policy on collection of United States location information.</toc-entry><toc-entry level="section" idref="id40429988cb2e439794527de14b0b3b2b">Sec. 315. Display of flags, seals, and emblems other than the United States flag.</toc-entry><toc-entry level="title" idref="id976c36962b0942bc9010abc8e3a694ff">TITLE IV—Countering foreign threats</toc-entry><toc-entry level="subtitle" idref="idddef20e7405f4448af2255244555ae95">Subtitle A—People's Republic of China</toc-entry><toc-entry level="section" idref="id43a500ad57ac4503aa8394c5b4474168">Sec. 401. Strategy and outreach on risks posed by People's Republic of China smartport technology.</toc-entry><toc-entry level="section" idref="idc36a252e220a4596a8a9ccf518db2bf6">Sec. 402. Assessment of current status of biotechnology of People's Republic of China.</toc-entry><toc-entry level="section" idref="id5C30523D31F04CA4AF04798255FB5161">Sec. 403. Intelligence sharing with law enforcement agencies on synthetic opioid precursor chemicals originating in People’s Republic of China.</toc-entry><toc-entry level="section" idref="idF207B3934BE449D29F734DE59E871AA0">Sec. 404. Report on efforts of the People's Republic of China to evade United States transparency and national security regulations.</toc-entry><toc-entry level="section" idref="id5595e57012a140af9f044b542d231607">Sec. 405. Plan for recruitment of Mandarin speakers.</toc-entry><toc-entry level="subtitle" idref="id9d1e89dfd4714da680fda36fbfb86bb3">Subtitle B—The Russian Federation</toc-entry><toc-entry level="section" idref="id9de188ff76f742f394074cb7c46489b2">Sec. 411. Assessment of Russian Federation sponsorship of acts of international terrorism.</toc-entry><toc-entry level="section" idref="id8FFEB5C393DF47F5BCEA72332B395AEE">Sec. 412. Assessment of likely course of war in Ukraine.</toc-entry><toc-entry level="subtitle" idref="id77e19e484c794f45b13ba2be44d3f92d">Subtitle C—International terrorism</toc-entry><toc-entry level="section" idref="id02E0CCB94E2D438495112CEBAF96AAFA">Sec. 421. Inclusion of Hamas, Hezbollah, Al-Qaeda, and ISIS officials and members among aliens engaged in terrorist activity.</toc-entry><toc-entry level="section" idref="idE49453E484094A6A83169E2938E82F46">Sec. 422. Assessment and report on the threat of ISIS-Khorasan to the United States.</toc-entry><toc-entry level="section" idref="id1C39F6CF49A14CC88DCC8FF9DB59ADFB">Sec. 423. Terrorist financing prevention.</toc-entry><toc-entry level="subtitle" idref="idcea087edc0b24262986b41f09b702012">Subtitle D—Other foreign threats</toc-entry><toc-entry level="section" idref="idf9dbc3b3d3bc41508a94e780b43d7545">Sec. 431. Assessment of visa-free travel to and within Western Hemisphere by nationals of countries of concern.</toc-entry><toc-entry level="section" idref="id31C1B27992E54BA8BB1773A049CA526D">Sec. 432. Study on threat posed by foreign investment in United States agricultural land.</toc-entry><toc-entry level="section" idref="ida4361f06d594422fb80740683ac0f5e2">Sec. 433. Assessment of threat posed by citizenship-by-investment programs.</toc-entry><toc-entry level="section" idref="idbdcaa3109016492686e51e6ef20378fc">Sec. 434. Mitigating the use of United States components and technology in hostile activities by foreign adversaries.</toc-entry><toc-entry level="section" idref="id64b1ff8577db4802b654fea4d6160d7b">Sec. 435. Office of Intelligence and Counterintelligence review of visitors and assignees.</toc-entry><toc-entry level="section" idref="idB6434BC8E2AF431AB4C22DD515B2DA6A">Sec. 436. Prohibition on National Laboratories admitting certain foreign nationals.</toc-entry><toc-entry level="section" idref="id4a1bb3fb296641db93da3786adb30bc7">Sec. 437. Quarterly report on certain foreign nationals encountered at the United States border.</toc-entry><toc-entry level="section" idref="id2B7232DE6F8F4A768A8892EB3830736A">Sec. 438. Assessment of the lessons learned by the intelligence community with respect to the Israel-Hamas war.</toc-entry><toc-entry level="section" idref="id9e58b5b42433480f8aade96487425faa">Sec. 439. Central Intelligence Agency intelligence assessment on Tren de Aragua.</toc-entry><toc-entry level="section" idref="id2ac07bb38c664a319ac04e6bd533d62c">Sec. 440. Assessment of Maduro regime’s economic and security relationships with state sponsors of terrorism and foreign terrorist organizations.</toc-entry><toc-entry level="section" idref="id57F9DD9B80F44319BFC565F7936243BF">Sec. 441. Continued congressional oversight of Iranian expenditures supporting foreign military and terrorist activities.</toc-entry><toc-entry level="title" idref="idd8db965086e9419291bbabad94e1326a">TITLE V—Emerging technologies</toc-entry><toc-entry level="section" idref="id5dfc6aeb399a4676acdeff9bd73b5386">Sec. 501. Strategy to counter foreign adversary efforts to utilize biotechnologies in ways that threaten United States national security.</toc-entry><toc-entry level="section" idref="id5320c2e77efd461ba7633fc651966e4e">Sec. 502. Improvements to the roles, missions, and objectives of the National Counterproliferation and Biosecurity Center.</toc-entry><toc-entry level="section" idref="id5B09DDF0FB394FF1869CFA165E9120A5">Sec. 503. Enhancing capabilities to detect foreign adversary threats relating to biological data.</toc-entry><toc-entry level="section" idref="idFAEDD3EC0A3C4E58BD581F2D1ADB2FF2">Sec. 504. National security procedures to address certain risks and threats relating to artificial intelligence.</toc-entry><toc-entry level="section" idref="id418ce2c6f64440c8bba9e31e4216b9cb">Sec. 505. Establishment of Artificial Intelligence Security Center.</toc-entry><toc-entry level="section" idref="id64824cf9ff6743be8a572c4ffe0d3443">Sec. 506. Sense of Congress encouraging intelligence community to increase private sector capital partnerships and partnership with Office of Strategic Capital of Department of Defense to secure enduring technological advantages.</toc-entry><toc-entry level="section" idref="id6c81b48a6aa34914b62d58d5fb3e7cfd">Sec. 507. Intelligence Community Technology Bridge Fund.</toc-entry><toc-entry level="section" idref="ide489861801294799b168bedb8287a269">Sec. 508. Enhancement of authority for intelligence community public-private talent exchanges.</toc-entry><toc-entry level="section" idref="id9928456aeec24bfeae98633664d5895c">Sec. 509. Enhancing intelligence community ability to acquire emerging technology that fulfills intelligence community needs.</toc-entry><toc-entry level="section" idref="id6fc079ceb7da4a50b354302e844d14e1">Sec. 510. Management of artificial intelligence security risks.</toc-entry><toc-entry level="section" idref="id3af22a6adf1f436b8c41edd11cd21916">Sec. 511. Protection of technological measures designed to verify authenticity or provenance of machine-manipulated media.</toc-entry><toc-entry level="section" idref="id988DCCAC6FE64F03B93771DF61F122BE">Sec. 512. Sense of Congress on hostile foreign cyber actors.</toc-entry><toc-entry level="section" idref="id0b04ce9b07f74e18810e8db365a84def">Sec. 513. Designation of state sponsors of ransomware and reporting requirements.</toc-entry><toc-entry level="section" idref="id01C95B017695409C867CFE73CF332FA8">Sec. 514. Deeming ransomware threats to critical infrastructure a national intelligence priority.</toc-entry><toc-entry level="title" idref="id6331508a886f46bcae4eb2a694a89830">TITLE VI—Classification reform</toc-entry><toc-entry level="section" idref="ide0d5962de8ea47acba6bc25e3f969f44">Sec. 601. Governance of classification and declassification system.</toc-entry><toc-entry level="section" idref="id5c2ebfc563274ba186b68f753c9b6f75">Sec. 602. Classification and declassification of information.</toc-entry><toc-entry level="section" idref="id516dfee8cdc24bad9a7f2e8b9f30a35e">Sec. 603. Minimum standards for Executive agency insider threat programs.</toc-entry><toc-entry level="title" idref="id727f4687064d40079d3c409e7fbcbe72">TITLE VII—Security clearances and intelligence community workforce improvements</toc-entry><toc-entry level="section" idref="idf3565186b5254d7da829f354b35b735c">Sec. 701. Security clearances held by certain former employees of intelligence community.</toc-entry><toc-entry level="section" idref="id0d7e998e4d9543018f4b9d2b8ee9e0fc">Sec. 702. Policy for authorizing intelligence community program of contractor-owned and contractor-operated sensitive compartmented information facilities.</toc-entry><toc-entry level="section" idref="id54eab772220441bf9c266768aecc496a">Sec. 703. Enabling intelligence community integration.</toc-entry><toc-entry level="section" idref="id25c953ea7aba4a14884644f919eb8e7d">Sec. 704. Appointment of spouses of certain Federal employees.</toc-entry><toc-entry level="section" idref="idD9CD94FB1D6B420C8810B6CEF33CF797">Sec. 705. Plan for staffing the intelligence collection positions of the Central Intelligence Agency.</toc-entry><toc-entry level="section" idref="id3CF3A2F75B124317ACB1414E160099B5">Sec. 706. Intelligence community workplace protections.</toc-entry><toc-entry level="section" idref="id03D221A946124D008C1848D85D0F3CD6">Sec. 707. Sense of Congress on Government personnel support for foreign terrorist organizations.</toc-entry><toc-entry level="title" idref="id1b69c9664d184cb6ad0fb56fd5d14908">TITLE VIII—Whistleblowers</toc-entry><toc-entry level="section" idref="id5931a6037b7a44fba4b2a1f49e4b7881">Sec. 801. Improvements regarding urgent concerns submitted to Inspectors General of the intelligence community.</toc-entry><toc-entry level="section" idref="id44fdd8201c1840f29d6f431aeeab7a20">Sec. 802. Prohibition against disclosure of whistleblower identity as act of reprisal.</toc-entry><toc-entry level="section" idref="idca86f08b11bf40c3b28407ceef713fc5">Sec. 803. Protection for individuals making authorized disclosures to Inspectors General of elements of the intelligence community.</toc-entry><toc-entry level="section" idref="id079458469b8441819c0a5336fa9db3be">Sec. 804. Clarification of authority of certain Inspectors General to receive protected disclosures.</toc-entry><toc-entry level="section" idref="id19bc7c28a09a46488c5fcdc089ca3ba8">Sec. 805. Whistleblower protections relating to psychiatric testing or examination.</toc-entry><toc-entry level="section" idref="idad285e6a83f844999a7117f737c432f2">Sec. 806. Establishing process parity for adverse security clearance and access determinations.</toc-entry><toc-entry level="section" idref="idA16D78CF463A47CDA5AADED00F5EB3CB">Sec. 807. Elimination of cap on compensatory damages for retaliatory revocation of security clearances and access determinations.</toc-entry><toc-entry level="title" idref="id14f19c32bbb34f6e890de486acd64db1">TITLE IX—Anomalous health incidents</toc-entry><toc-entry level="section" idref="id3d29209e286d4140898e6912cbea6416">Sec. 901. Additional discretion for Director of Central Intelligence Agency in paying costs of treating qualifying injuries and making payments for qualifying injuries to the brain.</toc-entry><toc-entry level="section" idref="idEAD88D5F835B4CF28D132CD3AB7A1D0A">Sec. 902. Additional discretion for Secretary of State and heads of other Federal agencies in paying costs of treating qualifying injuries and making payments for qualifying injuries to the brain.</toc-entry><toc-entry level="section" idref="idF6D0FB1AF21043BBB6C7FA3100D67F14">Sec. 903. Improved funding flexibility for payments made by Department of State for qualifying injuries to the brain.</toc-entry><toc-entry level="title" idref="idb2f3de98774549cc97da5443ac191524">TITLE X—Unidentified anomalous phenomena</toc-entry><toc-entry level="section" idref="id2d0ed5988a1a479b96819ee407bc036d">Sec. 1001. Comptroller General of the United States review of All-domain Anomaly Resolution Office.</toc-entry><toc-entry level="section" idref="idff1dfc93bd6547b681cad2a28dc343dc">Sec. 1002. Sunset of requirements relating to audits of unidentified anomalous phenomena historical record report.</toc-entry><toc-entry level="section" idref="idB75EFDB0168E413786290D75F3CAA38D">Sec. 1003. Funding limitations relating to unidentified anomalous phenomena.</toc-entry><toc-entry level="title" idref="id09158f6d5226417d895ca44b6b6cad6d">TITLE XI—Air America</toc-entry><toc-entry level="section" idref="idE00C5F40EAA0481187E0C1DA447A69CF">Sec. 1101. Short title.</toc-entry><toc-entry level="section" idref="id816567952eef4fceb6d5d17257d38a6b">Sec. 1102. Findings.</toc-entry><toc-entry level="section" idref="ide85b283aa4be499bbade5740a6ec2062">Sec. 1103. Definitions.</toc-entry><toc-entry level="section" idref="ida91a39b9528e4896a54660d77983d33d">Sec. 1104. Award authorized to eligible persons.</toc-entry><toc-entry level="section" idref="idf2a3e837fd4d40f2a2118b5985c2f226">Sec. 1105. Funding limitation.</toc-entry><toc-entry level="section" idref="id9ea53746a6f3411eb451f72c1caf88b9">Sec. 1106. Time limitation.</toc-entry><toc-entry level="section" idref="ide0f8800feb804e8db806edf08711b3e9">Sec. 1107. Application procedures.</toc-entry><toc-entry level="section" idref="idd9abeb74f39b42fb805699c502bcd71c">Sec. 1108. Rule of construction.</toc-entry><toc-entry level="section" idref="idee93c8798e154387b0690f701d596705">Sec. 1109. Attorneys’ and agents’ fees.</toc-entry><toc-entry level="section" idref="idb95e972469314a3cbd37c6b7e3d7ed0d">Sec. 1110. No judicial review.</toc-entry><toc-entry level="section" idref="id7e5a2cb0a67e4024817193a3d6054b30">Sec. 1111. Reports to Congress.</toc-entry><toc-entry level="title" idref="iddfa06288aa6f4063a5e24b41c1779c79">TITLE XII—Other matters</toc-entry><toc-entry level="section" idref="H704B2609C40F4870A02125404F3FF3B7">Sec. 1201. Enhanced authorities for amicus curiae under the Foreign Intelligence Surveillance Act of 1978.</toc-entry><toc-entry level="section" idref="idE565929150204D21881DD1A5D31A76F9">Sec. 1202. Limitation on directives under Foreign Intelligence Surveillance Act of 1978 relating to certain electronic communication service providers.</toc-entry><toc-entry level="section" idref="idae217f904c8d4c26bb4d0b7e6bc1b34d">Sec. 1203. Strengthening Election Cybersecurity to Uphold Respect for Elections through Independent Testing Act of 2024.</toc-entry><toc-entry level="section" idref="id262f8ac4fd314e86988f484a306457f5">Sec. 1204. Privacy and Civil Liberties Oversight Board qualifications.</toc-entry><toc-entry level="section" idref="id25407713E6C147D993BA800586104CF9">Sec. 1205. Parity in pay for staff of the Privacy and Civil Liberties Oversight Board and the intelligence community.</toc-entry><toc-entry level="section" idref="id916c3c1114dc4b598c43ee06da3c28af">Sec. 1206. Modification and repeal of reporting requirements.</toc-entry><toc-entry level="section" idref="idbdfdddbe06ed4afcbf10bec8c6cc696e">Sec. 1207. Technical amendments.</toc-entry></toc></subsection></section><section id="HDEBA88C4C9224B639D37B2BF0B5EE0D9"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="H44EB32FB423045A28386F96967755E12"><enum>(1)</enum><header>Congressional intelligence committees</header><text>The term <term>congressional intelligence committees</term> has the meaning given such term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph id="HC6320838A75443C3B1798159B0F6705B" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Intelligence community</header><text>The term <term>intelligence community</term> has the meaning given such term in such section. </text></paragraph></section><title id="idd0efadbe16334b8aabb41f68f7679691" style="OLC"><enum>I</enum><header>Intelligence activities</header><section id="HC4C024E7DCBB4402940B0177F2F43356"><enum>101.</enum><header>Authorization of appropriations</header><text display-inline="no-display-inline">Funds are hereby authorized to be appropriated for fiscal year 2025 for the conduct of the intelligence and intelligence-related activities of the Federal Government.</text></section><section id="HA95BC11DB0A24448910F9AA770957986"><enum>102.</enum><header>Classified Schedule of Authorizations</header><subsection id="H3AE5EA905044497E81182B16EF082A47"><enum>(a)</enum><header>Specifications of amounts</header><text>The amounts authorized to be appropriated under section 101 for the conduct of the intelligence activities of the Federal Government are those specified in the classified Schedule of Authorizations prepared to accompany this Act.</text></subsection><subsection id="H58E142761B2044FBB092F8DD515CB2F9"><enum>(b)</enum><header>Availability of classified Schedule of Authorizations</header><paragraph id="H81D6B05CA94F4FFC9A4BEDA4771AD95C"><enum>(1)</enum><header>Availability</header><text>The classified Schedule of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President.</text></paragraph><paragraph id="H3527EA5B23F04CBA892F736E7D8189BE"><enum>(2)</enum><header>Distribution by the President</header><text>Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedule of Authorizations referred to in subsection (a), or of appropriate portions of such Schedule, within the executive branch of the Federal Government.</text></paragraph><paragraph id="H89C7AD3DD34A4BB29178327A6134D22D"><enum>(3)</enum><header>Limits on disclosure</header><text>The President shall not publicly disclose the classified Schedule of Authorizations or any portion of such Schedule except—</text><subparagraph id="HEBB99209F7D24AC3B453DD829768899A"><enum>(A)</enum><text>as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (<external-xref legal-doc="usc" parsable-cite="usc/50/3306">50 U.S.C. 3306(a)</external-xref>);</text></subparagraph><subparagraph id="H4FBCEF9716774E72972F54D3615F7B92"><enum>(B)</enum><text>to the extent necessary to implement the budget; or</text></subparagraph><subparagraph id="H0E7594FB4D604C628EFA08BADE262FD4"><enum>(C)</enum><text>as otherwise required by law.</text></subparagraph></paragraph></subsection></section><section id="H692FEA0C6BD5415F98D109012804658B"><enum>103.</enum><header>Intelligence Community Management Account</header><subsection id="H712E058050044510969F8B947DA3AEA8"><enum>(a)</enum><header>Authorization of appropriations</header><text display-inline="yes-display-inline">There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2025 the sum of $656,573,000.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="HDEC9400E5D0C489E85B6A8CEA87ECE2F"><enum>(b)</enum><header>Classified authorization of appropriations</header><text>In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Intelligence Community Management Account for fiscal year 2025 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a).</text></subsection></section><section id="HB083673E36534422907D4F486CD827C2" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>104.</enum><header>Increase in employee compensation and benefits authorized by law</header><text display-inline="no-display-inline">Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law. </text></section></title><title style="OLC" commented="no" level-type="subsequent" id="id8362f381719e4b6f83ae363520317b8e"><enum>II</enum><header>Central Intelligence Agency retirement and disability system</header><section commented="no" display-inline="no-display-inline" section-type="subsequent-section" id="H44FFC8AAFA5F493A9CB25523C8E49D95"><enum>201.</enum><header>Authorization of appropriations</header><text display-inline="no-display-inline">There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund $514,000,000 for fiscal year 2025. </text></section></title><title style="OLC" commented="no" level-type="subsequent" id="idd99c7e8ccae7470787a15b1cb82b390b"><enum>III</enum><header>Intelligence community matters</header><section id="id22b8df1cfdea4d599eecbf747244c982"><enum>301.</enum><header>Improvements relating to conflicts of interest in the Intelligence Innovation Board</header><text display-inline="no-display-inline">Section 7506(g) of the Intelligence Authorization Act for Fiscal Year 2024 (<external-xref legal-doc="public-law" parsable-cite="pl/118/31">Public Law 118–31</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idd35d5bfdc5044bd79bfa547d63191453"><enum>(1)</enum><text>in paragraph (2)—</text><subparagraph id="idb684247ec80d434bbc9006530f86ee0b"><enum>(A)</enum><text>in subparagraph (A), by inserting <quote>active and</quote> before <quote>potential</quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9fc6401cdebc4975906a742028b9b8ef"><enum>(B)</enum><text display-inline="yes-display-inline">in subparagraph (B), by striking <quote>the Inspector General of the Intelligence Community</quote> and inserting <quote>the designated agency ethics official</quote>;</text></subparagraph><subparagraph id="id9020a860f9574124ae2818fdb2cbf43c"><enum>(C)</enum><text>by redesignating subparagraph (C) as subparagraph (D); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3663cacc331b4208a88517b77191f7d3"><enum>(D)</enum><text display-inline="yes-display-inline">by inserting after subparagraph (B) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id98B83B4AD42144BDBEB7A82C583B5B99"><subparagraph commented="no" display-inline="no-display-inline" id="id7541f0200236477ca2145fca143500d3"><enum>(C)</enum><text>Authority for the designated agency ethics official to grant a waiver for a conflict of interest, except that—</text><clause commented="no" display-inline="no-display-inline" id="idad845a8660284d64a7d0c75b3b9d3b6b"><enum>(i)</enum><text>no waiver may be granted for an active conflict of interest identified with respect to the Chair of the Board;</text></clause><clause commented="no" display-inline="no-display-inline" id="idf377338b7aea49149e7d16030ce93ce3"><enum>(ii)</enum><text display-inline="yes-display-inline">every waiver for a potential conflict of interest requires review and approval by the Director of National Intelligence; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idba158d3eaa4845ff9c3692ed57bc9b88"><enum>(iii)</enum><text display-inline="yes-display-inline">for every waiver granted, the designated agency ethics official shall submit to the congressional intelligence committees notice of the waiver.</text></clause></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7ac86cd4656e4b84b593f53626016096"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idCBC84CBDD353497EAD82346420502479"><paragraph commented="no" display-inline="no-display-inline" id="id480ca3dc5fe94cca8bfd85ad7468bb10"><enum>(3)</enum><header>Definition of designated agency ethics official</header><text>In this subsection, the term <term>designated agency ethics official</term> means the designated agency ethics official (as defined in section 13101 of title 5, United States Code) in the Office of the Director of National Intelligence.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="idECBFAA2C03BE4C61884637A513E47837"><enum>302.</enum><header>National Threat Identification and Prioritization Assessment and National Counterintelligence Strategy</header><text display-inline="no-display-inline">Section 904(f)(3) of the Counterintelligence Enhancement Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/50/3383">50 U.S.C. 3383(f)(3)</external-xref>) is amended by striking <quote>National Counterintelligence Executive</quote> and inserting <quote>Director of the National Counterintelligence and Security Center</quote>. </text></section><section id="id45cca36ced52434eaca2cb7184e72e7e"><enum>303.</enum><header>Open Source Intelligence Division of Office of Intelligence and Analysis personnel</header><text display-inline="no-display-inline">None of the funds authorized to be appropriated by this Act or otherwise made available for fiscal year 2025 for the Office of Intelligence and Analysis of the Department of Homeland Security may be obligated or expended by the Office to increase, above the staffing level in effect on the day before the date of the enactment of this Act, the number of personnel assigned to the Open Source Intelligence Division who work exclusively or predominantly on domestic terrorism issues. </text></section><section id="idd33178b205dc4495b411d6ef1e34dcd9"><enum>304.</enum><header>Appointment of Director of the Office of Intelligence and Counterintelligence</header><subsection commented="no" display-inline="no-display-inline" id="iddf48359c14ce48b7a1568144a2c38c8b"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Section 215(c) of the Department of Energy Organization Act (<external-xref legal-doc="usc" parsable-cite="usc/42/7144b">42 U.S.C. 7144b(c)</external-xref>) is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id35FAE88B895E47FBB76275357748BD24"><subsection commented="no" display-inline="no-display-inline" id="id9c257c0ebda44250af636624e4558d04"><enum>(c)</enum><header>Director</header><paragraph commented="no" display-inline="no-display-inline" id="id98b9262a1c12469e926658b2a7f8d184"><enum>(1)</enum><header>Appointment</header><text>The head of the Office shall be the Director of the Office of Intelligence and Counterintelligence, who shall be appointed by the President, by and with the advice and consent of the Senate. The Director of the Office shall report directly to the Secretary.</text></paragraph><paragraph id="idc235be10410b4b349df3ce201e614eff"><enum>(2)</enum><header>Term</header><subparagraph id="id068bd5303f8d49cd85e4e3e5e85dbd44"><enum>(A)</enum><header>In general</header><text>The Director shall serve for a term of 6 years.</text></subparagraph><subparagraph id="ide5bff0d9453f4fe48fdf9f19da067b06"><enum>(B)</enum><header>Reappointment</header><text>The Director shall be eligible for reappointment for 1 or more terms. </text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idb2a228c4089b4f5ba390a417dbd9615e"><enum>(3)</enum><header>Qualifications</header><text display-inline="yes-display-inline">The Director shall—</text><subparagraph commented="no" display-inline="no-display-inline" id="id02097d74bd424042bd657dca5bce572a"><enum>(A)</enum><text display-inline="yes-display-inline">be an employee in the Senior Executive Service, the Senior Intelligence Service, the Senior National Intelligence Service, or any other Service that the Secretary, in coordination with the Director of National Intelligence, considers appropriate; and</text></subparagraph><subparagraph id="idc803f63e2e854924964ab9c3e6b90781"><enum>(B)</enum><text>have substantial expertise in matters relating to the intelligence community, including foreign intelligence and counterintelligence.</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idfaa1f7243b8d48a3b8dbcdff135b7393" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Effective date</header><text>The amendment made by this section shall take effect on January 21, 2025. </text></subsection></section><section id="idceee71c70b4e4e44a867daea0353c712"><enum>305.</enum><header>Improvements to advisory board of National Reconnaissance Office</header><text display-inline="no-display-inline">Section 106A(d) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3041a">50 U.S.C. 3041a(d)</external-xref>) is amended—</text><paragraph id="ided1add70657845169cbd6659dccae471"><enum>(1)</enum><text>in paragraph (3)(A)—</text><subparagraph commented="no" display-inline="no-display-inline" id="ida0cce739d9c042b19c17245dda3354ae"><enum>(A)</enum><text display-inline="yes-display-inline">in clause (i)—</text><clause commented="no" display-inline="no-display-inline" id="id74d4006933414f7fb259a2398fc2910c"><enum>(i)</enum><text display-inline="yes-display-inline">by striking <quote>five members appointed by the Director, in consultation with the Director of National Intelligence and the Secretary of Defense,</quote> and inserting <quote>up to 8 members appointed by the Director</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id4952a63cfceb4dc4b65efa3c2ad880c4"><enum>(ii)</enum><text>by inserting <quote>, and who do not present any actual or potential conflict of interest</quote> before the period at the end;</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9aecb3165e8b40cfa9d22109fade7c39"><enum>(B)</enum><text>by redesignating clause (ii) as clause (iii); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide7b5fc950bd94df68cc1b7459eaf5942"><enum>(C)</enum><text>by inserting after clause (i) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idA5BB1BA8594D45ED9456D6248D863675"><clause commented="no" display-inline="no-display-inline" id="idc8eb26c36ce84e31be4f3446a23fb5ae"><enum>(ii)</enum><header>Membership structure</header><text>The Director shall ensure that no more than 2 concurrently serving members of the Board qualify for membership on the Board based predominantly on a single qualification set forth under clause (i).</text></clause><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id2aabd3a212ce49cab96f71c03da842e3"><enum>(2)</enum><text>by redesignating paragraphs (5) through (7) as paragraphs (6) through (8), respectively;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id534815b01c674ca3b2d22819d66bc472"><enum>(3)</enum><text>by inserting after paragraph (4) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id37567277CE1C4675A5106C642E3ED797"><paragraph commented="no" display-inline="no-display-inline" id="id7fd7df27989a4872b172b7c04dd5bf71"><enum>(5)</enum><header>Charter</header><text>The Director shall establish a charter for the Board that includes the following:</text><subparagraph id="id3496293bc98948d2b3b34d11df6dc7cf"><enum>(A)</enum><text>Mandatory processes for identifying potential conflicts of interest, including the submission of initial and periodic financial disclosures by Board members.</text></subparagraph><subparagraph id="id4c2b7cbc91244437945c8d2257021f33"><enum>(B)</enum><text>The vetting of potential conflicts of interest by the designated agency ethics official, except that no individual waiver may be granted for a conflict of interest identified with respect to the Chair of the Board.</text></subparagraph><subparagraph id="id400764ebb10c4b718210a6dd1a7fd18c"><enum>(C)</enum><text>The establishment of a process and associated protections for any whistleblower alleging a violation of applicable conflict of interest law, Federal contracting law, or other provision of law.</text></subparagraph></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="idec00981e11524ac0bde794450b090400" commented="no" display-inline="no-display-inline"><enum>(4)</enum><text>in paragraph (8), as redesignated by paragraph (2), by striking <quote>September 30, 2024</quote> and inserting <quote>August 31, 2027</quote>.</text></paragraph></section><section id="id68E51D240E244C6B9B5F4736876681D4"><enum>306.</enum><header>National Intelligence University acceptance of grants</header><subsection commented="no" display-inline="no-display-inline" id="idF06A10AAFC084C73A7D6AA76142092F7"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle D of title X of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3227">50 U.S.C. 3227 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block id="idE2F5AB5A7FD34147A2E1BA7232C23FAB" display-inline="no-display-inline" style="USC"><section id="id085E31BC5CC348A991693115F08FF4DA"><enum>1035.</enum><header>National Intelligence University acceptance of grants</header><subsection id="id39598A48AEF54FF7BAA27A9B66757B56"><enum>(a)</enum><header>Authority</header><text>The Director of National Intelligence may authorize the President of the National Intelligence University to accept qualifying research grants.</text></subsection><subsection id="id8A49589775D34EBC80A707BCE1E61F46"><enum>(b)</enum><header>Qualifying grants</header><text>A qualifying research grant under this section is a grant that is awarded on a competitive basis by an entity referred to in subsection (c) for a research project with a scientific, literary, or educational purpose.</text></subsection><subsection id="idF7464C3AECDD4B69B6CFA09B85FC8819"><enum>(c)</enum><header>Entities from which grants may be accepted</header><text>A qualifying research grant may be accepted under this section only from a Federal agency or from a corporation, fund, foundation, educational institution, or similar entity that is organized and operated primarily for scientific, literary, or educational purposes.</text></subsection><subsection id="idC02F8BA11FF44661A2879416B8778071"><enum>(d)</enum><header>Administration of grant funds</header><paragraph commented="no" display-inline="no-display-inline" id="id407885EE210043DF8D3B0DCFBC9C44AC"><enum>(1)</enum><header>Establishment of account</header><text display-inline="yes-display-inline">The Director shall establish an account for administering funds received as qualifying research grants under this section.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4249C89898B54A72B320B1A818E98105"><enum>(2)</enum><header>Use of funds</header><text display-inline="yes-display-inline">The President of the University shall use the funds in the account established pursuant to paragraph (1) in accordance with applicable provisions of the regulations and the terms and conditions of the grants received.</text></paragraph></subsection><subsection id="idAECC2C1CA08D4E44827D74BEF9645685"><enum>(e)</enum><header>Related expenses</header><text>Subject to such limitations as may be provided in appropriations Acts, appropriations available for the National Intelligence University may be used to pay expenses incurred by the University in applying for, and otherwise pursuing, the award of qualifying research grants.</text></subsection><subsection id="id1C0ADBCFA5B3420191F5E27001FF61B5" commented="no" display-inline="no-display-inline"><enum>(f)</enum><header>Regulations</header><text>The Director of National Intelligence shall prescribe regulations for the administration of this section.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idB9B8E68DE677443EAADAA8E7CC5E5A0D" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header display-inline="yes-display-inline">Clerical amendment</header><text display-inline="yes-display-inline">The table of contents preceding section 2 of such Act is amended by inserting after the item relating to section 1034 the following new item:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id3933F2F2183E4E4581A1288F0A99E754"><toc><toc-entry level="section" bold="off">Sec. 1035. National Intelligence University acceptance of grants.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idabf2b38942ed407eb084635db4a02991"><enum>307.</enum><header>Protection of Central Intelligence Agency facilities and assets from unmanned aircraft</header><text display-inline="no-display-inline">The Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3501">50 U.S.C. 3501 et seq.</external-xref>) is amended by inserting after section 15 the following new section (and conforming the table of contents at the beginning of such Act accordingly):</text><quoted-block id="id06600B5A5E0F438EBBADD0A8086B8EA3" display-inline="no-display-inline" style="OLC"><section id="id5c4045a963224e41b954d6c6bfd60621"><enum>15A.</enum><header>Protection of certain facilities and assets from unmanned aircraft</header><subsection id="ida5cc080426e64942918498fa5a2e3e16"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="idf1124fbd78c044b3a15b78c41c88419e"><enum>(1)</enum><header>Budget</header><text>The term <term>budget</term>, with respect to a fiscal year, means the budget for that fiscal year that is submitted to Congress by the President under section 1105(a) of title 31, United States Code.</text></paragraph><paragraph id="id2ddedce92de647838cd28b0b83d917d3"><enum>(2)</enum><header>Congressional intelligence committees</header><text>The term <term>congressional intelligence committees</term> means—</text><subparagraph id="id147f01a62ca440e2a3cdf520f1836682"><enum>(A)</enum><text>the Select Committee on Intelligence of the Senate;</text></subparagraph><subparagraph id="id2789a2ec3beb40c28b7bf8f519cc3b46"><enum>(B)</enum><text>the Permanent Select Committee on Intelligence of the House of Representatives;</text></subparagraph><subparagraph id="id1576513f50a34f86b858654995369898" commented="no"><enum>(C)</enum><text>the Subcommittee on Defense of the Committee on Appropriations of the Senate; and</text></subparagraph><subparagraph id="id0e812bdaa98a48f0adf90a56d687da7f" commented="no"><enum>(D)</enum><text>the Subcommittee on Defense of the Committee on Appropriations of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id3ade4cd7a47b422e8c8a72f180967ec0"><enum>(3)</enum><header>Congressional judiciary committees</header><text>The term <term>congressional judiciary committees</term> means—</text><subparagraph id="idba227bfa871b452ebad8b30cb315f5cf" commented="no"><enum>(A)</enum><text>the Committee on the Judiciary of the Senate; and</text></subparagraph><subparagraph id="idfbeb5e321ac0468da3693251cfafbe77" commented="no"><enum>(B)</enum><text>the Committee on the Judiciary of the House of Representatives.</text></subparagraph></paragraph><paragraph id="idcf064ea4e9a54430851b8be725c0026f"><enum>(4)</enum><header>Congressional transportation and infrastructure committees</header><text>The term <term>congressional transportation and infrastructure committees</term> means—</text><subparagraph id="id050618b2fa1147f7bc74cdb5350aa6e6" commented="no"><enum>(A)</enum><text>the Committee on Commerce, Science, and Transportation of the Senate; and</text></subparagraph><subparagraph id="id3c4a700d3e5d46e9a397926ca89b038e" commented="no"><enum>(B)</enum><text>the Committee on Transportation and Infrastructure of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id753B2889E3524D7A9C491C13AC1B755D"><enum>(5)</enum><header>Covered facility or asset</header><text>The term <term>covered facility or asset</term> means property owned, leased, or controlled by the Agency, property controlled and occupied by the Federal Highway Administration, located immediately adjacent to the headquarters compound of the Agency, and property owned, leased, or controlled by the Office of the Director of National Intelligence where the property—</text><subparagraph id="id82CE9714FAC540CF90D333F24C5D697F"><enum>(A)</enum><text>is identified as high-risk and a potential target for unlawful unmanned aircraft activity by the Director, in coordination with the Secretary of Transportation, with respect to potentially impacted airspace, through a risk-based assessment for purposes of this section;</text></subparagraph><subparagraph id="id78A19DD94E79467D8EEDD0B30C98CA66"><enum>(B)</enum><text>is located in the United States and beneath airspace that is prohibited or restricted by the Federal Aviation Administration;</text></subparagraph><subparagraph id="idDB3FF81285D24BB7A2EB744CD5415066"><enum>(C)</enum><text>is a property of which Congress has been notified is covered under this paragraph; and</text></subparagraph><subparagraph id="id8F40EA5989E34831874EE00FC3EAED1B"><enum>(D)</enum><text>directly relates to one or more functions authorized to be performed by the Agency, pursuant to the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001</external-xref>) or this Act. </text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida79c25a25d91430996831ff62e7cbf17"><enum>(6)</enum><header>Electronic communication</header><text>The term <term>electronic communication</term> has the meaning given such term in section 2510 of title 18, United States Code.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id089A2057FB6D47EA9E523719BF63E015"><enum>(7)</enum><header>Intercept</header><text>The term <term>intercept</term> has the meaning given such term in section 2510 of title 18, United States Code. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5B9B7FFC4C134D26BE94B60A00ECC97D"><enum>(8)</enum><header>Oral communication</header><text>The term <term>oral communication</term> has the meaning given such term in section 2510 of title 18, United States Code. </text></paragraph><paragraph id="idcb470b6dc288421b819c13cac7a76dec"><enum>(9)</enum><header>Radio communication</header><text>The term <term>radio communication</term> has the meaning given that term in section 3 of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/153">47 U.S.C. 153</external-xref>).</text></paragraph><paragraph id="idDE6CBAFC7FDB44EEA216B4A86F5095C0"><enum>(10)</enum><header>Risk-based assessment</header><text>The term <term>risk-based assessment</term> includes an evaluation of threat information specific to a covered facility or asset and, with respect to potential impacts on the safety and efficiency of the National Airspace System and the needs of national security at each covered facility or asset identified by the Director, an evaluation of each of the following factors:</text><subparagraph id="idD2737688F5A5468CB61E604738680925"><enum>(A)</enum><text>Potential impacts to safety, efficiency, and use of the National Airspace System, including potential effects on manned aircraft and unmanned aircraft systems, aviation safety, airport operations, infrastructure, and air navigation services relating to the use of any system or technology for carrying out the actions described in subsection (c)(1).</text></subparagraph><subparagraph id="id5BA8DD998A864342B20583B0D876EC72"><enum>(B)</enum><text>Options for mitigating any identified impacts to the National Airspace System relating to the use of any system or technology, including minimizing when possible the use of any system or technology that disrupts the transmission of radio or electronic signals, for carrying out the actions described in subsection (c)(1).</text></subparagraph><subparagraph id="idC65FB0AAFECE4CDA8EF37977A4F0AA79"><enum>(C)</enum><text>Potential consequences of the effects of any actions taken under subsection (c)(1) to the National Airspace System and infrastructure if not mitigated.</text></subparagraph><subparagraph id="id69FA23BB182443DA9356C9466ABCCAEF"><enum>(D)</enum><text>The ability to provide reasonable advance notice to aircraft operators consistent with the safety of the National Airspace System and the needs of national security.</text></subparagraph><subparagraph id="idF4EF81E050764135ABAF23A6CF4B3889"><enum>(E)</enum><text>The setting and character of any covered facility or asset, including whether it is located in a populated area or near other structures, and any potential for interference with wireless communications or for injury or damage to persons or property.</text></subparagraph><subparagraph id="id46A0835F8D884864B9B8EDC05803D0BF"><enum>(F)</enum><text>Potential consequences to national security if threats posed by unmanned aircraft systems or unmanned aircraft are not mitigated or defeated.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id13e2e57c59884a9787d206be3f244e58"><enum>(11)</enum><header>United States</header><text display-inline="yes-display-inline">The term <term>United States</term> has the meaning given that term in section 5 of title 18, United States Code.</text></paragraph><paragraph id="idd5287a695faa4da594623ad1de865850"><enum>(12)</enum><header>Unmanned aircraft; unmanned aircraft system</header><text>The terms <term>unmanned aircraft</term> and <term>unmanned aircraft system</term> have the meanings given those terms in section 44801 of title 49, United States Code.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4617296015DD458787C93937910ED744"><enum>(13)</enum><header>Wire communication</header><text>The term <term>wire communication</term> has the meaning given such term in section 2510 of title 18, United States Code. </text></paragraph></subsection><subsection id="id3189bf68ee5b4f3db5dac4c0a7da6486"><enum>(b)</enum><header>Authority</header><text>Notwithstanding section 46502 of title 49, United States Code, or sections 32, 1030, and 1367 and chapters 119 and 206 of title 18, United States Code, or section 705 of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/605">47 U.S.C. 605</external-xref>), the Director may take, and may authorize Agency personnel with assigned duties that include the security or protection of people, facilities, or assets within the United States to take—</text><paragraph id="idcfa97fb9033a4593a45b8d647e1a4bc2"><enum>(1)</enum><text>such actions described in subsection (c)(1) that are necessary to mitigate a credible threat (as defined by the Director, in consultation with the Secretary of Transportation) that an unmanned aircraft system or unmanned aircraft poses to the safety or security of a covered facility or asset; and</text></paragraph><paragraph id="idff7dbc51e1d94f8190bcd4e6081979ca"><enum>(2)</enum><text>such actions described in subsection (c)(3).</text></paragraph></subsection><subsection id="ide162f9c0a4dc4e2fb774f46a62262d7f"><enum>(c)</enum><header>Actions</header><paragraph id="idbe715c6fcb944013a10687928731efc4"><enum>(1)</enum><header>Actions described</header><text>The actions described in this paragraph are the following:</text><subparagraph id="idebe269c37c7b4d0f83d4a567bac213bd"><enum>(A)</enum><text>During the operation of the unmanned aircraft system, detect, identify, monitor, and track the unmanned aircraft system or unmanned aircraft, without prior consent, including by means of intercept or other access of a wire communication, an oral communication, or an electronic communication used to control the unmanned aircraft system or unmanned aircraft.</text></subparagraph><subparagraph id="idff3d57240f624545b1eb011f2d81be86"><enum>(B)</enum><text>Warn the operator of the unmanned aircraft system or unmanned aircraft, including by passive or active and by direct or indirect physical, electronic, radio, or electromagnetic means.</text></subparagraph><subparagraph id="id3cf88e964b6b476d8dfc62db01e5c4d5"><enum>(C)</enum><text>Disrupt control of the unmanned aircraft system or unmanned aircraft, without prior consent, including by disabling the unmanned aircraft system or unmanned aircraft by intercepting, interfering, or causing interference with wire, oral, electronic, or radio communications used to control the unmanned aircraft system or unmanned aircraft.</text></subparagraph><subparagraph id="ida784e68b0f6141af9fc5b353df2eb1b6"><enum>(D)</enum><text>Seize or exercise control over the unmanned aircraft system or unmanned aircraft.</text></subparagraph><subparagraph id="id24954559a746401fa6714f7c9665f130"><enum>(E)</enum><text>Seize or otherwise confiscate the unmanned aircraft system or unmanned aircraft.</text></subparagraph><subparagraph id="id27f7879134eb48908afd3988bd3c4d71"><enum>(F)</enum><text>Use reasonable force, if necessary, to seize or otherwise disable, damage, or destroy the unmanned aircraft system or unmanned aircraft.</text></subparagraph></paragraph><paragraph id="idef539b65f7e94e82a1947407ec868e7d"><enum>(2)</enum><header>Coordination</header><text>The Director shall develop the actions described in paragraph (1) in coordination with the Secretary of Transportation.</text></paragraph><paragraph id="idf2c8a80ff7894307b0e41d7ec2c080ea"><enum>(3)</enum><header>Research, testing, training, and evaluation</header><subparagraph commented="no" display-inline="no-display-inline" id="id74eb9dc06370487faf5b404598c7fbf7"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">The Director shall conduct research, testing, training on, and evaluation of any equipment, including any electronic equipment, to determine the capability and utility of the equipment prior to the use of the equipment for any action described in paragraph (1).</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide550ab20ecfa49b19b59c3541acd2a9d"><enum>(B)</enum><header>Personnel</header><text display-inline="yes-display-inline">Personnel and contractors who do not have assigned duties that include the security or protection of people, facilities, or assets may engage in research, testing, training, and evaluation activities pursuant to subparagraph (A).</text></subparagraph></paragraph><paragraph id="idb0b57d4d7a614011a18f1d592cd49fb1"><enum>(4)</enum><header>FAA coordination</header><text>The Director shall coordinate with the Administrator of the Federal Aviation Administration on any action described in paragraph (1) or (3) so the Administrator may ensure that unmanned aircraft system detection and mitigation systems do not adversely affect or interfere with safe airport operations, navigation, air traffic services, or the safe and efficient operation of the National Airspace System.</text></paragraph></subsection><subsection id="id1ff953c647294eea8c716b5c440da9b9"><enum>(d)</enum><header>Forfeiture</header><text>Any unmanned aircraft system or unmanned aircraft that is seized pursuant to subsection (b) as described in subsection (c)(1) is subject to forfeiture to the United States.</text></subsection><subsection id="idc35b05dbff83458b856be1657769857d"><enum>(e)</enum><header>Regulations and guidance</header><paragraph id="id5e25da132ae04def84f5e87c8372888c"><enum>(1)</enum><header>Issuance</header><text>The Director and the Secretary of Transportation may each prescribe regulations, and shall each issue guidance, to carry out this section.</text></paragraph><paragraph id="id79de3d34bfb54895aadb0a64df8320c7"><enum>(2)</enum><header>Coordination</header><subparagraph id="idfba51913860348d79713787c66462887"><enum>(A)</enum><header>Requirement</header><text>The Director shall coordinate the development of guidance under paragraph (1) with the Secretary of Transportation.</text></subparagraph><subparagraph id="id72da019d48ac4f70ab0393c986b63006"><enum>(B)</enum><header>Aviation safety</header><text>The Director shall coordinate with the Secretary of Transportation and the Administrator of the Federal Aviation Administration before issuing any guidance, or otherwise implementing this section, so the Administrator may ensure that unmanned aircraft system detection and mitigation systems do not adversely affect or interfere with safe airport operations, navigation, air traffic services, or the safe and efficient operation of the National Airspace System.</text></subparagraph></paragraph></subsection><subsection id="id690e1ff44dba4645a54d46e507dd8967"><enum>(f)</enum><header>Privacy protection</header><text>The regulations prescribed or guidance issued under subsection (e) shall ensure that—</text><paragraph id="ida95d127afb85469faa2262c1a744ebc0"><enum>(1)</enum><text>the interception or acquisition of, or access to, or maintenance or use of, communications to or from an unmanned aircraft system or unmanned aircraft under this section is conducted in a manner consistent with the First and Fourth Amendments to the Constitution of the United States and applicable provisions of Federal law;</text></paragraph><paragraph id="idaeb464d16ae141b0a329faaf98f808e3"><enum>(2)</enum><text>communications to or from an unmanned aircraft system or unmanned aircraft are intercepted or acquired only to the extent necessary to support an action described in subsection (c);</text></paragraph><paragraph id="idfb3bcfb23bdf483697a04ec5673b619a"><enum>(3)</enum><text>records of such communications are maintained only for as long as necessary, and in no event for more than 180 days, unless the Director determines that maintenance of such records for a longer period is necessary for the investigation or prosecution of a violation of law, to fulfill a duty, responsibility, or function of the Agency, is required under Federal law, or for the purpose of any litigation; and</text></paragraph><paragraph id="id1d3ddc53aa5e44bba64dc62415ea0b91"><enum>(4)</enum><text>such communications are not disclosed outside the Agency unless the disclosure—</text><subparagraph id="id0f94a085b54a4f44b39ee30cc0c4058d"><enum>(A)</enum><text>is necessary to investigate or prosecute a violation of law;</text></subparagraph><subparagraph id="id43040b7bf690400f924bf9475282da13"><enum>(B)</enum><text>would support the Agency, the Department of Defense, a Federal law enforcement, intelligence, or security agency, a State, local, Tribal, or territorial law enforcement agency, or other relevant person or entity if such entity or person is engaged in a security or protection operation;</text></subparagraph><subparagraph id="id8f912b13f8944a2cab9143bb69e83f9f"><enum>(C)</enum><text>is necessary to support a department or agency listed in subparagraph (B) in investigating or prosecuting a violation of law;</text></subparagraph><subparagraph id="idbb2d09e45cfb464aa6c4f85d9e6a043a"><enum>(D)</enum><text>would support the enforcement activities of a regulatory agency of the Federal Government in connection with a criminal or civil investigation of, or any regulatory, statutory, or other enforcement action relating to, an action described in subsection (b);</text></subparagraph><subparagraph id="id56c2145f7f3f4d9ba18b61150d1ab083"><enum>(E)</enum><text>is necessary to protect against dangerous or unauthorized activity by unmanned aircraft systems or unmanned aircraft;</text></subparagraph><subparagraph id="id8d355b89d6b54065a56b9b13c69ed5c2"><enum>(F)</enum><text>is necessary to fulfill a duty, responsibility, or function of the Agency; or</text></subparagraph><subparagraph id="idc1955e9100314655a443409c7be6a1d8"><enum>(G)</enum><text>is otherwise required by law.</text></subparagraph></paragraph></subsection><subsection id="id324fd62f755d4310a6b175cdb24e4a77"><enum>(g)</enum><header>Budget</header><paragraph commented="no" display-inline="no-display-inline" id="id04689358cef24be88ad44fc8519bb504"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Director shall submit to the congressional intelligence committees, as a part of the budget request of the Agency for each fiscal year after fiscal year 2025, a consolidated funding display that identifies the funding source for the actions described in subsection (c)(1) within the Agency.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2cc4c39bedef4b4395ac55b579d3e5a6"><enum>(2)</enum><header>Form</header><text display-inline="yes-display-inline">Each funding display submitted pursuant to paragraph (1) shall be in unclassified form, but may contain a classified annex.</text></paragraph></subsection><subsection id="idd554163ca6e7404292c6e43d8b7345bf"><enum>(h)</enum><header>Semiannual briefings and notifications</header><paragraph id="ida2eb42e89a7a44f7bc7c20525c218929"><enum>(1)</enum><header>Briefings</header><text>Not later than 180 days after the date of the enactment of the <short-title>Intelligence Authorization Act for Fiscal Year 2025</short-title> and semiannually thereafter, the Director shall provide the congressional intelligence committees, the congressional judiciary committees, and the congressional transportation and infrastructure committees a briefing on the activities carried out pursuant to this section during the period covered by the briefing.</text></paragraph><paragraph id="idc2110332809e4ecf84886cacd8397af3"><enum>(2)</enum><header>Requirement</header><text>Each briefing under paragraph (1) shall be conducted jointly with the Secretary of Transportation.</text></paragraph><paragraph id="id3bcb48ed51df42ca9cf9331afd87b89f"><enum>(3)</enum><header>Contents</header><text>Each briefing under paragraph (1) shall include, for the period covered by the briefing, the following:</text><subparagraph id="iddd42e57aac434749b0f8bb4133dc5426"><enum>(A)</enum><text>Policies, programs, and procedures to mitigate or eliminate the effects of the activities described in paragraph (1) to the National Airspace System and other critical national transportation infrastructure.</text></subparagraph><subparagraph id="id7d6225a7ad5b4fd5bbc41cd29fa73f6e"><enum>(B)</enum><text>A description of instances in which actions described in subsection (c)(1) have been taken, including all such instances that may have resulted in harm, damage, or loss to a person or to private property.</text></subparagraph><subparagraph id="id0386cd4c87ab4a80bbbdba46eec95779"><enum>(C)</enum><text>A description of the guidance, policies, or procedures established to address privacy, civil rights, and civil liberties issues affected by the actions allowed under this section, as well as any changes or subsequent efforts that would significantly affect privacy, civil rights, or civil liberties.</text></subparagraph><subparagraph id="ida4bc710e73574ef1b45e588cb1bf70e6"><enum>(D)</enum><text>A description of options considered and steps taken to mitigate any identified effects on the National Airspace System relating to the use of any system or technology, including the minimization of the use of any technology that disrupts the transmission of radio or electronic signals, for carrying out the actions described in subsection (c)(1).</text></subparagraph><subparagraph id="id6151d4e1e238493ea9bba530dcd6cdd2"><enum>(E)</enum><text>A description of instances in which communications intercepted or acquired during the course of operations of an unmanned aircraft system or unmanned aircraft were maintained for more than 180 days or disclosed outside the Agency.</text></subparagraph><subparagraph id="idb3e0866a05654c29ad9e9a3309545a75"><enum>(F)</enum><text>How the Director and the Secretary of Transportation have informed the public as to the possible use of authorities under this section.</text></subparagraph><subparagraph id="idc8b7273383ec41458d15bf922ba8ee1a"><enum>(G)</enum><text>How the Director and the Secretary of Transportation have engaged with Federal, State, local, territorial, or Tribal law enforcement agencies to implement and use such authorities.</text></subparagraph><subparagraph id="ide4d180013dda486ab3dba233786c9ed3"><enum>(H)</enum><text>An assessment of whether any gaps or insufficiencies remain in statutes, regulations, and policies that impede the ability of the Agency to counter the threat posed by the malicious use of unmanned aircraft systems and unmanned aircraft and any recommendations to remedy such gaps or insufficiencies.</text></subparagraph></paragraph><paragraph id="idaf208496e25a4288a77f0e74f8181fae"><enum>(4)</enum><header>Form</header><text>Each briefing under paragraph (1) shall be in unclassified form, but may be accompanied by an additional classified report.</text></paragraph><paragraph id="id039b7e16cc404869bb04f9ed01bbcbac"><enum>(5)</enum><header>Notification</header><subparagraph commented="no" display-inline="no-display-inline" id="id8e779dafec334d2987e7f64d96751602"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Within 30 days of deploying any new technology to carry out the actions described in subsection (c)(1), the Director shall submit to the congressional intelligence committees a notification of the deployment of such technology.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf4b19c7d5f6d466291147a4c052ae1d8"><enum>(B)</enum><header>Contents</header><text display-inline="yes-display-inline">Each notification submitted pursuant to subparagraph (A) shall include a description of options considered to mitigate any identified effects on the National Airspace System relating to the use of any system or technology, including the minimization of the use of any technology that disrupts the transmission of radio or electronic signals, for carrying out the actions described in subsection (c)(1).</text></subparagraph></paragraph></subsection><subsection id="id224d2e977cbd4a33861ffdf3b26bd4ce"><enum>(i)</enum><header>Rule of construction</header><text>Nothing in this section may be construed—</text><paragraph id="idd92159acf14d42c48e5a3d334d79f814"><enum>(1)</enum><text>to vest in the Director any authority of the Secretary of Transportation or the Administrator of the Federal Aviation Administration; or</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc9cdb550fc624ec680a91e43a1fed0fd"><enum>(2)</enum><text display-inline="yes-display-inline">to vest in the Secretary of Transportation or the Administrator of the Federal Aviation Administration any authority of the Director.</text></paragraph></subsection><subsection id="idf5e4c867631045f3a3b4d2a6ef7e9975"><enum>(j)</enum><header>Termination</header><paragraph id="id1032a8cffcc54048b4904a29433dc248"><enum>(1)</enum><header>In general</header><text>Except as provided in paragraph (2), the authority to carry out this section with respect to the actions specified in subparagraphs (B) through (F) of subsection (c)(1), shall terminate on the date that is 4 years after the date of the enactment of the <short-title>Intelligence Authorization Act for Fiscal Year 2025</short-title>.</text></paragraph><paragraph id="id74bf8caa18ee4dee88dc3e67a59e83b0"><enum>(2)</enum><header>Extension</header><text>The President may extend by 1 year the termination date specified in paragraph (1) if, before termination, the President certifies to Congress that such extension is in the national security interests of the United States.</text></paragraph></subsection><subsection id="idcef3f45253db4c31a2d85dd3892e18dd" commented="no" display-inline="no-display-inline"><enum>(k)</enum><header>Scope of authority</header><text>Nothing in this section shall be construed to provide the Director or the Secretary of Transportation with additional authorities beyond those described in subsections (b) and (d).</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="idc1c489efaf1a421e9366cb05b60cd237"><enum>308.</enum><header>Limitation on availability of funds for new controlled access programs</header><text display-inline="no-display-inline">None of the funds authorized to be appropriated by this Act or otherwise made available for fiscal year 2025 for the National Intelligence Program may be obligated or expended for any controlled access program (as defined in section 501A(d) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3091a">50 U.S.C. 3091a(d)</external-xref>)), or a compartment or subcompartment therein, that is established on or after the date of the enactment of this Act, until the head of the element of the intelligence community responsible for the establishment of such program, compartment, or subcompartment, submits the notification required by section 501A(b) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3091a">50 U.S.C. 3091a(b)</external-xref>).</text></section><section id="id639ee493baf24b54ad400052c5eb704b"><enum>309.</enum><header>Limitation on transfers from controlled access programs</header><text display-inline="no-display-inline">Section 501A(b) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3091a">50 U.S.C. 3091a(b)</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id9d8f3a6e79ff40b6b168c249a18db882"><enum>(1)</enum><text>in the subsection heading, by striking <quote><header-in-text style="OLC" level="subsection">Limitation on Establishment</header-in-text></quote> and inserting <quote><header-in-text style="OLC" level="subsection">Limitations</header-in-text></quote>;</text></paragraph><paragraph id="id88640bb2e6bf4a8fae459b43989c731a"><enum>(2)</enum><text>by striking <quote>A head</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idA1275CA98DD24B3BB7BCDA8D4372F600"><paragraph commented="no" display-inline="no-display-inline" id="id233e394ec64c4b14ae7744b6f2a63d5c"><enum>(1)</enum><header>Establishment</header><text>A head</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id461fd00d95304428ba77390aa503e2cd"><enum>(3)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id17918180BB46445891FD22FF31228A18"><paragraph commented="no" display-inline="no-display-inline" id="id82eff93c60d9497095945a16215ae9e2"><enum>(2)</enum><header>Transfers</header><text>A head of an element of the intelligence community may not transfer a capability from a controlled access program, including from a compartment or subcompartment therein to a compartment or subcompartment of another controlled access program, to a special access program (as defined in section 1152(g) of the National Defense Authorization Act for Fiscal Year 1994 (<external-xref legal-doc="usc" parsable-cite="usc/50/3348">50 U.S.C. 3348(g)</external-xref>)), or to anything else outside the controlled access program, until the head submits to the appropriate congressional committees and congressional leadership notice of the intent of the head to make such transfer.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="id08682BC5BECB4B20B19E4DCB687BF0C4"><enum>310.</enum><header>Expenditure of funds for certain intelligence and counterintelligence activities of the Coast Guard</header><text display-inline="no-display-inline">The Commandant of the Coast Guard may use up to 1 percent of the amounts made available for the National Intelligence Program (as such term is defined in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>)) for each fiscal year for intelligence and counterintelligence activities of the Coast Guard relating to objects of a confidential, extraordinary, or emergency nature, which amounts may be accounted for solely on the certification of the Commandant and each such certification shall be considered to be a sufficient voucher for the amount contained in the certification.</text></section><section id="idC3FA8206089942A7B965E78474649433"><enum>311.</enum><header>Unauthorized access to intelligence community property</header><subsection commented="no" display-inline="no-display-inline" id="id4384b39c54734450b42a2f99e8831897"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text>The National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>) is amended by adding at the end the following: </text><quoted-block id="idD8CCD27AD50B41BE8314A2BAA2B68EA9" style="OLC" act-name=""><section id="id458BF01142EA46F8BD97FF8CCD548096"><enum>1115.</enum><header>Unauthorized access to intelligence community property</header><subsection commented="no" display-inline="no-display-inline" id="idC27B95F3C00F4147B0142BDE416E43FB"><enum>(a)</enum><header>In general</header><text>It shall be unlawful, within the jurisdiction of the United States, without authorization to access any property that—</text><paragraph commented="no" display-inline="no-display-inline" id="id2D85A79FCF044DF9A1EFBEF654EA0AFE"><enum>(1)</enum><text>is under the jurisdiction of an element of the intelligence community; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4027D4D72E4E42628EBF7048E9B1552C"><enum>(2)</enum><text>has been clearly marked as closed or restricted.</text></paragraph></subsection><subsection id="id912241D912664D5DA6C4B3E7424D801F"><enum>(b)</enum><header>Penalties</header><text>Any person who violates subsection (a) shall—</text><paragraph commented="no" display-inline="no-display-inline" id="idD185FBE617454D8FB47B29A810245DFF"><enum>(1)</enum><text>in the case of the first offense, be fined under title 18, United States Code, imprisoned for not more than 180 days, or both; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idF62CE5F287D74B8EA1880F355F106555"><enum>(2)</enum><text>in the case of the second offense, be fined under such title, imprisoned for not more than 3 years, or both; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8A4CE483E4B34A83BC89DB5754292535"><enum>(3)</enum><text>in the case of the third or subsequent offense, be fined under such title, imprisoned for not more than 10 years, or both. </text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idf5350a5d7ed14712a23cc8f0761069cf"><enum>(b)</enum><header display-inline="yes-display-inline">Clerical amendment</header><text>The table of contents preceding section 2 of such Act is amended by adding at the end the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id9A4912E1F73D48B0AC15102AE4A9E94B"><toc><toc-entry level="section" bold="off">Sec. 1115. Unauthorized access to intelligence community property.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id51600ff5af87409fb760aee93022788d"><enum>312.</enum><header>Strengthening of Office of Intelligence and Analysis</header><subsection commented="no" display-inline="no-display-inline" id="id102491aee5564164945a7d036b77ef4e"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Section 311 of title 31, United States Code, is amended to read as follows:</text><quoted-block style="USC" display-inline="no-display-inline" id="idC7AD7D6894ED4FC884E0ED0B1BE31ED2"><section id="idc82144bcce8e4e46a6fce0cd6f0ea057"><enum>311.</enum><header>Office of Economic Intelligence and Security</header><subsection commented="no" display-inline="no-display-inline" id="id3f30439d3db549a0950bda03760c2881"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this section, the terms <term>counterintelligence</term>, <term>foreign intelligence</term>, and <term>intelligence community</term> have the meanings given such terms in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></subsection><subsection id="idbab179a4045440c885f295191a99bb55"><enum>(b)</enum><header>Establishment</header><text>There is established within the Office of Terrorism and Financial Intelligence of the Department of the Treasury, the Office of Economic Intelligence and Security (in this section referred to as the <quote>Office</quote>), which shall—</text><paragraph id="idf1e51a96fbfe4422818b4bf90b367e08"><enum>(1)</enum><text>be responsible for the receipt, analysis, collation, and dissemination of foreign intelligence and foreign counterintelligence information relating to the operation and responsibilities of the Department of the Treasury and other Federal agencies executing economic statecraft tools that do not include any elements that are elements of the intelligence community; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc588a05986a440d8b2eedf23521d3f49"><enum>(2)</enum><text display-inline="yes-display-inline">provide intelligence support and economic analysis to Federal agencies implementing United States economic policy, including for purposes of global strategic competition; and</text></paragraph><paragraph id="ida06f247b4e8c42cc8872e52628667538" commented="no"><enum>(3)</enum><text>have such other related duties and authorities as may be assigned by the Secretary for purposes of the responsibilities described in paragraph (1), subject to the authority, direction, and control of the Secretary, in consultation with the Director of National Intelligence.</text></paragraph></subsection><subsection id="id5ee707f9541d45baa7ddf057c906d6d5"><enum>(c)</enum><header>Assistant Secretary for Economic Intelligence and Security</header><text>The Office shall be headed by an Assistant Secretary, who shall be appointed by the President, by and with the advice and consent of the Senate. The Assistant Secretary shall report directly to the Undersecretary for Terrorism and Financial Crimes.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id14bf26847b7d42d688297af137f9667a"><enum>(b)</enum><header>Clerical amendment</header><text>The table of sections at the beginning of chapter 3 of such title is amended by striking the item relating to section 311 and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id4D47CB2E2C924581AFD33BBB6CFC1054"><toc><toc-entry level="section" bold="off">311. Office of Economic Intelligence and Security.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idc1f7d58f0303483c88cf74646b7a3c14"><enum>(c)</enum><header>Conforming amendment</header><text>Section 3(4)(J) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003(4)(J)</external-xref>) is amended by striking <quote>Office of Intelligence and Analysis</quote> and inserting <quote>Office of Economic Intelligence and Security</quote>.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id10b61dd7038e44b3980f1855851d523a"><enum>(d)</enum><header display-inline="yes-display-inline">References</header><text>Any reference in a law, regulation, document, paper, or other record of the United States to the Office of Intelligence and Analysis of the Department of the Treasury shall be deemed a reference to the Office of Economic Intelligence and Security of the Department of the Treasury.</text></subsection></section><section id="id0AC00582B8EE4C3287C813C370AC8872"><enum>313.</enum><header>Report on sensitive commercially available information</header><subsection id="id6012ebe0816c48bbadf68e081cea1748"><enum>(a)</enum><header>Definitions</header><paragraph id="id9655fa77d0634cd2bec2e34998233374"><enum>(1)</enum><header>Commercially available information</header><text>The term <term>commercially available information</term> means—</text><subparagraph id="id96f14d8f5daf4b8e93659e9e8cc2fb31"><enum>(A)</enum><text>any data or other information of the type customarily made available or obtainable and sold, leased, or licensed to members of the general public or to non-governmental entities for purposes other than governmental purposes; or</text></subparagraph><subparagraph id="idd78f53ffe44c462f9d2ca962159f0e86"><enum>(B)</enum><text>data and information for exclusive government use knowingly and voluntarily provided by, procured from, or made accessible by corporate entities on their own initiative or at the request of a government entity.</text></subparagraph></paragraph><paragraph id="iddd0db74a3f8c4308b0a48236934bb71c"><enum>(2)</enum><header>Personally identifiable information</header><text>The term <term>personally identifiable information</term> means information that, alone or when combined with other information regarding an individual, can be used to distinguish or trace the identity of such individual.</text></paragraph><paragraph id="id2804a25a36ed4f3e81b1f82828eb5940"><enum>(3)</enum><header>Sensitive activities</header><text>The term <term>sensitive activities</term> means activities that, over an extended period of time—</text><subparagraph id="idECBDD7369BE045D492C6C91490B0EBF5" commented="no"><enum>(A)</enum><text>establish a pattern of life;</text></subparagraph><subparagraph id="id85D1F380036D4C1C9DB9ACD31080520E" commented="no"><enum>(B)</enum><text>reveal personal affiliations, preferences, or identifiers;</text></subparagraph><subparagraph id="idEEB4697B08914669BD78BE9A7A05103A" commented="no"><enum>(C)</enum><text>facilitate prediction of future acts;</text></subparagraph><subparagraph id="id658BFD825279430E8BEC8F2610054B67" commented="no"><enum>(D)</enum><text>enable targeting activities;</text></subparagraph><subparagraph id="id810B76FBF23347E1B76025DB682116AC" commented="no"><enum>(E)</enum><text>reveal the exercise of individual rights and freedoms, including the rights to freedom of speech and of the press, to free exercise of religion, to peaceably assemble, including membership or participation in organizations or associations, and to petition the government; or</text></subparagraph><subparagraph id="idBB4828770D8A4FF2926DC908763AB03E" commented="no"><enum>(F)</enum><text>reveal any other activity the disclosure of which could cause substantial harm, embarrassment, inconvenience, or unfairness to the United States person who engaged in the activity.</text></subparagraph></paragraph><paragraph id="id71aa642806f7455e8ba8eaab5db3349a"><enum>(4)</enum><header>Sensitive commercially available information</header><text>The term <term>sensitive commercially available information</term>—</text><subparagraph commented="no" display-inline="no-display-inline" id="id685c1c210b684f32ac10742756a4b860"><enum>(A)</enum><text display-inline="yes-display-inline">means commercially available information that is known or reasonably expected to contain—</text><clause id="ida9b66adbf2264f4687271ee958fc254f"><enum>(i)</enum><text>a substantial volume of personally identifiable information regarding United States persons; or</text></clause><clause id="ida04a97019fec4244904dc3a7e60ccea1"><enum>(ii)</enum><text>a greater than de minims volume of sensitive data;</text></clause></subparagraph><subparagraph id="idff68f339d70b4332b4aec4e95bf9dd50"><enum>(B)</enum><text>shall not include—</text><clause id="idf30e0d84e0b047a9acc4fed78ae0756d"><enum>(i)</enum><text>newspapers or other periodicals; </text></clause><clause id="idDF803ED53DFA48A98C7CD8A534088001"><enum>(ii)</enum><text>weather reports;</text></clause><clause id="idB9C235B45C4D4DF28DCBB09AB9D1FEC9"><enum>(iii)</enum><text>books;</text></clause><clause id="id83CEA8A8C4FF4616A2A52F9253AE4DEC"><enum>(iv)</enum><text>journal articles or other published works;</text></clause><clause id="idD6638E138BE1459A8A832C2129232016"><enum>(v)</enum><text>public filings or records; </text></clause><clause id="idB75B00BE01FC493A8F9E7712E1C45C09"><enum>(vi)</enum><text>documents or databases similar to those described in clauses (i) through (v), whether accessed through a subscription or accessible free of cost; or</text></clause><clause id="idf5fe6f4f5d6340c48996372630661781"><enum>(vii)</enum><text>limited data samples made available to elements of the intelligence community for the purposes of allowing such elements to determine whether to purchase the full dataset and not accessed, retained, or used for any other purpose.</text></clause></subparagraph></paragraph><paragraph id="ida841e11956984905bf5b001830a3431b"><enum>(5)</enum><header>Sensitive data</header><text>The term <term>sensitive data</term> means data that—</text><subparagraph id="idec03ba7cc749409ebb1e647cae5d4c01"><enum>(A)</enum><clause commented="no" display-inline="yes-display-inline" id="id2dc554f3479e4d598e2716ffdd45fbdd"><enum>(i)</enum><text>captures personal attributes, conditions, or identifiers that are traceable to 1 or more specific United States persons, either through the dataset or by correlating the dataset with other available information; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id87bb9c057d6d4828b80be1435f2e6e51" indent="up1"><enum>(ii)</enum><text display-inline="yes-display-inline">concerns the race or ethnicity, political opinions, religious beliefs, sexual orientation, gender identity, medical or genetic information, financial data, or any other data with respect to such specific United States person or United States persons the disclosure of which would have the potential to cause substantial harm, embarrassment, inconvenience, or unfairness to the United States person or United States persons described by the data; or</text></clause></subparagraph><subparagraph id="id6c03532dfbf9411fa2c727be3ab32e48"><enum>(B)</enum><text>captures the sensitive activities of 1 or more United States persons.</text></subparagraph></paragraph><paragraph id="id584b734b37994d34b7ed7bf8fb0d7102" commented="no"><enum>(6)</enum><header>United States person</header><text>The term <term>United States person</term> means—</text><subparagraph id="id11ce9b5640f04a8ca7a1e77d3f8357ab" commented="no"><enum>(A)</enum><text>a United States citizen or an alien lawfully admitted for permanent residence to the United States; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3a7f16cf27fc4812be4537ea5667437f"><enum>(B)</enum><text display-inline="yes-display-inline">an unorganized association substantially composed of United States citizens or permanent resident aliens; or </text></subparagraph><subparagraph id="id74f094c4751f4a07aba45231c0856dac" commented="no"><enum>(C)</enum><text>an entity organized under the laws of the United States or of any jurisdiction within the United States, with the exception of any such entity directed or controlled by a foreign government.</text></subparagraph></paragraph></subsection><subsection id="id71b00e84080e4e2d86235625ba444a0b"><enum>(b)</enum><header>Report</header><paragraph commented="no" display-inline="no-display-inline" id="id152bf57c4f474ad18db7f08b3d0d4bff"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 60 days after the date of the enactment of this Act, and annually thereafter, the head of each element of the intelligence community shall submit to the congressional intelligence committees a report on the access to, collection, processing, and use of sensitive commercially available information by the respective element. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0aa74c692c3b4002bbf54ddc13dc3514"><enum>(2)</enum><header>Contents</header><subparagraph commented="no" display-inline="no-display-inline" id="id32c186354a5045b5bddec3c2b0444cc9"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">For each dataset containing sensitive commercially available information accessed, collected, processed, or used by the element concerned for purposes other than research and development, a report required by paragraph (1) shall include the following:</text><clause id="idc200821929584fa7bbd529a1dc580444"><enum>(i)</enum><text>A description of the nature and volume of the sensitive commercially available information accessed or collected by the element.</text></clause><clause id="id99fbace79e92404b8c44284ddb518a7e"><enum>(ii)</enum><text>A description of the mission or administrative need or function for which the sensitive commercially available information is accessed or collected, and of the nature, scope, reliability, and timeliness of the dataset required to fulfill such mission or administrative need or function.</text></clause><clause id="idfe0cb00c6e8c4beb8e8983b547664f86"><enum>(iii)</enum><text>A description of the purpose of the access, collection, or processing, and the intended use of the sensitive commercially available information.</text></clause><clause id="idc5ceec32e7ba49c3a8e3341b1d1963b6"><enum>(iv)</enum><text>An identification of the legal authority for the collection or access, and processing of the sensitive commercially available information.</text></clause><clause id="id453a5fda424d46a1825e68b26b3df2a6"><enum>(v)</enum><text>An identification of the source of the sensitive commercially available information and the persons from whom the sensitive commercially available information was accessed or collected.</text></clause><clause id="id31797d6449da48cf96299b262c412318"><enum>(vi)</enum><text>A description of the mechanics of the access, collection, and processing of the sensitive commercially available information, including the Federal entities that participated in the procurement process.</text></clause><clause id="idefd4f2b1cac54d9a9a10505e03adde44"><enum>(vii)</enum><text>A description of the method by which the element has limited the access to and collection and processing of the sensitive commercially available information to the maximum extent feasible consistent with the need to fulfill the mission or administrative need.</text></clause><clause id="idba8384ae2e8045e9b10df1fe4f07e9b8"><enum>(viii)</enum><text>An assessment of whether the mission or administrative need can be fulfilled if reasonably available privacy-enhancing techniques, such as filtering or anonymizing, the application of traditional safeguards, including access limitations and retention limits, differential privacy techniques, or other information-masking techniques, such as restrictions or correlation, are implemented with respect to information concerning United States persons.</text></clause><clause id="id74feee2e3b99484abec1d95930d6e14f"><enum>(ix)</enum><text>An assessment of the privacy and civil liberties risks associated with accessing, collecting, or processing the data and the methods by which the element mitigates such risks.</text></clause><clause id="ida3d2f0e05d41499bbefa9503f5b727ad"><enum>(x)</enum><text>An assessment of the applicability of section 552a of title 5, United States Code (commonly referred to as the <term>Privacy Act of 1974</term>), if any.</text></clause><clause id="idd5f09ca7a12a4bec9d27a4e2b8d0e533"><enum>(xi)</enum><text>To the extent feasible, an assessment of the original source of the data and the method through which the dataset was generated and aggregated, and whether any element of the intelligence community previously accessed or collected the same or similar sensitive commercially available information from the source.</text></clause><clause id="idb00790484d974a37b8c7505b464d12ce"><enum>(xii)</enum><text>An assessment of the quality and integrity of the data, including, as appropriate, whether the sensitive commercially available information reflects any underlying biases or inferences, and efforts to ensure that any intelligence products created with the data are consistent with the standards of the intelligence community for accuracy and objectivity.</text></clause><clause id="ida9a46391c6914d3e8668f7546ecab0fc"><enum>(xiii)</enum><text>An assessment of the security, operational, and counterintelligence risks associated with the means of accessing or collecting the data, and recommendations for how the element could mitigate such risks.</text></clause><clause id="id6d26af5277ce443e879c4ad076305f99"><enum>(xiv)</enum><text>A description of the system in which the data is retained and processed and how the system is properly secured while allowing for effective implementation, management, and audit, as practicable, of relevant privacy and civil liberties protections.</text></clause><clause id="id7ae3f853d03847a2b1f550ea552fe1d9"><enum>(xv)</enum><text>An assessment of security risks posed by the system architecture of vendors providing sensitive commercially available information or access to such sensitive commercially available information, access restrictions for the data repository of each such vendor, and the vendor's access to query terms and, if any, relevant safeguards.</text></clause><clause id="ida6a08ed379b247a58bc0fc66a6a44ab0"><enum>(xvi)</enum><text>A description of procedures to restrict access to the sensitive commercially available information.</text></clause><clause id="id1eebb41ab06a49e49b292a103ea5069b"><enum>(xvii)</enum><text>A description of procedures for conducting, approving, documenting, and auditing queries, searches, or correlations with respect to the sensitive commercially available information.</text></clause><clause id="id743f023d02c7446292a37d70230e5924"><enum>(xviii)</enum><text>A description of procedures for restricting dissemination of the sensitive commercially available information, including deletion of information of United States persons returned in response to a query or other search unless the information is assessed to be associated or potentially associated with the documented mission-related justification for the query or search.</text></clause><clause id="id5a6a57ce64b14377b6d6e8ceed1ae46f"><enum>(xix)</enum><text>A description of masking and other privacy-enhancing techniques used by the element to protect sensitive commercially available information.</text></clause><clause id="id2fb208be3f3844a0ba26ae08ea51bf37"><enum>(xx)</enum><text>A description of any retention and deletion policies.</text></clause><clause id="ide7c03e2bcee3423591ad0bef7757633b"><enum>(xxi)</enum><text>A determination of whether unevaluated data or information has been made available to other elements of the intelligence community or foreign partners and, if so, identification of those elements or partners.</text></clause><clause id="id1b00d524ff654c0e8ed8b7ac31015586"><enum>(xxii)</enum><text>A description of any licensing agreements or contract restrictions with respect to the sensitive commercially available information.</text></clause><clause id="id9b6c89f38f3949bb8987c4aad66002ca"><enum>(xxiii)</enum><text>A data management plan for the lifecycle of the data, from access or collection to disposition.</text></clause><clause id="ide58734356726455a9c51be968422b3bf"><enum>(xxiv)</enum><text>For any item required by clauses (i) through (xxiii) that cannot be completed due to exigent circumstances relating to collecting, accessing, processing, or using sensitive commercially available information, a description of such exigent circumstances.</text></clause></subparagraph><subparagraph id="id29f0599a777f4aa6940c8180162cd237" commented="no"><enum>(B)</enum><header>Research and development data</header><text>For each dataset containing sensitive commercially available information accessed, collected, processed, or used by the element concerned solely for research and development purposes, a report required by paragraph (1) may be limited to a description of the oversight by the element of such access, collection, process, and use.</text></subparagraph></paragraph></subsection><subsection id="id50ab8d7844494c6ca474de66eb61ce1a"><enum>(c)</enum><header>Public report</header><text>The Director of National Intelligence shall make available to the public, once every 2 years, a report on the policies and procedures of the intelligence community with respect to access to and collection, processing, and safeguarding of sensitive commercially available information. </text></subsection></section><section id="id1ed2d653102d4b288271753b2378570c"><enum>314.</enum><header>Policy on collection of United States location information</header><subsection id="id5996020811d34c418f29a90e8d7d58a1"><enum>(a)</enum><header>Definitions</header><text>In this section: </text><paragraph commented="no" display-inline="no-display-inline" id="id5245d90ae85f468484ce78c20160ab94"><enum>(1)</enum><header>United States location information</header><text display-inline="yes-display-inline">The term <term>United States location information</term> means information derived or otherwise calculated from the transmission or reception of a radio signal that reveals the approximate or actual geographic location of a customer, subscriber, user, or device in the United States, or, if the customer, subscriber, or user is known to be a United States person, outside the United States.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idbd480acd138542dcb2978a61e0f9de5e"><enum>(2)</enum><header>United States person</header><text>The term <term>United States person</term> has the meaning given that term in section 101 of the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1801">50 U.S.C. 1801</external-xref>). </text></paragraph></subsection><subsection id="id7aa4fbc0767d42adbb3a70cc485e0285"><enum>(b)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Attorney General, shall issue a policy on the collection of United States location information by the intelligence community. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id9de4384ee3ec4afeb0b3281f1ae60a93"><enum>(c)</enum><header>Content</header><text display-inline="yes-display-inline">The policy required by subsection (a) shall address the filtering, segregation, use, dissemination, masking, and retention of United States location information. </text></subsection><subsection id="id6d8b12a2196b4c7caef48ceca8a566c1"><enum>(d)</enum><header>Form; public availability</header><text>The policy required by subsection (a)—</text><paragraph id="id6bf6822edecf44d4b73e39d807fff518"><enum>(1)</enum><text>shall be issued in unclassified form and made available to the public; and</text></paragraph><paragraph id="idd55f93da34f1408ca80c7425fc856e73" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text>may include a classified annex, which the Director of National Intelligence shall submit to the congressional intelligence committees. </text></paragraph></subsection></section><section id="id40429988cb2e439794527de14b0b3b2b"><enum>315.</enum><header>Display of flags, seals, and emblems other than the United States flag</header><subsection commented="no" display-inline="no-display-inline" id="id60e6c00594df4e6faff79d711d9a90d2"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="id056da98bfa374efd9c6b57ca10c36444"><enum>(1)</enum><header>Executive agency</header><text>The term <term>Executive agency</term> has the meaning given such term in section 105 of title 5, United States Code. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id257da45cfbff47648429c89888f91709"><enum>(2)</enum><header display-inline="yes-display-inline">National Intelligence Program</header><text>The term <term>National Intelligence Program</term> has the meaning given such term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph></subsection><subsection id="id59d99f87b1e0480189743f56cc900d3e"><enum>(b)</enum><header>In general</header><text>Any flag, seal, or emblem that is not the United States flag and is flown, draped, projected, or otherwise displayed as a visual and symbolic representation at a property, office, or other official location of an element of the intelligence community—</text><paragraph id="id4e8d6b70d8044b2f9631db07fa291f2f"><enum>(1)</enum><text>shall be smaller than the official United States flag; and</text></paragraph><paragraph id="id3a66ea0e891b4d1582abe792a9259662"><enum>(2)</enum><text>if flown, may not be displayed higher than or above the United States flag.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id581c8c6b79db4a77a3aba17b943e0e60"><enum>(c)</enum><header>Limitation on availability of funds for displaying and flying flags</header><text>None of the funds authorized to be appropriated by this Act or otherwise made available for fiscal year 2025 for the National Intelligence Program, may be obligated or expended to fly or display a flag over a facility of an element of the intelligence community other than the following:</text><paragraph id="idd736614498b04a8bb91e46c897ab9727"><enum>(1)</enum><text>The United States flag.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id3840c9a3c4b241f698ebc14dc716b1ab"><enum>(2)</enum><text>The POW/MIA flag.</text></paragraph><paragraph id="id09071d0699f749d0aca5fb2e82c39765"><enum>(3)</enum><text>The Hostage and Wrongful Detainee flag, pursuant to section 904 of title 36, United States Code.</text></paragraph><paragraph id="id0bf98c116fde4d7baa5765226be5a302"><enum>(4)</enum><text>The flag of a State, insular area, or the District of Columbia at a domestic location.</text></paragraph><paragraph id="id2e57fbf02dc345e2a08056fafee3e4c1"><enum>(5)</enum><text>The flag of an Indian Tribal Government.</text></paragraph><paragraph id="id92e8232ac250401ca0cc1a66f1a43af9"><enum>(6)</enum><text>The official branded flag of an Executive agency.</text></paragraph><paragraph id="id3131fc46e60c42eaa094cf5f6d9a5561" commented="no" display-inline="no-display-inline"><enum>(7)</enum><text>The flag of an element, flag officer, or general officer of the Armed Forces. </text></paragraph></subsection></section></title><title style="OLC" commented="no" level-type="subsequent" id="id976c36962b0942bc9010abc8e3a694ff"><enum>IV</enum><header>Countering foreign threats</header><subtitle id="idddef20e7405f4448af2255244555ae95" style="OLC"><enum>A</enum><header>People's Republic of China</header><section id="id43a500ad57ac4503aa8394c5b4474168"><enum>401.</enum><header>Strategy and outreach on risks posed by People's Republic of China smartport technology</header><subsection commented="no" display-inline="no-display-inline" id="id04984dea50e44c5c98935362b42dd2c5"><enum>(a)</enum><header>Strategy and outreach required</header><text display-inline="yes-display-inline">The Director of the National Counterintelligence and Security Center shall develop a strategy and conduct outreach to United States industry, including shipping companies, port operators, and logistics firms, on the risks of smartport technology of the People's Republic of China and other related risks posed by entities of the People's Republic of China, including LOGINK, China Ocean Shipping Company, Limited (COSCO), China Communications Construction Company, Limited (CCCC), China Media Group (CMG), and Shanghai Zhenhua Heavy Industries Company Limited (ZPMC), to the national security of the United States, the security of United States supply chains, and commercial activity, including with respect to delays, interruption, and lockout of access to systems and technologies that enable the free flow of commerce.</text></subsection><subsection id="iddb184cb9242c4424aadffd739bf1d741"><enum>(b)</enum><header>Consistency with statutes and Executive Orders</header><text>The Director shall carry out subsection (a) in a manner that is consistent with the following:</text><paragraph commented="no" display-inline="no-display-inline" id="idb441117224104748bc2aafe96c681f22"><enum>(1)</enum><text display-inline="yes-display-inline">Part 6 of title 33, Code of Federal Regulations, as amended by Executive Order 14116 (89 Fed. Reg. 13971; relating to amending regulations relating to the safeguarding of vessels, harbors, ports, and waterfront facilities of the United States.</text></paragraph><paragraph id="id95b8dd86ac144acca3a8e15fe363ee38"><enum>(2)</enum><text>Executive Order 14017 (86 Fed. Reg. 11849; relating to America's supply chains), or successor order.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id873dc36d3ad64b07b70334ebf1f4cc21"><enum>(3)</enum><text>Section 825 of the National Defense Authorization Act for Fiscal Year 2024 (<external-xref legal-doc="public-law" parsable-cite="pl/118/31">Public Law 118–31</external-xref>).</text></paragraph></subsection><subsection id="ide5bb21583d8f469d8298ee875549d019" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Coordination</header><text>The Director shall carry out subsection (a) in coordination with the Commandant of the Coast Guard, the Director of the Federal Bureau of Investigation, the Commander of the Office of Naval Intelligence, and such other heads of Federal agencies as the Director considers appropriate.</text></subsection></section><section id="idc36a252e220a4596a8a9ccf518db2bf6"><enum>402.</enum><header>Assessment of current status of biotechnology of People's Republic of China</header><subsection commented="no" display-inline="no-display-inline" id="id32aee2b070c24f0cb24c10a36f73f21f"><enum>(a)</enum><header>Assessment</header><text display-inline="yes-display-inline">Not later than 30 days after the date of the enactment of this Act, the Director of National Intelligence shall, in consultation with the Director of the National Counterproliferation and Biosecurity Center and such heads of elements of the intelligence community as the Director of National Intelligence considers appropriate, conduct an assessment of the current status of the biotechnology of the People's Republic of China, which shall include an assessment of how the People's Republic of China is supporting the biotechnology sector through both licit and illicit means, such as foreign direct investment, subsidies, talent recruitment, or other efforts.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id54f6b3147ac845c2a676ce1ecd6f1c9d"><enum>(b)</enum><header>Report</header><paragraph commented="no" display-inline="no-display-inline" id="idfe047c5b07da4994be370aee37ff34a9"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 30 days after the date on which the Direct of National Intelligence completes the assessment required by subsection (a), the Director shall submit to the congressional intelligence committees a report on the findings of the Director with respect to the assessment.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1efea05a912a42c9b50b4cb20a4316d3"><enum>(2)</enum><header>Form</header><text>The report submitted pursuant to paragraph (1) shall be submitted in unclassified form, but may include a classified annex.</text></paragraph></subsection></section><section id="id5C30523D31F04CA4AF04798255FB5161"><enum>403.</enum><header>Intelligence sharing with law enforcement agencies on synthetic opioid precursor chemicals originating in People’s Republic of China</header><subsection id="id0f69bd2e87d4401398092e7a9510bf90"><enum>(a)</enum><header>Strategy required</header><text>The Director of National Intelligence shall, in consultation with the head of the Office of National Security Intelligence of the Drug Enforcement Administration, the Under Secretary of Homeland Security for Intelligence and Analysis, and the heads of such other agencies as the Director considers appropriate, develop a strategy to ensure robust intelligence sharing relating to the illicit trafficking of synthetic opioid precursor chemicals from the People’s Republic of China and other source countries.</text></subsection><subsection id="idec87cad5ce6e416f8e1ed896bf46329a" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Mechanism for collaboration</header><text>The Director shall develop a mechanism so that subject matter experts in elements of the Federal Government other than elements in the intelligence community, including those without security clearances, can share information with the intelligence community relating to illicit trafficking described in subsection (a). </text></subsection></section><section id="idF207B3934BE449D29F734DE59E871AA0"><enum>404.</enum><header>Report on efforts of the People's Republic of China to evade United States transparency and national security regulations</header><subsection commented="no" display-inline="no-display-inline" id="id974701ad26514c538683c8d320bd7399"><enum>(a)</enum><header>Report required</header><text display-inline="yes-display-inline">The Director of National Intelligence shall submit to the congressional intelligence committees a report on efforts of the People's Republic of China to evade the following:</text><paragraph commented="no" display-inline="no-display-inline" id="id3825fa04ad6d4206bb688d2e26fc4819"><enum>(1)</enum><text>Identification under section 1260H of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="public-law" parsable-cite="pl/116/283">Public Law 116–283</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/10/113">10 U.S.C. 113</external-xref> note). </text></paragraph><paragraph id="id5250016639ad48bab8f40145c0ff1d50"><enum>(2)</enum><text>Restrictions or limitations imposed by any of the following:</text><subparagraph commented="no" display-inline="no-display-inline" id="ide3904a60bd514b5faaea78ca36337921"><enum>(A)</enum><text>Section 805 of the National Defense Authorization Act for Fiscal Year 2024 (<external-xref legal-doc="public-law" parsable-cite="pl/118/31">Public Law 118–31</external-xref>).</text></subparagraph><subparagraph id="id8051a90670824a50acbbdf06d7ef3096"><enum>(B)</enum><text>Section 889 of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 (<external-xref legal-doc="public-law" parsable-cite="pl/115/232">Public Law 115–232</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/41/3901">41 U.S.C. 3901</external-xref> note prec.).</text></subparagraph><subparagraph id="id080bf7f1a3d14ccbb92125e2855f74f1"><enum>(C)</enum><text>The list of specially designated nationals and blocked persons maintained by the Office of Foreign Assets Control of the Department of the Treasury (commonly known as the <quote>SDN list</quote>). </text></subparagraph><subparagraph id="id7e9e415ce1f944c3a379e164b1017cab"><enum>(D)</enum><text>The Entity List maintained by the Bureau of Industry and Security of the Department of Commerce and set forth in Supplement No. 4 to part 744 of title 15, Code of Federal Regulations.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idb67af04bc59c4d9d9cbe3e380e573c12"><enum>(E)</enum><text>Commercial or dual-use export controls under the Export Control Reform Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/50/4801">50 U.S.C. 4801 et seq.</external-xref>) and the Export Administration Regulations.</text></subparagraph><subparagraph id="id5815370eb48a4c548a41fc118040dcd5"><enum>(F)</enum><text>Executive Order 14105 (88 Fed. Reg. 54867; relating to addressing United States investments in certain national security technologies and products in countries of concern), or successor order.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id583118054d964ac49b4549ffa6a177ac"><enum>(G)</enum><text>Import restrictions on products made with forced labor implemented by U.S. Customs and Border Protection pursuant to <external-xref legal-doc="public-law" parsable-cite="pl/117/78">Public Law 117–78</external-xref> (<external-xref legal-doc="usc" parsable-cite="usc/22/6901">22 U.S.C. 6901</external-xref> note).</text></subparagraph></paragraph></subsection><subsection id="id710075b1363147a28624417f838acd47" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Form</header><text>The report submitted pursuant to subsection (a) shall be submitted in unclassified form. </text></subsection></section><section id="id5595e57012a140af9f044b542d231607"><enum>405.</enum><header>Plan for recruitment of Mandarin speakers</header><subsection id="iddf042a19e3b94eee99da8868d6cd6ad9"><enum>(a)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the appropriate congressional committees a comprehensive plan to prioritize the recruitment and training of individuals who speak Mandarin Chinese for each element of the intelligence community.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idbb6b96b626c24dae9cd3212a9e2e7e05"><enum>(b)</enum><header>Appropriate congressional committees</header><text>In this section, the term <term>appropriate congressional committees</term> means—</text><paragraph id="ida9e0213837454a4cb922c3e3a849de8a"><enum>(1)</enum><text>the Select Committee on Intelligence and the Committee on the Judiciary of the Senate; and</text></paragraph><paragraph id="idc3aaa5b6fa954700adb05f6eb20ef72d"><enum>(2)</enum><text>the Permanent Select Committee on Intelligence and the Committee on the Judiciary of the House of Representatives. </text></paragraph></subsection></section></subtitle><subtitle id="id9d1e89dfd4714da680fda36fbfb86bb3" style="OLC"><enum>B</enum><header>The Russian Federation</header><section id="id9de188ff76f742f394074cb7c46489b2"><enum>411.</enum><header>Assessment of Russian Federation sponsorship of acts of international terrorism</header><subsection id="idb79240e3672b485aa4ccde6131380d62"><enum>(a)</enum><header>Definitions</header><text>In this section—</text><paragraph commented="no" display-inline="no-display-inline" id="idb62fc873eeb544a9935ff6092d70bb2e"><enum>(1)</enum><header>Appropriate congressional committees</header><text display-inline="yes-display-inline">The term <term>appropriate congressional committees</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="idb4f27f95541a411db60791cfdc86e925"><enum>(A)</enum><text display-inline="yes-display-inline">the Select Committee on Intelligence, the Committee on Foreign Relations, and the Committee on Armed Services of the Senate; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id569ff4da76bf44da91d3dee7233d4db1"><enum>(B)</enum><text display-inline="yes-display-inline">the Permanent Select Committee on Intelligence, the Committee on Foreign Affairs, and the Committee on Armed Services of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id349007a46e4a4d089525b49f4d886f0d" commented="no"><enum>(2)</enum><header>Foreign terrorist organization</header><text>The term <term>foreign terrorist organization</term> means an organization that has been designated as a foreign terrorist organization by the Secretary of State, pursuant to section 219 of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1189">8 U.S.C. 1189</external-xref>).</text></paragraph><paragraph id="id31be2a516df14562b70f7499f760cc90" commented="no"><enum>(3)</enum><header>Specially designated global terrorist organization</header><text>The term <term>specially designated global terrorist organization</term> means an organization that has been designated as a specially designated global terrorist by the Secretary of State or the Secretary, pursuant to Executive Order 13224 (<external-xref legal-doc="usc" parsable-cite="usc/50/1701">50 U.S.C. 1701</external-xref> note; relating to blocking property and prohibiting transactions with persons who commit, threaten to commit, or support terrorism). </text></paragraph><paragraph id="id4450826c199a43f5b9b9cb622e3449b4" commented="no"><enum>(4)</enum><header>State sponsor of terrorism</header><text>The term <term>state sponsor of terrorism</term> means a country the government of which the Secretary of State has determined has repeatedly provided support for acts of international terrorism, for purposes of—</text><subparagraph id="id264e5ce6d84e41c7ae5adf61b8ce91f0" commented="no"><enum>(A)</enum><text>section 1754(c)(1)(A)(i) of the Export Control Reform Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/50/4813">50 U.S.C. 4813(c)(1)(A)(i)</external-xref>);</text></subparagraph><subparagraph id="ide061530c6d354725b43c53fc6eb177c8" commented="no"><enum>(B)</enum><text>section 620A of the Foreign Assistance Act of 1961 (<external-xref legal-doc="usc" parsable-cite="usc/22/2371">22 U.S.C. 2371</external-xref>);</text></subparagraph><subparagraph id="idfe25838f74af49f1ad36ecc3e14dd68c" commented="no"><enum>(C)</enum><text>section 40(d) of the Arms Export Control Act (<external-xref legal-doc="usc" parsable-cite="usc/22/2780">22 U.S.C. 2780(d)</external-xref>); or</text></subparagraph><subparagraph id="idd44defeed72544009acf296206f21e86" commented="no" display-inline="no-display-inline"><enum>(D)</enum><text>any other provision of law. </text></subparagraph></paragraph></subsection><subsection id="id395a6987f6864caa8e69466d907967bf"><enum>(b)</enum><header>Assessment required</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall conduct and submit to the appropriate congressional committees an assessment on the extent to which the Russian Federation—</text><paragraph commented="no" display-inline="no-display-inline" id="id9b87931ba3b64b0e8992d6eefc87a7c4"><enum>(1)</enum><text display-inline="yes-display-inline">provides support for acts of international terrorism; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9fd7bc272a5048c5a706c18c802f62a5"><enum>(2)</enum><text display-inline="yes-display-inline">cooperates with the antiterrorism efforts of the United States.</text></paragraph></subsection><subsection id="id7298b5fcbf4b4116a7938d1e9434ed49"><enum>(c)</enum><header>Elements</header><text>The assessment required by subsection (b) shall include the following:</text><paragraph id="id9aeb64b715de4cccb3207d3a77324c28"><enum>(1)</enum><text>A list of all instances in which the Russian Federation, or an official of the Russian Federation, has failed to show support for or cooperate with the United States on international efforts to combat terrorism, such as apprehending, prosecuting, or extraditing suspected and known terrorists, including members of foreign terrorist organizations, and sharing intelligence to deter terrorist attacks. </text></paragraph><paragraph id="ida795479470c44e50b1061357b5536484"><enum>(2)</enum><text>A list of all instances in which the Russian Federation, or an official of the Russian Federation, has provided financial, material, technical, or lethal support to foreign terrorist organizations, specially designated global terrorist organizations, state sponsors of terrorism, or for acts of international terrorism.</text></paragraph><paragraph id="id5bf62772d9844f9baa77bf579c4666ed"><enum>(3)</enum><text>A list of all instances in which the Russian Federation, or an official of the Russian Federation, has willfully aided or abetted—</text><subparagraph id="ide8fce6a621004ab894c9bb8320052996"><enum>(A)</enum><text>the international proliferation of nuclear explosive devices to persons;</text></subparagraph><subparagraph id="id4b499966afbe4dcb9dfabbc8ba183e61"><enum>(B)</enum><text>a person in acquiring unsafeguarded special nuclear material; or</text></subparagraph><subparagraph id="ida7cec9469f6b4eee8b1b72c88e2df44b"><enum>(C)</enum><text>the efforts of a person to use, develop, produce, stockpile, or otherwise acquire chemical, biological, or radiological weapons.</text></subparagraph></paragraph><paragraph id="id18bdfc87be2c43e0bff4353e65e61b37"><enum>(4)</enum><text>A determination of whether the activities of the Wagner Group constitute acts of international terrorism and whether such activities continue under any of the successor entities of the Wagner Group, including Afrika Corps.</text></paragraph></subsection><subsection id="idb54e87dec6a1484cb5cd9f680c90ee50"><enum>(d)</enum><header>Form</header><text>The assessment required by subsection (b) shall be submitted in unclassified form, but may include a classified annex.</text></subsection><subsection id="idd5016c9e0be4476b9cf3301b332a06dc"><enum>(e)</enum><header>Briefings</header><text>Not later than 30 days after submission of the assessment required by subsection (b), the Director of National Intelligence shall provide a classified briefing to the appropriate congressional committees on the methodology and findings of the assessment.</text></subsection></section><section id="id8FFEB5C393DF47F5BCEA72332B395AEE"><enum>412.</enum><header>Assessment of likely course of war in Ukraine</header><subsection commented="no" display-inline="no-display-inline" id="idfd8b38d38af140d48012fc0e5cf7afc4"><enum>(a)</enum><header>In general</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in collaboration with the Director of the Defense Intelligence Agency and the Director of the Central Intelligence Agency, shall submit to the congressional intelligence committees an assessment of the likely course of the war in Ukraine through December 31, 2025. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id8177eb30922144a9a8be21fb26a2c0dd"><enum>(b)</enum><header>Elements</header><text display-inline="yes-display-inline">The assessment required by subsection (a) shall include an assessment of each of the following: </text><paragraph commented="no" display-inline="no-display-inline" id="id940da7872b7f475cbf9d68831e9fe75b"><enum>(1)</enum><text display-inline="yes-display-inline">The ability of the military of Ukraine to defend against Russian aggression if the United States does, or does not, continue to provide military and economic assistance to Ukraine during the period described in such subsection.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id93e846e9614b40fd9d663d8bc8b1f5aa"><enum>(2)</enum><text display-inline="yes-display-inline">The likely course of the war during such period if the United States does, or does not, continue to provide military and economic assistance to Ukraine.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0e3e8c04eac648179c82bda587dc675f"><enum>(3)</enum><text>The ability and willingness of countries in Europe and outside of Europe to continue to provide military and economic assistance to Ukraine if the United States does, or does not, do so, including the ability of such countries to make up for any shortfall in United States assistance. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5f3f347a401946e38543850cbd878aa2"><enum>(4)</enum><text display-inline="yes-display-inline">The effects of a potential defeat of Ukraine by the Russian Federation on the potential for further aggression from the Russian Federation, the People's Republic of China, the Islamic Republic of Iran, and the Democratic People's Republic of Korea. </text></paragraph></subsection><subsection id="id6d60abfd624348368171aae36881679e" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Form</header><text>The assessment required by subsection (a) shall be submitted in unclassified form, but may include a classified annex. </text></subsection></section></subtitle><subtitle style="OLC" commented="no" level-type="subsequent" id="id77e19e484c794f45b13ba2be44d3f92d"><enum>C</enum><header>International terrorism</header><section id="id02E0CCB94E2D438495112CEBAF96AAFA"><enum>421.</enum><header>Inclusion of Hamas, Hezbollah, Al-Qaeda, and ISIS officials and members among aliens engaged in terrorist activity</header><text display-inline="no-display-inline">Section 212(a)(3)(B)(i) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1182">8 U.S.C. 1182(a)(3)(B)</external-xref>) is amended, in the undesignated matter following subparagraph (IX), by striking <quote>or spokesman of the Palestine Liberation Organization</quote> and inserting <quote>spokesperson, or member of the Palestine Liberation Organization, Hamas, Hezbollah, Al-Qaeda, ISIS, or any successor or affiliate group, or who endorses or espouses terrorist activities conducted by any of the aforementioned groups,</quote>. </text></section><section id="idE49453E484094A6A83169E2938E82F46"><enum>422.</enum><header>Assessment and report on the threat of ISIS-Khorasan to the United States</header><subsection commented="no" display-inline="no-display-inline" id="id486d4938c3924415bf466f3f3b4ac47e"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 60 days after the date of the enactment of this Act, the Director of the National Counterterrorism Center, in coordination with such elements of the intelligence community as the Director considers relevant, shall—</text><paragraph commented="no" display-inline="no-display-inline" id="idd17ea052ca1946daa5829bc09e4e2cb3"><enum>(1)</enum><text display-inline="yes-display-inline">conduct an assessment of the threats to the United States and United States citizens posed by ISIS-Khorasan; and </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id3c2708aca58949b9a249f70529ff92ab"><enum>(2)</enum><text display-inline="yes-display-inline">submit to the congressional intelligence committees a written report on the findings of the assessment. </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ida62df4dda3bb4c38adcfd49dca2e4eae"><enum>(b)</enum><header>Report elements</header><text display-inline="yes-display-inline">The report required by subsection (a) shall include the following: </text><paragraph id="ida1bd5ad52fc140058dec1d79b24c39f4"><enum>(1)</enum><text>A description of the historical evolution of ISIS-Khorasan, beginning with Al-Qaeda and the attacks on the United States on September 11, 2001.</text></paragraph><paragraph id="id0fbe642aa2ff4f8d88ac638466b7f1af"><enum>(2)</enum><text>A description of the ideology and stated intentions of ISIS-Khorasan as related to the United States and the interests of the United States, including the homeland.</text></paragraph><paragraph id="id4c58354074f24ec2b76873e9579e7cdb"><enum>(3)</enum><text>A list of all terrorist attacks worldwide attributable to ISIS-Khorasan or for which ISIS-Khorasan claimed credit, beginning on January 1, 2015.</text></paragraph><paragraph id="idb90fd88dc4394ec582b2b27529170a41"><enum>(4)</enum><text>A description of the involvement of ISIS-Khorasan in Afghanistan before, during, and after the withdrawal of United States military and civilian personnel and resources in August 2021.</text></paragraph><paragraph id="idb04f72024948488fb335740683295389"><enum>(5)</enum><text>The recruiting and training strategy of ISIS-Khorasan following the withdrawal described in paragraph (4), including—</text><subparagraph commented="no" display-inline="no-display-inline" id="id16f8bd10ea19467184c90f358957e7b1"><enum>(A)</enum><text display-inline="yes-display-inline">the geographic regions in which ISIS-Khorasan is physically present; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf741fdf3ea2342e4b9808711d7552106"><enum>(B)</enum><text display-inline="yes-display-inline">regions from which ISIS-Khorasan is recruiting; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idce602253d4464e3684e08bf358beaa95"><enum>(C)</enum><text display-inline="yes-display-inline">its ambitions for individual actors worldwide and in the United States.</text></subparagraph></paragraph><paragraph id="id3d9d777e79e84623aa576e407df4395b"><enum>(6)</enum><text>A description of the relationship between ISIS-Khorasan and ISIS core, the Taliban, Al-Qaeda, and other terrorist groups, as appropriate.</text></paragraph><paragraph id="id0328e20644d64748b722799f508442d5"><enum>(7)</enum><text>A description of the association of members of ISIS-Khorasan with individuals formerly detained at United States Naval Station, Guantanamo Bay, Cuba. </text></paragraph><paragraph id="ide0b13d8b65de4b4293e52458de8dff6b"><enum>(8)</enum><text>A description of ISIS-Khorasan's development of, and relationships with, travel facilitation networks in Europe, Central Asia, Eurasia, and Latin America.</text></paragraph><paragraph id="idf53a519617cf44a7885b93216af94051"><enum>(9)</enum><text>An assessment of ISIS-Khorasan's understanding of the border and immigration policies and enforcement of the United States.</text></paragraph><paragraph id="id9f258196f86646e8b161d88b1ccfeda0"><enum>(10)</enum><text>An assessment of the known travel of members of ISIS-Khorasan within the Western Hemisphere and specifically across the southern border of the United States.</text></paragraph></subsection><subsection id="id55535ac1b879413ea9d5371583286428" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Form</header><text>The report required by subsection (a) shall be submitted in unclassified form, but may include a classified annex. </text></subsection></section><section id="id1C39F6CF49A14CC88DCC8FF9DB59ADFB"><enum>423.</enum><header>Terrorist financing prevention</header><subsection commented="no" display-inline="no-display-inline" id="idbe519029e2064657886ba62298bf1fe2"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id32fb50473a0c4764bbb249597e728e1d"><enum>(1)</enum><header>Digital asset</header><text>The term <term>digital asset</term> means any digital representation of value that is recorded on a cryptographically secured distributed ledger or any similar technology, or another implementation which was designed and built as part of a system to leverage or replace blockchain or distributed ledger technology or their derivatives.</text></paragraph><paragraph id="id8d63a9cde62146db8f15b1e2e234f0ba"><enum>(2)</enum><header>Digital asset protocol</header><text>The term <term>digital asset protocol</term> means any communication protocol, smart contract, or other software—</text><subparagraph commented="no" display-inline="no-display-inline" id="idbc4b3e1ff76b495a88cb6f2806a02265"><enum>(A)</enum><text display-inline="yes-display-inline">deployed through the use of distributed ledger or similar technology; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4c26f2a7a07d4e5c84318a5b57dfb055"><enum>(B)</enum><text display-inline="yes-display-inline">that provides a mechanism for users to interact and agree to the terms of a trade for digital assets. </text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf3639ce4ca514ffab5f53999dd12046f"><enum>(3)</enum><header>Foreign digital asset transaction facilitator</header><text display-inline="yes-display-inline">The term <term>foreign digital asset transaction facilitator</term> means any foreign person or group of foreign persons that, as determined by the Secretary, controls, operates, or makes available a digital asset protocol or similar facility, or otherwise materially assists in the purchase, sale, exchange, custody, or other transaction involving an exchange or transfer of value using digital assets.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id6c587c7f6b0d4dbabbef299cc3aa707e"><enum>(4)</enum><header>Foreign financial institution</header><text>The term <term>foreign financial institution</term> has the meaning given that term under section 561.308 of title 31, Code of Federal Regulations. </text></paragraph><paragraph commented="no" id="idAAF9C6E710244247A64646BC6C2B6A53"><enum>(5)</enum><header>Foreign person</header><text>The term <term>foreign person</term> means an individual or entity that is not a United States person.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id59ef58dc192b4c238d4b5707891e4301"><enum>(6)</enum><header display-inline="yes-display-inline">Foreign terrorist organization</header><text>The term <term>foreign terrorist organization</term> means an organization that has been designated as a foreign terrorist organization by the Secretary of State, pursuant to section 219 of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1189">8 U.S.C. 1189</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf86f5cd08de44a7d89b26cb148026920"><enum>(7)</enum><header>Good</header><text>The term <term>good</term> means any article, natural or manmade substance, material, supply, or manufactured product, including inspection and test equipment, and excluding technical data.</text></paragraph><paragraph id="idb65ef06f7744482f8452cceb7868bf72"><enum>(8)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of the Treasury.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id01c5a82e7d2f4e2383706182f959d4bb"><enum>(9)</enum><header>Specially designated global terrorist organization</header><text>The term <term>specially designated global terrorist organization</term> means an organization that has been designated as a specially designated global terrorist by the Secretary of State or the Secretary, pursuant to Executive Order 13224 (<external-xref legal-doc="usc" parsable-cite="usc/50/1701">50 U.S.C. 1701</external-xref> note; relating to blocking property and prohibiting transactions with persons who commit, threaten to commit, or support terrorism). </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1f85075a03db4430bd86a0ea3d015aa1"><enum>(10)</enum><header display-inline="yes-display-inline">United States person</header><text>The term <term>United States person</term> means—</text><subparagraph id="idf871469f3b9147dbb436625eced22af8"><enum>(A)</enum><text>an individual who is a United States citizen or an alien lawfully admitted for permanent residence to the United States;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7ed8df6ba1ea43b39c16760ef50a45dc"><enum>(B)</enum><text>an entity organized under the laws of the United States or any jurisdiction within the United States, including a foreign branch of such an entity; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc3078ce53fc44d8fa49251084c936859"><enum>(C)</enum><text display-inline="yes-display-inline">any person in the United States.</text></subparagraph></paragraph></subsection><subsection id="idcb80de9db080485489fceb462549de28"><enum>(b)</enum><header>Sanctions with respect to foreign financial institutions and foreign digital asset transaction facilitators that engage in certain transactions</header><paragraph id="id94c81e18b1a54119929a27342fb462be"><enum>(1)</enum><header>Mandatory identification</header><text>Not later than 60 days after the date of enactment of this Act, and periodically thereafter, the Secretary shall identify and submit to the President a report identifying any foreign financial institution or foreign digital asset transaction facilitator that has knowingly—</text><subparagraph commented="no" display-inline="no-display-inline" id="id33221a9f9ad244e99e05c41e753c4a66"><enum>(A)</enum><text display-inline="yes-display-inline">facilitated a significant financial transaction with—</text><clause commented="no" display-inline="no-display-inline" id="idfc342cd0b0a74eadb2507e46d4d536f5"><enum>(i)</enum><text display-inline="yes-display-inline">a Foreign Terrorist Organization;</text></clause><clause commented="no" display-inline="no-display-inline" id="idbb8ff4bcb44e44c5a8f3dbb73fe2e8fe"><enum>(ii)</enum><text display-inline="yes-display-inline">a specially designated global terrorist organization; or</text></clause><clause commented="no" display-inline="no-display-inline" id="idf9333ffc9a48474e97ac2aae05ca5578"><enum>(iii)</enum><text display-inline="yes-display-inline">a person identified on the list of specially designated nationals and blocked persons maintained by the Office of Foreign Assets Control of the Department of the Treasury, the property and interests in property of which are blocked pursuant to the International Emergency Economic Powers Act (<external-xref legal-doc="usc" parsable-cite="usc/50/1701">50 U.S.C. 1701 et seq.</external-xref>) for acting on behalf of or at the direction of, or being owned or controlled by, a foreign terrorist organization or a specially designated global terrorist organization; or</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id83ce96b02b774ed2ae736c8e3f3fab27"><enum>(B)</enum><text>engaged in money laundering to carry out an activity described in subparagraph (A).</text></subparagraph></paragraph><paragraph id="id9b584e5fc8894302a2b44a209f5de485"><enum>(2)</enum><header>Imposition of sanctions</header><subparagraph commented="no" display-inline="no-display-inline" id="iddd283744b6d24642afd5952d2c80e97f"><enum>(A)</enum><header>Foreign financial institutions</header><text display-inline="yes-display-inline">The President shall prohibit, or impose strict conditions on, the opening or maintaining of a correspondent account or a payable-through account in the United States by a foreign financial institution identified under paragraph (1). </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idaeaecc0631b04a889eb1c02b61185d6f"><enum>(B)</enum><header>Foreign digital asset transaction facilitators</header><text>The President, pursuant to such regulations as the President may prescribe, shall prohibit any transactions between any person subject to the jurisdiction of the United States and a foreign digital asset transaction facilitator identified under paragraph (1). </text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc462298d81b84f58abc72173203c6f30"><enum>(3)</enum><header>Implementation and penalties</header><subparagraph commented="no" display-inline="no-display-inline" id="id4f7d8b90210a4c4ebce894c4b5df3acb"><enum>(A)</enum><header>Implementation</header><text display-inline="yes-display-inline">The President may exercise all authorities provided under sections 203 and 205 of the International Emergency Economic Powers Act (<external-xref legal-doc="usc" parsable-cite="usc/50/1702">50 U.S.C. 1702</external-xref>, 1704) to the extent necessary to carry out this Act.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1d3d7b4e04484b3ba8dad0c71d60892b"><enum>(B)</enum><header>Penalties</header><text display-inline="yes-display-inline">The penalties set forth in subsections (b) and (c) of section 206 of the International Emergency Economic Powers Act (<external-xref legal-doc="usc" parsable-cite="usc/50/1705">50 U.S.C. 1705</external-xref>) shall apply to a person that violates, attempts to violate, conspires to violate, or causes a violation of regulations prescribed under this section to the same extent that such penalties apply to a person that commits an unlawful act described in subsection (a) of such section 206.</text></subparagraph></paragraph><paragraph id="id4330FA52599C46CEB7D32AD5EE7E15A0"><enum>(4)</enum><header>Procedures for judicial review of classified information</header><subparagraph commented="no" display-inline="no-display-inline" id="id64a85fa8cc8243c6b31d1d0b3d30d1ec"><enum>(A)</enum><header display-inline="yes-display-inline">In general</header><text>If a finding under this subsection, or a prohibition, condition, or penalty imposed as a result of any such finding, is based on classified information (as defined in section 1(a) of the Classified Information Procedures Act (18 U.S.C. App.)), the Secretary may submit to a court reviewing the finding or the imposition of the prohibition, condition, or penalty such classified information ex parte and in camera.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id93081cf484fd469e890539f0150f261c"><enum>(B)</enum><header>Rule of construction</header><text display-inline="yes-display-inline">Nothing in this paragraph shall be construed to confer or imply any right to judicial review of any finding under this subsection or any prohibition, condition, or penalty imposed as a result of any such finding.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idfe63dc9866964bc7887dbc5513588f9e"><enum>(5)</enum><header>Waiver for national security</header><text display-inline="yes-display-inline">The Secretary may waive the imposition of sanctions under this subsection with respect to a person if the Secretary— </text><subparagraph id="id439866b7b6cb4d3ca13fff4d654389b6"><enum>(A)</enum><text>determines that such a waiver is in the national interests of the United States; and</text></subparagraph><subparagraph id="idb78cc87a530340608f6bc4886de062f3"><enum>(B)</enum><text>submits to Congress a notification of the waiver and the reasons for the waiver.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idde321e1e43cc4bc9b5ec5e9dd50db24f"><enum>(6)</enum><header>Exception for intelligence activities</header><text>This subsection shall not apply with respect to any activity subject to the reporting requirements under title V of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3091">50 U.S.C. 3091 et seq.</external-xref>) or any authorized intelligence activities of the United States.</text></paragraph><paragraph id="ideb77580cf478472ca61cecc0d7fcd7a3" commented="no"><enum>(7)</enum><header>Exception relating to importation of goods</header><text>The authorities and requirements under this section shall not include the authority or a requirement to impose sanctions on the importation of goods.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id08dcebf4e5da4a5f8fedb096cbdb9061"><enum>(c)</enum><header>Special measures for modern threats</header><text display-inline="yes-display-inline">Section 5318A of title 31, United States Code, is amended—</text><paragraph id="HDD7A1283400348A6A7CEB7B149E54514"><enum>(1)</enum><text display-inline="yes-display-inline">in subsection (a)(2)(C), by striking <quote>subsection (b)(5)</quote> and inserting <quote>paragraphs (5) and (6) of subsection (b)</quote>; and </text></paragraph><paragraph id="H304C8F64BF5D49569BD95736A8F5C46B"><enum>(2)</enum><text>in subsection (b)—</text><subparagraph id="HDDB66132B1D447848C0F997F880F456A"><enum>(A)</enum><text>in paragraph (5), by striking <quote>for or on behalf of a foreign banking institution</quote>; and</text></subparagraph><subparagraph id="HD8D7670922234517A4770432A38A61F9"><enum>(B)</enum><text>by adding at the end the following:</text><quoted-block id="H98627F564A6E4A03ACA4EBD2ED8C9FCF" style="OLC"><paragraph id="H9D6DF832CF5847719EE6BC4C553572B1"><enum>(6)</enum><header>Prohibitions or conditions on certain transmittals of funds</header><text>If the Secretary finds a jurisdiction outside of the United States, 1 or more financial institutions operating outside of the United States, 1 or more types of accounts within, or involving, a jurisdiction outside of the United States, or 1 or more classes of transactions within, or involving, a jurisdiction outside of the United States to be of primary money laundering concern, the Secretary, in consultation with the Secretary of State, the Attorney General, and the Chairman of the Board of Governors of the Federal Reserve System, may prohibit, or impose conditions upon, certain transmittals of funds (as such term may be defined by the Secretary in a special measure issuance, by regulation, or as otherwise permitted by law), to or from any domestic financial institution or domestic financial agency if such transmittal of funds involves any such jurisdiction, institution, type of account, class of transaction, or type of account.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="id64098fd68ef042d781551de911d23988" commented="no" display-inline="no-display-inline"><enum>(d)</enum><header>Funding</header><text>There is authorized to be appropriated to the Secretary such funds as are necessary to carry out the purposes of this section. </text></subsection></section></subtitle><subtitle style="OLC" commented="no" level-type="subsequent" id="idcea087edc0b24262986b41f09b702012"><enum>D</enum><header>Other foreign threats</header><section id="idf9dbc3b3d3bc41508a94e780b43d7545"><enum>431.</enum><header>Assessment of visa-free travel to and within Western Hemisphere by nationals of countries of concern</header><subsection commented="no" display-inline="no-display-inline" id="id09bc60905c6e420dabf1d2e718c0e6bb"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a written assessment of the impacts to national security caused by travel without a visa to and within countries in the Western Hemisphere by nationals of countries of concern. </text></subsection><subsection id="id2e7df74bd63b4d6c8a3b57139eccc76b"><enum>(b)</enum><header>Form</header><text>The assessment required by subsection (a) shall be submitted in unclassified form, but may include a classified annex. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id674c724aad384261961e53f7ad58c6a1"><enum>(c)</enum><header>Countries of concern defined</header><text>In this section, the term <term>countries of concern</term> means—</text><paragraph id="id1c6d1e3cda1a49e1a8cecd6312a4f7aa"><enum>(1)</enum><text>the Russian Federation; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idebb6531ac657430fbaecf2af607f96cf"><enum>(2)</enum><text>the People's Republic of China; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2b9c9f6e4271440fae157d290b7b6b27"><enum>(3)</enum><text>the Islamic Republic of Iran; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idcf807670207b44c18d9ec91b54962632"><enum>(4)</enum><text>the Syrian Arab Republic; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id988fdb92f39a439590f8cc655580cc54"><enum>(5)</enum><text>the Democratic People's Republic of Korea; </text></paragraph><paragraph id="ide84dbe36c8474384bd28d413cb6b8e55"><enum>(6)</enum><text>the Bolivarian Republic of Venezuela; and </text></paragraph><paragraph id="id98edd41230eb4c0d88e3267a7cd31464" commented="no" display-inline="no-display-inline"><enum>(7)</enum><text>the Republic of Cuba.</text></paragraph></subsection></section><section id="id31C1B27992E54BA8BB1773A049CA526D"><enum>432.</enum><header>Study on threat posed by foreign investment in United States agricultural land</header><subsection id="ide42ad25c23bd4860a0e981cf472f50fd"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id33beedb80185458c973fda6ee30ca324"><enum>(1)</enum><header>Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subparagraph id="idbbad77db3d4a467f938d8c62c6f140fc" commented="no"><enum>(A)</enum><text>the Select Committee on Intelligence, the Committee on Agriculture, Nutrition, and Forestry, the Committee on Foreign Relations, and the Committee on Banking, Housing, and Urban Affairs of the Senate; and</text></subparagraph><subparagraph id="id28ce66901342429cb73cb7187cfac35b" commented="no"><enum>(B)</enum><text>the Permanent Select Committee on Intelligence, the Committee on Agriculture, the Committee on Foreign Affairs, and the Committee on Financial Services of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id2a170c4a622b449082a897eb6265c4eb"><enum>(2)</enum><header>Director</header><text>The term <term>Director</term> means the Director of National Intelligence.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id60b50250c1c94793aab4dfce2c941e76"><enum>(3)</enum><header>Nonmarket economy country</header><text>The term <term>nonmarket economy country</term> has the meaning given that term in section 771(18) of the Tariff Act of 1930 (<external-xref legal-doc="usc" parsable-cite="usc/19/1677">19 U.S.C. 1677(18)</external-xref>).</text></paragraph></subsection><subsection id="idd9af788fd97a490a950d60ab26906cf9"><enum>(b)</enum><header>Study and briefing</header><paragraph id="id70c57cf45ea141988486542c9a591e78"><enum>(1)</enum><header>In general</header><text>Not later than 1 year after the date of the enactment of this Act, the Director, in coordination with the elements of the intelligence community the Director considers appropriate and with the Secretary of State, the Secretary of Agriculture, and the Secretary of the Treasury, shall—</text><subparagraph commented="no" display-inline="no-display-inline" id="iddc7a508f0a694d80ad31d6bf8750b032"><enum>(A)</enum><text display-inline="yes-display-inline">complete a study on the threat posed to the United States by foreign investment in agricultural land in the United States; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida6a69f6e9cc54b079948639d280395a6"><enum>(B)</enum><text display-inline="yes-display-inline">provide to the appropriate committees of Congress a briefing on the results of the study. </text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idba1ba2a140114001ba42135c74a10324"><enum>(2)</enum><header>Data</header><text>In conducting the study required by paragraph (1), the Director shall process and analyze relevant data collected by the Secretary of State, the Secretary of Agriculture, and the Secretary of the Treasury, including the information submitted to the Secretary of Agriculture under section 2 of the Agricultural Foreign Investment Disclosure Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/7/3501">7 U.S.C. 3501</external-xref>). </text></paragraph><paragraph id="id8d03bdf7d67c475cbb79228b8d7492d0"><enum>(3)</enum><header>Elements</header><text>The study required by paragraph (1) shall include the following:</text><subparagraph id="idc67cf7074b54489c923b426cf2ceaceb"><enum>(A)</enum><text>Data and an analysis of agricultural land holdings, including current and previous uses of the land disaggregated by sector and industry, in each county in the United States held by a foreign person from—</text><clause id="id1f400861ea744284a8a813e5a7b739ad"><enum>(i)</enum><text>a country identified as a country that poses a risk to the national security of the United States in the most recent annual report on worldwide threats issued by the Director pursuant to section 108B of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3043b">50 U.S.C. 3043b</external-xref>) (commonly known as the <quote>Annual Threat Assessment</quote>);</text></clause><clause id="id7b9d225eda4b4b71a688c4b92962bcb1"><enum>(ii)</enum><text>a nonmarket economy country; or</text></clause><clause id="id2ad5e95389a445388b9db2ea10437705"><enum>(iii)</enum><text>any other country that the Director determines to be appropriate.</text></clause></subparagraph><subparagraph id="ida209ece5dcda4bd1865253057ed20d14"><enum>(B)</enum><text>An analysis of the proximity of the agricultural land holdings to critical infrastructure and military installations.</text></subparagraph><subparagraph id="idcda82f742fc04563b50392b529ed9a15"><enum>(C)</enum><text>An assessment of the threats posed to the national security of the United States by malign actors that use foreign investment in agricultural land in the United States.</text></subparagraph><subparagraph id="id48a659349da64608869e956761bd77a8"><enum>(D)</enum><text>An assessment of warning indicators and methods by which to detect potential threats from the use by foreign adversaries of agricultural products for nefarious ends.</text></subparagraph><subparagraph id="id25f1fd69707d484391e0a7f39d50aa7f" commented="no" display-inline="no-display-inline"><enum>(E)</enum><text>An assessment of additional resources or authorities necessary to counter threats identified during the study. </text></subparagraph></paragraph></subsection></section><section id="ida4361f06d594422fb80740683ac0f5e2"><enum>433.</enum><header>Assessment of threat posed by citizenship-by-investment programs</header><subsection id="id0aa5cf44ca3a451cbd8d5272e89fcac4"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id07230b0c81d245b1880ed032767cacb8"><enum>(1)</enum><header>Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subparagraph id="ida4d4bc9b78f144ac943e156d8834d4df"><enum>(A)</enum><text>the Committee on Homeland Security and Governmental Affairs, the Committee on Foreign Relations, the Committee on Banking, Housing, and Urban Affairs, the Select Committee on Intelligence, and the Committee on the Judiciary of the Senate; and</text></subparagraph><subparagraph id="id7df674bb74844d1db223ac4ad24a8e83"><enum>(B)</enum><text>the Committee on Homeland Security, the Committee on Foreign Affairs, the Committee on Financial Services, the Permanent Select Committee on Intelligence, and the Committee on the Judiciary of the House of Representatives.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1689cbf95efb46e993728b91f5e42209"><enum>(2)</enum><header>Assistant Secretary</header><text>The term <term>Assistant Secretary</term> means the Assistant Secretary for Intelligence and Analysis of the Department of the Treasury.</text></paragraph><paragraph id="idB10088CB3E4E46D69DFD47F3E902EFE2"><enum>(3)</enum><header>Citizenship-by-investment program</header><text>The term <term>citizenship-by-investment program</term> means an immigration, investment, or other program of a foreign country that, in exchange for a covered contribution, authorizes the individual making the covered contribution to acquire citizenship in such country, including temporary or permanent residence that may serve as the basis for subsequent naturalization.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ide906c127a9e54270bf6e5ee5480495fa"><enum>(4)</enum><header display-inline="yes-display-inline">Covered contribution</header><text>The term <term>covered contribution</term> means—</text><subparagraph id="id8FEDD7B509214E6895DB58C18E802E9D"><enum>(A)</enum><text>an investment in, or a monetary donation or any other form of direct or indirect capital transfer to, including through the purchase or rental of real estate—</text><clause id="idB4A775236A1D4F1D997A7D7776A3FDC5"><enum>(i)</enum><text>the government of a foreign country; or</text></clause><clause id="id40EA859EB74F4AD799E545562B7A7F3C"><enum>(ii)</enum><text>any person, business, or entity in such a foreign country; and</text></clause></subparagraph><subparagraph id="idBC229FC8D78541DC8F03A2CB9CA885DC"><enum>(B)</enum><text>a donation to, or endowment of, any activity contributing to the public good in such a foreign country.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id79bbe45abc3b4ecea54c6fcb1eda89e3"><enum>(5)</enum><header>Director</header><text display-inline="yes-display-inline">The term <term>Director</term> means the Director of National Intelligence.</text></paragraph></subsection><subsection id="id2ae3b9df2b484753b5035fd0146981fd"><enum>(b)</enum><header>Assessment of threat posed by citizenship-by-investment programs</header><paragraph commented="no" display-inline="no-display-inline" id="id59de25d4b6d9442f818cef918c0d7039"><enum>(1)</enum><header>Assessment</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, the Director and the Assistant Secretary, in coordination with the heads of the other elements of the intelligence community and the head of any appropriate Federal agency, shall complete an assessment of the threat posed to the United States by citizenship-by-investment programs. </text></paragraph><paragraph id="id0043090872ac407bad696d134093facc"><enum>(2)</enum><header>Elements</header><text>The assessment required by paragraph (1) shall include the following:</text><subparagraph id="idd9a8f7ead34745589dbd135332526723"><enum>(A)</enum><text>An identification of each citizenship-by-investment program, including an identification of the foreign country that operates each such program.</text></subparagraph><subparagraph id="id16acd4aa2baf4f3eae67bc7865ba9a9a"><enum>(B)</enum><text>With respect to each citizenship-by-investment program identified under subparagraph (A)—</text><clause commented="no" display-inline="no-display-inline" id="id5762fe0613014b7a8d29a64d98d041f7"><enum>(i)</enum><text>a description of the types of investments required under the program; and</text></clause><clause id="idC7DAA4D1A4214EE3B3E904B38E1F658C"><enum>(ii)</enum><text>an identification of the sectors to which an individual may make a covered contribution under the program.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7df1d54979554a9db49757359d9f22ce"><enum>(C)</enum><text display-inline="yes-display-inline">An assessment of the threats posed to the national security of the United States by malign actors that use citizenship-by-investment programs—</text><clause id="idea7b38939ab4476b8b4a2d343bbe8b7b"><enum>(i)</enum><text>to evade sanctions or taxes;</text></clause><clause id="id7e0e000ee1114ee08dbc975ea2357245"><enum>(ii)</enum><text>to facilitate or finance—</text><subclause commented="no" display-inline="no-display-inline" id="id755e67a8fc034ea494fdf9357079b201"><enum>(I)</enum><text display-inline="yes-display-inline">crimes relating to national security, including terrorism, weapons trafficking or proliferation, cybercrime, drug trafficking, human trafficking, and espionage; or </text></subclause><subclause commented="no" display-inline="no-display-inline" id="id2255eabdfd6440beb59c0293d300255e"><enum>(II)</enum><text display-inline="yes-display-inline">any other activity that furthers the interests of a foreign adversary or undermines the integrity of the immigration laws or security of the United States; or</text></subclause></clause><clause id="id49bf82f6c54b4105b2d60db4e09bbc4e"><enum>(iii)</enum><text>to undermine the United States and its interests through any other means identified by the Director and the Assistant Secretary.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9a03db51c23043eda03aac7ac4a25cbc"><enum>(D)</enum><text>An identification of the foreign countries the citizenship-by-investment programs of which pose the greatest threat to the national security of the United States. </text></subparagraph></paragraph><paragraph id="id1e4769ac354644e188bf46b4dcdd491a"><enum>(3)</enum><header>Report and briefing</header><subparagraph id="idb3147275727e4ae6b8ec483024873829"><enum>(A)</enum><header>Report</header><clause commented="no" display-inline="no-display-inline" id="id21e3c37811b34c7581c7013484d057a2"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 180 days after completing the assessment required by paragraph (1), the Director and the Assistant Secretary shall jointly submit to the appropriate committees of Congress a report on the findings of the Director and the Assistant Secretary with respect to the assessment.</text></clause><clause id="id0d764a15d93c42268b45d2652b7ed844"><enum>(ii)</enum><header>Elements</header><text>The report required by clause (i) shall include the following:</text><subclause commented="no" display-inline="no-display-inline" id="id140a89c13f6b4e8381410a496fbbe3ad"><enum>(I)</enum><text display-inline="yes-display-inline">A detailed description of the threats posed to the national security of the United States by citizenship-by-investment programs.</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id2ffeec4a4dbe448ba1d7a232484a5086"><enum>(II)</enum><text display-inline="yes-display-inline">Recommendations for additional resources or authorities necessary to counter such threats.</text></subclause><subclause id="id0fd041a5821d45d799f191f32efe1f4c"><enum>(III)</enum><text>A description of opportunities to counter such threats.</text></subclause></clause><clause id="idd868d8d857d14592881cb05acf486b4c"><enum>(iii)</enum><header>Form</header><text>The report required by clause (i) shall be submitted in unclassified form but may include a classified annex, as appropriate. </text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7bbe56076bde4b8f88a085124890dd47"><enum>(B)</enum><header>Briefing</header><text>Not later than 90 days after the date on which the report required by subparagraph (A) is submitted, the Director and Assistant Secretary shall provide the appropriate committees of Congress with a briefing on the report. </text></subparagraph></paragraph></subsection></section><section id="idbdcaa3109016492686e51e6ef20378fc"><enum>434.</enum><header>Mitigating the use of United States components and technology in hostile activities by foreign adversaries</header><subsection id="idb5bd8ce5c9be4e3f91d17539ae9ee0a2"><enum>(a)</enum><header>Findings</header><text>Congress finds the following:</text><paragraph id="id83fbfbe7c50e4dbc89d1abebf1347545"><enum>(1)</enum><text>Foreign defense material, including advanced military and intelligence capabilities, continues to rely heavily on products and services sourced from the United States.</text></paragraph><paragraph id="ida5447935d96c496e9516b5038f24eab6"><enum>(2)</enum><text>Iran drones operating against Ukraine were found to include several United States components.</text></paragraph><paragraph id="id781f3aa9fac3417a9ca339083c98ff9a"><enum>(3)</enum><text>The components described in paragraph (2) came from 13 different United States companies and are integral to the operation of the drones.</text></paragraph><paragraph id="id4014af17277d4474b84376bdbbb3f3a5"><enum>(4)</enum><text>The Chinese spy balloon that flew across the United States in 2023 used a United States internet service provider to communicate.</text></paragraph><paragraph id="id79b331c8b44043b5a3683f6489c704e6"><enum>(5)</enum><text>The connection allowed the balloon to send burst transmissions, or high-bandwidth collections of data over short periods.</text></paragraph><paragraph id="id4a589d387f6a4d4b8c0bccddf26c0a27"><enum>(6)</enum><text>Foreign adversaries and affiliated foreign defense companies frequently acquire components and services, sourced from the United States, through violation of United States export control laws.</text></paragraph></subsection><subsection id="id6b6c6220eae5478fa3ccc3428a8515e5"><enum>(b)</enum><header>Supply chain risk mitigation</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall, in collaboration with such heads of elements of the intelligence community as the Director considers appropriate, develop and commence implementation of a strategy to work with United States companies to mitigate or disrupt the acquisition and use of United States components in the conduct of activities harmful to the national security of the United States.</text></subsection><subsection id="id4cb50e2adc8f43b8bebffac30ec75196"><enum>(c)</enum><header>Goal</header><text>The goal of the strategy required by subsection (b) shall be to inform and provide intelligence support to government and private sector entities in preventing United States components and technologies from aiding or supporting hostile or harmful activities conducted by foreign adversaries of the United States.</text></subsection><subsection id="id4c6dfd5d75844c589ac663874ecda436"><enum>(d)</enum><header>Consultation</header><text>In developing and implementing the strategy required by subsection (b), the Director of National Intelligence—</text><paragraph commented="no" display-inline="no-display-inline" id="ide00bd7f6be9e478b9bc6128af3482928"><enum>(1)</enum><text display-inline="yes-display-inline">shall consult with the Secretary of Commerce, the Secretary of Defense, and the Secretary of Homeland Security; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id373b724423c344c6b28075918dfc077f"><enum>(2)</enum><text display-inline="yes-display-inline">may consult with such other heads of Federal departments or agencies as the Director of National Intelligence considers appropriate.</text></paragraph></subsection><subsection id="id359e69f2388d4974b8c873b9a923b22f" commented="no" display-inline="no-display-inline"><enum>(e)</enum><header>Annual reports</header><text>Not later than 1 year after the date of the enactment of this Act and annually thereafter until the date that is 3 years after the date of the enactment of this Act, the Director shall submit to Congress an annual report on the status and effect of the implementation of the strategy required by subsection (b). </text></subsection></section><section id="id64b1ff8577db4802b654fea4d6160d7b"><enum>435.</enum><header>Office of Intelligence and Counterintelligence review of visitors and assignees</header><subsection id="ida94b74823c754f5a80b2b72e999a049a"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="idd0100de67328412e87fe29c13275c576"><enum>(1)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text><subparagraph id="iddb372cf0531049ce95d23413f2fe923b"><enum>(A)</enum><text>the Select Committee on Intelligence and the Committee on Energy and Natural Resources of the Senate; and</text></subparagraph><subparagraph id="id3f132a6e229845da97193fecd3252c2a"><enum>(B)</enum><text>the Permanent Select Committee on Intelligence and the Committee on Energy and Commerce of the House of Representatives. </text></subparagraph></paragraph><paragraph id="id53E2E06C359A40C3897DC2019A675F31"><enum>(2)</enum><header> Assignee; visitor</header><text>The terms <term>assignee</term> and <term>visitor</term> mean a foreign national from a country identified in the report submitted to Congress by the Director of National Intelligence in 2024 pursuant to section 108B of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3043b">50 U.S.C. 3043b</external-xref>) (commonly referred to as the “Annual Threat Assessment”) as <quote>engaging in competitive behavior that directly threatens U.S. national security</quote>, who is not an employee of a National Laboratory, and has requested access to the premises, information, or technology of a National Laboratory. </text></paragraph><paragraph id="id35f260a2b6034f43901e456feb98643d"><enum>(3)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the Office of Intelligence and Counterintelligence of the Department of Energy (or their designee). </text></paragraph><paragraph id="id4e6af8b1b947470c8a14e66f26970867"><enum>(4)</enum><header>Foreign national</header><text>The term <term>foreign national</term> has the meaning given the term <term>alien</term> in section 101(a) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1101">8 U.S.C. 1101(a)</external-xref>).</text></paragraph><paragraph id="id4c907941ff774513a6816425599d4cb5"><enum>(5)</enum><header>National Laboratory</header><text>The term <term>National Laboratory</term> has the meaning given the term in section 2 of the Energy Policy Act of 2005 (<external-xref legal-doc="usc" parsable-cite="usc/42/15801">42 U.S.C. 15801</external-xref>).</text></paragraph><paragraph id="id0b6424887a3447ab97c025ec0965810a"><enum>(6)</enum><header>Non-traditional collector</header><text>The term <term>non-traditional collector</term> means an individual not employed by a foreign intelligence service, who is seeking access to sensitive information about a capability, research, or organizational dynamics of the United States to inform a foreign adversary or non-state actor.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id2e2c436ac1334908af05ed67ce3b92a1"><enum>(b)</enum><header>Findings</header><text display-inline="yes-display-inline">The Senate finds the following:</text><paragraph id="id8813831d5dff4a44a7bf87a71e39c641"><enum>(1)</enum><text>The National Laboratories conduct critical, cutting-edge research across a range of scientific disciplines that provide the United States with a technological edge over other countries.</text></paragraph><paragraph id="idd66e99a793b84a519f1c858fe7cc8dea"><enum>(2)</enum><text>The technologies developed in the National Laboratories contribute to the national security of the United States, including classified and sensitive military technology and dual-use commercial technology.</text></paragraph><paragraph id="id33c23faac68048a7b537fcfe361507c9"><enum>(3)</enum><text>International cooperation in the field of science is critical to the United States maintaining its leading technological edge.</text></paragraph><paragraph id="id7fa14ff2db8a44409ee6c9ad78f444c2"><enum>(4)</enum><text>The research enterprise of the Department of Energy, including the National Laboratories, is increasingly targeted by adversarial nations to exploit military and dual-use technologies for military or economic gain.</text></paragraph><paragraph id="id883976207d8e43b0a2ef5e0da495413e"><enum>(5)</enum><text>Approximately 40,000 citizens of foreign countries, including more than 8,000 citizens from China and Russia, were granted access to the premises, information, or technology of National Laboratories in fiscal year 2023.</text></paragraph><paragraph id="ide6888f69ba5c4542896f4164edeccb20"><enum>(6)</enum><text>The Office of Intelligence and Counterintelligence of the Department of Energy is responsible for identifying and mitigating counterintelligence risks to the Department, including the National Laboratories.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id52dbbdad2c324a0fa39b6fce549eb0df"><enum>(c)</enum><header>Sense of the Senate</header><text display-inline="yes-display-inline">It is the sense of the Senate that, before being granted access to the premises, information, or technology of a National Laboratory, citizens of foreign countries identified in the 2024 Annual Threat Assessment of the intelligence community as <quote>engaging in competitive behavior that directly threatens U.S. national security</quote> should be appropriately screened by the National Laboratory to which they seek access, and by the Office of Intelligence and Counterintelligence of the Department, to identify and mitigate risks associated with granting the requested access to sensitive military, or dual-use technologies. </text></subsection><subsection id="id8dbed57fbe404f3ca3a69ea146fbaefa"><enum>(d)</enum><header>Review of sensitive country visitor and assignee access requests</header><text>The Director shall promulgate a policy to assess the counterintelligence risk each visitor or assignee poses to the research or activities undertaken at a National Laboratory.</text></subsection><subsection id="id0cf650edbc21487daccfabc7148215e4"><enum>(e)</enum><header>Advice with respect to visitors or assignees</header><paragraph id="idc02a6c23325c4133b44f4e3d3de29cff"><enum>(1)</enum><header>In general</header><text>The Director shall provide advice to a National Laboratory on visitors and assignees when 1 or more of the following conditions are present:</text><subparagraph id="id00eb51dfd3bc4a4ba57964bfd40b71fe"><enum>(A)</enum><text>The Director has reason to believe that a visitor or assignee is a non-traditional intelligence collector.</text></subparagraph><subparagraph id="idb7468ef84dec46a7a50197f3aca3be0d"><enum>(B)</enum><text>The Director is in receipt of information indicating that a visitor or assignee constitutes a counterintelligence risk to a National Laboratory.</text></subparagraph></paragraph><paragraph id="id29f574a8741149129535795896ce1782"><enum>(2)</enum><header>Advice described</header><text>Advice provided to a National Laboratory in accordance with paragraph (1) shall include—</text><subparagraph id="id683594b4c24f4863999507977efd6504"><enum>(A)</enum><text>a description of the assessed risk;</text></subparagraph><subparagraph id="ide2763d599ccb4573b1454cb2fd4e9089"><enum>(B)</enum><text>recommendations to mitigate the risk; and</text></subparagraph><subparagraph id="id4b06105d93334699ab5a3d3ca20036e3"><enum>(C)</enum><text>identification of research or technology that would be at risk if access is granted to the visitor or assignee concerned.</text></subparagraph></paragraph></subsection><subsection id="id9ca032dd6f3b46a89fde4ccd4ebe437c"><enum>(f)</enum><header>Reports to Congress</header><text>Not later than 90 days after the date of the enactment of this Act, and quarterly thereafter, the Director shall submit to the appropriate congressional committees a report, which shall include—</text><paragraph id="idbb53fae99bc744cbaab0e09e2618871a"><enum>(1)</enum><text>the number of visitors or assignees permitted to access the premises, information, or technology of each National Laboratory;</text></paragraph><paragraph id="id7bf729a3555f477a8a593305e4347c96"><enum>(2)</enum><text>the number of instances in which the Director advised a National Laboratory in accordance with subsection (e); and</text></paragraph><paragraph id="id505b88c2a42b4db6bdc163ba452bfdac" commented="no" display-inline="no-display-inline"><enum>(3)</enum><text>the number of instances in which a National Laboratory admitted a visitor or assignee against the advice of the Director.</text></paragraph></subsection></section><section id="idB6434BC8E2AF431AB4C22DD515B2DA6A"><enum>436.</enum><header>Prohibition on National Laboratories admitting certain foreign nationals</header><subsection commented="no" display-inline="no-display-inline" id="id6221e64766e24677952a95f0b1a35111"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this section:</text><paragraph id="id88d1c5d7802a43d28403f8fcd641ac62" commented="no"><enum>(1)</enum><header>Assignee</header><text>The term <term>assignee</term> means an individual who is seeking approval from, or has been approved by, a National Laboratory to access the premises, information, or technology of the National Laboratory for a period of more than 30 consecutive days. </text></paragraph><paragraph id="id99cf50b47a964b79aa329e6905ab2006"><enum>(2)</enum><header>Covered foreign national</header><subparagraph commented="no" display-inline="no-display-inline" id="id543a5c0d43a1408eaee2b4b337a84f2d"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">The term <term>covered foreign national</term> means a foreign national of any of the following countries:</text><clause id="id30352000e8cb48ff88356b77db4e42e9"><enum>(i)</enum><text>The People’s Republic of China.</text></clause><clause id="id27ff16dc56b6474eb381c01e95f36bcd"><enum>(ii)</enum><text>The Russian Federation.</text></clause><clause id="idd6dbf95414dd4f41ad08d4a644ecdcae"><enum>(iii)</enum><text>The Islamic Republic of Iran.</text></clause><clause id="id22622e3f97a94441afa5d886bbb10af8"><enum>(iv)</enum><text>The Democratic People’s Republic of Korea.</text></clause><clause id="idb521adff10294956a6b2b54702819cbd" commented="no" display-inline="no-display-inline"><enum>(v)</enum><text>The Republic of Cuba.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida462757ce7524c869c472844cbacce6a"><enum>(B)</enum><header>Exclusion</header><text display-inline="yes-display-inline">The term <term>covered foreign national</term> does not include an individual that is lawfully admitted for permanent residence (as defined in section 101(a) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1101">8 U.S.C. 1101(a)</external-xref>)).</text></subparagraph></paragraph><paragraph id="id1840bdb306134808b5f4999e6ca8ea6a" commented="no"><enum>(3)</enum><header>Foreign national</header><text>The term <term>foreign national</term> has the meaning given the term <term>alien</term> in section 101(a) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1101">8 U.S.C. 1101(a)</external-xref>).</text></paragraph><paragraph id="idab2384b9054f4516a050f719bc6e25a3"><enum>(4)</enum><header>National Laboratory</header><text>The term <term>National Laboratory</term> has the meaning given the term in section 2 of the Energy Policy Act of 2005 (<external-xref legal-doc="usc" parsable-cite="usc/42/15801">42 U.S.C. 15801</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id33cc97fe549c4dd98ec75af7b308d696"><enum>(5)</enum><header>Senior counterintelligence official</header><text display-inline="yes-display-inline">The term <term>senior counterintelligence official</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="idbce24e4e338c4434b56660a62e02d3fe"><enum>(A)</enum><text display-inline="yes-display-inline">the Director of the Federal Bureau of Investigation;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida04d9744dad741009b8a0727ca45e317"><enum>(B)</enum><text>the Deputy Director of the Federal Bureau of Investigation;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida3ea1df56469413494acbbea2fad19fe"><enum>(C)</enum><text>the Executive Assistant Director of the National Security Branch of the Federal Bureau of Investigation; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida02806153717453483ddffdd98f033cc"><enum>(D)</enum><text>the Assistant Director of the Counterintelligence Division of the Federal Bureau of Investigation.</text></subparagraph></paragraph><paragraph id="idbbf14c7934b94a819e355803d32b9c2f" commented="no"><enum>(6)</enum><header>Visitor</header><text>The term <term>visitor</term> means an individual who is seeking approval from, or has been approved by, a National Laboratory to access the premises, information, or technology of the National Laboratory for any period shorter than a period described in paragraph (1). </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id9d791a959fe047d2b218e1c80c51b51c"><enum>(b)</enum><header>Prohibition</header><paragraph commented="no" display-inline="no-display-inline" id="id53a9689e63b04c1cb21736a152de5829"><enum>(1)</enum><header>In general</header><text>Except as provided in paragraph (2), beginning on the date of enactment of this Act, a National Laboratory—</text><subparagraph commented="no" display-inline="no-display-inline" id="ida808106a9d5045c5841ed394eea3d73e"><enum>(A)</enum><text display-inline="yes-display-inline">shall not admit as a visitor or assignee any covered foreign national; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idbae6b1ea01f04f69aaceac604b1484df"><enum>(B)</enum><text>shall prohibit access to any visitor or assignee that is a covered foreign national and has sought or obtained approval to access the premises, information, or technology of the National Laboratory as of that date.</text></subparagraph></paragraph><paragraph id="id2bdba14936dc4706a8564e0f9d2bf49e"><enum>(2)</enum><header>Waiver</header><text>Paragraph (1) shall not apply to a National Laboratory if the Secretary of Energy, in consultation with the Director of the Office of Intelligence and Counterintelligence of the Department of Energy and a senior counterintelligence official, certifies and issues a waiver to the National Laboratory requesting to admit a covered foreign national as a visitor or assignee, in writing, that the benefits to the United States of admittance or access by that covered foreign national outweigh the national security and economic risks to the United States.</text></paragraph><paragraph id="id40064F6AD0634424A8E98BAC9A6528E0"><enum>(3)</enum><header>Notification to Congress</header><text>Not later than 30 days after the date that a waiver is issued pursuant to paragraph (2), the Secretary of Energy shall submit to the Select Committee on Intelligence of the Senate, the Committee on Energy and Natural Resources of the Senate, the Committee on Commerce, Science, and Transportation of the Senate, the Permanent Select Committee on Intelligence of the House of Representatives, the Committee on Energy and Commerce of the House of Representatives, and the Committee on Science, Space, and Technology of the House of Representatives a notification describing each waiver issued pursuant to paragraph (2), including—</text><subparagraph id="id95D009B8C578417CB8BE4B2BAE69B904"><enum>(A)</enum><text>the country of origin of the covered foreign national who is the subject of the waiver;</text></subparagraph><subparagraph id="id0F6B771B09FF428EA8708DF79B7E913E"><enum>(B)</enum><text>the date of the request by the covered foreign national for admission or access to a National Laboratory; </text></subparagraph><subparagraph id="id06C54F0872BF4E458B618B0A84BD3E1F"><enum>(C)</enum><text>the date on which the decision to issue the waiver was made; and</text></subparagraph><subparagraph id="idDDE348B95E20490C97D7B432F61B9282" commented="no" display-inline="no-display-inline"><enum>(D)</enum><text>the specific reasons for issuing the waiver.</text></subparagraph></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="id4a1bb3fb296641db93da3786adb30bc7"><enum>437.</enum><header display-inline="yes-display-inline">Quarterly report on certain foreign nationals encountered at the United States border</header><subsection commented="no" display-inline="no-display-inline" id="id011fe97fb08b4d12877ae2c8a5937403"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="id6dce2b3de0b94976a85f08811a434fa9"><enum>(1)</enum><header>Encountered</header><text display-inline="yes-display-inline">The term <term>encountered</term>, with respect to a special interest alien, means physically apprehended by U.S. Customs and Border Protection personnel. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4ab90215438246fead6994f5101225bc"><enum>(2)</enum><header>Special interest alien</header><text>The term <term>special interest alien</term> means an alien (as defined in section 101(a)(3) of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1101">8 U.S.C. 1101(a)(3)</external-xref>) who, based upon an analysis of travel patterns and other information available to the United States Government, potentially poses a threat to the national security of the United States and its interests due to a known or potential nexus to terrorism, espionage, organized crime, or other malign actors.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id890f8661e0564d369e8a43bbd8fd2ea1"><enum>(b)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 60 days after the date of the enactment of this Act, and quarterly thereafter for the following 3 years, the Secretary of Homeland Security, in coordination with the Director of National Intelligence, shall publish, on a publicly accessible website of the Department of Homeland Security, a report identifying the aggregate number of special interest aliens who, during the applicable reporting period—</text><paragraph commented="no" display-inline="no-display-inline" id="idfc6d09c6c6794f27b641d9282490e4ff"><enum>(1)</enum><text display-inline="yes-display-inline">have been encountered at or near an international border of the United States; and </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id337f8cc11c0149439c833aa03c544788"><enum>(2)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="idf3a0b21fa2b04d68be09e4ebfaf4a8d2"><enum>(A)</enum><text display-inline="yes-display-inline">have been released from custody;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id80a502b7bc2542ffaf6914121b3b244f" indent="up1"><enum>(B)</enum><text display-inline="yes-display-inline">are under supervision;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" indent="up1" id="id462e37c3413f4979bb676f88812fbbd3"><enum>(C)</enum><text display-inline="yes-display-inline">are being detained by the Department of Homeland Security; or </text></subparagraph><subparagraph id="ida0a8d5a42d5d4f0894b5eeb17f8038b9" indent="up1" commented="no" display-inline="no-display-inline"><enum>(D)</enum><text display-inline="yes-display-inline">have been removed from the United States.</text></subparagraph></paragraph></subsection></section><section id="id2B7232DE6F8F4A768A8892EB3830736A"><enum>438.</enum><header>Assessment of the lessons learned by the intelligence community with respect to the Israel-Hamas war</header><subsection id="id523dabf4106646d59085b37b29ec3676"><enum>(a)</enum><header>In general</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with such other heads of elements of the intelligence community as the Director considers appropriate, shall submit to the appropriate committees of Congress a written assessment of the lessons learned from the Israel-Hamas war.</text></subsection><subsection id="id2b5dca11d6ff4774b9f44f6352d65f50"><enum>(b)</enum><header>Elements</header><text>The assessment required by subsection (a) shall include the following:</text><paragraph id="ida95aca84c1b3414fb931d4964b27ff77"><enum>(1)</enum><text>Lessons learned from the timing and scope of the October 7, 2023 attack by Hamas against Israel, including lessons related to United States intelligence cooperation with Israel and other regional partners.</text></paragraph><paragraph id="id2477766ecfaa4d1a95a0828c185a20bb"><enum>(2)</enum><text>Lessons learned from advances in warfare, including the use by adversaries of a complex tunnel network. </text></paragraph><paragraph id="id2e33dfad25c74bd8ade5b3b3651b5a1a"><enum>(3)</enum><text>Lessons learned from attacks by adversaries against maritime shipping routes in the Red Sea. </text></paragraph><paragraph id="id704e1d42c09b442d8b25a21f4228f56a"><enum>(4)</enum><text>Lessons learned from the use by adversaries of rockets, missiles, and unmanned aerial systems, including attacks by Iran. </text></paragraph><paragraph id="idbd1b6596623d45c0bd8ef4376cbaca9d"><enum>(5)</enum><text>Analysis of the impact of the Israel-Hamas war on the global security environment, including the war in Ukraine.</text></paragraph></subsection><subsection id="id36aba2c5cb4c4a299b5743925b35e8ca"><enum>(c)</enum><header>Form</header><text>The assessment required by subsection (a) shall be submitted in unclassified form, but may include a classified annex.</text></subsection><subsection id="idb7dcb168e0a4416e9ff0f43fcde2ad27"><enum>(d)</enum><header>Appropriate committees of Congress defined</header><text>In this section, the term <term>appropriate committees of Congress</term> means—</text><paragraph id="ida88d37d145624b8c98edb9eeb04ba33d"><enum>(1)</enum><text>the congressional intelligence committees;</text></paragraph><paragraph id="id4c634c87dd7b4271b3b5acea91a1905e"><enum>(2)</enum><text>the Committee on Armed Services and the Committee on Appropriations of the Senate; and</text></paragraph><paragraph id="idd58fc77b3b8e4583befd44e7498f95c3" commented="no" display-inline="no-display-inline"><enum>(3)</enum><text>the Committee on Armed Services and the Committee on Appropriations of the House of Representatives. </text></paragraph></subsection></section><section id="id9e58b5b42433480f8aade96487425faa"><enum>439.</enum><header>Central Intelligence Agency intelligence assessment on Tren de Aragua</header><subsection id="id1c5f939b19d3454ca138866a2cfbd797"><enum>(a)</enum><header>In general</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of the Central Intelligence Agency, in consultation with such other heads of elements of the intelligence community as the Director considers appropriate, shall submit to the appropriate committees of Congress an intelligence assessment on the gang known as <quote>Tren de Aragua</quote>.</text></subsection><subsection id="id3b2637ff36a245bcb58e98eefa5d0878"><enum>(b)</enum><header>Elements</header><text>The intelligence assessment required by subsection (a) shall include the following:</text><paragraph id="idb6be4879138e466a8a95e8bdc904a63b"><enum>(1)</enum><text>A description of the key leaders, organizational structure, subgroups, presence in countries in the Western Hemisphere, and cross-border illicit drug smuggling routes of Tren de Aragua.</text></paragraph><paragraph id="idae2ccaaceecb499693a5302ac1010696"><enum>(2)</enum><text>A description of the practices used by Tren de Aragua to generate revenue.</text></paragraph><paragraph id="idaa3fc2c0570d408e9928fc2bf83ab137"><enum>(3)</enum><text>A description of the level at which Tren de Aragua receives support from the regime of Nicolás Maduro in Venezuela.</text></paragraph><paragraph id="id36d3410dba8b46ad9ca5ae3cebf87761"><enum>(4)</enum><text>A description of the manner in which Tren de Aragua is exploiting heightened migratory flows out of Venezuela and throughout the Western Hemisphere to expand its operations.</text></paragraph><paragraph id="id0ef318e76b194251808e22d876a8fba3"><enum>(5)</enum><text>A description of the degree to which Tren de Aragua cooperates or competes with other criminal organizations in the Western Hemisphere.</text></paragraph><paragraph id="id25936a56c2764f8686c407714b0f918a"><enum>(6)</enum><text>An estimate of the annual revenue received by Tren de Aragua from the sale of illicit drugs, kidnapping, and human trafficking, disaggregated by activity.</text></paragraph><paragraph id="id520c9fdc6e7c43378b10acac29663351"><enum>(7)</enum><text>A determination on whether Tren De Aragua meets the definition of <quote>significant transnational criminal organization</quote> in section 3 of Executive Order 13581 (76 Fed. Reg. 44757; relating to blocking property of transnational criminal organizations), as amended by Executive Order 13863 (84 Fed. Reg. 10255; relating to taking additional steps to address the national emergency with respect to significant transnational criminal organizations).</text></paragraph><paragraph id="id9586ef6ca2ee404fbab370f40e780ac5"><enum>(8)</enum><text>Any other information the Director of the Central Intelligence Agency considers relevant.</text></paragraph></subsection><subsection id="ide7d29657ca594a92ab5c103ae56a909d"><enum>(c)</enum><header>Form</header><text>The intelligence assessment required by subsection (a) may be submitted in classified form.</text></subsection><subsection id="id930fc18bc7f64ec481c212e2888ef672"><enum>(d)</enum><header>Definition of appropriate committees of Congress</header><text>In this section, the term <term>appropriate committees of Congress</term> means—</text><paragraph id="idbcd726bcf09648379ee79a59a7f172a0"><enum>(1)</enum><text>the congressional intelligence committees;</text></paragraph><paragraph id="id8755c268219b4c67bddc6e192c2b72f1"><enum>(2)</enum><text>the Committee on Foreign Relations, the Committee on Homeland Security and Governmental Affairs, the Committee on Banking, Housing, and Urban Affairs, and the Committee on Appropriations of the Senate; and</text></paragraph><paragraph id="id4416898699a74fc58c28b909ecfd6655" commented="no" display-inline="no-display-inline"><enum>(3)</enum><text>the Committee on Foreign Affairs, the Committee on Homeland Security, and the Committee on Appropriations of the House of Representatives. </text></paragraph></subsection></section><section id="id2ac07bb38c664a319ac04e6bd533d62c"><enum>440.</enum><header>Assessment of Maduro regime’s economic and security relationships with state sponsors of terrorism and foreign terrorist organizations</header><subsection commented="no" display-inline="no-display-inline" id="id9c35104276bc4bfa81b5c0cb4403855d"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees a written assessment of the economic and security relationships of the regime of Nicolás Maduro of Venezuela with the countries and organizations described in subsection (b), including formal and informal support to and from such countries and organizations. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id509196e9d58c40c786ab26b555b83fb7"><enum>(b)</enum><header>Countries and organizations described</header><text>The countries and organizations described in this subsection are the following: </text><paragraph commented="no" display-inline="no-display-inline" id="id34f58ca62b8a44e495f35238964537b0"><enum>(1)</enum><text display-inline="yes-display-inline">The following countries designated by the United States as state sponsors of terrorism:</text><subparagraph id="id007d34aa60094e60b99bfa4296d2b169"><enum>(A)</enum><text>The Republic of Cuba. </text></subparagraph><subparagraph id="id06213765931f485ca456f487dd78355e"><enum>(B)</enum><text>The Islamic Republic of Iran.</text></subparagraph></paragraph><paragraph id="idf6912c0b9f8d48a9984b2cc245432279"><enum>(2)</enum><text>The following organizations designated by the United States as foreign terrorist organizations:</text><subparagraph id="idb799819d12bd4f34abe1b0ea319aa18d" commented="no"><enum>(A)</enum><text>The National Liberation Army (ELN).</text></subparagraph><subparagraph id="ide777b940a41f4a0a95394b0f591c7a72" commented="no"><enum>(B)</enum><text>The Revolutionary Armed Forces of Colombia–People’s Army (FARC-EP).</text></subparagraph><subparagraph id="id7bd35fd0af8f49f185ef3c2f85e76999" commented="no"><enum>(C)</enum><text>The Segunda Marquetalia.</text></subparagraph></paragraph></subsection><subsection id="id024fe17374c6447b986af62f390a2989" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Form</header><text>The assessment required by subsection (a) shall be submitted in unclassified form, but may include a classified annex.</text></subsection></section><section id="id57F9DD9B80F44319BFC565F7936243BF"><enum>441.</enum><header>Continued congressional oversight of Iranian expenditures supporting foreign military and terrorist activities</header><subsection commented="no" display-inline="no-display-inline" id="idadc06780320544bdae5a70574bf8e454"><enum>(a)</enum><header>Update required</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees an update to the report submitted under section 6705 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/22/9412">22 U.S.C. 9412</external-xref>) to reflect current occurrences, circumstances, and expenditures.</text></subsection><subsection id="id0ac7d520a87b43f39f0b0cb4ad559481" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Form</header><text>The update submitted pursuant to subsection (a) shall be submitted in unclassified form, but may include a classified annex. </text></subsection></section></subtitle></title><title style="OLC" commented="no" level-type="subsequent" id="idd8db965086e9419291bbabad94e1326a"><enum>V</enum><header>Emerging technologies</header><section id="id5dfc6aeb399a4676acdeff9bd73b5386"><enum>501.</enum><header>Strategy to counter foreign adversary efforts to utilize biotechnologies in ways that threaten United States national security</header><subsection id="id8e73e81f99c444b18b7fc5d0030dfa95"><enum>(a)</enum><header>Sense of Congress</header><text>It is the sense of Congress that as biotechnologies become increasingly important with regard to the national security interests of the United States, and with the addition of biotechnologies to the biosecurity mission of the National Counterproliferation and Biosecurity Center, the intelligence community must articulate and implement a whole-of-government strategy for addressing concerns relating to biotechnologies.</text></subsection><subsection id="id54182d62044342feb4403a2f5329667f"><enum>(b)</enum><header>Strategy for biotechnologies critical to national security</header><paragraph commented="no" display-inline="no-display-inline" id="id6295065555c4423780e4c5bd9fcb352d"><enum>(1)</enum><header>Strategy required</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall, acting through the Director of the National Counterproliferation and Biosecurity Center and in coordination with the heads of such other elements of the intelligence community as the Director of National Intelligence considers appropriate, develop and submit to the congressional intelligence committees a whole-of-government strategy to address concerns relating to biotechnologies.</text></paragraph><paragraph id="id03cce0b2d016448cbf3a13a41471f83b"><enum>(2)</enum><header>Elements</header><text>The strategy developed and submitted pursuant to paragraph (1) shall include the following:</text><subparagraph id="id0416cd2b3f204e0080706afb7bd462ac"><enum>(A)</enum><text>Identification and assessment of biotechnologies critical to the national security of the United States, including an assessment of which materials involve a dependency on foreign adversary nations.</text></subparagraph><subparagraph id="id00833243b0c1497f80f4ddd78187cd28"><enum>(B)</enum><text>A determination of how best to counter foreign adversary efforts to utilize biotechnologies that threaten the national security of the United States, including technologies identified pursuant to paragraph (1).</text></subparagraph><subparagraph id="id3b2bfc4f289c48e982b2244a2b6b8fc1"><enum>(C)</enum><text>A plan to support United States efforts and capabilities to secure the United States supply chains of the technologies identified pursuant to paragraph (1), by coordinating—</text><clause id="id6a10ea44f99f441e8f4cc254c13c8893"><enum>(i)</enum><text>across the intelligence community;</text></clause><clause id="id4b7e443c170d42aaba395e4f391fcc5f"><enum>(ii)</enum><text>the support provided by the intelligence community to other relevant Federal agencies and policymakers;</text></clause><clause commented="no" display-inline="no-display-inline" id="id9a77dc84f3014895a4b153690acf8d9b"><enum>(iii)</enum><text display-inline="yes-display-inline">the engagement of the intelligence community with private sector entities; and</text></clause><clause id="iddb448f77ad684dd4a6fa77c6644a181d"><enum>(iv)</enum><text>how the intelligence community can support securing United States supply chains for and use of biotechnologies.</text></clause></subparagraph><subparagraph id="idb74f30f0af8f41b6b606daa136a5b9c3"><enum>(D)</enum><text>Proposals for such legislative or administrative action as the Directors consider necessary to support the strategy.</text></subparagraph></paragraph></subsection></section><section id="id5320c2e77efd461ba7633fc651966e4e"><enum>502.</enum><header>Improvements to the roles, missions, and objectives of the National Counterproliferation and Biosecurity Center</header><text display-inline="no-display-inline">Section 119A of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3057">50 U.S.C. 3057</external-xref>) is amended—</text><paragraph id="id1a6b13684c574ed788273e5ef96416dc"><enum>(1)</enum><text>in subsection (a)(4), by striking <quote>biosecurity and</quote> and inserting <quote>counterproliferation, biosecurity, and</quote>; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idef19b5e2c1e54e32afbfe4fb6b0d4965"><enum>(2)</enum><text display-inline="yes-display-inline">in subsection (b)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id59f4637814004d30b4068ea8c21e091f"><enum>(A)</enum><text display-inline="yes-display-inline">in paragraph (1)—</text><clause commented="no" display-inline="no-display-inline" id="idcbabc309a3b64c5b81278f2cfd449775"><enum>(i)</enum><text>in subparagraph (A), by striking <quote>analyzing and</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="idcbe34d3a862a48a4ab597388192c8d89"><enum>(ii)</enum><text>in subparagraph (C), by striking <quote>Establishing</quote> and inserting <quote>Coordinating the establishment of</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id712d946a2a5a4b118f133870b9dd7912"><enum>(iii)</enum><text display-inline="yes-display-inline">in subparagraph (D), by striking <quote>Disseminating</quote> and inserting <quote>Overseeing the dissemination of</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id575d7d45a3b745c487947ce83c1b65f3"><enum>(iv)</enum><text display-inline="yes-display-inline">in subparagraph (E), by inserting <quote>and coordinating</quote> after <quote>Conducting</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id10fbf0d26dad4ae39b60ef0b76f998b1"><enum>(v)</enum><text display-inline="yes-display-inline">in subparagraph (G), by striking <quote>Conducting</quote> and inserting <quote>Coordinating and advancing</quote>; and</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id32b57466a49f4290bb47b71d0afa551e"><enum>(B)</enum><text>in paragraph (2)—</text><clause commented="no" display-inline="no-display-inline" id="idd3fc90984cd54a299cb5a0494d8f4195"><enum>(i)</enum><text>in subparagraph (B), by striking <quote>and analysis</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id4671661e06d14b4ea13072a2cccdfdca"><enum>(ii)</enum><text>by redesignating subparagraphs (C) through (E) as subparagraphs (D) through (F), respectively;</text></clause><clause id="idf96bae37901d4d259066418a85ca73aa"><enum>(iii)</enum><text>by inserting after subparagraph (B) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idB0EC3F1A1C2942609E19EC4DE2C4EEF8"><subparagraph id="id7a35931869e44e47bb43024a42da47ac"><enum>(C)</enum><text>Overseeing and coordinating the analysis of intelligence on biosecurity and foreign biological threats in support of the intelligence needs of Federal departments and agencies responsible for public health, including by providing analytic priorities to elements of the intelligence community and by conducting and coordinating net assessments.</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></clause><clause commented="no" display-inline="no-display-inline" id="id9251828c004f401aa6564746d7b00f03"><enum>(iv)</enum><text>in subparagraph (D), as redesignated by clause (ii), by inserting <quote>on matters relating to biosecurity and foreign biological threats</quote> after <quote>public health</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id125373923eb94fc191d8cf2e2c99d147"><enum>(v)</enum><text>in subparagraph (F), as redesignated by clause (ii), by inserting <quote>and authorities</quote> after <quote>capabilities</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id85d2897c163c44168c894f4a360bce32"><enum>(vi)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id98965D0DF91542328F7AAC92FB2A8DE1"><subparagraph id="idb8e6e5e3996e49938d4e6ac417d92428"><enum>(G)</enum><text>Coordinating with relevant elements of the intelligence community and other Federal departments and agencies responsible for public health to engage with private sector entities on information relevant to biosecurity, biotechnology, and foreign biological threats.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></clause></subparagraph></paragraph></section><section id="id5B09DDF0FB394FF1869CFA165E9120A5"><enum>503.</enum><header>Enhancing capabilities to detect foreign adversary threats relating to biological data</header><text display-inline="no-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall, in consultation with the heads of such Federal departments and agencies as the Director considers appropriate, take the following steps to standardize and enhance the capabilities of the intelligence community to detect foreign adversary threats relating to biological data:</text><paragraph id="id37d2ceba0ac146beb37ca147cc8a3757"><enum>(1)</enum><text>Prioritize the collection, analysis, and dissemination of information relating to foreign adversary use of biological data, particularly in ways that threaten or could threaten the national security of the United States.</text></paragraph><paragraph id="ide17dd3e169344685be4dd07c628b6cf5"><enum>(2)</enum><text>Issue policy guidance within the intelligence community—</text><subparagraph id="id1b2505c991ab45c9921eb2e73f287dd2"><enum>(A)</enum><text>to standardize the handling and processing of biological data, including with respect to protecting the civil liberties and privacy of United States persons;</text></subparagraph><subparagraph id="id1ea20a218c2448bc9808f79a92c0f716"><enum>(B)</enum><text>to standardize and enhance intelligence engagements with foreign allies and partners with respect to biological data; and</text></subparagraph><subparagraph id="id3edbc8ba79924131958ba5566f94fb5c"><enum>(C)</enum><text>to standardize the creation of metadata relating to biological data.</text></subparagraph></paragraph><paragraph id="id30dabc48947f4933b8f4c40c2841ad23" commented="no" display-inline="no-display-inline"><enum>(3)</enum><text>Ensure coordination with such Federal departments and agencies and entities in the private sector as the Director considers appropriate to understand how foreign adversaries are accessing and using biological data stored within the United States.</text></paragraph></section><section id="idFAEDD3EC0A3C4E58BD581F2D1ADB2FF2"><enum>504.</enum><header>National security procedures to address certain risks and threats relating to artificial intelligence</header><subsection commented="no" display-inline="no-display-inline" id="id3d96438827644528b845cc83e3cb30b1"><enum>(a)</enum><header display-inline="yes-display-inline">Findings</header><text display-inline="yes-display-inline">Congress finds the following:</text><paragraph id="id6493ed7edf184bf2b94c7afdbe2e3ddf"><enum>(1)</enum><text>Artificial intelligence systems demonstrate increased capabilities in the generation of synthetic media and computer programming code, as well as areas such as object recognition, natural language processing, and workflow orchestration.</text></paragraph><paragraph id="id95f091d2b9a84f60b8e279627c5e1404"><enum>(2)</enum><text>The growing capabilities of artificial intelligence systems in the areas described in paragraph (1), as well as the greater accessibility of large-scale artificial intelligence models and advanced computation capabilities to individuals, businesses, and governments, have dramatically increased the adoption of artificial intelligence products in the United States and globally.</text></paragraph><paragraph id="id78acc09ee8064d6e9b241d54cf43ae20"><enum>(3)</enum><text>The advanced capabilities of the systems described in paragraph (1), and their accessibility to a wide-range of users, have increased the likelihood and effect of misuse or malfunction of these systems, such as to generate synthetic media for disinformation campaigns, develop or refine malware for computer network exploitation activity, enhance surveillance capabilities in ways that undermine the privacy of citizens of the United States, and increase the risk of exploitation or malfunction of information technology systems incorporating artificial intelligence systems in mission-critical fields such as health care, critical infrastructure, and transportation.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id56d0f9753e984d24a96bdc7b209228c7"><enum>(b)</enum><header>Procedures required</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the President shall develop and issue procedures to facilitate and promote mechanisms by which—</text><paragraph commented="no" display-inline="no-display-inline" id="id9d43ee1533f64da685cf1ad50081932e"><enum>(1)</enum><text display-inline="yes-display-inline">vendors of advanced computation capabilities, vendors and commercial users of artificial intelligence systems, as well as independent researchers and other third parties, may effectively notify appropriate elements of the United States Government of—</text><subparagraph id="idac672db9c2f048b2acd4c2efe0747abf"><enum>(A)</enum><text>information security risks emanating from artificial intelligence systems, such as the use of an artificial intelligence system to develop or refine malicious software;</text></subparagraph><subparagraph id="idc7a2315acdf64d3ea932ef614f686104"><enum>(B)</enum><text>information security risks such as indications of compromise or other threat information indicating a compromise to the confidentiality, integrity, or availability of an artificial intelligence system, or to the supply chain of an artificial intelligence system, including training or test data, frameworks, computing environments, or other components necessary for the training, management, or maintenance of an artificial intelligence system;</text></subparagraph><subparagraph id="id23d07ea1a20b4aeb928d1ba5a22b9a98"><enum>(C)</enum><text>biosecurity risks emanating from artificial intelligence systems, such as the use of an artificial intelligence system to design, develop, or acquire dual-use biological entities such as putatively toxic small molecules, proteins, or pathogenic organisms; </text></subparagraph><subparagraph id="id6c756a730e2a49fba815d813ecac33b7"><enum>(D)</enum><text>suspected foreign malign influence (as defined by section 119C of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3059">50 U.S.C. 3059(f)</external-xref>)) activity that appears to be facilitated by an artificial intelligence system; and</text></subparagraph><subparagraph id="id95acb088d88841b39d661cb2d0a1283a"><enum>(E)</enum><text>any other unlawful activity facilitated by, or directed at, an artificial intelligence system;</text></subparagraph></paragraph><paragraph id="id58ad813e6d444d32a015b25fc885946b"><enum>(2)</enum><text>elements of the Federal Government may provide threat briefings to vendors of advanced computation capabilities and vendors of artificial intelligence systems, alerting them, as may be appropriate, to potential or confirmed foreign exploitation of their systems, as well as malign foreign plans and intentions. </text></paragraph></subsection><subsection id="id22943acff9e74f7e80d9e73dd3a20de7"><enum>(c)</enum><header>Briefing required</header><paragraph commented="no" display-inline="no-display-inline" id="id822323657c1a4bef974ee79756d5ad16"><enum>(1)</enum><header display-inline="yes-display-inline">Appropriate committees of Congress</header><text>In this subsection, the term <term>appropriate committees of Congress</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="id72196495a0f1458da99f9111ae05a914"><enum>(A)</enum><text display-inline="yes-display-inline">the congressional intelligence committees;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idb3e478f4a9a44439a4dc3bd8abc87dbb"><enum>(B)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idce94b7db8c5e41a69fc152d0d7014206"><enum>(C)</enum><text>the Committee on Homeland Security of the House of Representatives.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idbbfdb7f70218427fa48981df828c6f7e"><enum>(2)</enum><header>In general</header><text display-inline="yes-display-inline">The President shall provide the appropriate committees of Congress a briefing on procedures developed and issued pursuant to subsection (b).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id84ce76ccfeb24603951ce85c483b7677"><enum>(3)</enum><header>Elements</header><text display-inline="yes-display-inline">The briefing provided pursuant to paragraph (2) shall include the following:</text><subparagraph id="ide2bba7005f4e449e93381d179753e205"><enum>(A)</enum><text>A clear specification of which Federal agencies are responsible for leading outreach to affected industry and the public with respect to the matters described in subparagraphs (A) through (E) of paragraph (1) of subsection (b) and paragraph (2) of such subsection.</text></subparagraph><subparagraph id="id2ad80482c7c449409b333433a1d77252"><enum>(B)</enum><text>An outline of a plan for industry outreach and public education regarding risks posed by, and directed at, artificial intelligence systems.</text></subparagraph><subparagraph id="id50ce4e76c384408b87c0316ae7827456" commented="no" display-inline="no-display-inline"><enum>(C)</enum><text>Use of research and development, stakeholder outreach, and risk management frameworks established pursuant to—</text><clause commented="no" display-inline="no-display-inline" id="id65f0390d21ba4f49ba8588baa8d32571"><enum>(i)</enum><text display-inline="yes-display-inline">provisions of law in effect on the day before the date of the enactment of this Act; or</text></clause><clause commented="no" display-inline="no-display-inline" id="id35ba3a54c9b14721a8217b843b055d59"><enum>(ii)</enum><text display-inline="yes-display-inline">Federal agency guidelines. </text></clause></subparagraph></paragraph></subsection></section><section id="id418ce2c6f64440c8bba9e31e4216b9cb"><enum>505.</enum><header>Establishment of Artificial Intelligence Security Center</header><subsection commented="no" display-inline="no-display-inline" id="id85465d2fc3ed4f61a99ae8320a209ba8"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of the National Security Agency shall establish an Artificial Intelligence Security Center within the Cybersecurity Collaboration Center of the National Security Agency.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="ida580b0c4198f4243868bc891ade10079"><enum>(b)</enum><header>Functions</header><text display-inline="yes-display-inline">The functions of the Artificial Intelligence Security Center shall be as follows:</text><paragraph id="ide24d6ccc81274ba1ba2c5c768207cfb0"><enum>(1)</enum><text>Making available a research test bed to private sector and academic researchers, on a subsidized basis, to engage in artificial intelligence security research, including through the secure provision of access in a secure environment to proprietary third-party models, with the consent of the vendors of the models.</text></paragraph><paragraph id="id04d127f21c544bef978cdbb0ed9940e2"><enum>(2)</enum><text>Developing guidance to prevent or mitigate counter-artificial intelligence techniques.</text></paragraph><paragraph id="id588da3013fcd4cd884d06fbe8e76f216"><enum>(3)</enum><text>Promoting secure artificial intelligence adoption practices for managers of national security systems (as defined in section 3552 of title 44, United States Code) and elements of the defense industrial base. </text></paragraph><paragraph id="id8edd0414455449dca359d774fb77825a"><enum>(4)</enum><text>Coordinating with the Artificial Intelligence Safety Institute of the National Institute of Standards and Technology.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id068543b74e1640f6bfdd26e660431d36"><enum>(5)</enum><text>Such other functions as the Director considers appropriate.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id8c6e4b69174343cc8097b7a2c55b23cb"><enum>(c)</enum><header>Test bed requirements</header><paragraph id="id4df2baa38dc24940b49d8b6dba339f1f"><enum>(1)</enum><header>Access and terms of usage</header><subparagraph commented="no" display-inline="no-display-inline" id="idbd7ce37f04694b5c9ab85b48f44a9894"><enum>(A)</enum><header>Researcher access</header><text display-inline="yes-display-inline">The Director shall establish terms of usage governing researcher access to the test bed made available under subsection (b)(1), with limitations on researcher publication only to the extent necessary to protect classified information or proprietary information concerning third-party models provided through the consent of model vendors.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id99c05146aa5f4588919634e422aa51cf"><enum>(B)</enum><header>Availability to Federal agencies</header><text display-inline="yes-display-inline">The Director shall ensure that the test bed made available under subsection (b)(1) is also made available to other Federal agencies on a cost-recovery basis.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ide2656fbb34c8480d8d2b3bb4ddd2623c"><enum>(2)</enum><header>Use of certain infrastructure and other resources</header><text>In carrying out subsection (b)(1), the Director shall leverage, to the greatest extent practicable, infrastructure and other resources provided under section 5.2 of the Executive Order dated October 30, 2023 (relating to safe, secure, and trustworthy development and use of artificial intelligence).</text></paragraph></subsection><subsection id="idc245a30e2d3c41c9a33921ce164d0866" commented="no"><enum>(d)</enum><header>Access to proprietary models</header><text>In carrying out this section, the Director shall establish such mechanisms as the Director considers appropriate, including potential contractual incentives, to ensure the provision of access to proprietary models by qualified independent third-party researchers if commercial model vendors have voluntarily provided models and associated resources for such testing.</text></subsection><subsection id="id4D5243596B974E489C0AA221293257F0" commented="no" display-inline="no-display-inline"><enum>(e)</enum><header>Counter-artificial intelligence defined</header><text>In this section, the term <term>counter-artificial intelligence</term> means techniques or procedures to extract information about the behavior or characteristics of an artificial intelligence system, or to learn how to manipulate an artificial intelligence system, in order to subvert the confidentiality, integrity, or availability of an artificial intelligence system or adjacent system. </text></subsection></section><section id="id64824cf9ff6743be8a572c4ffe0d3443" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>506.</enum><header>Sense of Congress encouraging intelligence community to increase private sector capital partnerships and partnership with Office of Strategic Capital of Department of Defense to secure enduring technological advantages</header><text display-inline="no-display-inline">It is the sense of Congress that—</text><paragraph commented="no" display-inline="no-display-inline" id="id9c32f2f2f80c4b138083029141e735a8"><enum>(1)</enum><text display-inline="yes-display-inline">acquisition leaders in the intelligence community should further explore the strategic use of private capital partnerships to secure enduring technological advantages for the intelligence community, including through the identification, development, and transfer of promising technologies to full-scale programs capable of meeting intelligence community requirements; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idb930386a176849e7a62f19aef0952a87"><enum>(2)</enum><text display-inline="yes-display-inline">the intelligence community should undertake regular consultation with Federal partners, such as the Office of Strategic Capital of the Office of the Secretary of Defense, on best practices and lessons learned from their experiences integrating these resources so as to accelerate attainment of national security objectives. </text></paragraph></section><section commented="no" display-inline="no-display-inline" id="id6c81b48a6aa34914b62d58d5fb3e7cfd"><enum>507.</enum><header>Intelligence Community Technology Bridge Fund</header><subsection id="id846323d028754021884468d1d09f48b4"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="idF8DBD02556C8494288A9C1A1251FAC11"><enum>(1)</enum><header>Nonprofit organization</header><text>The term <term>nonprofit organization</term> means an organization that is described in <external-xref legal-doc="usc" parsable-cite="usc/26/501">section 501(c)(3)</external-xref> of the Internal Revenue Code of 1986 and that is exempt from tax under section 501(a) of such Code.</text></paragraph><paragraph id="id0f65fb4229924dad81371fd2b71572b9"><enum>(2)</enum><header>Work program</header><text>The term <term>work program</term> means any agreement between In-Q-Tel and a third-party company, where such third-party company furnishes or is furnishing a product or service for use by any of In-Q-Tel’s government customers to address those customers' technology needs or requirements.</text></paragraph></subsection><subsection id="id334055e8f0504a65a847b55c3ed85944"><enum>(b)</enum><header>Establishment of Fund</header><text>There is established in the Treasury of the United States a fund to be known as the <quote>Intelligence Community Technology Bridge Fund</quote> (in this subsection referred to as the <quote>Fund</quote>) to assist in the transitioning of products or services from the research and development phase to the contracting and production phase.</text></subsection><subsection id="id37b6b81e20d346b09ec1656b029b5729"><enum>(c)</enum><header>Contents of fund</header><text>The Fund shall consist of amounts appropriated to the Fund, and amounts in the Fund shall remain available until expended.</text></subsection><subsection id="idbeebced3f2a046c585a29ac67c8d9937"><enum>(d)</enum><header>Availability and use of Fund</header><paragraph id="id4b3aa47578ca43bb8f8f57bc758e6ef3"><enum>(1)</enum><header>In general</header><text>Subject to paragraph (3), amounts in the Fund shall be available to the Director of National Intelligence to provide assistance to a business or nonprofit organization that is transitioning a product or service.</text></paragraph><paragraph id="id6a27957755dd4fa79071af9fa947ca3d"><enum>(2)</enum><header>Types of assistance</header><text>Assistance provided under paragraph (1) may be distributed as funds in the form of a grant, a payment for a product or service, or a payment for equity. </text></paragraph><paragraph id="id3a4084e6182141c6b90100ae89a04fb3"><enum>(3)</enum><header>Requirements for funds</header><text>Assistance may be provided under paragraph (1) to a business or nonprofit organization that is transitioning a product or service only if—</text><subparagraph id="id87d7045485e34ff1a310e2de67133f30"><enum>(A)</enum><text>the business or nonprofit organization—</text><clause id="iddcec794c10144b628255c7658d42288a"><enum>(i)</enum><text>has participated or is participating in a work program; or</text></clause><clause id="id5876fd77d010404a8816c0b510ca0b20"><enum>(ii)</enum><text>is engaged with an element of the intelligence community or Department of Defense for research and development; and</text></clause></subparagraph><subparagraph id="id0074bc04906b440bb657078f371a94fc"><enum>(B)</enum><text>the Director of National Intelligence or the head of an element of the intelligence community attests that the product or service will be utilized by an element of the intelligence community for a mission need, such as because it would be valuable in addressing a needed capability, fill or complement a technology gap, or increase the supplier base or price-competitiveness for the Federal Government.</text></subparagraph></paragraph><paragraph id="id2b619561145544f9b62ef1d0cffbbfd8"><enum>(4)</enum><header>Priority for small business concerns and nontraditional defense contractors</header><text>In providing assistance under paragraph (1), the Director shall prioritize the provision of assistance to small business concerns (as defined under section 3(a) of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15 U.S.C. 632(a)</external-xref>)) and nontraditional defense contractors (as defined in section 3014 of title 10, United States Code).</text></paragraph></subsection><subsection id="id2d19282c10d94067aef4a0084ce5b09a"><enum>(e)</enum><header>Administration of Fund</header><paragraph commented="no" display-inline="no-display-inline" id="id8c6b3922c0f94757b6a83f2eab52b2bb"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Fund shall be administered by the Director of National Intelligence.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id55c1b8ad61d342c8858084574dfb6759"><enum>(2)</enum><header>Consultation</header><text display-inline="yes-display-inline">In administering the Fund, the Director—</text><subparagraph commented="no" display-inline="no-display-inline" id="id5076821092b24661a823fbb58f955f3a"><enum>(A)</enum><text display-inline="yes-display-inline">shall consult with the heads of the elements of the intelligence community; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idab90d17e4cb5423789e26a935695e903"><enum>(B)</enum><text display-inline="yes-display-inline">may consult with In-Q-Tel, the Defense Advanced Research Project Agency, the North Atlantic Treaty Organization Investment Fund, and the Defense Innovation Unit.</text></subparagraph></paragraph></subsection><subsection id="idcc0485f47ff749719f10e5979b463ae8"><enum>(f)</enum><header>Annual reports</header><paragraph id="id4429f94e0bf54eb8a15b543166a3f6b6"><enum>(1)</enum><header>In general</header><text>Not later than September 30, 2025, and each fiscal year thereafter, the Director shall submit to the congressional intelligence committees a report on the Fund.</text></paragraph><paragraph id="idc9a27927a46f48d5befd55add9fc7069"><enum>(2)</enum><header>Contents</header><text>Each report submitted pursuant to paragraph (1) shall include, for the period covered by the report, information about the following:</text><subparagraph id="id8f401f38c59e4f439bad57162935c980"><enum>(A)</enum><text>How much was expended or obligated using amounts from the Fund.</text></subparagraph><subparagraph id="id58465176154e4ef2814c0bb30ecb5ca1"><enum>(B)</enum><text>For what the amounts were expended or obligated.</text></subparagraph><subparagraph id="id7336edd59ff74a4bb0b5ab02c4e254d6"><enum>(C)</enum><text>The effects of such expenditures and obligations.</text></subparagraph><subparagraph id="id999e3b7d362847f6aca30e74dd7da204"><enum>(D)</enum><text>A summary of annual transition activities and outcomes of such activities for the intelligence community.</text></subparagraph></paragraph><paragraph id="id1be33cbbb36c4e9c941203ffee589c62"><enum>(3)</enum><header>Form</header><text>Each report submitted pursuant to paragraph (1) shall be submitted in unclassified form, but may include a classified annex.</text></paragraph></subsection><subsection id="idbfd3d4a9da5949dda7384815c4d93e87"><enum>(g)</enum><header>Authorization of appropriations</header><paragraph id="ida764c5937cba4fc3873899e6150470ea"><enum>(1)</enum><header>In general</header><text>Subject to paragraph (2), there is authorized to be appropriated to the Fund $75,000,000 for fiscal year 2025 and for each fiscal year thereafter.</text></paragraph><paragraph id="id641efe5a11b547aa8a879a3943ce666c"><enum>(2)</enum><header>Limitation</header><text>The amount in the Fund shall not exceed $75,000,000 at any time.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="ide489861801294799b168bedb8287a269"><enum>508.</enum><header>Enhancement of authority for intelligence community public-private talent exchanges</header><subsection commented="no" display-inline="no-display-inline" id="ide0fc72cbc8be4de797975dbc952fc47f"><enum>(a)</enum><header>Focus areas</header><text display-inline="yes-display-inline">Subsection (a) of section 5306 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334">50 U.S.C. 3334</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idde3e6d6fc2274e049bb745927a1ddacc"><enum>(1)</enum><text display-inline="yes-display-inline">by striking <quote>Not later than</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id3FF278C26FE74E3BA00C602060784DA2"><paragraph commented="no" display-inline="no-display-inline" id="idf4e915cfa4454659aa2c8bb07d7e4de7"><enum>(1)</enum><header>In general</header><text>Not later than</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id88d761b6ae204a87994e4f8e538c0aa9"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idD1AFD22C570E431FA91101C03866884D"><paragraph id="id458338B8D9984E9B8A0A1406B8F2E6BA" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header display-inline="yes-display-inline">Focus areas</header><text display-inline="yes-display-inline">The Director shall ensure that the policies, processes, and procedures developed pursuant to paragraph (1) include a focus on rotations described in such paragraph with private-sector organizations in the following fields:</text><subparagraph commented="no" display-inline="no-display-inline" id="ida27409d7e98749c98431ea09b062de52"><enum>(A)</enum><text display-inline="yes-display-inline">Finance.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id53572ce0a3214f5aa88908d0f4121a1c"><enum>(B)</enum><text display-inline="yes-display-inline">Acquisition.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7cbf28cb29b842a79cf7f8e60c8f1d17"><enum>(C)</enum><text display-inline="yes-display-inline">Biotechnology.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf70143d7b189473d882307b75f7bcf8b"><enum>(D)</enum><text display-inline="yes-display-inline">Computing.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id02b348eda2c5467ba3b224b630d6737d"><enum>(E)</enum><text display-inline="yes-display-inline">Artificial intelligence.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idbd998cfef7bb4b6fb824d01aec205f61"><enum>(F)</enum><text display-inline="yes-display-inline">Business process innovation and entrepreneurship.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7f5abe7806a14417aa72cb806519df36"><enum>(G)</enum><text display-inline="yes-display-inline">Cybersecurity.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id113e024ee5554d07bbf9d42e36147cc3"><enum>(H)</enum><text display-inline="yes-display-inline">Materials and manufacturing.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id03f9ab477d3e4531af04188b39c070f3"><enum>(I)</enum><text display-inline="yes-display-inline">Any other technology or research field the Director determines relevant to meet evolving national security threats in technology sectors.</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id555c60f044f943e5ad0e0c21690d260a"><enum>(b)</enum><header>Duration of temporary details</header><text>Subsection (e) of section 5306 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334">50 U.S.C. 3334</external-xref>) is amended— </text><paragraph id="id4dea7bc4afe048c1b7d205bcce2e377f"><enum>(1)</enum><text>in paragraph (1), by striking <quote>3 years</quote> and inserting <quote>5 years</quote>; and</text></paragraph><paragraph id="id31408297fd874d818fe41bfdfb60fcfc" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text>in paragraph (2), by striking <quote>3 years</quote> and inserting <quote>5 years</quote>.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id76e098c45f5b487bac5a57b97c7d9244"><enum>(c)</enum><header>Treatment of private-sector employees</header><text>Subsection (g) of such section is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idbe646110d21e4034a83fb9de08b5d98e"><enum>(1)</enum><text display-inline="yes-display-inline">in paragraph (5), by striking <quote>; and</quote> and inserting a semicolon;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id80f77f0c698745ceb169d4b5bca334d6"><enum>(2)</enum><text>in paragraph (6), by striking the period at the end and inserting <quote>; and</quote>; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc772d856a92c4bfbbe5d5450450ff48b"><enum>(3)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8822EA1F5BD844B5B9F3BBD045DF2822"><paragraph commented="no" display-inline="no-display-inline" id="idcdad17f30b4b4c63a3f30dc1e7a1743d"><enum>(7)</enum><text>shall not be considered to have a conflict of interest with an element of the intelligence community solely because of being detailed to an element of the intelligence community under this section.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id4c26e6a35edd4a01aaac3c03c3515cd0"><enum>(d)</enum><header>Hiring authority</header><text display-inline="yes-display-inline">Such section is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id163d788ae397406ab239553a807a2fff"><enum>(1)</enum><text display-inline="yes-display-inline">by redesignating subsection (j) as subsection (k); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id730c26b6dcec4f058644f291965c1483"><enum>(2)</enum><text>by inserting after subsection (i) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id6222BC11D28747C28C04084A4AEEC5E1"><subsection commented="no" display-inline="no-display-inline" id="id47792bc2b99e4cf98eebd673a737fb53"><enum>(j)</enum><header>Hiring authority</header><paragraph commented="no" display-inline="no-display-inline" id="id7fedabe2ee7a4f0c858f204e162dc775"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Director may hire, under section 213.3102(r) of title 5, Code of Federal Regulations, or successor regulations, an individual who is an employee of a private-sector organization who is detailed to an element of the intelligence community under this section.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idd4d1ae5c0b8f4cd787d04c6fe98c8a05"><enum>(2)</enum><header>No personnel billet required</header><text display-inline="yes-display-inline">Hiring an individual under paragraph (1) shall not require a personnel billet.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idb2639423ded04789a34f05ba001e48dd"><enum>(e)</enum><header>Annual reports</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act and annually thereafter for 2 more years, the Director of National Intelligence shall submit to the congressional intelligence committees an annual report on—</text><paragraph id="id4546237d6d5348aa8e58fb0ced682d73"><enum>(1)</enum><text>the implementation of the policies, processes, and procedures developed pursuant to subsection (a) of such section 5306 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334">50 U.S.C. 3334</external-xref>) and the administration of such section;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0398a12b1157414e878efb1b7cefd133"><enum>(2)</enum><text display-inline="yes-display-inline">how the heads of the elements of the intelligence community are using or plan to use the authorities provided under such section; and</text></paragraph><paragraph id="id05d48d05b7de43a19a7a1a7d33b61ca8"><enum>(3)</enum><text>recommendations for legislative or administrative action to increase use of the authorities provided under such section. </text></paragraph></subsection></section><section id="id9928456aeec24bfeae98633664d5895c"><enum>509.</enum><header>Enhancing intelligence community ability to acquire emerging technology that fulfills intelligence community needs</header><subsection id="id8529a269db4b4797990ddf1a32069a59"><enum>(a)</enum><header>Definition of work program</header><text>The term <term>work program</term> means any agreement between In-Q-Tel and a third-party company, where such third-party company furnishes or is furnishing a property, product, or service for use by any of In-Q-Tel’s government customers to address those customers' technology needs or requirements.</text></subsection><subsection id="id0bc373305a10494db98a1a420654db02"><enum>(b)</enum><header>In general</header><text>In addition to the exceptions listed under section 3304(a) of title 41, United States Code, and under section 3204(a) of title 10, United States Code, for the use of competitive procedures, the Director of National Intelligence or the head of an element of the intelligence community may use procedures other than competitive procedures to acquire a property, product, or service if—</text><paragraph id="id20b80ddbb6aa411fbd81f5cb744c02b4"><enum>(1)</enum><text>the source of the property, product, or service is a company that completed a work program in which the company furnished the property, product, or service; and</text></paragraph><paragraph id="id564ec24f3a394ba490ab28fbe45cb1fe"><enum>(2)</enum><text>the Director of National Intelligence or the head of an element of the intelligence community certifies that such property, product, or service has been shown to meet an identified need of the intelligence community. </text></paragraph></subsection><subsection id="idd414321aa59b4585992971eb3e97a1e3"><enum>(c)</enum><header>Justification for use of procedures other than competitive procedures</header><paragraph commented="no" display-inline="no-display-inline" id="id7b1ac772886b4abc8e429de090768fca"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">A property, product, or service may not be acquired by the Director or the head of an element of the intelligence community under subsection (b) using procedures other than competitive procedures unless the acquiring officer for the acquisition justifies the use of such procedures in writing.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idddc99cbac1614579926885516a59dc6b"><enum>(2)</enum><header>Contents</header><text display-inline="yes-display-inline">A justification in writing described in paragraph (1) for an acquisition using procedures other than competitive procedures shall include the following:</text><subparagraph id="id1020659727104962B62A2DB2C6132ED4"><enum>(A)</enum><text>A description of the need of the element of the intelligence community that the property, product, or service satisfies.</text></subparagraph><subparagraph id="id39AD64F5C7704FD49B357879ADD855B4"><enum>(B)</enum><text>A certification that the anticipated costs will be fair and reasonable.</text></subparagraph><subparagraph id="id927EBFE5A90C4ECD82333F019D7F99B9"><enum>(C)</enum><text>A description of the market survey conducted or a statement of the reasons a market survey was not conducted. </text></subparagraph><subparagraph id="id1A39E8F39DC949EF9A4EDE2BA206160B"><enum>(D)</enum><text>Such other matters as the Director or the head, as the case may be, determines appropriate. </text></subparagraph></paragraph></subsection></section><section id="id6fc079ceb7da4a50b354302e844d14e1" section-type="subsequent-section"><enum>510.</enum><header>Management of artificial intelligence security risks</header><subsection commented="no" display-inline="no-display-inline" id="ide82d873302044c79a48b2ab784859d83"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph id="idd631439913e74ab189f46f424d4dd670"><enum>(1)</enum><header>Artificial intelligence safety incident</header><text>The term <term>artificial intelligence safety incident</term> means an event that increases the risk that operation of an artificial intelligence system will—</text><subparagraph commented="no" display-inline="no-display-inline" id="id9395c61862c541a9a775c6b721516ea3"><enum>(A)</enum><text display-inline="yes-display-inline">result in physical or psychological harm; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide5f40ffe3e8e4e199df90b140f71265f"><enum>(B)</enum><text display-inline="yes-display-inline">lead to a state in which human life, health, property, or the environment is endangered.</text></subparagraph></paragraph><paragraph id="id13dcb8c1dfe14fc0990f8d99ad6c88ff"><enum>(2)</enum><header>Artificial intelligence security incident</header><text>The term <term>artificial intelligence security incident</term> means an event that increases—</text><subparagraph commented="no" display-inline="no-display-inline" id="id7f769361c49e4da1bb02f7507d85a9ab"><enum>(A)</enum><text display-inline="yes-display-inline">the risk that operation of an artificial intelligence system occurs in a way that enables the extraction of information about the behavior or characteristics of an artificial intelligence system by a third party; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id71dc5a3d34084af992338e67083055fe"><enum>(B)</enum><text display-inline="yes-display-inline">the ability of a third party to manipulate an artificial intelligence system to subvert the confidentiality, integrity, or availability of an artificial intelligence system or adjacent system.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc8d521f2023943f49f758f55a3055846"><enum>(3)</enum><header>Artificial intelligence security vulnerability</header><text>The term <term>artificial intelligence security vulnerability</term> means a weakness in an artificial intelligence system that could be exploited by a third party to, without authorization, subvert the confidentiality, integrity, or availability of an artificial intelligence system, including through techniques such as—</text><subparagraph commented="no" display-inline="no-display-inline" id="id4d2ec2cc8ad844939f3b8738940e0df1"><enum>(A)</enum><text display-inline="yes-display-inline">data poisoning;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1f3525fb168844cea9f4fc31c3762593"><enum>(B)</enum><text>evasion attacks; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1e4ab33082274f35a022e3874a46ee35"><enum>(C)</enum><text>privacy-based attacks; and</text></subparagraph><subparagraph id="id50b1c39ce8824a8e8430ad9c2b8e9e4a"><enum>(D)</enum><text>abuse attacks.</text></subparagraph></paragraph><paragraph id="id9bab9ad9bf484e31b7eb9d69f7060a89"><enum>(4)</enum><header>Counter-artificial intelligence</header><text>The term <term>counter-artificial intelligence</term> means techniques or procedures to extract information about the behavior or characteristics of an artificial intelligence system, or to learn how to manipulate an artificial intelligence system, so as to subvert the confidentiality, integrity, or availability of an artificial intelligence system or adjacent system. </text></paragraph></subsection><subsection id="idb23dc89be1cc4d53b70e0db1c75fcbcd"><enum>(b)</enum><header>Voluntary tracking and processing of security and safety incidents and risks associated with artificial intelligence</header><paragraph commented="no" display-inline="no-display-inline" id="idcbdb0eae24fd43d99f936ee4a2f662fe"><enum>(1)</enum><header display-inline="yes-display-inline">Processes and procedures for vulnerability management</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Director of the National Institute of Standards and Technology shall—</text><subparagraph id="id417aa381de384ac0a201541398b69d7d"><enum>(A)</enum><text>initiate a process to update processes and procedures associated with the National Vulnerability Database of the Institute to ensure that the database and associated vulnerability management processes incorporate artificial intelligence security vulnerabilities to the greatest extent practicable; and</text></subparagraph><subparagraph id="ida2c4e59d12554b6fbb601bf43d9d8829"><enum>(B)</enum><text>identify any characteristics of artificial intelligence security vulnerabilities that make utilization of the National Vulnerability Database inappropriate for their management and develop processes and procedures for vulnerability management of those vulnerabilities.</text></subparagraph></paragraph><paragraph id="id2818065f9f6c4cd390c32072de521b2d"><enum>(2)</enum><header>Voluntary tracking of artificial intelligence security and artificial intelligence safety incidents</header><subparagraph commented="no" display-inline="no-display-inline" id="idf8fbabca0dc54cdf8be9e102ac2ec3de"><enum>(A)</enum><header>Voluntary database required</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, the Director of the Institute, in coordination with the Director of the Cybersecurity and Infrastructure Security Agency, shall—</text><clause id="idee35c3c1c44c46cb9f3274ec96fab42d"><enum>(i)</enum><text>develop and establish a comprehensive database to publicly track artificial intelligence security and artificial intelligence safety incidents through voluntary input; and</text></clause><clause id="idf3f1ab73735e45bd8552d8ecbda6ed80"><enum>(ii)</enum><text>in establishing the database under clause (i)—</text><subclause id="id396d0d760dfd4dd4aa0dc9025a154c9c"><enum>(I)</enum><text>establish mechanisms by which private sector entities, public sector organizations, civil society groups, and academic researchers may voluntarily share information with the Institute on confirmed or suspected artificial intelligence security or artificial intelligence safety incidents, in a manner that preserves the confidentiality of any affected party;</text></subclause><subclause id="idf9becece7a6b4b22a6c3979e6d54fd2c"><enum>(II)</enum><text>leverage, to the greatest extent possible, standardized disclosure and incident description formats;</text></subclause><subclause id="idfdfc90ec3bc94eda85275dea79c52bd6"><enum>(III)</enum><text>develop processes to associate reports pertaining to the same incident with a single incident identifier; </text></subclause><subclause id="idc193d60de9a94f4f8a4b03e461f5a979"><enum>(IV)</enum><text>establish classification, information retrieval, and reporting mechanisms that sufficiently differentiate between artificial intelligence security incidents and artificial intelligence safety incidents; and </text></subclause><subclause id="id5011f2cf99d84463b123ded0c1af8234"><enum>(V)</enum><text>create appropriate taxonomies to classify incidents based on relevant characteristics, impact, or other relevant criteria.</text></subclause></clause></subparagraph><subparagraph id="id0628571053d24898b84540b1ad22cd67"><enum>(B)</enum><header>Identification and treatment of material artificial intelligence security or artificial intelligence safety risks</header><clause commented="no" display-inline="no-display-inline" id="idc49f163fc6584dac9cea6dcff9d1e6ae"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">Upon receipt of relevant information on an artificial intelligence security or artificial intelligence safety incident, the Director of the Institute shall determine whether the described incident presents a material artificial intelligence security or artificial intelligence safety risk sufficient for inclusion in the database developed and established under subparagraph (A).</text></clause><clause commented="no" display-inline="no-display-inline" id="id573eccbf8ca84b3b99937d8a963df140"><enum>(ii)</enum><header>Priorities</header><text display-inline="yes-display-inline">In evaluating a reported incident pursuant to subparagraph (A), the Director shall prioritize inclusion in the database cases in which a described incident—</text><subclause id="id32ad274617904632bbdbfabc8be2146d"><enum>(I)</enum><text>describes an artificial intelligence system used in critical infrastructure or safety-critical systems;</text></subclause><subclause id="ide63d1d0c09be4f93b505b1cdd05680f8"><enum>(II)</enum><text>would result in a high-severity or catastrophic impact to the people or economy of the United States; or</text></subclause><subclause id="idbc7340ead71c48fcaf5248bc95ee4e0f"><enum>(III)</enum><text>includes an artificial intelligence system widely used in commercial or public sector contexts.</text></subclause></clause></subparagraph><subparagraph id="id32e864f4f15a4e2d950aa3ccfe9988ad"><enum>(C)</enum><header>Reports and anonymity</header><text>The Director shall populate the database developed and established under subparagraph (A) with incidents based on public reports and information shared using the mechanism established pursuant to clause (ii)(I) of such subparagraph, ensuring that any incident description sufficiently anonymizes those affected, unless those who are affected have consented to their names being included in the database.</text></subparagraph></paragraph></subsection><subsection id="id9607aa2764114aea8edcde756006dbf2"><enum>(c)</enum><header>Updating processes and procedures relating to Common Vulnerabilities and Exposures Program and evaluation of consensus standards relating to artificial intelligence security vulnerability reporting</header><paragraph commented="no" display-inline="no-display-inline" id="idceb152a53641427a93a08878ab6a1a82"><enum>(1)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this subsection:</text><subparagraph commented="no" display-inline="no-display-inline" id="id33540ff12680442db0dedd2867e11b17"><enum>(A)</enum><header>Common Vulnerabilities and Exposures Program</header><text>The term <term>Common Vulnerabilities and Exposures Program</term> means the reference guide and classification system for publicly known information security vulnerabilities sponsored by the Cybersecurity and Infrastructure Security Agency. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idd477cfedaed54e3e9f032e6b7cdfd82a"><enum>(B)</enum><header display-inline="yes-display-inline">Director</header><text>The term <term>Director</term> means the Director of the Cybersecurity and Infrastructure Security Agency.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idecc742d48bbe45b2b9948b6a5af95fbc"><enum>(C)</enum><header>Relevant congressional committees</header><text>The term <term>relevant congressional committees</term> means—</text><clause commented="no" display-inline="no-display-inline" id="id7c60fc5911ae43db9d93ffac98a573ba"><enum>(i)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security and Governmental Affairs of the Senate;</text></clause><clause commented="no" display-inline="no-display-inline" id="id366639ade2f545c78cb814381cf0bc7f"><enum>(ii)</enum><text>the Committee on Commerce, Science, and Transportation of the Senate; </text></clause><clause commented="no" display-inline="no-display-inline" id="id22971e80b8be48298f55b1aee1e1df1d"><enum>(iii)</enum><text>the Select Committee on Intelligence of the Senate;</text></clause><clause id="idcdfdd59b08974ddf98540831df472930"><enum>(iv)</enum><text>the Committee on the Judiciary of the Senate;</text></clause><clause commented="no" display-inline="no-display-inline" id="id8150c7424ebf494aaa002113e8142943"><enum>(v)</enum><text>the Committee on Oversight and Accountability of the House of Representatives; </text></clause><clause commented="no" display-inline="no-display-inline" id="id0fa777f8dcee453b85a9c224b172c710"><enum>(vi)</enum><text>the Committee on Energy and Commerce of the House of Representatives; </text></clause><clause commented="no" display-inline="no-display-inline" id="id6a440c2e02dc4293a9a4c2112eb79fec"><enum>(vii)</enum><text>the Permanent Select Committee on Intelligence of the House of Representatives; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idc952222b6d6242f89598069cc1ccc98e"><enum>(viii)</enum><text>the Committee on the Judiciary of the House of Representatives.</text></clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id39cad5ca193a47c9a193deee28afedf1"><enum>(2)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Not later than 180 days after the date of enactment of this Act, the Director shall—</text><subparagraph id="id5203b19f7d094710b861693bf5209438"><enum>(A)</enum><text>initiate a process to update processes and procedures associated with the Common Vulnerabilities and Exposures Program to ensure that the program and associated processes identify and enumerate artificial intelligence security vulnerabilities to the greatest extent practicable; and</text></subparagraph><subparagraph id="idd32a2229f72f472187bfd3ddb3d78f4c"><enum>(B)</enum><text>identify any characteristic of artificial intelligence security vulnerabilities that makes utilization of the Common Vulnerabilities and Exposures Program inappropriate for their management and develop processes and procedures for vulnerability identification and enumeration of those artificial intelligence security vulnerabilities.</text></subparagraph></paragraph><paragraph id="idc529df1866d54272b4defa8ddf28a9ce"><enum>(3)</enum><header>Evaluation of consensus standards</header><subparagraph commented="no" display-inline="no-display-inline" id="idcd027c54ba28473fb5919a32abde2653"><enum>(A)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 30 days after the date of enactment of this Act, the Director of the National Institute of Standards and Technology shall initiate a multi-stakeholder process to evaluate whether existing voluntary consensus standards for vulnerability reporting effectively accommodate artificial intelligence security vulnerabilities.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6e31e3334187400780cf6156f5d0cc06"><enum>(B)</enum><header>Report</header><clause commented="no" display-inline="no-display-inline" id="ida098ee58e9734d25b4b5ede37532ac46"><enum>(i)</enum><header>Submission</header><text display-inline="yes-display-inline">Not later than 180 days after the date on which the evaluation under subparagraph (A) is carried out, the Director shall submit a report to the relevant congressional committees on the sufficiency of existing vulnerability reporting processes and standards to accommodate artificial intelligence security vulnerabilities. </text></clause><clause commented="no" display-inline="no-display-inline" id="ide9f401939a594f6ead6d1674a7cac068"><enum>(ii)</enum><header>Post-report action</header><text display-inline="yes-display-inline">If the Director concludes in the report submitted under clause (i) that existing processes do not sufficiently accommodate reporting of artificial intelligence security vulnerabilities, the Director shall initiate a process, in consultation with the Director of the National Institute of Standards and Technology and the Director of the Office of Management and Budget, to update relevant vulnerability reporting processes, including the Department of Homeland Security Binding Operational Directive 20–01, or any subsequent directive. </text></clause></subparagraph></paragraph><paragraph id="idb4d441f2abee4dec8d695b804b726f2b"><enum>(4)</enum><header>Best practices</header><text>Not later than 90 days after the date of enactment of this Act, the Director shall, in collaboration with the Director of the National Security Agency and the Director of the National Institute of Standards and Technology and leveraging efforts of the Information Communications Technology Supply Chain Risk Management Task Force to the greatest extent practicable, convene a multi-stakeholder process to encourage the development and adoption of best practices relating to addressing supply chain risks associated with training and maintaining artificial intelligence models, which shall ensure consideration of supply chain risks associated with—</text><subparagraph id="idd6b3c95c8f174f6388e1f9cbeebcbfe6"><enum>(A)</enum><text>data collection, cleaning, and labeling, particularly the supply chain risks of reliance on remote workforce and foreign labor for such tasks;</text></subparagraph><subparagraph id="id5d672a1a50a14f4c953ec8f1d9b0fdc5"><enum>(B)</enum><text>inadequate documentation of training data and test data storage, as well as limited provenance of training data; </text></subparagraph><subparagraph id="id9f0100450ed0451d895ed971d7ff50c6"><enum>(C)</enum><text>human feedback systems used to refine artificial intelligence systems, particularly the supply chain risks of reliance on remote workforce and foreign labor for such tasks;</text></subparagraph><subparagraph id="id6ad33cb544814736a346edb8d00b87e2" commented="no" display-inline="no-display-inline"><enum>(D)</enum><text>the use of large-scale, open-source datasets, particularly the supply chain risks to repositories that host such datasets for use by public and private sector developers in the United States; and</text></subparagraph><subparagraph id="id8854fc078d3e44199873ce51eba33b35" commented="no" display-inline="no-display-inline"><enum>(E)</enum><text>the use of proprietary datasets containing sensitive or personally identifiable information. </text></subparagraph></paragraph></subsection></section><section id="id3af22a6adf1f436b8c41edd11cd21916"><enum>511.</enum><header>Protection of technological measures designed to verify authenticity or provenance of machine-manipulated media</header><subsection id="id9e21cd5309764fa18f524e71b7d08884"><enum>(a)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph id="id8b6f18b9014d449382c2f5d774e2ebbe"><enum>(1)</enum><header>Machine-manipulated media</header><text>The term <term>machine-manipulated media</term> has the meaning given such term in section 5724 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="public-law" parsable-cite="pl/116/92">Public Law 116–92</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024</external-xref> note).</text></paragraph><paragraph id="idee9092db4d2145eaaeca2c307de7aee7"><enum>(2)</enum><header>State</header><text>The term <term>State</term> means each of the several States of the United States, the District of Columbia, the Commonwealth of Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id9ab315d1fbfe4a8fa9ddf842e750459f"><enum>(b)</enum><header>Prohibitions</header><paragraph id="id85e7aab40daf42f8ad2da77e35c105fe"><enum>(1)</enum><header>Prohibition on concealing subversion</header><text>No person shall knowingly and with the intent or substantial likelihood of deceiving a third party, enable, facilitate, or conceal the subversion of a technological measure designed to verify the authenticity, modifications, or conveyance of machine-manipulated media, or characteristics of the provenance of the machine-manipulated media, by generating information about the authenticity of a piece of content that is knowingly false.</text></paragraph><paragraph id="idceb7b8928ea24ad59b86b745a9eeb41f"><enum>(2)</enum><header>Prohibition on fraudulent distribution</header><text>No person shall knowingly and for financial benefit, enable, facilitate, or conceal the subversion of a technological measure described in paragraph (1) by distributing machine-manipulated media with knowingly false information about the authenticity of a piece of machine-manipulated media.</text></paragraph><paragraph id="id5ff841fbebc14a8cadb8c063ea428318"><enum>(3)</enum><header>Prohibition on products and services for circumvention</header><text>No person shall deliberately manufacture, import, or offer to the public a technology, product, service, device, component, or part thereof that—</text><subparagraph id="id00db31c2e8174886bb47a43a734d60da"><enum>(A)</enum><text>is primarily designed or produced and promoted for the purpose of circumventing, removing, or otherwise disabling a technological measure described in paragraph (1) with the intent or substantial likelihood of deceiving a third party about the authenticity of a piece of machine-manipulated media;</text></subparagraph><subparagraph id="id877f1fd938c14abea8e166492ee7be06"><enum>(B)</enum><text>has only limited commercially significant or expressive purpose or use other than to circumvent, remove, or otherwise disable a technological measure designed to verify the authenticity of machine-manipulated media and is promoted for such purposes; or</text></subparagraph><subparagraph id="id5c6fc10390be4fb2a2e8ce5f9e1343e5"><enum>(C)</enum><text>is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing, removing, or otherwise disabling a technological measure described in paragraph (1) with an intent to deceive a third party about the authenticity of a piece of machine-manipulated media.</text></subparagraph></paragraph></subsection><subsection id="id30523e9b49c5432094f9469f248ae957"><enum>(c)</enum><header>Exemptions</header><paragraph id="id650a24e556d243b9b4a8138f1c5d5897"><enum>(1)</enum><header>In general</header><text>Nothing in subsection (b) shall inhibit the ability of any individual to access, read, or review a technological measure described in paragraph (1) of such subsection or to access, read, or review the provenance, modification, or conveyance information contained therein.</text></paragraph><paragraph id="id9747b8d7fd424f0d8e09f2477a1de890"><enum>(2)</enum><header>Exemption for nonprofit libraries, archives, and educational institutions</header><subparagraph id="id7a3c1de6958b4efcbc8dd397e2e49c1f"><enum>(A)</enum><header>In general</header><text>Except as otherwise provided in this subsection, subsection (b) shall not apply to a nonprofit library, archives, or educational institution which generates, distributes, or otherwise handles machine-manipulated media.</text></subparagraph><subparagraph id="idb54b9bddfa574c1096d51b7ed7f748b6"><enum>(B)</enum><header>Commercial advantage, financial gain, or tortious conduct</header><text>The exception in subparagraph (A) shall not apply to a nonprofit library, archive, or educational institution that willfully for the purpose of commercial advantage, financial gain, or in furtherance of tortious conduct violates a provision of subsection (b), except that a nonprofit library, archive, or educational institution that willfully for the purpose of commercial advantage, financial gain, or in furtherance of tortious conduct violates a provision of subsection (b) shall—</text><clause id="idb1179de266fd464bbd767951af4bac9d"><enum>(i)</enum><text>for the first offense, be subject to the civil remedies under subsection (d); and</text></clause><clause id="idb18e0c9c67bb40fabab625c53c66d43f"><enum>(ii)</enum><text>for repeated or subsequent offenses, in addition to the civil remedies under subsection (d), forfeit the exemption provided under subparagraph (A).</text></clause></subparagraph><subparagraph id="ida6a2d658a8a94eba81bef21bab68f181"><enum>(C)</enum><header>Circumventing technologies</header><text>This paragraph may not be used as a defense to a claim under paragraph (3) of subsection (b), nor may this subsection permit a nonprofit library, archive, or educational institution to manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, component, or part thereof, that circumvents a technological measure described in paragraph (1) of such subsection.</text></subparagraph><subparagraph id="id8e1beb3ad47f4a7cbcccae7e67a867fa"><enum>(D)</enum><header>Qualifications of libraries and archives</header><text>In order for a library or archive to qualify for the exemption under subparagraph (A), the collections of that library or archive shall be—</text><clause id="id56aedd9906ae43eab73a23ac672d05c8"><enum>(i)</enum><text>open to the public; or</text></clause><clause id="id49d3d86e61f4480d99fbf9c011fb40af"><enum>(ii)</enum><text>available not only to researchers affiliated with the library or archive or with the institution of which it is a part, but also to other persons doing research in a specialized field.</text></clause></subparagraph></paragraph><paragraph id="id1f2390d1a79b413aa55f67d57bdef1b9"><enum>(3)</enum><header>Reverse engineering</header><subparagraph id="id7b2e934832154bdd95d028b422e6217d"><enum>(A)</enum><header>Definitions</header><text>In this paragraph:</text><clause id="idf9aeda67d13c461887cd16c1c0a8260b"><enum>(i)</enum><header>Circumvention</header><text>The term <term>circumvention</term> means to remove, deactivate, disable, or impair a technological measure designed to verify the authenticity of machine-manipulated media or characteristics of its provenance, modifications, or conveyance. </text></clause><clause commented="no" display-inline="no-display-inline" id="idcb340a6ab7bd40c1831548af23ea41d2"><enum>(ii)</enum><header>Interoperability</header><text display-inline="yes-display-inline">The term <term>interoperability</term> means the ability of—</text><subclause commented="no" display-inline="no-display-inline" id="id28ae7122838241c4bcb23e3cc78d7ff0"><enum>(I)</enum><text display-inline="yes-display-inline">computer programs to exchange information; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id01f4a94765a24254957b59f633b0bad2"><enum>(II)</enum><text display-inline="yes-display-inline">such programs mutually to use the information which has been exchanged.</text></subclause></clause></subparagraph><subparagraph id="idf8972894401e42e8969d9fb0a0c31369"><enum>(B)</enum><header>In general</header><text>An authorized user of a technological measure described in subsection (b)(1) may circumvent such technological measure for the sole purpose of identifying and analyzing those elements of the technological measure that are necessary to achieve interoperability with that authorized user’s own technological measures intended for similar purposes of verifying the authenticity of machine-manipulated media or characteristics of its provenance, modifications, or conveyance.</text></subparagraph><subparagraph id="ida00a34cf7fcc49869a225c41f4836ba2"><enum>(C)</enum><header>Law enforcement, intelligence, and other government activities</header><text>Subsection (b) does not prohibit any lawfully authorized investigative, protective, information security, or intelligence activity of an officer, agent, or employee of the United States, a State, or a political subdivision of a State, or a person acting pursuant to a contract with the United States, a State, or a political subdivision of a State.</text></subparagraph></paragraph></subsection><subsection id="id1c35463ef4a34b508a5888ec976cf8bc"><enum>(d)</enum><header>Enforcement by Attorney General</header><paragraph id="id9504d1e1b3334e1498a8c1292992d8c5"><enum>(1)</enum><header>Civil actions</header><text>The Attorney General may bring a civil action in an appropriate United States district court against any person who violates subsection (b).</text></paragraph><paragraph id="id33a97329c2184caf901917603843871a"><enum>(2)</enum><header>Powers of the court</header><text>In an action brought under paragraph (1), the court—</text><subparagraph id="idc11cf201ef1141ed9fe3c9acbe313dfc"><enum>(A)</enum><text>may grant temporary and permanent injunctions on such terms as it deems reasonable to prevent or restrain a violation, but in no event shall impose a prior restraint on free speech or the press protected under the First Amendment to the Constitution of the United States;</text></subparagraph><subparagraph id="ide92614f90dc74e8f8e891bb738b4b0ea"><enum>(B)</enum><text>at any time while an action is pending, may order the impounding, on such terms as it deems reasonable, of any device or product that is in the custody or control of the alleged violator and that the court has reasonable cause to believe was involved in a violation;</text></subparagraph><subparagraph id="id262d5e294f844690bc6efba1e4fa6b71"><enum>(C)</enum><text>may award damages under paragraph (3);</text></subparagraph><subparagraph id="id6c4bd253c2cb415782cd40c842cb9bc2"><enum>(D)</enum><text>in its discretion may allow the recovery of costs against any party other than the United States or an officer thereof; and</text></subparagraph><subparagraph id="id2efff2e9e92e43788e3a653b2530686b"><enum>(E)</enum><text>may, as part of a final judgment or decree finding a violation, order the remedial modification or the destruction of any device or product involved in the violation that is in the custody or control of the violator or has been impounded under subparagraph (B).</text></subparagraph></paragraph><paragraph id="id809a5cb8169b4841bebcfff7bbb436b6"><enum>(3)</enum><header>Award of damages</header><subparagraph id="idf8f72680370e4f208a6d2f0d0ab92015"><enum>(A)</enum><header>In general</header><text>Except as otherwise provided in this section, a person committing a violation of subsection (b) is liable for statutory damages as provided in subparagraph (C).</text></subparagraph><subparagraph id="id0dc5604034dc42cea36d95984db6fc76"><enum>(B)</enum><header>Statutory damages</header><clause id="idead8b133fdd44def956e18e3b3a22f21"><enum>(i)</enum><header>Election of amount based on number of acts of circumvention</header><text>At any time before final judgment is entered, the Attorney General may elect to recover an award of statutory damages for each violation of subsection (b) in the sum of not less than $200 or more than $2,500 per act of circumvention, device, product, component, offer, or performance of service, as the court considers just.</text></clause><clause id="id42c8370048d4458f88f148f4b9b52a1e"><enum>(ii)</enum><header>Election of amount; total amount</header><text>At any time before final judgment is entered, the Attorney General may elect to recover an award of statutory damages for each violation of subsection (b) in the sum of not less than $2,500 or more than $25,000.</text></clause></subparagraph><subparagraph id="id64f707f7b06040cb9821e36b3b493f8a"><enum>(C)</enum><header>Repeated violations</header><text>In any case in which the Attorney General sustains the burden of proving, and the court finds, that a person has violated subsection (b) within 3 years after a final judgment was entered against the person for another such violation, the court may increase the award of damages up to triple the amount that would otherwise be awarded, as the court considers just.</text></subparagraph><subparagraph id="idc18926edbb1e4ff29294e5710b28c497"><enum>(D)</enum><header>Innocent violations</header><clause id="idbb62f53daff4456ea51de1737faeddc2"><enum>(i)</enum><header>In general</header><text>The court in its discretion may reduce or remit the total award of damages in any case in which the violator sustains the burden of proving, and the court finds, that the violator was not aware and had no reason to believe that its acts constituted a violation.</text></clause><clause id="idc51a1db684fa4768b234ffc4fe4af3a9"><enum>(ii)</enum><header>Nonprofit library, archive, educational institutions, or public broadcasting entities</header><text>In the case of a nonprofit library, archive, educational institution, or public broadcasting entity, the court shall remit damages in any case in which the library, archive, educational institution, or public broadcasting entity sustains the burden of proving, and the court finds, that the library, archive, educational institution, or public broadcasting entity was not aware and had no reason to believe that its acts constituted a violation.</text></clause></subparagraph></paragraph></subsection></section><section id="id988DCCAC6FE64F03B93771DF61F122BE"><enum>512.</enum><header>Sense of Congress on hostile foreign cyber actors</header><text display-inline="no-display-inline">It is the sense of Congress that foreign ransomware organizations, and foreign affiliates associated with them, constitute hostile foreign cyber actors, that covered nations abet and benefit from the activities of these actors, and that such actors should be treated as hostile foreign cyber actors by the United States. Such actors include the following:</text><paragraph id="id05fe42475d574bcbbba805c878850bda"><enum>(1)</enum><text>DarkSide.</text></paragraph><paragraph id="id1abc734132574600b1f5c4968952b077"><enum>(2)</enum><text>Conti.</text></paragraph><paragraph id="id6493d5ba8bba46c28e50ea02fce34205"><enum>(3)</enum><text>REvil.</text></paragraph><paragraph id="id3e753c49b8004850b5249844cc30d99c"><enum>(4)</enum><text>BlackCat, also known as <quote>ALPHV</quote>.</text></paragraph><paragraph id="ida7b9c2ff843f4b7ebcfd7f1ae277a78a"><enum>(5)</enum><text>LockBit.</text></paragraph><paragraph id="ida5e5b42e104e4a7ab95e353e0fa5abd6"><enum>(6)</enum><text>Rhysida, also known as <quote>Vice Society</quote>.</text></paragraph><paragraph id="id206333117abb4d8ea8744edb8c1c732a"><enum>(7)</enum><text>Royal.</text></paragraph><paragraph id="id159039cb7d154d848b5b4cd8955858a7"><enum>(8)</enum><text>Phobos, also known as <quote>Eight</quote> and also known as <quote>Joanta</quote>.</text></paragraph><paragraph id="ide5a99a2bef004cd58c6999c91169f2cd"><enum>(9)</enum><text>C10p.</text></paragraph><paragraph id="idffca40542d6245c7854dc7bbe2e4824e"><enum>(10)</enum><text>Hackers associated with the SamSam ransomware campaigns.</text></paragraph><paragraph id="id2a17fb6458a34a07800fae8b281bd5fa"><enum>(11)</enum><text>Play.</text></paragraph><paragraph id="iddf937bdd94184bb2b82abcb90b317669"><enum>(12)</enum><text>BianLian.</text></paragraph><paragraph id="id3586483cb3f140469a94e7f3b7d1ebfe"><enum>(13)</enum><text>Killnet.</text></paragraph><paragraph id="ida74f7a0e37f54fa79582d9611d5937b2"><enum>(14)</enum><text>Akira.</text></paragraph><paragraph id="id9bd6c89caa7043488e8c346258978344"><enum>(15)</enum><text>Ragnar Locker, also known as <quote>Dark Angels</quote>.</text></paragraph><paragraph id="id9a39be294f3145b0a4acb645cc767343"><enum>(16)</enum><text>Blacksuit.</text></paragraph><paragraph id="id754c8980009d47a4b423f1c017d9c877"><enum>(17)</enum><text>INC.</text></paragraph><paragraph id="id8c7bf44553514ba1997e28a5c8d0e7b1"><enum>(18)</enum><text>Black Basta.</text></paragraph></section><section commented="no" display-inline="no-display-inline" id="id0b04ce9b07f74e18810e8db365a84def"><enum>513.</enum><header>Designation of state sponsors of ransomware and reporting requirements</header><subsection id="idf68073a99a6f410688d0dda80d596a68"><enum>(a)</enum><header>Designation of state sponsors of ransomware</header><paragraph id="id876436c1da8f4d9cacaf22d8c936c446"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, and annually thereafter, the Secretary of State, in consultation with the Director of National Intelligence, shall—</text><subparagraph id="id07ac75e4c08c451e8a5f6ebe7f9ccd39"><enum>(A)</enum><text>designate as a state sponsor of ransomware any country the government of which the Secretary has determined has provided support for ransomware demand schemes (including by providing safe haven for individuals engaged in such schemes);</text></subparagraph><subparagraph id="id47E0FDEC73694FF99F58759C9602D59B"><enum>(B)</enum><text>submit to Congress a report listing the countries designated under subparagraph (A); and</text></subparagraph><subparagraph id="idc5585210c1cf4bd2a1df269bd085bad3"><enum>(C)</enum><text>in making designations under subparagraph (A), take into consideration the report submitted to Congress under section 514(c)(1).</text></subparagraph></paragraph><paragraph id="id97D87B113A7F4A2A87508CDC51434F4F"><enum>(2)</enum><header>Sanctions and penalties</header><text>The President shall impose with respect to each state sponsor of ransomware designated under paragraph (1)(A) the sanctions and penalties imposed with respect to a state sponsor of terrorism.</text></paragraph><paragraph id="id532f8ea90cc44ad9a393999d65967dff"><enum>(3)</enum><header>State sponsor of terrorism defined</header><text>In this subsection, the term <term>state sponsor of terrorism</term> means a country the government of which the Secretary of State has determined has repeatedly provided support for acts of international terrorism, for purposes of—</text><subparagraph id="id99feb949feac4b6181fbeda250b0e5bf"><enum>(A)</enum><text>section 1754(c)(1)(A)(i) of the Export Control Reform Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/50/4813">50 U.S.C. 4813(c)(1)(A)(i)</external-xref>);</text></subparagraph><subparagraph id="id3387e96c3013418d842e1cd9d414ee99"><enum>(B)</enum><text>section 620A of the Foreign Assistance Act of 1961 (<external-xref legal-doc="usc" parsable-cite="usc/22/2371">22 U.S.C. 2371</external-xref>);</text></subparagraph><subparagraph id="id587828e877444121911155ac4496ab3a"><enum>(C)</enum><text>section 40(d) of the Arms Export Control Act (<external-xref legal-doc="usc" parsable-cite="usc/22/2780">22 U.S.C. 2780(d)</external-xref>); or</text></subparagraph><subparagraph id="idcda6221c2c994e1b8649159bc63931be"><enum>(D)</enum><text>any other provision of law.</text></subparagraph></paragraph></subsection><subsection id="id0be641f1b85a4573b1e93a6c180e1db6"><enum>(b)</enum><header>Reporting requirements</header><paragraph id="id8D5C05E11AD14A2D8468E724ED687BC0"><enum>(1)</enum><header>Sanctions relating to ransomware report</header><text>Not later than 180 days after the date of the enactment of this Act, the Secretary of the Treasury shall submit a report to Congress that describes, for each of the 5 fiscal years immediately preceding the date of such report, the number and geographic locations of individuals, groups, and entities subject to sanctions imposed by the Office of Foreign Assets Control who were subsequently determined to have been involved in a ransomware demand scheme.</text></paragraph><paragraph id="id5a0b2554fcf449c29eb7580af5644aa6"><enum>(2)</enum><header>Country of origin report</header><text>The Secretary of State, in consultation with the Director of National Intelligence and the Director of the Federal Bureau of Investigation, shall—</text><subparagraph id="idEF6879AED2A84D418C76CDB3F4DCAB58"><enum>(A)</enum><text>submit a report, with a classified annex, to the <committee-name committee-id="SSFR00">Committee on Foreign Relations of the Senate</committee-name>, the <committee-name committee-id="SLIN00">Select Committee on Intelligence of the Senate</committee-name>, the <committee-name committee-id="">Committee on Foreign Affairs of the House of Representatives</committee-name>, and the <committee-name committee-id="">Permanent Select Committee on Intelligence of the House of Representatives</committee-name> that identifies the country of origin of foreign-based ransomware attacks; and</text></subparagraph><subparagraph id="idBF64595980994CE49C9C05968C5BC901"><enum>(B)</enum><text>make the report described in subparagraph (A) (excluding the classified annex) available to the public.</text></subparagraph></paragraph><paragraph id="idfe96f8c2a4a849d6bcdc3426b1c118ea" commented="no" display-inline="no-display-inline"><enum>(3)</enum><header>Investigative authorities report</header><text>Not later than 180 days after the date of the enactment of this Act, the Comptroller General of the United States shall issue a report that outlines the authorities available to the Federal Bureau of Investigation, the United States Secret Service, the Cybersecurity and Infrastructure Security Agency, Homeland Security Investigations, and the Office of Foreign Assets Control to respond to foreign-based ransomware attacks. </text></paragraph></subsection></section><section id="id01C95B017695409C867CFE73CF332FA8"><enum>514.</enum><header>Deeming ransomware threats to critical infrastructure a national intelligence priority</header><subsection id="idB6779254E7D944A78091E5A639176DA9"><enum>(a)</enum><header>Critical infrastructure defined</header><text>In this section, the term <term>critical infrastructure</term> has the meaning given such term in subsection (e) of the Critical Infrastructures Protection Act of 2001 (<external-xref legal-doc="usc" parsable-cite="usc/42/5195c">42 U.S.C. 5195c(e)</external-xref>).</text></subsection><subsection id="idA0C033F3940B4E92A495F4BC88F2F594"><enum>(b)</enum><header>Ransomware threats to critical infrastructure as national intelligence priority</header><text>The Director of National Intelligence, pursuant to the provisions of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>), the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="public-law" parsable-cite="pl/108/458">Public Law 108–458</external-xref>), section 1.3(b)(17) of Executive Order 12333 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001</external-xref> note; relating to United States intelligence activities), as in effect on the day before the date of the enactment of this Act, and National Security Presidential Directive–26 (February 24, 2003; relating to intelligence priorities), as in effect on the day before the date of the enactment of this Act, shall deem ransomware threats to critical infrastructure a national intelligence priority component to the National Intelligence Priorities Framework.</text></subsection><subsection id="id4F79A2E3ADF544BAA9C95886F77D54A9"><enum>(c)</enum><header>Report</header><paragraph id="id0FE9467DA0D84657B4339ABB4602F59E"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall, in consultation with the Director of the Federal Bureau of Investigation, submit to the Select Committee on Intelligence of the Senate and the Permanent Select Committee on Intelligence of the House of Representatives a report on the implications of the ransomware threat to United States national security.</text></paragraph><paragraph id="id2B0F5CFABDA048B5957265BBE90BCD77"><enum>(2)</enum><header>Contents</header><text>The report submitted under paragraph (1) shall address the following:</text><subparagraph id="id275914372e284196ae942318dcab5dfc"><enum>(A)</enum><text>Identification of individuals, groups, and entities who pose the most significant threat, including attribution to individual ransomware attacks whenever possible.</text></subparagraph><subparagraph id="ided26844f34874b5ea7e561c414cedcbd"><enum>(B)</enum><text>Locations from which individuals, groups, and entities conduct ransomware attacks.</text></subparagraph><subparagraph id="idaf46987171974fb2933dfb8cdc2c6700"><enum>(C)</enum><text>The infrastructure, tactics, and techniques ransomware actors commonly use.</text></subparagraph><subparagraph id="id00386dc9e5a74bb68c793122455a3a52"><enum>(D)</enum><text>Any relationships between the individuals, groups, and entities that conduct ransomware attacks and their governments or countries of origin that could impede the ability to counter ransomware threats.</text></subparagraph><subparagraph id="idb49d05686cc34b0295ddfddc8946f3cf"><enum>(E)</enum><text>Intelligence gaps that have impeded, or currently are impeding, the ability to counter ransomware threats. </text></subparagraph></paragraph><paragraph id="id6323DA65BE4F4B69965B8ACBE4C4DBCA" commented="no" display-inline="no-display-inline"><enum>(3)</enum><header>Form</header><text>The report submitted under paragraph (1) shall be submitted in unclassified form, but may include a classified annex.</text></paragraph></subsection></section></title><title style="OLC" commented="no" level-type="subsequent" id="id6331508a886f46bcae4eb2a694a89830"><enum>VI</enum><header>Classification reform</header><section id="ide0d5962de8ea47acba6bc25e3f969f44"><enum>601.</enum><header>Governance of classification and declassification system</header><subsection id="id0d37d348ada542cdb4e7fecfef2f4500"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="id379cba678b8c4120bbab90d1da694229"><enum>(1)</enum><header>Controlled unclassified information</header><text display-inline="yes-display-inline">The term <term>controlled unclassified information</term> means information described as <quote>Controlled Unclassified Information</quote> or <quote>CUI</quote> in Executive Order 13556 (75 Fed. Reg. 68675; relating to controlled unclassified information), or any successor order.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idcebfad8d55e64258bd39da3ee5d44cd4"><enum>(2)</enum><header>Executive Agent</header><text>The term <term>Executive Agent</term> means the Executive Agent for Classification and Declassification designated under subsection (b)(1)(A).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7dbef774b47e4dbf98760d1d9cf7a7f4"><enum>(3)</enum><header>Executive Committee</header><text>The term <term>Executive Committee</term> means the Executive Committee on Classification and Declassification Programs and Technology established under subsection (b)(1)(C).</text></paragraph></subsection><subsection id="idb8f32fa09f8e4115be03c4c5626144cb"><enum>(b)</enum><header>Establishment of classification and declassification governance</header><paragraph id="id77d59db41f234e5ba511ff02c0db0f47"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the President shall—</text><subparagraph id="ided9e8331cbc34886a2f1f1d7cb422d03"><enum>(A)</enum><text>designate a Federal official as Executive Agent for Classification and Declassification to identify and promote technological solutions to support efficient and effective systems for classification and declassification to be implemented on an interoperable and federated basis across the Federal Government;</text></subparagraph><subparagraph id="idff6374a6a94b49499efada5e9156ca4d"><enum>(B)</enum><text>designate a Federal official—</text><clause commented="no" display-inline="no-display-inline" id="id45556f02daf74ef3b6470ba4ab30c20e"><enum>(i)</enum><text display-inline="yes-display-inline">to establish policies and guidance relating to classification and declassification and controlled unclassified information across the Federal Government;</text></clause><clause commented="no" display-inline="no-display-inline" id="id98ddfc0b9b63413db1499294e76d21b4"><enum>(ii)</enum><text display-inline="yes-display-inline">to conduct oversight of the implementation of such policies and guidance; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idbcf543c072ca44d8844f08773e4afa52"><enum>(iii)</enum><text display-inline="yes-display-inline">who may, at the discretion of the President, also serve as Executive Agent; and</text></clause></subparagraph><subparagraph id="idea9aace8e52648e8ac16683c4f693ec2"><enum>(C)</enum><text>establish an Executive Committee on Classification and Declassification Programs and Technology to provide direction, advice, and guidance to the Executive Agent.</text></subparagraph></paragraph><paragraph id="ida7020947c5644c29b63a12f2eac0202d"><enum>(2)</enum><header>Executive Committee</header><subparagraph id="idb1f6eaf1f3db4201b56043ab0c5a88e0"><enum>(A)</enum><header>Composition</header><text>The Executive Committee shall be composed of the following or their designees:</text><clause id="id46cf4f299c8f4c1f8746d2858ae3383c"><enum>(i)</enum><text>The Director of National Intelligence.</text></clause><clause id="id5998d9e6a1434701b38092d7564ec968"><enum>(ii)</enum><text>The Under Secretary of Defense for Intelligence and Security.</text></clause><clause id="id997b739172f74df682e7fa56c262b83e"><enum>(iii)</enum><text>The Secretary of Energy.</text></clause><clause id="idbb30ddabf71e4d1794d0b3e7baa34a18"><enum>(iv)</enum><text>The Secretary of State.</text></clause><clause id="id0008f91f41084d5d832ff4cdbb290be4"><enum>(v)</enum><text>The Director of the Office of Management and Budget.</text></clause><clause id="idff09deedfc994f408b2d949430dac0cb"><enum>(vi)</enum><text>The Archivist of the United States.</text></clause><clause id="id84dcd33426464032ab956373e4328154"><enum>(vii)</enum><text>The Federal official designated under subsection (b)(1)(B) if such official is not also the Executive Agent.</text></clause><clause id="id93fd2bdf364e4d3381d7bfa237a0b9da"><enum>(viii)</enum><text>Such other members as the Executive Agent considers appropriate.</text></clause></subparagraph><subparagraph id="idea08e636655246609a64304881d6a20e"><enum>(B)</enum><header>Chairperson</header><text>The Executive Agent shall be the chairperson of the Executive Committee.</text></subparagraph></paragraph></subsection><subsection id="idf80da052f0f8482297fb3ac782b1a822"><enum>(c)</enum><header>Report to Congress</header><paragraph commented="no" display-inline="no-display-inline" id="id34bfc9837dff4cb4b4a132cc4a58d044"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the President shall submit to Congress a report on the administration of this section.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id14f83fac90b4400c8086c764f70f901a"><enum>(2)</enum><header>Contents</header><text display-inline="yes-display-inline">The report submitted pursuant to paragraph (1) shall include the following:</text><subparagraph id="idfc2c1a3351724dbdb0c985883a027485"><enum>(A)</enum><text>Funding, personnel, expertise, and resources required for the Executive Agent and a description of how such funding, personnel, expertise, and resources will be provided.</text></subparagraph><subparagraph id="id9ccb1b1d28a240ec95c09cd68ab053be"><enum>(B)</enum><text>Authorities needed by the Executive Agent, a description of how such authorities will be granted, and a description of any additional statutory authorities required.</text></subparagraph><subparagraph id="id6b6997466bb444e09017578f2eb2075a"><enum>(C)</enum><text>Funding, personnel, expertise, and resources required by the Federal official designated under subsection (b)(1)(B) and a description of how such funding, personnel, expertise, and resources will be provided.</text></subparagraph><subparagraph id="id25aeca83c2394d54b486ab105383db20"><enum>(D)</enum><text>Authorities needed by the Federal official designated under subsection (b)(1)(B), a description of how such authorities will be provided, and a description of any additional statutory authorities required.</text></subparagraph><subparagraph id="id0924865bec3341c8b0a20bd5ea004393"><enum>(E)</enum><text>Funding and resources required by the Public Interest Declassification Board.</text></subparagraph></paragraph></subsection><subsection id="iddbae4c1116e84e59a24659f93839668b"><enum>(d)</enum><header>Public reporting</header><paragraph id="idc641771f85ad404fb1273fb962fec4ea"><enum>(1)</enum><header>In general</header><text>The report required by subsection (c) shall be made available to the public to the greatest extent possible consistent with the protection of sources and methods.</text></paragraph><paragraph id="idaf45bd83d81f4e389629b35602469791" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Publication in Federal Register</header><text>The President shall publish in the Federal Register the roles and responsibilities of the Federal officials designated under subsection (b), the Executive Committee, and any subordinate individuals or entities.</text></paragraph></subsection></section><section id="id5c2ebfc563274ba186b68f753c9b6f75"><enum>602.</enum><header>Classification and declassification of information</header><subsection commented="no" display-inline="no-display-inline" id="id7dbec0d94d1344ba8b56c56f15c64fff"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text>Title VIII of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161 et seq.</external-xref>) is amended by inserting after section 801 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id5BC4086039B0414492E52D4D2E7F79B6"><section commented="no" display-inline="no-display-inline" id="id727c26f8978247f1932fd42fcd44d7c5"><enum>801A.</enum><header>Classification and declassification of information</header><subsection id="id53891db8b6d7493eb7272665efb7d06e"><enum>(a)</enum><header>In general</header><text>The President may, in accordance with this section, protect from unauthorized disclosure any information owned by, produced by or for, or under the control of the executive branch of the Federal Government when there is a demonstrable need to do so to protect the national security of the United States.</text></subsection><subsection id="idb47c6695637d48a8814d753fc32ff050"><enum>(b)</enum><header>Establishment of standards, categories, and procedures for classification and declassification</header><paragraph id="idcc0b545b389c49edb8cddc710aeb5e06"><enum>(1)</enum><header>Governmentwide procedures</header><subparagraph id="id39f4a40a7a2d4120bf737cebb0385302"><enum>(A)</enum><header>Classification</header><text>The President shall, to the extent necessary, establish categories of information that may be classified and procedures for classifying information under subsection (a).</text></subparagraph><subparagraph id="ida21ff2616986415babe90399ee1384bc"><enum>(B)</enum><header>Declassification</header><text>At the same time the President establishes categories and procedures under subparagraph (A), the President shall establish procedures for declassifying information that was previously classified.</text></subparagraph><subparagraph id="id2bff3d96d9cb4ce3ac4bb271332b89e7"><enum>(C)</enum><header>Minimum requirements</header><text>The procedures established pursuant to subparagraphs (A) and (B) shall—</text><clause id="idb2897cc078ed4eeeb9f6bb7c34789f82"><enum>(i)</enum><text>be the exclusive means for classifying information on or after the effective date established by subsection (c), except with respect to information classified pursuant to the Atomic Energy Act of 1954 (<external-xref legal-doc="usc" parsable-cite="usc/42/2011">42 U.S.C. 2011 et seq.</external-xref>);</text></clause><clause id="idf893ba369fdf4bb8a7adfa0809db1291"><enum>(ii)</enum><text>ensure that no information is classified unless there is a demonstrable need to do so to protect the national security and there is a reasonable basis to believe that means other than classification will not provide sufficient protection;</text></clause><clause id="id7da543e465fc479ea26b41e762540e30"><enum>(iii)</enum><text>ensure that no information may remain classified indefinitely;</text></clause><clause id="id897c6d563e5f40c89ac47f60ca49bd76"><enum>(iv)</enum><text>ensure that no information shall be classified, continue to be maintained as classified, or fail to be declassified in order—</text><subclause id="ida98dbd8e89684eba8882df4d8fb2c952"><enum>(I)</enum><text>to conceal violations of law, inefficiency, or administrative error;</text></subclause><subclause id="id9e8b334d29ae4cb0abb112c412a6592a"><enum>(II)</enum><text>to prevent embarrassment to a person, organization, or agency;</text></subclause><subclause id="id50b143bdecc34ee4a55ec922d5ec314d"><enum>(III)</enum><text>to restrain competition; or</text></subclause><subclause id="id5f5e5d96ebcb44b49c962e775d86005b"><enum>(IV)</enum><text>to prevent or delay the release of information that does not require protection in the interest of the national security;</text></subclause></clause><clause id="id2c9954e39adb43859065d51486f55ded"><enum>(v)</enum><text>ensure that basic scientific research information not clearly related to the national security shall not be classified;</text></clause><clause id="id7f7c0177deb246e6891ba2fb2991a0f0"><enum>(vi)</enum><text>ensure that information may not be reclassified after being declassified and released to the public under proper authority unless personally approved by the President based on a determination that such reclassification is required to prevent significant and demonstrable damage to the national security;</text></clause><clause id="ide66824f1ba8a4f11bf7ab8ea2ffabdf9"><enum>(vii)</enum><text>establish standards and criteria for the classification of information;</text></clause><clause id="idd5e8754e853c4518bd0b7c8b4073fe0f"><enum>(viii)</enum><text>establish standards, criteria, and timelines for the declassification of information classified under this section;</text></clause><clause id="ideb4a589fc3434c999e91c3364ee75875"><enum>(ix)</enum><text>provide for the automatic declassification of classified records with permanent historical value not more than 50 years after the date of origin of such records, unless the head of each agency that classified information contained in such records makes a written determination to delay automatic declassification and such determination is reviewed not less frequently than every 10 years;</text></clause><clause id="id0a924201d20a4c41805c45fa0e1c4aa2"><enum>(x)</enum><text>provide for the timely review of materials submitted for pre-publication;</text></clause><clause id="ide9932120d94c41d6b79d5526cdb93b80"><enum>(xi)</enum><text>ensure that due regard is given for the public interest in disclosure of information;</text></clause><clause id="idf70339bf8ac94b448d3572f087f649ab"><enum>(xii)</enum><text>ensure that due regard is given for the interests of departments and agencies in sharing information at the lowest possible level of classification;</text></clause></subparagraph><subparagraph id="id482ef04a481541558907a014f2000e68"><enum>(D)</enum><header>Submittal to Congress</header><text>The President shall submit to Congress the categories and procedures established under subsection (b)(1)(A) and the procedures established under subsection (b)(1)(B) at least 60 days prior to their effective date.</text></subparagraph></paragraph><paragraph id="id4795d7a100914557948b38c29ee055df"><enum>(2)</enum><header>Agency standards and procedures</header><subparagraph id="id616a6a7bbf3a4986822807347ae2d5a5"><enum>(A)</enum><header>In general</header><text>The head of each agency shall establish a single set of consolidated standards and procedures to permit such agency to classify and declassify information created by such agency in accordance with the categories and procedures established by the President under this section and otherwise to carry out this section.</text></subparagraph><subparagraph id="idf522ecc7b8d940578e64663c7f42ae00"><enum>(B)</enum><header>Submittal to Congress</header><text>Each agency head shall submit to Congress the standards and procedures established by such agency head under subparagraph (A).</text></subparagraph></paragraph></subsection><subsection id="id7005119bdfa84ee6b9cc2ca8db64001c"><enum>(c)</enum><header>Effective date</header><paragraph id="id1be9cbb8d49d49b3bbe9061debe68c68"><enum>(1)</enum><header>In general</header><text>Subsections (a) and (b) shall take effect on the date that is 180 days after the date of the enactment of the <short-title>Intelligence Authorization Act for Fiscal Year 2025</short-title>.</text></paragraph><paragraph id="idb179cc5583d24d008b5093d7990d733d"><enum>(2)</enum><header>Relation to presidential directives</header><text>Presidential directives regarding classifying, safeguarding, and declassifying national security information, including Executive Order 13526 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to classified national security information), in effect on the day before the date of the enactment of this Act, as well as procedures issued pursuant to such Presidential directives, shall remain in effect until superseded by procedures issued pursuant to subsection (b).</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id8b20272e1aac43e1914075ec6630b818"><enum>(b)</enum><header>Conforming amendment</header><text>Section 805(2) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/3164">50 U.S.C. 3164(2)</external-xref>) is amended by inserting <quote>section 801A,</quote> before <quote>Executive Order</quote>.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idcde53275d11642cb957d01b4379d6c64"><enum>(c)</enum><header>Clerical amendment</header><text>The table of contents preceding section 2 of such Act is amended by inserting after the item relating to section 801 the following new item:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id0B89EBB1BE104EC4A517EFA40BAC2CD4"><toc><toc-entry level="section" bold="off">Sec. 801A. Classification and declassification of information.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section commented="no" display-inline="no-display-inline" id="id516dfee8cdc24bad9a7f2e8b9f30a35e"><enum>603.</enum><header>Minimum standards for Executive agency insider threat programs</header><subsection id="id19aae8adf4d14bd4a1c02243e60a65b2"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="ID043B992AD9EB4DCC964E34952FB88FFF"><enum>(1)</enum><header>Agency</header><text>The term <term>agency</term> means any Executive agency as defined in section 105 of title 5, United States Code, any military department as defined in section 102 of such title, and any other entity in the executive branch of the Federal Government that comes into the possession of classified information. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID2530196F195D4CECA962A62F6002ABB9"><enum>(2)</enum><header>Classified information</header><text display-inline="yes-display-inline">The term <term>classified information</term> means information that has been determined to require protection from unauthorized disclosure pursuant to Executive Order 13526 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to classified national security information), or predecessor or successor order, to protect the national security of the United States. </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idfc88883741e349499ff09c8c53b10884"><enum>(b)</enum><header display-inline="yes-display-inline">Establishment of insider threat programs</header><text>Each head of an agency with access to classified information shall establish an insider threat program to protect classified information from unauthorized disclosure.</text></subsection><subsection id="idcb0524f628e34222aed6c37ef639df12"><enum>(c)</enum><header>Minimum standards</header><text>In carrying out an insider threat program established by the head of an agency pursuant to subsection (b), the head of the agency shall—</text><paragraph id="id5f67b45691b446faa74831e7ff59a2c2"><enum>(1)</enum><text>designate a senior official of the agency who shall be responsible for management of the program;</text></paragraph><paragraph id="id2c83687950c546589071de0fbd7632cf"><enum>(2)</enum><text>monitor user activity on all classified networks to detect activity indicative of insider threat behavior;</text></paragraph><paragraph id="iddd7a6efc2e634df2aa3b090a44f219b7"><enum>(3)</enum><text>build and maintain an insider threat analytic and response capability to review, assess, and respond to information obtained pursuant to paragraph (2); and</text></paragraph><paragraph id="id188876e26e0b43df9f05c5e28602baae"><enum>(4)</enum><text>provide insider threat awareness training to all cleared employees within 30 days of entry-on-duty or granting of access to classified information and annually thereafter.</text></paragraph></subsection><subsection id="id71f657ea38bb455ea84d9cc537e618d7" commented="no" display-inline="no-display-inline"><enum>(d)</enum><header>Annual reports</header><text>Not less frequently than once each year, the Director of National Intelligence shall, serving as the Security Executive Agent under section 803 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3162a">50 U.S.C. 3162a</external-xref>), submit to Congress an annual report on the compliance of agencies with respect to the requirements of this section. </text></subsection></section></title><title style="OLC" commented="no" level-type="subsequent" id="id727f4687064d40079d3c409e7fbcbe72"><enum>VII</enum><header display-inline="yes-display-inline">Security clearances and intelligence community workforce improvements</header><section id="idf3565186b5254d7da829f354b35b735c"><enum>701.</enum><header>Security clearances held by certain former employees of intelligence community</header><subsection commented="no" display-inline="no-display-inline" id="idd854b720b7c84c54b12387c964a11afa"><enum>(a)</enum><header display-inline="yes-display-inline">Issuance of guidelines and instructions required</header><text>Section 803(c) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3162a">50 U.S.C. 3162a(c)</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idebd7ade79da9467db6b50d1941e6ede4"><enum>(1)</enum><text display-inline="yes-display-inline">in paragraph (3), by striking <quote>; and</quote> and inserting a semicolon;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id82a0146dcc074338887b907be2ced8c8"><enum>(2)</enum><text>in paragraph (4), by striking the period at the end and inserting <quote>; and</quote>; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idbe73e3eed75b425792b78acec56a785e"><enum>(3)</enum><text display-inline="yes-display-inline">by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="iddf238692a63546dea5776a1b419571f6"><paragraph id="idc46a39ee452f449abfb1f516d6611913"><enum>(5)</enum><text>issue guidelines and instructions to the heads of Federal agencies to ensure that any individual who was appointed by the President to a position in an element of the intelligence community but is no longer employed by the Federal Government shall maintain a security clearance only in accordance with Executive Order 12968 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to access to classified information), or successor order.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id4b38c4d1e5574afcb8f006e8c4549761"><enum>(b)</enum><header>Submittal of guidelines and instructions to Congress required</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall, in the Director's capacity as the Security Executive Agent pursuant to subsection (a) of section 803 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3162a">50 U.S.C. 3162a</external-xref>), submit to the congressional intelligence committees and the congressional defense committees (as defined in section 101(a) of title 10, United States Code) the guidelines and instructions required by subsection (c)(5) of such Act, as added by subsection (a) of this section.</text></subsection><subsection id="ida70b20a2168d476da489edfe1d8c6b51"><enum>(c)</enum><header>Annual report required</header><paragraph commented="no" display-inline="no-display-inline" id="id269c40bb68604010a8e3a4a7a3034a8e"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, and not less frequently than once each year thereafter, the Director of National Intelligence shall, in the Director’s capacity as the Security Executive Agent pursuant to section 803(a) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3162a">50 U.S.C. 3162a(a)</external-xref>), submit to the congressional intelligence committees and the congressional defense committees (as defined in section 101(a) of title 10, United States Code) an annual report on the eligibility status of former senior employees of the intelligence community to access classified information.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id3bc59f88d0c242819cd2647f2aa10e85"><enum>(2)</enum><header>Contents</header><text display-inline="yes-display-inline">Each report submitted pursuant to paragraph (1) shall include, for the period covered by the report, the following:</text><subparagraph id="idf86e329283d34afc9625269efe36c091"><enum>(A)</enum><text>A list of individuals who were appointed by the President to a position in an element of the intelligence community who currently hold security clearances.</text></subparagraph><subparagraph id="id7e1726545c7749ba830dac1666477a53"><enum>(B)</enum><text>The number of such former employees who still hold security clearances.</text></subparagraph><subparagraph id="idda7952d66bbc46e399f45afc18545d17"><enum>(C)</enum><text>For each former employee described in subparagraph (B)—</text><clause id="idf83fd003b7f94832bf493e6506373719"><enum>(i)</enum><text>the position in the intelligence community held by the former employee;</text></clause><clause id="idbb712786e35147a5b225d549f817459b"><enum>(ii)</enum><text>the years of service in such position; and</text></clause><clause id="id57a505699590474a840544d88569e6ac"><enum>(iii)</enum><text>the individual’s current employment position and employer.</text></clause></subparagraph><subparagraph id="idcf957b471bc34e05a4d849ccf95b13bb" commented="no" display-inline="no-display-inline"><enum>(D)</enum><text>The Federal entity authorizing and adjudicating the former employees’ need to know classified information.</text></subparagraph></paragraph></subsection></section><section id="id0d7e998e4d9543018f4b9d2b8ee9e0fc"><enum>702.</enum><header>Policy for authorizing intelligence community program of contractor-owned and contractor-operated sensitive compartmented information facilities</header><subsection id="idba4e8d39b13c44dba7ad479e778d8dcc"><enum>(a)</enum><header>Policy</header><text>The Director of National Intelligence shall establish a standardized policy for the intelligence community that authorizes a program of contractor-owned and contractor-operated sensitive compartmented information facilities as a service to the national security and intelligence enterprises.</text></subsection><subsection id="idf5a73140dcca40c88616fd9644c9caf5"><enum>(b)</enum><header>Requirements</header><text>The policy established pursuant to subsection (a) shall—</text><paragraph id="id2bcacf6a49234e2eb015a23bc891e9eb"><enum>(1)</enum><text>authorize the head of an element of the intelligence community to approve and accredit contractor-owned and contractor-operated sensitive compartmented information facilities; and</text></paragraph><paragraph id="id20f56b7c7a354feda309faaf3a8d14e9"><enum>(2)</enum><text>designate an element of the intelligence community as a service of common concern (as defined in Intelligence Community Directive 122, or successor directive) to serve as an accrediting authority on behalf of other elements of the intelligence community for contractor-owned and contractor-operated sensitive compartmented information facilities.</text></paragraph></subsection><subsection id="idc6e1dd2ebce54656a4c8bf79b3b6be5f"><enum>(c)</enum><header>Cost considerations</header><text>In establishing the policy required by subsection (a), the Director shall consider existing demonstrated models where a contractor acquires, outfits, and manages a facility pursuant to an agreement with the Federal Government such that no funding from the Federal Government is required to carry out the agreement.</text></subsection><subsection id="idbb0497e5f57243c2b92fded8be7ad364"><enum>(d)</enum><header>Briefing required</header><text>Not later than 1 year after the date on which the Director establishes the policy pursuant to subsection (a), the Director shall brief the congressional intelligence committees on—</text><paragraph commented="no" display-inline="no-display-inline" id="idb3c3b4ed15854fd587f6f6e78dc5ea1d"><enum>(1)</enum><text display-inline="yes-display-inline">additional opportunities to leverage contractor-provided secure facility space; and</text></paragraph><paragraph id="id388a59b6e2714f9a9c0d4bac264d325f" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text display-inline="yes-display-inline">recommendations to address barriers, including resources or authorities needed.</text></paragraph></subsection></section><section id="id54eab772220441bf9c266768aecc496a"><enum>703.</enum><header>Enabling intelligence community integration</header><subsection commented="no" display-inline="no-display-inline" id="id58e161f71dd5412d955a6422d52daabe"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>) is amended by inserting after section 113B the following new section:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id7B4E6D020E894591B998A47D444BEDB8"><section id="id6f1b488adf1d4d98abd6714881e2d3a0"><enum>113C.</enum><header>Enabling intelligence community integration</header><subsection commented="no" display-inline="no-display-inline" id="id19267dcc8c984ab9a10562fe84b9edf0"><enum>(a)</enum><header>Provision of goods or services</header><text display-inline="yes-display-inline">Subject to and in accordance with any guidance and requirements developed by the Director of National Intelligence, the head of an element of the intelligence community may provide goods or services to another element of the intelligence community without reimbursement or transfer of funds for hoteling initiatives for intelligence community employees and affiliates defined in any such guidance and requirements issued by the Director of National Intelligence. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="idf4e26b9713764c59ac24895e1a468d0c"><enum>(b)</enum><header>Approval</header><text display-inline="yes-display-inline">Prior to the provision of goods or services pursuant to subsection (a), the head of the element of the intelligence community providing such goods or services and the head of the element of the intelligence community receiving such goods or services shall approve such provision.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idb6733cb349cd4867a86427936a892799"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of the National Security Act of 1947 is amended by inserting after the item relating to section 113B the following: </text><quoted-block style="OLC" id="idc077ed98-b5a4-4bf2-9b2e-546c4ae1ed9b"><toc><toc-entry level="section" idref="id6f1b488adf1d4d98abd6714881e2d3a0">Sec. 113C. Enabling intelligence community integration.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section section-type="subsequent-section" id="id25c953ea7aba4a14884644f919eb8e7d"><enum>704.</enum><header>Appointment of spouses of certain Federal employees</header><subsection commented="no" display-inline="no-display-inline" id="id57d72fd8da274d7fb408f1dcfca12282"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Section 3330d of title 5, United States Code, is amended—</text><paragraph id="id53692D9E04784C5F9A4FFAAD0650D997"><enum>(1)</enum><text>in the section heading, by striking <quote><header-in-text style="USC" level="section">military and Department of Defense civilian spouses</header-in-text></quote> and inserting <quote><header-in-text style="USC" level="section">military and Department of Defense, Department of State, and intelligence community spouses</header-in-text></quote>;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id95e841ad4eee4df9a4c2455e32b22fe0"><enum>(2)</enum><text display-inline="yes-display-inline">in subsection (a)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id6a5c5b5dc7fb4734821aa1e91f2894e0"><enum>(A)</enum><text display-inline="yes-display-inline">by redesignating the second paragraph (4) (relating to a spouse of an employee of the Department of Defense) as paragraph (7);</text></subparagraph><subparagraph id="id37164b05d5ad47179c4b5669a3a3104b"><enum>(B)</enum><text>by striking paragraph (5);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id94e62031b52b443e9471ecccf6034e0b"><enum>(C)</enum><text>by redesignating paragraph (4) (relating to the spouse of a disabled or deceased member of the Armed Forces) as paragraph (6); </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id705c9ed232c6450a9e6e53720d945a94"><enum>(D)</enum><text display-inline="yes-display-inline">by striking paragraph (3) and inserting the following:</text><quoted-block style="OLC" id="idBAEA883EB7BD41C187F85427B97D58BA" act-name=""><paragraph id="id18F3182A5D8C4BD4A326C1CBF9868038"><enum>(3)</enum><text>The term <term>covered spouse</term> means an individual who is married to an individual who—</text><subparagraph commented="no" display-inline="no-display-inline" id="id6b69598102e64f0a9205604d39eec272"><enum>(A)</enum><clause commented="no" display-inline="yes-display-inline" id="ide49cb7bacbd5466e97713ef59a50d2ba"><enum>(i)</enum><text>is an employee of the Department of State or an element of the intelligence community; or</text></clause><clause commented="no" display-inline="no-display-inline" id="idb3dd236510d14d819c68f982017c29cf" indent="up1"><enum>(ii)</enum><text>is a member of the Armed Forces who is assigned to an element of the intelligence community; and</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idfc5d6c28567344c8a6d8dc3348224721"><enum>(B)</enum><text>is transferred in the interest of the Government from one official station within the applicable agency to another within the agency (that is outside of normal commuting distance) for permanent duty.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id957380159fa74b4a9e48c1f61a5db8d7"><enum>(4)</enum><text>The term <term>intelligence community</term> has the meaning given the term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc9f5e4c2728b47ddbc3ee087c7b329f7"><enum>(5)</enum><text display-inline="yes-display-inline">The term <term>remote work</term> refers to a work flexibility arrangement under which an employee— </text><subparagraph id="id5C5171684DF14375888C9334113FBB5F"><enum>(A)</enum><text>is not expected to physically report to the location from which the employee would otherwise work, considering the position of the employee; and</text></subparagraph><subparagraph id="id7C079A868BAB4D408FADEA265EF6996E"><enum>(B)</enum><text>performs the duties and responsibilities of such employee’s position, and other authorized activities, from an approved worksite— </text><clause id="idD71205EE62BA4F11AB7C55EEA82B2771"><enum>(i)</enum><text>other than the location from which the employee would otherwise work;</text></clause><clause id="id80B2C4A7B26342F383E9D292CFCB6EC5"><enum>(ii)</enum><text>that may be inside or outside the local commuting area of the location from which the employee would otherwise work; and</text></clause><clause id="id50496A4126234E89AF62E2F7F8542F18"><enum>(iii)</enum><text>that is typically the residence of the employee.</text></clause></subparagraph></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc6bcafa2627741728f2fc45bd25f3142"><enum>(E)</enum><text>by adding at the end the following:</text><quoted-block id="idD15686539CFE4448825B82891A9BA520" style="OLC" act-name=""><paragraph id="idA233A49C6E724D3796EB72848C3A6272"><enum>(8)</enum><text>The term <term>telework</term> has the meaning given the term in section 6501.</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id185F04978341460C944A2EC63D8931B3"><enum>(3)</enum><text>in subsection (b)—</text><subparagraph id="id2ca1f33c0a7b44f79e46496df7142f18"><enum>(A)</enum><text>in paragraph (2), by striking <quote>or</quote> at the end;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4491fa43f92d4916aab966ca254a4e56"><enum>(B)</enum><text>in the first paragraph (3) (relating to a spouse of a member of the Armed Forces on active duty), by striking the period at the end and inserting a semicolon;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id8942c5c7c19d4c5e8a717d631eb5b54d"><enum>(C)</enum><text>by redesignating the second paragraph (3) (relating to a spouse of an employee of the Department of Defense) as paragraph (4); </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2fc02785b39947798551964ad6d47273"><enum>(D)</enum><text>in paragraph (4), as so redesignated— </text><clause commented="no" display-inline="no-display-inline" id="idc8b333d3613843a683c2c148e6506014"><enum>(i)</enum><text display-inline="yes-display-inline">by inserting <quote>, including to a position in which the spouse will engage in remote work</quote> after <quote>Department of Defense</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id3bf4bc1446da427c91e7d99964d1e7ae"><enum>(ii)</enum><text display-inline="yes-display-inline">by striking the period at the end and inserting <quote>; or</quote>; and</text></clause></subparagraph><subparagraph id="id74bee6b2cba94760866246bd3b7f49a1"><enum>(E)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8972908ace954f76853cb0cbd6c48f6a"><paragraph id="id5a619009687444d49427fc42f7a5d097"><enum>(5)</enum><text>a covered spouse to a position in which the covered spouse will engage in remote work.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id885229f1389e4d19a03153e1761c34b3"><enum>(b)</enum><header>Technical and conforming amendment</header><text>The table of sections for subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/5/33">chapter 33</external-xref> of title 5, United States Code, is amended by striking the item relating to section 3330d and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idA1CB1946B106489690B9255DEB802BD9"><toc><toc-entry level="section" bold="off">3330d. Appointment of military and Department of Defense, Department of State, and intelligence community civilian spouses.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idD9CD94FB1D6B420C8810B6CEF33CF797"><enum>705.</enum><header>Plan for staffing the intelligence collection positions of the Central Intelligence Agency</header><subsection commented="no" display-inline="no-display-inline" id="iddc51ab99957f46afb6a47a94ba68c500"><enum>(a)</enum><header>In general</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of the Central Intelligence Agency shall submit to the congressional intelligence committees a plan for ensuring that the Directorate of Operations of the Agency has staffed every civilian full-time equivalent position authorized for that Directorate under the Intelligence Authorization Act for Fiscal Year 2024 (division G of <external-xref legal-doc="public-law" parsable-cite="pl/118/31">Public Law 118–31</external-xref>). </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id0ec175b06dcd4b5ea69389a29252ff63"><enum>(b)</enum><header>Elements</header><text>The plan required by subsection (a) shall include the following:</text><paragraph commented="no" display-inline="no-display-inline" id="idc530003c06024d87bca978faf5df20ef"><enum>(1)</enum><text display-inline="yes-display-inline">Specific benchmarks and timelines for accomplishing the goal described in such subsection by September 30, 2025. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id66540777119a491586a0f5cd15472ee0"><enum>(2)</enum><text display-inline="yes-display-inline">An assessment of the appropriate balance of staffing between the Directorate of Operations and the Directorate of Analysis consistent with the responsibilities of the Director of the Central Intelligence Agency under section 104A(d) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3036">50 U.S.C. 3036(d)</external-xref>). </text></paragraph></subsection></section><section id="id3CF3A2F75B124317ACB1414E160099B5"><enum>706.</enum><header>Intelligence community workplace protections</header><subsection commented="no" display-inline="no-display-inline" id="id4949cff04eef4242b7a5263fb03fd51c"><enum>(a)</enum><header display-inline="yes-display-inline">Employment status</header><paragraph id="id64cfe02608254fb08c18e3e1864e8f94"><enum>(1)</enum><header>Conversion of positions by Director of National Intelligence to excepted service</header><text>Section 102A(v) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024(v)</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id7643ffc97c3b45ceafd803cebf0ddd36"><enum>(A)</enum><text display-inline="yes-display-inline">by redesignating paragraphs (2) through (4) as paragraphs (3) through (5), respectively; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idfc48d259e74f45058ca2cac696ff6e0a"><enum>(B)</enum><text display-inline="yes-display-inline">by inserting after paragraph (1) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="iddcad36c154244a3d94279281254b4d19"><paragraph id="idc68f1de064d14adc93b6c076bede412b" indent="up1"><enum>(2)</enum><text>The Director shall promptly notify the congressional intelligence committees of any action taken pursuant to paragraph (1).</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7ec40ba13e094f45b3324075893b6ae6"><enum>(C)</enum><text>in paragraph (3), as redesignated by subparagraph (A), by striking <quote>occupying a position on the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2012</quote>.</text></subparagraph></paragraph><paragraph id="id62dfd835d07142f8b3c0e27061ce182c"><enum>(2)</enum><header>Conversion of defense intelligence positions to excepted service</header><text>Section 1601(a) of title 10, United States Code, is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id4f70faa697ac442bb5fd324f197ef4a6"><enum>(A)</enum><text display-inline="yes-display-inline">by redesignating subsection (b) as subsection (d); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4247b005552e4fd0831275f5da3a8a3c"><enum>(B)</enum><text display-inline="yes-display-inline">by inserting after subsection (a) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ida10dfc87932d44e9a69b40b5e204887c"><subsection id="idb59b2ba98f5046429e01bc92fe064371"><enum>(b)</enum><header>Congressional notification</header><text>The Secretary shall promptly notify the congressional defense committees and the congressional intelligence committees (as defined in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>)) of any action taken pursuant to subsection (a).</text></subsection><subsection id="idf2d5d5b3f18d48bc9c182e8cbd61ef0b"><enum>(c)</enum><header>Retention of accrued rights upon conversion</header><text>An incumbent whose position is selected to be converted, without regard to the wishes of the incumbent, to the excepted service under subsection (a) shall remain in the competitive service for the purposes of status and any accrued adverse action protections while the individual occupies that position or any other position to which the employee is moved involuntarily. Once such individual no longer occupies the converted position, the position may be treated as a regularly excepted service position.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="iddae9cd6efdbe4144afcb16719b5481de"><enum>(3)</enum><header>Conversion within the excepted service</header><text>An intelligence community incumbent employee whose position is selected to be converted from one excepted service schedule to another schedule within the excepted service without regard to the wishes of the incumbent shall remain in the current schedule for the purpose of status and any accrued adverse action protections while the individual occupies that position or any other position to which the employee is moved without regard to the wishes of the employee. </text></paragraph></subsection><subsection id="idbe99f049fde947608a2256830c79c923"><enum>(b)</enum><header>Congressional notification of guidelines</header><paragraph id="idbb17f5cd280d4cb6aaa50494fbf7d152"><enum>(1)</enum><header>Submittal to Congress</header><text>Not later than 30 days after the date of the enactment of this Act, each head of an element of the intelligence community shall submit to the congressional intelligence committees the guidelines and regulations of the element relating to employment status and protections relating to that status.</text></paragraph><paragraph id="ide310c563e6ba4cd09dbadc79af353641"><enum>(2)</enum><header>Notice of changes</header><text>In any case in which a guideline or regulation of an element of the intelligence community submitted pursuant to paragraph (1) is modified or replaced, the head of the element shall promptly notify the congressional intelligence committees of the change and submit the new or modified guideline or regulation.</text></paragraph></subsection><subsection id="id8d97e79300cb49578b85d3f7008fd9af"><enum>(c)</enum><header>Termination authorities of the Director of the CIA</header><paragraph id="id3eda70222ca44ada816574940294ed36"><enum>(1)</enum><header>Process and notification</header><text>Section 104A(e) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3036">50 U.S.C. 3036(e)</external-xref>) is amended—</text><subparagraph id="idb1d97d73531f433bafaa9bfe508dd7f5"><enum>(A)</enum><text>by redesignating paragraph (2) as paragraph (3); and</text></subparagraph><subparagraph id="idc685efb791cd4decbaa898ec3264aa61"><enum>(B)</enum><text>by inserting after paragraph (1) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idc6b71aba1a254ca89d41e25aae7ffa40"><paragraph id="id10679b892ad2460384b05d093bc2e494" indent="up1"><enum>(2)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="id736ff4c0691f4532a2b2c1500c4cb8c1"><enum>(A)</enum><text>Subject to subparagraph (B), the Director shall not take an action under paragraph (1) to terminate the employment of an officer or employee, except in accordance with guidelines and regulations submitted to the congressional intelligence committees. </text></subparagraph><subparagraph id="id4473c564aa9a4700b93b48675d48e02f" indent="up1"><enum>(B)</enum><text>The Director may take an action under paragraph (1) without or in contravention of the guidelines and regulations specified in subparagraph (A) of this paragraph if the Director determines that complying with such guidelines and regulations poses a threat to the national security of the United States. If the Director makes such a determination, the Director shall provide prompt notification to the congressional intelligence committees that includes—</text><clause id="id8ae2a92c9072491ea12d23fb2555cf34"><enum>(i)</enum><text>an explanation for the basis for the termination and the factual support for such determination; and</text></clause><clause id="id449470d2472749edb0d80d1e80fe20a1"><enum>(ii)</enum><text>an explanation for the determination that the process described in subparagraph (A) poses a threat to the national security of the United States.</text></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="id0cde0fd53e6a43068ca0ea122f74f9cd"><enum>(d)</enum><header>Improvement of Congressional notice requirement relating to termination of defense intelligence employees</header><text>Section 1609(c) of title 10, United States Code, is amended by adding at the end the following: “Such notification shall include the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="iddf04df0967c04e5e8e8c438e673f7638"><paragraph id="id407a9fcdcb4443e8a2b9fa7887739960"><enum>(1)</enum><text>An explanation for the determination that the termination was in the interests of the United States.</text></paragraph><paragraph id="id03dc10fbc0404689aab6772530274499"><enum>(2)</enum><text>An explanation for the determination that the procedures prescribed in other provisions of law that authorize the termination of the employment of such employee cannot be invoked in a manner consistent with the national security of the United States.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idf06668dfb5bd4aae9b0b1c300a2a0c0f"><enum>(e)</enum><header>Congressional notification of other suspension and removal authorities</header><text display-inline="yes-display-inline">Section 7532 of title 5, United States Code, is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1F1B555D7B7B407886AF3652F1C83A81"><subsection id="id1a1f60a055964a92b530abcb48adb786"><enum>(d)</enum><paragraph commented="no" display-inline="yes-display-inline" id="id086d9f8301514e71b69aab81bb3d0651"><enum>(1)</enum><text>The head of an element of the intelligence community who takes an action under this section shall promptly notify the congressional intelligence committees of such action.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2101066f0893442faece1c5c1e25c3f4" indent="up1"><enum>(2)</enum><text display-inline="yes-display-inline">Each notification under paragraph (1) regarding an action shall include the following:</text><subparagraph id="id6e5e225b37ac4e5eb78638730a51c918"><enum>(A)</enum><text>An explanation for the determination that the action is necessary or advisable in the interests of national security.</text></subparagraph><subparagraph id="id8d0b591cfe1145a29742436f8e12af07"><enum>(B)</enum><text>If the head of an element of the intelligence community determines, pursuant to subsection (a), that the interests of national security do not permit notification to the employee of the reasons for the action under that subsection, an explanation for such determination.</text></subparagraph></paragraph><paragraph indent="up1" commented="no" display-inline="no-display-inline" id="id98376ba872c142d3b29313784b8d654a"><enum>(3)</enum><text display-inline="yes-display-inline">In this subsection, the terms <term>congressional intelligence committees</term> and <term>intelligence community</term> have the meanings given such terms in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id314674c3642d4b58ba70b40ed3807aab" commented="no" display-inline="no-display-inline"><enum>(f)</enum><header>Savings clause</header><text display-inline="yes-display-inline">Nothing in this section shall be construed to diminish the rights conferred by <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/5/75">chapter 75</external-xref> of title 5, United States Code, or other applicable agency adverse action or disciplinary procedures. </text></subsection></section><section id="id03D221A946124D008C1848D85D0F3CD6"><enum>707.</enum><header>Sense of Congress on Government personnel support for foreign terrorist organizations</header><text display-inline="no-display-inline">It is the sense of Congress that for the purposes of adjudicating the eligibility of an individual for access to classified information, renewal of a prior determination of eligibility for such access, or continuous vetting of an individual for eligibility for such access, including on form SF–86 or any successor form, each of the following should be considered an action advocating for an act of terrorism:</text><paragraph commented="no" display-inline="no-display-inline" id="id6dffdf580b17496780fd156cc1954971"><enum>(1)</enum><text>Espousing the actions of an organization designated as a foreign terrorist organization under section 219 of the Immigration and Nationality Act (<external-xref legal-doc="usc" parsable-cite="usc/8/1189">8 U.S.C. 1189</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="iddfa6d98bb22b44e6b22889a21454f266"><enum>(2)</enum><text>Advocating for continued attacks by an organization described in paragraph (1).</text></paragraph><paragraph id="idc4e332f62ac54f2baf6c4f92d4858849" commented="no" display-inline="no-display-inline"><enum>(3)</enum><text>Soliciting funds for an organization described in paragraph (1). </text></paragraph></section></title><title style="OLC" commented="no" level-type="subsequent" id="id1b69c9664d184cb6ad0fb56fd5d14908"><enum>VIII</enum><header display-inline="yes-display-inline">Whistleblowers</header><section id="id5931a6037b7a44fba4b2a1f49e4b7881"><enum>801.</enum><header>Improvements regarding urgent concerns submitted to Inspectors General of the intelligence community</header><subsection id="id82e4f1f7abd34539bb582d1938cdf1be"><enum>(a)</enum><header>Inspector General of the Intelligence Community</header><text>Section 103H(k)(5) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3033">50 U.S.C. 3033(k)(5)</external-xref>) is amended—</text><paragraph id="id9201a5f6585d4a31bd4c88f991b977be"><enum>(1)</enum><text>in subparagraph (A)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id400a1e204a7048b5969ffe7e27d11123"><enum>(A)</enum><text display-inline="yes-display-inline">by inserting <quote>(i)</quote> before <quote>An employee of</quote>; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7630d3c1b5f74372a1540f3ba64ec323"><enum>(B)</enum><text display-inline="yes-display-inline">by inserting <quote>in writing</quote> before <quote>to the Inspector General</quote>; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="iddc3efb47ba794e63a8fa95848846d395"><enum>(C)</enum><text>by adding at the end the following: </text><quoted-block id="idAC95DE6AAED04FF0A7B238C35D0B8699" style="OLC" act-name=""><clause id="id09514D358A154A2DACA7383DF3856515" indent="up3"><enum>(ii)</enum><text>The Inspector General shall provide any support necessary to ensure that an employee can submit a complaint or information under this subparagraph in writing and, if such submission is not feasible, shall create a written record of the employee’s verbal complaint or information and treat such written record as a written submission.</text></clause><after-quoted-block>; </after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id81e2b2338d844c3c81c3904c2e7c6f4e"><enum>(2)</enum><text>by striking subparagraph (B) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idae0cdf5d22d7489b9530f5b078280b6b"><subparagraph id="id1791b24a2fbc427d82a374dd1681ba7b" indent="up2"><enum>(B)</enum><clause commented="no" display-inline="yes-display-inline" id="id07c0c3db2d0b40649086ad1b46d6650a"><enum>(i)</enum><subclause commented="no" display-inline="yes-display-inline" id="idd63eb5b9d96b4b95aa019e7e4344ca7b"><enum>(I)</enum><text>Not later than the end of the period specified in subclause (II), the Inspector General shall determine whether the written complaint or information submitted under subparagraph (A) appears credible. Upon making such a determination, the Inspector General shall transmit to the Director notice of that determination, together with the complaint or information.</text></subclause><subclause indent="up2" commented="no" display-inline="no-display-inline" id="id8d15b6178f4347cdbdb8da075f4108a4"><enum>(II)</enum><text display-inline="yes-display-inline">The period specified in this subclause is the 14-calendar-day period beginning on the date on which an employee who has submitted an initial written complaint or information under subparagraph (A) confirms that the employee has submitted to the Inspector General the material the employee intends to submit to Congress under such subparagraph.</text></subclause></clause><clause indent="up1" commented="no" display-inline="no-display-inline" id="id1285aabb31a74067bd3666419a91964c"><enum>(ii)</enum><text display-inline="yes-display-inline">The Inspector General may transmit a complaint or information submitted under subparagraph (A) directly to the congressional intelligence committees—</text><subclause commented="no" display-inline="no-display-inline" id="id44fe97d0d6ee459aaef81f2cdf8a64e8"><enum>(I)</enum><text display-inline="yes-display-inline">without transmittal to the Director if the Inspector General determines that transmittal to the Director could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information; or </text></subclause><subclause commented="no" display-inline="no-display-inline" id="id1899471071e146caad85bb18249f6b9e"><enum>(II)</enum><text display-inline="yes-display-inline">following transmittal to the Director if the Director does not transmit the complaint or information to the congressional intelligence committees within the time period specified in subparagraph (C).</text></subclause></clause></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id45326ebec84f47588bbf1da80008e203"><enum>(3)</enum><text>in subparagraph (D)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id0f3b0e924f914a9090aacf15dc4b2f42"><enum>(A)</enum><text display-inline="yes-display-inline">in clause (i), by striking <quote>or does not transmit the complaint or information to the Director in accurate form under subparagraph (B),</quote> and inserting <quote>does not transmit the complaint or information to the Director in accurate form under subparagraph (B)(i)(I), or makes a determination pursuant to subparagraph (B)(ii)(I) but does not transmit the complaint or information to the congressional intelligence committees within 21 calendar days of receipt,</quote>; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id40380c82963a4478a8be549a764049a4"><enum>(B)</enum><text>by striking clause (ii) and inserting the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id57ebecd9bbff4857b78a4dd41ab65fed"><clause id="idfa9dff5f488f499b87a057ef6c169130" indent="up2"><enum>(ii)</enum><text>An employee may contact the congressional intelligence committees directly as described in clause (i) only if—</text><subclause id="id1ea350cdb5874fe3bb2201d6fb8a1bdf"><enum>(I)</enum><text>the employee, before making such a contact—</text><item id="id104e801213944d3085a020804aedf86e"><enum>(aa)</enum><text>transmits to the Director, through the Inspector General, a statement of the employee’s complaint or information and notice of the employee’s intent to contact the congressional intelligence committees directly; and</text></item><item id="id143bddae169645b985d84b7ce10cf759"><enum>(bb)</enum><text>obtains and follows from the Director, through the Inspector General, direction on how to contact the congressional intelligence committees in accordance with appropriate security practices; or</text></item></subclause><subclause id="idf5e151fd52e04cb6931d0effb68c1cc1"><enum>(II)</enum><text>the Inspector General—</text><item id="id375999be51d44b5f866f10d1e393d84f"><enum>(aa)</enum><text>determines that—</text><subitem commented="no" display-inline="no-display-inline" id="id4d4c97569da04c0b8b6424b729fbebfe"><enum>(AA)</enum><text display-inline="yes-display-inline">a transmittal under subclause (I) could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information; or </text></subitem><subitem commented="no" display-inline="no-display-inline" id="ida9c8ca7d2c9e40a5bbf8e69766152db2"><enum>(BB)</enum><text display-inline="yes-display-inline">the Director has failed to provide adequate direction pursuant to item (bb) of subclause (I) within 7 calendar days of a transmittal under such subclause; and</text></subitem></item><item id="id96b4c1189095478788a1ae056f9ea67e"><enum>(bb)</enum><text>provides the employee direction on how to contact the congressional intelligence committees in accordance with appropriate security practices.</text></item></subclause></clause><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="ide892bff7143143bc8fafe36d4cf4f0b1"><enum>(4)</enum><text>by adding at the end the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="idc1792b7269574b469e0d91f8c8d41d13"><subparagraph id="id84dc8847aed04274b01b802e82110719" indent="up2"><enum>(J)</enum><text>In this paragraph, the term <term>employee</term>, with respect to an employee of an element of the intelligence community, an employee assigned or detailed to an element of the intelligence community, or an employee of a contractor to the intelligence community who may submit a complaint or information to the Inspector General under subparagraph (A), means—</text><clause id="idae180c8aeae14b5d96402384ed4427a7"><enum>(i)</enum><text>a current employee at the time of such submission; or</text></clause><clause id="id7c5929b3c5f04663be02a168920964e9"><enum>(ii)</enum><text>a former employee at the time of such submission, if such complaint or information arises from and relates to the period of employment as such an employee.</text></clause></subparagraph><after-quoted-block>. </after-quoted-block></quoted-block></paragraph></subsection><subsection id="id8ef64c4ebca64a49bcf5b0ecdbbfb6d3"><enum>(b)</enum><header>Inspector General of the Central Intelligence Agency</header><text>Section 17(d)(5) of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3517">50 U.S.C. 3517(d)(5)</external-xref>) is amended—</text><paragraph id="id5a845cfb899c46289a429fba2118222d"><enum>(1)</enum><text>in subparagraph (A)—</text><subparagraph commented="no" display-inline="no-display-inline" id="idc9581daf18934a62b31446f00b416e3e"><enum>(A)</enum><text>by inserting (i) before <quote>An employee</quote>; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9452ffc5cf2d4a329c41e9ba7b36b031"><enum>(B)</enum><text display-inline="yes-display-inline">by inserting <quote>in writing</quote> before <quote>to the Inspector General</quote>; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id517a9767796a4945bbb09dce5e5aca3b"><enum>(C)</enum><text>by adding at the end the following: </text><quoted-block id="id04C829DAEF1744CF9894189B8C7F9330" style="OLC" act-name=""><clause indent="up3" id="id06DD8FD9FA1541A9A5511F1C0FE6C464"><enum>(ii)</enum><text>The Inspector General shall provide any support necessary to ensure that an employee can submit a complaint or information under this subparagraph in writing and, if such submission is not feasible, shall create a written record of the employee’s verbal complaint or information and treat such written record as a written submission.</text></clause><after-quoted-block>; </after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id0c361562e5e047f6aef5bcba4d31f196"><enum>(2)</enum><text>in subparagraph (B)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id7e3bd37365774655b7cf3856d6496bba"><enum>(A)</enum><text display-inline="yes-display-inline">by striking clause (i) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idc26d65c879c548c6854fdbebfa78e37f"><clause id="id1d625b5975df484db95fd9c551732898" indent="up3"><enum>(i)</enum><subclause commented="no" display-inline="yes-display-inline" id="id8495752ccdf140e59c0b9f68c5681a50"><enum>(I)</enum><text>Not later than the end of the period specified in subclause (II), the Inspector General shall determine whether the written complaint or information submitted under subparagraph (A) appears credible. Upon making such a determination, the Inspector General shall transmit to the Director notice of that determination, together with the complaint or information.</text></subclause><subclause id="idceaf89cb82f44662beec6bfe90fb846d" indent="up1"><enum>(II)</enum><text>The period specified in this subclause is the 14-calendar-day period beginning on the date on which an employee who has submitted an initial written complaint or information under subparagraph (A) confirms that the employee has submitted to the Inspector General the material the employee intends to submit to Congress under such subparagraph.</text></subclause></clause><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id64f7678b180d4256b9611322241b28ec"><enum>(B)</enum><text>by adding at the end the following: </text><quoted-block id="idFBD5759ED9E84F6B86B7A0A1320C1AEA" style="OLC" act-name=""><clause id="id44D216DA2A6849FCB0ABE7F79AB09359" indent="up3"><enum>(iii)</enum><text>The Inspector General may transmit a complaint or information submitted under subparagraph (A) directly to the congressional intelligence committees—</text><subclause commented="no" display-inline="no-display-inline" id="id2c4e51a1cfad4b5295afb68c4646bbd3"><enum>(I)</enum><text display-inline="yes-display-inline">without transmittal to the Director if the Inspector General determines that transmittal to the Director could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id87543eb48f424932b13c52f1157af56e"><enum>(II)</enum><text display-inline="yes-display-inline">following transmittal to the Director if the Director does not transmit the complaint or information to the congressional intelligence committees within the time period specified in subparagraph (C) and has not made a determination regarding a conflict of interest pursuant to clause (ii); or </text></subclause><subclause commented="no" display-inline="no-display-inline" id="idb8314c7bf4f2405e80382761d3d6bdb6"><enum>(III)</enum><text display-inline="yes-display-inline">following transmittal to the Director and a determination by the Director that a conflict of interest exists pursuant to clause (ii) if the Inspector General determines that—</text><item commented="no" display-inline="no-display-inline" id="idc068fd57de3249e78ad1dba149267933"><enum>(aa)</enum><text display-inline="yes-display-inline">transmittal to the Director of National Intelligence could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information; or</text></item><item commented="no" display-inline="no-display-inline" id="idf82b4c10b2644440bb1bbb1eeb6da8da"><enum>(bb)</enum><text display-inline="yes-display-inline">the Director of National Intelligence has not transmitted the complaint or information to the congressional intelligence committees within the time period specified in subparagraph (C).</text></item></subclause></clause><after-quoted-block>; </after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4bddaa0d464145608239721e136a1710"><enum>(3)</enum><text>in subparagraph (D)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id48190658391f4f3b8badbd99f6aa903a"><enum>(A)</enum><text display-inline="yes-display-inline">in clause (i), by striking <quote>or does not transmit the complaint or information to the Director in accurate form under subparagraph (B),</quote> and inserting <quote>does not transmit the complaint or information to the Director in accurate form under subparagraph (B)(i)(I), or makes a determination pursuant to subparagraph (B)(iii)(I) but does not transmit the complaint or information to the congressional intelligence committees within 21 calendar days of receipt,</quote>; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id12ac7b507ac3442b9027c1b317744782"><enum>(B)</enum><text display-inline="yes-display-inline">by striking clause (ii) and inserting the following: </text><quoted-block id="idC1541D66F46E43F6AFA61F7537AFB347" style="USC" act-name=""><clause indent="up3" id="id31A5E07E382E43029CFB0E26F3E4BB54"><enum>(ii)</enum><text>An employee may contact the congressional intelligence committees directly as described in clause (i) only if—</text><subclause commented="no" display-inline="no-display-inline" id="id39e76f056b134882a375b489966a8b52"><enum>(I)</enum><text display-inline="yes-display-inline">the employee, before making such a contact—</text><item commented="no" display-inline="no-display-inline" id="id8f7e305cc21f4db598aa170c130e836a"><enum>(aa)</enum><text display-inline="yes-display-inline">transmits to the Director, through the Inspector General, a statement of the employee’s complaint or information and notice of the employee’s intent to contact the congressional intelligence committees directly; and</text></item><item commented="no" display-inline="no-display-inline" id="id6db8feaefd094f44989f5765ff3e1776"><enum>(bb)</enum><text display-inline="yes-display-inline">obtains and follows from the Director, through the Inspector General, direction on how to contact the congressional intelligence committees in accordance with appropriate security practices; or</text></item></subclause><subclause commented="no" display-inline="no-display-inline" id="id632f35a12a9945258f1a970094d5f048"><enum>(II)</enum><text display-inline="yes-display-inline">the Inspector General—</text><item commented="no" display-inline="no-display-inline" id="id29082cb310224b969d763e5531a41806"><enum>(aa)</enum><text display-inline="yes-display-inline">determines that—</text><subitem commented="no" display-inline="no-display-inline" id="idcbcd94d0505b43fd834d36f3214bacac"><enum>(AA)</enum><text display-inline="yes-display-inline">the transmittal under subclause (I) could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information; or </text></subitem><subitem commented="no" display-inline="no-display-inline" id="id3d1a531da884464782f4e1d1e9c16047"><enum>(BB)</enum><text display-inline="yes-display-inline">the Director has failed to provide adequate direction pursuant to item (bb) of subclause (I) within 7 calendar days of a transmittal under such subclause; and</text></subitem></item><item commented="no" display-inline="no-display-inline" id="id6021b440b3dc403ebd2af99b14627450"><enum>(bb)</enum><text display-inline="yes-display-inline">provides the employee direction on how to contact the congressional intelligence committees in accordance with appropriate security practices.</text></item></subclause></clause><after-quoted-block>; and </after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id6b2d7ab8a61e4823bd312d88408d67bc"><enum>(4)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1944602cb334480ebc9aa7e613a2d09d"><subparagraph id="id9791d1a23c9b45bda6de5548abc70958" indent="up2"><enum>(I)</enum><text>In this paragraph, the term <term>employee</term>, with respect to an employee of the Agency, or of a contractor to the Agency, who may submit a complaint or information to the Inspector General under subparagraph (A), means—</text><clause id="id7d1a50e6286a44869044616bc950c9c7"><enum>(i)</enum><text>a current employee at the time of such submission; or</text></clause><clause id="id20422bb721c04beb9008bad6ee852822"><enum>(ii)</enum><text>a former employee at the time of such submission, if such complaint or information arises from and relates to the period of employment as such an employee.</text></clause></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id2ae1af191784470ab772ea75d2b7cf3b"><enum>(c)</enum><header>Other Inspectors General of elements of the intelligence community</header><text>Section 416 of title 5, United States Code, is amended—</text><paragraph id="id46f720bb3fd549cb976330af82f5eb24"><enum>(1)</enum><text>in subsection (a)—</text><subparagraph id="id2b583951946643da83c53a52f28747a3"><enum>(A)</enum><text>by redesignating paragraphs (1) and (2) as paragraphs (2) and (3), respectively; and</text></subparagraph><subparagraph id="idade6e259909642829de5e1d28bc3c486"><enum>(B)</enum><text>by inserting before paragraph (2), as redesignated by paragraph (1), the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id0FC4E431E6D1490C80E166A614C772F2"><paragraph id="id3734454161e24761a3783b34b76c4715"><enum>(1)</enum><header>Employee</header><text>The term <term>employee</term>, with respect to an employee of an element of the Federal Government covered by subsection (b), or of a contractor to such an element, who may submit a complaint or information to an Inspector General under such subsection, means—</text><subparagraph id="id69dcf774008d4e11bfa9cc9176db2d9a"><enum>(A)</enum><text>a current employee at the time of such submission; or</text></subparagraph><subparagraph id="id68eb6bb2f4f24236ad31206994576068"><enum>(B)</enum><text>a former employee at the time of such submission, if such complaint or information arises from and relates to the period of employment as such an employee.</text></subparagraph></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id5b1978ea34e34b25b5ee7462bfd69838"><enum>(2)</enum><text>in subsection (b)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id140cde651d9d48538871c2065db6e3c3"><enum>(A)</enum><text display-inline="yes-display-inline">in paragraph (1)—</text><clause commented="no" display-inline="no-display-inline" id="idd26e55e2b75145899046560915a7d1af"><enum>(i)</enum><text>in the paragraph heading, by inserting <quote><header-in-text style="OLC" level="paragraph">; support for written submission</header-in-text></quote>; after <quote><header-in-text style="OLC" level="paragraph">made</header-in-text></quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id5a62cb28ae294cb8ad30b0d00deb28fe"><enum>(ii)</enum><text display-inline="yes-display-inline">by inserting <quote>in writing</quote> after <quote>may report the complaint or information</quote> each place it appears; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id2c5889242d34416e9ab1f617bc0b4d97"><enum>(iii)</enum><text>in subparagraph (B), by inserting <quote>in writing</quote> after <quote>such complaint or information</quote>; and </text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idabbf834711d74376973c9346a67ca591"><enum>(B)</enum><text>by adding at the end the following: </text><quoted-block id="idE02F7598ED4D4B779D69FBED7DD0C70A" style="OLC" act-name=""><subparagraph id="id2CD8A2387EF945EFA1D22E835A9E6E4C"><enum>(E)</enum><header>Support for written submission</header><text>The Inspector General shall provide any support necessary to ensure that an employee can submit a complaint or information under this paragraph in writing and, if such submission is not feasible, shall create a written record of the employee’s verbal complaint or information and treat such written record as a written submission.</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="idcf32719cb7e94203b254298e173506d6"><enum>(3)</enum><text>in subsection (c)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id95a80ab6459d4055926c99f3be30f9d9"><enum>(A)</enum><text display-inline="yes-display-inline">by striking paragraph (1) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id38ADFCBD5E354EC18780D0C061F23064"><paragraph id="id1a9c2b72716148ffb4af55968c7744e3"><enum>(1)</enum><header>Credibility</header><subparagraph id="ID3b579bd086c4497397985413165623e2"><enum>(A)</enum><header>Determination</header><text>Not later than the end of the period specified in subparagraph (B), the Inspector General shall determine whether the written complaint or information submitted under subsection (b) appears credible. Upon making such a determination, the Inspector General shall transmit to the head of the establishment notice of that determination, together with the complaint or information.</text></subparagraph><subparagraph id="ID4a192eb7feba45919ffc703ca954d341"><enum>(B)</enum><header>Period specified</header><text>The period specified in this subparagraph is the 14-calendar-day period beginning on the date on which an employee who has submitted an initial written complaint or information under subsection (b) confirms that the employee has submitted to the Inspector General the material the employee intends to submit to Congress under such subsection.</text></subparagraph></paragraph><after-quoted-block>; and </after-quoted-block></quoted-block></subparagraph><subparagraph id="id14df5bca3ca84b2c9a71859799d19247"><enum>(B)</enum><text>by adding at the end the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id07883C984DA3459881E5192FAE05F809"><paragraph id="ID4940741dba8444ecbd01ed57cc3d0cd6"><enum>(3)</enum><header>Transmittal directly to intelligence committees</header><text>The Inspector General may transmit the complaint or information directly to the intelligence committees—</text><subparagraph id="ID097af9b02aba477fa1d7e610d7d64c60"><enum>(A)</enum><text>without transmittal to the head of the establishment if the Inspector General determines that transmittal to the head of the establishment could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information; </text></subparagraph><subparagraph id="IDfd0afe7e5f8e481287569600928b8105"><enum>(B)</enum><text>following transmittal to the head of the establishment if the head of the establishment does not transmit the complaint or information to the intelligence committees within the time period specified in subsection (d) and has not made a determination regarding a conflict of interest pursuant to paragraph (2); or </text></subparagraph><subparagraph id="IDa93af4541b6e49d591cee21bbc14149f"><enum>(C)</enum><text>following transmittal to the head of the establishment and a determination by the head of the establishment that a conflict of interest exists pursuant to paragraph (2) if the Inspector General determines that—</text><clause commented="no" display-inline="no-display-inline" id="id41f55ddc716b4e9cbc4a49b035470e44"><enum>(i)</enum><text display-inline="yes-display-inline">transmittal to the Director of National Intelligence or the Secretary of Defense could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information; or</text></clause><clause commented="no" display-inline="no-display-inline" id="id3675109732304873869cdc938d1535c6"><enum>(ii)</enum><text display-inline="yes-display-inline">the Director of National Intelligence or the Secretary of Defense has not transmitted the complaint or information to the intelligence committees within the time period specified in subsection (d).</text></clause></subparagraph></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf05fb33335344f3a8c21c97c0a9260da"><enum>(4)</enum><text>in subsection (e)(1), by striking <quote>or does not transmit the complaint or information to the head of the establishment in accurate form under subsection (c),</quote> and inserting <quote>does not transmit the complaint or information to the head of the establishment in accurate form under subsection (c)(1)(A), or makes a determination pursuant to subsection (c)(3)(A) but does not transmit the complaint or information to the intelligence committees within 21 calendar days of receipt,</quote>; and</text></paragraph><paragraph id="ID9e99c11ca2ee4679924ee64181be6882"><enum>(5)</enum><text>in subsection (e), by striking paragraph (2) and inserting the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="idDE106F36AD9841348B007DDCB2A1ED1D"><paragraph id="IDbde8c676111a4a2fbc26697410819b9f"><enum>(2)</enum><header>Limitation</header><text>An employee may contact the intelligence committees directly as described in paragraph (1) only if—</text><subparagraph id="IDcb2862c3b3c84723857acb556c885da3"><enum>(A)</enum><text>the employee, before making such a contact—</text><clause id="IDbc8fa036e3a445c0811a81d45d38d13e"><enum>(i)</enum><text>transmits to the head of the establishment, through the Inspector General, a statement of the employee’s complaint or information and notice of the employee’s intent to contact the intelligence committees directly; and</text></clause><clause id="ID675b7e642dc1490484f4f7c5cf6990dc"><enum>(ii)</enum><text>obtains and follows from the head of the establishment, through the Inspector General, direction on how to contact the intelligence committees in accordance with appropriate security practices; or</text></clause></subparagraph><subparagraph id="ID5101ef822ca0405495c709648314be8f"><enum>(B)</enum><text>the Inspector General—</text><clause id="IDf8cd266c1e0d43f1925c0c79f2b29230"><enum>(i)</enum><text>determines that the transmittal under subparagraph (A) could compromise the anonymity of the employee or result in the complaint or information being transmitted to a subject of the complaint or information; or</text></clause><clause commented="no" display-inline="no-display-inline" id="id0b841aa2bdc944e99cac5e0876f90cf2"><enum>(ii)</enum><text display-inline="yes-display-inline">determines that the head of the establishment has failed to provide adequate direction pursuant to clause (ii) of subparagraph (A) within 7 calendar days of a transmittal under such subparagraph; and</text></clause><clause id="IDbadda7da028b4a47b53321709152af5f"><enum>(iii)</enum><text>provides the employee direction on how to contact the intelligence committees in accordance with appropriate security practices.</text></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id44fdd8201c1840f29d6f431aeeab7a20"><enum>802.</enum><header>Prohibition against disclosure of whistleblower identity as act of reprisal</header><subsection id="id7cf947a60fb7430d93fea929ec698012"><enum>(a)</enum><header>In general</header><text>Section 1104(a) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3234">50 U.S.C. 3234(a)</external-xref>) is amended—</text><paragraph id="idcdee9129084c46c19b2d0a9db23f65a4"><enum>(1)</enum><text>in paragraph (3)—</text><subparagraph id="id9833f031f58a4cfdb63e9467a8ee883f"><enum>(A)</enum><text>in subparagraph (I), by striking <quote>; or</quote> and inserting a semicolon;</text></subparagraph><subparagraph id="ide2cbcaeddd664d1a81c46009d998b97c"><enum>(B)</enum><text>by redesignating subparagraph (J) as subparagraph (K); and</text></subparagraph><subparagraph id="ideee8c52a9aec4b4eaf40dc7c2bad4e0d"><enum>(C)</enum><text>by inserting after subparagraph (I) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id5d5d01e7f5ad4410aff9cab767a527d2"><subparagraph id="idb2c7db09280c417b815b68f3afe603d1"><enum>(J)</enum><text>an unauthorized whistleblower identity disclosure;</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="idf46a6f32ea8d4d61b0c74a49e4e41c22"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idd1f99550a8854aec9f00889218535f6c"><paragraph id="idc51dbddaef9942e0bd227368cf3a5204"><enum>(5)</enum><header>Unauthorized whistleblower identity disclosure</header><text>The term <term>unauthorized whistleblower identity disclosure</term> means, with respect to an employee or a contractor employee described in paragraph (3), a knowing and willful disclosure revealing the identity or other personally identifiable information of the employee or contractor employee so as to identify the employee or contractor employee as an employee or contractor employee who has made a lawful disclosure described in subsection (b) or (c), but does not include such a knowing and willful disclosure that meets any of the following criteria:</text><subparagraph id="id5419d9efe8db4a94acb25029b660aa9b"><enum>(A)</enum><text>Such disclosure was made with the express consent of the employee or contractor employee.</text></subparagraph><subparagraph id="id4acc13b0500644beb29e770ed9ffa95f"><enum>(B)</enum><text>Such disclosure was made during the course of reporting or remedying the subject of the lawful disclosure of the whistleblower through management, legal, or oversight processes, including such processes relating to human resources, equal opportunity, security, or an Inspector General.</text></subparagraph><subparagraph id="idd5e69487ab22483b8e73b29b2332c1e8"><enum>(C)</enum><text>An Inspector General with oversight responsibility for the relevant covered intelligence community element determines that such disclosure—</text><clause id="id16a6dfe5a7034dee9816ad3a4b8946db"><enum>(i)</enum><text>was unavoidable under section 103H of this Act (<external-xref legal-doc="usc" parsable-cite="usc/50/3033">50 U.S.C. 3033</external-xref>), section 17 of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3517">50 U.S.C. 3517</external-xref>), section 407 of title 5, United States Code, or section 420(b)(2)(B) of such title; </text></clause><clause id="iddba394f7d4f742f999cbabee61bb0fcd"><enum>(ii)</enum><text>was made to an official of the Department of Justice responsible for determining whether a prosecution should be undertaken; or</text></clause><clause commented="no" display-inline="no-display-inline" id="id6734e85e44e34c768bced00d4a72c25e"><enum>(iii)</enum><text display-inline="yes-display-inline">was required by statute or an order from a court of competent jurisdiction.</text></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="iddc9f337a596e48608105218b92f92230"><enum>(b)</enum><header>Private right of action for unlawful disclosure of whistleblower identity</header><text>Subsection (f) of such section is amended to read as follows:</text><quoted-block id="idBC617E4F9D8A4390BF3310438BC793AC" display-inline="no-display-inline" style="OLC"><subsection id="idb5fd1a66b43d4974b4cbc947e4546e95"><enum>(f)</enum><header>Enforcement</header><paragraph id="id9252a5cf70e24515b9a71c90b29eafab"><enum>(1)</enum><header>In general</header><text>Except as otherwise provided in this subsection, the President shall provide for the enforcement of this section.</text></paragraph><paragraph id="id9d1a1bc98b3f4a52937dbb3473d4a29b"><enum>(2)</enum><header>Harmonization with other enforcement</header><text>To the fullest extent possible, the President shall provide for enforcement of this section in a manner that is consistent with the enforcement of section 2302(b)(8) of title 5, United States Code, especially with respect to policies and procedures used to adjudicate alleged violations of such section.</text></paragraph><paragraph id="ida796716104d84dcc97b427e9f053b842"><enum>(3)</enum><header>Private right of action for disclosures of whistleblower identity in violation of prohibition against reprisals</header><text>Subject to paragraph (4), in a case in which an employee of an agency takes a personnel action described in subsection (a)(3)(J) against an employee of a covered intelligence community element as a reprisal in violation of subsection (b) or in a case in which an employee or contractor employee takes a personnel action described in subsection (a)(3)(J) against another contractor employee as a reprisal in violation of subsection (c), the employee or contractor employee against whom the personnel action was taken may, consistent with section 1221 of title 5, United States Code, bring a private action for all appropriate remedies, including injunctive relief and compensatory and punitive damages, in an amount not to exceed $250,000, against the agency of the employee or contracting agency of the contractor employee who took the personnel action, in a Federal district court of competent jurisdiction.</text></paragraph><paragraph id="id6b9cb6141d334edebc2b801d1032f339"><enum>(4)</enum><header>Requirements</header><subparagraph id="id478dc57bc4c64322b9863f833ea902fe"><enum>(A)</enum><header>Review by inspector general and by external review panel</header><text>Before the employee or contractor employee may bring a private action under paragraph (3), the employee or contractor employee shall exhaust administrative remedies by—</text><clause id="id142d1bdd51d04c678d90f1e0c8d1d6c7"><enum>(i)</enum><text>first, obtaining a disposition of their claim by requesting review by the appropriate inspector general; and</text></clause><clause id="id39e9172a8e584ef09e6a4bc594376764"><enum>(ii)</enum><text>second, if the review under clause (i) does not substantiate reprisal, by submitting to the Inspector General of the Intelligence Community a request for a review of the claim by an external review panel under section 1106.</text></clause></subparagraph><subparagraph id="ida2b1ad4f89f049268b12958cb2951ef6" commented="no" display-inline="no-display-inline"><enum>(B)</enum><header>Period to bring action</header><text>The employee or contractor employee may bring a private right of action under paragraph (3) during the 180-day period beginning on the date on which the employee or contractor employee is notified of the final disposition of their claim under section 1106.</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idca86f08b11bf40c3b28407ceef713fc5"><enum>803.</enum><header>Protection for individuals making authorized disclosures to Inspectors General of elements of the intelligence community</header><subsection id="ida51a2cc7b1a14137aed80f4788b252b4"><enum>(a)</enum><header>Inspector General of the intelligence community</header><text>Section 103H(g)(3) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3033">50 U.S.C. 3033(g)(3)</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id885af816a54f49e0b0ee46d951ca7524"><enum>(1)</enum><text display-inline="yes-display-inline">by redesignating subparagraphs (A) and (B) as clauses (i) and (ii), respectively;</text></paragraph><paragraph id="id9dbe2719407944848b1a59f2c61f7e0b"><enum>(2)</enum><text>by adding at the end the following new subparagraph:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id66a1b12862ed47fabdfb08bdf20e90ac"><subparagraph id="id64ad0f50879448dfaf0ba7890b256b00" indent="up1"><enum>(B)</enum><text>An individual may disclose classified information to the Inspector General in accordance with the applicable security standards and procedures established under Executive Order 13526 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to classified national security information), section 102A or section 803, chapter 12 of the Atomic Energy Act of 1954 (<external-xref legal-doc="usc" parsable-cite="usc/42/2161">42 U.S.C. 2161 et seq.</external-xref>), or any applicable provision of law. Such a disclosure of classified information that is made by an individual who at the time of the disclosure does not hold the appropriate clearance or authority to access such classified information, but that is otherwise made in accordance with such security standards and procedures, shall be treated as an authorized disclosure and does not violate—</text><clause id="id7e16fcc079464c4b8d1b88b8ff282a67"><enum>(i)</enum><text>any otherwise applicable nondisclosure agreement;</text></clause><clause id="id6b01a53aac184619880f1628432b8ce0"><enum>(ii)</enum><text>any otherwise applicable regulation or order issued under the authority of Executive Order 13526 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to classified national security information) or chapter 18 of the Atomic Energy Act of 1954 (<external-xref legal-doc="usc" parsable-cite="usc/42/2271">42 U.S.C. 2271 et seq.</external-xref>); or</text></clause><clause id="idf35caa35817b407db028244df2338d4a"><enum>(iii)</enum><text>section 798 of title 18, United States Code, or any other provision of law relating to the unauthorized disclosure of national security information.</text></clause></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4f9a5e9bcdc54e15a9ddb8f4c828b591"><enum>(3)</enum><text>in the paragraph enumerator, by striking <quote>(3) <header-in-text style="OLC" level="paragraph"></header-in-text></quote> and inserting <quote>(3)(A)<header-in-text style="OLC" level="paragraph"></header-in-text></quote>.</text></paragraph></subsection><subsection id="idaf989cbe5cdb4f94962e0052bae59c6d"><enum>(b)</enum><header>Inspector General of the Central Intelligence Agency</header><text>Section 17(e)(3) of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3517">50 U.S.C. 3517(e)(3)</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id6a8ea7f8af7a462ea04a28c261bcfcf6"><enum>(1)</enum><text display-inline="yes-display-inline">by redesignating subparagraphs (A) and (B) as clauses (i) and (ii), respectively;</text></paragraph><paragraph id="id26de6e3ee413473ea052b05f548b5896"><enum>(2)</enum><text>by adding at the end the following new subparagraph:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idd0633d32b8c84ecb933378859418e81e"><subparagraph id="id4a9de55a61de4bf4af4a5caf450b3eae" indent="up1"><enum>(B)</enum><text>An individual may disclose classified information to the Inspector General in accordance with the applicable security standards and procedures established under Executive Order 13526 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to classified national security information), section 102A or 803 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024</external-xref>; 3162a), or chapter 12 of the Atomic Energy Act of 1954 (<external-xref legal-doc="usc" parsable-cite="usc/42/2161">42 U.S.C. 2161 et seq.</external-xref>). Such a disclosure of classified information that is made by an individual who at the time of the disclosure does not hold the appropriate clearance or authority to access such classified information, but that is otherwise made in accordance with such security standards and procedures, shall be treated as an authorized disclosure and does not violate—</text><clause id="idd4362abff07d4dd594705a5cb2479bb7"><enum>(i)</enum><text>any otherwise applicable nondisclosure agreement;</text></clause><clause id="idb8b8393f211541dd80423ed631389ccc"><enum>(ii)</enum><text>any otherwise applicable regulation or order issued under the authority of Executive Order 13526 or chapter 18 of the Atomic Energy Act of 1954 (<external-xref legal-doc="usc" parsable-cite="usc/42/2271">42 U.S.C. 2271 et seq.</external-xref>); or</text></clause><clause id="id98ff0e4bfbea4440bca80e470cca6f0e"><enum>(iii)</enum><text>section 798 of title 18, United States Code, or any other provision of law relating to the unauthorized disclosure of national security information.</text></clause></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idD7EE7E53880F4F1183018AA022BC8664"><enum>(3)</enum><text>in the paragraph enumerator, by striking <quote>(3) <header-in-text style="OLC" level="paragraph"></header-in-text></quote> and inserting <quote>(3)(A)<header-in-text style="OLC" level="paragraph"></header-in-text></quote>.</text></paragraph></subsection><subsection id="id73402f0c037a434396c8819382341f83"><enum>(c)</enum><header>Other Inspectors General of elements of the intelligence community</header><text>Section 416 of title 5, United States Code, is amended by adding at the end the following new subsection:</text><quoted-block id="idC2974390AB334CAAA7832707ECDE80D9" display-inline="no-display-inline" style="OLC"><subsection id="id882944c3b57842998137d52db5a7ef56"><enum>(i)</enum><header>Protection for individuals making authorized disclosures</header><text>An individual may disclose classified information to an Inspector General of an element of the intelligence community in accordance with the applicable security standards and procedures established under Executive Order 13526 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to classified national security information), section 102A or 803 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024</external-xref>; 3162a), or chapter 12 of the Atomic Energy Act of 1954 (<external-xref legal-doc="usc" parsable-cite="usc/42/2161">42 U.S.C. 2161 et seq.</external-xref>). Such a disclosure of classified information that is made by an individual who at the time of the disclosure does not hold the appropriate clearance or authority to access such classified information, but that is otherwise made in accordance with such security standards and procedures, shall be treated as an authorized disclosure and does not violate—</text><paragraph id="id36945b8469be413a9c753189b6351c6a"><enum>(1)</enum><text>any otherwise applicable nondisclosure agreement;</text></paragraph><paragraph id="idc1c0064c7f57404ca1eba08e60316b37"><enum>(2)</enum><text>any otherwise applicable regulation or order issued under the authority of Executive Order 13526 or chapter 18 of the Atomic Energy Act of 1954 (<external-xref legal-doc="usc" parsable-cite="usc/42/2271">42 U.S.C. 2271 et seq.</external-xref>); or</text></paragraph><paragraph id="id61a2b7a5caab4b189eef83873f67cb83" commented="no" display-inline="no-display-inline"><enum>(3)</enum><text>section 798 of title 18, or any other provision of law relating to the unauthorized disclosure of national security information.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id079458469b8441819c0a5336fa9db3be"><enum>804.</enum><header>Clarification of authority of certain Inspectors General to receive protected disclosures</header><text display-inline="no-display-inline">Section 1104 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3234">50 U.S.C. 3234</external-xref>) is amended—</text><paragraph id="id42a493fabe184d78b9ae4caee5aa3af1"><enum>(1)</enum><text>in subsection (b)(1), by inserting <quote>or covered intelligence community element</quote> after <quote>the appropriate inspector general of the employing agency</quote>; and</text></paragraph><paragraph id="ida97ee46331d94cc185481aedea20be91" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text>in subsection (c)(1)(A), by inserting <quote>or covered intelligence community element</quote> after <quote>the appropriate inspector general of the employing or contracting agency</quote>. </text></paragraph></section><section id="id19bc7c28a09a46488c5fcdc089ca3ba8"><enum>805.</enum><header>Whistleblower protections relating to psychiatric testing or examination</header><subsection id="id3128caa075c9472ba031a87361c0d3dd"><enum>(a)</enum><header>Prohibited personnel practices</header><text>Section 1104(a)(3) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3234">50 U.S.C. 3234(a)(3)</external-xref>) is amended—</text><paragraph id="id553cd7ececc84e8592b27f2848ba3e53"><enum>(1)</enum><text>in subparagraph (I), by striking <quote>; or</quote> and inserting a semicolon;</text></paragraph><paragraph id="idd8bd7f6407334d9983f3ac5e58d257d4"><enum>(2)</enum><text>by redesignating subparagraph (J) as subparagraph (K); and</text></paragraph><paragraph id="id90d09b9079024d339d65deff9893cd48"><enum>(3)</enum><text>by inserting after subparagraph (I) the following new subparagraph:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id30e1dc39802f4fceadc2cd3caeeba2d2"><subparagraph id="id5c053c76560c4892bd0f663dfc69dfc6"><enum>(J)</enum><text>a decision to order psychiatric testing or examination; or</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id1e1a36b15e17409b8f7b97a0eb3d3bde" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Application</header><text>The amendments made by this section shall apply with respect to matters arising under section 1104 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3234">50 U.S.C. 3234</external-xref>) on or after the date of the enactment of this Act.</text></subsection></section><section id="idad285e6a83f844999a7117f737c432f2"><enum>806.</enum><header>Establishing process parity for adverse security clearance and access determinations</header><text display-inline="no-display-inline">Subparagraph (C) of section 3001(j)(4) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/50/3341">50 U.S.C. 3341(j)(4)</external-xref>) is amended to read as follows:</text><quoted-block id="id00F93B88508D49AFABF7E07F68B92073" display-inline="no-display-inline" style="OLC"><subparagraph id="idD96AB287176A43A7AED6D454C28AC52A"><enum>(C)</enum><header>Contributing factor</header><clause id="id353B76F1062146FAB9CFB52E8145764D"><enum>(i)</enum><header>In general</header><text>Subject to clause (iii), in determining whether the adverse security clearance or access determination violated paragraph (1), the agency shall find that paragraph (1) was violated if the individual has demonstrated that a disclosure described in paragraph (1) was a contributing factor in the adverse security clearance or access determination taken against the individual.</text></clause><clause id="id50C420DCF26648B7838D7FD2B33D2071"><enum>(ii)</enum><header>Circumstantial evidence</header><text>An individual under clause (i) may demonstrate that the disclosure was a contributing factor in the adverse security clearance or access determination taken against the individual through circumstantial evidence, such as evidence that—</text><subclause id="id3B7F6E0E032141F6B81AAC1E86F894C1"><enum>(I)</enum><text>the official making the determination knew of the disclosure; and</text></subclause><subclause id="id80C7BE28F66C4DC394529977B556C771"><enum>(II)</enum><text>the determination occurred within a period such that a reasonable person could conclude that the disclosure was a contributing factor in the determination.</text></subclause></clause><clause id="id45A8F1964C0243A1BF5CA69D4CDE6C2C" commented="no" display-inline="no-display-inline"><enum>(iii)</enum><header>Defense</header><text>In determining whether the adverse security clearance or access determination violated paragraph (1), the agency shall not find that paragraph (1) was violated if, after a finding that a disclosure was a contributing factor, the agency demonstrates by clear and convincing evidence that it would have made the same security clearance or access determination in the absence of such disclosure.</text></clause></subparagraph><after-quoted-block>. </after-quoted-block></quoted-block></section><section id="idA16D78CF463A47CDA5AADED00F5EB3CB" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>807.</enum><header>Elimination of cap on compensatory damages for retaliatory revocation of security clearances and access determinations</header><text display-inline="no-display-inline">Section 3001(j)(4)(B) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/50/3341">50 U.S.C. 3341(j)(4)(B)</external-xref>) is amended, in the second sentence, by striking <quote>not to exceed $300,000</quote>. </text></section></title><title style="OLC" commented="no" level-type="subsequent" id="id14f19c32bbb34f6e890de486acd64db1"><enum>IX</enum><header display-inline="yes-display-inline">Anomalous health incidents</header><section id="id3d29209e286d4140898e6912cbea6416"><enum>901.</enum><header>Additional discretion for Director of Central Intelligence Agency in paying costs of treating qualifying injuries and making payments for qualifying injuries to the brain</header><subsection id="id9967f6869e3c44659795b1443150b8fc"><enum>(a)</enum><header>Additional authority for covering costs for treating qualifying injuries under extraordinary circumstances</header><text>Subsection (c) of section 19A of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3519b">50 U.S.C. 3519b</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id13d3114c885542cc88b20dedf5bff93d"><enum>(1)</enum><text>by striking <quote>The Director may</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id880A9B44C04A452FA9542D95704FAD8F"><paragraph commented="no" display-inline="no-display-inline" id="id10d7fb9861504758991c4a317157611c"><enum>(1)</enum><header>In general</header><text>The Director may</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id47f3cfe57cff4c58b48cb8d437a58819"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id39B4C8D1A4714D1CAFDDF3698EBDB5F2"><paragraph commented="no" display-inline="no-display-inline" id="idf960e7029177460b9af323b2cbf63059"><enum>(2)</enum><header>Extraordinary circumstances</header><text>Under such circumstances as the Director determines extraordinary, the Director may pay the costs of treating a qualifying injury of a covered employee, a covered individual, or a covered dependent or may reimburse a covered employee, a covered individual, or a covered dependent for such costs, that are not otherwise covered by a provision of Federal law, regardless of the date of the injury and the location of the employee, individual, or dependent when the injury occurred.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id8439dd321f254b8ca61061d627f9ed3b"><enum>(b)</enum><header>Additional authority for making payments for qualifying injuries to the brain under extraordinary circumstances</header><text>Subsection (d)(2) of such section is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id1fcbb92ec40e42178f51bbf18d992e3b"><enum>(1)</enum><text>by striking <quote>Notwithstanding</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id867B1F1788CD49D29AD88030BC95E02C"><subparagraph commented="no" display-inline="no-display-inline" id="idEA8AA8E68D9E4F6892203730A791C369"><enum>(A)</enum><header>In general</header><text>Notwithstanding</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idE40C49974E244B25982B3358E03594BA"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idD7ACD34C20F346FA9A0E9919035A765E"><subparagraph commented="no" display-inline="no-display-inline" id="idD0DC5ED739F4401B807377EAE35BE3F7"><enum>(B)</enum><header>Extraordinary circumstances</header><text>Under such circumstances as the Director determines extraordinary, the Director may provide payment to a covered employee, a covered individual, or a covered dependent for any qualifying injury to the brain, regardless of the date of the injury and the location of the employee, individual, or dependent when the injury occurred.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id58c925064ed343f7aaa50db3607a4ed1"><enum>(c)</enum><header>Congressional notification</header><text>Such section is amended by adding at the end the following new subsection:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id81B8D9E7968A4212801072D00AA038FE"><subsection commented="no" display-inline="no-display-inline" id="id2a099e9e22dc4809a3c7413d9e5a67d8"><enum>(e)</enum><header>Congressional notification</header><text>Whenever the Director makes a payment or reimbursement made under subsection (c) or (d)(2), the Director shall, not later than 30 days after the date on which the payment or reimbursement is made, submit to the congressional intelligence committees (as defined in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>)) a notification of such payment or reimbursement.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idEAD88D5F835B4CF28D132CD3AB7A1D0A"><enum>902.</enum><header>Additional discretion for Secretary of State and heads of other Federal agencies in paying costs of treating qualifying injuries and making payments for qualifying injuries to the brain</header><subsection id="idB4812C44113948098E80307DBC834996"><enum>(a)</enum><header>Additional authority for covering costs for treating qualifying injuries under extraordinary circumstances</header><text>Subsection (b) of section 901 of division J of the Further Consolidated Appropriations Act, 2020 (<external-xref legal-doc="usc" parsable-cite="usc/22/2680b">22 U.S.C. 2680b</external-xref>) is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1F9CAA60DA9D43929637A7690F20D6B2"><subsection commented="no" display-inline="no-display-inline" id="id6428ce13bf4a44448fb0163965271148"><enum>(b)</enum><header>Costs for treating qualifying injuries</header><paragraph id="idd327b519264848bc905ac7aa5c6e91bf"><enum>(1)</enum><header>In general</header><text>The Secretary of State or the head of any other Federal agency may pay or reimburse the costs relating to diagnosing and treating—</text><subparagraph id="id5095d17b776a4eb086f34a6a42285cac"><enum>(A)</enum><text>a qualifying injury of a covered employee for such costs, that are not otherwise covered by <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/5/81">chapter 81</external-xref> of title 5, United States Code, or other provision of Federal law; or</text></subparagraph><subparagraph id="idd76a4d35bdbe418287ee4136b6c26655"><enum>(B)</enum><text>a qualifying injury of a covered individual, or a covered dependent, for such costs that are not otherwise covered by Federal law.</text></subparagraph></paragraph><paragraph id="idE613387AD28C47B29658DC405C2BDD99" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header display-inline="yes-display-inline">Extraordinary circumstances</header><text display-inline="yes-display-inline">Under such circumstances as the Secretary of State or other agency head determines extraordinary, the Secretary or other agency head may pay the costs of treating a qualifying injury of a covered employee, a covered individual, or a covered dependent or may reimburse a covered employee, a covered individual, or a covered dependent for such costs, that are not otherwise covered by a provision of Federal law, regardless of the date on which the injury occurred.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idAA40AE3D45844B0CAA9D784AAB8A8323"><enum>(b)</enum><header>Additional authority for making payments for qualifying injuries to the brain under extraordinary circumstances</header><text>Subsection (i)(2) of such section is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id508E7B94180F45488B3DDDD896BAA7BF"><enum>(1)</enum><text>by striking <quote>Notwithstanding</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id38E7E9A748B84131B094A40DAE46CBF3"><subparagraph commented="no" display-inline="no-display-inline" id="idEBE54A9D653743009C6298FFAC5C86F7"><enum>(A)</enum><header>In general</header><text>Notwithstanding</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idC74711D21D434F7D82F0C17E15DF3DB2"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8DD843C886E7471EB5E7239BEDAABE65"><subparagraph commented="no" display-inline="no-display-inline" id="id8C1F7C1BC9754C76A4A9B4259D16069B"><enum>(B)</enum><header>Extraordinary circumstances</header><text>Under such circumstances as the Secretary of State or other agency head with an employee determines extraordinary, the Secretary or other agency head may provide payment to a covered dependent, a dependent of a former employee, a covered employee, a former employee, and a covered individual for any qualifying injury to the brain, regardless of the date on which the injury occurred.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id26a3b8c919a34f5d96e448a74212146d"><enum>(c)</enum><header>Changes to definitions</header><text>Subsection (e) of such section is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idb3fc8a86c2cc45118203e179a53e3d3c"><enum>(1)</enum><text display-inline="yes-display-inline">in paragraph (1)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id30c9aa5364fc461cbcfda1a6a8643257"><enum>(A)</enum><text display-inline="yes-display-inline">in the matter before subparagraph (A), by striking <quote>a employee who, on or after January 1, 2016</quote> and inserting <quote>an employee who, on or after September 11, 2001</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1a350a8f2d9f47b292c48e9f45d2e1f9"><enum>(B)</enum><text>in subparagraph (A), by inserting <quote>, or duty station in the United States</quote> before the semicolon;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2f03eb14775441e28a8782a582a9bd3f"><enum>(2)</enum><text>in paragraph (2)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id8bb0844f284d4cfd95f42f3baef9e6a5"><enum>(A)</enum><text display-inline="yes-display-inline">by striking <quote>January 1, 2016</quote> and inserting <quote>September 11, 2001</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7af86508af8b410d8a22a430b6a4d1f1"><enum>(B)</enum><text display-inline="yes-display-inline">by inserting <quote>, or duty station in the United States,</quote> after <quote>pursuant to subsection (f)</quote>;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf9c09ec1a6ab4dd18793874c1313cb84"><enum>(3)</enum><text>in paragraph (3)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id3253344169c94839ab0589578a1a3715"><enum>(A)</enum><text display-inline="yes-display-inline">in the matter before subparagraph (A), by striking <quote>January 1, 2016</quote> and inserting <quote>September 11, 2001</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id38e0e02df3c442b198cdc0949cbe3798"><enum>(B)</enum><text>in subparagraph (A), by inserting <quote>, or duty station in the United States</quote> before the semicolon; and</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="iddbf2008e30214293be7a8f4b7ee6fda9"><enum>(4)</enum><text>in paragraph (4)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id466a3be4fee6478b8ec0d0093b20a054"><enum>(A)</enum><text display-inline="yes-display-inline">in subparagraph (A)(i), by inserting <quote>, or duty station in the United States</quote> before the semicolon; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id59a91ca2a7044a918ce3636e9bb93fca"><enum>(B)</enum><text>in subparagraph (B)(i), by inserting <quote>, or duty station in the United States</quote> before the semicolon.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id0292c5cd4e9c484a869dc20e0730c156"><enum>(d)</enum><header>Clarification relating to authorities of Director of the Central Intelligence Agency</header><text>Such section is further amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idA5F83E388AB4480EB6153BB80DDEDF92"><subsection commented="no" display-inline="no-display-inline" id="ide38d140fb3834e1486ef8858a306c27f"><enum>(k)</enum><header>Relation to Director of Central Intelligence Agency</header><text>The authorities and requirements of this section shall not apply to the Director of the Central Intelligence Agency.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section commented="no" display-inline="no-display-inline" id="idF6D0FB1AF21043BBB6C7FA3100D67F14"><enum>903.</enum><header>Improved funding flexibility for payments made by Department of State for qualifying injuries to the brain</header><text display-inline="no-display-inline">Section 901(i) of division J of the Further Consolidated Appropriations Act, 2020 (<external-xref legal-doc="usc" parsable-cite="usc/22/2680b">22 U.S.C. 2680b</external-xref>) is amended by striking paragraph (3) and inserting the following:</text><quoted-block id="id94D2BCA54A7749C3818D82B3B424FE4B" display-inline="no-display-inline" style="OLC"><paragraph commented="no" display-inline="no-display-inline" id="idC602257BA2264CBC9FDFD8E734D31A3C"><enum>(3)</enum><header display-inline="yes-display-inline">Funding</header><subparagraph commented="no" display-inline="no-display-inline" id="H69CB317C21994363B906B0F4D0B51F6B"><enum>(A)</enum><header>In general</header><text>Payment under paragraph (2) in a fiscal year may be made using any funds—</text><clause id="H2D906894015E479FA7914B13B48C2540"><enum>(i)</enum><text>appropriated specifically for payments under such paragraph; or</text></clause><clause id="H4F8A4104578E46519DB4091F345CA117"><enum>(ii)</enum><text>reprogrammed in accordance with an applicable provision of law.</text></clause></subparagraph><subparagraph id="H695906BB8C7E4EB393E99C292BF11EE7" commented="no" display-inline="no-display-inline"><enum>(B)</enum><header>Budget</header><text>For each fiscal year, the Secretary of State shall include with the budget justification materials submitted to Congress in support of the budget of the President for that fiscal year pursuant to section 1105(a) of title 31, United States Code, an estimate of the funds required in that fiscal year to make payments under paragraph (2).</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></section></title><title style="OLC" commented="no" level-type="subsequent" id="idb2f3de98774549cc97da5443ac191524"><enum>X</enum><header display-inline="yes-display-inline">Unidentified anomalous phenomena</header><section id="id2d0ed5988a1a479b96819ee407bc036d"><enum>1001.</enum><header>Comptroller General of the United States review of All-domain Anomaly Resolution Office</header><subsection id="id2a85ba7f5b094628a93925a8eb55297e"><enum>(a)</enum><header>Definitions</header><text>In this section, the terms <term>congressional defense committees</term>, <term>congressional leadership</term>, and <term>unidentified anomalous phenomena</term> have the meanings given such terms in section 1683(n) of the National Defense Authorization Act for Fiscal Year 2022 (<external-xref legal-doc="usc" parsable-cite="usc/50/3373">50 U.S.C. 3373(n)</external-xref>).</text></subsection><subsection id="id41105995f89a45938a31a4281f9adddf"><enum>(b)</enum><header>Review required</header><text>The Comptroller General of the United States shall conduct a review of the All-domain Anomaly Resolution Office (in this section referred to as the <quote>Office</quote>).</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id4727214aac6a452c895d76f7064d66b6"><enum>(c)</enum><header>Elements</header><text display-inline="yes-display-inline">The review conducted pursuant to subsection (b) shall include the following:</text><paragraph id="id339438b960404d60ba6b31bd675a12d5"><enum>(1)</enum><text>A review of the implementation by the Office of the duties and requirements of the Office under section 1683 of the National Defense Authorization Act for Fiscal Year 2022 (<external-xref legal-doc="usc" parsable-cite="usc/50/3373">50 U.S.C. 3373</external-xref>), such as the process for operational unidentified anomalous phenomena reporting and coordination with the Department of Defense, the intelligence community, and other departments and agencies of the Federal Government and non-Government entities.</text></paragraph><paragraph id="ide4dc212431874edb90f3e4b9ddc2a905"><enum>(2)</enum><text>A review of such other matters relating to the activities of the Office that pertain to unidentified anomalous phenomena as the Comptroller General considers appropriate.</text></paragraph></subsection><subsection id="id38e4ae798ba0409c8f9ff7f545c77702"><enum>(d)</enum><header>Report</header><text>Following the review required by subsection (b), in a timeframe mutually agreed upon by the congressional intelligence committees, the congressional defense committees, congressional leadership, and the Comptroller General, the Comptroller General shall submit to such committees and congressional leadership a report on the findings of the Comptroller General with respect to the review conducted under subsection (b).</text></subsection></section><section commented="no" display-inline="no-display-inline" section-type="subsequent-section" id="idff1dfc93bd6547b681cad2a28dc343dc"><enum>1002.</enum><header>Sunset of requirements relating to audits of unidentified anomalous phenomena historical record report</header><text display-inline="no-display-inline">Section 6001 of the Intelligence Authorization Act for Fiscal Year 2023 (<external-xref legal-doc="usc" parsable-cite="usc/50/3373">50 U.S.C. 3373</external-xref> note) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="ide7f006b8746449cda8613b8a62c3b240"><enum>(1)</enum><text>in subsection (b)(2), by inserting <quote>until April 1, 2025</quote> after <quote>quarterly basis</quote>; and</text></paragraph><paragraph id="id9b51dbac99ad42eb8e47a9251a5eabd1" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text>in subsection (c), by inserting <quote>until June 30, 2025</quote> after <quote>semiannually thereafter</quote>.</text></paragraph></section><section id="idB75EFDB0168E413786290D75F3CAA38D"><enum>1003.</enum><header>Funding limitations relating to unidentified anomalous phenomena</header><subsection id="id3db6d874a5854b078de0b159965e666d"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="idae2495abd64b48039dea463adc5897f7"><enum>(1)</enum><header>Appropriate committees of congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subparagraph id="idffffdd69d3774f82a5978b226f19128f"><enum>(A)</enum><text>the Select Committee on Intelligence, the Committee on Armed Services, and the Committee on Appropriations of the Senate; and</text></subparagraph><subparagraph id="id296c3fb8e8404ff3a981cd51dc011941"><enum>(B)</enum><text>the Permanent Select Committee on Intelligence, the Committee on Armed Services, and the Committee on Appropriations of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id089b05ae9c9f47cd850eddb189924c04"><enum>(2)</enum><header>Congressional leadership</header><text>The term <term>congressional leadership</term> means—</text><subparagraph id="id67dda2b9f9b44e9391ac8dd92ee77f25"><enum>(A)</enum><text>the majority leader of the Senate;</text></subparagraph><subparagraph id="idcf6f6eff17c74651b653f0be61e8dc89"><enum>(B)</enum><text>the minority leader of the Senate;</text></subparagraph><subparagraph id="idffb503eab142466eba90d912a71afa37"><enum>(C)</enum><text>the Speaker of the House of Representatives; and</text></subparagraph><subparagraph id="idf5199c46dd20431383dce21e6d9a9a3c"><enum>(D)</enum><text>the minority leader of the House of Representatives.</text></subparagraph></paragraph><paragraph id="ide84d9849ac824bbf9f99126938d67b75"><enum>(3)</enum><header>Unidentified anomalous phenomena</header><text>The term <term>unidentified anomalous phenomena</term> has the meaning given such term in section 1683(n) of the National Defense Authorization Act for Fiscal Year 2022 (<external-xref legal-doc="usc" parsable-cite="usc/50/3373">50 U.S.C. 3373(n)</external-xref>).</text></paragraph></subsection><subsection id="idf70f5358a92c43eda5f31cbc9df4a7e7"><enum>(b)</enum><header>Limitations</header><text>None of the funds authorized to be appropriated or otherwise made available by this Act may be obligated or expended in support of any activity involving unidentified anomalous phenomena protected under any form of special access or restricted access limitation unless the Director of National Intelligence has provided the details of the activity to the appropriate committees of Congress and congressional leadership, including for any activities described in a report released by the All-domain Anomaly Resolution Office in fiscal year 2024.</text></subsection><subsection id="idef2ed28d99f24ab9bda678403d1b95e3" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Limitation regarding independent research and development</header><text>Independent research and development funding relating to unidentified anomalous phenomena shall not be allowable as indirect expenses for purposes of contracts covered by such instruction, unless such material and information is made available to the appropriate congressional committees and leadership. </text></subsection></section></title><title id="id09158f6d5226417d895ca44b6b6cad6d" style="OLC" commented="no"><enum>XI</enum><header>Air America</header><section id="idE00C5F40EAA0481187E0C1DA447A69CF" section-type="subsequent-section"><enum>1101.</enum><header>Short title</header><text display-inline="no-display-inline">This title may be cited as the <quote><short-title>Air America Act of 2024</short-title></quote>.</text></section><section commented="no" display-inline="no-display-inline" id="id816567952eef4fceb6d5d17257d38a6b"><enum>1102.</enum><header>Findings</header><text display-inline="no-display-inline">Congress finds the following:</text><paragraph id="idf4ac2f04889b48d98c1862c0745eb264"><enum>(1)</enum><text>Air America and its affiliated companies, in coordination with the Central Intelligence Agency, provided direct and indirect support to the United States Government from 1950 to 1976. </text></paragraph><paragraph id="id5b5be4195e88472d85164ba74cdb9337"><enum>(2)</enum><text>The service and sacrifice of employees of Air America included—</text><subparagraph commented="no" display-inline="no-display-inline" id="id5d75de6da1394b109d853271f544ea3e"><enum>(A)</enum><text display-inline="yes-display-inline">suffering a high rate of casualties in the course of service;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide54fc8ca2df14568a9e44c28b760b87f"><enum>(B)</enum><text display-inline="yes-display-inline">saving thousands of lives in search and rescue missions for downed United States airmen and in allied refugee evacuations; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id8aced00fad6d4d9b89d6521c2a0361df"><enum>(C)</enum><text display-inline="yes-display-inline">serving lengthy periods under challenging circumstances abroad.</text></subparagraph></paragraph></section><section commented="no" display-inline="no-display-inline" id="ide85b283aa4be499bbade5740a6ec2062"><enum>1103.</enum><header>Definitions</header><text display-inline="no-display-inline">In this title:</text><paragraph commented="no" display-inline="no-display-inline" id="id12455d9b5dea41969db7d7c80f9e0aa7"><enum>(1)</enum><header>Affiliated company</header><text>The term <term>affiliated company</term>, with respect to Air America, includes Air Asia Company Limited, CAT Incorporated, Civil Air Transport Company Limited, and the Pacific Division of Southern Air Transport.</text></paragraph><paragraph id="id762d9bd14a004fc594f307a7310d261c"><enum>(2)</enum><header>Air America</header><text>The term <term>Air America</term> means Air America, Incorporated.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idddc4095a8ab74c56bc81775fd537aa58"><enum>(3)</enum><header display-inline="yes-display-inline">Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="id483bf46b74c044d1bcc3bf7717a29031"><enum>(A)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security and Governmental Affairs, the Select Committee on Intelligence, and the Committee on Appropriations of the Senate; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id27adf5da0cd1408084346b2f31c4381a"><enum>(B)</enum><text display-inline="yes-display-inline">the Committee on Oversight and Accountability, the Permanent Select Committee on Intelligence, and the Committee on Appropriations of the House of Representatives.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7e152e85afd546e8ac0ca8b581ffc224"><enum>(4)</enum><header>Child; dependent; widow; widower</header><text>The terms <term>child</term>, <term>dependent</term>, <term>widow</term>, and <term>widower</term> have the meanings given those terms in section 8341(a) of title 5, United States Code, except that such section shall be applied by substituting <quote>individual who performed qualifying service</quote> for <quote>employee or Member</quote>.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5ec12d03c9a64457a6ba2c394540fa97"><enum>(5)</enum><header>Covered decedent</header><text>The term <term>covered decedent</term> means an individual who was killed in Southeast Asia while supporting operations of the Central Intelligence Agency during the period beginning on January 1, 1950, and ending on December 31, 1976, as a United States citizen employee of Air America or an affiliated company.</text></paragraph><paragraph id="id5135abdbedca492fbb064100f8384d0a"><enum>(6)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the Central Intelligence Agency.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9b06a3f8047c4ceca899f95ae6d87ad2"><enum>(7)</enum><header>Qualifying service</header><text> The term <term>qualifying service</term> means service that—</text><subparagraph id="id490583f044554738bc84952e9455247b"><enum>(A)</enum><text>was performed by a United States citizen as an employee of Air America or an affiliated company during the period beginning on January 1, 1950, and ending on December 31, 1976; and </text></subparagraph><subparagraph id="idb77bb95fc05c4238b5e3ed7ebb660b6c"><enum>(B)</enum><text>is documented in—</text><clause commented="no" display-inline="no-display-inline" id="idb66ad54d82ea47a087742f1bc48a5ff7"><enum>(i)</enum><text display-inline="yes-display-inline">the corporate records of Air America or an affiliated company; </text></clause><clause commented="no" display-inline="no-display-inline" id="id41a338afcfc4494f9d61128ada1437b4"><enum>(ii)</enum><text display-inline="yes-display-inline">records possessed by the United States Government; or </text></clause><clause commented="no" display-inline="no-display-inline" id="id8c3aff6f26bf400181011e4f51028892"><enum>(iii)</enum><text display-inline="yes-display-inline">the personal records of a former employee of Air America or an affiliated company that are verified by the United States Government.</text></clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idd1944053d2674f14a61a74eb8778b78a"><enum>(8)</enum><header>Survivor</header><text>The term <term>survivor</term> means—</text><subparagraph id="idfc6a7ce25cff42b0be0f0fc0df0bae45"><enum>(A)</enum><text>the widow or widower of—</text><clause commented="no" display-inline="no-display-inline" id="idf1b0adc13d9e46df9974a24276f9a46d"><enum>(i)</enum><text display-inline="yes-display-inline">an individual who performed qualifying service; or </text></clause><clause commented="no" display-inline="no-display-inline" id="id6dd598b8131c42a0867071fdaaff609a"><enum>(ii)</enum><text display-inline="yes-display-inline">a covered decedent; or</text></clause></subparagraph><subparagraph id="id344dde12ed1d4c4daf68477722a5acef"><enum>(B)</enum><text>an individual who, at any time during or since the period of qualifying service, or on the date of death of a covered decedent, was a dependent or child of—</text><clause commented="no" display-inline="no-display-inline" id="id3f2ff3a863fe47f999db2579b22b4753"><enum>(i)</enum><text display-inline="yes-display-inline">the individual who performed such qualifying service; or </text></clause><clause commented="no" display-inline="no-display-inline" id="id3e21b916114b4a6291d19d9136635e88"><enum>(ii)</enum><text display-inline="yes-display-inline">the covered decedent.</text></clause></subparagraph></paragraph></section><section commented="no" display-inline="no-display-inline" id="ida91a39b9528e4896a54660d77983d33d"><enum>1104.</enum><header>Award authorized to eligible persons</header><subsection id="idf1e8b2c7701040788a27ef484a79038f"><enum>(a)</enum><header>In general</header><text>Subject to the limitation in subsection (d), the Director shall provide an award payment of $40,000 under this section—</text><paragraph id="id548c49a9e9d64c1cba73425494e6e02c"><enum>(1)</enum><text>to an individual who performed qualifying service for a period greater than or equal to 5 years or to a survivor of such individual; or</text></paragraph><paragraph id="id823611839de64a00af45511e28a087a4"><enum>(2)</enum><text>to the survivor of a covered decedent.</text></paragraph></subsection><subsection id="idd49d2da190ff4cd4bcd2447c5197bda9"><enum>(b)</enum><header>Requirements</header><paragraph commented="no" display-inline="no-display-inline" id="ida81ebd2de8aa42bca17bd74b91d5b93a"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">To be eligible for a payment under this subsection, an individual who performed qualifying service or survivor (as the case may be) must demonstrate to the satisfaction of the Director that the individual whose qualifying service upon which the payment is based meets the criteria of paragraph (1) or (2) of subsection (a). </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id55ad20bbd799451e913666a31c0fc233"><enum>(2)</enum><header>Reliance on records</header><text display-inline="yes-display-inline">In carrying out this subsection, in addition to any evidence provided by such an individual or survivor, the Director may rely on records possessed by the United States Government. </text></paragraph></subsection><subsection id="id2ca1e0d01b7044e08297c79592c36986"><enum>(c)</enum><header>Additional payment</header><text>If an individual, or in the case of a survivor, the individual whose qualifying service upon which the payment is based, can demonstrate to the Director that the qualifying service of the individual exceeded 5 years, the Director shall pay to such individual or survivor an additional $8,000 for each full year in excess of 5 years (and a proportionate amount for a partial year).</text></subsection><subsection id="idab97089c15b2495d8399e0951ebca094"><enum>(d)</enum><header>Survivors</header><text>In the case of an award granted to a survivor under this section, the payment shall be made—</text><paragraph commented="no" display-inline="no-display-inline" id="id2f417fb67e7940d8948b0865e3ed3767"><enum>(1)</enum><text display-inline="yes-display-inline">to the surviving widow or widower; or </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1a76134f884c405db636b7a38932eee2"><enum>(2)</enum><text display-inline="yes-display-inline">if there is no surviving widow or widower, to the surviving dependents or children, in equal shares.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="idf2a3e837fd4d40f2a2118b5985c2f226"><enum>1105.</enum><header>Funding limitation</header><subsection commented="no" display-inline="no-display-inline" id="ida50418139e44428faaf0ce674326675a"><enum>(a)</enum><header>In general</header><text>The total amount of awards granted under this title may not exceed $60,000,000.</text></subsection><subsection id="id5d6aad738c1343388636905e12dd1e55"><enum>(b)</enum><header>Requests for additional funds</header><text>If, at the determination of the Director, the amount of funds required to satisfy all valid applications for payment under this title exceeds the limitation set forth in subsection (a), the Director shall submit to Congress a request for sufficient funds to fulfill all remaining payments.</text></subsection><subsection id="id8ce15381ca7246b3996456d1b3acc972"><enum>(c)</enum><header>Awards to employees of Intermountain Aviation</header><text>The Director may determine, on a case-by-case basis, to award amounts to individuals who performed service consistent with the definition of qualifying service as employees of Intermountain Aviation. </text></subsection></section><section commented="no" display-inline="no-display-inline" id="id9ea53746a6f3411eb451f72c1caf88b9"><enum>1106.</enum><header>Time limitation</header><subsection id="idf582f5291e4c4de2bf848877b5c4fb92"><enum>(a)</enum><header>In general</header><text>To be eligible for an award payment under this title, a claimant must file a claim for such payment with the Director not later than 2 years after the effective date of the regulations prescribed by the Director in accordance with section 1107. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="idd480fa273041408cac1908c1dd005b87"><enum>(b)</enum><header>Determination</header><text>Not later than 90 days after receiving a claim for an award payment under this section, the Director shall determine the eligibility of the claimant for payment. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id8b0bdc0584a14921b1503eefdf2b2829"><enum>(c)</enum><header>Payment</header><paragraph commented="no" display-inline="no-display-inline" id="idd7b19ec765f841d288fda91d59119177"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">If the Director determines that the claimant is eligible for the award payment, the Director shall pay the award payment not later than 60 days after the date of such determination.</text></paragraph><paragraph id="id0bedc5ac15d94f42817789d8e6972f0e"><enum>(2)</enum><header>Lump-sum payment</header><text>The Director shall issue each payment as a one-time lump sum payment contingent upon the timely filing of the claimant under this section.</text></paragraph><paragraph id="id80859637da54411bbdce6e8318b4033a"><enum>(3)</enum><header>Notice and delays</header><text>The Director shall notify the appropriate congressional committees of any delays in making an award payment not later than 30 days after the date such payment is due.</text></paragraph></subsection></section><section id="ide0f8800feb804e8db806edf08711b3e9"><enum>1107.</enum><header>Application procedures</header><subsection id="ida311ac58899149728d134f41284c8356"><enum>(a)</enum><header>In general</header><text>The Director shall prescribe procedures to carry out this title, which shall include processes under which—</text><paragraph commented="no" display-inline="no-display-inline" id="id489250064a0b45e78a1fdf16f485b6ca"><enum>(1)</enum><text display-inline="yes-display-inline">claimants may submit claims for payment under this title;</text></paragraph><paragraph id="idf26aff8d062a428bbf0d6f2452dfae40"><enum>(2)</enum><text>the Director will award the amounts under section 1104; and</text></paragraph><paragraph id="iddb0b4c309e1d47428d5ef270dd1a8cec"><enum>(3)</enum><text>claimants can obtain redress and appeal determinations under section 1106.</text></paragraph></subsection><subsection id="id3d3221129d8e46c2bc64c1704284a260"><enum>(b)</enum><header>Other matters</header><text>Such procedures—</text><paragraph commented="no" display-inline="no-display-inline" id="id83e11b274bf944689df7cea27fa95709"><enum>(1)</enum><text display-inline="yes-display-inline">shall be—</text><subparagraph commented="no" display-inline="no-display-inline" id="id98a5e5b6f1884269b314b36abef5f0ee"><enum>(A)</enum><text display-inline="yes-display-inline">prescribed not later than 60 days after the date of the enactment of this Act; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4a5960b9bc574907b11c6bed9e31a543"><enum>(B)</enum><text display-inline="yes-display-inline">published in the Code of Federal Regulations; and</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7bbe889d9f93464d89a1d4c012163097"><enum>(2)</enum><text display-inline="yes-display-inline">shall not be subject to <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/5/5">chapter 5</external-xref> of title 5, United States Code.</text></paragraph></subsection></section><section id="idd9abeb74f39b42fb805699c502bcd71c"><enum>1108.</enum><header>Rule of construction</header><text display-inline="no-display-inline">Nothing in this title shall be construed to—</text><paragraph id="id862ce6d82f7a4c069b16462fc96bfe9a"><enum>(1)</enum><text>entitle any person to Federal benefits, including retirement benefits under chapter 83 or 84 of title 5, United States Code, and disability or death benefits under chapter 81 of such title;</text></paragraph><paragraph id="ide37b66e1b72a4dbaadbb7b1fc0c5ac34"><enum>(2)</enum><text>change the legal status of the former Air America corporation or any affiliated company; or</text></paragraph><paragraph id="id4afbe15aa6804ca2a6717e5bcb4f6fe4"><enum>(3)</enum><text>create any legal rights, benefits, or entitlements beyond the one-time award authorized by this title.</text></paragraph></section><section id="idee93c8798e154387b0690f701d596705"><enum>1109.</enum><header>Attorneys’ and agents’ fees</header><subsection id="id9b1a38bdb7f249a4bbc050f468a777de"><enum>(a)</enum><header>In general</header><text>It shall be unlawful for more than 25 percent of an award paid pursuant to this title to be paid to, or received by, any agent or attorney for any service rendered to a person who receives an award under section 1104, in connection with the award under this title.</text></subsection><subsection id="id769ba0ec52164438b0ad151ca8cb4d4e"><enum>(b)</enum><header>Violation</header><text>Any agent or attorney who violates subsection (a) shall be fined under title 18, United States Code.</text></subsection></section><section id="idb95e972469314a3cbd37c6b7e3d7ed0d"><enum>1110.</enum><header>No judicial review</header><text display-inline="no-display-inline">A determination by the Director pursuant to this title is final and conclusive and shall not be subject to judicial review.</text></section><section id="id7e5a2cb0a67e4024817193a3d6054b30" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>1111.</enum><header>Reports to Congress</header><text display-inline="no-display-inline">Until the date that all funds available for awards under this title are expended, the Director shall submit to the appropriate congressional committees a semiannual report describing the number of award payments made and denied during the 180 days preceding the submission of the report, including the rationales for any denials, and if, at the determination of the Director, the amount of funds provided to carry out this title is insufficient to satisfy any remaining or anticipated claims. </text></section></title><title style="OLC" commented="no" level-type="subsequent" id="iddfa06288aa6f4063a5e24b41c1779c79"><enum>XII</enum><header display-inline="yes-display-inline">Other matters</header><section commented="no" id="H704B2609C40F4870A02125404F3FF3B7"><enum>1201.</enum><header>Enhanced authorities for amicus curiae under the Foreign Intelligence Surveillance Act of 1978</header><subsection id="id8f2693a35c3b462dbd306118cd1c2f73" changed="not-changed" commented="no"><enum>(a)</enum><header>Expansion of appointment authority</header><paragraph id="id63e760552eeb457db191ab58055144f7" changed="not-changed" commented="no"><enum>(1)</enum><header>In general</header><text>Section 103(i)(2)(A) of the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1803">50 U.S.C. 1803(i)(2)(A)</external-xref>) is amended by striking clause (i) and inserting the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id448814410d164b46bd5fb86bf4c4f3a2" changed="not-changed"><clause id="id406d60bf7cad47469eab41daa7d5fd87" changed="not-changed" commented="no"><enum>(i)</enum><text>shall appoint one or more individuals who have been designated under paragraph (1), not less than one of whom possesses privacy and civil liberties expertise, unless the court finds that such a qualification is inappropriate, to serve as amicus curiae to assist the court in the consideration of any application or motion for an order or review that, in the opinion of the court—</text><subclause id="idf2223b477f7f41da955c89e0af7b94da" changed="not-changed" commented="no"><enum>(I)</enum><text>presents a novel or significant interpretation of the law, unless the court issues a finding that such appointment is not appropriate;</text></subclause><subclause id="idceb1a5757aab49669125d21f2411c1f2" changed="not-changed" commented="no"><enum>(II)</enum><text>presents exceptional concerns with respect to the activities of a United States person that are protected by the first amendment to the Constitution of the United States, unless the court issues a finding that such appointment is not appropriate;</text></subclause><subclause id="ided0ccfe47f3d4874a743cc84afe8ae68" changed="not-changed" commented="no"><enum>(III)</enum><text>targets a United States person and presents or involves a sensitive investigative matter, unless—</text><item changed="not-changed" commented="no" display-inline="no-display-inline" id="id46b9ec594ccb4d42b027392a9fd6768b"><enum>(aa)</enum><text display-inline="yes-display-inline">the matter represents an immediate danger to human life; or</text></item><item changed="not-changed" commented="no" display-inline="no-display-inline" id="ida4f826547e1f46119fdbe228bb6c4143"><enum>(bb)</enum><text>the court issues a finding that such appointment is not appropriate;</text></item></subclause><subclause id="id9fd5d78abb55461d9a5409316b94ce64" changed="not-changed" commented="no"><enum>(IV)</enum><text>targets a United States person and presents a request for approval of programmatic surveillance or reauthorization of programmatic surveillance, unless the court issues a finding that such appointment is not appropriate; or</text></subclause><subclause id="id9D1E4081B245481F8D238779A9AF4D35" changed="not-changed" commented="no"><enum>(V)</enum><text>targets a United States person and otherwise presents novel or exceptional civil liberties issues, unless the court issues a finding that such appointment is not appropriate;</text></subclause></clause><after-quoted-block>. </after-quoted-block></quoted-block></paragraph><paragraph id="idF072D2ACB94F45FAA1A72A3EE5B2A63E" changed="not-changed" commented="no"><enum>(2)</enum><header>Definition of sensitive investigative matter</header><text>Subsection (i) of section 103 of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/1803">50 U.S.C. 1803</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id4C3D6F7168024C8C959CA11BAB6510D9" changed="not-changed"><paragraph id="id573002b3eecb491f970e9c8c7aaa68ac" changed="not-changed" commented="no"><enum>(12)</enum><header>Definition of sensitive investigative matter</header><text>In this subsection, the term <term>sensitive investigative matter</term> means—</text><subparagraph id="id6d0b6bb47e484b1fa9e75439d4f14f78" changed="not-changed" commented="no"><enum>(A)</enum><text>an investigative matter that targets a United States person who is—</text><clause changed="not-changed" commented="no" display-inline="no-display-inline" id="id3e22cd24f1164ae7a730e1f7c6f927fc"><enum>(i)</enum><text>a United States elected official; </text></clause><clause changed="not-changed" commented="no" display-inline="no-display-inline" id="idec12ef686e9b4f8fb780a4457105b2e3"><enum>(ii)</enum><text display-inline="yes-display-inline">an appointee of—</text><subclause changed="not-changed" commented="no" display-inline="no-display-inline" id="ide1bbd11d46554c8e952e5ed824b47e05"><enum>(I)</enum><text display-inline="yes-display-inline">the President; or </text></subclause><subclause changed="not-changed" commented="no" display-inline="no-display-inline" id="id447e6a0f75c04dac8e2b36be409bdcb7"><enum>(II)</enum><text display-inline="yes-display-inline">a State Governor;</text></subclause></clause><clause changed="not-changed" commented="no" display-inline="no-display-inline" id="idffc343f96cec412a92983c01eebe02b1"><enum>(iii)</enum><text display-inline="yes-display-inline">a United States political candidate;</text></clause><clause changed="not-changed" commented="no" display-inline="no-display-inline" id="id1ea546f80f54498384f1d4a357d09296"><enum>(iv)</enum><text display-inline="yes-display-inline">a United States political organization or an individual prominent in such an organization;</text></clause><clause changed="not-changed" commented="no" display-inline="no-display-inline" id="id96919ce1b0734c0eb035e5b677d925d4"><enum>(v)</enum><text display-inline="yes-display-inline">a United States news media organization or a member of a United States news media organization; or</text></clause><clause changed="not-changed" commented="no" display-inline="no-display-inline" id="id5534f8a5544b4eb182919b068cbe27e5"><enum>(vi)</enum><text display-inline="yes-display-inline">a United States religious organization or an individual prominent in such an organization; or </text></clause></subparagraph><subparagraph id="id456DA5127DE745CCB941908F02A0D4BF" changed="not-changed" commented="no"><enum>(B)</enum><text>any other investigative matter involving a domestic entity or a known or presumed United States person that, in the judgment of the applicable court established under subsection (a) or (b), is as sensitive as an investigative matter described in subparagraph (A).</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="idb53f3276233d4006ac2c8b3dafca6a66" changed="not-changed" commented="no"><enum>(b)</enum><header>Authority To seek review</header><text>Subsection (i) of such section (<external-xref legal-doc="usc" parsable-cite="usc/50/1803">50 U.S.C. 1803</external-xref>), as amended by subsection (a) of this section, is further amended—</text><paragraph id="ida0a9eecc61604d77a3d2368da5f8e2aa" commented="no" changed="not-changed"><enum>(1)</enum><text>in paragraph (4)—</text><subparagraph commented="no" id="id21040DBB45324C0ABF837FC7162A4704" changed="not-changed"><enum>(A)</enum><text>in the paragraph heading, by inserting <quote><header-in-text style="OLC" level="paragraph">; authority</header-in-text></quote> after <quote><header-in-text style="OLC" level="paragraph">Duties</header-in-text></quote>; </text></subparagraph><subparagraph changed="not-changed" commented="no" display-inline="no-display-inline" id="idea4af3c2e0c9419f9535199e7bfd37d4"><enum>(B)</enum><text>by striking <quote>the amicus curiae shall</quote> and all that follows through <quote>provide</quote> and insert the following: “the amicus curiae—</text><quoted-block id="id08ADCCF3AB4B4A4C864CD68B0D41FEDD" style="OLC" act-name=""><subparagraph id="idA7B548E91FE84B4386AACC5BE6028C47"><enum>(A)</enum><text>shall provide</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph commented="no" id="idD8DF8DED05AF47468E546B99BF9848A4" changed="not-changed"><enum>(C)</enum><text>in subparagraph (A), as so designated—</text><clause commented="no" changed="not-changed" display-inline="no-display-inline" id="id34ce29fd06d54d78bbd1bb99ed717889"><enum>(i)</enum><text display-inline="yes-display-inline">in clause (i), by inserting before the semicolon at the end the following: <quote>, including legal arguments regarding any privacy or civil liberties interest of any United States person that would be significantly impacted by the application or motion</quote>; and</text></clause><clause commented="no" id="idFF56E65615534912BD269496218C3472" changed="not-changed"><enum>(ii)</enum><text>in clause (iii), by striking the period at the end and inserting <quote>; and</quote>; and</text></clause></subparagraph><subparagraph commented="no" changed="not-changed" display-inline="no-display-inline" id="idfc7c90d060ea49b9bc82dd1a7b9212f5"><enum>(D)</enum><text display-inline="yes-display-inline">by adding at the end the following:</text><quoted-block id="id8841BF8AC77949319FB735D70EAB4549" style="OLC" act-name=""><subparagraph id="idAE314D57FC7241F3979F01313978F902"><enum>(B)</enum><text>may seek leave to raise any novel or significant privacy or civil liberties issue relevant to the application or motion or other issue directly impacting the legality of the proposed electronic surveillance with the court, regardless of whether the court has requested assistance on that issue.</text></subparagraph><after-quoted-block>; </after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="idd2b2b4f550cc4c1da41064be71cde714" changed="not-changed" commented="no"><enum>(2)</enum><text>by redesignating paragraphs (7) through (12) as paragraphs (8) through (13), respectively; and</text></paragraph><paragraph id="idd718353180a64289a2839b86fbcc8c06" changed="not-changed" commented="no"><enum>(3)</enum><text>by inserting after paragraph (6) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id34c52eea441d4c0faa3c1d2beae0def8" changed="not-changed"><paragraph id="id247da5c1561845248588b96cceade1e5" changed="not-changed" commented="no"><enum>(7)</enum><header>Authority to seek review of decisions</header><subparagraph id="H142BE361BE984EF58B8A6DBA796D9461" commented="no" display-inline="no-display-inline" changed="not-changed"><enum>(A)</enum><header>FISA Court decisions</header><text display-inline="yes-display-inline">Following issuance of a final order under this Act by the Foreign Intelligence Surveillance Court in a matter in which an amicus curiae was appointed under paragraph (2), that amicus curiae may petition the Foreign Intelligence Surveillance Court to certify for review to the Foreign Intelligence Surveillance Court of Review a question of law pursuant to subsection (j). If the court denies such petition, the court shall provide for the record a written statement of the reasons for such denial. Upon certification of any question of law pursuant to this subparagraph, the Court of Review shall appoint the amicus curiae to assist the Court of Review in its consideration of the certified question, unless the Court of Review issues a finding that such appointment is not appropriate. </text></subparagraph><subparagraph id="H76286897269744F69DA38256F9BFD21F" commented="no" changed="not-changed"><enum>(B)</enum><header>FISA Court of Review decisions</header><text display-inline="yes-display-inline">An amicus curiae appointed under paragraph (2) may petition the Foreign Intelligence Surveillance Court of Review to certify for review to the Supreme Court of the United States any question of law pursuant to section 1254(2) of title 28, United States Code, in the matter in which that amicus curiae was appointed.</text></subparagraph><subparagraph id="id199ba1c0042c4686bf34db10e734fea3" changed="not-changed" commented="no"><enum>(C)</enum><header>Declassification of referrals</header><text>For purposes of section 602, if the Foreign Intelligence Surveillance Court or the Foreign Intelligence Surveillance Court of Review denies a petition filed under subparagraph (A) or (B) of this paragraph, that petition and all of its content shall be considered a decision, order, or opinion issued by the Foreign Intelligence Surveillance Court or the Foreign Intelligence Surveillance Court of Review described in section 602(a).</text></subparagraph></paragraph><after-quoted-block>. </after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" id="H42D6CD53300849DCB8D8CAF6D32E6217"><enum>(c)</enum><header>Access to information</header><paragraph id="id4603746511ad4d3c80e320c85ea17cc7" changed="not-changed" commented="no"><enum/></paragraph><paragraph commented="no" display-inline="yes-display-inline" id="id84c726b1cd3f4b76aa2d76ef79872f66"><enum>(1)</enum><header>Application and materials</header><text>Subparagraph (A) of section 103(i)(6) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/1803">50 U.S.C. 1803(i)(6)</external-xref>) is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id23044ff6174b437b90d58e4f8f52391e" changed="not-changed"><subparagraph commented="no" display-inline="no-display-inline" id="HFA8A8DD8ED884C73BC750F42923BD97D" changed="not-changed"><enum>(A)</enum><header display-inline="yes-display-inline">In general</header><clause commented="no" display-inline="no-display-inline" id="id864D0359C55A47A7B19441E1784A7109" changed="not-changed"><enum>(i)</enum><header>Rights of amicus</header><text display-inline="yes-display-inline">If a court established under subsection (a) or (b) appoints an amicus curiae under paragraph (2), the amicus curiae—</text><subclause id="ideb4d2cbb6d77414d880308596675a1f8" changed="not-changed" commented="no"><enum>(I)</enum><text>shall have access to, to the extent such information is available to the Government and the court established under subsection (a) or (b) determines it is necessary to fulfill the duties of the amicus curiae—</text><item id="idb4fb1d95c385460b8eea5cee8d482e80" changed="not-changed" commented="no"><enum>(aa)</enum><text>the application, certification, petition, motion, and other information and supporting materials submitted to the Foreign Intelligence Surveillance Court in connection with the matter in which the amicus curiae has been appointed, including access to any relevant legal precedent (including any such precedent that is cited by the Government, including in such an application);</text></item><item id="idD8094F683B76464994C574564C04FDBE" changed="not-changed" commented="no"><enum>(bb)</enum><text>a copy of each relevant decision made by the Foreign Intelligence Surveillance Court or the Foreign Intelligence Surveillance Court of Review in which the court decides a question of law, without regard to whether the decision is classified; and</text></item><item id="id59f245af957b4062bdf74acd4d987a93" changed="not-changed" commented="no"><enum>(cc)</enum><text>any other information or materials that the court determines are relevant to the duties of the amicus curiae; and</text></item></subclause><subclause id="id2639d5d9baaa47be94678f5c23a918fa" changed="not-changed" commented="no"><enum>(II)</enum><text>may make a submission to the court requesting access to any other particular materials or information (or category of materials or information) that the amicus curiae believes to be relevant to the duties of the amicus curiae.</text></subclause></clause><clause id="id96D06EE852084590B8B670D09189315B" changed="not-changed" commented="no"><enum>(ii)</enum><header>Supporting documentation regarding accuracy</header><text>The Foreign Intelligence Surveillance Court, upon the motion of an amicus curiae appointed under paragraph (2) or upon its own motion, may require the Government to make available the supporting documentation regarding the accuracy of any material submitted to the Foreign Intelligence Surveillance Court in connection with the matter in which the amicus curiae has been appointed if the court determines the information is relevant to the duties of the amicus curiae.</text></clause></subparagraph><after-quoted-block>. </after-quoted-block></quoted-block></paragraph><paragraph id="id1f6eb24d5d424139bf767448866c6b50" changed="not-changed" commented="no"><enum>(2)</enum><header>Clarification of access to certain information</header><text>Such section is further amended by striking subparagraph (C) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idEC29456ACCA1420AB2B1DBB92790E267" changed="not-changed"><subparagraph id="id0A3D081431184C55948BDB0CA33D3CBE" changed="not-changed" commented="no"><enum>(C)</enum><header>Classified information</header><text>An amicus curiae appointed by the court shall have access, to the extent such information is available to the Government and the court determines such information is relevant to the duties of the amicus curiae in the matter in which the amicus curiae was appointed, to copies of each opinion, order, transcript, pleading, or other document of the Foreign Intelligence Surveillance Court and the Foreign Intelligence Surveillance Court of Review, including, if the individual is eligible for access to classified information, any classified documents, information, and other materials or proceedings, but only to the extent consistent with the national security of the United States.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph commented="no" id="HEDF86FE40B644974B84B1CC4125362CE"><enum>(3)</enum><header>Consultation among amici curiae</header><text display-inline="yes-display-inline">Such section is further amended—</text><subparagraph commented="no" id="H84A8A9F34B664B88AF162B509EF7540E"><enum>(A)</enum><text>by redesignating subparagraphs (B), (C), and (D) as subparagraphs (C), (D), and (E), respectively; and</text></subparagraph><subparagraph commented="no" id="H227F924DCCC540798837D8EAC8380F69"><enum>(B)</enum><text>by inserting after subparagraph (A) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="HF506EBE553C34848B36A2D2390338343"><subparagraph commented="no" id="H3FE089E466AE4766AC76C7BE3D8EFDFD"><enum>(B)</enum><header>Consultation</header><text display-inline="yes-display-inline">If the Foreign Intelligence Surveillance Court or the Foreign Intelligence Surveillance Court of Review determines that it is relevant to the duties of an amicus curiae appointed by the court under paragraph (2), the amicus curiae may consult with one or more of the other individuals designated to serve as amicus curiae pursuant to paragraph (1) regarding any of the information relevant to any assigned proceeding.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection display-inline="no-display-inline" id="H190017E1C4E24323B0D9FA74B571F29F" commented="no"><enum>(d)</enum><header>Term limits</header><paragraph commented="no" id="HB8886170C4AC41F4B10F256DD017051A"><enum>(1)</enum><header>Requirement</header><text>Paragraph (1) of section 103(i) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/1803">50 U.S.C. 1803(i)</external-xref>) is amended by adding at the end the following new sentence: <quote>An individual may serve as an amicus curiae for a 5-year term, and the presiding judges may, for good cause, jointly reappoint the individual to a single additional 5-year term.</quote>.</text></paragraph><paragraph id="H51058D13C8874BB8A626D6E0379D2B34" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Application</header><text>The amendment made by paragraph (1) shall apply with respect to the service of an amicus curiae appointed under section 103(i) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/1803">50 U.S.C. 1803(i)</external-xref>) that occurs on or after the date of the enactment of this Act, regardless of the date on which the amicus curiae is appointed. </text></paragraph></subsection></section><section id="idE565929150204D21881DD1A5D31A76F9"><enum>1202.</enum><header>Limitation on directives under Foreign Intelligence Surveillance Act of 1978 relating to certain electronic communication service providers</header><text display-inline="no-display-inline">Section 702(i) of the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1881a">50 U.S.C. 1881a(i)</external-xref>) is amended by adding at the end the following:</text><quoted-block id="id8ECDE3BB591248DC8FB2198FD73A5EC9" display-inline="no-display-inline" style="OLC"><paragraph commented="no" display-inline="no-display-inline" id="id2839ec32569f4a088bb242cbfe4bc263"><enum>(7)</enum><header>Limitation relating to certain electronic communication service providers</header><subparagraph commented="no" display-inline="no-display-inline" id="id8bf34757eac944a5b72df5e32ef23b40"><enum>(A)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this paragraph:</text><clause commented="no" display-inline="no-display-inline" id="id5efa9c32e6af4606b8ed0d0e02bc1bc1"><enum>(i)</enum><header>Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subclause commented="no" display-inline="no-display-inline" id="idb222e90ec05b4672bbc6f067f5199c96"><enum>(I)</enum><text display-inline="yes-display-inline">the congressional intelligence committees;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id616b2f2e3a004b9caa656b3468d8a1df"><enum>(II)</enum><text>the Committee on the Judiciary of the Senate; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id7def75e3b1bc45f7981cf4e35b30ac70"><enum>(III)</enum><text>the Committee on the Judiciary of the House of Representatives.</text></subclause></clause><clause commented="no" display-inline="no-display-inline" id="id67d24f8e12e94d228ab6f6a43ca926b5"><enum>(ii)</enum><header display-inline="yes-display-inline">Covered electronic communication service provider</header><text>The term <term>covered electronic communication service provider</term> means—</text><subclause commented="no" display-inline="no-display-inline" id="ide769ad89f1cc4459a3a5e5a07c11bffc"><enum>(I)</enum><text display-inline="yes-display-inline">a service provider described in section 701(b)(4)(E); or</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id42751093a2864982a5af835eafaaceb6"><enum>(II)</enum><text display-inline="yes-display-inline">a custodian of an entity as defined in section 701(b)(4)(F).</text></subclause></clause><clause commented="no" display-inline="no-display-inline" id="id38447525591b46d5b77e34a3e6e58faf"><enum>(iii)</enum><header>Covered opinions</header><text display-inline="yes-display-inline">The term <term>covered opinions</term> means the opinions of the Foreign Intelligence Surveillance Court and the Foreign Intelligence Surveillance Court of Review authorized for public release on August 23, 2023 (Opinion and Order, In re Petition to Set Aside or Modify Directive Issued to [REDACTED], No. [REDACTED], (FISA Ct. [REDACTED] 2022) (Contreras J.); Opinion, In re Petition to Set Aside or Modify Directive Issued to [REDACTED], No. [REDACTED], (FISA Ct. Rev. [REDACTED] 2023) (Sentelle, J.; Higginson, J.; Miller J.)).</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idfbded61eb13244b49b97f650b1120651"><enum>(B)</enum><header>Limitation</header><text display-inline="yes-display-inline">A directive may not be issued under paragraph (1) to a covered electronic communication service provider unless the covered electronic communication service provider is a provider of the type of service at issue in the covered opinions.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id24fc9ac6719b44d4b6dad50ffbb9d55f"><enum>(C)</enum><header>Requirements for directives to covered electronic communication service providers</header><clause commented="no" display-inline="no-display-inline" id="idb667e93442b4479c904a8a5b00210a64"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">Subject to clause (ii), any directive issued under paragraph (1) on or after the date of the enactment of the <short-title>Intelligence Authorization Act for Fiscal Year 2025</short-title> to a covered electronic communication service provider that is not prohibited by subparagraph (B) of this paragraph shall include a summary description of the services at issue in the covered opinions.</text></clause><clause commented="no" display-inline="no-display-inline" id="id459441f862024beb8d65f8c4079344a9"><enum>(ii)</enum><header>Duplicate summaries not required</header><text>A directive need not include a summary description of the services at issue in the covered opinions if such summary was included in a prior directive issued to the covered electronic communication service provider and the summary has not materially changed.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6c53f6b2407147928300ca6351b0eee5"><enum>(D)</enum><header>Foreign Intelligence Surveillance Court notification and review</header><clause id="idb00252e9a2ec4e83829f90fec2edb9eb"><enum>(i)</enum><header>Notification</header><subclause commented="no" display-inline="no-display-inline" id="ide72c3a8555464c34a033ba5042742e8c"><enum>(I)</enum><header>In general</header><text display-inline="yes-display-inline">Subject to subclause (II), each time the Attorney General and the Director of National Intelligence issue a directive under paragraph (1) to a covered electronic communication service provider that is not prohibited by subparagraph (B) and each time the Attorney General and the Director materially change a directive under paragraph (1) issued to a covered electronic communication service provider that is not prohibited by subparagraph (B), the Attorney General and the Director shall provide the directive to the Foreign Intelligence Surveillance Court on or before the date that is 7 days after the date on which the Attorney General and the Director issue the directive, along with a description of the covered electronic communication service provider to whom the directive is issued and the services at issue.</text></subclause><subclause commented="no" display-inline="no-display-inline" id="ida5b88204b34c48929ca0036d5e228bde"><enum>(II)</enum><header>Duplication not required</header><text>The Attorney General and the Director do not need to provide a directive or description to the Foreign Intelligence Surveillance Court under subclause (I) if a directive and description concerning the covered electronic communication service provider was previously provided to the Court and the directive or description has not materially changed.</text></subclause></clause><clause id="idca8dde2f6c6a478d8dd1d1d1418b260c"><enum>(ii)</enum><header>Additional information</header><text>As soon as feasible and not later than the initiation of collection, the Attorney General and the Director shall, for each directive described in subparagraph (i), provide the Foreign Intelligence Surveillance Court a description of the type of equipment to be accessed, the nature of the access, and the form of assistance required pursuant to the directive.</text></clause><clause id="id74f827480abb4f7fa644dcd3a52bca72"><enum>(iii)</enum><header>Review</header><subclause commented="no" display-inline="no-display-inline" id="ide12a9a7fd93645b994a9f902eab9e687"><enum>(I)</enum><header>In general</header><text display-inline="yes-display-inline">The Foreign Intelligence Surveillance Act Court may review a directive received by the Court under clause (i) to determine whether the directive is consistent with subparagraph (B) and affirm, modify, or set aside the directive.</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idcfedc9f8691a40738cbee4ba1c069345"><enum>(II)</enum><header>Notice of intent to review</header><text display-inline="yes-display-inline">Not later than 10 days after the date on which the Court receives information under clause (ii) with respect to a directive, the Court shall provide notice to the Attorney General, the Director, and the covered electronic communication service provider, indicating whether the Court intends to undertake a review under subclause (I) of this clause.</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id88c96532354c46bcb4a6b4be55f3ba0e"><enum>(III)</enum><header>Completion of reviews</header><text>In a case in which the Court provides notice under subclause (II) indicating that the Court intends to review a directive under subclause (I), the Court shall, not later than 30 days after the date on which the Court provides notice under subclause (II) with respect to the directive, complete the review.</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide0e856405a0540fbbded98ab472aa790"><enum>(E)</enum><header>Congressional oversight</header><clause commented="no" display-inline="no-display-inline" id="idc305d648c34c4decae8781a141163162"><enum>(i)</enum><header display-inline="yes-display-inline">Notification</header><subclause commented="no" display-inline="no-display-inline" id="idaf883e0e5af74fbbaecb6c35a7a6251b"><enum>(I)</enum><header>In general</header><text display-inline="yes-display-inline">Subject to subclause (II), each time the Attorney General and the Director of National Intelligence issue a directive under paragraph (1) to a covered electronic communication service provider that is not prohibited by subparagraph (B) and each time the Attorney General and the Director materially change a directive under paragraph (1) issued to a covered electronic communication service provider that is not prohibited by subparagraph (B), the Attorney General and the Director shall submit to the appropriate committees of Congress the directive on or before the date that is 7 days after the date on which the Attorney General and the Director issue the directive, along with description of the covered electronic communication service provider to whom the directive is issued and the services at issue.</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idceec9d1dba9646ef8b85b036f2ae2920"><enum>(II)</enum><header>Duplication not required</header><text>The Attorney General and the Director do not need to submit a directive or description to the appropriate committees of Congress under subclause (I) if a directive and description concerning the covered electronic communication service provider was previously submitted to the appropriate committees of Congress and the directive or description has not materially changed.</text></subclause></clause><clause id="id3A146A493CEC404CA66A4182ADCE55E2"><enum>(ii)</enum><header>Additional information</header><text>As soon as feasible and not later than the initiation of collection, the Attorney General and the Director shall, for each directive described in subparagraph (i), provide the appropriate committees of Congress a description of the type of equipment to be accessed, the nature of the access, and the form of assistance required pursuant to the directive.</text></clause><clause commented="no" display-inline="no-display-inline" id="idd2f691c91dd8409fa2541b65596cd6e8"><enum>(iii)</enum><header>Reporting</header><subclause commented="no" display-inline="no-display-inline" id="ida8ca4ff06824411885e5e31b175be889"><enum>(I)</enum><header display-inline="yes-display-inline">Quarterly reports</header><text>Not later than 90 days after the date of the enactment of the <short-title>Intelligence Authorization Act for Fiscal Year 2025</short-title> and not less frequently than once each quarter thereafter, the Attorney General and the Director shall submit to the appropriate committees of Congress a report on the number of directives issued, during the period covered by the report, under paragraph (1) to a covered electronic communication service provider and the number of directives provided during the same period to the Foreign Intelligence Surveillance Court under subparagraph (D)(i).</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idcd133da862ca486fb2bf2433e90973fe"><enum>(II)</enum><header>Form of reports</header><text display-inline="yes-display-inline">Each report submitted pursuant to subclause (I) shall be submitted in unclassified form, but may include a classified annex.</text></subclause><subclause id="id2f360facb81648b0902eeab79867f028" commented="no" display-inline="no-display-inline"><enum>(III)</enum><header>Submittal of court opinions</header><text display-inline="yes-display-inline">Not later than 45 days after the date on which the Foreign Intelligence Surveillance Court or the Foreign Intelligence Surveillance Court of Review issues an opinion relating to a directive issued to a covered electronic communication service provider under paragraph (1), the Attorney General shall submit to the appropriate committees of Congress a copy of the opinion.</text></subclause></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="idae217f904c8d4c26bb4d0b7e6bc1b34d" section-type="subsequent-section"><enum>1203.</enum><header>Strengthening Election Cybersecurity to Uphold Respect for Elections through Independent Testing Act of 2024</header><subsection commented="no" display-inline="no-display-inline" id="id52c0ec57b0da44b3a68c6cba4b53f187"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This section may be cited as the <quote><short-title>Strengthening Election Cybersecurity to Uphold Respect for Elections through Independent Testing Act of 2024</short-title></quote> or the <quote><short-title>SECURE IT Act of 2024</short-title></quote>.</text></subsection><subsection id="idd33c1a6b7f9247b8b28ea2751dc41160"><enum>(b)</enum><header>Requiring penetration testing as part of the testing and certification of voting systems</header><text>Section 231 of the Help America Vote Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/52/20971">52 U.S.C. 20971</external-xref>) is amended by adding at the end the following new subsection:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id3da9642579a74c36bab8480b1a4689dc"><subsection id="id6bddacad979a4422ba41394dbf52b3c5"><enum>(e)</enum><header>Required penetration testing</header><paragraph id="idefa6a9b06c0c4cc998ad2d4049438b8b"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this subsection, the Commission shall provide for the conduct of penetration testing as part of the testing, certification, decertification, and recertification of voting system hardware and software by the Commission based on accredited laboratories under this section.</text></paragraph><paragraph id="id38a4af66fc41464a89212f498782883a"><enum>(2)</enum><header>Accreditation</header><text>The Commission shall develop a program for the acceptance of the results of penetration testing on election systems. The penetration testing required by this subsection shall be required for Commission certification. The Commission shall vote on the selection of any entity identified. The requirements for such selection shall be based on consideration of an entity's competence to conduct penetration testing under this subsection. The Commission may consult with the National Institute of Standards and Technology or any other appropriate Federal agency on lab selection criteria and other aspects of this program.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idabde9647465a4752ae29dc13dd7f5e75"><enum>(c)</enum><header>Independent security testing and coordinated cybersecurity vulnerability disclosure program for election systems</header><paragraph id="id29207105a4874d299e134190afa02e5a"><enum>(1)</enum><header>In general</header><text>Subtitle D of title II of the Help America Vote Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/42/15401">42 U.S.C. 15401 et seq.</external-xref>) is amended by adding at the end the following new part:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id2b015a3d7dae4c239f6f714d80321e14"><part id="id7de1f7db624d455aa802348a424ec326"><enum>7<?LEXA-Enum 7?></enum><header>Independent security testing and coordinated cybersecurity vulnerability disclosure pilot program for election systems</header><section id="id79cbac1b6ceb445cba03357aacdb7c54"><enum>297.</enum><header>Independent security testing and coordinated cybersecurity vulnerability disclosure pilot program for election systems</header><subsection id="idbcef73b0e1234463a5b7da2fbbbbd42e"><enum>(a)</enum><header>In general</header><paragraph id="idfd45c5ee6019482ea5caaf365174b557"><enum>(1)</enum><header>Establishment</header><text>The Commission, in consultation with the Secretary, shall establish an Independent Security Testing and Coordinated Vulnerability Disclosure Pilot Program for Election Systems (VDP–E) (in this section referred to as the <quote>program</quote>) to test for and disclose cybersecurity vulnerabilities in election systems.</text></paragraph><paragraph id="id8c92e8413955423e882c65352ac0f67b"><enum>(2)</enum><header>Duration</header><text>The program shall be conducted for a period of 5 years.</text></paragraph><paragraph id="ida08ad7a3eedd4f4bbd0f03aaef1c9ffa"><enum>(3)</enum><header>Requirements</header><text>In carrying out the program, the Commission, in consultation with the Secretary, shall—</text><subparagraph id="id9143d89406ef4e6fbac7aa06422f3912"><enum>(A)</enum><text>establish a mechanism by which an election systems vendor may make their election system (including voting machines and source code) available to cybersecurity researchers participating in the program;</text></subparagraph><subparagraph id="ide47203fb5a114be1a344527dcfe30692"><enum>(B)</enum><text>provide for the vetting of cybersecurity researchers prior to their participation in the program, including the conduct of background checks;</text></subparagraph><subparagraph id="idfda6db0d03d94e60a95a95344e1bdd6a"><enum>(C)</enum><text>establish terms of participation that—</text><clause id="id14c06dba6dbe464783d13ec1a7aabfc7"><enum>(i)</enum><text>describe the scope of testing permitted under the program;</text></clause><clause id="idfb9e2fe29fad4a1789189c39e8732faa"><enum>(ii)</enum><text>require researchers to—</text><subclause id="id23b2a15223bf4098b3ea0aa46e3b8a32"><enum>(I)</enum><text>notify the vendor, the Commission, and the Secretary of any cybersecurity vulnerability they identify with respect to an election system; and</text></subclause><subclause id="ide5f5b40e718e4f37940b5c85d2fd01d1"><enum>(II)</enum><text>otherwise keep such vulnerability confidential for 180 days after such notification;</text></subclause></clause><clause id="idbbe0d38a496a44f4acbb01a86b7c5efa"><enum>(iii)</enum><text>require the good faith participation of all participants in the program;</text></clause><clause id="idb56e4b0de9384fadbd2107e131f4b7a6"><enum>(iv)</enum><text>require an election system vendor, within 180 days after validating notification of a critical or high vulnerability (as defined by the National Institute of Standards and Technology) in an election system of the vendor, to—</text><subclause id="idaf680252f603483091c56d4aeee757fa"><enum>(I)</enum><text>send a patch or propound some other fix or mitigation for such vulnerability to the appropriate State and local election officials, in consultation with the researcher who discovered it; and</text></subclause><subclause id="idc5c75d52cdd144ca8289784be6d703ae"><enum>(II)</enum><text>notify the Commission and the Secretary that such patch has been sent to such officials;</text></subclause></clause></subparagraph><subparagraph id="id8d726443aaee4c36956bbf432d5629e3"><enum>(D)</enum><text>in the case where a patch or fix to address a vulnerability disclosed under subparagraph (C)(ii)(I) is intended to be applied to a system certified by the Commission, provide—</text><clause id="idcd572ce7a4394c6abc52224d2fac4fe2"><enum>(i)</enum><text>for the expedited review of such patch or fix within 90 days after receipt by the Commission; and</text></clause><clause id="id0d10353e5bd846359f3356f22a142664"><enum>(ii)</enum><text>if such review is not completed by the last day of such 90-day period, that such patch or fix shall be deemed to be certified by the Commission, subject to any subsequent review of such determination by the Commission; and</text></clause></subparagraph><subparagraph id="idefb77203c78c4cf1b3762ed439f46aa6"><enum>(E)</enum><text>180 days after the disclosure of a vulnerability under subparagraph (C)(ii)(I), notify the Director of the Cybersecurity and Infrastructure Security Agency of the vulnerability for inclusion in the database of Common Vulnerabilities and Exposures.</text></subparagraph></paragraph><paragraph id="id071f2e768e194e32b99852bb113b571d"><enum>(4)</enum><header>Voluntary participation; safe harbor</header><subparagraph id="id40978981b54b4d05a90970be58e93fc0"><enum>(A)</enum><header>Voluntary participation</header><text>Participation in the program shall be voluntary for election systems vendors and researchers.</text></subparagraph><subparagraph id="id7873c6eda94a4094b022bd3edf3e9eb8"><enum>(B)</enum><header>Safe harbor</header><text>When conducting research under this program, such research and subsequent publication shall be—</text><clause id="id724ea4f9d79a46679b92873fc3fe66a4"><enum>(i)</enum><text>authorized in accordance with section 1030 of title 18, United States Code (commonly known as the <quote>Computer Fraud and Abuse Act</quote>), (and similar State laws), and the election system vendor will not initiate or support legal action against the researcher for accidental, good faith violations of the program; and</text></clause><clause id="idc02b2e10a4174107a09b7426a40e0b42"><enum>(ii)</enum><text>exempt from the anti-circumvention rule of section 1201 of title 17, United States Code (commonly known as the <quote>Digital Millennium Copyright Act</quote>), and the election system vendor will not bring a claim against a researcher for circumvention of technology controls.</text></clause></subparagraph><subparagraph id="id33da9e28ffc940d59b2c0b34e4f5e90d"><enum>(C)</enum><header>Rule of construction</header><text>Nothing in this paragraph may be construed to limit or otherwise affect any exception to the general prohibition against the circumvention of technological measures under subparagraph (A) of section 1201(a)(1) of title 17, United States Code, including with respect to any use that is excepted from that general prohibition by the Librarian of Congress under subparagraphs (B) through (D) of such section 1201(a)(1).</text></subparagraph></paragraph><paragraph id="ida4f9ac33957e41d58af06d1c21308eca"><enum>(5)</enum><header>Definitions</header><text>In this subsection:</text><subparagraph id="id43d19d15980340d6911155885e86e686"><enum>(A)</enum><header>Cybersecurity vulnerability</header><text>The term <term>cybersecurity vulnerability</term> means, with respect to an election system, any security vulnerability that affects the election system.</text></subparagraph><subparagraph id="idf62a00b8d4784408ba6454c349798407"><enum>(B)</enum><header>Election infrastructure</header><text>The term <term>election infrastructure</term> means—</text><clause id="id5ff2c64b4dfb47bab2c5ffcc0297390a"><enum>(i)</enum><text>storage facilities, polling places, and centralized vote tabulation locations used to support the administration of elections for public office; and</text></clause><clause id="idd5b8d772b69b4c7a810e4fccf7fe9850"><enum>(ii)</enum><text>related information and communications technology, including—</text><subclause id="iddd3699b5734e446e8bec15753e1faf69"><enum>(I)</enum><text>voter registration databases;</text></subclause><subclause id="id42485ea869124230b25d6444c2590111"><enum>(II)</enum><text>election management systems;</text></subclause><subclause id="ida6019a424d984175bc859efd9e10bef8"><enum>(III)</enum><text>voting machines;</text></subclause><subclause id="id20ac95d34a1b4e4897b9d6c1f41c1efc"><enum>(IV)</enum><text>electronic mail and other communications systems (including electronic mail and other systems of vendors who have entered into contracts with election agencies to support the administration of elections, manage the election process, and report and display election results); and</text></subclause><subclause id="id1b407197da574d2c9cd1760e624319c1"><enum>(V)</enum><text>other systems used to manage the election process and to report and display election results on behalf of an election agency.</text></subclause></clause></subparagraph><subparagraph id="id8eb5107aefd14560910f13fc8cbd59e2"><enum>(C)</enum><header>Election system</header><text>The term <term>election system</term> means any information system that is part of an election infrastructure, including any related information and communications technology described in subparagraph (B)(ii).</text></subparagraph><subparagraph id="idc0e44e257a014ceb9adb06ade576cd1d"><enum>(D)</enum><header>Election system vendor</header><text>The term <term>election system vendor</term> means any person providing, supporting, or maintaining an election system on behalf of a State or local election official.</text></subparagraph><subparagraph id="id24a5f690d8e043219dd41f24560c0070"><enum>(E)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given the term in section 3502 of title 44, United States Code.</text></subparagraph><subparagraph id="idbe91f1d1e76b4ebc99bc66d308c8b53a"><enum>(F)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Homeland Security.</text></subparagraph><subparagraph id="idc0d93562fe7c431e83fc68fab18c4cc0"><enum>(G)</enum><header>Security vulnerability</header><text>The term <term>security vulnerability</term> has the meaning given the term in section 102 of the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></subparagraph></paragraph></subsection></section></part><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="idf94cbc9584bd436e9281ca89c1a28415"><enum>(2)</enum><header>Clerical amendment</header><text>The table of contents of such Act is amended by adding at the end of the items relating to subtitle D of title II the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id31D32282AE754BDEBB79F6D18A08DDC0"><toc><toc-entry level="part" bold="off">PART 7—Independent security testing and coordinated cybersecurity vulnerability disclosure program for election systems</toc-entry></toc><toc><toc-entry level="section" bold="off">Sec. 297. Independent security testing and coordinated cybersecurity vulnerability disclosure program for election systems.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id262f8ac4fd314e86988f484a306457f5"><enum>1204.</enum><header>Privacy and Civil Liberties Oversight Board qualifications</header><text display-inline="no-display-inline">Section 1061(h)(2) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/42/2000ee">42 U.S.C. 2000ee(h)(2)</external-xref>) is amended by striking <quote>and relevant experience</quote> and inserting <quote>or experience in positions requiring a security clearance, and relevant national security experience</quote>.</text></section><section id="id25407713E6C147D993BA800586104CF9"><enum>1205.</enum><header>Parity in pay for staff of the Privacy and Civil Liberties Oversight Board and the intelligence community</header><text display-inline="no-display-inline">Section 1061(j)(1) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/42/2000ee">42 U.S.C. 2000ee(j)(1)</external-xref>) is amended by striking <quote>except that</quote> and all that follows through the period at the end and inserting <quote>except that no rate of pay fixed under this subsection may exceed the highest amount paid by any element of the intelligence community for a comparable position, based on salary information provided to the chairman of the Board by the Director of National Intelligence.</quote>. </text></section><section id="id916c3c1114dc4b598c43ee06da3c28af"><enum>1206.</enum><header>Modification and repeal of reporting requirements</header><subsection id="id3cfae6fe226f4c8388e5f9d999182aa0"><enum>(a)</enum><header>Briefing on Iranian expenditures supporting foreign military and terrorist activities</header><text>Section 6705(a)(1) of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/22/9412">22 U.S.C. 9412(a)(1)</external-xref>) is amended by striking <quote>, and not less frequently than once each year thereafter provide a briefing to Congress,</quote>.</text></subsection><subsection id="id9c743d0dd69f47ff91bfbe4b63ef1642"><enum>(b)</enum><header>Reports and briefings on national security effects of global water insecurity and emerging infectious diseases and pandemics</header><text>Section 6722(b) of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024</external-xref> note; division E of <external-xref legal-doc="public-law" parsable-cite="pl/116/92">Public Law 116–92</external-xref>) is amended by—</text><paragraph id="id3ac3ec1fc3464fe0b13b27f7afef1fab"><enum>(1)</enum><text>striking paragraph (2); and</text></paragraph><paragraph id="id55886db7a5b0469ba15fc2bde6e454b0"><enum>(2)</enum><text>redesignating paragraphs (3) and (4) as paragraphs (2) and (3), respectively.</text></paragraph></subsection><subsection id="idc36e0be2379044648fb187b9f2a35c68"><enum>(c)</enum><header>Repeal of report on removal of satellites and related items from the United States munitions list</header><text>Section 1261(e) of the National Defense Authorization Act for Fiscal Year 2013 (<external-xref legal-doc="usc" parsable-cite="usc/22/2778">22 U.S.C. 2778</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/112/239">Public Law 112–239</external-xref>) is repealed.</text></subsection><subsection id="id9a12bc0a427b4414945c4a15b4d4f11b"><enum>(d)</enum><header>Briefing on review of intelligence community analytic production</header><text>Section 1019(c) of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/50/3364">50 U.S.C. 3364(c)</external-xref>) is amended by striking <quote>December 1</quote> and inserting <quote>February 1</quote>.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idb08776c5a6674c338a6d49368f4a6d98"><enum>(e)</enum><header>Repeal of report on oversight of foreign influence in academia</header><text>Section 5713 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3369b">50 U.S.C. 3369b</external-xref>) is repealed.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idaffaa75399424e3ba0922dc59a8eab40"><enum>(f)</enum><header>Repeal of briefing on Iranian expenditures supporting foreign military and terrorist activities</header><text>Section 6705 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/22/9412">22 U.S.C. 9412</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id95248bfca8794b4f84e3c10d9f88c9db"><enum>(1)</enum><text>by striking subsection (b); </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ide731e97313a14621b3bb5fb4935c7344"><enum>(2)</enum><text>by striking the enumerator and heading for subsection (a);</text></paragraph><paragraph id="idb7f3cf04b0aa4aedb7a3d19fc24e59a8"><enum>(3)</enum><text>by redesignating paragraphs (1) and (2) as subsections (a) and (b), respectively, and moving such subsections, as so redesignated, 2 ems to the left; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1aa6f41e52a34d6aa189ea21e06d79a1"><enum>(4)</enum><text>in subsection (a), as so redesignated, by redesignating subparagraphs (A) and (B) as paragraphs (1) and (2), respectively, and moving such paragraphs, as so redesignated, 2 ems to the left; and</text></paragraph><paragraph id="id9e2ec6f3d5154f20a3b57ee55f633f50"><enum>(5)</enum><text>in paragraph (1), as so redesignated, by redesignating clauses (i) through (v) as subparagraphs (A) through (E), respectively, and moving such subparagraphs, as so redesignated, 2 ems to the left.</text></paragraph></subsection><subsection id="id5e0f51a1d5fa45aca6b4d99118d28aef"><enum>(g)</enum><header>Repeal of report on foreign investment risks</header><text>Section 6716 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3370a">50 U.S.C. 3370a</external-xref>) is repealed.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idbd3ec180f2044300882eb28e00784bec"><enum>(h)</enum><header>Repeal of report on intelligence community loan repayment programs</header><text>Section 6725(c) of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334g">50 U.S.C. 3334g(c)</external-xref>) is repealed.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id8c1c03a55c99408cbde982b5639f4db0"><enum>(i)</enum><header>Repeal of report on data collection on attrition in intelligence community</header><text>Section 306(c) of the Intelligence Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334h">50 U.S.C. 3334h(c)</external-xref>) is repealed.</text></subsection></section><section id="idbdfdddbe06ed4afcbf10bec8c6cc696e"><enum>1207.</enum><header>Technical amendments</header><subsection id="id251526ddb64a47dbb24ca2965f07e1fb"><enum>(a)</enum><header>Requirements relating to construction of facilities to be used primarily by intelligence community</header><text>Section 602(a) of the Intelligence Authorization Act for Fiscal Year 1995 (<external-xref legal-doc="usc" parsable-cite="usc/50/3304">50 U.S.C. 3304(a)</external-xref>) is amended—</text><paragraph id="id20a5e5972aaf4c1f9f3bd0b082e2f528"><enum>(1)</enum><text>in paragraph (1), by striking <quote>$6,000,000</quote> and inserting <quote>$9,000,000</quote>; and</text></paragraph><paragraph id="id5aed98d2cc7c4895b27400a15c42c604"><enum>(2)</enum><text>in paragraph (2)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id61bbe1d05f7d4cdd9a419133915e6f8c"><enum>(A)</enum><text display-inline="yes-display-inline">by striking <quote>$2,000,000</quote> each place it appears and inserting <quote>$4,000,000</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id969a4fb84e234a7f949d3f738077a1ba"><enum>(B)</enum><text display-inline="yes-display-inline">by striking <quote>$6,000,000</quote> and inserting <quote>$9,000,000</quote>.</text></subparagraph></paragraph></subsection><subsection id="id4076a686e94a4b1398e9967e6c7abc10"><enum>(b)</enum><header>Copyright protection for civilian faculty of certain accredited institutions</header><text>Section 105 of title 17, United States Code, is amended to read as follows:</text><quoted-block id="id30209e1f28ad417dafb3fb8158398007" display-inline="no-display-inline" style="USC"><section id="id0e27d97b823a4139867b6967d11dfb41"><enum>105.</enum><header>Subject matter of copyright: United States Government works</header><subsection commented="no" display-inline="no-display-inline" id="idaa10ef0afff34a6ba7e846d6107a0dc0"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text>Copyright protection under this title is not available for any work of the United States Government, but the United States Government is not precluded from receiving and holding copyrights transferred to it by assignment, bequest, or otherwise.</text></subsection><subsection id="idb663665456944de8ae43777cd2dc4180"><enum>(b)</enum><header>Copyright protection of certain works</header><text>Subject to subsection (c), the covered author of a covered work owns the copyright to that covered work.</text></subsection><subsection id="id143453967b9e4ca18375e0760ccebf04"><enum>(c)</enum><header>Use by Federal Government</header><paragraph id="id1daed60c9c3d4494b475c92fe2505877"><enum>(1)</enum><header>Secretary of Defense authority</header><text>With respect to a covered author who produces a covered work in the course of employment at a covered institution described in subparagraphs (A) through (K) of subsection (d)(2), the Secretary of Defense may direct the covered author to provide the Federal Government with an irrevocable, royalty-free, worldwide, nonexclusive license to reproduce, distribute, perform, or display such covered work for purposes of the United States Government.</text></paragraph><paragraph id="idd1839b5f646943b6af822ebc64d90056"><enum>(2)</enum><header>Secretary of Homeland Security authority</header><text>With respect to a covered author who produces a covered work in the course of employment at the covered institution described in subsection (d)(2)(L), the Secretary of Homeland Security may direct the covered author to provide the Federal Government with an irrevocable, royalty-free, worldwide, nonexclusive license to reproduce, distribute, perform, or display such covered work for purposes of the United States Government.</text></paragraph><paragraph id="id354fcebba3af4b1b841aeb5442a13ec5"><enum>(3)</enum><header>Director of National Intelligence authority</header><text>With respect to a covered author who produces a covered work in the course of employment at the covered institution described in subsection (d)(2)(M), the Director of National Intelligence may direct the covered author to provide the Federal Government with an irrevocable, royalty-free, worldwide, nonexclusive license to reproduce, distribute, perform, or display such covered work for purposes of the United States Government.</text></paragraph><paragraph id="id16c1ecd5c3554b09b218edc13d06d72a"><enum>(4)</enum><header>Secretary of Transportation authority</header><text>With respect to a covered author who produces a covered work in the course of employment at the covered institution described in subsection (d)(2)(N), the Secretary of Transportation may direct the covered author to provide the Federal Government with an irrevocable, royalty-free, worldwide, nonexclusive license to reproduce, distribute, perform, or display such covered work for purposes of the United States Government.</text></paragraph></subsection><subsection id="ide8a9492633ee41068719526c2d0af0cb"><enum>(d)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id62988d5169d54cf489b24a59cf757f0d"><enum>(1)</enum><header>Covered author</header><text>The term <term>covered author</term> means a civilian member of the faculty of a covered institution.</text></paragraph><paragraph id="idf3d90e0ae74a4baa981637710b54dc20"><enum>(2)</enum><header>Covered institution</header><text>The term <term>covered institution</term> means the following:</text><subparagraph id="ida4cd8183b55b4dcdb8b8c6cb0163626a"><enum>(A)</enum><text>National Defense University.</text></subparagraph><subparagraph id="idb68b4f5652f84c0a87326a9ce2481f9e"><enum>(B)</enum><text>United States Military Academy.</text></subparagraph><subparagraph id="id4b7296d0c75a4000b18ba1def2ce7cde"><enum>(C)</enum><text>Army War College.</text></subparagraph><subparagraph id="id204bff03558a4ca0bb1bf3fc804778cf"><enum>(D)</enum><text>United States Army Command and General Staff College.</text></subparagraph><subparagraph id="id184fd183f83c421b88ef7bd537d42c8f"><enum>(E)</enum><text>United States Naval Academy.</text></subparagraph><subparagraph id="id745574a06c254e0498dee1fa6e58b4cd"><enum>(F)</enum><text>Naval War College.</text></subparagraph><subparagraph id="id9e88b0c669ad494ab5c5d38692ef7151"><enum>(G)</enum><text>Naval Postgraduate School.</text></subparagraph><subparagraph id="id3953f7ed04e64eea8fa76c5ca95de901"><enum>(H)</enum><text>Marine Corps University.</text></subparagraph><subparagraph id="idfb9490652dcb4e4cad661624588b8203"><enum>(I)</enum><text>United States Air Force Academy.</text></subparagraph><subparagraph id="id312cf910d5d24bb581502485c0a93d04"><enum>(J)</enum><text>Air University.</text></subparagraph><subparagraph id="id1865ed4a9f07420598c33f19bad8db13"><enum>(K)</enum><text>Defense Language Institute.</text></subparagraph><subparagraph id="idc6c89a03b95b4469a5ed54ec0868929c"><enum>(L)</enum><text>United States Coast Guard Academy.</text></subparagraph><subparagraph id="idf7e01635063348d5a38d47aa4c310fb6"><enum>(M)</enum><text>National Intelligence University.</text></subparagraph><subparagraph id="idf9f6fa99be1d47e2a4e6a122121b4eb1"><enum>(N)</enum><text>United States Merchant Marine Academy.</text></subparagraph></paragraph><paragraph id="ide0d712b0a9834113a9bdc2ee9f2d8ff2" commented="no" display-inline="no-display-inline"><enum>(3)</enum><header>Covered work</header><text>The term <term>covered work</term> means a literary work produced by a covered author in the course of employment at a covered institution for publication by a scholarly press or journal.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section></title></legis-body><endorsement><action-date date="20240603">June 3, 2024</action-date><action-desc>Reported the following original bill; which was read twice and placed on the calendar</action-desc></endorsement></bill> 

