<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Placed-on-Calendar-Senate" dms-id="A1" public-private="public" slc-id="S1-CAN26562-6SL-33-2P0"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>119 S4615 PCS: Intelligence Authorization Act for Fiscal Year 2027</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2025-05-20</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><calendar>Calendar No. 420</calendar><congress>119th CONGRESS</congress><session>2d Session</session><legis-num>S. 4615</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20250520">May 20, 2026</action-date><action-desc><sponsor name-id="S374">Mr. Cotton</sponsor>, from the <committee-name committee-id="SLIN00">Select Committee on Intelligence</committee-name>, reported the following original bill; which was read twice and placed on the calendar</action-desc></action><legis-type>A BILL</legis-type><official-title>To authorize appropriations for fiscal year 2027 for intelligence and intelligence-related activities of the United States Government, the Intelligence Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes.</official-title></form><legis-body><section id="id2dcc018e93284010aea7fa3d17c303a4" section-type="section-one"><enum>1.</enum><header>Short title; table of contents</header><subsection commented="no" display-inline="no-display-inline" id="id89b5ed9b8ac043c0a8ec79f4fbd7f4c3"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Intelligence Authorization Act for Fiscal Year 2027</short-title></quote>.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id26f5421a345f4e9eb3ce9165cfa7ae6e"><enum>(b)</enum><header>Table of contents</header><text>The table of contents for this Act is as follows:</text><toc><toc-entry level="section" idref="id2dcc018e93284010aea7fa3d17c303a4">Sec. 1. Short title; table of contents.</toc-entry><toc-entry level="section" idref="HDEBA88C4C9224B639D37B2BF0B5EE0D9">Sec. 2. Definitions.</toc-entry><toc-entry level="title" idref="idd0efadbe16334b8aabb41f68f7679691">TITLE I—Intelligence activities</toc-entry><toc-entry level="section" idref="HC4C024E7DCBB4402940B0177F2F43356">Sec. 101. Authorization of appropriations.</toc-entry><toc-entry level="section" idref="HA95BC11DB0A24448910F9AA770957986">Sec. 102. Classified Schedule of Authorizations.</toc-entry><toc-entry level="section" idref="H692FEA0C6BD5415F98D109012804658B">Sec. 103. Intelligence Community Management Account.</toc-entry><toc-entry level="section" idref="HB083673E36534422907D4F486CD827C2">Sec. 104. Increase in employee compensation and benefits authorized by law.</toc-entry><toc-entry level="title" idref="id8362f381719e4b6f83ae363520317b8e">TITLE II—Central Intelligence Agency retirement and disability system</toc-entry><toc-entry level="section" idref="H44FFC8AAFA5F493A9CB25523C8E49D95">Sec. 201. Authorization of appropriations.</toc-entry><toc-entry level="title" idref="idfa18c1202d974ecaa723e0848f16f460">TITLE III—Matters relating to the Office of the Director of National Intelligence</toc-entry><toc-entry level="section" idref="id1f3f5cb44f0649a086d1fa72b99d0c32">Sec. 301. Appointment of Deputy Director of National Intelligence and Assistant Directors of National Intelligence.</toc-entry><toc-entry level="section" idref="idc8f791e5c6114f00bd40cecf5a880a2b">Sec. 302. Repeal of National Intelligence Management Council.</toc-entry><toc-entry level="section" idref="id5ed81760a08c438ea826b23992c4710a">Sec. 303. Repeal of various positions, units, centers, councils, and offices.</toc-entry><toc-entry level="section" idref="id8c1158fbc80b4bed9bb2eeab06945a0d">Sec. 304. Transfer of National Intelligence University.</toc-entry><toc-entry level="section" idref="id5e5929facb7947c0a62a98fa8a9ba64f">Sec. 305. Limitation on domestic activities at the National Counterterrorism Center.</toc-entry><toc-entry level="section" idref="id6ebe831162b94ec39b8cdd719d87d587">Sec. 306. Timely provision of security direction to intelligence community whistleblowers.</toc-entry><toc-entry level="section" idref="id8029f5a4ca8d460bbd0bff657d0c6ec7">Sec. 307. Notification of certain declassifications.</toc-entry><toc-entry level="section" idref="id9673ecb8a7974efc802c88d4d845f0be">Sec. 308. No police, subpoena, or law enforcement powers or internal security functions for Director of National Intelligence.</toc-entry><toc-entry level="title" idref="id4da2fad3f27a4427b4360f30e7071282">TITLE IV—Matters relating to the Central Intelligence Agency</toc-entry><toc-entry level="section" idref="idae42bb4cb4c94ed38aac63e9db843397">Sec. 401. Extension of Central Intelligence Agency authority regarding unmanned aircraft systems.</toc-entry><toc-entry level="section" idref="idc51b8bbc78ff48e0b4a80cb947e4b2df">Sec. 402. Higher Education Act of 1965 special rule.</toc-entry><toc-entry level="section" idref="id85426563e2784896b7cc23bd2c35a69c">Sec. 403. Modification relating to security personnel at certain installations.</toc-entry><toc-entry level="title" idref="id549aa3e8961f4455b61d21bc08680f3d">TITLE V—Matters relating to other elements of the intelligence community</toc-entry><toc-entry level="section" idref="idec998de84d734144a4b81a544ac91f88">Sec. 501. Authority of National Security Agency to correlate, evaluate, and disseminate certain intelligence.</toc-entry><toc-entry level="section" idref="idbb5fe1dce2324cab9e9bcdae45dbaa18">Sec. 502. Prohibition on availability of funds for relocation of Office of Intelligence and Analysis to certain facilities.</toc-entry><toc-entry level="section" idref="ida26585f874de4779b8cee9afcc2f4c2f">Sec. 503. Funds for foreign intelligence activities conducted with and by the National Reconnaissance Office.</toc-entry><toc-entry level="section" idref="id411ce9df36904c7e945e98f0f95d7ef9">Sec. 504. Modification of annual report on Federal Bureau of Investigation case data.</toc-entry><toc-entry level="section" idref="id758526923ebe4aa1b184dc5091cf5488">Sec. 505. Establishment of Office of Counterintelligence.</toc-entry><toc-entry level="section" idref="id184aac4d2bc9452ab58c60eac31c22ae">Sec. 506. Modification of responsibilities of Office of Intelligence and Analysis.</toc-entry><toc-entry level="section" idref="id5da542bb7f5640a087016088be3be44e">Sec. 507. Role of National Security Agency in collection and analysis of signals intelligence.</toc-entry><toc-entry level="title" idref="idc563b353b0da47b5a37e3e9cb8c988a7">TITLE VI—General intelligence community matters</toc-entry><toc-entry level="section" idref="idb6c942dd931e408f8785a41aecf78833">Sec. 601. Amendments to presidential appointments for intelligence community positions.</toc-entry><toc-entry level="section" idref="id343a59cf556b4a478ff03e7dd81572e8">Sec. 602. Procedures regarding dissemination of nonpublicly available information concerning United States persons.</toc-entry><toc-entry level="section" idref="id9fb1f454f33546dc958602bd26e53d0f">Sec. 603. Analytic standards for all-source intelligence products.</toc-entry><toc-entry level="section" idref="idb6cc0870f9ff4e08bac47fe497fffbf9">Sec. 604. Limitation on use of Intelligence Community Management Account funds for certain entities.</toc-entry><toc-entry level="section" idref="id3a27e93af5bc420fbfbfad3029dad889">Sec. 605. Ben Sasse Intelligence Community Technology Fellowship Program.</toc-entry><toc-entry level="section" idref="id775f1f882b6e47cd9750676e3862cb02">Sec. 606. Intelligence Community Counterintelligence Office at the Department of Commerce.</toc-entry><toc-entry level="section" idref="id1ef9a01a1d444980a0cc1ba10db2fadf">Sec. 607. Countering hostile foreign cyber actors as a national intelligence priority.</toc-entry><toc-entry level="section" idref="id6437a852e88c4ecabf8f6e30268cf625">Sec. 608. Notification of criminal referrals regarding current or former intelligence community employees.</toc-entry><toc-entry level="section" idref="id7254e508fa4340b38aa747304affb34f">Sec. 609. Modification of definitions in National Security Act of 1947 and scope of intelligence sharing responsibilities of Director of National Intelligence.</toc-entry><toc-entry level="section" idref="idd3bd052fb3bb4975a796bdf9568d5bd4">Sec. 610. Prohibition on intelligence community use of adversary unmanned ground vehicles.</toc-entry><toc-entry level="section" idref="id62e350ff9a044838b9189e9bfc1b05ad">Sec. 611. China-Taiwan Strategic Warning Task Force.</toc-entry><toc-entry level="section" idref="idedbf0214aba744e8a36585998eca1da9">Sec. 612. Limitations relating to Chinese products and services.</toc-entry><toc-entry level="section" idref="idd069045c8f0b4ad39697065028a2d44d">Sec. 613. Limitation on intelligence community support for offensive cyber operations conducted by nongovernmental entities.</toc-entry><toc-entry level="section" idref="id7bee78aa7a8c42d7aecc70ddaf1e48dd">Sec. 614. Biological intelligence activities of the intelligence community.</toc-entry><toc-entry level="section" idref="idf471336622bc44ffb713c348aa3502dc">Sec. 615. Prohibition on participation in prediction markets.</toc-entry><toc-entry level="section" idref="id6169a9e96df740dd901c7adcb41a0a4a">Sec. 616. Repeal of certain report and briefing requirements.</toc-entry><toc-entry level="section" idref="id6da323c8dd43494fad606801a4fea656">Sec. 617. Intelligence community personnel travel, allowances, and related expenses regulations.</toc-entry><toc-entry level="section" idref="idc9f519e569ed4501911225d5d6f2d6f2">Sec. 618. Prohibition on sending and receiving objects using entities owned or controlled by persons or governments of certain countries.</toc-entry><toc-entry level="section" idref="idFAEDD3EC0A3C4E58BD581F2D1ADB2FF2">Sec. 619. Enhancing intelligence cooperation in the Indo-Pacific region.</toc-entry><toc-entry level="section" idref="id7dda3f467a384a7b84f9db4b127564db">Sec. 620. Intelligence activities related to Ukraine.</toc-entry><toc-entry level="section" idref="ida964a5666aa941648ac08299dea64f13">Sec. 621. Requirements relating to intelligence sharing with countries of significant concern to the United States.</toc-entry><toc-entry level="section" idref="id5e415ea0f6344a03b0bba7730c82f923">Sec. 622. United States-Israel intelligence sharing enhancement.</toc-entry><toc-entry level="title" idref="id5922f6a36e12475482ddd2a8e9e7d3f8">TITLE VII—Artificial intelligence matters relating to the intelligence community</toc-entry><toc-entry level="section" idref="idf0666c6e9d094b70a70445b6c8bcb37b">Sec. 701. Artificial intelligence exploitation guard and intelligence sharing.</toc-entry><toc-entry level="section" idref="idace778dce4064af2ac977b151b19cee7">Sec. 702. Director of National Intelligence review of intelligence community use of artificial intelligence to support targeting.</toc-entry><toc-entry level="section" idref="iddcf63029480148b39c9dd725cbbb327b">Sec. 703. Improvements for artificial intelligence policies, standards, and guidance for intelligence community.</toc-entry><toc-entry level="section" idref="id418ce2c6f64440c8bba9e31e4216b9cb">Sec. 704. Additional functions and requirements of Artificial Intelligence Security Center.</toc-entry><toc-entry level="section" idref="id11b59871ec2945fd8a8a8e7c63d7b870">Sec. 705. Reports on novel uses of artificial intelligence technology.</toc-entry><toc-entry level="section" idref="id4432739542f84fa08935fd09e4f7bc46">Sec. 706. Clear labeling of artificial intelligence outputs for targeting workflows.</toc-entry><toc-entry level="section" idref="id51d8df191b14450b8d450d0fbc171cb8">Sec. 707. Research on use of artificial intelligence relating to inadvertent escalation.</toc-entry><toc-entry level="section" idref="idcd8b1197d67244348f8baf2319b4a679">Sec. 708. Research on interaction of adversarial artificial intelligence systems with intelligence community systems.</toc-entry><toc-entry level="section" idref="id1b563f612850421bbfcbb40a80cfe56f">Sec. 709. Proliferation assessments regarding the export of artificial intelligence-related technologies.</toc-entry><toc-entry level="section" idref="id6ef2ebaab34540e2b1e21ff95953e2b9">Sec. 710. Review of artificial intelligence security vulnerabilities under Vulnerabilities Equities Process.</toc-entry><toc-entry level="section" idref="idc924fd2d9cb04e45818d9c946cbe6ddb">Sec. 711. Prohibition on certain artificial intelligence models on intelligence community systems.</toc-entry><toc-entry level="title" idref="id6e76e419f73e4e1f95f1eb20487ed89a">TITLE VIII—Other matters</toc-entry><toc-entry level="section" idref="id14e5888effd64a17a939b35895ce0c70">Sec. 801. Modification to notification requirements for authorized and ordered departures.</toc-entry><toc-entry level="section" idref="id8fc4a200ce574d45b0e2432869e41a8b">Sec. 802. Identification of reallocable frequencies.</toc-entry><toc-entry level="section" idref="id96c0460ef2ea41ce8b213cfae3c4ea8a">Sec. 803. Protection of classified information relating to budget functions.</toc-entry><toc-entry level="section" idref="id2b3baf6bbe4a4c88bfe311468a0880c2">Sec. 804. Review by Committee on Foreign Investment in the United States of transactions in real estate near intelligence community facilities.</toc-entry><toc-entry level="section" idref="id0b7b5baf818e41f290770fedc91c7684">Sec. 805. Intelligence support to the U.S. International Development Finance Corporation.</toc-entry><toc-entry level="section" idref="id77125461e40f44a49d06010554ac481d">Sec. 806. Establishing processes and procedures for protecting Federal Reserve information.</toc-entry><toc-entry level="section" idref="idb86c9b9510464c0786e425131abe413c">Sec. 807. Amendments to prohibit payments to obtain national security information or approvals.</toc-entry><toc-entry level="section" idref="idde91db2ff0df467097d796b866eb6f9f">Sec. 808. Offenses involving espionage.</toc-entry><toc-entry level="section" idref="id450ae2b22cba4bdeac020c3c5c388893">Sec. 809. Parental bereavement leave.</toc-entry><toc-entry level="section" idref="id85ad961e32d04c3083461acb8edce688">Sec. 810. Definition of foreign instrumentality for purposes of economic espionage prohibition.</toc-entry><toc-entry level="section" idref="id287f1eea6d4f4b4c9e64cd33cc231583">Sec. 811. Protection of trade secrets.</toc-entry><toc-entry level="section" idref="ideb9ed560dbd349fca77b8ee84866167e">Sec. 812. Technical amendments.</toc-entry></toc></subsection></section><section id="HDEBA88C4C9224B639D37B2BF0B5EE0D9"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="H44EB32FB423045A28386F96967755E12"><enum>(1)</enum><header>Congressional intelligence committees</header><text>The term <term>congressional intelligence committees</term> has the meaning given such term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph id="HC6320838A75443C3B1798159B0F6705B" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Intelligence community</header><text>The term <term>intelligence community</term> has the meaning given such term in such section. </text></paragraph></section><title id="idd0efadbe16334b8aabb41f68f7679691" style="OLC"><enum>I</enum><header>Intelligence activities</header><section id="HC4C024E7DCBB4402940B0177F2F43356"><enum>101.</enum><header>Authorization of appropriations</header><text display-inline="no-display-inline">Funds are hereby authorized to be appropriated for fiscal year 2027 for the conduct of the intelligence and intelligence-related activities of the Federal Government.</text></section><section id="HA95BC11DB0A24448910F9AA770957986"><enum>102.</enum><header>Classified Schedule of Authorizations</header><subsection id="H3AE5EA905044497E81182B16EF082A47"><enum>(a)</enum><header>Specifications of amounts</header><text>The amounts authorized to be appropriated under section 101 for the conduct of the intelligence activities of the Federal Government are those specified in the classified Schedule of Authorizations prepared to accompany this Act.</text></subsection><subsection id="H58E142761B2044FBB092F8DD515CB2F9"><enum>(b)</enum><header>Availability of classified Schedule of Authorizations</header><paragraph id="H81D6B05CA94F4FFC9A4BEDA4771AD95C"><enum>(1)</enum><header>Availability</header><text>The classified Schedule of Authorizations referred to in subsection (a) shall be made available to the Committee on Appropriations of the Senate, the Committee on Appropriations of the House of Representatives, and to the President.</text></paragraph><paragraph id="H3527EA5B23F04CBA892F736E7D8189BE"><enum>(2)</enum><header>Distribution by the President</header><text>Subject to paragraph (3), the President shall provide for suitable distribution of the classified Schedule of Authorizations referred to in subsection (a), or of appropriate portions of such Schedule, within the executive branch of the Federal Government.</text></paragraph><paragraph id="H89C7AD3DD34A4BB29178327A6134D22D"><enum>(3)</enum><header>Limits on disclosure</header><text>The President shall not publicly disclose the classified Schedule of Authorizations or any portion of such Schedule except—</text><subparagraph id="HEBB99209F7D24AC3B453DD829768899A"><enum>(A)</enum><text>as provided in section 601(a) of the Implementing Recommendations of the 9/11 Commission Act of 2007 (<external-xref legal-doc="usc" parsable-cite="usc/50/3306">50 U.S.C. 3306(a)</external-xref>);</text></subparagraph><subparagraph id="H4FBCEF9716774E72972F54D3615F7B92"><enum>(B)</enum><text>to the extent necessary to implement the budget; or</text></subparagraph><subparagraph id="H0E7594FB4D604C628EFA08BADE262FD4"><enum>(C)</enum><text>as otherwise required by law.</text></subparagraph></paragraph></subsection></section><section id="H692FEA0C6BD5415F98D109012804658B"><enum>103.</enum><header>Intelligence Community Management Account</header><subsection id="H712E058050044510969F8B947DA3AEA8"><enum>(a)</enum><header>Authorization of appropriations</header><text display-inline="yes-display-inline">There is authorized to be appropriated for the Intelligence Community Management Account of the Director of National Intelligence for fiscal year 2027 the sum of $568,000,000.</text></subsection><subsection id="HDEC9400E5D0C489E85B6A8CEA87ECE2F" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Classified authorization of appropriations</header><text>In addition to amounts authorized to be appropriated for the Intelligence Community Management Account by subsection (a), there are authorized to be appropriated for the Intelligence Community Management Account for fiscal year 2027 such additional amounts as are specified in the classified Schedule of Authorizations referred to in section 102(a).</text></subsection></section><section id="HB083673E36534422907D4F486CD827C2" commented="no" display-inline="no-display-inline"><enum>104.</enum><header>Increase in employee compensation and benefits authorized by law</header><text display-inline="no-display-inline">Appropriations authorized by this Act for salary, pay, retirement, and other benefits for Federal employees may be increased by such additional or supplemental amounts as may be necessary for increases in such compensation or benefits authorized by law.</text></section></title><title style="OLC" commented="no" level-type="subsequent" id="id8362f381719e4b6f83ae363520317b8e"><enum>II</enum><header>Central Intelligence Agency retirement and disability system</header><section id="H44FFC8AAFA5F493A9CB25523C8E49D95" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>201.</enum><header>Authorization of appropriations</header><text display-inline="no-display-inline">There is authorized to be appropriated for the Central Intelligence Agency Retirement and Disability Fund $514,000,000 for fiscal year 2027.</text></section></title><title id="idfa18c1202d974ecaa723e0848f16f460" style="OLC"><enum>III</enum><header>Matters relating to the Office of the Director of National Intelligence</header><section commented="no" display-inline="no-display-inline" id="id1f3f5cb44f0649a086d1fa72b99d0c32"><enum>301.</enum><header>Appointment of Deputy Director of National Intelligence and Assistant Directors of National Intelligence</header><subsection commented="no" display-inline="no-display-inline" id="ida66f2845834a4266b32bf92d2f7f341d"><enum>(a)</enum><header>Redesignation of Principal Deputy Director of National Intelligence as Deputy Director of National Intelligence</header><paragraph commented="no" display-inline="no-display-inline" id="id0c7eeca623a945cda5d9f907343ea0cb"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Subsection (a) of section 103A of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3026">50 U.S.C. 3026</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id24e467fa40e3480aae48d23125f1edd4"><enum>(A)</enum><text>in the subsection heading, by striking <quote><header-in-text style="OLC" level="subsection">Principal</header-in-text></quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id560495bd2bab4b9bb112ac77dbfc2d97"><enum>(B)</enum><text>by striking <quote>Principal</quote> each place it appears.</text></subparagraph></paragraph><paragraph id="idb117a46b23554c978fa517362fdad75b"><enum>(2)</enum><header>Conforming amendments</header><text>Subsection (c) of such section is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="idf44a6d42c7894f1fa9236cd4a982f927"><enum>(A)</enum><text display-inline="yes-display-inline">in the subsection heading, by striking <quote><header-in-text style="OLC" level="subsection">Principal</header-in-text></quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id21476b72e11a42c3a1ee94df5b54d95b"><enum>(B)</enum><text>in paragraph (2)(B), by striking <quote>Principal</quote>.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8416fd8a2ca64b05b1f3ea5e50e38cc2"><enum>(3)</enum><header>Additional conforming amendment</header><subparagraph commented="no" display-inline="no-display-inline" id="id123ff04db2ed4e9089de72165eb57409"><enum>(A)</enum><header>National Security Act of 1947</header><text display-inline="yes-display-inline">Such Act is further amended—</text><clause commented="no" display-inline="no-display-inline" id="ide423abb97b4744b48e749aceaf6cff4a"><enum>(i)</enum><text display-inline="yes-display-inline">in section 103(c)(2) (<external-xref legal-doc="usc" parsable-cite="usc/50/3025">50 U.S.C. 3025(c)(2)</external-xref>), by striking <quote>Principal</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id2f876ec79e8c48c5850c36c88bedbb34"><enum>(ii)</enum><text>in section 103I(b)(1) (<external-xref legal-doc="usc" parsable-cite="usc/50/3034">50 U.S.C. 3034(b)(1)</external-xref>), by striking <quote>Principal</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id552adfbeb2b546c5b4f9f5869b14277f"><enum>(iii)</enum><text>in section 106(a)(2)(A) (<external-xref legal-doc="usc" parsable-cite="usc/50/3041">50 U.S.C. 3041(a)(2)(A)</external-xref>), by striking <quote>Principal</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id09666369a4444821b284494a77b2ac49"><enum>(iv)</enum><text>in section 116(b) (<external-xref legal-doc="usc" parsable-cite="usc/50/3053">50 U.S.C. 3053(b)</external-xref>), by striking <quote>Principal</quote>. </text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id83019803a6bd494a98288cb6db256f58"><enum>(B)</enum><header>Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020</header><text display-inline="yes-display-inline">Section 6310 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3351b">50 U.S.C. 3351b</external-xref>) is amended by striking <quote>Principal</quote> each place it appears.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf3d07978157c4c899f20d0e0b6a22110"><enum>(C)</enum><header>National Defense Authorization Act for Fiscal Year 2022</header><text>Section 1683(b)(3) of the National Defense Authorization Act for Fiscal Year 2022 (<external-xref legal-doc="usc" parsable-cite="usc/50/3373">50 U.S.C. 3373(b)(3)</external-xref>) is amended by striking <quote>Principal</quote> both places it appears.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id69b79ba2124547fda07c4ce880637c38"><enum>(b)</enum><header>Elimination of Deputy Directors of National Intelligence and establishment of Assistant Directors of National Intelligence</header><paragraph commented="no" display-inline="no-display-inline" id="id4d4c8453d9d84d8c856d278cf6e74e81"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Section 103A(b) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3026">50 U.S.C. 3026(b)</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="ide201bbaac7b140e98de4e50b9b178989"><enum>(A)</enum><text>in the subsection heading, by striking <quote><header-in-text style="OLC" level="subsection">Deputy</header-in-text></quote> and inserting <quote><header-in-text style="OLC" level="subsection">Assistant</header-in-text></quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id0650fd9d9f944ca4a4d1ec32bed119d8"><enum>(B)</enum><text display-inline="yes-display-inline">in paragraph (1), by striking <quote>may</quote> and all that follows through the period at the end and inserting the following: <quote>is an Assistant Director of National Intelligence for Mission Integration and an Assistant Director of National Intelligence for Policy and Capabilities, who shall be appointed by the Director of National Intelligence.</quote>; and</text></subparagraph><subparagraph id="id206019fa71ac4a72a45a2060357495bc"><enum>(C)</enum><text>in paragraph (2), by striking <quote>Deputy</quote> and inserting <quote>Assistant</quote>.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idb91a3e22dc2c4ca0a0cb68d39f364b36"><enum>(2)</enum><header>Conforming amendments</header><text>The National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id6a0e37012f3b4e0ea28ca57f3e9fb8b6"><enum>(A)</enum><text display-inline="yes-display-inline">in section 102A(l)(4)(F) (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024(l)(4)(F)</external-xref>), as redesignated by section 402(g)(1)(B), by striking <quote>a Deputy</quote> and inserting <quote>an Assistant</quote>; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id0f0c7922c3b14f11a9d226ab69eb04d1"><enum>(B)</enum><text>in section 103(c) (<external-xref legal-doc="usc" parsable-cite="usc/50/3025">50 U.S.C. 3025(c)</external-xref>), by striking paragraph (3). </text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id244c1f43146e4dbaa4106e29d433bea7"><enum>(c)</enum><header>References to Principal Deputy Director of National Intelligence in law</header><text>Any reference in law to the Principal Deputy Director of National Intelligence shall be treated as a reference to the Deputy Director of National Intelligence.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idc6431f795a834ff3b2f6c4008f8d32b1"><enum>(d)</enum><header>Clerical amendments</header><paragraph id="id4d0aaf729cdf4bdaa320f52bd8525b54"><enum>(1)</enum><header>Section heading</header><text>Section 103A of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/3026">50 U.S.C. 3026</external-xref>) is further amended, in the section heading, by striking <quote><header-in-text style="traditional" level="section">Deputy Directors of National Intelligence</header-in-text></quote> and inserting <quote><header-in-text style="traditional" level="section">Deputy Director of National Intelligence and Assistant Directors of National Intelligence</header-in-text></quote>.</text></paragraph><paragraph id="id917eb8d2a8654528bede2e8259995227"><enum>(2)</enum><header>Table of contents</header><text>The table of contents for such Act, in the matter preceding section 2 of such Act, is amended by striking the item relating to section 103A and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idaf02c5b48c6e487ea8ebdc8b67efd502"><toc><toc-entry level="section" bold="off">Sec. 103A. Deputy Director of National Intelligence and Assistant Directors of National Intelligence.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="idc8f791e5c6114f00bd40cecf5a880a2b"><enum>302.</enum><header>Repeal of National Intelligence Management Council</header><subsection commented="no" display-inline="no-display-inline" id="id90fd92f0037141fb92f4a68fe8a4bb64"><enum>(a)</enum><header>In general</header><text>Section 103M of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3034d">50 U.S.C. 3034d</external-xref>) is repealed. </text></subsection><subsection id="id4a9f1b03e4964c9a97869d85001e3308" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of such Act is amended by striking the item relating to section 103M. </text></subsection></section><section commented="no" display-inline="no-display-inline" id="id5ed81760a08c438ea826b23992c4710a"><enum>303.</enum><header>Repeal of various positions, units, centers, councils, and offices</header><subsection commented="no" display-inline="no-display-inline" id="ida7d81b53c7d84f0ca15b6b8064115aa8"><enum>(a)</enum><header>Intelligence Community Chief Data Officer</header><paragraph commented="no" display-inline="no-display-inline" id="id961204dea375463fba29e5d6fa10cb35"><enum>(1)</enum><header>Repeal</header><text>Title I of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3021">50 U.S.C. 3021 et seq.</external-xref>) is amended by striking section 103K (<external-xref legal-doc="usc" parsable-cite="usc/50/3034b">50 U.S.C. 3034b</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1ddf5f9acbc84ceea39c6b051603ec2d"><enum>(2)</enum><header>Conforming amendment</header><text>Section 103G of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/3032">50 U.S.C. 3032</external-xref>) is amended by striking subsection (d).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc948494415d04d57b58c993d15ccd1ac"><enum>(3)</enum><header>Clerical amendment</header><text>The table of contents for such Act in the matter preceding section 2 of such Act is amended by striking the item relating to section 103K.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idbc06f38f273642d1877dbddd9511f818"><enum>(b)</enum><header>Intelligence Community Innovation Unit</header><paragraph commented="no" display-inline="no-display-inline" id="id54f7483943c3411ca3d615cf80a034a3"><enum>(1)</enum><header display-inline="yes-display-inline">Termination</header><text>The Director of National Intelligence shall take such actions as may be necessary to terminate and wind down the operations of the Intelligence Community Innovation Unit before the date specified in paragraph (3).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida1607030faf543d1bcd1d6e4d2547e45"><enum>(2)</enum><header>Repeal</header><subparagraph commented="no" display-inline="no-display-inline" id="ide648bf12db0747c1904c7a6b5859b562"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Title I of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3021">50 U.S.C. 3021 et seq.</external-xref>) is further amended by striking section 103L (<external-xref legal-doc="usc" parsable-cite="usc/50/3034c">50 U.S.C. 3034c</external-xref>).</text></subparagraph><subparagraph id="ida54a42a602db46a28e59e39a7259d1ef" commented="no" display-inline="no-display-inline"><enum>(B)</enum><header>Clerical amendment</header><text>The table of contents for such Act, in the matter preceding section 2 of such Act, is further amended by striking the item relating to section 103L.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idee898a53996e459481ce5a5968de3ef2"><enum>(3)</enum><header>Effective date</header><text display-inline="yes-display-inline">The amendments made by this subsection shall take effect on the date that is 90 days after the date of the enactment of this Act.</text></paragraph></subsection><subsection id="id97938c5e331746368a16c779a7d286bc"><enum>(c)</enum><header>Technical amendment regarding expired climate security advisory council</header><paragraph commented="no" display-inline="no-display-inline" id="ide7be66d12f884ca2b51861a164c13f75"><enum>(1)</enum><header>Repeal</header><text display-inline="yes-display-inline">Title I of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3021">50 U.S.C. 3021 et seq.</external-xref>) is further amended by striking section 120 (<external-xref legal-doc="usc" parsable-cite="usc/50/3060">50 U.S.C. 3060</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1480c1bcad33497192786d72cf433caf"><enum>(2)</enum><header>Conforming amendment</header><text>Section 331 of the National Defense Authorization Act for Fiscal Year 2022 (<external-xref legal-doc="public-law" parsable-cite="pl/117/81">Public Law 117–81</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/10/113">10 U.S.C. 113</external-xref> note) is amended by striking paragraph (2) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id5aeff6e45ec1483f930f0763ed1a4b1e"><paragraph id="ida4d46d9a978c4cd3b2eae6573e23e7ca" commented="no"><enum>(2)</enum><text>The term <term>climate security</term> means the effects of climate change on the following: </text><subparagraph commented="no" display-inline="no-display-inline" id="id6465fce801b249e7889a8987601a077f"><enum>(A)</enum><text display-inline="yes-display-inline">The national security of the United States, including national security infrastructure. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id14ce61bec57347e2a085ece00b222c74"><enum>(B)</enum><text display-inline="yes-display-inline">Subnational, national, and regional political stability. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide7e56e9a68b0479dae96e0a16979d664"><enum>(C)</enum><text display-inline="yes-display-inline">The security of allies and partners of the United States. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5d700c8762fd46558d6e0f91bec72514"><enum>(D)</enum><text display-inline="yes-display-inline">Ongoing or potential political violence, including unrest, rioting, guerrilla warfare, insurgency, terrorism, rebellion, revolution, civil war, and interstate war.</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="id29cbdf0a95b74938b8950829a6fbb7ec" commented="no" display-inline="no-display-inline"><enum>(3)</enum><header>Clerical amendment</header><text>The table of contents for such Act, in the matter preceding section 2 of such Act, is further amended by striking the item relating to section 120.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idb81db5968db64965ba0dfe950ee9f55c"><enum>(d)</enum><header>Framework for cross-Disciplinary education and training</header><paragraph commented="no" display-inline="no-display-inline" id="id5fcd2000151248cba76964aac8a31832"><enum>(1)</enum><header>Repeal</header><text>Subtitle A of title X of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3191">50 U.S.C. 3191 et seq.</external-xref>) is amended by striking section 1002 (<external-xref legal-doc="usc" parsable-cite="usc/50/3192">50 U.S.C. 3192</external-xref>).</text></paragraph><paragraph id="id8aed8145d59b412f92157684d08de9a4" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Clerical amendment</header><text>The table of contents for such Act, in the matter preceding section 2 of such Act, is further amended by striking the item relating to section 1002.</text></paragraph></subsection><subsection id="idc1be5a6b889e48b2bb3e278578116e5e"><enum>(e)</enum><header>Foreign Languages Program</header><paragraph commented="no" display-inline="no-display-inline" id="iddbfa72ea2c6844188be11f66f2b0131e"><enum>(1)</enum><header display-inline="yes-display-inline">Termination</header><text>The Director of National Intelligence shall take such actions as may be necessary to terminate and wind down the operations of the Foreign Languages Program before the date specified in paragraph (5).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8aa8d1b6cb664443a12f39fcfbe881dc"><enum>(2)</enum><header>Repeals</header><text>Subtitle B of such title (<external-xref legal-doc="usc" parsable-cite="usc/50/3201">50 U.S.C. 3201 et seq.</external-xref>) is amended by striking sections 1011 (<external-xref legal-doc="usc" parsable-cite="usc/50/3201">50 U.S.C. 3201</external-xref>, relating to program on advancement of foreign languages critical to the intelligence community), 1012 (<external-xref legal-doc="usc" parsable-cite="usc/50/3202">50 U.S.C. 3202</external-xref>, relating to education partnerships), and 1013 (<external-xref legal-doc="usc" parsable-cite="usc/50/3203">50 U.S.C. 3203</external-xref>, relating to voluntary services).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id93211fd7b8f945f98ee9864732dbd856"><enum>(3)</enum><header>Conforming amendments</header><text>Such subtitle is further amended by striking sections 1014 (<external-xref legal-doc="usc" parsable-cite="usc/50/3204">50 U.S.C. 3204</external-xref>, relating to regulations) and 1015 (<external-xref legal-doc="usc" parsable-cite="usc/50/3205">50 U.S.C. 3205</external-xref>, relating to definitions).</text></paragraph><paragraph id="id955be7fd777c46c28eb84abba5615673" commented="no" display-inline="no-display-inline"><enum>(4)</enum><header>Clerical amendments</header><text>The table of contents for such Act, in the matter preceding section 2 of such Act, is further amended by striking the items relating to subtitle B of title X.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0dd21515302b40b7869c6f7b8f716d94"><enum>(5)</enum><header>Effective date</header><text display-inline="yes-display-inline">The amendments made by this subsection shall take effect on the date that is 90 days after the date of the enactment of this Act.</text></paragraph></subsection><subsection id="id4fbed182df29483cb2e2585ff33253ca"><enum>(f)</enum><header>Joint Intelligence Community Council</header><paragraph id="id3e18c5a52bc14daa8cdf01da4f5ef00e"><enum>(1)</enum><header>Termination</header><text>The Joint Intelligence Community Council is terminated.</text></paragraph><paragraph id="iddebf3a1c4b5d457d80a278502127a988"><enum>(2)</enum><header>Conforming amendment</header><text>Title I of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3021">50 U.S.C. 3021 et seq.</external-xref>) is amended by striking section 101A (<external-xref legal-doc="usc" parsable-cite="usc/50/3022">50 U.S.C. 3022</external-xref>).</text></paragraph><paragraph id="id652bdff49f4449449a29a3c6ecf928ba"><enum>(3)</enum><header>Repeal of requirement to consult with joint intelligence community council for national intelligence program budget</header><text>Section 102A(c)(1)(B) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024(c)(1)(B)</external-xref>) is amended by striking <quote>, as appropriate, after obtaining the advice of the Joint Intelligence Community Council,</quote>.</text></paragraph><paragraph id="id203c23eadbbc423ca56e8a438458d4a8" commented="no" display-inline="no-display-inline"><enum>(4)</enum><header>Clerical amendment</header><text>The table of contents for such Act in the matter preceding section 2 of such Act is amended by striking the item relating to section 101A.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="id8c1158fbc80b4bed9bb2eeab06945a0d"><enum>304.</enum><header>Transfer of National Intelligence University</header><subsection id="id76479176be9f4b1ba82e98a68b50aeed"><enum>(a)</enum><header>Transfer</header><text>The Director of National Intelligence shall transfer the functions of the National Intelligence University to the National Defense University described in section 2165 of title 10, United States Code.</text></subsection><subsection id="idfad9815a01aa4da29c64746a524ad409"><enum>(b)</enum><header>Repeal</header><text>Title X of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3191">50 U.S.C. 3191 et seq.</external-xref>) is amended by striking subtitle D (<external-xref legal-doc="usc" parsable-cite="usc/50/3227">50 U.S.C. 3227 et seq.</external-xref>).</text></subsection><subsection id="id7f4f2d1ae15d49b88c057622cb343f42"><enum>(c)</enum><header>Conforming amendments</header><paragraph id="id3194a35bcf4a48d884862df5f9c66192"><enum>(1)</enum><header>Title 10</header><text>Section 2151(b) of title 10, United States Code, is amended by striking paragraph (3).</text></paragraph><paragraph id="id7e813b8710594738a9ce70cd8eee6ebc"><enum>(2)</enum><header>Title 17</header><text>Section 105(d)(2) of title 17, United States Code, is amended—</text><subparagraph id="idf741846b2ec1408fbe5664b165ccd3f2"><enum>(A)</enum><text>by striking subparagraph (M); and</text></subparagraph><subparagraph id="id0fb79239ac934a80a0f4e2f0fef56268"><enum>(B)</enum><text>by redesignating subparagraph (N) as subparagraph (M).</text></subparagraph></paragraph><paragraph id="id17ed6a93b2f84a05a3eb2ecba249b635"><enum>(3)</enum><header>Damon paul nelson and matthew young pollard intelligence authorization act for fiscal years 2018, 2019, and 2020</header><text>The Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (division E of <external-xref legal-doc="public-law" parsable-cite="pl/116/92">Public Law 116–92</external-xref>) is amended by striking section 5324 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334a">50 U.S.C. 3334a</external-xref>).</text></paragraph></subsection><subsection id="idad37f03cba6e4427bb97a32ae023920a" commented="no" display-inline="no-display-inline"><enum>(d)</enum><header>Clerical amendment</header><text>The table of contents for the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3002">50 U.S.C. 3002 et seq.</external-xref>) is amended, in the matter preceding section 2 of such Act, by striking the items relating to subtitle D of title X.</text></subsection></section><section id="id5e5929facb7947c0a62a98fa8a9ba64f"><enum>305.</enum><header>Limitation on domestic activities at the National Counterterrorism Center</header><subsection id="idf565cb09fbd24a4bb6dad8bf9d626d9b"><enum>(a)</enum><header>Domestic counterterrorism intelligence</header><text>Subsection (e) of section 119 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3056">50 U.S.C. 3056</external-xref>) is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="iddb3d97d435e849c7ae0766f6aa98a6fb"><subsection id="idd8251a59425d4048aa787471e6152ce4"><enum>(e)</enum><header>Limitation on domestic activities</header><text>The Center may, consistent with applicable law, the direction of the President, and the guidelines referred to in section 102A(b), receive and retain intelligence pertaining to domestic terrorism (as defined in section 2331 of title 18, United States Code) to enable the Center to collect, retain, and disseminate intelligence pertaining only to international terrorism (as defined in section 2331 of title 18, United States Code).</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id6ebe831162b94ec39b8cdd719d87d587"><enum>306.</enum><header>Timely provision of security direction to intelligence community whistleblowers</header><subsection commented="no" display-inline="no-display-inline" id="ida57372a1088e45448139568b125a8243"><enum>(a)</enum><header display-inline="yes-display-inline">Intelligence community employees</header><text display-inline="yes-display-inline">Section 103H(k)(5)(D)(ii)(II) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3033">50 U.S.C. 3033(k)(5)(D)(ii)(II)</external-xref>) is amended by inserting <quote>, unless the Director does not provide such direction not later than 7 calendar days after the date on which the employee furnishes the statement required by subclause (I)</quote> after <quote>practices</quote>.</text></subsection><subsection id="idbfef2c2689ed4184bd86934f728b8f8b" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Central Intelligence Agency employees</header><text>Section 17(d)(5)(D)(ii)(II) of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3517">50 U.S.C. 3517(d)(5)(D)(ii)(II)</external-xref>) is amended by inserting <quote>, unless the Director does not provide such direction not later than 7 calendar days after the date on which the employee furnishes the statement required by subclause (I)</quote> after <quote>practices</quote>.</text></subsection></section><section id="id8029f5a4ca8d460bbd0bff657d0c6ec7"><enum>307.</enum><header>Notification of certain declassifications</header><subsection commented="no" display-inline="no-display-inline" id="id6719bcd8a49b4a34a2e55ec3587fae50"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Title VIII of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idccd27a8fc1ed4858873f117c53b99d1a"><section commented="no" display-inline="no-display-inline" id="ideb593f2d8c9d42d5bd499c66bf0f6c9b"><enum>806.</enum><header>Notification of certain declassifications</header><subsection id="idf51b8184ab394f16be787ab6f8b31849"><enum>(a)</enum><header>Notification to Congress by Director of National Intelligence</header><paragraph commented="no" display-inline="no-display-inline" id="id9a3be2745c864856887ef7d1e2917b89"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Immediately upon declassifying, downgrading, or directing the declassification or downgrading of information or intelligence relating to intelligence sources, methods, or activities pursuant to section 3.1(c) of Executive Order 13526 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref> note; relating to classified national security information), or any successor order, the Director of National Intelligence, or the Principal Deputy Director of National Intelligence, as delegated by the Director of National Intelligence, shall notify the congressional intelligence committees and the Archivist of the United States in writing of such declassification, downgrading, or direction.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id54b962e015f640e999a762cc429b36e2"><enum>(2)</enum><header>Contents</header><text display-inline="yes-display-inline">Each notification required by paragraph (1) shall include a copy of the information that has been, or has been directed to be, declassified or downgraded.</text></paragraph></subsection><subsection id="id89a313fdfa404cfea9e23c520edb7085"><enum>(b)</enum><header>Notification to Congress by agency head</header><paragraph commented="no" display-inline="no-display-inline" id="idedb152f69d674fbb9beab57b2ad2278e"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Immediately upon the declassification of information pursuant to section 3.1(d) of Executive Order 13526, or any successor order, the head, or senior official, of a relevant element of the intelligence community shall notify the congressional intelligence committees, the Committee on Homeland Security and Governmental Affairs of the Senate, the Committee on Oversight and Government Reform of the House of Representatives, and the Archivist of the United States in writing of such declassification.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idbeacfdc0e9314a35a1c27c889ab24fd4"><enum>(2)</enum><header>Contents</header><text display-inline="yes-display-inline">Each notification required by paragraph (1) shall include a copy of the information that has been declassified.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="HCE405C07BFBC4240B610756A82CECD8F"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>) is amended by inserting after the item relating to section 805 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="H891A8386951745139F113EA6A93736C2"><toc regeneration="no-regeneration"><toc-entry level="section">Sec. 806. Notification of certain declassifications.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id9673ecb8a7974efc802c88d4d845f0be"><enum>308.</enum><header>No police, subpoena, or law enforcement powers or internal security functions for Director of National Intelligence</header><text display-inline="no-display-inline">Section 102A of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9b6e2a68dd254e1eaabdf5a3d4a398f7"><subsection commented="no" display-inline="no-display-inline" id="id80fb9a8307f743a09512962d190bdb98"><enum>(z)</enum><header>No police, subpoena, or law enforcement powers or internal security functions</header><text>The Director of National Intelligence shall have no police, subpoena, or law enforcement powers or internal security functions.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></section></title><title id="id4da2fad3f27a4427b4360f30e7071282" style="OLC"><enum>IV</enum><header>Matters relating to the Central Intelligence Agency</header><section id="idae42bb4cb4c94ed38aac63e9db843397"><enum>401.</enum><header>Extension of Central Intelligence Agency authority regarding unmanned aircraft systems</header><text display-inline="no-display-inline">Section 15A(m) of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3515a">50 U.S.C. 3515a(m)</external-xref>) is amended by striking <quote>December 31, 2027</quote> and inserting <quote>the date set forth in section 210G(j)(1) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/124n">6 U.S.C. 124n(j)(1)</external-xref>)</quote>.</text></section><section id="idc51b8bbc78ff48e0b4a80cb947e4b2df"><enum>402.</enum><header>Higher Education Act of 1965 special rule</header><text display-inline="no-display-inline">Section 135 of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1015d">20 U.S.C. 1015d</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="ide723bd5db4fb46d89c1b8109f82e6c18"><enum>(1)</enum><text display-inline="yes-display-inline">by redesignating subsections (c) and (d) as subsections (d) and (e), respectively; and</text></paragraph><paragraph id="id0796945f124e48ee9cb7dbdee519e963"><enum>(2)</enum><text>by inserting after subsection (b) the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id01a5f034ca0c4f29b86fb242646a1b4a"><subsection id="id24819476c7974ce38f70ed34b4b02f6b"><enum>(c)</enum><header>Special rule</header><text>With respect to a member of a qualifying Federal service who is an officer or employee of an element of the intelligence community, the term <term>permanent duty station</term>, as used in this section, shall exclude a permanent duty station that is within 50 miles of the headquarters facility of such element.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="id85426563e2784896b7cc23bd2c35a69c" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>403.</enum><header>Modification relating to security personnel at certain installations</header><text display-inline="no-display-inline">Section 15(a)(1)(D) of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3515">50 U.S.C. 3515(a)(1)(D)</external-xref>) is amended by inserting <quote>or the National Reconnaissance Office</quote> after <quote>Office of the Director of National Intelligence</quote>. </text></section></title><title id="id549aa3e8961f4455b61d21bc08680f3d" style="OLC"><enum>V</enum><header>Matters relating to other elements of the intelligence community</header><section id="idec998de84d734144a4b81a544ac91f88"><enum>501.</enum><header>Authority of National Security Agency to correlate, evaluate, and disseminate certain intelligence</header><text display-inline="no-display-inline">The National Security Agency Act of 1959 (<external-xref legal-doc="usc" parsable-cite="usc/50/3601">50 U.S.C. 3601 et seq.</external-xref>) is amended by adding at the end the following: </text><quoted-block id="id8D26090AAC914802A4B3B1BD2D97C3B3" display-inline="no-display-inline" style="OLC" act-name=""><section id="idE0A0B0721BC54AEBA1C3173ADA074478"><enum>23.</enum><header>Authority to correlate, evaluate, and disseminate certain intelligence</header><text display-inline="no-display-inline">The Director of the National Security Agency may—</text><paragraph commented="no" display-inline="no-display-inline" id="id94d80619b5de463dbc1dc4d6689ef681"><enum>(1)</enum><text display-inline="yes-display-inline">correlate and evaluate intelligence related to national security; and </text></paragraph><paragraph id="idfc52533e63f04e92872bb3c8932ef275" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text display-inline="yes-display-inline">disseminate such intelligence to legislative and executive branch customers as the Director considers appropriate.</text></paragraph></section><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="idbb5fe1dce2324cab9e9bcdae45dbaa18"><enum>502.</enum><header>Prohibition on availability of funds for relocation of Office of Intelligence and Analysis to certain facilities</header><text display-inline="no-display-inline">None of the funds authorized to be appropriated by this Act or otherwise made available for fiscal year 2027 for the National Intelligence Program (as defined in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>)), may be obligated or expended to move or relocate the Office of Intelligence and Analysis of the Department of Homeland Security to any facility other than a facility owned by the Department of Homeland Security.</text></section><section id="ida26585f874de4779b8cee9afcc2f4c2f"><enum>503.</enum><header>Funds for foreign intelligence activities conducted with and by the National Reconnaissance Office</header><subsection commented="no" display-inline="no-display-inline" id="id7b6152a732b948d1b9040e40a81d5e76"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text>Subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/10/21">chapter 21</external-xref> of title 10, United States Code, is amended by inserting after <external-xref legal-doc="usc" parsable-cite="usc/10/421">section 421</external-xref> the following:</text><quoted-block id="id0A673D208A474B0E90169DF0AD10EDCB" style="USC" act-name=""><section id="id2CBF0A701BB04316A5BDE095A9A65D39"><enum>421a.<?LEXA-Enum 421a.?></enum><header>Funds for foreign intelligence activities conducted with and by the National Reconnaissance Office</header><subsection id="idcfa4b77a9bbc45a28ecea4288ba92f06"><enum>(a)</enum><header>Use of appropriated funds</header><text>The Director of the National Reconnaissance Office may use appropriated funds available to the National Reconnaissance Office for intelligence and communications purposes to pay for the expenses of arrangements with foreign countries for intelligence activities conducted with and by the National Reconnaissance Office.</text></subsection><subsection id="id37cba2bedbd74e48a0e5ad0374189969"><enum>(b)</enum><header>Use of funds other than appropriated funds</header><text>The Director of the National Reconnaissance Office may use funds other than appropriated funds to pay for the expenses of arrangements with foreign countries for intelligence activities conducted with and by the National Reconnaissance Office without regard for the provisions of law relating to the expenditure of United States Government funds, except that—</text><paragraph id="id3ec913e4b5244866b6df7306ba2b37aa"><enum>(1)</enum><text>no such funds may be expended, in whole or in part, by or for the benefit of the Department of Defense for a purpose for which Congress had previously denied funds;</text></paragraph><paragraph id="id5689b99f47c0423896f6b787bd570502"><enum>(2)</enum><text>proceeds from the sale of items or services may be used only to purchase replacement items similar to the items that are sold; and</text></paragraph><paragraph id="ida4466e6494c8410f886ec24d74fb66bf"><enum>(3)</enum><text>the authority provided by this subsection may not be used to acquire items or services for the principal benefit of the United States.</text></paragraph></subsection><subsection id="idb8064f578b814d1e926832cf57012f74"><enum>(c)</enum><header>Reports</header><paragraph commented="no" display-inline="no-display-inline" id="id1b6cc0e7b8024548b2a2dfdd8593f452"><enum>(1)</enum><header>Use of appropriated funds</header><text display-inline="yes-display-inline">Any funds expended under the authority of subsection (a) shall be reported, pursuant to the provisions of title V of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3091">50 U.S.C. 3091 et seq.</external-xref>), to—</text><subparagraph commented="no" display-inline="no-display-inline" id="id5732b02feb724ef0b0f6f8cef7a7db7e"><enum>(A)</enum><text display-inline="yes-display-inline">the Select Committee on Intelligence, the Committee on Armed Services, and the Subcommittee on Defense of the Committee on Appropriations of the Senate; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf6925a13be334598a24540e85a379ab3"><enum>(B)</enum><text display-inline="yes-display-inline">the Permanent Select Committee on Intelligence, the Committee on Armed Services, and the Subcommittee on Defense of the Committee on Appropriations of the House of Representatives.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id71d61bcaeae04484973c97a5686210d7"><enum>(2)</enum><header>Use of funds other than appropriated funds</header><text display-inline="yes-display-inline">Funds expended under the authority of subsection (b) shall be reported to the committees described in paragraph (1) pursuant to procedures jointly agreed upon by such committees and the Director of the National Reconnaissance Office.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id933aab7228ab41cbb5d4d30623b0d670"><enum>(b)</enum><header>Clerical amendment</header><text display-inline="yes-display-inline">The table of sections at the beginning of such subchapter is amended by inserting after the item relating to section 421 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1b1984709f074b289683f5af41c245f2"><toc><toc-entry level="section" bold="off">421a. Funds for foreign intelligence activities conducted with and by the National Reconnaissance Office.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id411ce9df36904c7e945e98f0f95d7ef9" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>504.</enum><header>Modification of annual report on Federal Bureau of Investigation case data</header><text display-inline="no-display-inline">Section 512A(b)(6) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3111a">50 U.S.C. 3111a(b)(6)</external-xref>) is amended by striking <quote>country affiliation</quote> and inserting <quote>terrorist organization</quote>. </text></section><section id="id758526923ebe4aa1b184dc5091cf5488"><enum>505.</enum><header>Establishment of Office of Counterintelligence</header><text display-inline="no-display-inline">Section 311 of title 31, United States Code, is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="ide33a62a8fb1b4c6a977e70c868572480"><enum>(1)</enum><text>in subsection (a)—</text><subparagraph commented="no" display-inline="no-display-inline" id="ideed28f1a60de470b9dd425a95841f4b4"><enum>(A)</enum><text>in paragraph (2), by striking <quote>; and</quote> and inserting a semicolon;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idfe5fd983995247d89c8eb2367a70aff0"><enum>(B)</enum><text>by redesignating paragraph (3) as paragraph (4); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idd806f7c9e6754096a82db6629e666112"><enum>(C)</enum><text>by inserting after paragraph (2), the following new paragraph (3):</text><quoted-block style="OLC" display-inline="no-display-inline" id="idcf080d1ebf4c48eba727763f7edb703c"><paragraph id="id55d06629eac5444692f8b963b8747c7e"><enum>(3)</enum><text>identify and mitigate counterintelligence threats to the Department of the Treasury; and</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ideb83508bd2b2483ebbaef5e612ab0ab3"><enum>(2)</enum><text>by adding at the end the following new subsection:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9b3e20dc79c247e6a90009106bed5693"><subsection id="id4f565fa8640d4f17b0acfe3bb8d99d00"><enum>(c)</enum><header>Office of Counterintelligence</header><text>There is established, within the Office of Intelligence and Analysis, the Office of Counterintelligence, which shall be responsible for implementing the policies and procedures across the bureaus of the Department of the Treasury required to carry out the counterintelligence responsibilities described in subsection (a).</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="id184aac4d2bc9452ab58c60eac31c22ae"><enum>506.</enum><header>Modification of responsibilities of Office of Intelligence and Analysis</header><text display-inline="no-display-inline">Section 201 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/121">6 U.S.C. 121</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idab136df57e86402f9855b994d99e49b0"><enum>(1)</enum><text>in subsection (d)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id486b1fd90b674b37a922ad8bbec1a294"><enum>(A)</enum><text>in paragraph (1), by striking <quote>in support</quote> and all that follows through <quote>of the homeland.</quote> and inserting <quote>pertaining to foreign threats to the homeland, as determined by the Secretary.</quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc5bf4b2e7d5f44538fde6d088a919bf5"><enum>(B)</enum><text>in paragraph (2)—</text><clause commented="no" display-inline="no-display-inline" id="id5fa8a3eb0c2648d9bfbfe87c61624302"><enum>(i)</enum><text>by striking <quote>terrorist attacks within</quote> and inserting <quote>foreign threats to</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idfffb5d0681184aee8c26c3e6137f14c1"><enum>(ii)</enum><text>by striking <quote>attacks</quote> each place it appears and inserting <quote>threats</quote>; </text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id73145120833c47b88f830a3e25051e1e"><enum>(C)</enum><text>in paragraph (3)(A), by striking <quote>terrorist and other</quote> and inserting <quote>foreign</quote>;</text></subparagraph><subparagraph id="id3e10405d2a6d4eec997d3622af8a3949"><enum>(D)</enum><text>in paragraph (6), by striking <quote>terrorist attacks against</quote> and inserting <quote>foreign threats to</quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idae621a98b393403c8cfdda09a8fad385"><enum>(E)</enum><text>by striking paragraphs (7), (17), and (23), and redesignating paragraphs (8), (9), (10), (11), (12), (13), (14), (15), (16), (18), (19), (20), (21), and (22) as paragraphs (7), (8), (9), (10), (11), (12), (13), (14), (15), (16), (17), (18), (19), and (20), respectively;</text></subparagraph><subparagraph id="id2e1884fc5ab242b28f80bef720628499"><enum>(F)</enum><text>in paragraph (7), as so redesignated, by striking <quote>threats of terrorism</quote> and inserting <quote>foreign threats</quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4137c7dbf0134b6587eeffb08b8c522b"><enum>(G)</enum><text>in paragraph (9), as so redesignated, by striking <quote>threats of terrorism in</quote> and inserting <quote>foreign threats to</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6bfa34cf61224b50afe79c56fbe54231"><enum>(H)</enum><text>in paragraph (12), as so redesignated, by striking <quote>, other agencies</quote> and all that follows through <quote>by the Department,</quote>; and</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id47133b370b75441eb4dc1cf6446052dc"><enum>(2)</enum><text>by adding at the end the following new subsections:</text><quoted-block id="id12098435db6645a8a63c250d2e281810" display-inline="no-display-inline" style="OLC"><subsection id="id0bdd0c7da60b42bc9b8e01c599088486"><enum>(h)</enum><header> Collection of intelligence and information</header><text>In carrying out the duties and responsibilities of the Secretary pursuant to this section, the personnel of the Office of Intelligence and Analysis shall liaise and share intelligence and other information between federal agencies (including the components of the Department), State, local, or tribal governments, and the private sector.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="ide57a0efad22d4e648b0bb9d03e0f4e8b"><enum>(i)</enum><header>Prohibition</header><paragraph id="ide468d390ad694f328be3f7aed715f9de"><enum>(1)</enum><header>United States person defined</header><text>In this subsection, the term <term>United States person</term> means— </text><subparagraph commented="no" display-inline="no-display-inline" id="id5c6112be6cb746baa526e29a961c5ac5"><enum>(A)</enum><text display-inline="yes-display-inline">a United States citizen; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id94c72ec1b0bb44a797749005ab10da92"><enum>(B)</enum><text display-inline="yes-display-inline">an alien known by the Office of Intelligence and Analysis to be a permanent resident alien; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2207d6294e154fab988696e0360bc335"><enum>(C)</enum><text display-inline="yes-display-inline">an unincorporated association substantially composed of United States citizens or permanent resident aliens; or </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id46b933bbe5fb480ab940a7f1c6cec88a"><enum>(D)</enum><text display-inline="yes-display-inline">a corporation incorporated in the United States, except for a corporation directed and controlled by 1 or more foreign governments.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id20725ec41eea4a54a427c6519ef72e68"><enum>(2)</enum><header>In general</header><text>Notwithstanding any other provision of law, the Office of Intelligence and Analysis may not engage in the collection of information or intelligence targeting any United States person, or any clandestine collection.</text></paragraph></subsection><subsection id="ida792bf281b714c9d89a857d381e5a44d" commented="no" display-inline="no-display-inline"><enum>(j)</enum><header>Intelligence defined</header><text>In this section, the term <term>intelligence</term> has the meaning given the terms foreign intelligence and counterintelligence, as defined paragraphs (2) and (3) of the National Security Act of 1947 ( <external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003(2)</external-xref>,(3)).</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="id5da542bb7f5640a087016088be3be44e"><enum>507.</enum><header>Role of National Security Agency in collection and analysis of signals intelligence</header><text display-inline="no-display-inline">The National Security Agency Act of 1959 (<external-xref legal-doc="usc" parsable-cite="usc/50/3601">50 U.S.C. 3601 et seq.</external-xref>) is amended by adding at the end the following: </text><quoted-block id="id914a47f04fa04b9a8bd437c8ee2fd81d" style="OLC" act-name=""><section id="id5a5aaa26254742a6b1c206d25bb93b13"><enum>23.</enum><header>Signals intelligence</header><text display-inline="no-display-inline">The Director of the National Security Agency shall—</text><paragraph commented="no" display-inline="no-display-inline" id="idf3dd73555e174c20bcb4cc60320427ad"><enum>(1)</enum><text display-inline="yes-display-inline">provide overall direction for and coordination of the collection and analysis of signals intelligence by elements of the intelligence community authorized to undertake such collection and analysis; and </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9a9e0e73c97b492095c8de58d009121f"><enum>(2)</enum><text display-inline="yes-display-inline">in coordination with other departments, agencies, and elements of the United States Government that are authorized to undertake such collection, ensure that—</text><subparagraph commented="no" display-inline="no-display-inline" id="idf87b3cbb3ab948809ea5b807257c069c"><enum>(A)</enum><text display-inline="yes-display-inline">the most effective use is made of resources; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id12165e3be69349b5b06904fd2faaf267"><enum>(B)</enum><text display-inline="yes-display-inline">appropriate account is taken of the risks to the United States and those involved in such collection.</text></subparagraph></paragraph></section><after-quoted-block>.</after-quoted-block></quoted-block></section></title><title id="idc563b353b0da47b5a37e3e9cb8c988a7" style="OLC"><enum>VI</enum><header>General intelligence community matters</header><section id="idb6c942dd931e408f8785a41aecf78833"><enum>601.</enum><header>Amendments to presidential appointments for intelligence community positions</header><subsection id="ida8cd0bbd8b3e40b4b5e1126c2db49f51"><enum>(a)</enum><header>Appointment of Deputy Director of the Central Intelligence Agency</header><text>Section 104B(a) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3037">50 U.S.C. 3037(a)</external-xref>) is amended by inserting <quote>, by and with the advice and consent of the Senate</quote> after <quote>President</quote>.</text></subsection><subsection id="id664dbb28471b4e9f9f70aa7fb64699bc"><enum>(b)</enum><header>Appointment of Deputy Director of the National Security Agency</header><text>Section 2 of the National Security Agency Act of 1959 (<external-xref legal-doc="usc" parsable-cite="usc/50/3602">50 U.S.C. 3602</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9bdfef5e340a44fe999696d3dc840361"><subsection id="id89e73c84c281433e9e1ef843cb8d1887"><enum>(c)</enum><text>There is a Deputy Director of the National Security Agency, who shall be appointed by the President, by and with the advice and consent of the Senate.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idb86a53d4b8df4e8bbddac9814633d5b6"><enum>(c)</enum><header>Appointment of Director of the Office of Intelligence and Counterintelligence</header><paragraph id="id637bf100911a46aaae48eea7508bb8ad"><enum>(1)</enum><header>In general</header><text>Section 215(c) of the Department of Energy Organization Act (<external-xref legal-doc="usc" parsable-cite="usc/42/7144b">42 U.S.C. 7144b(c)</external-xref>) is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id6434cd19bd4b4f529fafe1da0c3efd14"><subsection id="id50c587c09ce04b538db2cc5c425ebf2c"><enum>(c)</enum><header>Director</header><paragraph id="ida0a479103f934250ba5bec6db75f0b75"><enum>(1)</enum><header>Appointment</header><text>The head of the Office shall be the Director of the Office of Intelligence and Counterintelligence, who shall be appointed by the President, by and with the advice and consent of the Senate. The Director of the Office shall report directly to the Secretary.</text></paragraph><paragraph id="id97e983025ac24a30b985231bca43ca47"><enum>(2)</enum><header>Term</header><subparagraph id="id1598337679174feca1404ce22a16671a"><enum>(A)</enum><header>In general</header><text>The Director shall serve for a term of 6 years.</text></subparagraph><subparagraph id="id501894ef93df4d68b781aeb8fdc69c1e"><enum>(B)</enum><header>Reappointment</header><text>The Director shall be eligible for reappointment for 1 or more terms.</text></subparagraph></paragraph><paragraph id="id6d0e7669450b4ee183862cde3a6b9428"><enum>(3)</enum><header>Qualifications</header><text>The Director shall—</text><subparagraph id="id5286dc9d94c64c668b5df10ec6aadab6"><enum>(A)</enum><text>be an employee in the Senior Executive Service, the Senior Intelligence Service, the Senior National Intelligence Service, or any other Service that the Secretary, in coordination with the Director of National Intelligence, considers appropriate; and</text></subparagraph><subparagraph id="idd0277e8574074bba9b69cc5611de6187"><enum>(B)</enum><text>have substantial expertise in matters relating to the intelligence community, including foreign intelligence and counterintelligence.</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="id8857756e2aa34bbcb1dabfec20b70d97"><enum>(2)</enum><header>Effective date</header><text>The amendment made by this section shall take effect on January 21, 2029.</text></paragraph></subsection><subsection id="ided1e9cd82e9a4598b8c98e260813f3e8"><enum>(d)</enum><header>Appointment of Director of the National Counterterrorism Center</header><text>Section 119(b)(1) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3056">50 U.S.C. 3056(b)(1)</external-xref>) is amended by striking <quote>President, by and with the advice and consent of the Senate</quote> and inserting <quote>Director of National Intelligence</quote>.</text></subsection><subsection id="ide3941a91ed9f4f92903c62e88cc7e48a"><enum>(e)</enum><header>Appointment of Director the National Counterintelligence and Security Center</header><text>Section 902(a) of the Intelligence Authorization Act for Fiscal Year 2003 (<external-xref legal-doc="usc" parsable-cite="usc/50/3382">50 U.S.C. 3382(a)</external-xref>) is amended by striking <quote>President, by and with the advice and consent of the Senate</quote> and inserting <quote>Director of National Intelligence</quote>.</text></subsection><subsection id="idf2ca3d68fb824346bb6ac53399101a38"><enum>(f)</enum><header>Appointment of General Counsel of the Office of the Director of National Intelligence</header><text>Section 103C(a) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3028">50 U.S.C. 3028(a)</external-xref>) is amended by striking <quote>by the President, by and with the advice and consent of the Senate</quote> and inserting <quote>by the Director of National Intelligence</quote>.</text></subsection><subsection id="idd6a3df2985684fb893af835af9881287" commented="no" display-inline="no-display-inline"><enum>(g)</enum><header>Appointment of General Counsel of the Central Intelligence Agency</header><text>Section 20(a) of the Central Intelligence Agency Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3520">50 U.S.C. 3520(a)</external-xref>) is amended by striking <quote>by the President, by and with the advice and consent of the Senate</quote> and inserting <quote>by the Director of the Central Intelligence Agency</quote>.</text></subsection></section><section id="id343a59cf556b4a478ff03e7dd81572e8"><enum>602.</enum><header>Procedures regarding dissemination of nonpublicly available information concerning United States persons</header><subsection id="idf4305e7fccfb422da4fb036c471ddebf"><enum>(a)</enum><header>Procedures</header><paragraph id="idfc520ad61ed441ecad1b8b36bf79f291"><enum>(1)</enum><header>In general</header><text>Title V of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3091">50 U.S.C. 3091 et seq.</external-xref>) is amended by adding at the end the following new section:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id10f2b9a7f89846048578e1ed19211c81"><section id="id301bfe9cddd1488b81ad119397624758"><enum>519.</enum><header>Procedures regarding dissemination of nonpublicly available information concerning United States persons</header><subsection id="id0a6b347f3e584015be9380e3abd3b5ae"><enum>(a)</enum><header>Procedures</header><text>The head of each element of the intelligence community, in consultation with the Director of National Intelligence, shall develop and maintain procedures for that element to respond to unmasking requests.</text></subsection><subsection id="id0cb3c03b35444402b16625c530cd5bad"><enum>(b)</enum><header>Requirements</header><text>The procedures required by subsection (a) shall ensure, at a minimum, the following:</text><paragraph id="id7f2fe2a3f24d412dbb5087840d7f137c"><enum>(1)</enum><text>Each unmasking request submitted to a disseminating element shall include, in writing—</text><subparagraph id="id85a5f8bca6ec45798f4b3a22f7556ba7"><enum>(A)</enum><text>information that identifies the disseminated intelligence report containing the United States person identifying information requested;</text></subparagraph><subparagraph id="id720da7dbcb2d4202ba50cc941b53fbd9"><enum>(B)</enum><text>the date the unmasking request was submitted to the disseminating element;</text></subparagraph><subparagraph id="id79d38c1e46a849db9d79f45a2e7b4bba"><enum>(C)</enum><text>the name, title, and organization of the individual who submitted the unmasking request in an official capacity;</text></subparagraph><subparagraph id="id82ff4a799a93494386ef20cd32344be9"><enum>(D)</enum><text>the name, title, and organization of each individual who will receive the United States person identifying information sought by the unmasking request; and</text></subparagraph><subparagraph id="id71d00c3bcb9a41b984547ed681673dd1"><enum>(E)</enum><text>a fact-based justification describing why such United States person identifying information is required by each individual who will receive the information to carry out the duties of the individual.</text></subparagraph></paragraph><paragraph id="idbb5abe9414054905a9d8e6e82947e43a"><enum>(2)</enum><text>An unmasking request may only be approved by the head of the disseminating element or by officers or employees of such element to whom the head has specifically delegated such authority. When the disseminating element is not the originating element of the United States person identifying information, the head of the disseminating element shall obtain the concurrence of the head or designee of the originating element before approving the unmasking request.</text></paragraph><paragraph id="id45e0cc94360848d8838b96e7f09e6add"><enum>(3)</enum><text>The head of the disseminating element shall retain records on all unmasking requests, including the disposition of such requests, for not less than 10 years.</text></paragraph><paragraph id="idd8a55d93347549e7aac65a754a1c4cf1"><enum>(4)</enum><text>The records described in paragraph (3) shall include, with respect to each approved unmasking request—</text><subparagraph commented="no" display-inline="no-display-inline" id="id3fab407ca40e494f9c8c58b31292d868"><enum>(A)</enum><text display-inline="yes-display-inline">the name and title of the individual of the disseminating element who approved the request; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9fb064fc884f40f7a784ffe815031c11"><enum>(B)</enum><text display-inline="yes-display-inline">the fact-based justification for the request.</text></subparagraph></paragraph><paragraph id="id1a2c0525b74f4966a722c695bed10a33"><enum>(5)</enum><text>The procedures shall include an exception that—</text><subparagraph id="idb5d17f834be2408991fe1f1e3e639359"><enum>(A)</enum><text>allows for the immediate disclosure of United States person identifying information in the event of exigent circumstances or when a delay would likely result in the significant loss of intelligence; and</text></subparagraph><subparagraph id="idd19cb1ba67914ccdb49cbd49ad111776"><enum>(B)</enum><text>requires that promptly after such disclosure, the recipient of the United States person identifying information make a written unmasking request with respect to such information.</text></subparagraph></paragraph><paragraph id="id2b4ff7aa02af4a98b9394e79395a6cd1"><enum>(6)</enum><text>If an unmasking request is made during a period beginning on the date of a general election for President and ending on the date on which such President is inaugurated—</text><subparagraph id="ided35d1d1b56e49a99f18eae0d71bb261"><enum>(A)</enum><text>the documentation required by paragraph (1) shall include whether—</text><clause id="id8485dd73d7734acfacfc79787cd9249f"><enum>(i)</enum><text>the requesting entity knows or reasonably believes that any United States person identifying information sought is of an individual who is a member of the transition team as identified by an apparent successful candidate for the office of President or Vice President; or</text></clause><clause id="id1d02f2605380491b9205f6009df3cade"><enum>(ii)</enum><text>based on the intelligence report to which the unmasking request pertains, the disseminating element or the originating element knows or reasonably believes that any United States person identifying information sought is of an individual who is a member of the transition team as identified by an apparent successful candidate for the office of President or Vice President;</text></clause></subparagraph><subparagraph id="id0debe3d1e8a045f7beccacae23cbc0be"><enum>(B)</enum><text>the approval made pursuant to paragraph (2) of an unmasking request that contains United States person identifying information described in subparagraph (A) shall be subject to the concurrence of the general counsel of the disseminating element (or, in the absence of the general counsel, the principal deputy general counsel, or, as applicable, the senior Departmental legal officer supporting the disseminating element) that the dissemination of such United States person identifying information is in accordance with the procedures required by subsection (a); and</text></subparagraph><subparagraph id="idb555a268c8cf42838cf893c5760f9bb7"><enum>(C)</enum><text>consistent with due regard for the protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters, the head of the disseminating element shall notify the chairmen and ranking minority members of the congressional intelligence committees, the Speaker and minority leader of the House of Representatives, and the majority leader and minority leader of the Senate of an approval described in subparagraph (B) not later than 14 days after the date of such approval.</text></subparagraph></paragraph><paragraph id="idba03315ed89047658f007471cd6f7f96"><enum>(7)</enum><text>If an unmasking request concerns a nominee for or the holder of a Federal office, a member of a transition team as identified by an eligible candidate for the office of the President, a Justice of the Supreme Court of the United States, or an individual nominated by the President to be a Justice of the Supreme Court of the United States, and such unmasking request is approved, the head of the disseminating element shall submit the documentation for the request to the congressional intelligence committees not later than 14 days after the date of such approval.</text></paragraph></subsection><subsection id="id05c10ea8b872427c8bb824f19663be86"><enum>(c)</enum><header>Annual reports</header><text>Not later than March 1 of each year, the head of each element of the intelligence community shall submit to the congressional intelligence committees a report documenting, with respect to the year covered by the report—</text><paragraph id="id78af0cc2bc2841298f0e8d438d0f4deb"><enum>(1)</enum><text>the total number of unmasking requests received by that element;</text></paragraph><paragraph id="id61cfbcfe7c504f718dbd91db68408764"><enum>(2)</enum><text>of such total number, the number of requests approved;</text></paragraph><paragraph id="ide144ba9523da4460ac782f75661268e5"><enum>(3)</enum><text>of such total number, the number of requests denied; and</text></paragraph><paragraph id="id027d8295e0f447d583949264916ad3e9"><enum>(4)</enum><text>for each number calculated under paragraphs (1) through (3), the number disaggregated by requesting entity.</text></paragraph></subsection><subsection id="id87301629ab0c48bcb1c6c3c0349cadb4" commented="no"><enum>(d)</enum><header>Certain procedures regarding congressional identity information</header><text>With respect to the dissemination of congressional identity information, the head of each element of the intelligence community shall carry out this section in accordance with annex A of Intelligence Community Directive 112, or successor annex or directive.</text></subsection><subsection id="id63a076146db44f478ddc720cf7861ee7"><enum>(e)</enum><header>Effect on minimization procedures</header><text>The requirements of this section are in addition to—</text><paragraph commented="no" display-inline="no-display-inline" id="idc14f93f0becd4765b78fecb3c0825d7d"><enum>(1)</enum><text display-inline="yes-display-inline">any minimization procedures established under the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1801">50 U.S.C. 1801 et seq.</external-xref>); </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id88772667f3be46e4af8820a7d90d2919"><enum>(2)</enum><text display-inline="yes-display-inline">any procedures governing the collection, retention, or dissemination of information concerning United States persons established under Executive Order 12333 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001</external-xref> note; relating to United States intelligence activities) or successor order; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida6ebca0410c94fef96574d5beea9c4bf"><enum>(3)</enum><text display-inline="yes-display-inline">any other provision of statute or Executive order the Director of National Intelligence considers relevant.</text></paragraph></subsection><subsection id="id3995505f404c457c96eceecd8b8608cc"><enum>(f)</enum><header>Definitions </header><text>In this section:</text><paragraph id="id4c124f6aaa6e4879bbdf45db3eff212c"><enum>(1)</enum><header>Apparent successful candidate</header><text>The term <term>apparent successful candidate</term> means any apparent successful candidate for the office of President or Vice President as determined pursuant to the Presidential Transition Act of 1963 (<external-xref legal-doc="usc" parsable-cite="usc/3/102">3 U.S.C. 102</external-xref> note).</text></paragraph><paragraph id="id1f3b101e22da44548360902c02938c79"><enum>(2)</enum><header>Candidate; Federal office</header><text>The terms <term>candidate</term> and <term>Federal office</term> have the meanings given those terms in section 301 of the Federal Election Campaign Act of 1971 (<external-xref legal-doc="usc" parsable-cite="usc/52/30101">52 U.S.C. 30101</external-xref>).</text></paragraph><paragraph id="idcfc54fdc445b43f19a65fc330d377efa"><enum>(3)</enum><header>Congressional identity information</header><text>The term <term>congressional identity information</term> means information that identifies, by name or by individually identifying titles or characteristics—</text><subparagraph commented="no" display-inline="no-display-inline" id="id78fae4c795c1449999b9b399ed742872"><enum>(A)</enum><text display-inline="yes-display-inline">any current Member of the Senate or the House of Representatives; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5fa0c7dcecfe4d028b64e768eb8e4c71"><enum>(B)</enum><text display-inline="yes-display-inline">any current staff officer for any Senator or Representative, whether paid or unpaid; or </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6a3ae407742747bba40544ae3252fe0c"><enum>(C)</enum><text display-inline="yes-display-inline">any current staff officer of any committee of the Senate or the House of Representatives, whether paid or unpaid.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida92b4b4aab90423daaafcfb59f6166da"><enum>(4)</enum><header>Disseminating element</header><text>The term <term>disseminating element</term> means an element of the intelligence community that disseminated an intelligence report subject to an unmasking request.</text></paragraph><paragraph id="id336aef6896f041bfa84e776009bc0b08"><enum>(5)</enum><header>Eligible candidate</header><text>The term <term>eligible candidate</term> has the meaning given that term in section 3(h)(4) of the Presidential Transition Act of 1963 (<external-xref legal-doc="usc" parsable-cite="usc/3/102">3 U.S.C. 102</external-xref> note).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id299919cf3b9442b09eb7820c7261c2ce"><enum>(6)</enum><header>Originating element</header><text>The term <term>originating element</term> means an element of the intelligence community that originated information in a disseminated intelligence report subject to an unmasking request. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida02d48b757be4308abfba53aac023a31"><enum>(7)</enum><header>Requesting entity</header><text>The term <term>requesting entity</term> means an entity of—</text><subparagraph commented="no" display-inline="no-display-inline" id="id64cef69b0c134795bd6970b1539b33c1"><enum>(A)</enum><text display-inline="yes-display-inline">the United State Government; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6139b79f35c842ea86968288fd5e25a0"><enum>(B)</enum><text display-inline="yes-display-inline">a State, local, Tribal, or territorial government. </text></subparagraph></paragraph><paragraph id="iddf6111127b0d4d9fae82d386643e3ca5"><enum>(8)</enum><header>United States person</header><text>The term <term>United States person</term> means a United States person as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1801">50 U.S.C. 1801</external-xref>) or section 3.5 of Executive Order 12333 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001</external-xref> note; relating to United States intelligence activities). </text></paragraph><paragraph id="id6cf5d32a5e194ffc80b5bd47ed0e709e"><enum>(9)</enum><header>United States person identifying information</header><subparagraph commented="no" display-inline="no-display-inline" id="id2798e757c48b4a22b1502740ad12d2ac"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">The term <term>United States person identifying information</term> (commonly referred to as <quote>United States Person Information</quote>)—</text><clause commented="no" display-inline="no-display-inline" id="id67e0981e69a1464a82dac1411688bfcc"><enum>(i)</enum><text display-inline="yes-display-inline">means information that is reasonably likely to identify one or more specific United States persons; and </text></clause><clause commented="no" display-inline="no-display-inline" id="id1e1ae059761346a08e6c9c5cf306f108"><enum>(ii)</enum><text display-inline="yes-display-inline">includes a single item of information and information that, when combined with other information, is reasonably likely to identify one or more specific United States persons.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5cd2ea90957b445b97399f9c36006272"><enum>(B)</enum><header>Determination</header><text>The determination of whether information is reasonably likely to identify one or more specific United States persons may require assessment by a trained intelligence professional on a case-by-case basis.</text></subparagraph></paragraph><paragraph id="idf1db619e7eb7400e9533f4cbf1f35529"><enum>(10)</enum><header>Unmasking request</header><text>The term <term>unmasking request</term> means a request to gain access to nonpublic United States person identifying information concerning a known unconsenting United States person that was omitted from a disseminated intelligence report by the originating element.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="id7ab0c4c9a0c34023a4bd2e843f5f8472"><enum>(2)</enum><header>Clerical amendment</header><text>The table of contents preceding section 2 of such Act is amended by inserting after the item relating to section 518 the following new item:</text><toc><toc-entry level="section" bold="off"><quote>Sec. 519. Procedures regarding dissemination of nonpublicly available information concerning United States persons.</quote>.</toc-entry></toc></paragraph></subsection><subsection id="id979e2e4adcd74d12be3cac9345c0e8f4"><enum>(b)</enum><header>Development of procedures</header><text>The head of each element of the intelligence community shall develop the procedures required by section 519(a) of the National Security Act of 1947, as added by subsection (a)(1), by not later than 60 days after the date of the enactment of this Act.</text></subsection><subsection id="id69205c2087a44c73bf5fd743c6f5af1b" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Public release</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence shall make publicly available the procedures for each element of the intelligence community required by section 519(a) of the National Security Act of 1947, as added by subsection (a)(1).</text></subsection></section><section id="id9fb1f454f33546dc958602bd26e53d0f"><enum>603.</enum><header>Analytic standards for all-source intelligence products</header><subsection commented="no" display-inline="no-display-inline" id="id24a1fca53e36481bb428cfb69c72e6b4"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text>The National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block id="id1E49B4EC44834C9594D3A301745F038A" style="OLC" act-name=""><section id="idC716D2576C6746ECB1C06A428F9E311B"><enum>1115.</enum><header>Analytic standards for all-source intelligence products</header><subsection id="idd1f0e6a7f39748ac8a1ebf51819d5e4a"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="idb1a6c20d62cb4e638a9fe37ba3aa4568"><enum>(1)</enum><header>All-source intelligence product</header><text display-inline="yes-display-inline">The term <term>all-source intelligence product</term>—</text><subparagraph commented="no" display-inline="no-display-inline" id="idce0d32b50d734a768ebdbec5f1c27eff"><enum>(A)</enum><text display-inline="yes-display-inline">means any intelligence product published by an element of the intelligence community using multiple types of intelligence for purposes of providing an analytic assessment or situational update; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1827014a21f74ae8807d2a0791f53610"><enum>(B)</enum><text display-inline="yes-display-inline">does not include a product containing purely law enforcement information.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id259aa691079c44f8ae96ca7c6e431ead"><enum>(2)</enum><header>Assumption</header><text display-inline="yes-display-inline">The term <term>assumption</term> means a supposition used to frame or support an argument. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id484bf7d4099f4ba8854800892b562294"><enum>(3)</enum><header>Judgment</header><text display-inline="yes-display-inline">The term <term>judgment</term> means a conclusion based on underlying intelligence information, analysis, and assumptions. </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idf485b657a5404319aa67d0b886fdef55"><enum>(b)</enum><header display-inline="yes-display-inline">Establishment</header><paragraph commented="no" display-inline="no-display-inline" id="idfd732f7a4521483daeba04bf6d122371"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The production of any all-source intelligence product shall adhere to—</text><subparagraph commented="no" display-inline="no-display-inline" id="id8df15d75f1f643a6bdc97f9e895d9dd8"><enum>(A)</enum><text display-inline="yes-display-inline">the analytic standards described in subsection (c); and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3bf6dfe09d484d7a9dc3aa57cc67839a"><enum>(B)</enum><text>any guidance or policy issued under paragraph (2). </text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5f29b4bbe1f6491d9ec1cff1f5c78ff6"><enum>(2)</enum><header>Guidance and policy</header><text>The Director of National Intelligence or any other head of an element of the intelligence community may issue guidance or policy that expands upon the standards described in subsection (c) as such head considers appropriate, except that any such guidance or policy shall not contradict or otherwise circumvent such standards. </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ide28671204ae34f3ca17c9e6849b2ec0a"><enum>(c)</enum><header>Analytic standards</header><text>The standards described in this subsection are the following: </text><paragraph id="idfa9ad59e3c124e51a8b67a6d29cbc386"><enum>(1)</enum><header>Objectivity</header><text>In producing any all-source intelligence product, an analyst—</text><subparagraph commented="no" display-inline="no-display-inline" id="id48c47ef26eb2439abf7a72feb2321e19"><enum>(A)</enum><text display-inline="yes-display-inline">shall—</text><clause commented="no" display-inline="no-display-inline" id="id7192f067869e48d19ffcfbf6d49634d4"><enum>(i)</enum><text display-inline="yes-display-inline">perform the analyst's functions with objectivity and with awareness of their own assumptions and reasoning; </text></clause><clause commented="no" display-inline="no-display-inline" id="idea8a70e3f8694e2c931227324795e19c"><enum>(ii)</enum><text display-inline="yes-display-inline">employ reasoning techniques and practical mechanisms that reveal and mitigate bias; </text></clause><clause commented="no" display-inline="no-display-inline" id="id313cac2e460942f196a3e8de466968f6"><enum>(iii)</enum><text display-inline="yes-display-inline">be alert to influence by existing analytic positions or judgments; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id750378b7258f46b1b00baa0a6ad9a8b0"><enum>(iv)</enum><text display-inline="yes-display-inline">consider alternative perspectives and contrary information; and</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id55ef3b0977fb4e48a5fcf228bf42ce5a"><enum>(B)</enum><text display-inline="yes-display-inline">shall not be unduly constrained by previous judgments when new developments indicate a modification is necessary.</text></subparagraph></paragraph><paragraph id="id27ff3747d3d1455dabdb28c92b9e5249"><enum>(2)</enum><header>Independent of political consideration</header><text>Any all-source intelligence product shall not be—</text><subparagraph commented="no" display-inline="no-display-inline" id="idaec6ecb8ce7a4cd496256ba84047ebe9"><enum>(A)</enum><text display-inline="yes-display-inline">distorted by, or shaped for, advocacy of a particular audience, agenda, or policy viewpoint; or </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf800d4927eac438cbbe05e2baa956abb"><enum>(B)</enum><text display-inline="yes-display-inline">influenced by the force of preference for a particular policy.</text></subparagraph></paragraph><paragraph id="idb7a69bb9e9f94dc988f3f6d9ac08bc38"><enum>(3)</enum><header>Timely</header><text>Any all-source intelligence product shall be disseminated in time for the product to be actionable by customers.</text></paragraph><paragraph id="id016d0960ab3a4b10864b2933d73f8ae0"><enum>(4)</enum><header>Based on all relevant information available</header><text>Any all-source intelligence product shall be informed by all relevant information available.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id52a2b416994543dfb71d153e7b9ab7c1"><enum>(5)</enum><header>Analytic tradecraft standards</header><text>Any all-source intelligence product shall adhere to the following analytic tradecraft standards: </text><subparagraph id="idbfc1aba2de0d411ba4a19af7b2cb6329"><enum>(A)</enum><header>Sourcing</header><text>Any all-source intelligence product shall—</text><clause commented="no" display-inline="no-display-inline" id="id977cf103c4ff4189aab1adcb3e1e8b0a"><enum>(i)</enum><text display-inline="yes-display-inline">identify and properly describe the quality and credibility of underlying sources, data, and methodologies upon which judgments are based; and </text></clause><clause commented="no" display-inline="no-display-inline" id="id3971fe0633b14c29b98464af872256d1"><enum>(ii)</enum><text display-inline="yes-display-inline">use source descriptors in accordance with sourcing guidance prescribed by the Director of National Intelligence.</text></clause></subparagraph><subparagraph id="id8af824e190ae463fa309fdb50ee3c125" commented="no"><enum>(B)</enum><header>Uncertainty</header><text>Any all-source intelligence product shall—</text><clause commented="no" display-inline="no-display-inline" id="id41f6430c80a24a7c80b5c5fe18012bd2"><enum>(i)</enum><text display-inline="yes-display-inline">indicate and explain the basis for the uncertainties associated with major analytic judgments, specifically the likelihood of occurrence of an event or development, and the analyst’s confidence in the basis for the judgment; </text></clause><clause commented="no" display-inline="no-display-inline" id="idf88d18348cd94490aa35478ab6248d22"><enum>(ii)</enum><text display-inline="yes-display-inline">note causes of uncertainty, including assumptions and gaps, and explain how uncertainties affect analysis; and </text></clause><clause commented="no" display-inline="no-display-inline" id="id912a6bf67cd24a42ac700431e6f31c33"><enum>(iii)</enum><text>for expressions of likelihood or probability, use one of the sets of terms defined in Intelligence Community Directive 203.</text></clause></subparagraph><subparagraph id="id4b1e007dceef4de993d9dc37e733f185"><enum>(C)</enum><header>Distinguishing</header><text>Any all-source intelligence product shall—</text><clause commented="no" display-inline="no-display-inline" id="id5d93e963d29b4afab6ccd1d160b0a716"><enum>(i)</enum><text display-inline="yes-display-inline">clearly distinguish statements that convey underlying intelligence information used in analysis from statements that convey assumptions or judgments; </text></clause><clause commented="no" display-inline="no-display-inline" id="id0cb72e5bebf04924b5130478ee802e2e"><enum>(ii)</enum><text display-inline="yes-display-inline">state an assumption explicitly when the assumption serves as the linchpin of an argument or when the assumption bridges key information gaps; </text></clause><clause commented="no" display-inline="no-display-inline" id="ida924c71a85ce473287037c3cba771208"><enum>(iii)</enum><text display-inline="yes-display-inline">explain the implications for judgments if assumptions prove to be incorrect; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id662b1bc24b2f4fc28b5c34eccddf3e17"><enum>(iv)</enum><text display-inline="yes-display-inline">as appropriate, identify indicators that, if detected, would alter judgments. </text></clause></subparagraph><subparagraph id="id327d99475f274496b4e4808006d6b46c"><enum>(D)</enum><header>Incorporate analysis of alternatives</header><text>Any all-source intelligence product shall—</text><clause commented="no" display-inline="no-display-inline" id="id236b54818768459693bbb78e6bcdbf97"><enum>(i)</enum><text display-inline="yes-display-inline">identify and assess plausible alternative hypotheses; </text></clause><clause commented="no" display-inline="no-display-inline" id="idd17332d1e4124a02aca5d17319337cd1"><enum>(ii)</enum><text display-inline="yes-display-inline">in discussing alternatives, address factors such as associated assumptions, likelihood, or implications related to United States interests; and</text></clause><clause commented="no" display-inline="no-display-inline" id="ida72dfff4248442f4acdf79199c1a67c1"><enum>(iii)</enum><text display-inline="yes-display-inline">identify indicators that, if detected, would affect the likelihood of identified alternatives. </text></clause></subparagraph><subparagraph id="idd2d9b0ff14c1469c8ff7aec71839f959"><enum>(E)</enum><header>Relevance</header><text>Any all-source intelligence product shall provide information and insight on United States national security issues.</text></subparagraph><subparagraph id="id2f6c06f0be34400c92401e5a10c2af24"><enum>(F)</enum><header>Argumentation</header><text>Any all-source intelligence product shall—</text><clause commented="no" display-inline="no-display-inline" id="idd5d182aee132418fa2de82c18bd8f845"><enum>(i)</enum><text display-inline="yes-display-inline">present a clear main analytic message up front; </text></clause><clause commented="no" display-inline="no-display-inline" id="idea1eaf7aff984e8b99ef6b91e4aabd4f"><enum>(ii)</enum><text display-inline="yes-display-inline">in the case of a product containing multiple judgments, have a main analytic message that is drawn collectively from those judgments; and </text></clause><clause commented="no" display-inline="no-display-inline" id="id5ebe0a873d4e41509d9e4927890ff06d"><enum>(iii)</enum><text display-inline="yes-display-inline">be effectively supported by relevant intelligence information and coherent reasoning. </text></clause></subparagraph><subparagraph id="id10aa0945de02458b8111dc5ad6289d53"><enum>(G)</enum><header>Analytic line</header><text>Any all-source intelligence product shall—</text><clause commented="no" display-inline="no-display-inline" id="id9d7f32c8b8874404858f9084fcf2a68d"><enum>(i)</enum><text display-inline="yes-display-inline">state how its major judgments on a topic are consistent with or represent a change from major judgments in previously published analysis, or that it represent initial coverage of a topic; and </text></clause><clause commented="no" display-inline="no-display-inline" id="idb21b52d5843541a08d9759e9b5ca7ed8"><enum>(ii)</enum><text display-inline="yes-display-inline">fully consider and bring to the attention of customers significant differences in analytic judgment, such as between two analytic elements of the intelligence community.</text></clause></subparagraph><subparagraph id="id08c01622b6e54b89b7ff02f9ed84aa4e"><enum>(H)</enum><header>Accuracy</header><text>Any all-source intelligence product shall—</text><clause commented="no" display-inline="no-display-inline" id="id4687d9e6b20f48558c3ed5451e2f6176"><enum>(i)</enum><text display-inline="yes-display-inline">apply expertise and logic to make the most accurate judgments and assessments possible, based on the information available and known information gaps; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idab7a8ec441c64eaea986475716f60819"><enum>(ii)</enum><text display-inline="yes-display-inline">express judgments as clearly and precisely as possible, reducing ambiguity by addressing the likelihood, timing, and nature of the outcome or development.</text></clause></subparagraph><subparagraph id="id32e028a8d8994605861ba87f61ce34c2"><enum>(I)</enum><header>Visuals</header><text>Any all-source intelligence product shall incorporate effective visual information as appropriate. Any content of any all-source intelligence product depicted visually shall adhere to the analytic standards described in this subsection.</text></subparagraph></paragraph></subsection><subsection id="ida10732865e6a47df832f78b16c655a85" commented="no"><enum>(d)</enum><header>Required information</header><paragraph commented="no" display-inline="no-display-inline" id="idcf1a958caab244de980fe4597d9384e7"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Except as provided in paragraph (2), any all-source intelligence product shall include a section dedicated to explaining the tradecraft related to the analytic tradecraft standards described in subparagraphs (A), (B), (C), (D), and (G) of subsection (c)(5).</text></paragraph><paragraph id="ide277a8d88892450681691e35a3575746" commented="no"><enum>(2)</enum><header>Exceptions</header><text>The requirement of paragraph (1) shall not apply to—</text><subparagraph commented="no" display-inline="no-display-inline" id="idc14e34213f464b7e92aed7d60e2094eb"><enum>(A)</enum><text>any all source-intelligence product less than 300 words; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6a7d458528f348938ca9d5376575e0b5"><enum>(B)</enum><text display-inline="yes-display-inline">any all-source intelligence product produced for the President’s Daily Brief.</text></subparagraph></paragraph></subsection><subsection id="idb7a7c9c1a55540078874538a3c1d8b24"><enum>(e)</enum><header>Tracking adherence to analytic standards</header><text>The Director of National Intelligence and each other head of an element of the intelligence community shall—</text><paragraph commented="no" display-inline="no-display-inline" id="idcffb3e5fda424cb1b370b23d975ddac8"><enum>(1)</enum><text display-inline="yes-display-inline">develop metrics for evaluating the performance of their respective element in adhering to the analytic standards described in subsection (c); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0479d4a18e2549ea97d2793377d2e484"><enum>(2)</enum><text display-inline="yes-display-inline">use such metrics to evaluate individual performance, develop analytic workforce training, and inform Congress on matters related to analytic performance.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id11ef286ca85146d5918a71fe929efa4a"><enum>(b)</enum><header display-inline="yes-display-inline">Clerical amendment</header><text>The table of contents of such Act is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id48e3ebec1d0949dbad090a38f58a1997"><toc><toc-entry level="section" bold="off">Sec. 1115. Analytic standards for all-source intelligence products.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section commented="no" display-inline="no-display-inline" id="idb6cc0870f9ff4e08bac47fe497fffbf9"><enum>604.</enum><header>Limitation on use of Intelligence Community Management Account funds for certain entities</header><subsection commented="no" display-inline="no-display-inline" id="id5238f68b2a744be88cdbec11fa53dcdf"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Title III of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3071">50 U.S.C. 3071 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id3d3c59cd994247269e6aeb7ea3d1647c"><section commented="no" display-inline="no-display-inline" id="id3b47bb7d95be4d438ab933459e4d4681"><enum>314.</enum><header>Limitation on use of Intelligence Community Management Account funds for certain entities</header><text display-inline="no-display-inline">Amounts appropriated for the Intelligence Community Management Account may not be obligated or expended to provide financial or in-kind support for the purposes of analytic collaboration, including for any study, research, or assessment, to—</text><paragraph id="id37c7240c1177435ba79cba7b35ea58f3"><enum>(1)</enum><text>an entity that is described in <external-xref legal-doc="usc" parsable-cite="usc/26/501">section 501(c)(3)</external-xref> of the Internal Revenue Code of 1986 and exempt from taxation under section 501(a) of such Code, or otherwise describes itself as a think tank in any public document, that has received or expects to receive any financial or in-kind support from a foreign government, except for a foreign government that is a member of the Five Eyes intelligence-sharing alliance; or</text></paragraph><paragraph id="idf8dcdd505fef4a9e91ed33209aafa109"><enum>(2)</enum><text>an entity that is organized for research or for engaging in advocacy in areas such as public policy or political strategy that has received or expects to receive any financial or in-kind support from a government, or an entity affiliated with the military or intelligence services, of—</text><subparagraph id="idbe4cac9a30c74febbe5d854ef481a551"><enum>(A)</enum><text>the People’s Republic of China;</text></subparagraph><subparagraph id="id9f4cef2f6634483d8a5389ca1770616a"><enum>(B)</enum><text>the Russian Federation;</text></subparagraph><subparagraph id="id30ef517d280b45bfb3e2940f1980d53a"><enum>(C)</enum><text>the Democratic People’s Republic of Korea;</text></subparagraph><subparagraph id="id5ff5fc725e9c473abd3b9a7bcc92708a"><enum>(D)</enum><text>the Islamic Republic of Iran; </text></subparagraph><subparagraph id="id3920d99876c146ad8d19b075bc41a343"><enum>(E)</enum><text>the Bolivarian Republic of Venezuela; or </text></subparagraph><subparagraph id="id3aa018b431434bd19717f91a7c27155b"><enum>(F)</enum><text>the Republic of Cuba.</text></subparagraph></paragraph></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="iddbc868a071194af48298135a1732489f"><enum>(b)</enum><header>Conforming amendment</header><text>Section 103B(e) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/3027">50 U.S.C. 3027(e)</external-xref>) is amended by inserting <quote>and subject to section 314</quote> after <quote>control of the Director of National Intelligence</quote>.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id0b85f12e68964bd79ea76a7e60e06793"><enum>(c)</enum><header>Clerical amendment</header><text>The table of contents for such Act, in the matter preceding section 2 of such Act, is amended by inserting after the item relating to section 313 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id98e6f433d52646b3a5147d95cfd08bfb"><toc><toc-entry level="section" bold="off">Sec. 314. Limitation on use of Intelligence Community Management Account funds for certain entities.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id3a27e93af5bc420fbfbfad3029dad889"><enum>605.</enum><header>Ben Sasse Intelligence Community Technology Fellowship Program</header><subsection id="id8292872c2c08402e9de8c18ff370bd89"><enum>(a)</enum><header>In general</header><text>Title X of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3191">50 U.S.C. 3191 et seq.</external-xref>) is amended by inserting after section 1002 the following:</text><quoted-block id="id37B994714CDD497F9D1AA6B666A2E325" style="OLC" act-name=""><section id="id1E854402D22F49B08D35CBE653EA8F60"><enum>1003.</enum><header>Ben Sasse Intelligence Community Technology Fellowship Program</header><subsection commented="no" display-inline="no-display-inline" id="idd1c8b3286f104be280f4d102d97d5b54"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">There is established a program (in this section referred to as the <quote>Program</quote>) under which selected employees of the intelligence community may train at certain nongovernmental entities as technology fellows. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="ida0599a0d20cf486eb84c3af04f20b6b8"><enum>(b)</enum><header>Designation</header><text>The program shall be known as the <quote>Ben Sasse Intelligence Community Technology Fellowship Program</quote>. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id7481526a99f24c5194999c8e336bec8a"><enum>(c)</enum><header>Agreements</header><paragraph commented="no" display-inline="no-display-inline" id="id28a457cfc0f0475fbdb2c170f104907a"><enum>(1)</enum><header>Nongovernmental entities</header><text display-inline="yes-display-inline">Each head of an element of the intelligence community described in paragraph (3) shall seek to enter into agreements with nongovernmental entities with experience in cutting-edge technology under which such entities may host technology fellows under the Program. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idbf0a60f34a2f4162864cb02a5ac6ad3b"><enum>(2)</enum><header>Selected employees</header><text>For each employee of an element of the intelligence community selected for participation in the Program in accordance with subsection (e), the head of the element of the intelligence community that selected the employee shall provide for a written agreement among that element of the intelligence community, the nongovernmental entity concerned, and the employee. The agreement shall—</text><subparagraph commented="no" display-inline="no-display-inline" id="ide631b5fb88b44f72af8e0918c84bad64"><enum>(A)</enum><text display-inline="yes-display-inline">require that the employee of the element of the intelligence community, upon completion of the fellowship, serve in that element, or elsewhere in the intelligence community if approved by the head of the element that selected the employee, for a period equal to twice the length of the fellowship;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id8bd7d77044a54a3b8c396fef9a77ad4d"><enum>(B)</enum><text display-inline="yes-display-inline">provide that if the employee of the element of the intelligence community fails to carry out the agreement, the employee shall be liable to the United States for payment of all expenses of the fellowship, unless that failure was for good and sufficient reason, as determined by the head of the element that selected the employee; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id95b3191d1f1a4c7a8824eed2ddc43789"><enum>(C)</enum><text display-inline="yes-display-inline">contain language ensuring that the employee of the element of the intelligence community does not improperly use information that the employee knows relates to an acquisition or procurement of the element of the intelligence community for the benefit or advantage of the nongovernmental entity. </text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ide7d1f33d30c44a2297ddd6f7787c1753"><enum>(3)</enum><header>Elements described</header><text display-inline="yes-display-inline">The elements of the intelligence community described in this paragraph are the following: </text><subparagraph commented="no" display-inline="no-display-inline" id="id640677c56462441b94ef0a675b9d1d9b"><enum>(A)</enum><text>The Central Intelligence Agency. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idec310b7455cf47e78f69f73154fce8fc"><enum>(B)</enum><text>The National Security Agency. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id21a6a91ef7964f2ab978e93dd26e1bb2"><enum>(C)</enum><text>The National Geospatial-Intelligence Agency. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id126f6b49e6a34fc6a8475e854e4c89e6"><enum>(D)</enum><text>The National Reconnaissance Office. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc18bcc10d8da45e3983870df2c4870bc"><enum>(E)</enum><text>The Defense Intelligence Agency. </text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idb3edf3c8d4d546d9ac7c97257bffa217"><enum>(d)</enum><header>Board</header><paragraph commented="no" display-inline="no-display-inline" id="iddd7091608a854d83bc66d55bffd03321"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">There is established a board for the Program (in this section referred to as the <quote>Board</quote>). </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0f08b2f0fe6c4c73a7251bec18083438"><enum>(2)</enum><header>Membership</header><text>The Board shall be composed of the directors of science and technology, or equivalents, of the elements of the intelligence community described in subsection (c)(3).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id10ded10fc5534cf98a35b1f058da2ac3"><enum>(3)</enum><header display-inline="yes-display-inline">Co-chairs</header><text display-inline="yes-display-inline">The members of the Board shall serve as co-chairs of the Board.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0d68a019637d4f239c6bd323c49536cd"><enum>(4)</enum><header>Selection criteria</header><text display-inline="yes-display-inline">The Board shall establish selection criteria for the participation of employees in the Program. </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idc72b2b4fd485405994a3ff4cd2763c41"><enum>(e)</enum><header>Selection</header><text display-inline="yes-display-inline">Each year, each head of an element of the intelligence community described in subsection (c)(3) shall select two employees of such element to participate in the Program.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idcc0e26d68ea04c99b0977a83794963cb"><enum>(f)</enum><header>Term</header><text display-inline="yes-display-inline">An employee selected for participation in the Program may serve for one year as a technology fellow at a nongovermental entity that has entered into an agreement under subsection (c)(1) with the head of the element of the intelligence community concerned.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idf7079019b0dd412abc2e07f36bd366eb"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of such Act is amended by inserting after the item relating to section 1002 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id866d769fff5a4480a60715a4d8c45cfd"><toc><toc-entry level="section" bold="off">Sec. 1003. Ben Sasse Intelligence Community Technology Fellowship Program.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id775f1f882b6e47cd9750676e3862cb02"><enum>606.</enum><header>Intelligence Community Counterintelligence Office at the Department of Commerce</header><subsection commented="no" display-inline="no-display-inline" id="id76f44f86688641d5afa184b40b4c344e"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph id="id25433147b95e4386a710856b8df6244a"><enum>(1)</enum><header>Department</header><text>The term <term>Department</term> means the Department of Commerce.</text></paragraph><paragraph id="id2bfae3b69ebb4fd9ac47790e6312010e"><enum>(2)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Commerce.</text></paragraph></subsection><subsection id="idc780f624876b4be1a8738c4d5163a451"><enum>(b)</enum><header>Establishment of Intelligence Community Counterintelligence Office</header><paragraph id="id4b9f247e3d4849d085924ea792330e34"><enum>(1)</enum><header>Agreement with Secretary of Commerce</header><text>The Director of National Intelligence, acting through the Director of the National Counterintelligence and Security Center, shall seek to enter into an agreement with the Secretary under which the Director of National Intelligence and the Secretary shall establish within the Department, within the Office of Secretary, an office, which shall be known as the <quote>Intelligence Community Counterintelligence Office</quote>, in accordance with this section.</text></paragraph><paragraph id="id09c3f7f4865644e4ba590efb921b89c8"><enum>(2)</enum><header>Location</header><text>The Intelligence Community Counterintelligence Office established pursuant to this section shall be physically located within the headquarters of the Department and within reasonable proximity to the offices of the leadership of the Department.</text></paragraph><paragraph id="idac6a11f0ebe145c98f6942d53ff63911"><enum>(3)</enum><header>Security</header><text>The Director of the National Counterintelligence and Security Center shall be responsible for the protection of classified information and for the establishment and enforcement of all security-related controls within the Intelligence Community Counterintelligence Office.</text></paragraph></subsection><subsection id="idb748d9d61c9e47c1afd0c4119c06240f"><enum>(c)</enum><header>Personnel</header><paragraph id="idbd489c1f81ea430ab247f5ed3c3d7b1f"><enum>(1)</enum><header>Director</header><subparagraph id="id0a81424c1f3a44bab4984f1b4bd394f7"><enum>(A)</enum><header>Appointment</header><text>There shall be at the head of the Intelligence Community Counterintelligence Office a Director who is appointed by the Director of National Intelligence. The Director of the Intelligence Community Counterintelligence Office shall—</text><clause id="id58922227c1e7435790ebaf3127860f71"><enum>(i)</enum><text>be supervised and subject to performance evaluations by the Director of the National Counterintelligence and Security Center, in consultation with the Secretary;</text></clause><clause id="idfc8f8a1b9c7d4c81a7d74fba8974646b"><enum>(ii)</enum><text>be an employee of the intelligence community with significant counterintelligence experience; and</text></clause><clause id="idc3f8448bd493446a8a2db4b699c15992"><enum>(iii)</enum><text>serve for a period of 3 years.</text></clause></subparagraph><subparagraph id="ida1d1aa37cc504e8591ea2d49b7f7df21"><enum>(B)</enum><header>Responsibilities</header><text>The Director of the Intelligence Community Counterintelligence Office shall carry out the following responsibilities:</text><clause id="idacb98ad6659f466dac4928b49aa111f5"><enum>(i)</enum><text>Serving as the head of the Intelligence Community Counterintelligence Office, with supervisory responsibility for the Intelligence Community Counterintelligence Office and any other personnel assigned to the Intelligence Community Counterintelligence Office.</text></clause><clause id="id200545fab6a64ba680c8189011b67d7b"><enum>(ii)</enum><text>Advising the Secretary on counterintelligence and intelligence information.</text></clause><clause id="id09c1e2482dcf413eb4b7f7638f66d81d"><enum>(iii)</enum><text>Ensuring that counterintelligence threat information and, as appropriate, finished intelligence on topics related to the functions of the Department, are provided to appropriate personnel of the department or agency without delay.</text></clause><clause id="idbe08f344f2f845af9f02bcfbb31b5aba"><enum>(iv)</enum><text>Ensuring critical intelligence relevant to the Secretary is requested and disseminated in a timely manner.</text></clause><clause id="idd65a407ab76e4044940149c162190a9a"><enum>(v)</enum><text>Establishing, as appropriate, mechanisms for collaboration through which Department subject matter experts, including those without security clearances, can share information and expertise with the intelligence community.</text></clause><clause id="idb8b48d91733a4120b3f122b2801cf995"><enum>(vi)</enum><text>Correlating and evaluating counterintelligence threats identified within intelligence community reporting, in coordination with the National Counterintelligence and Security Center, and providing appropriate dissemination of such intelligence to officials of the Department with a need-to-know.</text></clause><clause id="id4b5da6a808d14b46b390b0683d03a9f4"><enum>(vii)</enum><text>Advising the Secretary on methods to improve the counterintelligence posture of the Department.</text></clause><clause id="id9bcad8d7d0144600a399c31963055657"><enum>(viii)</enum><text>Where appropriate, supporting the Department's leadership in engaging with the National Security Council.</text></clause><clause id="id3857cd9ea18248429566657d368f5456"><enum>(ix)</enum><text>In coordination with the National Counterintelligence and Security Center, establishing counterintelligence partnerships to improve the counterintelligence defense of the Department.</text></clause></subparagraph></paragraph><paragraph id="id4d5981b72b6843368fc1cb43306ed019"><enum>(2)</enum><header>Deputy Director</header><text>There shall be within the Intelligence Community Counterintelligence Office a Deputy Director who is appointed by the Secretary, in coordination with the Director of National Intelligence. The Deputy Director shall—</text><subparagraph id="id867dae3079064d1dbe55c341de2c5aaa"><enum>(A)</enum><text>be supervised and subject to performance evaluations by the Secretary, in consultation with the Director of the National Counterintelligence and Security Center;</text></subparagraph><subparagraph id="id6317e1096de44dc0a4a417f8acf26363"><enum>(B)</enum><text>be a current or former employee of the Department with significant experience within the Department; and</text></subparagraph><subparagraph id="id87782d2a03f74d479dab8d2d0fc90dfd"><enum>(C)</enum><text>serve at the pleasure of the Secretary.</text></subparagraph></paragraph><paragraph id="id3fec2337f987464ebe2bc04594c48533"><enum>(3)</enum><header>Other employees</header><subparagraph id="id125bb79f563b4c77af54e0c75a8aeb07"><enum>(A)</enum><header>Joint duty assignment</header><text>There shall be within the Intelligence Community Counterintelligence Office such other employees as the Director of National Intelligence, in consultation with the Secretary, determines appropriate. Employment at the Intelligence Community Counterintelligence Office is an intelligence community joint duty assignment. A permanent change of station to the Intelligence Community Counterintelligence Office shall be for a period of not less than 2 years.</text></subparagraph><subparagraph id="id0e2905cfdd834c0f93188ab4e48c2a46"><enum>(B)</enum><header>Supervision</header><text>The Director of the Intelligence Community Counterintelligence Office shall be responsible for the supervision and management of employees assigned to the Intelligence Community Counterintelligence Office, including employees assigned by program elements of the intelligence community and other Federal departments and agencies, as appropriate.</text></subparagraph><subparagraph id="id5e2d9c54adc145b59cf11e33c1861064"><enum>(C)</enum><header>Joint duty or assigned personnel reimbursement</header><text>The Director of National Intelligence shall reimburse a program element of the intelligence community or a Federal department or agency for any permanent change of station employee assigned to the Intelligence Community Counterintelligence Office from amounts authorized to be appropriated for the Office of the Director of National Intelligence.</text></subparagraph><subparagraph id="ida46c849f189e49e79c129e2014f2ad6f"><enum>(D)</enum><header>Operation under authority of Director of National Intelligence</header><text>Employees assigned to the Intelligence Community Counterintelligence Office under this paragraph shall operate under the authorities of the Director of National Intelligence for the duration of their assignment or period of employment within the Intelligence Community Counterintelligence Office, except for temporary duty assignment employees.</text></subparagraph><subparagraph id="id68c753e9e93c4807885dd25d4f4427fb"><enum>(E)</enum><header>Incentive pay</header><clause id="id3c4ce0beb011405b857896b14ade8e6a"><enum>(i)</enum><header>In general</header><text>An employee who accepts employment at the Intelligence Community Counterintelligence Office during the 120-day period after the date of the establishment of the Intelligence Community Counterintelligence Office shall receive an incentive payment, which shall be payable by the Director of National Intelligence, in an amount equal to 10 percent of the base annual pay of the employee. Such an employee who completes 2 years of service in the Intelligence Community Counterintelligence Office may receive an incentive payment in an amount equal to 10 percent of the base annual pay of the employee if the Director of the Intelligence Community Counterintelligence Office determines the performance of the employee is exceptional.</text></clause><clause id="id564111dd3add4ccf8e71a11b08fc4501"><enum>(ii)</enum><header>Eligibility</header><text>An employee is only eligible for an incentive payment under clause (i) if the employee enters into an agreement with the Director of National Intelligence to serve in the Intelligence Community Counterintelligence Office for a period of at least 2 years.</text></clause></subparagraph></paragraph></subsection><subsection id="id6631b22372144faeac90071ea3f50e5e"><enum>(d)</enum><header>Funding</header><text>To the extent and in such amounts as specifically provided in advance in appropriations Acts for the purposes detailed in this subsection, the Director of National Intelligence may expend such sums as are authorized within the National Intelligence Program of the Office of the Director of National Intelligence for—</text><paragraph id="id7586296564e14b0689488adf8032dbb5"><enum>(1)</enum><text>the renovation, furnishing, and equipping of a Federal building, as necessary, to meet the security and operational requirements of the Intelligence Community Counterintelligence Office;</text></paragraph><paragraph id="id0323ceff1683487e8954c4ee02e96813"><enum>(2)</enum><text>the provision of connectivity to the Intelligence Community Counterintelligence Office to enable briefings, secure audio and video communications, and collaboration between employees of the Department and the intelligence community at the unclassified, secret, and top secret levels;</text></paragraph><paragraph id="idb2598100b60f452ca8b836a831c09111"><enum>(3)</enum><text>the provision of other information technology systems and devices, such as computers, printers, and phones, for use by employees of the Intelligence Community Counterintelligence Office;</text></paragraph><paragraph id="id37c2d4f65393400792c4f472ac2647d0"><enum>(4)</enum><text>the assignment of employees of the intelligence community to support the operation of the Intelligence Community Counterintelligence Office; and</text></paragraph><paragraph id="id4f870bc6df0a4d8992107b40e0b9fabe"><enum>(5)</enum><text>the provision of other personal services necessary for the operation of the Intelligence Community Counterintelligence Office.</text></paragraph></subsection><subsection id="id3fcf4a19104c45b1b13bbf58c8944d02"><enum>(e)</enum><header>Deadline for establishment of the Intelligence Community Counterintelligence Office</header><paragraph id="id2ae26fdce730433cb517a940493cac24"><enum>(1)</enum><header>Establishment</header><text>Not later than January 1, 2028, the Director of National Intelligence shall seek to establish, in accordance with this section, the Intelligence Community Counterintelligence Office within the Department.</text></paragraph><paragraph id="id96bf6fd4f8c64b3f8a03f7fdb47ffe24"><enum>(2)</enum><header>Report</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence shall submit to the congressional intelligence committees, the Committee on Appropriations of the Senate, and the Committee on Appropriations of the House of Representatives a report on the plan to establish the Intelligence Community Counterintelligence Office required under paragraph (1). Such report shall include the costs and schedule associated with establishing the Intelligence Community Counterintelligence Office.</text></paragraph></subsection></section><section id="id1ef9a01a1d444980a0cc1ba10db2fadf" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>607.</enum><header>Countering hostile foreign cyber actors as a national intelligence priority</header><subsection id="idd01981590b52428a860ee306c90b90a2"><enum>(a)</enum><header>Findings</header><text>Congress finds the following: </text><paragraph id="id5864ee6bb2e5490288deae8891f738e1"><enum>(1)</enum><text>In 2025, foreign malicious cybercriminal organizations, such as foreign scam centers that engage in sophisticated investment fraud, cyber-enabled extortion activity, and impersonation-based fraud, stole at least $7,566,000,000 from Americans according to the Federal Bureau of Investigation’s Internet Crime Complaint Center, which has emphasized that these estimates are conservative and only includes losses reported to the Federal Bureau of Investigation.</text></paragraph><paragraph id="idb37e4790c7c44aca94eb8108f9abdb43"><enum>(2)</enum><text>According to the Consumer Federation of America, Americans are losing an estimated $119,000,000,000 each year to online scams.</text></paragraph><paragraph id="ida6d71881308b45a298d417a560c2d8de"><enum>(3)</enum><text>Investigative reporting, Federal indictments, and sanctions designations issued by the Department of the Treasury have revealed the extent to which foreign malicious cybercriminal organizations collaborate with foreign governments, illicit finance actors, and foreign militia groups whose activities present a threat to the economic and national security of the United States.</text></paragraph><paragraph id="idfa9c5303fc99469693ead723bd64bd02"><enum>(4)</enum><text>Foreign malicious cybercriminal organizations rely extensively on communications and financial services of United States companies, enabling the organizations' targeting of vulnerable Americans.</text></paragraph><paragraph id="idcc76822360a74cadbb1cdc6b14a3656c"><enum>(5)</enum><text>Financial insecurity generated by foreign malicious cybercriminal organizations presents a counterintelligence threat to the United States intelligence community.</text></paragraph></subsection><subsection id="id9e8205ed778742948dc541ab8cfc514c"><enum>(b)</enum><header>Sense of Congress</header><paragraph commented="no" display-inline="no-display-inline" id="ida7d8f5e7f0954952a8aa3e632eece7ae"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">It is the sense of Congress that—</text><subparagraph commented="no" display-inline="no-display-inline" id="id34c8bbf1735549a5931a6f0969135802"><enum>(A)</enum><text display-inline="yes-display-inline">foreign malicious cybercriminal organizations, and foreign affiliates associated with those organizations, constitute hostile foreign cyber actors and are valid targets for intelligence operations under existing intelligence authorities; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id069b80619bd84cb6aac0f9aaf4f64397"><enum>(B)</enum><text display-inline="yes-display-inline">the Director of National Intelligence should treat collection, analysis, and disruption toward hostile foreign cyber actors as a national intelligence priority as part of the National Intelligence Priorities Framework.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id579712a74a0d4cd1b7d0ae00f8f0ea5a"><enum>(2)</enum><header>Hostile foreign cyber actors</header><text display-inline="yes-display-inline">The hostile foreign cyber actors described in paragraph (1) include, at a minimum, the following: </text><subparagraph id="id9b31734a716e43908171b0ffcb669e9c"><enum>(A)</enum><text>Prince Group.</text></subparagraph><subparagraph id="idfdef04dced54419d8d512272912083e5"><enum>(B)</enum><text>Huione Group.</text></subparagraph><subparagraph id="id3796cbd48231475eb21accb9a637f33f"><enum>(C)</enum><text>L.Y.P. Group.</text></subparagraph><subparagraph id="id582db6c41dd340578cb2fe31b75bcaef"><enum>(D)</enum><text>Jin Bei Group.</text></subparagraph><subparagraph id="ida57b90b6f7524ee28b71a220e3f2ad18"><enum>(E)</enum><text>Funnull Technology Inc.</text></subparagraph><subparagraph id="idc74ea4a048a342348cc6fac1087af7c2"><enum>(F)</enum><text>TransAsia International holding Group Thailand Company Limited.</text></subparagraph><subparagraph id="id22932c8089f6404eb9b94b77736453e6"><enum>(G)</enum><text>The Democratic Karen Benevolent Army.</text></subparagraph><subparagraph id="id71e1746a82ee4f379dfa2b09cf0edb3d"><enum>(H)</enum><text>HH Bank Cambodia PLC.</text></subparagraph></paragraph></subsection><subsection id="idd99e1aa107b14a29a4659b1e292ad490"><enum>(c)</enum><header>Report</header><paragraph id="idb5ed01eca095495b934ee26289e68851"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Director of the Federal Bureau of Investigation, shall submit to Congress a report on hostile foreign cyber actors, such as foreign scam centers.</text></paragraph><paragraph id="ide3550d4974c54a31a73ff00a52d17c92"><enum>(2)</enum><header>Contents</header><text>The report required by paragraph (1) shall include the following:</text><subparagraph id="id88b0bf0d79534280a837ce9966f958cd"><enum>(A)</enum><text>An identification of the individuals and entities operating as hostile foreign cyber actors, including foreign scam centers, that pose the most significant threat.</text></subparagraph><subparagraph id="id8abb0ed897254e85a708c3368ea5b607"><enum>(B)</enum><text>An identification of the locations from which the individuals and entities identified under subparagraph (A) operate.</text></subparagraph><subparagraph id="ida505682be8424036bf568c530b731a21"><enum>(C)</enum><text>A description of the infrastructure, tactics, and techniques hostile foreign cyber actors, including foreign scam centers, commonly use, including reliance on any products or services subject to the jurisdiction of the United States.</text></subparagraph><subparagraph id="idb00c8cb1de94473d9cbae5ced546fafe"><enum>(D)</enum><text>A description of any relationships between the individuals and entities that operate as hostile foreign cyber actors, including foreign scam centers, and their governments or countries of origin that could impede the ability to counter threats from such centers.</text></subparagraph><subparagraph id="idb1a6ce004cf64a7e88dce7ff1e3a500f"><enum>(E)</enum><text>An identification of communications and financial services providers subject to the jurisdiction of the United States that provide enabling services to individuals and entities identified under subparagraph (A).</text></subparagraph><subparagraph id="id0871edb5d05f443190ab570144bbe0bb"><enum>(F)</enum><text>A description of any relationships that the individuals and entities identified under subparagraph (A) have with transnational organized crime groups.</text></subparagraph></paragraph><paragraph id="ida7b6eed279f04bc7b0ff0e534f40eb2c" commented="no" display-inline="no-display-inline"><enum>(3)</enum><header>Form; public availability</header><text>The report required by paragraph (1) shall be submitted in unclassified form, but may include a classified annex. The unclassified form of the report shall be made available to the public. </text></paragraph></subsection></section><section id="id6437a852e88c4ecabf8f6e30268cf625"><enum>608.</enum><header>Notification of criminal referrals regarding current or former intelligence community employees</header><subsection commented="no" display-inline="no-display-inline" id="idb99bba411c644fd78d30345b09c183e9"><enum>(a)</enum><header>In general</header><text>Title V of the National Security Act of 1947 ( <external-xref legal-doc="usc" parsable-cite="usc/50/3091">50 U.S.C. 3091 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id44ce56361ece448b9a4febd30bfd72f7"><section commented="no" display-inline="no-display-inline" id="id6f898ab4fd054cebaec231a3e7f32489"><enum>519.</enum><header>Notification of criminal referrals regarding current or former intelligence community employees</header><text display-inline="no-display-inline">If an element of the intelligence community makes a criminal referral to the Department of Justice regarding a current or former employee of any element of the intelligence community, the general counsel of the element of the intelligence community that made the referral shall notify the congressional intelligence committees of the referral on the date such referral is made and provide to the congressional intelligence committees a summary of the referral.</text></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id9d1d5315512445e481851cb2416347f4"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>) is amended by inserting after the item relating to section 518 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1dc0ade357b54938864c27a34de3badc"><toc regeneration="no-regeneration"><toc-entry level="section">Sec. 519. Notification of criminal referrals regarding current or former intelligence community employees.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id7254e508fa4340b38aa747304affb34f"><enum>609.</enum><header>Modification of definitions in National Security Act of 1947 and scope of intelligence sharing responsibilities of Director of National Intelligence</header><subsection commented="no" display-inline="no-display-inline" id="id71a541358bbe41e2934b473d3c514745"><enum>(a)</enum><header>Definitions</header><text>Section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idf10dc097b38446a2b17da9a62e6d472b"><enum>(1)</enum><text>in paragraph (1), by striking <quote>includes</quote> and inserting <quote>means</quote>; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id15c267b4f7684288b81e549f22d2740a"><enum>(2)</enum><text>in paragraph (5)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id193077232338412093cf4d2bc302bf20"><enum>(A)</enum><text display-inline="yes-display-inline">in the matter before subparagraph (A), by striking <quote>refer to all</quote> and inserting <quote>means</quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id46a06674b6de40b1824546af83d1fc62"><enum>(B)</enum><text display-inline="yes-display-inline">by amended subparagraph (B) to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ide790bc7665ba4bba8d3ffc46b5f7ea57"><subparagraph commented="no" display-inline="no-display-inline" id="id09de5fb6c1284d719a9053bac35d1118"><enum>(B)</enum><text>involves foreign threats to the United States, its people, property, or interests.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="ida12d6a2be5ce4343bc410893779d0b0a"><enum>(b)</enum><header>Scope of intelligence sharing responsibilities</header><text>Section 102A(f)(1) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024(f)(1)</external-xref>) is amended, in the first sentence, by inserting <quote>, and other Federal agencies as the Director considers appropriate,</quote> after <quote>community</quote>.</text></subsection></section><section id="idd3bd052fb3bb4975a796bdf9568d5bd4"><enum>610.</enum><header>Prohibition on intelligence community use of adversary unmanned ground vehicles</header><subsection commented="no" display-inline="no-display-inline" id="id9f342a2953aa4e14953e14e96bd9dc38"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph id="id5d2359669ab1412fa038c64218633cd3"><enum>(1)</enum><header>Covered foreign country</header><text>The term <term>covered foreign country</term> means any of the following:</text><subparagraph id="id344c54c7a0f448fea522a9d42295d3bc"><enum>(A)</enum><text>The People’s Republic of China.</text></subparagraph><subparagraph id="id93739fb9602d4e3db2ccb1db2ea383fc"><enum>(B)</enum><text>The Russian Federation.</text></subparagraph><subparagraph id="id8f808d6f002c4c0fb9fa525aeffd985c"><enum>(C)</enum><text>The Islamic Republic of Iran.</text></subparagraph><subparagraph id="id62456b1b1d764f5ea6faad3c471f0f15"><enum>(D)</enum><text>The Democratic People’s Republic of Korea.</text></subparagraph></paragraph><paragraph id="idf83fc71fb59e45e0bdd48ecbc5d3f147"><enum>(2)</enum><header>Covered foreign entity</header><text>The term <term>covered foreign entity</term> means an entity that is domiciled in a covered foreign country, or subject to influence or control by the government of a covered foreign country as determined by the Secretary of Homeland Security or the Secretary of Defense, and any subsidiary or affiliate of such an entity.</text></paragraph><paragraph id="iddabaf0a0322743628d4725fb0d6cdcb6"><enum>(3)</enum><header>Covered unmanned ground vehicle system</header><text>The term <term>covered unmanned ground vehicle system</term>—</text><subparagraph id="idc1654650b6e3454199e205449a0b347e"><enum>(A)</enum><text>means a mechanical device that—</text><clause id="id1145969ccdbd41618b50dae656e59ea9"><enum>(i)</enum><text>is capable of locomotion, navigation, or movement on the ground; and</text></clause><clause id="id6c28c7c0c89040f59a525b7d3ea9b4f2"><enum>(ii)</enum><text>operates at a distance from one or more operators or supervisors based on commands or in response to sensor data, or through any combination thereof; and</text></clause></subparagraph><subparagraph id="id0e6175a3da1b491faafefee022ce0a92"><enum>(B)</enum><text>includes—</text><clause id="id00610613cde14559aa23e46f28dddd0c"><enum>(i)</enum><text>remote surveillance vehicles, autonomous patrol technologies, mobile robotics, and humanoid robots; and</text></clause><clause id="idcb1e55c6d01940dbaafed02ffb29793e"><enum>(ii)</enum><text>the vehicle, its payload, and any external device used to control the vehicle.</text></clause></subparagraph></paragraph></subsection><subsection id="id9b19045b691443e4b43cc832070a2f40"><enum>(b)</enum><header>Prohibition on procurement of covered unmanned ground vehicle systems from covered foreign entities</header><paragraph id="id37b00f83a4bc497aac147f446640b6f5"><enum>(1)</enum><header>In general</header><text>Except as provided under paragraph (2), the head of an element of the intelligence community may not procure any covered unmanned ground vehicle system that is manufactured or assembled by a covered foreign entity.</text></paragraph><paragraph id="id1c2df76632ab4751bc1f3d13721a6487"><enum>(2)</enum><header>Exemption</header><text>The heads of elements of the intelligence community are exempt from the restriction under paragraph (1) if the procurement is required in the national interest of the United States and—</text><subparagraph id="id3c6768e43f4047c68482a69835371419"><enum>(A)</enum><text>is for the sole purposes of research, evaluation, training, testing, or analysis for electronic warfare, information warfare operations, cybersecurity, or development of unmanned ground vehicle system or counter-unmanned ground vehicle system technology;</text></subparagraph><subparagraph id="idd6bddb7a9308484c916240d8670835b5"><enum>(B)</enum><text>is for the sole purposes of conducting counterterrorism or counterintelligence activities, protective missions, or Federal criminal or national security investigations, including forensic examinations, or for electronic warfare, information warfare operations, cybersecurity, or development of an unmanned ground vehicle system or counter-unmanned ground vehicle technology; or</text></subparagraph><subparagraph id="id1b10a4a37854457e8c6202be75ff11a7"><enum>(C)</enum><text>is an unmanned ground vehicle system that, as procured or as modified after procurement but before operational use, can no longer transfer to, or download data from, a covered foreign entity and otherwise poses no national security cybersecurity risks as determined by the exempting official.</text></subparagraph></paragraph></subsection><subsection id="id9bfd25e3bfde46d3a448492a345571e0"><enum>(c)</enum><header>Prohibition on operation of covered unmanned ground vehicle systems from covered foreign entities</header><paragraph id="id21180d903bd1422284b723cccfbaabe6"><enum>(1)</enum><header>Prohibition</header><subparagraph id="idd294968d3ed2454b88e076c40c607d7d"><enum>(A)</enum><header>In general</header><text>Beginning on the date that is one year after the date of the enactment of this Act and except as provided in paragraph (2), no element of the intelligence community may operate a covered unmanned ground vehicle system manufactured or assembled by a covered foreign entity.</text></subparagraph><subparagraph id="id0cff79f9199447999710fc2769c060b2"><enum>(B)</enum><header>Applicability to contracted services</header><text>The prohibition under subparagraph (A) applies to any covered unmanned ground vehicle systems that are being used by any element of the intelligence community through the method of contracting for the services of covered unmanned ground vehicle systems.</text></subparagraph></paragraph><paragraph id="id0e5dd70027ea439fa3069ed4f4a41966"><enum>(2)</enum><header>Exemption</header><text>The heads of the elements of the intelligence community are exempt from the restriction under paragraph (1) if the operation is required in the national interest of the United States and—</text><subparagraph id="idecc196ad68fd4596a86250483a6485a0"><enum>(A)</enum><text>is for the sole purposes of research, evaluation, training, testing, or analysis for electronic warfare, information warfare operations, cybersecurity, or development of unmanned ground vehicle system or counter-unmanned ground vehicle system technology;</text></subparagraph><subparagraph id="id3965bdd57a2c49958add2ac335788429"><enum>(B)</enum><text>is for the sole purposes of conducting counterterrorism or counterintelligence activities, protective missions, or Federal criminal or national security investigations, including forensic examinations, or for electronic warfare, information warfare operations, cybersecurity, or development of an unmanned ground vehicle system or counter-unmanned ground vehicle system technology; or</text></subparagraph><subparagraph id="id0f32006bcccc4335bc013f813624ae38"><enum>(C)</enum><text>is an unmanned ground vehicle system that, as procured or as modified after procurement but before operational use, can no longer transfer to, or download data from, a covered foreign entity and otherwise poses no national security cybersecurity risks as determined by the exempting official.</text></subparagraph></paragraph></subsection><subsection id="idd06ac356ac144d0b9a7338a8cbb186d9"><enum>(d)</enum><header>Prohibition on use of Federal funds for procurement and operation within the intelligence community of covered unmanned ground vehicle systems manufactured by certain foreign entities</header><paragraph id="id44ad53148ea949548d539a2c3c4bbbf3"><enum>(1)</enum><header>In general</header><text>Beginning on the date that is one year after the date of the enactment of this Act and except as provided in paragraph (2), no Federal funds awarded to an element of the intelligence community through a contract, grant, or cooperative agreement, or otherwise made available may be used—</text><subparagraph id="id7858a6654f2645629e951f1e80309302"><enum>(A)</enum><text>to procure a covered unmanned ground vehicle system that is manufactured or assembled by a covered foreign entity; or</text></subparagraph><subparagraph id="id95bd0f5d965a42dca6c9dbb3986027c7"><enum>(B)</enum><text>in connection with the operation of such a robot or unmanned ground vehicle system.</text></subparagraph></paragraph><paragraph id="id2b3e241c6c104cb69e6d349a8f75dd76"><enum>(2)</enum><header>Exemption</header><text>The heads of elements of the intelligence community are exempt from the restriction under paragraph (1) if the procurement or operation is required in the national interest of the United States and—</text><subparagraph id="id189b72d9a90243998aeb76f7b781c340"><enum>(A)</enum><text>is for the sole purposes of research, evaluation, training, testing, or analysis for electronic warfare, information warfare operations, cybersecurity, or development of unmanned ground vehicle system or counter-unmanned ground vehicle system technology;</text></subparagraph><subparagraph id="ide253e5620c524a5287248c3828ea11af"><enum>(B)</enum><text>is for the sole purposes of conducting counterterrorism or counterintelligence activities, protective missions, or Federal criminal or national security investigations, including forensic examinations, or for electronic warfare, information warfare operations, cybersecurity, or development of an unmanned ground vehicle system or counter-unmanned ground vehicle system technology; or</text></subparagraph><subparagraph id="id4d2cd50c294e4bec9807775e283440a2"><enum>(C)</enum><text>is an unmanned ground vehicle system that, as procured or as modified after procurement but before operational use, can no longer transfer to, or download data from, a covered foreign entity and otherwise poses no national security cybersecurity risks as determined by the exempting official.</text></subparagraph></paragraph></subsection></section><section id="id62e350ff9a044838b9189e9bfc1b05ad"><enum>611.</enum><header>China-Taiwan Strategic Warning Task Force</header><subsection id="id93e115d75fcc4dbda823ae42c738c865"><enum>(a)</enum><header>Establishment</header><text>Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence and the Undersecretary of Defense for Intelligence and Security shall establish a task force to be known as the China-Taiwan Strategic Warning Task Force (referred to in this section as the <term>Task Force</term>) to lead the efforts of the intelligence community with respect to providing indications and warning of any military aggression by the People’s Republic of China against Taiwan.</text></subsection><subsection id="id4f3f1893eb1d4629aaceacc8a34f3f06"><enum>(b)</enum><header>Objectives</header><text>The objectives of the Task Force are the following:</text><paragraph id="id7b35b87b882b43cfaffe48f197e89652"><enum>(1)</enum><text>The synchronization of all intelligence community efforts related to China-Taiwan indications and warning, including the generation of indicators and development of collection requirements related to such indicators.</text></paragraph><paragraph id="idc1116c32fcca4bc983448f800b7f6b8b"><enum>(2)</enum><text>The coordination of analysis related to China-Taiwan indications and warning and the development of analytic methodologies for use across the intelligence community in conducting analysis related to China-Taiwan indications and warning.</text></paragraph><paragraph id="id0dbc25d5e69246889454bc3d1f049e2a"><enum>(3)</enum><text>The development and implementation of information technology solutions to synchronize the access of the intelligence community to information relating to indications and warning.</text></paragraph></subsection><subsection id="ida0dd1ffbbc9c4a67a0d9bd11c63679ae"><enum>(c)</enum><header>Membership</header><text>The Task Force shall be composed of the following members (or their designees):</text><paragraph id="idbeb569ee2ae34ceb8c796b0639443309"><enum>(1)</enum><text>The Director of National Intelligence.</text></paragraph><paragraph id="id0ee1d4534f7a413c89e0964d0d5fb0a7"><enum>(2)</enum><text>The Undersecretary of Defense for Intelligence and Security.</text></paragraph><paragraph id="id047c251c522c42f38d6bdf9110cd7a00"><enum>(3)</enum><text>The Director of the Defense Intelligence Agency.</text></paragraph><paragraph id="idc39002d8693747bfb6361261634dc528"><enum>(4)</enum><text>The Director of the Central Intelligence Agency.</text></paragraph><paragraph id="idf138d2f00f994630847ce49444a3d5e0"><enum>(5)</enum><text>The Director for Intelligence for the United States Indo-Pacific Command.</text></paragraph><paragraph id="id9775a67a62624217843e95208904780b"><enum>(6)</enum><text>The Director of the National-Geospatial Intelligence Agency.</text></paragraph><paragraph id="id42d1c9ec9d8c4226967872f7169065de"><enum>(7)</enum><text>The Director of the National Security Agency.</text></paragraph><paragraph id="id95a6dbb06e5b40e2b6b6abc2e6bb2a16"><enum>(8)</enum><text>The Assistant Secretary of the Treasury for Intelligence and Analysis.</text></paragraph><paragraph id="id02b535f8466843c1af728495a3259dae"><enum>(9)</enum><text>The Assistant Secretary of State for Intelligence and Research.</text></paragraph><paragraph id="idafcb93e5125b42de93a973fb556f3a71"><enum>(10)</enum><text>Such other heads of the elements of the intelligence community that the Director of National Intelligence and the Undersecretary of Defense for Intelligence and Security determine appropriate.</text></paragraph></subsection><subsection id="id7772f9a55c9745f58bd96ed1eed21eac"><enum>(d)</enum><header>Leadership; Organization; Meetings</header><paragraph id="id8f80d0e7d8b34c758d9cba63c280976f"><enum>(1)</enum><header>Co-chairs</header><text>The Director of National Intelligence (or a designee of the Director) and the Undersecretary of Defense for Intelligence and Security (or a designee of the Undersecretary) shall be co-chairs of the Task Force.</text></paragraph><paragraph id="id4228d34921a54dddb7a4cddff5b490cb"><enum>(2)</enum><header>Working groups</header><text>The Task Force may create subordinate working groups as determined by the co-chairs.</text></paragraph><paragraph id="idfbc78f38676a4153bae5be214ccf12ab"><enum>(3)</enum><header>Meeting frequency</header><text>The Task Force shall meet regularly but not less than quarterly.</text></paragraph></subsection><subsection id="id46c59cad106e45c994500f824e2dadd8"><enum>(e)</enum><header>Staffing</header><paragraph id="idcba5a27d9b0644069dba4e275e1fb3b6"><enum>(1)</enum><header>In general</header><text>The Task Force may hire staff and create joint duty assignments assigned to the Task Force. The Task Force may not exceed 25 full-time equivalent staff in total.</text></paragraph><paragraph id="ida5b81341c276450786afa8457afb3b4a"><enum>(2)</enum><header>Agency liaison</header><text>Each member listed in subsection (b) shall appoint a senior intelligence officer from the agency concerned to serve as a liaison to the Task Force. Such liaison shall be responsible for coordinating the participation and support of the agency concerned to the Task Force.</text></paragraph></subsection><subsection id="id739a505086244507af4c692a74fdc2d4"><enum>(f)</enum><header>Initial reports</header><text>. Not later than 180 days after the date of the enactment of this Act, the Task Force shall submit to the congressional intelligence committees and the congressional defense committees a report on the status of the Task Force, including—</text><paragraph commented="no" display-inline="no-display-inline" id="id2210b0486bcc46ab9c7144927a09c52b"><enum>(1)</enum><text display-inline="yes-display-inline">a summary of the efforts of the intelligence community with respect to China-Taiwan indications and warning;</text></paragraph><paragraph id="id56c42b6bfab141b6b155eb06ca11241c"><enum>(2)</enum><text>a summary of efforts by the Task Force to develop a common set of indicators and organize collection efforts by the intelligence community against such indicators;</text></paragraph><paragraph id="id6ce9b1f40a4a4140a1b57328f000881a"><enum>(3)</enum><text>a description of the resources provided by each Task Force member towards efforts with respect to China-Taiwan indications and warning, disaggregated by—</text><subparagraph commented="no" display-inline="no-display-inline" id="id14bfe390f7df4aecb0b1ef8b2f20317d"><enum>(A)</enum><text display-inline="yes-display-inline">dollars spent or planned to be spent during fiscal year 2027 ; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7f9f8e3cedc645358ebae8e5c165bcf0"><enum>(B)</enum><text>total full-time equivalent personnel; and</text></subparagraph></paragraph><paragraph id="id9258cda2d6e54b4abfea80439a56736a"><enum>(4)</enum><text>recommendations to improve the collection and analysis of the intelligence community with respect to China-Taiwan indications and warning.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="iddfa109c7fe184f159d47547d07ba398e"><enum>(g)</enum><header>Sunset</header><text>The provisions of this section shall terminate on the date that is 5 years after the date of the enactment of this Act.</text></subsection></section><section id="idedbf0214aba744e8a36585998eca1da9"><enum>612.</enum><header>Limitations relating to Chinese products and services</header><subsection commented="no" display-inline="no-display-inline" id="ida9cd2b60fcb4476991689adb2d3eaaee"><enum>(a)</enum><header display-inline="yes-display-inline">Prohibition on use by intelligence community</header><paragraph commented="no" display-inline="no-display-inline" id="id80e20e5722af411dbe1fc500f0157b02"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Paragraph (1) of subsection (e) of section 6604 of the Intelligence Authorization Act for Fiscal Year 2026 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334m">50 U.S.C. 3334m</external-xref> note; division F of <external-xref legal-doc="public-law" parsable-cite="pl/119/60">Public Law 119–60</external-xref>) is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id2144fa6737cf4f22af2e6adb27e68b2c"><paragraph commented="no" display-inline="no-display-inline" id="idd2da769a81954b3497739312e491624c"><enum>(1)</enum><header>Covered application</header><text>The term <term>covered application</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="id2b0fc01d13134933803677518e3b7095"><enum>(A)</enum><text display-inline="yes-display-inline">the DeepSeek application or any successor application or service; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id77747f0bf63645e295b6909630672de7"><enum>(B)</enum><text display-inline="yes-display-inline">any product or service from any entity of the People's Republic of China that is included on—</text><clause id="id6124a93f9b454ce49ee35e64a07d2a2e"><enum>(i)</enum><text>the Entity List maintained by the Bureau of Industry and Security of the Department of Commerce;</text></clause><clause id="id79d2b45241eb46b4bec2e9291b39facb"><enum>(ii)</enum><text>the list (sometimes known as the <quote>Non-SDN Chinese Military-Industrial Complex Companies List</quote>) maintained by the Office of Foreign Assets Control of the Department of the Treasury under Executive Order 13959, as amended by Executive Order 14032 (<external-xref legal-doc="usc" parsable-cite="usc/50/1701">50 U.S.C. 1701</external-xref> note; relating to addressing the threat from securities investments that finance certain companies of the People’s Republic of China), or any successor order; or</text></clause><clause id="ide116389aa494409c96e24f93d07956ed"><enum>(iii)</enum><text>the list of Chinese military companies required under section 1260H of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/10/113">10 U.S.C. 113</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/116/283">Public Law 116–283</external-xref>) and maintained by the Department of Defense.</text></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0b629dd3e43c427690e872022e5c29d0"><enum>(2)</enum><header>Conforming amendment</header><text>The heading for such section is amended by striking <quote><header-in-text style="OLC" level="section">DeepSeek</header-in-text></quote> and inserting <quote><header-in-text style="OLC" level="section">products and services from People's Republic of China</header-in-text></quote>.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id5894d196927040f8a9df278ea2622ff4"><enum>(b)</enum><header>Limitation on procurement by intelligence community</header><text display-inline="yes-display-inline">Section 414 of the Intelligence Authorization Act for Fiscal Year 2022 (<external-xref legal-doc="usc" parsable-cite="usc/28/532">28 U.S.C. 532</external-xref> note; division X of <external-xref legal-doc="public-law" parsable-cite="pl/117/103">Public Law 117–103</external-xref>) is amended—</text><paragraph id="id7fd5a1924f5a42e99e089884768f7294"><enum>(1)</enum><text>in the section heading, by striking <quote><header-in-text style="OLC" level="section">by Federal Bureau of Investigation</header-in-text></quote>; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id595edd1c7ad54d349db8c0bd080d1182"><enum>(2)</enum><text>in subsection (a)—</text><subparagraph commented="no" display-inline="no-display-inline" id="idf961b8feaba445fd9dee6bf4a1cf0fda"><enum>(A)</enum><text>in the matter before paragraph (1), by striking <quote>Director of the Federal Bureau of Investigation</quote> and inserting <quote>head of an element of the intelligence community</quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5e020165dd204f278a176436d8bb38d6"><enum>(B)</enum><text>in paragraph (1), by striking <quote>Federal Bureau of Investigation</quote> and inserting <quote>element</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf37b4e699f9041b3a0a532bf80b8cf9b"><enum>(C)</enum><text>in paragraph (3), by striking <quote>Director (or a designee of the Director)</quote> and inserting <quote>head</quote>;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id89bb1dff817f4ef4a7a327875fa8aba8"><enum>(3)</enum><text>in subsection (b), by striking <quote>the Director (or a designee of the Director, as applicable) approves a recommendation pursuant to subsection (a)(3), the Director shall</quote> and inserting <quote>the head of an element of the intelligence community approves a recommendation pursuant to subsection (a)(3), the head shall</quote>; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida361268871004487875fef4375c96327"><enum>(4)</enum><text>in subsection (c), by amending paragraph (2) to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id971338018f7c4a02b6255d37db09b253"><paragraph id="id04edc3df41094acd89acf25237d9a30d"><enum>(2)</enum><header>People's Republic of China product or service</header><text>The term <term>People's Republic of China product or service</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="id124230c99bd741a7a3fa6c57ca63ed52"><enum>(A)</enum><text display-inline="yes-display-inline">an information or communication technology product manufactured in China, Hong Kong, or Macau and designed, developed, or maintained by a firm that is domiciled in China, Hong Kong, or Macau; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc5fb83d2f19a4a56a44f2cac7718226f"><enum>(B)</enum><text display-inline="yes-display-inline">an information or communication technology product or service provided or manufactured by—</text><clause commented="no" display-inline="no-display-inline" id="ida7ddf2d7f0c84f97831a63bf2b17a342"><enum>(i)</enum><text display-inline="yes-display-inline">an entity that is fully or partially owned or controlled by, or otherwise connected to, the government of China; or</text></clause><clause commented="no" display-inline="no-display-inline" id="ideb6465954fd94272bb072b5ace2cc707"><enum>(ii)</enum><text display-inline="yes-display-inline">an entity included on the list submitted by the Director of National Intelligence under section 6706(c) of the Intelligence Authorization Act for Fiscal Year 2026 (division F of <external-xref legal-doc="public-law" parsable-cite="pl/119/60">Public Law 119–60</external-xref>; 139 Stat. 1648).</text></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="idd069045c8f0b4ad39697065028a2d44d"><enum>613.</enum><header>Limitation on intelligence community support for offensive cyber operations conducted by nongovernmental entities</header><subsection commented="no" display-inline="no-display-inline" id="idf6098ca3574a44a3b6cd946ab66e8ecd"><enum>(a)</enum><header>In general</header><text>The National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block id="id0857D73C4C4148818E5A5C30DA50019E" style="OLC" act-name=""><section id="id8531162F9D694F06806B5D0B3B0D0A0E"><enum>1115.</enum><header>Limitation on intelligence community support for offensive cyber operations conducted by nongovernmental entities</header><subsection commented="no" display-inline="no-display-inline" id="id4dce4b3292844266b16ac744fba8f7de"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">An element of the intelligence community may not provide intelligence or support for an offensive cyber operation conducted by a nongovernmental entity, unless such an entity—</text><paragraph commented="no" display-inline="no-display-inline" id="ide0769cd723a04d259e0783b79837a82f"><enum>(1)</enum><text display-inline="yes-display-inline">is conducting the offensive cyber operation on behalf of such element and is operating under the authorities and supervision of such element; or </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id618fde56f86a4e5c80973680031d7127"><enum>(2)</enum><text>is otherwise authorized by the President of the United States to conduct the offensive cyber operation. </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id3a580cf5a05c43cc8f033062d49079c9"><enum>(b)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="id916d95acad0b4bfa81d1c3692a6d444a"><enum>(1)</enum><header display-inline="yes-display-inline">Nongovernmental entity</header><text display-inline="yes-display-inline">The term <term>nongovernmental entity</term> means any entity that is not an entity of the United States Government.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idcec14aab76bd4080b1a4253201c871e1"><enum>(2)</enum><header>Offensive cyber operation</header><text>The term <term>offensive cyber operation</term> means any activity carried out in cyberspace, or any associated preparatory action, that affects an information system, network, or any other computer infrastructure that is not owned or lawfully operated by the entity carrying out the activity or action.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id7018a7183b1c4b2994f8e2a9ee2b624d"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of such Act is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id74a1f290cc654797b9d514476fd20e54"><toc><toc-entry level="section" bold="off">Sec. 1115. Limitation on intelligence community support for offensive cyber operations conducted by nongovernmental entities.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id7bee78aa7a8c42d7aecc70ddaf1e48dd"><enum>614.</enum><header>Biological intelligence activities of the intelligence community</header><subsection commented="no" display-inline="no-display-inline" id="idb47179446ad241b59c7bb1431d5491a8"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text>Title I of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3021">50 U.S.C. 3021 et seq.</external-xref>) is amended by adding at the end the following: </text><quoted-block id="id2d18a5122dc74f5a99297c3670e22e81" style="OLC" act-name=""><section id="id2fe22c876458458694ff3b26385d5e14"><enum>124. </enum><header>Biological intelligence activities of the intelligence community</header><subsection id="ida6ee3446358840388508f71430ed64c3"><enum>(a)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph id="id649dea143e2a4c8cbc6e8b6a4a52dae0"><enum>(1)</enum><header>Biological data</header><text>The term <term>biological data</term> means multiomic information and other relevant information, including associated descriptors, derived from the structure, function, or process of a biological system, that is measured, collected, or aggregated for analysis, including information from humans, animals, plants, or microbes.</text></paragraph><paragraph id="id3f3bebea0c5046a69dfb6b03c9a862bf"><enum>(2)</enum><header>Biological intelligence</header><text>The term <term>biological intelligence</term> includes the information collected or disseminated by the intelligence community concerning biological threats through genomic surveillance, immunological monitoring, environmental sampling, multiomic analysis, and other scientific methodologies. </text></paragraph><paragraph id="idf431911843fe4aadb7fb4e918855b1db" commented="no"><enum>(3)</enum><header>Biological threat</header><text>The term <term>biological threat</term> includes any naturally occurring infectious disease, engineered pathogen, toxin, or other biological agent that poses a risk to human, animal, or plant health or to the national security of the United States.</text></paragraph></subsection><subsection id="id6dfade4e59a84581a0655ebfebcbe9f7"><enum>(b)</enum><header>Determination; dissemination</header><text>The Director of National Intelligence, in such coordination with the Secretary of Defense as the Director considers appropriate, shall, consistent with applicable Federal law and Executive Order 12333 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001</external-xref> note; relating to United States intelligence activities)—</text><paragraph id="ide9510c9713ad4a409207a52a8319ac49"><enum>(1)</enum><text>determine which United States agencies would benefit from receiving anonymized biological data and biological intelligence in support of detection, characterization, and attribution of foreign biological threats; and</text></paragraph><paragraph id="id8b5b9bc971134419bf38623b0a453148"><enum>(2)</enum><text>disseminate such anonymized biological data and biological intelligence to agencies identified under paragraph (1).</text></paragraph></subsection><subsection id="id7b857f756a4145b1a4c3880a48b5aa32"><enum>(c)</enum><header>Standards; databases</header><text>Not later than 1 year after the date of the enactment of this section, the Director of National Intelligence, in such coordination with the Secretary of Defense as the Director considers appropriate, shall—</text><paragraph id="idffb9b5252c6248c092dd9e904597632b"><enum>(1)</enum><text>ensure standards for the collection and data formats of anonymized biological data and biological intelligence are, to the extent possible, consistent with standards used by other United States agencies, including by—</text><subparagraph id="id0761d391a0af40128ae97187eed62051"><enum>(A)</enum><text>providing for standardized data categorization and tagging of biological data;</text></subparagraph><subparagraph id="id7a067177a05044a79d01640ee2a17834"><enum>(B)</enum><text>considering standardized scientific and laboratory equipment and data collection methodologies; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id155746104541455d9b7fc1ef84055c89"><enum>(C)</enum><text>minimizing collection of any biological data that is likely to contain biological or genomic information specific to any United States person, including any derived data that is specific to any United States person; and</text></subparagraph></paragraph><paragraph id="idaf0caf137f954ab5bab04b922808a450"><enum>(2)</enum><text>facilitate the establishment and maintenance of streamlined and unified accesses to databases of biological intelligence collected by the intelligence community or the Department of Defense.</text></paragraph></subsection><subsection id="idff83cefaf6e64d8397e5ad8f45837cbc"><enum>(d)</enum><header>Priority</header><text>In carrying out subsections (b) and (c), the Director of National Intelligence shall prioritize supporting capabilities, including the development of technical tools, that enable the early detection, characterization, and attribution of naturally occurring, novel, or engineered pathogens that could threaten the United States.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idfe315cc4d0224516b3addc8e2ba60e1c"><enum>(b)</enum><header display-inline="yes-display-inline">Clerical amendment</header><text>The table of contents of such Act is amended by inserting after the item relating to section 123 the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id6fe4767cb45546c286e8a3e06abd58d0"><toc><toc-entry level="section" bold="off">Sec. 124. Biological intelligence activities of the intelligence community.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idf471336622bc44ffb713c348aa3502dc" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>615.</enum><header>Prohibition on participation in prediction markets</header><subsection commented="no" display-inline="no-display-inline" id="idadf4a7f465814d3ba7d5b772f6388087"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text>Title III of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3071">50 U.S.C. 3071 et seq.</external-xref>) is amended by inserting after section 304 the following:</text><quoted-block id="id71701711357749DFA88D8B35E451B9D5" style="OLC" act-name=""><section id="id9B900CCBBE8443599B5DC7E5F526B956"><enum>304A.</enum><header>Prohibition on participation in prediction markets</header><subsection commented="no" display-inline="no-display-inline" id="id233719a9ef6f4dd4a3bb8e6b9d5fbbe4"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Except as may be necessary to conduct authorized intelligence activities, a covered individual may not participate in a prediction market on any topic relating to nonpublic information to which the covered individual has access by virtue of being a covered individual, during—</text><paragraph commented="no" display-inline="no-display-inline" id="id8c3ba860630248b2b64ac5cb990be4b9"><enum>(1)</enum><text display-inline="yes-display-inline">the period during which the covered individual is employed or contracted by an element of the intelligence community; or </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idfbcbbb4099454c26ab5ab4f87b5ef82f"><enum>(2)</enum><text>the two-year period beginning on the date on which the covered individual ceases to be employed or contracted by such an element.</text></paragraph></subsection><subsection id="id6cf6d82f459d4e49a40ea1760008af3a"><enum>(b)</enum><header>Policy</header><text>Not later than 45 days after the date of the enactment of this section, the Director of National Intelligence shall issue a policy implementing the prohibition in subsection (a), including—</text><paragraph commented="no" display-inline="no-display-inline" id="id115b840254234eadb2a6040e54701b45"><enum>(1)</enum><text display-inline="yes-display-inline">establishing appropriate penalties for violating the prohibition; and </text></paragraph><paragraph id="iddb0085aeeaa2439d9654c8e5abf9954f"><enum>(2)</enum><text>providing notice to all covered individuals.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id0ec687ee2bbc4130b8998744e83ca295"><enum>(c)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="id946b4981e580486491b6ea084ae8eadc"><enum>(1)</enum><header>Covered individual</header><text display-inline="yes-display-inline">The term <term>covered individual</term> means an employee or contractor, or a former employee or contractor, of an element of the intelligence community who holds a security clearance. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idab8703d2b93442ae83bcca7e6ac53c5b"><enum>(2)</enum><header>Prediction market</header><text display-inline="yes-display-inline">The term <term>prediction market</term> means a platform, company, or service that allows agreements, contracts, transactions, or swaps between users over the outcome of non-financial future events, such as sports, military actions, and elections.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idf1c8113e51474d44bd95ffbd1ec61ffa"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of such Act is amended by inserting after the item relating to section 304 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ida3a9ac1d0e6140bba651a0afac6c3c44"><toc><toc-entry level="section" bold="off">Sec. 304A. Prohibition on participation in prediction markets.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id6169a9e96df740dd901c7adcb41a0a4a"><enum>616.</enum><header>Repeal of certain report and briefing requirements</header><subsection commented="no" display-inline="no-display-inline" id="idc5fd55c757a84e7498a09450f290b629"><enum>(a)</enum><header display-inline="yes-display-inline">Oversight of foreign influence in academia</header><text>Section 5713 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3369b">50 U.S.C. 3369b</external-xref>) is repealed.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id519c8015956d4638bc702c90a39e0558"><enum>(b)</enum><header display-inline="yes-display-inline">Report on efforts to illicitly acquire satellites and related items</header><text>Section 1261 of the National Defense Authorization Act for Fiscal Year 2013 (<external-xref legal-doc="usc" parsable-cite="usc/22/2778">22 U.S.C. 2778</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/112/239">Public Law 112–239</external-xref>) is amended by striking subsection (e).</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id4d0fb14ddd0c4cc78b64119165bc389f"><enum>(c)</enum><header>Monitoring mineral investments under Belt and Road Initiative of the People's Republic of China</header><text>Section 7003 of the Energy Act of 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3372">50 U.S.C. 3372</external-xref>) is amended by striking subsection (d). </text></subsection><subsection commented="no" display-inline="no-display-inline" id="id665eb4d56b144759adafe39e9e2e996f"><enum>(d)</enum><header display-inline="yes-display-inline">Briefing on protocols for certain intelligence community employees and dependents</header><text>Section 605(g) of the Intelligence Authorization Act for Fiscal Year 2022 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334k">50 U.S.C. 3334k(g)</external-xref>) is amended by striking paragraph (3).</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idfc559e68cd744e338ac8190980e71f5f"><enum>(e)</enum><header>Program on use of intelligence resources in efforts to sanction foreign opioid traffickers</header><text display-inline="yes-display-inline">Section 7231 of the Fentanyl Sanctions Act (<external-xref legal-doc="usc" parsable-cite="usc/21/2331">21 U.S.C. 2331</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id99c305fd860145f488ab83608d1d93a3"><enum>(1)</enum><text display-inline="yes-display-inline">by striking subsection (c); and </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id604a96acff3b4f46bf6fd44253fc2dca"><enum>(2)</enum><text>by redesignating subsection (d) as subsection (c).</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idefe5d02bd3d54b7398b8ed816a9a17a1"><enum>(f)</enum><header display-inline="yes-display-inline">Periodic report on positions in the intelligence community that can be conducted without access to classified information, networks, or facilities</header><text>Section 6610 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3352e">50 U.S.C. 3352e</external-xref>) is repealed.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idf6b3b3721f134b13ae37e07f4dca8869"><enum>(g)</enum><header display-inline="yes-display-inline">Review of shared information technology services for personnel vetting</header><text>Section 7701 of the Intelligence Authorization Act for Fiscal Year 2024 (division G of <external-xref legal-doc="public-law" parsable-cite="pl/118/31">Public Law 118–31</external-xref>; 137 Stat. 1100) is repealed. </text></subsection><subsection commented="no" display-inline="no-display-inline" id="idf37607978fd34d37aa7c56183730b5de"><enum>(h)</enum><header display-inline="yes-display-inline">Supply Chain and Counterintelligence Risk Management Task Force</header><text>Section 6306 of the Damon Paul Nelson and Matthew Young Pollard Intelligence Authorization Act for Fiscal Years 2018, 2019, and 2020 (<external-xref legal-doc="usc" parsable-cite="usc/50/3370">50 U.S.C. 3370</external-xref>) is amended by striking subsection (e). </text></subsection><subsection commented="no" display-inline="no-display-inline" id="idf788ad09c85b4294a6bacf022eacac27"><enum>(i)</enum><header>Report on best practices to protect privacy, civil liberties, and civil rights of Chinese Americans</header><text>Section 620 of the Intelligence Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/50/3240">50 U.S.C. 3240</external-xref>) is repealed.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id42b89f670197431c9daa5eca701e58ad"><enum>(j)</enum><header>Enforcement of cybersecurity requirements for national security systems; report on exemptions</header><text>Section 6309(f) of the Intelligence Authorization Act for Fiscal Year 2023 (<external-xref legal-doc="usc" parsable-cite="usc/44/3557">44 U.S.C. 3557</external-xref> note; division F of <external-xref legal-doc="public-law" parsable-cite="pl/117/263">Public Law 117–263</external-xref>) is amended by striking paragraph (3).</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id291ae377acf94098be92eaac8ec00d9f"><enum>(k)</enum><header>Report on collaboration between intelligence community and Department of Commerce to counter foreign commercial threats</header><text>Section 6514(b) of the Intelligence Authorization Act for Fiscal Year 2023 (<external-xref legal-doc="usc" parsable-cite="usc/50/3370b">50 U.S.C. 3370b(b)</external-xref>) is amended by striking paragraph (6).</text></subsection><subsection id="id21209ec4103048308e71dc1188c95519"><enum>(l)</enum><header>Timeliness standard for rendering determinations of trust for personnel vetting; reviews</header><text>Section 7702(a) of the Intelligence Authorization Act for Fiscal Year 2024 (<external-xref legal-doc="usc" parsable-cite="usc/50/3352h">50 U.S.C. 3352h(a)</external-xref>) is amended by striking paragraph (2).</text></subsection><subsection id="idbd7b8d7b012b4eda99780ba5a4f197c4"><enum>(m)</enum><header>Briefings on status of Intelligence Community Innovation Unit</header><text>Subsections (c) and (d) of section 7502 of the Intelligence Authorization Act for Fiscal Year 2024 (<external-xref legal-doc="public-law" parsable-cite="pl/118/31">Public Law 118–31</external-xref>; 137 Stat. 1082) are repealed.</text></subsection><subsection id="id6d51fa7b388c4f80b1059d567806ce40"><enum>(n)</enum><header>Annual training requirement and report regarding analytic standards</header><text>Section 6312 of the Intelligence Authorization Act for Fiscal Year 2023 (<external-xref legal-doc="usc" parsable-cite="usc/50/3364">50 U.S.C. 3364</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/117/263">Public Law 117–263</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idba10996c38f244cbb08802f2bc9398a0"><enum>(1)</enum><text display-inline="yes-display-inline">by striking subsections (c) and (d); and </text></paragraph><paragraph id="id85ca57ab13534453a3c470a9b07dd25b" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text display-inline="yes-display-inline">by redesignating subsections (e) and (f) as subsections (c) and (d), respectively.</text></paragraph></subsection><subsection id="id8a0b82fe012940f8812813dd4b34edb9"><enum>(o)</enum><header>Annual reports regarding intelligence community public-private talent exchanges</header><text>Section 6506 of the Intelligence Authorization Act for Fiscal Year 2025 (<external-xref legal-doc="public-law" parsable-cite="pl/118/159">Public Law 118–159</external-xref>; 138 Stat. 2497) is amended by striking subsection (e).</text></subsection><subsection id="idd85911d7d3704f1cbcb7512ed6192dba"><enum>(p)</enum><header>Software licensing</header><text>Section 109 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3044">50 U.S.C. 3044</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idb9061c73f59540cfb8111cbfe51ab745"><enum>(1)</enum><text display-inline="yes-display-inline">by striking subsection (c); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7ef904712ee9497ba2f6ab48cc6e8648"><enum>(2)</enum><text>by redesignating subsection (d) as subsection (c).</text></paragraph></subsection><subsection id="id14eaed1649684dc2aaa946f6837aca54"><enum>(q)</enum><header>Review and update of position designation guidance</header><text>Section 7 of the SECRET Act of 2018 (<external-xref legal-doc="public-law" parsable-cite="pl/115/173">Public Law 115–173</external-xref>; 132 Stat. 1294) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="ide3c74f0ec64549998d79792aa81ef5cb"><enum>(1)</enum><text display-inline="yes-display-inline">by striking subsection (c); and</text></paragraph><paragraph id="idc60f55fb9aa84143995241a0c68a0663" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text>by redesignating subsection (d) as subsection (c).</text></paragraph></subsection><subsection id="id90b50e554ae645a29928518abf539883"><enum>(r)</enum><header>Report on independent study on economic impact of military invasion of Taiwan by People’s Republic of China</header><text>Section 7407 of the Intelligence Authorization Act for Fiscal year 2024 (<external-xref legal-doc="public-law" parsable-cite="pl/118/31">Public Law 118–31</external-xref>; 137 Stat. 1075) is amended— </text><paragraph commented="no" display-inline="no-display-inline" id="id62e1598d627b4f2fa3c55bd6469f76ea"><enum>(1)</enum><text display-inline="yes-display-inline">by striking subsection (c); and</text></paragraph><paragraph id="id0d3a4ead098043f4be6731a25da83ef8" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text>by redesignating subsection (d) as subsection (c).</text></paragraph></subsection></section><section id="id6da323c8dd43494fad606801a4fea656"><enum>617.</enum><header>Intelligence community personnel travel, allowances, and related expenses regulations</header><subsection commented="no" display-inline="no-display-inline" id="id99754753a8aa4dc48ad4b18a1ab81236"><enum>(a)</enum><header display-inline="yes-display-inline">Central Intelligence Agency</header><text display-inline="yes-display-inline">Section 4 of the Central Intelligence Act of 1949 (<external-xref legal-doc="usc" parsable-cite="usc/50/3505">50 U.S.C. 3505</external-xref>) is amended by adding at the end the following new subsection:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idbfaa916aeeaf44dab392a56d7e37d5c9"><subsection id="idde7d1602365045679344d6705fd30cb2"><enum>(c)</enum><header>Biennial reviews and reports</header><text>Not later than September 30, 2027, and not less frequently than once every 2 years thereafter, the Director shall—</text><paragraph commented="no" display-inline="no-display-inline" id="iddaf475b2ef0b488b99fdfadd41cbf194"><enum>(1)</enum><text display-inline="yes-display-inline">review the regulations covered by this section; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id666383abb52244d1983ba0c8110db1ab"><enum>(2)</enum><text display-inline="yes-display-inline">not later than 10 days after completing a review under paragraph (1), submit to the congressional intelligence committees the findings of the Director with respect to the review, including identification of any changes to the regulations or personnel coverage thereof that the Director determines to be necessary for the performance of intelligence functions.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id56f9373ed6ad4e4e8b4f299ccdcabdde"><enum>(b)</enum><header>Office of Director of National Intelligence</header><text>Section 102A of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024</external-xref>) is amended by adding at the end the following new subsection:</text><quoted-block id="id8ec18870713c484ead1893a917f9bf17" display-inline="no-display-inline" style="OLC"><subsection id="id32cbd83bbb4b4098854810f3ef833af5"><enum>(z)</enum><header>Biennial reviews and reports regarding intelligence community personnel travel, allowances, and related expenses regulations</header><text>Not later than September 30, 2027, and not less frequently than once every 2 years thereafter, in order to reflect the requirements of the Office of the Director of National Intelligence not taken into account in the formulation of Government-wide travel procedures covered by this section, the Director shall—</text><paragraph commented="no" display-inline="no-display-inline" id="idfceb3c632a3245c8aabf1ff079baef25"><enum>(1)</enum><text display-inline="yes-display-inline">review such requirements; and</text></paragraph><paragraph id="id8b5f7bfc676243f8ae3da95b6b885468" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text display-inline="yes-display-inline">not later than 10 days after completing a review under paragraph (1), submit to the congressional intelligence committees the findings of the Director with respect to the review, including any regulations that the Director determines to be necessary for the performance of intelligence functions.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idc9f519e569ed4501911225d5d6f2d6f2"><enum>618.</enum><header>Prohibition on sending and receiving objects using entities owned or controlled by persons or governments of certain countries</header><subsection commented="no" display-inline="no-display-inline" id="id3d20c91bdabb4b488c26f576565b45f3"><enum>(a)</enum><header>Definition of covered nation</header><text>In this section, the term <term>covered nation</term> has the meaning given such term in section 4872(f) of title 10, United States Code.</text></subsection><subsection id="id5d60949537874bfba78fcf47449d19b8"><enum>(b)</enum><header>In general</header><paragraph commented="no" display-inline="no-display-inline" id="id93020c5d732540dcb1f66b0b332f01a4"><enum>(1)</enum><header>List required</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency, shall develop a list of products, intellectual property, technology, and any other objects that the Directors determine—</text><subparagraph id="ide12b24cf15d5454992ab3c63c0176e6e"><enum>(A)</enum><text>affect the national security of the United States; and</text></subparagraph><subparagraph id="idfbf7fb5b53e1427898f5af905275eb51"><enum>(B)</enum><text>if acquired by a covered nation, would pose a threat to the national security of the United States.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1ab0e943f9ad4fb5a1dbbee0c0d595f8"><enum>(2)</enum><header>Form</header><text>The list required by paragraph (1) may be in classified form.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id56e4a8d6d4904e9fa5f870c3f02d2ecf"><enum>(c)</enum><header>Prohibition</header><text display-inline="yes-display-inline">Except as provided in subsection (d), no element of the intelligence community may send or receive any product, intellectual property, technology, or other object as identified pursuant to subsection (b) within the United States using an entity, including any shipping company, that is owned or substantially controlled by a person or a governmental entity domiciled in a covered nation.</text></subsection><subsection id="id8f49287f67144ae69aa6522421ae5bc7"><enum>(d)</enum><header>Waiver</header><text>The head of an element of the intelligence community—</text><paragraph commented="no" display-inline="no-display-inline" id="idefcc635bf45449ca9b1e0c97a6dc8679"><enum>(1)</enum><text display-inline="yes-display-inline">may waive the prohibition in subsection (c) for the element on a case by case basis if the head determines that in the particular case, sending or receiving any product, intellectual property, technology, or other object by an entity identified pursuant to subsection (b) is necessary for the national security of the United States; and </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id11f79b57cf9d40e89dcc1525332e2dd5"><enum>(2)</enum><text display-inline="yes-display-inline">not later than 3 days after issuing such waiver, shall notify the Director of National Intelligence of the waiver.</text></paragraph></subsection><subsection id="idf09c161a5ae74a3a904c539c7eee1a8f"><enum>(e)</enum><header>Notification</header><text>Not later than 30 days after the head of an element of the intelligence community issues a waiver described in subsection (d), such head shall submit to the congressional intelligence committees a written notice of the waiver, which shall include—</text><paragraph commented="no" display-inline="no-display-inline" id="idd8eb9d65375e479fb71c495aea288bde"><enum>(1)</enum><text display-inline="yes-display-inline">a justification for the waiver, including the product, intellectual property, technology, or other object subject to the waiver; and </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4ac1109c09454c6cbb220535176cb88d"><enum>(2)</enum><text display-inline="yes-display-inline">a description of the national security threat mitigation measures implemented for permitting the activity that otherwise would be prohibited under subsection (c).</text></paragraph></subsection></section><section id="idFAEDD3EC0A3C4E58BD581F2D1ADB2FF2"><enum>619.</enum><header>Enhancing intelligence cooperation in the Indo-Pacific region</header><subsection id="idaa3adae1a3cc449eb5208ac476632547"><enum>(a)</enum><header>Definition of intelligence cooperation</header><text>In this section, the term <term>intelligence cooperation</term> means activities authorized under the provisions of law administered by the heads of the elements of the intelligence community, including the collection, analysis, production, and dissemination of information, intelligence, and imagery.</text></subsection><subsection id="ide323c3d788304044a5717864c96dbd46"><enum>(b)</enum><header>Statement of policy</header><text>It is the policy of the United States to consider intelligence cooperation with allies and partners of the United States in the Indo-Pacific region a priority national security investment that will help deter aggression, reinforce regional stability, and reduce the risk of miscalculation, all of which will advance the national security and economic prosperity of the United States by helping to ensure a free and open Indo-Pacific region.</text></subsection><subsection id="id67feccb4ba53460e9cd2bd3ec9cb3f1b"><enum>(c)</enum><header>Requirements</header><paragraph id="id20ccfef7ae9f40b69566ae8b86466911"><enum>(1)</enum><header>In general</header><text>The Director of National Intelligence shall, acting in close coordination with such heads of elements of the intelligence community as the Director considers relevant and the members of the Five Eyes intelligence-sharing alliance, undertake efforts to bolster and improve—</text><subparagraph commented="no" display-inline="no-display-inline" id="id4e8e660c6832424fbb7903c7c9907a10"><enum>(A)</enum><text display-inline="yes-display-inline">the intelligence foundations of alliances between the United States and Australia, Japan, New Zealand, the Philippines, the Republic of Korea, and Thailand; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id245f2356e7b440dcaf80ed2b4fa6459c"><enum>(B)</enum><text display-inline="yes-display-inline">intelligence cooperation between the United States and other regional partners, such as India and Vietnam.</text></subparagraph></paragraph><paragraph id="idd4bd63a661494c69aebd663e76ad34a9"><enum>(2)</enum><header>Priority areas for enhanced cooperation</header><text>Efforts undertaken pursuant to paragraph (1) shall include efforts—</text><subparagraph id="id32e3d37d128c4224a8d6481f42f90d56"><enum>(A)</enum><text>to address the speed and complexity of potential strategic and operational contingencies in the Indo-Pacific region, including any scenarios involving adversarial efforts to limit the freedom of navigation through critical maritime chokepoints threaten supply chain security;</text></subparagraph><subparagraph id="idee766a22e97f4d38b39617d0b40e4455"><enum>(B)</enum><text>relatedly, to ensure shared situational awareness across the full spectrum of potential contingencies, including military indications and warnings;</text></subparagraph><subparagraph id="iddcd242ae097244e9b3d0cb9d1f6fc26d"><enum>(C)</enum><text>to enhance maritime, air, and space domain awareness, with the goal of providing decision advantage;</text></subparagraph><subparagraph id="ida49397fe3b1d4cfba006f38f2daab69e"><enum>(D)</enum><text>to inform collective defense planning and response by further integrating intelligence cooperation into joint and combined operational planning activities, exercises, and wargames focused on regional contingencies, including the Rim of the Pacific;</text></subparagraph><subparagraph id="ided875c85ee394ad7a082c9570e41c709"><enum>(E)</enum><text>to encourage intelligence cooperation with Taiwan, consistent with United States law and policy; and</text></subparagraph><subparagraph id="id68a1ea6ceef043d9950f4e49edcf43a9"><enum>(F)</enum><text>to promote multilateral intelligence sharing and collaboration among allies and partners of the United States, such as through the United States–Japan–Republic of Korea trilateral mechanism and the United States–Japan–Philippines trilateral mechanism.</text></subparagraph></paragraph></subsection></section><section id="id7dda3f467a384a7b84f9db4b127564db"><enum>620.</enum><header>Intelligence activities related to Ukraine</header><subsection id="idec5cf7127a6f4af78a91b276543db56d"><enum>(a)</enum><header>Statement of policy</header><paragraph commented="no" display-inline="no-display-inline" id="id015a933334184f8f850b13f7f134ebf2"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Section 3 of the Support for the Sovereignty, Integrity, Democracy, and Economic Stability of Ukraine Act of 2014 (<external-xref legal-doc="usc" parsable-cite="usc/22/8902">22 U.S.C. 8902</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id0aa1237495604c42b09e6d736a694c9a"><enum>(A)</enum><text display-inline="yes-display-inline">in paragraph (16), by striking <quote>; and</quote> and inserting a semicolon; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idbc1daaf7712044e1be63fed9456a6f53"><enum>(B)</enum><text>in paragraph (17), by striking the period at the end and inserting <quote>; and</quote>; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id13de12512c2947e7a71799a5de70016b"><enum>(C)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ida4e46f5b82b349f3ac2c7c41d8e0cf72"><paragraph id="id45c4345381284994b7237223707b4021"><enum>(18)</enum><text>to assist Ukraine in maintaining a credible defense and deterrence capability, including through the provision of intelligence support, as a means of advancing the national security of the United States, regional stability, and the protection of United States interests in Europe.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc8840de61d4f46ae912e60ec35048b8a"><enum>(2)</enum><header>Definition</header><text>Section 2 of such Act (<external-xref legal-doc="usc" parsable-cite="usc/22/8901">22 U.S.C. 8901</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id2155f18b48324210bd51ed3c682e851e"><enum>(A)</enum><text display-inline="yes-display-inline">by redesignating paragraphs (3) and (4) as paragraphs (5) and (6), respectively; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id90e5d5a276a54fe4af954f4007ff7011"><enum>(B)</enum><text>by inserting after paragraph (2) the following:</text><quoted-block id="idD57E4E7039B04B688F632346B3B0EF84" style="OLC" act-name=""><paragraph id="id6763a3511d61435f8550e61c33cceced" commented="no"><enum>(3)</enum><header>Credible defense and deterrence capability</header><text>The term <term>credible defense and deterrence capability</term> means the ability to defend against and deter any credible conventional military threat from the Russian Federation acting unilaterally or in concert with partners, through the use of conventional military means, possessed in sufficient quantity, including weapons platforms and munitions, and command, control, communication, intelligence, surveillance, and reconnaissance capabilities.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1cd287b44a9a489c8af4795596708bb7"><enum>(4)</enum><header>Intelligence support</header><text display-inline="yes-display-inline">The term <term>intelligence support</term> means activities authorized under the provisions of law governing the heads of the elements of the intelligence community, including the collection, analysis, production, and dissemination of information, intelligence, and imagery.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="id3dac8822cff549549bcd5b14be5a2c97"><enum>(b)</enum><header>Requirement relating to intelligence support absent an armistice or comprehensive political settlement</header><text>Until Ukraine and the Russian Federation voluntarily and freely enter into an armistice or comprehensive political settlement of the conflict, the Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency, the Director of the Defense Intelligence Agency, and the heads of any other relevant element of the intelligence community, shall continue to ensure the provision of intelligence support to the Government of Ukraine for purposes of advancing United States policy goals in Ukraine.</text></subsection><subsection id="id2663430381ef4ed5a9d0ac20bc27f8fb"><enum>(c)</enum><header>Pauses in intelligence support</header><paragraph id="id633abf0ab5514a1bada7478d1113f41e"><enum>(1)</enum><header>In general</header><text>Intelligence support to Ukraine required under this section shall not be suspended or limited unless the Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency and the Director of the Defense Intelligence Agency, identifies a specific and identifiable national security concern.</text></paragraph><paragraph id="id742ac087a5a947d2928c1d059889bc59"><enum>(2)</enum><header>Notification</header><text>Not later than 15 days after making the decision to pause, terminate, restrict, or otherwise materially downgrade intelligence support to Ukraine, the Director of National Intelligence, in coordination with the heads of the elements of the intelligence community, shall submit to the congressional intelligence committees a notification that includes—</text><subparagraph id="id01ca00f49556456eb7bb42baecaa84ea"><enum>(A)</enum><text>a detailed description of the reason for the pause, termination, restriction, or material downgrade of intelligence support;</text></subparagraph><subparagraph id="idc40089dcf0a74a8d998a644fdf3e7ad6"><enum>(B)</enum><text>the expected duration of the pause, termination, restriction, or material downgrade; and</text></subparagraph><subparagraph id="idce6785cac1e64f7ca2fa5b5fb0bf29cb"><enum>(C)</enum><text>the anticipated impact of such decision on the ability of Ukraine to conduct effective military operations.</text></subparagraph></paragraph><paragraph id="idfc8176b6371b4ab0b0e6ff40ac991939"><enum>(3)</enum><header>Form</header><text>A notification submitted under paragraph (2) shall be in unclassified form, but may include an classified annex.</text></paragraph></subsection><subsection id="id805302928d7947dc928032a2b10745a5"><enum>(d)</enum><header>Requirement relating to intelligence support in the event of armistice or comprehensive political settlement</header><paragraph id="idc77c990d7e974be59e73179eb90c3dc8"><enum>(1)</enum><header>In general</header><text>If Ukraine and the Russian Federation voluntarily and freely enter into an armistice or a comprehensive political settlement, the Director of National Intelligence, in coordination with the heads of the other relevant elements of the intelligence community, shall adjust the intelligence support to Ukraine to support implementation of the armistice or the comprehensive political settlement and, consistent with the national security interests of the United States, support building and sustaining the capacity of Ukraine to detect, deter, and repel any future Russian attack against the territory of Ukraine.</text></paragraph><paragraph id="id1d0bb6aa6735420fada448eb80f0e194"><enum>(2)</enum><header>Report on modifications to United States intelligence support</header><text>Not later than 30 days after an armistice or a comprehensive political settlement is entered into force, the Director of the Central Intelligence Agency, in coordination with the heads of the other relevant elements of the intelligence community, including the Director of the Defense Intelligence Agency, the Director of the National Security Agency, and the Director of the National Geospatial-Intelligence Agency, shall submit to the congressional intelligence committees a report that includes—</text><subparagraph id="ideff85f756120471d9db994bb1bdda177"><enum>(A)</enum><text>a description of the details of the armistice or the comprehensive political settlement of the conflict in Ukraine, including a description of the role of the intelligence community in monitoring the adherence by the parties to specific elements of the agreement;</text></subparagraph><subparagraph id="idee12fb51db8f4ee6a480a5bc668f45fd"><enum>(B)</enum><text>an assessment of the vulnerabilities that Ukraine will face under the terms of the agreement and potential measures that the intelligence community or other parties could take to help mitigate such vulnerabilities;</text></subparagraph><subparagraph id="id9b294f7613ca4ced899b4971060d01d9"><enum>(C)</enum><text>a description of the modifications to ongoing intelligence support the Director of the Central Intelligence Agency has authorized in light of the changed situation on the ground in Ukraine in order to help build and sustain the capacity of Ukraine to detect, deter, and repel any future Russian attack against the territory of Ukraine;</text></subparagraph><subparagraph id="id9473d32c82aa4e6d834611e14233c851"><enum>(D)</enum><text>an assessment of the implications of the armistice or comprehensive political settlement for the national security interests of the United States in Europe, including the capacity of the United States and the North Atlantic Treaty Organization to deter future aggression by the Russian Federation; and</text></subparagraph><subparagraph id="id53ba75edbdee40b08d0b716f906c6fca"><enum>(E)</enum><text>a description and assessment of any cooperative arrangements that Ukraine has with other countries, including member countries of the North Atlantic Treaty Organization, that the intelligence community assesses would contribute to deterring a future attack or act of aggression by the Russian Federation aimed at occupying or seizing the territory of Ukraine.</text></subparagraph></paragraph><paragraph id="id642565f47e4144e2ae4eee9dcd9eb097"><enum>(3)</enum><header>Form</header><text>The report required by paragraph (2) shall be submitted in unclassified form, but may include a classified annex.</text></paragraph><paragraph id="idc0c5de0d2ffe4154b5fd736624376b8e"><enum>(4)</enum><header>Early warning</header><text>The Director of National Intelligence, in coordination with the heads of any other relevant elements of the intelligence community, shall provide to Ukraine and member countries of the North Atlantic Treaty Organization intelligence and early warning to allow for an appropriate and timely response with respect to any potential attack or act of aggression against Ukraine by the Russian Federation.</text></paragraph><paragraph id="id4b9af8772e4d4ff9851607eeba601d6a"><enum>(5)</enum><header>Notification</header><subparagraph id="id4dfcf3fda202412981ebb98f8ba82526"><enum>(A)</enum><header>In general</header><text>The Director of National Intelligence shall promptly notify each Member of the congressional intelligence committees not later than 5 days after any intelligence element provides Ukraine any intelligence pursuant to paragraph (4).</text></subparagraph><subparagraph id="id24e314c8034c4338aee3ed68e10f16b9"><enum>(B)</enum><header>Contents</header><text>A notification submitted pursuant to subparagraph (A) shall include—</text><clause id="id135170c73a3348d7b8a5fc6dd79a342c"><enum>(i)</enum><text>a description of the specific threatened attack or act of aggression shared with Ukraine;</text></clause><clause id="idde6755cda9794e2bbb96f99a585d4c85"><enum>(ii)</enum><text>the date on which the intelligence was provided to Ukraine;</text></clause><clause id="id067b717046e84d8899081765a3815d65"><enum>(iii)</enum><text>details of the channel through which the intelligence was shared, including the names and titles of the relevant intelligence community officers and Ukrainian government officials;</text></clause><clause id="idf9269a73f2734bed83d27e9971df809c"><enum>(iv)</enum><text>the response of the Government of Ukraine upon receiving the intelligence;</text></clause><clause id="id47eb8e75ae2f49f1be1b9e26ae5f88a6"><enum>(v)</enum><text>an assessment produced by the Defense Intelligence Agency, in coordination with other relevant elements of intelligence community, as to what support Ukraine might require in order to deter or repel the threatened attack or act of aggression; and</text></clause><clause id="id3f4dcd751e72485cb6b67d5014c50e79"><enum>(vi)</enum><text>a summary of subsequent actions that the Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency, the Director of the Defense Intelligence Agency, and other heads of relevant elements of the intelligence community, directed be taken to support Ukraine in defending against or otherwise responding to the threatened attack or act of aggression.</text></clause></subparagraph><subparagraph id="id90765945f7a149b984fffdfc43c4da2d"><enum>(C)</enum><header>Form</header><text>A notification submitted pursuant to subparagraph (A) shall be in unclassified form, but may include a classified annex.</text></subparagraph></paragraph></subsection><subsection id="ida039d05564594e0c8f2b8da2d7d56f9e"><enum>(e)</enum><header>Requirement relating to intelligence support in the event of an armed attack on Ukraine in violation of an armistice or comprehensive political settlement</header><paragraph id="id4f9f2f4a291346338bab9fa16f07c75e"><enum>(1)</enum><header>In general</header><text>In the event of an armed attack by the Russian Federation on Ukraine that violates an armistice or a comprehensive political settlement, the Director of National Intelligence, in coordination with the Director of the Central Intelligence Agency, the Director of the Defense Intelligence Agency, and the heads of other relevant elements of the intelligence community, shall immediately resume the provision of intelligence support to the Government of Ukraine at a level the Directors deem necessary to support military operations of the Government of Ukraine that are intended, or reasonably expected, to help the Armed Forces of Ukraine defend or liberate the territory of Ukraine and prevent such territory of Ukraine from being occupied or attacked by the Russian Federation.</text></paragraph><paragraph id="idaf60511e66b04966a1d353cbb4850c77"><enum>(2)</enum><header>Notification</header><subparagraph id="idd2f609ba2c0d45509cde57228db5cd62"><enum>(A)</enum><header>In general</header><text>The Director of National Intelligence shall promptly notify the congressional intelligence committees not later than 5 days after resuming intelligence support pursuant to paragraph (1).</text></subparagraph><subparagraph id="id495ce7d1245249c493a7f2a40d2d9bc5"><enum>(B)</enum><header>Contents</header><text>A notification submitted pursuant to subparagraph (A) shall include—</text><clause id="id3468dc9a28814d2ca72cdbf16db555ff"><enum>(i)</enum><text>a description of the specific attack or act of aggression against Ukraine;</text></clause><clause id="idb90c789c23ae431f819107410f05743b"><enum>(ii)</enum><text>a description of any intelligence support that Ukraine requested from the United States;</text></clause><clause id="id33d04872855d40b6a7151fd425a4c7d7"><enum>(iii)</enum><text>an assessment of the support that Ukraine might require in order to deter or repel the attack or act of aggression;</text></clause><clause id="idde5ba84a3bdd48dc98d7fc97696ce97e"><enum>(iv)</enum><text>a description of any intelligence support that the Director has authorized to be provided to Ukraine; and</text></clause><clause id="id108ae862bc49455ebed851480a57d60d"><enum>(v)</enum><text>a description of the response of the Government of Ukraine upon receiving the intelligence support.</text></clause></subparagraph><subparagraph id="id5da72143d3684812aa1d75a70bcfe53e"><enum>(C)</enum><header>Form</header><text>A notification submitted pursuant to subparagraph (A) shall be in unclassified form, but may include a classified annex.</text></subparagraph></paragraph><paragraph id="id0434b577f114477eaad1d114df38c82e"><enum>(3)</enum><header>Sunset</header><subparagraph id="idadb78dfbcd194e23b5edc7eb81a3b22a"><enum>(A)</enum><header>In general</header><text>The provision of intelligence support for Ukraine under this subsection shall cease on the date that is 120 days after the date on which the Government of Ukraine and the Government of the Russian Federation agree to reinstate the armistice or comprehensive political settlement that was violated or a new armistice or comprehensive political settlement is entered into force.</text></subparagraph><subparagraph id="idc07e5bb02f7c435495b8b7cd7438d6ca"><enum>(B)</enum><header>Recommencement</header><text>Upon the cessation of the provision of intelligence support under subparagraph (A), the Director of the Central Intelligence Agency, in coordination with the heads of any other relevant elements of the intelligence community, shall resume the provision of intelligence support to Ukraine pursuant to subsection (d).</text></subparagraph></paragraph></subsection><subsection id="ida93ea6ce97814599bf5f8ee84102fc65"><enum>(f)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id4c61dd22df1343a0a170228351d09ab0"><enum>(1)</enum><header>Armistice; comprehensive political settlement</header><text>The terms <term>armistice</term> and <term>comprehensive political settlement</term> mean a formal written agreement between the Government of Ukraine and the Government of the Russian Federation that has the effect of permanently ending the armed conflict between both nations.</text></paragraph><paragraph id="id43158d29b8e64214bdb26395b04f84b2"><enum>(2)</enum><header>Intelligence support</header><text>The term <term>intelligence support</term> means activities authorized under the provisions of law governing the heads of the elements of the intelligence community, including the collection, analysis, production, and dissemination of information, intelligence, and imagery.</text></paragraph><paragraph id="id8d480e665eaa45479b7c77a2d6bffb3d"><enum>(3)</enum><header>Specific and identifiable national security concern</header><text>The term <term>specific and identifiable national security concern</term> includes the following: </text><subparagraph commented="no" display-inline="no-display-inline" id="id2b546c4253ac4d00aead272800d63c90"><enum>(A)</enum><text display-inline="yes-display-inline">Credible intelligence that an element of the Government of Ukraine has been compromised by the Russian Federation or another foreign adversary.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida5f7c229fe744b1bbecc5d04a1b74607"><enum>(B)</enum><text display-inline="yes-display-inline">Protection of sources and methods.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id33e890b508b948a89128cd335a80cec0"><enum>(C)</enum><text display-inline="yes-display-inline">A voluntary request from the Government of Ukraine to pause intelligence support.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id966c0e8c74cb4c73aaee91f823726772"><enum>(D)</enum><text display-inline="yes-display-inline">Credible intelligence that an element of the Government of Ukraine receiving United States intelligence support engaged in a pattern of human rights violations, atrocities, or violations of the law of armed conflict.</text></subparagraph></paragraph><paragraph id="id3484aa15df4d4503bbeb9ad042d4ec6c" commented="no" display-inline="no-display-inline"><enum>(4)</enum><header>Territory of Ukraine</header><text>The term <term>territory of Ukraine</term> means all territory internationally recognized to be the sovereign territory of Ukraine on February 19, 2014, including Crimea and the territory that the Russian Federation claims to have annexed in Kherson and Zaporizhzia.</text></paragraph></subsection></section><section id="ida964a5666aa941648ac08299dea64f13"><enum>621.</enum><header>Requirements relating to intelligence sharing with countries of significant concern to the United States</header><text display-inline="no-display-inline">Section 102A(j) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024(j)</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idd8b1088f9bc140a9bfa46675969e3d30"><enum>(1)</enum><text display-inline="yes-display-inline">by striking <quote>Under the direction</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id98b4a52d68e24743b8575071037c87cd"><paragraph commented="no" display-inline="no-display-inline" id="id794a9616d8c74e5a978d0939b5a7b216"><enum>(1)</enum><header>In general</header><text>Under the direction</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9625ebc0124d4f07b95561537cab0e25"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id294e83a99f294c4aa026c8f9b6c2812e"><paragraph id="id9264d0ce63234a10b2a85b8d00236759"><enum>(2)</enum><header>Notification required</header><subparagraph commented="no" display-inline="no-display-inline" id="id73e72ececd6b4e6baa271f76ab0d4fe9"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 48 hours after a decision to pause, terminate, or otherwise restrict or materially downgrade intelligence support or intelligence activities (as defined in section 501(f)), including information, intelligence, and imagery collection authorized under Executive Order 12333 (<external-xref legal-doc="usc" parsable-cite="usc/50/3001">50 U.S.C. 3001</external-xref> note; relating to United States intelligence activities), to the government of a country of significant concern to the United States, the Director of National Intelligence shall submit to the congressional intelligence committees a notification of such decision.</text></subparagraph><subparagraph id="idbc2b9e8d22d94426847801ba2043a9f2"><enum>(B)</enum><header>Elements</header><text>The notification required in subsection (a) shall include—</text><clause id="id02c026ea22414769840e7021cb6004ea"><enum>(i)</enum><text>a detailed description of the reason for the pause, termination, restriction, or material downgrade of intelligence support;</text></clause><clause id="id59cc47a605c8422db8efb5317fa3c25e"><enum>(ii)</enum><text>a description of the change in intelligence sharing;</text></clause><clause id="id4cfa26cc35234a9bb78d229b6af597f6"><enum>(iii)</enum><text>the categories of information affected; </text></clause><clause id="ideba80712ca69462587f406b3e0c2c115"><enum>(iv)</enum><text>the expected duration of the pause, termination, restriction, or material downgrade; and</text></clause><clause id="ida13e27a2470e41c88ce4834f56cb896c"><enum>(v)</enum><text>the anticipated impact of such decision on regional security and the national security objectives of the United States.</text></clause></subparagraph><subparagraph id="id8c43f3dcb012453184f291bd49215420"><enum>(C)</enum><header>Country of significant concern to the United States defined</header><text>In this subsection, the term <term>country of significant concern to the United States</term> means—</text><clause id="id666ca85fb467423dafdeea4e9031afb9"><enum>(i)</enum><text>Israel;</text></clause><clause id="idff867ee4346242a4a250fb24575b8022"><enum>(ii)</enum><text>Ukraine;</text></clause><clause id="ida74aaf30544c4cebb292bdc971f0285c"><enum>(iii)</enum><text>Taiwan; and</text></clause><clause id="id0f914229ecd44508a1244559caecc870"><enum>(iv)</enum><text>any other country designated as such by the President.</text></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="id5e415ea0f6344a03b0bba7730c82f923"><enum>622.</enum><header>United States-Israel intelligence sharing enhancement</header><subsection commented="no" display-inline="no-display-inline" id="id870eb10832284868860c4f65fe17a88a"><enum>(a)</enum><header>Statement of policy</header><text display-inline="yes-display-inline">It is the policy of the United States—</text><paragraph commented="no" display-inline="no-display-inline" id="id7d963dba03ce467891866386740d5e63"><enum>(1)</enum><text display-inline="yes-display-inline">to maintain and strengthen the strategic security partnership with Israel as a means of advancing the national defense of the United States, regional stability, and the protection of United States personnel and interests in the Middle East;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id021758ec08bd46cdb7ff18dd4927470a"><enum>(2)</enum><text>to enhance intelligence collaboration through robust intelligence sharing and analytic partnership with Israel to counter terrorism, proliferation networks, cyber threats, state and nonstate aggressors, terror financing, sanctions evasion, and other transnational security challenges that threaten both Israel and the United States;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id47a642080b26470d8ce3b6703c456d2c"><enum>(3)</enum><text display-inline="yes-display-inline">to deter and counter destabilizing activities by the Government of Iran and Iran-aligned state and nonstate actors that threaten Israel, United States forces, and regional partners;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7f2437c70fef4707b20b94d75d0c8db5"><enum>(4)</enum><text display-inline="yes-display-inline">to ensure that security assistance and defense cooperation are structured to help Israel maintain its qualitative military edge, consistent with United States law and broader regional security considerations; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idad7571c9a86e4600b72b9f27cb134496"><enum>(5)</enum><text display-inline="yes-display-inline">to encourage and support the expansion of regional security architectures that include Israel and willing regional partners, with a focus on integrated air and missile defense, maritime security, early warning systems, and intelligence-sharing frameworks; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7d4cbaa70fff458f80ca8e37ac62ea29"><enum>(6)</enum><text display-inline="yes-display-inline">to leverage security coordination with Israel to enhance force protection, early warning, and crisis response capabilities for United States military and diplomatic personnel in the region.</text></paragraph></subsection><subsection id="id372d3538c9204827af214775fd39158f"><enum>(b)</enum><header>Sense of Congress</header><text display-inline="yes-display-inline">It is the sense of Congress that—</text><paragraph id="iddcc29cd9d4d448ddae70bf93f11cf4ad"><enum>(1)</enum><text>Israel remains a critical United States security partner whose defense and intelligence capabilities provide a strategic advantage that contributes to enhanced operational effectiveness and technological superiority;</text></paragraph><paragraph id="id1a4f8fb721024ca49a1217a2c6ccc122"><enum>(2)</enum><text>timely and actionable intelligence sharing between the United States and Israel has saved United States personnel and property in the region and should remain a central pillar of the bilateral security relationship;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id75a7f48993fe44e9af47cfc8ba8a7baf"><enum>(3)</enum><text display-inline="yes-display-inline">the evolving threat environment in the Middle East—including missile proliferation, unmanned systems, cyber operations, terror financing, and proxy warfare—requires sustained and adaptive cooperation between the United States and Israel;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id6b1a9c2dbf0a42a7ad4518db64050f2d"><enum>(4)</enum><text display-inline="yes-display-inline">the United States-Israel security partnership has historically benefitted from bipartisan support, which strengthens the partnership's credibility, durability, and deterrent value; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7945452c51154118bf4fcf5ce7c679d8"><enum>(5)</enum><text display-inline="yes-display-inline">expanding normalization and practical security cooperation between Israel and regional states can serve as a force multiplier for collective deterrence and integrated defense.</text></paragraph></subsection><subsection id="id8a44f82a7623477eb7e5d042d41c40fc"><enum>(c)</enum><header>Requirements relating to intelligence sharing</header><paragraph commented="no" display-inline="no-display-inline" id="idafc342f43cd3420d8a12670cb8fafb52"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Title XI of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3231">50 U.S.C. 3231 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idbd67c1ef5cce43f38ab0de0cbcefaf65"><section id="id45e28ff69f0444bfb491b0e75f77b424"><enum>1115.</enum><header>Requirements relating to intelligence sharing</header><subsection id="id8f75b657c9ec403c9256b49b7a70c6fb"><enum>(a)</enum><header>Intelligence sharing with Israel</header><paragraph id="id19e57cd0762d4551ac79e7bac7f5a81a"><enum>(1)</enum><header>In general</header><text>The President, acting through the Director of National Intelligence and, as necessary, the Secretary of Defense, shall, subject to applicable law and the protection of intelligence sources and methods, expand and enhance intelligence sharing with the Government of Israel.</text></paragraph><paragraph id="id9b005830453e44acbdc8fb2104f235cd"><enum>(2)</enum><header>Scope of intelligence sharing</header><text>Intelligence sharing carried out under this subsection shall include the sharing of information relating to cybersecurity threats, terrorism, sanctions evasion, plans and intentions of state and nonstate actors, adversarial technology proliferation, missile threats, unmanned aerial systems, cruise missiles, ballistic missiles, air and space domain awareness, and other aerial threats relevant to the defense of Israel, United States forces and interests in the region, and regional security partners.</text></paragraph><paragraph id="id053a434f68ac472c9e5b81a61398cb83"><enum>(3)</enum><header>Limitations on reduction of intelligence sharing</header><subparagraph id="id1edb2f8c576d48a08497e9653ad855a3"><enum>(A)</enum><header>In general</header><text>Intelligence sharing and related security information exchanges with the Government of Israel shall not be suspended, reduced, or otherwise materially limited except on the basis of a specific and identifiable national security concern determined by the President, such as the protection of intelligence sources and methods, counterintelligence risk, or another significant security consideration.</text></subparagraph><subparagraph id="idbe700b91672f4b76b0d437241f13b9d3"><enum>(B)</enum><header>Documentation requirement</header><text>The President shall document any determination to suspend, reduce, or otherwise materially limit intelligence sharing or related security information exchanges with the Government of Israel, including a description of the national security rationale supporting the change.</text></subparagraph></paragraph><paragraph id="ide5ab549f03a34eb0b69fe6a2b5b42cd4"><enum>(4)</enum><header>Congressional notification</header><subparagraph id="idb61184660d014ba9bec707286b00c042"><enum>(A)</enum><header>In general</header><text>Not later than 15 days after the date of any decision to materially increase, suspend, reduce, or otherwise alter intelligence sharing or related security information exchanges with the Government of Israel, the President shall notify the congressional intelligence committees of such decision.</text></subparagraph><subparagraph id="idcb5bbde396954911979551e87d62ce0f"><enum>(B)</enum><header>Elements</header><text>Each notification required by subparagraph (A) shall include the following:</text><clause id="iddca3dc0b920a4d64a2b1b5e59a9d25f5"><enum>(i)</enum><text>A description of the change in intelligence sharing or security information exchange.</text></clause><clause id="ida031928851884d87b1492ca240f64e07"><enum>(ii)</enum><text>The categories of information affected.</text></clause><clause id="id2ad55bf1cbe14bc1b44034af32a7afaf"><enum>(iii)</enum><text>The national security objectives served by the change.</text></clause><clause id="idc974fb4aba1c45b0999d1d3afe2d5e11"><enum>(iv)</enum><text>In the case of a suspension or reduction, the specific national security concern supporting the change.</text></clause><clause id="id8be7d15e941e44939c1f6a4c7c27da22"><enum>(v)</enum><text>An assessment of the anticipated impact on regional security, United States forces, and integrated air and missile defense cooperation.</text></clause></subparagraph></paragraph></subsection><subsection id="id0e936326c83f40899dc1c7b52cd5f11f"><enum>(b)</enum><header>Intelligence sharing and analytic cooperation with Abraham Accords countries</header><paragraph id="id884fb0e257fd4aa2983f4aab3697c411"><enum>(1)</enum><header>In general</header><text>The President, acting through the Director of National Intelligence and, as necessary, the Secretary of Defense, shall, consistent with applicable law and security agreements, expand and enhance intelligence sharing and analytic cooperation with countries that have normalized relations with Israel pursuant to the Abraham Accords (as defined in section 64(k) of the State Department Basic Authorities Act of 1956 (<external-xref legal-doc="usc" parsable-cite="usc/22/2735a">22 U.S.C. 2735a(k)</external-xref>) in order to strengthen regional security integration.</text></paragraph><paragraph id="id9f3d0c6da6ba4844b2e317eeda88f416"><enum>(2)</enum><header>Priority areas</header><text>In carrying out paragraph (1), the President shall prioritize the sharing of appropriate intelligence and information relating to—</text><subparagraph id="id63e3e3c5f4524777aa51c14e01f6fd5f"><enum>(A)</enum><text>counterterrorism threats and networks, including state and nonstate aggressors, and terror financing;</text></subparagraph><subparagraph id="id284ca6d10c0c428d942bc04f1c146091"><enum>(B)</enum><text>cybersecurity threats, vulnerabilities, and defensive best practices;</text></subparagraph><subparagraph id="id7694259062c5440796ac65c2cc47c18c"><enum>(C)</enum><text>air and missile defense early warning and threat tracking;</text></subparagraph><subparagraph id="id089b18414bb9481fb97bbcd7297d944e"><enum>(D)</enum><text>geospatial, overhead, and other imaging intelligence relevant to shared security concerns; and</text></subparagraph><subparagraph id="id167d7f5ea9d442aabee8892a87d3011c"><enum>(E)</enum><text>maritime security threats, including threats to freedom of navigation, commercial shipping, sanctions evasion, and regional maritime stability.</text></subparagraph></paragraph><paragraph id="iddd4eca72e08a45a6af2b5ef6cb274ee0"><enum>(3)</enum><header>Safeguards</header><subparagraph commented="no" display-inline="no-display-inline" id="id07eb0608989446fb83f087d4eb256233"><enum>(A)</enum><header>Adoption of guidelines</header><text display-inline="yes-display-inline">The Director of National Intelligence, in coordination with the Secretary of Defense, shall adopt guidelines for intelligence sharing and analytic cooperation carried out under this subsection that ensure appropriate safeguards—</text><clause commented="no" display-inline="no-display-inline" id="id34623e75d50f46b5b2007d61c8095000"><enum>(i)</enum><text display-inline="yes-display-inline">to protect intelligence sources and methods; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id222d3a9db5bc47fba7ced25e24c6ab76"><enum>(ii)</enum><text display-inline="yes-display-inline">to ensure that recipients maintain adequate security protections consistent with United States requirements. </text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc5e58e8cd5cf420cbef1b3529be9acc0"><enum>(B)</enum><header>Restrictions on access</header><text display-inline="yes-display-inline">If the Director of National Intelligence determines that a recipient of intelligence sharing or analytic cooperation carried out under this subsection has any intelligence, defense, or technological information sharing relationship with an adversarial nation, the Director shall restrict all access of such recipient to such intelligence sharing and analytic cooperation.</text></subparagraph></paragraph></subsection><subsection id="id777bf6d756ff485bbc3e3fbb2bfab60f"><enum>(c)</enum><header>Report required</header><paragraph id="id2e4cfb17e38a45b98a751d061bed8a7e"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this section, and annually thereafter for 5 years, the President shall submit to the appropriate congressional committees a report on the status of United States intelligence sharing with the Government Israel and, as appropriate, regional partners.</text></paragraph><paragraph id="id31cb460d410e44d7ab679e34dcf222e8"><enum>(2)</enum><header>Matters to be included</header><text>Each report required by paragraph (1) shall include, to the extent consistent with the protection of intelligence sources and methods, the following:</text><subparagraph id="ide1ce5ab2609a4bdda71e94b0dcbf136e"><enum>(A)</enum><text>A description of the categories of intelligence and security information shared by the United States Government with the Government of Israel.</text></subparagraph><subparagraph id="id9ada2ba21c7641098e2ea1741396812c"><enum>(B)</enum><text>An assessment of progress toward seamlessly integrating Israel into regional air and missile defense and early warning architectures with partner countries, including those that have normalized relations with Israel pursuant to the Abraham Accords. </text></subparagraph><subparagraph id="id1e35a95b0222476094ae534c33bdecee"><enum>(C)</enum><text>A description of how such intelligence sharing has contributed, if at all, to—</text><clause commented="no" display-inline="no-display-inline" id="id83ee812b347c4ea78a991f2b2e68469c"><enum>(i)</enum><text display-inline="yes-display-inline">improved detection, tracking, warning, interception, or deterrence of aerial threats, including missiles and unmanned systems, for Israel, United States forces, or regional partners; and </text></clause><clause commented="no" display-inline="no-display-inline" id="id1a75d540afad42538a5bed1c19835c26"><enum>(ii)</enum><text display-inline="yes-display-inline">the overall stability and coordination of security in the region.</text></clause></subparagraph><subparagraph id="id708ac756aab8495b87a2feb1af419fe9"><enum>(D)</enum><text>An assessment of progress in improving interoperability among technology networks of the United States, Israel, and partner countries.</text></subparagraph><subparagraph id="idc415c2472e9945509b61031713e7052b"><enum>(E)</enum><text>A description of efforts to secure technology networks and data from cyber threats and unauthorized access.</text></subparagraph><subparagraph id="id8ccf98cfa8964f568ecce5d47d7d5ec2"><enum>(F)</enum><text>An identification of any legal, policy, technical, counterintelligence, or security barriers limiting deeper intelligence integration, including risks to intelligence sources and methods.</text></subparagraph><subparagraph id="id88bbfedcb5de417f83a5d22f5ed7374b"><enum>(G)</enum><text>A summary of any significant increases or reductions in intelligence sharing during the reporting period and the national security rationale for such changes.</text></subparagraph></paragraph><paragraph id="idba754e509064474e9aeb8d45a3adbf61"><enum>(3)</enum><header>Form</header><text>Each report required by paragraph (1) report shall be submitted in unclassified form but may include a classified annex.</text></paragraph><paragraph id="idf77504ad83214f0ca8ed7281ae5f6b8d"><enum>(4)</enum><header>Appropriate congressional committees defined</header><text>In this subsection, the term <term>appropriate congressional committees</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="id14ff71a42e4d489d97679bdb6da57901"><enum>(A)</enum><text display-inline="yes-display-inline">the congressional intelligence committees; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4b4b973bfa524b96b41d1f3952c06ebb"><enum>(B)</enum><text display-inline="yes-display-inline">to the extent Department of Defense information is implicated, the congressional defense committees (as defined in section 101(a) of title 10, United States Code).</text></subparagraph></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1be99385c6ed46faa5f34937f5d23fde"><enum>(2)</enum><header>Clerical amendment</header><text>The table of contents for such Act is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idfa35b304883d40ebb4802461c07a3db1"><toc><toc-entry level="section" bold="off">Sec. 1115. Requirements relating to intelligence sharing.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section></title><title id="id5922f6a36e12475482ddd2a8e9e7d3f8" style="OLC"><enum>VII</enum><header>Artificial intelligence matters relating to the intelligence community</header><section id="idf0666c6e9d094b70a70445b6c8bcb37b"><enum>701.</enum><header>Artificial intelligence exploitation guard and intelligence sharing</header><subsection id="idf07fc49141034de880def91739034134"><enum>(a)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="idc9603596e3ee48e7854c8a3947cde71e"><enum>(1)</enum><header>Artificial intelligence model</header><text>The term <term>artificial intelligence model</term> means a capability or series of capabilities combined that can, for a given set of objectives, generate outputs such as predictions, recommendations, or decisions without human intervention or input.</text></paragraph><paragraph id="id0df999316dfe4bf1bb83c802fa1ddb9d" commented="no"><enum>(2)</enum><header>Center</header><text>The term <term>Center</term> means the Artificial Intelligence Security Center of the National Security Agency.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idcae706d29704428a9491dbc7bdc9d5b4"><enum>(3)</enum><header display-inline="yes-display-inline">Classified information</header><text>The term <term>classified information</term> has the meaning given such term in section 805 of the National Security Act of 1947 ( <external-xref legal-doc="usc" parsable-cite="usc/50/3164">50 U.S.C. 3164</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="iddee0c2a584e246ff94b403d82d40a46f"><enum>(4)</enum><header>Cleared industry personnel</header><text>The term <term>cleared industry personnel</term> means employees or representatives of a covered person who hold an appropriate security clearance and have a demonstrated need to know.</text></paragraph><paragraph id="id9ed1e176e9a84a87875d7c8a3282ab56" commented="no"><enum>(5)</enum><header>Congressional intelligence committees</header><text>The term <term>congressional intelligence committees</term> has the meaning given such term in section 3 of the National Security Act of 1947 ( <external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id44ada3d5b098460f9d935d55a44a3c81"><enum>(6)</enum><header>covered person</header><text>The term <term>covered person</term> means a non-Federal person who—</text><subparagraph commented="no" display-inline="no-display-inline" id="id4086dfe99c404e5caa728c57c43d152d"><enum>(A)</enum><text>is a United States citizen;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4c4907b7eaaf4da79b1a729c8cd5669c"><enum>(B)</enum><text>develops, deploys, or operates artificial intelligence models or critical enabling infrastructure; and</text></subparagraph><subparagraph id="id7a71655f31ab412dabf9add5056a2fb0"><enum>(C)</enum><text>provides the services described in subparagraph (B) to an element of the intelligence community or Department of Defense.</text></subparagraph></paragraph><paragraph id="id466f714b347a416985aba4111a603599" commented="no"><enum>(7)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the National Security Agency.</text></paragraph><paragraph id="id3276a4ca95b843699b11e2de453398ca" commented="no"><enum>(8)</enum><header>Intelligence</header><text>The term <term>intelligence</term> has the meaning given such term in section 3 of the National Security Act of 1947 ( <external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph id="id9ead827c578445ce85dcc0853ea8ca7d" commented="no"><enum>(9)</enum><header>Intelligence community</header><text>The term <term>intelligence community</term> has the meaning given such term in section 3 of the National Security Act of 1947 ( <external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph id="id1b501cc4e1914c80869444d6ea2547f9" commented="no"><enum>(10)</enum><header>Security clearance</header><text>The term <term>security clearance</term> means an authorization to access classified information.</text></paragraph><paragraph id="idd164a08fa422401a926f88ed6d56460c"><enum>(11)</enum><header>Threat information</header><text>The term <term>threat information</term> means information on—</text><subparagraph id="id5eee92764b764bb493f8d3d7e8bf6d18"><enum>(A)</enum><text>efforts by foreign adversary countries to use products or research of covered persons or other entities or individuals to generate synthetic media for foreign-directed influence campaigns, develop and manage computer network exploitation campaigns, design or develop weapons systems, or enhance surveillance capabilities in ways that undermine the privacy or threaten the security of citizens of the United States;</text></subparagraph><subparagraph id="id3b46b6cc911e4e19a4fb4c6a54226103"><enum>(B)</enum><text>threats posed by foreign adversary countries, including indications of compromise to networks associated with covered persons and other entities and individuals, or other technical indicators, indicating a compromise to the confidentiality, integrity, or availability of an artificial intelligence system, or to the supply chain of an artificial intelligence system, including training or test data, frameworks or software libraries, training or inference computing environments, or other components necessary for the training, management, or maintenance of an artificial intelligence system;</text></subparagraph><subparagraph id="id60bcfdcc896f4ac8bbe709e7c5ca5ed3"><enum>(C)</enum><text>activity of foreign entities of concern to clandestinely, fraudulently, or otherwise maliciously access the systems of covered persons for purposes of illicit technology transfer or otherwise gaining unfair economic advantage, including through techniques to extract a model’s technical capabilities to replicate, develop, or improve a foreign artificial intelligence model without authorization by the covered person;</text></subparagraph><subparagraph id="idb1836adfac0a4fe59fe2b93a3a2a29ed"><enum>(D)</enum><text>activity of foreign entities of concern to sabotage or otherwise clandestinely degrade artificial intelligence systems or the supply chain of an artificial intelligence system, including training or test data, frameworks or software libraries, training or inference computing environments, or other components necessary for the training, management, or maintenance of an artificial intelligence system; and</text></subparagraph><subparagraph id="id036647393f674d76942ba39d1b24bea3"><enum>(E)</enum><text>observations, emerging concerns, or other inputs from vendors or researchers regarding relevant malicious or clandestine activity of foreign entities of concern toward an artificial intelligence system, its supply chain, or other necessary components.</text></subparagraph></paragraph></subsection><subsection id="id64827a6597874d908ff170fa0bbd8880"><enum>(b)</enum><header>Establishment of pilot program on sharing of intelligence and threat information with covered persons</header><paragraph id="idf896ba6856f94b0cadb85b082df0b4b6"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Director shall, acting through the Center, establish a pilot program to assess the feasibility and advisability of facilitating the secure sharing with covered persons of intelligence and threat information germane to the exploitation of access to United States artificial intelligence systems and enabling infrastructure to engage in intelligence collection, intellectual property theft, and other malicious activities.</text></paragraph><paragraph id="idcd78416343cc431bb3fa676ec4d86f27"><enum>(2)</enum><header>Participation</header><text>The Director may not select covered persons to participate in the pilot in a manner that provides a competitive advantage or procurement preference to any covered person, to the detriment of another covered person.</text></paragraph><paragraph id="id1d2e81c093784cd1984df34d51163517"><enum>(3)</enum><header>Duration</header><text>The Director shall carry out the pilot program established pursuant to paragraph (1) during the 3-year period beginning on the date of the establishment of the pilot program.</text></paragraph></subsection><subsection id="idbff38554f6d94f1cb6d07e58bf181229"><enum>(c)</enum><header>Participation requirements</header><paragraph id="id5f4a69fe6809417ebf209130111ed78f"><enum>(1)</enum><header>Criteria</header><text>The Director shall establish criteria governing engagement with covered persons under the pilot program required by subsection (b), which may include criteria relating to the following:</text><subparagraph id="id2f60d6af41ef43cfb0f4896edce70c56"><enum>(A)</enum><text>Relevance to national security.</text></subparagraph><subparagraph id="id73f003192ec9444a8cebffc51e061a59"><enum>(B)</enum><text>The ability to protect classified or sensitive intelligence information.</text></subparagraph><subparagraph id="ide098866d4fbc429e83d61cafc14c2e40"><enum>(C)</enum><text>Cybersecurity and information security maturity.</text></subparagraph><subparagraph id="id7ce895fcb6a74e469c4b074470834d22"><enum>(D)</enum><text>Agreement to comply with intelligence handling, use, and nondisclosure requirements.</text></subparagraph><subparagraph id="ida9bdd2e9f26842a08066b0f5bad2f6c3"><enum>(E)</enum><text>The availability of cleared personnel of covered persons or willingness of covered persons to increase the number of cleared personnel.</text></subparagraph></paragraph><paragraph id="idfe5f9626c031443781522a463cbb270e"><enum>(2)</enum><header>Nature of participation</header><text>Participation in the pilot program shall not be construed as a certification, endorsement, or regulatory approval by the United States Government of any artificial intelligence system or commercial activity and the Director may not exclude a covered person from participating on the basis of political or ideological viewpoints of the covered person or its employees.</text></paragraph></subsection><subsection id="id6e9e480fe9b9402e9c1cdd78f91731de"><enum>(d)</enum><header>Intelligence sharing structure</header><paragraph id="id02ea3066b34d4442aa34bf9a789c914c"><enum>(1)</enum><header>Authorized Modes</header><text>Under the pilot program required by subsection (b), the Director may, acting through the Center, authorize the sharing of intelligence and threat information as described in paragraph (1) of such subsection through—</text><subparagraph id="id5bf0f0741a7e4597a16e51e77d09dd53"><enum>(A)</enum><text>bilateral exchanges between elements of the intelligence community and a covered person;</text></subparagraph><subparagraph id="id0bf58e972a06497ba23fe10a0929bf1a"><enum>(B)</enum><text>multilateral exchanges among covered persons, as determined appropriate by the Director; or</text></subparagraph><subparagraph id="id770f5795a7dc4e11b270d3705c7cfd77"><enum>(C)</enum><text>another designated intelligence-sharing mechanism operated or overseen by the Director.</text></subparagraph></paragraph><paragraph id="ide7d6044bdc53414d990d503bfa2ddcfe"><enum>(2)</enum><header>Limitation</header><text>Any mechanism established under this section shall be limited to the dissemination of intelligence and threat information and shall not establish standards, requirements, or best practices governing artificial intelligence development or deployment.</text></paragraph></subsection><subsection id="idf6584724c25d4b379331f060e36d3eb0"><enum>(e)</enum><header>Tailoring, handling, and protection of intelligence</header><paragraph id="idbfd4c7043d8941c6bc013729ffcfaaad"><enum>(1)</enum><header>Procedures required</header><text>The Director shall, acting through the Center, codify procedures to tailor, sanitize, or downgrade the classification level of intelligence shared under the pilot program required by subsection (b) to ensure usability while protecting intelligence sources and methods.</text></paragraph><paragraph id="id274702bbdc2d4b04847b52244dee62a5"><enum>(2)</enum><header>Examples of procedures</header><text>The procedures developed under paragraph (1) may include the following:</text><subparagraph id="id4e682da5f5f34566806fd22c69f69c95"><enum>(A)</enum><text>The use of tear lines and segregable summaries.</text></subparagraph><subparagraph id="id349eb6c9c6914a30b5bd4e515af860ef"><enum>(B)</enum><text>The preparation of classified annexes where necessary.</text></subparagraph><subparagraph id="id90456ba7432a4ca8838789dd913b9260"><enum>(C)</enum><text>Criteria governing the classification level of shared intelligence.</text></subparagraph><subparagraph id="id181ab00b38434aff80fe153949b7abae"><enum>(D)</enum><text>The appropriate use of cleared industry personnel.</text></subparagraph></paragraph><paragraph id="ida08b25bb79d94987937ef35620dbc8b6"><enum>(3)</enum><header>Handling requirements</header><text>The Director shall, acting through the Center, codify policies governing the handling, storage, and dissemination of intelligence shared under the pilot program required by subsection (b), including audit and compliance mechanisms.</text></paragraph></subsection><subsection id="id5abf31123a0a4e0d9ba1f17a13faf118"><enum>(f)</enum><header>Permissible use and nondisclosure</header><paragraph id="id5a7f8aad146e454395b8728b5080bc70"><enum>(1)</enum><header>Permissible use</header><text>Intelligence shared under the pilot program required by subsection (b) may be used solely for detecting, preventing, or mitigating malicious foreign activity exploiting access to United States artificial intelligence systems and enabling infrastructure to engage in intelligence collection, intellectual property theft, and other malicious activities.</text></paragraph><paragraph id="id4bd8cf6a223f420cb1a51bb4fc0b6e0c"><enum>(2)</enum><header>Nondisclosure</header><text>A covered person may not disclose to any person who is not a covered person or an element of the intelligence community any intelligence shared with the covered person under the pilot program required by subsection (b), except as expressly authorized by the Director acting through the Center.</text></paragraph></subsection><subsection id="id3aa0a76bebd44e15a7f9c961b835ebed"><enum>(g)</enum><header>Privacy and civil liberties</header><text display-inline="yes-display-inline">In planning and coordinating the pilot program required by subsection (b), the Director shall, acting through the Center, consult with the Civil Liberties Protection Officer of the Office of the Director of National Intelligence.</text></subsection><subsection id="idd0b3cff10f1c45a397ad743a1a929517"><enum>(h)</enum><header>Evaluation and reporting</header><paragraph id="id9c654693b54645ac956b2c795e34b0a4"><enum>(1)</enum><header>Evaluation</header><text>The Director shall, acting through the Center, continuously evaluate the effectiveness and risks of the pilot program established under subsection (b).</text></paragraph><paragraph id="id6e6bd1c9c14142e7bd6cebc8cb35d3c0"><enum>(2)</enum><header>Report</header><subparagraph commented="no" display-inline="no-display-inline" id="idea62349fc2124cff9e629ccd2af913f3"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 90 days before the date on which the pilot program required by paragraph (1) of subsection (b) terminates pursuant to paragraph (2) of such subsection, the Director shall, acting through the Center, submit to the congressional intelligence committees a report assessing—</text><clause id="id2edb9123a28147a7b8ae65798fc0bdec"><enum>(i)</enum><text>the effectiveness of intelligence sharing under the pilot program;</text></clause><clause id="idb6ab01ef3ed040518e1865b6cff623e3"><enum>(ii)</enum><text>the adequacy of safeguards for sources, methods, and privacy;</text></clause><clause id="id39684a3ac88b414296ef64172a21395b"><enum>(iii)</enum><text>the scope of participation; and</text></clause><clause id="id65084546a27341e49801c89e1374ab8c"><enum>(iv)</enum><text>whether the program should be modified, extended, or terminated.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide66ce943026c483fb96047dcd1c176af"><enum>(B)</enum><header>Form</header><text>The report submitted pursuant to subparagraph (A) shall be submitted in unclassified form, but may include a classified annex.</text></subparagraph></paragraph></subsection><subsection id="id2df0b5347caf436e8fedfc3e1575aeae"><enum>(i)</enum><header>Rule of construction</header><text display-inline="yes-display-inline">Nothing in this section shall be construed—</text><paragraph commented="no" display-inline="no-display-inline" id="id027f9833518f452e9a27cb2a2757a3ca"><enum>(1)</enum><text display-inline="yes-display-inline">to authorize the collection of intelligence on United States persons not authorized by another provision of law; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf8e587eded0f4f47803065819e09b5e4"><enum>(2)</enum><text display-inline="yes-display-inline">to require the disclosure of classified information to unauthorized persons; or </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id95efd7d1ab4f493381be8d4733716f3e"><enum>(3)</enum><text display-inline="yes-display-inline">to establish commercial, competition, or technology policy outside the purview of the intelligence community.</text></paragraph></subsection><subsection id="id581a662404a747a28009aca1d5c4762b" commented="no"><enum>(j)</enum><header>Exemption from disclosure; protection</header><text>Any information shared by a covered person or other entity or individual with the United States Government pursuant to this section—</text><paragraph id="id76d7321919a44ea2a250cfd3759a059f" commented="no"><enum>(1)</enum><text>shall be exempt from disclosure and withheld, without discretion, from the public, pursuant to section 552(b)(3)(B) of title 5, United States Code, and any other provision of United States law or law of any State, political subdivision or agency thereof, or Tribe requiring disclosure of information or records; and</text></paragraph><paragraph id="idd02973bfa4ba414888911ea5bdc1ae6e" commented="no"><enum>(2)</enum><text>shall not be deemed a waiver of any applicable privilege or protection, including trade secret protection.</text></paragraph></subsection></section><section id="idace778dce4064af2ac977b151b19cee7"><enum>702.</enum><header>Director of National Intelligence review of intelligence community use of artificial intelligence to support targeting</header><subsection id="id05c60ab2268c41fa8d6af71d8f16747f" commented="no"><enum>(a)</enum><header>Definitions</header><text>In this subsection:</text><paragraph id="idd424d9d03e42409fad4e917c865c4d7c" commented="no"><enum>(1)</enum><header>Director</header><text>The term <term>Director</term> means the Director of National Intelligence.</text></paragraph><paragraph id="id68e18c630026494fb245a9f8a2157f0f" commented="no"><enum>(2)</enum><header>Intelligence</header><text>The term <term>Intelligence</term> has the meaning given the term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph></subsection><subsection id="id3b96cb4a2a5b4ddb809f13717681e8b1"><enum>(b)</enum><header>Reviews related to intelligence community use of artificial intelligence to support targeting</header><paragraph id="id7adf872710944895ae60a32bd058d486"><enum>(1)</enum><header>Policy and procedure reviews</header><subparagraph commented="no" display-inline="no-display-inline" id="iddfbb691a184d4bbdab2e9f022bd5428d"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 60 days after the date of the enactment of this Act, the Director shall review and assess the policies and procedures that govern the use by the intelligence community of artificial intelligence technologies in the production, or review, of intelligence used by the United States to inform targeting decisions with lethal effects.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6f5c4981e1484a0da08e569479010e24"><enum>(B)</enum><header>Elements</header><text display-inline="yes-display-inline">In carrying out the review and assessment required by subparagraph (A), the Director shall—</text><clause id="id77ff046da9c949c4987c49770559fd6b"><enum>(i)</enum><text>assess whether policies and procedures of the intelligence community that were in effect on the day before the date of the enactment of this Act adequately address risks posed by the use of artificial intelligence technologies in the targeting analysis and development and civilian harm mitigation processes; and</text></clause><clause id="id68661699d52346b7a487afabf86a3b3e"><enum>(ii)</enum><text>ensure the review covers all policies of the intelligence community that regard the production or review of intelligence, regardless of which element first produced the intelligence.</text></clause></subparagraph></paragraph><paragraph id="id9a2bc6b828a84724bd62de31af5d7a2a"><enum>(2)</enum><header>Workflow reviews</header><text>Not later than 90 days after the date of the enactment of this Act, the Director shall review and assess all workflows of the intelligence community that incorporate artificial intelligence used by the United States to inform targeting decisions with lethal effects.</text></paragraph></subsection><subsection id="id7d1869e65b0d427392b7e7b0c526f51b"><enum>(c)</enum><header>Artificial intelligence errors exploratory analysis</header><text>In carrying out the reviews required by subsection (b), the Director shall direct the National Intelligence Council to conduct a structured, exploratory analysis that—</text><paragraph id="idc53f55fe2ab143888ecd646c03c156cc"><enum>(1)</enum><text>assess ways in which frontier artificial intelligence models could exhibit bias or cause errors that undermine intelligence or other information provided by the intelligence community that informs targeting accuracy;</text></paragraph><paragraph id="id998554e3c30744e884ea3b52ac1493ac"><enum>(2)</enum><text>identify the specific point and cause of error; and</text></paragraph><paragraph id="id2399815162264cebaf26f2e23e9e41af"><enum>(3)</enum><text>provide proposed process mitigations to catch and correct such mistakes.</text></paragraph></subsection><subsection id="id4a8985b31e9a4ef6a061a6cccc72dc29"><enum>(d)</enum><header>Consultation</header><text>In carrying out the review and assessments required by subsection (b), the Director shall consult with the heads of the elements of the intelligence community whose intelligence is commonly consulted to inform targeting decisions with lethal effects, such as the National Geospatial-Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, and the Central Intelligence Agency, to solicit input on potential negative consequences resulting from artificial intelligence supported analysis, and possible ways to mitigate such consequences.</text></subsection><subsection id="idee1d594076c443b8a013e01b70bfc5f2"><enum>(e)</enum><header>Policies and directives</header><text>The Director shall issue or adjust such policies and directives to the intelligence community as the Director considers appropriate to improve risk mitigation in light of the review carried out under subsection (b).</text></subsection><subsection id="idb70faaf81b30494280333b352af5dd39"><enum>(f)</enum><header>Report</header><paragraph commented="no" display-inline="no-display-inline" id="id99e24a81a3f248a9a5015b4e1f1806bd"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Director shall submit to the congressional intelligence committees a report on the reviews and assessments carried out under subsection (b) as well as a summary of any new policies and directives issued pursuant to subsection (e).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id168f08c5acd64822954176851e9a3d23"><enum>(2)</enum><header>Contents</header><text display-inline="yes-display-inline">The report required by paragraph (1) shall include the following:</text><subparagraph id="ida199a1ed600745a4a79fb8506ae392c3"><enum>(A)</enum><text>A description of contributions of the intelligence community to targeting workflows, such as identification of points of interest, pattern of life analysis, review of proposed targets, target selection, and civilian impact reviews, as well as the understanding of the intelligence community of the delineation of roles and responsibilities with the Armed Forces where applicable.</text></subparagraph><subparagraph id="id21b0df7272684e8cbc9a8cc6643a5352"><enum>(B)</enum><text>Identification of any artificial intelligence tools utilized and for what tasks or purposes they are used.</text></subparagraph><subparagraph id="id8b345f533ddb40439bd08df636f5a53f"><enum>(C)</enum><text>The level of autonomy afforded to the tools, and whether human review of artificial intelligence system outputs is required to be conducted prior to dissemination of materials.</text></subparagraph><subparagraph id="id5a2ca98a09d7406880912e1dd91634fc"><enum>(D)</enum><text>The scope of individuals expected to have access to the materials described in subparagraph (C).</text></subparagraph><subparagraph id="id361e67c6da7f4b35bf5afcd589904d5a"><enum>(E)</enum><text>An explanation of whether and how the capability limitations of artificial intelligence tools available to personnel of the intelligence community are communicated to users, including the cutoff date for the tool’s training data, databases to which it does or does not have access rights, and the tasks the model has been trained for or approved for use.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8dd502ddace04fe68847953e2f4fca52"><enum>(3)</enum><header>Form</header><text display-inline="yes-display-inline">The report submitted pursuant to paragraph (1) shall be submitted in unclassified form, but may include a classified annex.</text></paragraph></subsection></section><section id="iddcf63029480148b39c9dd725cbbb327b"><enum>703.</enum><header>Improvements for artificial intelligence policies, standards, and guidance for intelligence community</header><subsection commented="no" display-inline="no-display-inline" id="idd133ce317cd846019c4fc2d93dfd5582"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Section 6702 of the Intelligence Authorization Act for Fiscal Year 2023 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334m">50 U.S.C. 3334m</external-xref>) is amended—</text><paragraph id="id05cfc76e493d45f0b55b28e7d551aecb"><enum>(1)</enum><text>in subsection (b)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id2d24d034599f4f0ebd5fdd46fa852e66"><enum>(A)</enum><text display-inline="yes-display-inline">by redesignating paragraph (3) as paragraph (4); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idd9d1723b1d764241a8625631bdda119c"><enum>(B)</enum><text>by inserting after paragraph (2) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ida99a06a38123499e95ee7edbf2e13141"><paragraph id="id0ff2e18162b448bc8ae26cc8a103c2a9"><enum>(3)</enum><header>Study for tracking data generated or modified by an artificial intelligence system</header><text>The Chief Artificial Intelligence Officer of the Intelligence Community, in coordination with the Chief Artificial Intelligence Officer of each element of the intelligence community, shall examine whether the intelligence community should identify intelligence information generated or materially modified by an artificial intelligence system, including determining what methods are necessary to preserve such information throughout the intelligence lifecycle.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id54321a87a82346e2a23254b08ed94eba"><enum>(2)</enum><text>in subsection (d), by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="iddfe26b7c596d44a39e2c37adb97f9c72"><paragraph id="idfe08043fcc944acd983b7d59d19a120b"><enum>(3)</enum><header>Process for review of artificial intelligence testing methodologies and benchmarks</header><text>Consistent with applicable classification and access policies, the Chief Artificial Intelligence Officer of the Intelligence Community, in coordination with the Chief Artificial Intelligence Officer of each element of the intelligence community, shall—</text><subparagraph commented="no" display-inline="no-display-inline" id="idd718ad4427ce45128413cff7c9c16081"><enum>(A)</enum><text display-inline="yes-display-inline">establish a process to review artificial intelligence testing methodologies and benchmarks employed within each element; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9f9c28bdb4584d96ae3db7df31967da8"><enum>(B)</enum><text display-inline="yes-display-inline">ensure such methodologies and benchmarks remain commensurate with the capabilities and impacts of systems being evaluated. </text></subparagraph></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="ida509f488dcd54ba89b6cb418d2fc2807"><enum>(3)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id4bdee868cdc34042a4e111a06a33b0f2"><subsection commented="no" display-inline="no-display-inline" id="id68a11c74a5004721b3e3efb5c2d9d458"><enum>(f)</enum><header>Process to systematically track and evaluate incidents</header><text>Not later than 180 days after the date of the enactment of this subsection, the Chief Artificial Intelligence Officer of the Intelligence Community, in coordination with the National Manager for National Security Systems, shall establish a process to systematically track and evaluate incidents associated with compromises to the confidentiality, integrity, or availability of artificial intelligence systems within each element of the intelligence community.</text></subsection><subsection id="ida766fdb77ffd42f9aeebe264629179b4"><enum>(g)</enum><header>Policies for agentic artificial intelligence systems and processes</header><paragraph id="id764378557bbe4f7ab12e511565515dec" commented="no"><enum>(1)</enum><header>Definition of agentic artificial intelligence system or process</header><text>In this subsection, the term <term>agentic artificial intelligence system or process</term>—</text><subparagraph commented="no" display-inline="no-display-inline" id="id1785d467764f4552ac3fed4fe1b47ada"><enum>(A)</enum><text display-inline="yes-display-inline">means an artificial intelligence system or process that, given an objective or instruction—</text><clause commented="no" display-inline="no-display-inline" id="id637e7566c5ac40928f2ba134ba6007aa"><enum>(i)</enum><text display-inline="yes-display-inline">determines the action or sequence of actions to be taken to accomplish that objective; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id70b3ad165e24420e96db8777f4618583"><enum>(ii)</enum><text display-inline="yes-display-inline">is capable of executing such actions directly on information systems, data, or external services; and </text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6d673779daa94a3db8483dd53069fa03"><enum>(B)</enum><text display-inline="yes-display-inline">does not include a system or process that solely generates informational or advisory output for a human operator to act upon.</text></subparagraph></paragraph><paragraph id="id7e30661748264b308e3f44f9abc4df81"><enum>(2)</enum><header>Review of the adequacy of existing identity, credential, and access management systems for information within the intelligence community</header><subparagraph commented="no" display-inline="no-display-inline" id="idf427f9b2eb5044869e08ee7b4184fe63"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Consistent with authority under section 102A(g) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3024">50 U.S.C. 3024(g)</external-xref>), the Director of National Intelligence, in coordination with the National Manager for National Security Systems, shall—</text><clause commented="no" display-inline="no-display-inline" id="id813dc09dc1f94ccd86c5afe45c3aca98"><enum>(i)</enum><text display-inline="yes-display-inline">not later than 1 year after the date of the enactment of this paragraph, complete a review of the adequacy of existing identity, credential, and access management systems for information within the intelligence community used by agentic artificial intelligence systems and processes; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id0f4c2ca9ea6e465ab3438b9cdbfa7ecb"><enum>(ii)</enum><text display-inline="yes-display-inline">not permit access to any information within the intelligence community by an external department or agency for use in an agentic artificial intelligence system or process until the review required by clause (i) is completed.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idf61e103e0532463ca53ca22637abf654"><enum>(B)</enum><header>Evaluation of effectiveness of mechanisms for agentic artificial intelligence systems and processes to authenticate as non-human actors</header><text display-inline="yes-display-inline">The review required by subparagraph (A)(i) shall include an evaluation of the effectiveness of mechanisms for agentic artificial intelligence systems and processes to authenticate as non-human actors, including the appropriate delegation of clearance entitlements and the traceability of any action taken by an agentic artificial intelligence system or process to a cleared individual on whose behalf the agentic artificial intelligence system or process is acting.</text></subparagraph></paragraph><paragraph id="id016e55c016fc4525a01f7dc4c4d5df98"><enum>(3)</enum><header>Policy guidance</header><text>Upon completion of the review required by paragraph (2), the Director of National Intelligence, in coordination with the Director of the National Security Agency, the Director of the National Reconnaissance Office, and the Director of the National Geospatial-Intelligence Agency, shall issue appropriate policy guidance on—</text><subparagraph commented="no" display-inline="no-display-inline" id="id0feb9e2bd5f648778679bf749f164280"><enum>(A)</enum><text display-inline="yes-display-inline">the use of agentic artificial intelligence systems and processes within the intelligence community; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7c1659fe17c94de8a5afcfa95ba92b2f"><enum>(B)</enum><text>the access of agentic artificial intelligence systems and processes to information within the intelligence community. </text></subparagraph></paragraph><paragraph id="id4e2a8f30007347f68f606903288855c5"><enum>(4)</enum><header>Specific issues relating to agentic artificial intelligence systems and processes</header><text>In carrying out paragraph (3), the Director of National Intelligence, at a minimum and to the extent such requirements are not already replicated in existing processes or policies, consider—</text><subparagraph id="id3cc42824e84645c999fb5009e15b1686"><enum>(A)</enum><text>establishing a taxonomy of autonomy and security risks associated with agentic artificial intelligence systems and processes that operate on, or have the possibility of accessing, information within the intelligence community; and</text></subparagraph><subparagraph id="id21b10aa35795429cb02a9ccfdbb55284"><enum>(B)</enum><text>establishing technical controls, processes, and other mitigation measures to address the risks identified under subparagraph (A), including, at a minimum—</text><clause commented="no" display-inline="no-display-inline" id="idf403f9161ed4470b837ed281343fa1b4"><enum>(i)</enum><text display-inline="yes-display-inline">requirements that any element of the intelligence community or external department or agency incorporating information from an intelligence community element as part of an agentic artificial intelligence system or process provide the relevant element of the intelligence community controlling such information with documentation of—</text><subclause id="idad768fc959fa481e81d0b9260db15b1c"><enum>(I)</enum><text>the properties of the agentic artificial intelligence system or process, including the range of additional systems or data sources it may access (whether as a system or process input or as an agent action), the permissions and classification entitlements associated with such access, as well as any relevant model or system documentation, such as model and system cards;</text></subclause><subclause id="ided7f9a4c35914d3582435ecb2e8aebc6"><enum>(II)</enum><text>anticipated mission use cases for any access to information within the intelligence community in the context of an agentic artificial intelligence system or process, including whether any use case constitutes a high-impact artificial intelligence use as those terms are defined under existing Federal policies; </text></subclause><subclause id="id650cd67cbd06434e8c3d3668309c6777"><enum>(III)</enum><text>procedures to notify relevant intelligence community elements controlling such information of any changes to the properties of the agentic artificial intelligence system or process, to permissions and classification entitlements, or to anticipated use cases of such system or process, that might significantly limit the utility, confidentiality, integrity, or availability of such information; and</text></subclause><subclause id="idb76db37ef9094f448d6cf82d3e6a52a3"><enum>(IV)</enum><text>procedures for intelligence community elements to promptly notify external intelligence community elements or departments or agencies of any material changes to upstream classified data or systems that might significantly limit or impair the utility, confidentiality, integrity, or availability of any downstream agentic artificial intelligence system or process maintained by that external intelligence community element or department or agency;</text></subclause></clause><clause id="id760c0a8c63a4410ea8368c9b3a9be531"><enum>(ii)</enum><text>policies and procedures to log any actions, as well as associated inputs, taken by an agentic artificial intelligence system or process to information within the intelligence community, including mechanisms to reverse or negate unauthorized actions or actions that pose a risk to the user intent or confidentiality, integrity, or availability of such information; </text></clause><clause id="idd9bc1fab20a2496184f2c15a28f5474b"><enum>(iii)</enum><text>policies and procedures for safeguards, continuous monitoring, and the detection of security incidents or other unexpected behavior of an agentic artificial intelligence system or process, or failures of associated safeguards, that may pose a threat to the confidentiality, availability, or integrity of information within the intelligence community; </text></clause><clause id="idb0a1cae93f2f438a84b1e64fffba60b1"><enum>(iv)</enum><text>policies and procedures for system-level controls of agentic artificial intelligence systems and processes, tailored to address each system or process component; and</text></clause><clause id="id3bd015fc82cb4574aafde49819d24796"><enum>(v)</enum><text>criteria for the selection of interoperability standards for agentic artificial intelligence systems and processes, with preference, to the extent practicable, for standards that are openly specified, governed in a vendor-neutral manner, supported by multiple model providers, extensible to future requirements, and subject to ongoing independent security review.</text></clause></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id418ce2c6f64440c8bba9e31e4216b9cb"><enum>704.</enum><header>Additional functions and requirements of Artificial Intelligence Security Center</header><text display-inline="no-display-inline">Section 6504 of the Intelligence Authorization Act for Fiscal Year 2025 (division F of <external-xref legal-doc="public-law" parsable-cite="pl/118/159">Public Law 118–159</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="ide6ff5cb8fae24006a38942d5eff0e75d"><enum>(1)</enum><text display-inline="yes-display-inline">in subsection (c)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id1d0b057fde414955a0ea863c0543eb08"><enum>(A)</enum><text display-inline="yes-display-inline">by redesignating paragraph (3) as paragraph (4); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7559169b09734ba5a8bec9a08d37a0d0"><enum>(B)</enum><text>by inserting after paragraph (2) the following new paragraph (3):</text><quoted-block style="OLC" display-inline="no-display-inline" id="id4455ee4c5e014f1b88d60a0c01274a7b"><paragraph id="id82b2929b126c43ec880a289c21e7f102"><enum>(3)</enum><text>Making available a research test-bed to private sector and academic researchers, on a subsidized basis, to engage in artificial intelligence security research, including through the secure provision of access in a secure environment for pre-deployment testing of to proprietary third-party models with the consent of the vendors of the models.</text></paragraph><after-quoted-block>; </after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id88970c49aa334d91a0ff17382630b3b0"><enum>(2)</enum><text>by redesignating subsection (d) as subsection (f); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idda6415fffc05463f88985516a9e79eb1"><enum>(3)</enum><text>by inserting after subsection (c) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id417a327b7eb549a384a64ad618cd5bd9"><subsection commented="no" display-inline="no-display-inline" id="id8c6e4b69174343cc8097b7a2c55b23cb"><enum>(d)</enum><header>Test-bed requirements</header><paragraph id="id4df2baa38dc24940b49d8b6dba339f1f"><enum>(1)</enum><header>Access and terms of usage</header><subparagraph commented="no" display-inline="no-display-inline" id="idbd7ce37f04694b5c9ab85b48f44a9894"><enum>(A)</enum><header>Researcher access</header><text display-inline="yes-display-inline">The Director shall establish terms of usage governing researcher access to the test-bed made available under subsection (c)(3), with limitations on researcher publication only to the extent necessary to protect classified information or proprietary information concerning third-party models provided through the consent of model vendors.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id99c05146aa5f4588919634e422aa51cf"><enum>(B)</enum><header>Availability to Federal agencies</header><text display-inline="yes-display-inline">The Director shall ensure that the test-bed made available under subsection (c)(3) is also made available to other Federal agencies on a cost-recovery basis.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ide2656fbb34c8480d8d2b3bb4ddd2623c"><enum>(2)</enum><header>Use of certain infrastructure and other resources</header><text>In carrying out subsection (c)(3), the Director shall leverage, to the greatest extent practicable, infrastructure and other resources provided under section 5.2 of Executive Order 14110 (88 Fed. Reg. 75191; relating to safe, secure, and trustworthy development and use of artificial intelligence).</text></paragraph><paragraph id="id15cfd345647d4d78a1a1be73a89c8255"><enum>(3)</enum><header>Voluntary security guidance</header><text>In order to incentivize participation by vendors of leading commercial models and to promote the national security of the United States, the Director shall share relevant guidance, informed by pre-deployment testing in the secure test-bed environment identified in subsection (c), to inform voluntary vendor actions to mitigate against potential security threats to such models, or the ability of foreign actors to utilize such models for computer network exploitation campaigns, the design or development of weapons systems, or to further foreign surveillance capabilities.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="id11b59871ec2945fd8a8a8e7c63d7b870"><enum>705.</enum><header>Reports on novel uses of artificial intelligence technology</header><subsection commented="no" display-inline="no-display-inline" id="id8c34692bddb14d4fb2d7b107cd20c958"><enum>(a)</enum><header>Definition</header><text>In this section, the term <term>novel use of artificial intelligence technology</term> means—</text><paragraph commented="no" display-inline="no-display-inline" id="id6b7df46e704d4151b08bec632bfd8681"><enum>(1)</enum><text display-inline="yes-display-inline">an artificial intelligence capability or series of capabilities combined that has not previously been included in an intelligence community element’s inventory of artificial intelligence use cases consistent with guidance issued pursuant to section 6702(b) of the Intelligence Authorization Act for Fiscal Year 2023 (<external-xref legal-doc="usc" parsable-cite="usc/50/3334m">50 U.S.C. 3334m(b)</external-xref>); </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8ddac27a5c3d482893beb23eb34adfed"><enum>(2)</enum><text display-inline="yes-display-inline">a use of an artificial intelligence capability that contravenes a restriction on the use of artificial intelligence contained in such an inventory; or</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id82c8984ff5b44af9a12300073bd02fa0"><enum>(3)</enum><text display-inline="yes-display-inline">a use of an artificial intelligence capability that constitutes a high-impact artificial intelligence use as that term is defined under policies of the executive branch. </text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id482638b530f3402c9dbae0be2fc80afb"><enum>(b)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 90 days after the date of the enactment of this Act, and every 180 days thereafter, the Director of National Intelligence, in coordination with the heads of the other elements of the intelligence community, shall submit to the congressional intelligence committees a consolidated report detailing any novel use of artificial intelligence technology that any element of the intelligence community is considering employing within the one-year period following submission of such report.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idb26ebd6ce6e34bf98d7cc56192b3c77f"><enum>(c)</enum><header>Contents</header><text>Each report submitted pursuant to subsection (b) shall describe the proposed novel use of artificial intelligence technology, including—</text><paragraph commented="no" display-inline="no-display-inline" id="idc55dc3abb5dc4bfca30d498724a7791e"><enum>(1)</enum><text>hardware and software requirements; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id069425939001464c927954f3e43d80a2"><enum>(2)</enum><text display-inline="yes-display-inline">the proposed application of the technology; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1c8d85b00f884866bc2cf3593b89e18a"><enum>(3)</enum><text display-inline="yes-display-inline">the risks and advantages assessed with respect to the proposed novel use; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8a1ca637ca9e4db4b40c43cafce225d0"><enum>(4)</enum><text display-inline="yes-display-inline">any specific risk mitigation measures contemplated, including measures specific to the proposed novel use; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id3aa943eab97348f383bb8280fc39c14c"><enum>(5)</enum><text display-inline="yes-display-inline">any test and evaluation activities conducted in conjunction with the proposed novel use; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5aa70bfe528b47ecbb186266038f0c05"><enum>(6)</enum><text display-inline="yes-display-inline">any additional test and evaluation activity that is still needed, and whether the intelligence community has resources to conduct and fund such activity; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4eb3dd8c121a4ba892b52ad97f014635"><enum>(7)</enum><text display-inline="yes-display-inline">any estimated cost increases anticipated in connection with the proposed novel use. </text></paragraph></subsection><subsection id="idd2dba2a4f8b047a2aef5bbce75696fe3"><enum>(d)</enum><header>Form</header><text>Each report submitted pursuant to subsection (b) shall be submitted in classified form. </text></subsection><subsection id="id75782e588de44897904ee513967fac19"><enum>(e)</enum><header>Sunset</header><text>This section shall expire on October 1, 2032. </text></subsection></section><section id="id4432739542f84fa08935fd09e4f7bc46"><enum>706.</enum><header>Clear labeling of artificial intelligence outputs for targeting workflows</header><text display-inline="no-display-inline">Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence shall, in coordination with the Chief Artificial Intelligence Officers of the elements of the intelligence community, establish a policy that applies to elements of the intelligence community, which generate intelligence that could reasonably be judged useful to develop or inform targeting with lethal effects, and that requires—</text><paragraph id="id70c0d343beee4e8b8f5c0338619cbc83"><enum>(1)</enum><text>labeling of outputs from any artificial intelligence system used in the development of such intelligence are clearly marked to indicate—</text><subparagraph commented="no" display-inline="no-display-inline" id="id82b97e463cbf4ae38837fe68343c610d"><enum>(A)</enum><text>that artificial intelligence was used;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide48a80b4d8a243eb8da32539938eac35"><enum>(B)</enum><text>the artificial intelligence system or model used;</text></subparagraph><subparagraph id="id76c7f856edf04beaa5500144b11eb781"><enum>(C)</enum><text>the manner in which, or task for which, the artificial intelligence was used; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4a7d2ef69e0c4823bd6939ded0eb44bf"><enum>(D)</enum><text>a point of contact such as the relevant Chief Artificial Intelligence Officer, who can address questions about data inputs, system access, or artificial intelligence system performance; and</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7457ac1fcad9430dab6f821f77004770"><enum>(2)</enum><text>the label or indicator that is used pursuant to paragraph (1) is attached to the resulting data or work product in a manner that remains prominent and visible to any person who subsequently interacts with that data on a system of the intelligence community, regardless of organizational affiliation of the person or the role of the person in developing the data.</text></paragraph></section><section id="id51d8df191b14450b8d450d0fbc171cb8"><enum>707.</enum><header>Research on use of artificial intelligence relating to inadvertent escalation</header><subsection id="id78124b465ac546b985a86c6001726693"><enum>(a)</enum><header>Requirement</header><text>Not later than 90 days after the date of the enactment of this Act and subject to the availability of appropriations, the Director of the Intelligence Advanced Research Projects Activity, in coordination with the Chief Artificial Intelligence Officer of the Intelligence Community, shall commence a research campaign to deepen the understanding of the intelligence community with respect to specific ways in which the use of artificial intelligence systems by the intelligence community could contribute to inadvertent escalation with foreign nations or actors.</text></subsection><subsection id="id4d824a27b6774c4f81f4a69a9d29dc2d"><enum>(b)</enum><header>Elements</header><text>The research campaign required by subsection (a) shall include—</text><paragraph commented="no" display-inline="no-display-inline" id="idf494ef86425845de99fa7086936ea4df"><enum>(1)</enum><text>the identification of scenarios in which artificial intelligence capabilities could contribute to inadvertent escalation with foreign nations or actors, including—</text><subparagraph commented="no" display-inline="no-display-inline" id="id668649e5af254c39a026565044203588"><enum>(A)</enum><text display-inline="yes-display-inline">analytic judgments that fail to properly consider or weigh alternative explanations;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide69ea71107ce4096addac6bf8b2772d6"><enum>(B)</enum><text display-inline="yes-display-inline">automation of imagery classification or signals intelligence; </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id84804ab5034b4bf2942b5dcda83b7fd6"><enum>(C)</enum><text display-inline="yes-display-inline">distinguishing between civilians and authorized targets;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id92fb929706ff4691b9589f92102bbfc8"><enum>(D)</enum><text display-inline="yes-display-inline">operational uses of artificial intelligence, such as time-constrained uses that do not allow for independent verification; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id016dbdbf7b194ec0885a950c65d75c7d"><enum>(E)</enum><text display-inline="yes-display-inline">such other scenarios as identified by the Director or participating subject matter experts;</text></subparagraph></paragraph><paragraph id="id30c483bb0f7c478fab691b130fbbdcb9"><enum>(2)</enum><text>a simulation of select scenarios to discern where miscommunication or miscalculations have a higher likelihood of occurrence; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9bf9a2b11a9046229dec08895c799f4c"><enum>(3)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="id88a6f74920ee4ae79bcb202be4cdbf54"><enum>(A)</enum><text>an identification of potential mitigations for vulnerabilities discovered; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id11a3a62a0e604918bdb5badfd2f0fa57" indent="up1"><enum>(B)</enum><text display-inline="yes-display-inline">if no mitigation could be identified, an identification of vulnerabilities that require follow-up action by the intelligence community.</text></subparagraph></paragraph></subsection><subsection id="idb0b0cbf6c4f34c12acb63f43c895180e"><enum>(c)</enum><header>Briefings</header><paragraph commented="no" display-inline="no-display-inline" id="id53edd83f791f4d73bcf6f6615bae6150"><enum>(1)</enum><header>Congress</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, or 30 days after the date of completion of the research campaign required by subsection (a), whichever occurs first, the Director of the Intelligence Advanced Research Projects Activity, in coordination with the Chief Artificial Intelligence Officer of the Intelligence Community, shall brief the congressional intelligence committees on the findings and recommendations of the research campaign.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8e0d81a3767b41ed836d4ebf44602727"><enum>(2)</enum><header>Intelligence community</header><text>The Director of the Intelligence Advanced Research Projects Activity, in coordination with the Chief Artificial Intelligence Officer of the Intelligence Community, shall brief the heads and Chief Artificial Intelligence Officers of the elements of the intelligence community on the findings and recommendations of the research campaign required by subsection (a), as appropriate.</text></paragraph></subsection></section><section id="idcd8b1197d67244348f8baf2319b4a679"><enum>708.</enum><header>Research on interaction of adversarial artificial intelligence systems with intelligence community systems</header><subsection id="ida166f141ad95452cae9420e59ddf7f93"><enum>(a)</enum><header>Requirement</header><text>Not later than 90 days after the date of the enactment of this Act and subject to the availability of appropriations, the Director of the Intelligence Advanced Research Projects Activity, in coordination with the Chief Artificial Intelligence Officer of the Intelligence Community, shall commence a research campaign to deepen the understanding of the intelligence community with respect to novel dynamics and vulnerabilities that may arise when an adversarial artificial intelligence system interacts directly with systems of, or contracted by, the intelligence community that include artificial intelligence components.</text></subsection><subsection id="id7ec65f3ff61d4a259ecda232cddb6a6a"><enum>(b)</enum><header>Elements</header><text>The research campaign required by subsection (a) shall—</text><paragraph commented="no" display-inline="no-display-inline" id="idf0c33b3a59b1453297d68860951c1baf"><enum>(1)</enum><text display-inline="yes-display-inline">pursue sandbox demonstrations with frontier artificial intelligence models or leverage other tactics necessary to uncover vulnerabilities to intelligence community systems, infrastructure, or personnel that may result from—</text><subparagraph id="idadf64141e2de4c468ec18bef629c087c"><enum>(A)</enum><text>the accelerated development of artificial intelligence capabilities by foreign nations;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1961b45bcb2b41e392c8e803c45f572b"><enum>(B)</enum><text display-inline="yes-display-inline">the increasing access that non-state and criminal actors have to commercial artificial intelligence tools that can identify vulnerabilities and propose or orchestrate attacks; and</text></subparagraph><subparagraph id="idb5bc9c2d15d0425da948fc9057464fc9"><enum>(C)</enum><text>the potential for artificial intelligence systems to interact directly with each other during an attack; and</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id062d5ab5b79549798d1e7a25b159ca8d"><enum>(2)</enum><text>pursue findings, including—</text><subparagraph commented="no" display-inline="no-display-inline" id="id11eae7e39ad844579052932574c14989"><enum>(A)</enum><text display-inline="yes-display-inline">an identification of potential mitigations for unique vulnerabilities discovered; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9dd2b0352dab494382de4edd77a708e1"><enum>(B)</enum><text display-inline="yes-display-inline">if no mitigation could be identified, an identification of vulnerabilities that require follow-up action by the intelligence community.</text></subparagraph></paragraph></subsection><subsection id="idb279ea97b37c490ea68a80203ceb1522"><enum>(c)</enum><header>Briefings</header><paragraph commented="no" display-inline="no-display-inline" id="id6d86497a633543a7bd190aa116c99571"><enum>(1)</enum><header>Congress</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, or 30 days after the date of completion of the research campaign required by subsection (a), whichever occurs first, the Director of the Intelligence Advanced Research Projects Activity, in coordination with the Chief Artificial Intelligence Officer of the Intelligence Community, shall brief the congressional intelligence committees on the findings and recommendations of the research campaign.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4e076859e14149668f11088c623cf979"><enum>(2)</enum><header>Intelligence community</header><text>The Director of the Intelligence Advanced Research Projects Activity, in coordination with the Chief Artificial Intelligence Officer of the Intelligence Community, shall brief the heads and Chief Artificial Intelligence Officers of the elements of the intelligence community on the findings and recommendations of the research campaign required by subsection (a), as appropriate.</text></paragraph></subsection></section><section id="id1b563f612850421bbfcbb40a80cfe56f"><enum>709.</enum><header>Proliferation assessments regarding the export of artificial intelligence-related technologies</header><subsection id="id0a92f9d0805d490f81c6f4835635a5df"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id49d68378f85b42c6b36484187a912248"><enum>(1)</enum><header>Artificial intelligence technology</header><text>The term <term>artificial intelligence technology</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="id7820aa7b8baa47a9b10ced0d3af4978b"><enum>(A)</enum><text display-inline="yes-display-inline">any United States-origin model weights;</text></subparagraph><subparagraph id="id92e90bffd8834c0a876fc359e924fc84"><enum>(B)</enum><text>semiconductor manufacturing equipment; and</text></subparagraph><subparagraph id="id731fe5875a0b4672ababe1fb2ab8cfa4"><enum>(C)</enum><text>any other item classified under—</text><clause commented="no" display-inline="no-display-inline" id="id55cc96991090430c9cc7f66fc61032d0"><enum>(i)</enum><text display-inline="yes-display-inline">Export Control Classification Number 3A090 or 4A090 of the Commerce Control List or corresponding entries in the Export Administration Regulations, as in effect on the date of the enactment of this Act; or</text></clause><clause commented="no" display-inline="no-display-inline" id="id79dfb8f5f9b2498e845a93c7bd59e3e9"><enum>(ii)</enum><text display-inline="yes-display-inline">any subsequent revisions to the Commerce Control List as amended by the Bureau of Industry and Security to impose more restrictive parameters.</text></clause></subparagraph></paragraph><paragraph id="id7bcb122516da4d248d5b58e0129083a2"><enum>(2)</enum><header>Commerce Control List</header><text>The term <term>Commerce Control List</term> means the Commerce Control List set forth in Supplement No. 1 to part 774 of the Export Administration Regulations.</text></paragraph><paragraph id="idc3caa917307343b993ded068ddac60cb"><enum>(3)</enum><header>United States artificial intelligence stack</header><text>The term <term>United States artificial intelligence stack</term> means the United States artificial intelligence integrated circuits, cloud infrastructure, and models.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ide1ebb567149b44ad858984c9f7274189"><enum>(4)</enum><header>Export control terms</header><text>The terms <term>export</term>, <term>Export Administration Regulations</term>, <term>in-country transfer</term>, <term>reexport</term>, and <term>United States person</term> have the meanings given those terms in section 1742 of the Export Control Reform Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/50/4801">50 U.S.C. 4801</external-xref>).</text></paragraph></subsection><subsection id="id808fa24e6783439fafe4617cafca7591"><enum>(b)</enum><header>Statement of policy</header><text>It shall be the policy of the United States to restrict access to the most sophisticated artificial intelligence integrated circuits and models that United States adversaries may seek to use against the United States, while also exporting the full United States artificial intelligence stack to allies and partners who adhere to stringent national security standards.</text></subsection><subsection id="id957ecd0b7055456d981b59ff64b2e8ee"><enum>(c)</enum><header>Requirement</header><text>Not fewer than 90 days before the Secretary of Commerce grants a license for the export, reexport, or in-country transfer of artificial intelligence technology, or before the United States joins an agreement on artificial intelligence with a foreign government, the Director of National Intelligence, acting through the National Intelligence Council, and in coordination with the Director of the Central Intelligence Agency, the Assistant Secretary of State for Intelligence and Research, the Director of the National Security Agency, and the heads of other appropriate elements of the intelligence community, shall provide to the President and the congressional intelligence committees a written assessment containing a comprehensive analysis regarding the risks associated with such action.</text></subsection><subsection id="id4814c5cb60b6400b85bfcdbc79e4c629"><enum>(d)</enum><header>Substance</header><text>Each report submitted under subsection (c) shall include the assessment of the intelligence community of the consequences of the action concerned for United States national security, including assessment of—</text><paragraph id="id817ae98afd20499ea29e4e1ca5817acb"><enum>(1)</enum><text>the recipient country’s export control system with respect to artificial intelligence technology, including integrated circuits, integrated circuit design software, tools, and manufacturing equipment;</text></paragraph><paragraph id="id05d8a023c81c4814b532d9349a1cb829"><enum>(2)</enum><text>information on any past, present, or expected interactions, including commercial ties and cooperation, between commercial entities or government entities in the recipient country and other countries of proliferation concern, including the People’s Republic of China and the Russian Federation;</text></paragraph><paragraph id="idf888423a23cc488cb85f2cf2529e2d0f"><enum>(3)</enum><text>actual or suspected transfers of artificial intelligence technology to such countries, including the People’s Republic of China and the Russian Federation; </text></paragraph><paragraph id="id92adc5cd62374781ac492e00c5ff1f3b"><enum>(4)</enum><text>the consequences that onward proliferation of United States artificial intelligence technology from the recipient would have for United States efforts to both deny adversaries access to advanced artificial intelligence technology and maintain a significant competitive advantage in frontier artificial intelligence development, integrated design, and integrated manufacturing, especially relative to the progress of the People’s Republic of China and the Russian Federation;</text></paragraph><paragraph id="id93ffce2183e440ea870467a56cc47ecc"><enum>(5)</enum><text>the capacity of the intelligence community and United States commercial entities to have near real-time awareness of the any potential technology leakage or export violations by the recipient country;</text></paragraph><paragraph id="idb7d92108619044929cb2b692f2f222ba"><enum>(6)</enum><text>potential measures that the intelligence community assesses could reasonably be taken by the recipient country to mitigate both the proliferation concerns identified by the intelligence community and the consequences of any potential onward proliferation as detailed in paragraph (4);</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idabb452e9e48f4b97b7457815ce8c6923"><enum>(7)</enum><text>in the case of the grant of a license, specific measures that the intelligence community will take to evaluate compliance with any associated restrictions or compliance requirements; </text></paragraph><paragraph id="idf9f9ec80f1be4efc953498c9a9ed8dfa"><enum>(8)</enum><text>whether export of artificial intelligence technology would reinforce United States artificial intelligence dominance;</text></paragraph><paragraph id="idc0b07bef93fa4e7eb1b591896ef82548"><enum>(9)</enum><text>the intended and likely end-uses, including military, intelligence, and domestic surveillance applications, and whether such uses are consistent with United States national security interests; and</text></paragraph><paragraph id="idebd749dc07e140c8b7e723c9299af6ea"><enum>(10)</enum><text>current and planned agreements and arrangements between the United States and the government of the recipient country.</text></paragraph></subsection><subsection id="ide1bdeeaca3134632a03307cc1e51b878"><enum>(e)</enum><header>Form</header><text>Each report submitted under subsection (c) shall be submitted in unclassified form, but may include a classified annex.</text></subsection></section><section id="id6ef2ebaab34540e2b1e21ff95953e2b9"><enum>710.</enum><header>Review of artificial intelligence security vulnerabilities under Vulnerabilities Equities Process</header><subsection commented="no" display-inline="no-display-inline" id="id39d7ef30a4fa4b74895f5e2943cd4815"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this section:</text><paragraph id="idf992b6e421244172abe4aa16ba77383c"><enum>(1)</enum><header>Artificial intelligence security vulnerability</header><text>The term <term>artificial intelligence security vulnerability</term> means a weakness in an artificial intelligence system that could be exploited by a third party to subvert, without authorization, the privacy, integrity, or availability of an artificial intelligence system, including through techniques such as—</text><subparagraph id="idd45ec43e54724c0aa2790382fff9d5f0"><enum>(A)</enum><text>evasion attacks;</text></subparagraph><subparagraph id="id7493fb143d0d4ac48bbc022939985c05"><enum>(B)</enum><text>poisoning attacks; </text></subparagraph><subparagraph id="id4ef21e25939d4f98905fe81ec200dcac"><enum>(C)</enum><text>privacy-based attacks;</text></subparagraph><subparagraph id="id81b1f6c44b3f4daa86939e34fa82374a"><enum>(D)</enum><text>model theft or extraction attacks; and</text></subparagraph><subparagraph id="id229c3160785a4be7857d19a8d5035cb1"><enum>(E)</enum><text>attacks designed to circumvent or degrade the safety, alignment, or access control mechanisms of an artificial intelligence system.</text></subparagraph></paragraph><paragraph id="ida1bd33985b3c4170817e0b85a1e0b87c" commented="no"><enum>(2)</enum><header>Artificial intelligence system</header><text>The term <term>artificial intelligence system</term> means a capability or series of capabilities combined that can, for a given set of objectives, generate outputs such as predictions, recommendations, or decisions without human intervention or input.</text></paragraph><paragraph id="id4e0bbecd27a64d05954be2e993a8aee9"><enum>(3)</enum><header>Vulnerabilities Equities Policy and Process document</header><text>The term <term>Vulnerabilities Equities Policy and Process document</term> means the executive branch document entitled <quote>Vulnerabilities Equities Policy and Process for the United States Government</quote> dated November 15, 2017.</text></paragraph><paragraph id="id901f3b991eea4a0687455de6de7dbd3e"><enum>(4)</enum><header>Vulnerabilities Equities Process</header><text>The term <term>Vulnerabilities Equities Process</term> means the interagency review of vulnerabilities carried out pursuant to the Vulnerabilities Equities Policy and Process document or any successor document.</text></paragraph></subsection><subsection id="idfedb19dfa223402783e7b7c9ed812f28"><enum>(b)</enum><header>Evaluation; report</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of the National Security Agency shall—</text><paragraph commented="no" display-inline="no-display-inline" id="id926a559b53c2448d8b19d332274f68e7"><enum>(1)</enum><text display-inline="yes-display-inline">evaluate whether the existing Vulnerabilities Equities Process sufficiently accommodates the submission and review of artificial intelligence security vulnerabilities; and</text></paragraph><paragraph id="id40040d49c61943f8ad6793641aa01c6d"><enum>(2)</enum><text>submit to the congressional intelligence committees a report describing the applicability of the Vulnerabilities Equities Process to such vulnerabilities, including whether the submission and review of such vulnerabilities under the Vulnerabilities Equities Process would result in an unduly large volume of notifications to affected vendors and, if so, an assessment of mechanisms to manage the volume of such notifications.</text></paragraph></subsection><subsection id="idff6cec47cc1141c0bb99a3ef6dadc3c9"><enum>(c)</enum><header>Process</header><text>In carrying out subsection (b), if the Director of the National Security Agency determines that the existing Vulnerabilities Equities Process does not sufficiently accommodate the submission and review of artificial intelligence security vulnerabilities identified by elements of the intelligence community, and that such vulnerabilities present public interest considerations meriting review under the Vulnerabilities Equities Process, the Director shall establish a process for the submission and review of such vulnerabilities under the Vulnerabilities Equities Process not later than 30 days after the date of such determination.</text></subsection><subsection id="id0cc8e0ce6fde44d8a6fdf96188e121a9"><enum>(d)</enum><header>Briefing on vulnerabilities identified by artificial intelligence systems</header><text>Not later than 90 days after the date of the enactment of this Act, the Director of the National Security Agency shall provide the congressional intelligence committees with a briefing on—</text><paragraph id="id2936dd8c2ff64b18ab6f7e847d97fcfd"><enum>(1)</enum><text>the volume of vulnerabilities of information systems identified by artificial intelligence systems;</text></paragraph><paragraph id="id2d9ff513496c433cb36b8ca1cba25487"><enum>(2)</enum><text>the impact of any change in such volume on the functioning of the Vulnerabilities Equities Process; and</text></paragraph><paragraph id="idf64e2c518b95496bb21300e3aa3081c3"><enum>(3)</enum><text>whether the increasingly rapid discovery and exploitation of such vulnerabilities by external cyber actors using artificial intelligence systems materially alters the equity of disclosure.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id60379f08c97545bbbf4d4e59f397ae39"><enum>(e)</enum><header>Consultation required</header><text>The Director of the National Security Agency shall carry out subsections (b), (c), and (d) in consultation with—</text><paragraph commented="no" display-inline="no-display-inline" id="idc65c0adffa8040418f7af95df84dceb5"><enum>(1)</enum><text display-inline="yes-display-inline">the Director of the Central Intelligence Agency;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idee0a277080a6493aa8f86730a02275e9"><enum>(2)</enum><text display-inline="yes-display-inline">the Director of the Federal Bureau of Investigation; and </text></paragraph><paragraph id="idcfe9e564e7604c0d9a56ef0f7ebc156e" commented="no" display-inline="no-display-inline"><enum>(3)</enum><text display-inline="yes-display-inline">other entities as the Director of the National Security Agency considers appropriate.</text></paragraph></subsection></section><section id="idc924fd2d9cb04e45818d9c946cbe6ddb"><enum>711.</enum><header>Prohibition on certain artificial intelligence models on intelligence community systems</header><subsection id="id3dea4d51649f4c9cb1a482fc764b532b"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="idfee1801ffec5414e8693c62be38be39a"><enum>(1)</enum><header>Artificial intelligence model</header><text>The term <term>artificial intelligence model</term> means a capability or series of capabilities combined that can, for a given set of objectives, generate outputs such as predictions, recommendations, or decisions without human intervention or input.</text></paragraph><paragraph id="ida0d229c35e6a48d7b95b8e08975035e8"><enum>(2)</enum><header>Child pornography</header><text>The term <term>child pornography</term> has the meaning given that term in section 2256 of title 18, United States Code.</text></paragraph><paragraph id="idfdc0238341814cf89e675b517c24df61"><enum>(3)</enum><header>Covered application</header><text>The term <term>covered application</term> means any specific artificial intelligence model that has been confirmed by a head of an element of the intelligence community, or their designee, as—</text><subparagraph id="idc894a003c81c4a8f844de842bc21f8b8"><enum>(A)</enum><text>failing to comply with the National Institute of Standard and Technology Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile with respect to <quote>obscene, degrading, and/or abusive content</quote>, or a successor standard or framework, to the extent the framework applies to synthetic child sexual abuse material or non-consensual intimate images of adults;</text></subparagraph><subparagraph id="id3946a3a0bb6b4a20bbc2f8a34774a924"><enum>(B)</enum><text>subject to a Federal court determination that such artificial intelligence model has generated content depicting child pornography; or</text></subparagraph><subparagraph id="id0667ea1684d941bdbf4875940a59fa54"><enum>(C)</enum><text>subject to a Federal court determination that such artificial intelligence model has generated non-consensual intimate visual depictions of an identifiable adult or a minor.</text></subparagraph></paragraph><paragraph id="id2276fe2f2d6541d3bc4352491f64ad0f"><enum>(4)</enum><header>Intimate visual depiction</header><text>The term <term>intimate visual depiction</term> has the meaning given that term in section 1309 of the Violence Against Women Act Reauthorization Act of 2022 (<external-xref legal-doc="usc" parsable-cite="usc/15/6851">15 U.S.C. 6851</external-xref>).</text></paragraph></subsection><subsection id="idcadc4dd0f711499fb3093525a70faa8d"><enum>(b)</enum><header>Prohibition</header><paragraph commented="no" display-inline="no-display-inline" id="id55c74546a78142deb9bc6558f69ef16d"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The acquisition or use of any covered application on national security systems operated by an element of the intelligence community or by a contractor of such element is prohibited unless the appropriate safeguards described in subsection (c) can be implemented.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id269b2c62cf8d48a5910cfb3577c2fc24"><enum>(2)</enum><header>Implementation</header><subparagraph commented="no" display-inline="no-display-inline" id="id10261e53e31545d185826ee16ab4cd66"><enum>(A)</enum><header>Initial removal</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, any covered application shall be required to be removed from national security systems operated by an element of the intelligence community or a contractor of such element. </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idbb081266e4b4426e9a32e5d4da6b22fb"><enum>(B)</enum><header>Subsequent removals</header><text display-inline="yes-display-inline">Beginning after the 180-day period described in subparagraph (A), any artificial intelligence model that becomes a covered application shall be required to be removed from national security systems operated by an element of the intelligence community or a contractor of such element not later than 180 days after the date that the model is confirmed by the head of an element of the intelligence community, or their designee, to be a covered application.</text></subparagraph></paragraph></subsection><subsection id="id721ef5b7f6404b63b4ebe0de86b3ac97"><enum>(c)</enum><header>Safeguards</header><paragraph id="id5da62e6d83c44a2790eae8f1fc014a5d"><enum>(1)</enum><header>In general</header><text>The head of an element of the intelligence community may implement additional safeguards that prohibit the generation of child pornography or non-consensual intimate visual depictions of an identifiable adult or a minor.</text></paragraph><paragraph id="id28fc7c4a02454fd280a8f8ffd0e514b7"><enum>(2)</enum><header>Certification required</header><text>The head of an element of the intelligence community shall certify to the Director of National Intelligence that safeguards implemented under paragraph (1) are sufficient to prevent misuse of covered applications to generate child pornography or intimate visual depictions of a minor.</text></paragraph><paragraph id="id915b2e9bbede4f8ea3beef8133d20a9b"><enum>(3)</enum><header>Congressional notification</header><text>The head of an element of the intelligence community that issues a certification pursuant to paragraph (2) shall notify the congressional intelligence committees of such certification not later than 7 days after issuing such certification. Such a notification shall identify the safeguards implemented pursuant to paragraph (1).</text></paragraph></subsection><subsection id="idea7f4c9f71f14b8d8c534f8784b369a9"><enum>(d)</enum><header>National security and research waiver</header><paragraph id="id6790a4f912184e0a8db19c0c3d8011e3"><enum>(1)</enum><header>In general</header><text>The head of an element of the intelligence community may issue a waiver for any artificial intelligence model that would otherwise be subject to the prohibition under subsection (b) if the head identifies a national security or research justification for such artificial intelligence model that benefits the intelligence community.</text></paragraph><paragraph id="id77a4c4c4dce2480db45350a1c8133bf4"><enum>(2)</enum><header>Congressional notification</header><text>Not later than 7 days after issuing a waiver pursuant to paragraph (1), the head of the element of the intelligence community that issues such waiver shall submit to the congressional intelligence committees a notification that includes—</text><subparagraph id="ide780f4984dea4e32b88fea798adc0378"><enum>(A)</enum><text>an identification of the national security or research justification for such usage;</text></subparagraph><subparagraph id="id5e647706d4874fd8bf82422b8fc42c26"><enum>(B)</enum><text>an estimate of the approximate cost of such usage; and</text></subparagraph><subparagraph id="idfa19a14ca44543c499559c267cfca41a"><enum>(C)</enum><text>a plan to implement a safeguard in such a way as to allow for continued usage consistent with the general prohibition described in subsections (b)(1) and (c)(1).</text></subparagraph></paragraph></subsection><subsection id="idc7cd02a5197a42b18a4f79212fc47b28" commented="no" display-inline="no-display-inline"><enum>(e)</enum><header>Cure</header><text display-inline="yes-display-inline">If a covered application is identified for removal or is disqualified from use or acquisition pursuant to this section, the head of an element of the intelligence community may offer the provider of the covered application an opportunity to cure performance to avoid removal pursuant to subsection (b)(2).</text></subsection></section></title><title id="id6e76e419f73e4e1f95f1eb20487ed89a" style="OLC"><enum>VIII</enum><header>Other matters</header><section id="id14e5888effd64a17a939b35895ce0c70"><enum>801.</enum><header>Modification to notification requirements for authorized and ordered departures</header><text display-inline="no-display-inline">Section 5173(e) of the Department of State Authorization Act for Fiscal Year 2026 (<external-xref legal-doc="usc" parsable-cite="usc/22/4865">22 U.S.C. 4865</external-xref> note; division E of <external-xref legal-doc="public-law" parsable-cite="pl/119/60">Public Law 119–60</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id93b84cd6eabd4157af301231fea3fb6c"><enum>(1)</enum><text>in paragraph (1), by inserting <quote>, the Permanent Select Committee on Intelligence, the Committee on Armed Services,</quote> after <quote>Foreign Affairs</quote>; and </text></paragraph><paragraph id="id21912bb17b504a98abd20be96efb72fe"><enum>(2)</enum><text>in paragraph (2), by inserting <quote>, the Select Committee on Intelligence, the Committee on Armed Services,</quote> after <quote>Foreign Relations</quote>. </text></paragraph></section><section id="id8fc4a200ce574d45b0e2432869e41a8b"><enum>802.</enum><header>Identification of reallocable frequencies</header><text display-inline="no-display-inline">Section 113 of the National Telecommunications and Information Administration Organization Act (<external-xref legal-doc="usc" parsable-cite="usc/47/923">47 U.S.C. 923</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id988a2a7101a0416a9309c7359e68661a"><enum>(1)</enum><text>in subsection (h)(7)(A)—</text><subparagraph commented="no" display-inline="no-display-inline" id="ide9481f2fee1846c4be893cfe8fb7fee8"><enum>(A)</enum><text>in clause (i), by redesignating subclauses (I) and (II) as items (aa) and (bb), respectively, and adjusting the margins accordingly;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idbcb1c32a6260477291b2aa88f1888f33"><enum>(B)</enum><text>by redesignating clauses (i) and (ii) as subclauses (I) and (II), respectively, and adjusting the margins accordingly;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id23a8e3ced6704123814cc7387e21e080"><enum>(C)</enum><text>by striking <quote>If any of the information</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id5929a158a6b947d5b68db736b800b5c4"><clause id="id53e89e55b462420eaefb12c58015215a"><enum>(i)</enum><header>In general</header><text>If a portion of the information</text></clause><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3cd8d2eeddf449be85b2c5e3a2166e07"><enum>(D)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idfbda45826a874deebe9f592c1de0654d"><clause id="idf383caf382dd4383b60c3168ee3efe57"><enum>(ii)</enum><header>Full classification</header><text>Notwithstanding paragraphs (5) and (6), if the classification of information required to be included in the transition plan of a Federal entity prohibits even the public release of a redacted transition plan, as determined by the head of the Federal entity, the Federal entity shall—</text><subclause commented="no" display-inline="no-display-inline" id="id9ea6b242d43741d2a720355c212ba2f3"><enum>(I)</enum><text display-inline="yes-display-inline">notify the NTIA that the entire transition plan must be classified and that even a redacted version cannot be made public; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id374a48bf1678417597ed5f43999a58fe"><enum>(II)</enum><text display-inline="yes-display-inline">classify the transition plan in accordance with the levels of materials contained in the transition plan.</text></subclause></clause><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9827ca2d18e344e48270bb167f47f3c8"><enum>(2)</enum><text>in subsection (l)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id5b6ad5f9885540bea764f4576f58f60a"><enum>(A)</enum><text>by striking <quote>For purposes of</quote> and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id6fc23ef86c1c49bcba147890f07e8d01"><paragraph id="id28faa09a841e470499861904d80797e3"><enum>(1)</enum><header>In general</header><text>For purposes of</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idba9b6d5d2a73404597e13d2562e2fe97"><enum>(B)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ida966199cb5944f0ca62c9cd2a9196381"><paragraph id="idd927bc21849c47f59f0fd9e70dc91a11"><enum>(2)</enum><header>Elements of the intelligence community</header><text>Notwithstanding paragraph (1) or any other provision of this part, each element of the intelligence community (as defined in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>)) shall be considered a Federal entity and shall be eligible to receive payment from the Spectrum Relocation Fund for any auction-related relocation or sharing costs incurred by the element regardless of the existence of a Government station license.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></section><section id="id96c0460ef2ea41ce8b213cfae3c4ea8a"><enum>803.</enum><header>Protection of classified information relating to budget functions</header><subsection id="H0A2DE5376F374D3CACEF72D2D3D7CD63"><enum>(a)</enum><header>Requirement</header><paragraph commented="no" display-inline="no-display-inline" id="ide747f08290b34d0a97dbd4941e55aaaf"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline"><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/31/11">Chapter 11</external-xref> of title 31, United States Code, is amended by adding at the end the following new section:</text><quoted-block style="USC" id="H241ED77BB400498B8129EC87DDFA28C4" display-inline="no-display-inline"><section id="HEBACCFF89B354ED9A4401173763E0D94"><enum>1127.</enum><header>Protection of classified information relating to budget functions</header><subsection id="H59F6D943CB5E492A884B4B68BB34471A"><enum>(a)</enum><header>Protection of classified information</header><text>Notwithstanding any other provision of law, not later than September 30, 2028, each covered official shall ensure that the department or agency of the official uses secure systems that meet the requirements to protect classified information, including with respect to the location at which the system is located or accessed, to carry out any of the following activities of the department or agency:</text><paragraph id="H11FA0BE862954B6795940725D93C90D4"><enum>(1)</enum><text display-inline="yes-display-inline">Formulating, developing, and submitting the budget of the department or agency (including the budget justification materials submitted to Congress) under the National Intelligence Program.</text></paragraph><paragraph id="H72BA2B1E587444CB9B21369B9ADC5E94"><enum>(2)</enum><text display-inline="yes-display-inline">Apportioning, allotting, issuing warrants for the disbursement of, and obligating and expending funds under the National Intelligence Program.</text></paragraph><paragraph id="H61457BE218B7494F90106C0FD57931D2"><enum>(3)</enum><text display-inline="yes-display-inline">Carrying out Federal financial management service functions or related activities of the intelligence community.</text></paragraph></subsection><subsection id="HEF22CA2392FE46D68A48D558ED9EA8C5"><enum>(b)</enum><header>Waiver</header><text>The Director of National Intelligence, in consultation with the Secretary of Defense, the Secretary of the Treasury, and the Director of the Office of Management and Budget, may issue a waiver to a head of an element of the intelligence community with respect to a requirement under subsection (a) if the Director of National Intelligence certifies to the congressional intelligence committees that—</text><paragraph id="H8EB9F33D7BED4A9A91CB046EE083AA8D"><enum>(1)</enum><text>one or more of the Federal financial management service functions or related activities of the element under the National Intelligence Program—</text><subparagraph id="HF87395C82CA940FFB04A554D45F62508"><enum>(A)</enum><text>are appropriately carried out using a system that does not meet the requirements to protect classified information; and</text></subparagraph><subparagraph id="HC7DAB4780BA64671AB9E6617694A589D"><enum>(B)</enum><text>such use does not represent a significant counterintelligence risk; or</text></subparagraph></paragraph><paragraph id="H7B288FF2BF4A40E6B667190020083B4C"><enum>(2)</enum><text>complying with a specified requirement under subsection (a) would result in an increased counterintelligence threat to a classified program or activity.</text></paragraph></subsection><subsection id="H23F429226035442FB104A432C470FACC"><enum>(c)</enum><header>Display of information in public reports</header><text>Notwithstanding any other provision of law, in making public a report or other information relating to expenditures by an element of the intelligence community, a covered official may modify or omit information relating to such expenditures in a manner necessary to ensure the protection of classified information.</text></subsection><subsection id="H3161150C7D61425888B2305F836418BA"><enum>(d)</enum><header>Definitions</header><text>In this section:</text><paragraph id="H1BF3F927598447C796B784AAD1F6455A"><enum>(1)</enum><header>Covered official</header><text>The term <term>covered official</term> means the following:</text><subparagraph id="HD46814C876D84EA8A022954100652861"><enum>(A)</enum><text>The Secretary of the Treasury.</text></subparagraph><subparagraph id="H2EEB24089A5A4246801D47FDA1FE4DB1"><enum>(B)</enum><text>The Director of the Office of Management and Budget.</text></subparagraph><subparagraph id="H55C41088FF3143C89027FF6997432185"><enum>(C)</enum><text>Each head of an element of the intelligence community.</text></subparagraph><subparagraph id="H3F534E54190B41918DA18EA18409049F"><enum>(D)</enum><text>Any other head of a department or agency of the Federal Government carrying out a function specified in paragraph (1), (2), or (3) of subsection (a).</text></subparagraph></paragraph><paragraph id="H0B9FBA04729B40B4A41CBF7EF8446EAE"><enum>(2)</enum><header>Federal financial management service functions</header><text>In this section, the term <term>Federal financial management service functions</term> means standard functions, as determined by the Secretary of the Treasury, that departments and agencies of the Federal Government perform relating to Federal financial management, including budget execution, financial asset information management, payable management, revenue management, reimbursable management, receivable management, delinquent debt management, cost management, general ledger management, financial reconciliation, and financial and performance reporting.</text></paragraph><paragraph id="HE07393F59B3A488180632842C87EB4E1"><enum>(3)</enum><header>Intelligence community terms</header><text>The terms <term>congressional intelligence committees</term>, <term>intelligence community</term>, and <term>National Intelligence Program</term> have the meaning given those terms in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="id52e8b25298f248d6a7c9a18c11a43480"><enum>(2)</enum><header>Clerical amendment</header><text>The table of sections at the beginning of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/31/11">chapter 11</external-xref> of title 31, United States Code, is amended by inserting after the item relating to <external-xref legal-doc="usc" parsable-cite="usc/31/1126">section 1126</external-xref> the following new item:</text><quoted-block style="OLC" id="idd8af6c2e-7622-4438-a40b-25f5f63845d2"><toc><toc-entry level="section">1127. Protection of classified information relating to budget functions.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="HFC4B467D3A9B495ABFBD62522D5517FC"><enum>(b)</enum><header>Funding needed To implement specified requirements</header><paragraph id="HC8599F74F146478AA81FE2C1FB69C2D8"><enum>(1)</enum><header>Reimbursement</header><text display-inline="yes-display-inline">Notwithstanding any other provision of law, of the amounts authorized to be appropriated or otherwise made available to the Director of National Intelligence under the Intelligence Community Management Account that are available until September 30, 2028, the Director may reimburse a covered official for amounts that the official incurred to implement section 1127(a) of title 31, United States Code, as added by subsection (a).</text></paragraph><paragraph id="H893555D5DF1949E6B4BE4556A6500391"><enum>(2)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, the Secretary of the Treasury, and the heads of the elements of the intelligence community shall jointly submit to the congressional intelligence committees a detailed cost estimate associated with the implementation of the requirements under section 1127(a) of title 31, United States Code, as added by subsection (a).</text></paragraph><paragraph id="H9591FF00096946DC9C0AA42CF4968C79"><enum>(3)</enum><header>Covered official defined</header><text display-inline="yes-display-inline">In this subsection, the term <term>covered official</term> has the meaning given that term in section 1127(d) of title 31, United States Code, as added by subsection (a). </text></paragraph></subsection><subsection id="H0F7034D7EB2346A186D74C66F5D4E890"><enum>(c)</enum><header>Federal Funding Accountability and Transparency Act of 2006</header><text display-inline="yes-display-inline">Section 7 of the Federal Funding Accountability and Transparency Act of 2006 (<external-xref legal-doc="public-law" parsable-cite="pl/109/282">Public Law 109–282</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/31/6101">31 U.S.C. 6101</external-xref> note) is amended— </text><paragraph id="H53E5323C9C9544558CB49F0462590A47"><enum>(1)</enum><text>in paragraph (1), by striking <quote>or</quote> at the end;</text></paragraph><paragraph id="HCFC062BB01D241E4A8927601548876B6"><enum>(2)</enum><text>in paragraph (2), by striking the period at the end and inserting <quote>; or</quote>; and </text></paragraph><paragraph id="HE82F5F91EFCF4D9B84DE09C0267E42BB"><enum>(3)</enum><text>by adding at the end the following new paragraph: </text><quoted-block style="OLC" id="HFCDE592C738E47D8AC7CA896C6A3BDEC" display-inline="no-display-inline"><paragraph id="H1EE4822D5CF44FAB97700295D179E427"><enum>(3)</enum><text display-inline="yes-display-inline">information that the Director of National Intelligence, in consultation with the Director of the Office of Management and Budget, determines would result in the exposure of classified programs or activities, including such information that could, when combined with other publicly available information, reveal classified programs or activities.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id2b3baf6bbe4a4c88bfe311468a0880c2"><enum>804.</enum><header>Review by Committee on Foreign Investment in the United States of transactions in real estate near intelligence community facilities</header><subsection commented="no" display-inline="no-display-inline" id="id2a579cc11acc482585e33514a43f6cd2"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Section 721(a)(4) of the Defense Production Act of 1950 (<external-xref legal-doc="usc" parsable-cite="usc/50/4565">50 U.S.C. 4565(a)(4)</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idabdaf30aef894ab88d8d8696165eda82"><enum>(1)</enum><text>in subparagraph (B)(ii)(II)(bb)(AA), by inserting <quote>, facility owned or operated by an element of the intelligence community,</quote> after <quote>military installation</quote>; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id374c17fad4d94f9ca52c2a40ca438756"><enum>(2)</enum><text>in subparagraph (C)(ii), by inserting <quote>, facility owned or operated by an element of the intelligence community,</quote> after <quote>military installation</quote>.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id8a763da44fda40f0b4fc5af4e59a188c"><enum>(b)</enum><header>Applicability</header><text>The amendments made by subsection (a) apply with respect to transactions proposed or pending on or after the date of the enactment of this Act.</text></subsection></section><section id="id0b7b5baf818e41f290770fedc91c7684" commented="no" display-inline="no-display-inline" section-type="subsequent-section"><enum>805.</enum><header>Intelligence support to the U.S. International Development Finance Corporation</header><text display-inline="no-display-inline">The Director of National Intelligence, in coordination with the heads of the other elements of the intelligence community, shall provide intelligence and analytic support to the U.S. International Development Finance Corporation to ensure all projects of the Corporation are appropriately informed and strategically executed in accordance with the purpose of the Corporation as described in section 1412(b) of the BUILD Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/22/9612">22 U.S.C. 9612(b)</external-xref>).</text></section><section id="id77125461e40f44a49d06010554ac481d"><enum>806.</enum><header>Establishing processes and procedures for protecting Federal Reserve information</header><subsection id="id79d076448a4e4bfe992c935007f7c7bf"><enum>(a)</enum><header>In general</header><text>The Director of National Intelligence, in coordination with the Director of the Federal Bureau of Investigation, and in consultation with the relevant heads of the elements of the intelligence community, as determined by the Directors, shall—</text><paragraph id="idbc03a6009c5d423ba0ed418b17b87ce7"><enum>(1)</enum><text>brief the Board of Governors of the Federal Reserve System on foreign threats to the Federal Reserve System; and</text></paragraph><paragraph id="ide4f8d045ac924216a69e5bc44d7f5897"><enum>(2)</enum><text>work with the Chair of the Board of Governors of the Federal Reserve System to create and implement standardized security and classification measures for protecting information collected, generated, and stored by the Federal Reserve System.</text></paragraph></subsection><subsection id="id49d76664f5bd4fa686d4f5defbd85e2c"><enum>(b)</enum><header>Report</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of National Intelligence, the Director of the Federal Bureau of Investigation, and the Chair of the Board of Governors of the Federal Reserve System shall jointly submit to the appropriate congressional committees a report detailing the status of implementing the security measures described in subsection (a).</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id32424d3d5be24a82b4b98ae355c0a1a8"><enum>(c)</enum><header>Appropriate congressional committees defined</header><text>In this section, the term <term>appropriate congressional committees</term> means—</text><paragraph id="id47b8e79807094dfb9d08032c942a150a"><enum>(1)</enum><text>the congressional intelligence committees;</text></paragraph><paragraph id="idd58d8a78e8534d678b5334f099858308"><enum>(2)</enum><text>the Committee on the Judiciary and the Committee on Banking, Housing, and Urban Affairs of the Senate; and</text></paragraph><paragraph id="id03eff66a2c084e8fa7e5d528889d5d30"><enum>(3)</enum><text>the Committee on the Judiciary and the Committee on Financial Services of the House of Representatives.</text></paragraph></subsection></section><section id="idb86c9b9510464c0786e425131abe413c"><enum>807.</enum><header>Amendments to prohibit payments to obtain national security information or approvals</header><subsection id="idf60340999d434a929800c5666b331552"><enum>(a)</enum><header>Export Control Reform Act of 2018</header><text>Section 1756(c) of the Export Control Reform Act of 2018 (<external-xref legal-doc="usc" parsable-cite="usc/50/4815">50 U.S.C. 4815(c)</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id631aa2a021f14092a656ddeee644931d"><enum>(1)</enum><text>by inserting <quote>, collected, or paid</quote> after <quote>charged</quote>; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida1667e0c0c63496cb95871083915282a"><enum>(2)</enum><text>by inserting <quote>or for the award of such license or other authorization</quote> after <quote>this part</quote>.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id937ceecc56d64a8083715426351800da"><enum>(b)</enum><header> Protecting Americans from Foreign Adversary Controlled Applications Act</header><text>Section 2(c) of the Protecting Americans from Foreign Adversary Controlled Applications Act (<external-xref legal-doc="usc" parsable-cite="usc/15/9901">15 U.S.C. 9901</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/118/50">Public Law 118–50</external-xref>) is amended—</text><paragraph id="id03d993c1ee3045d491c3c681bb4806cf"><enum>(1)</enum><text>in the subsection heading, by inserting <quote><header-in-text style="OLC" level="subsection">; prohibition</header-in-text></quote> after <quote><header-in-text style="OLC" level="subsection">Exemptions</header-in-text></quote>; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8a2609696f4c4699a1d9ed293209b093"><enum>(2)</enum><text>by adding at the end the following new paragraph:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id28385e10bf454c30bdf34dcd6202c754"><paragraph commented="no" display-inline="no-display-inline" id="id4c4461c6cabd4888abaace750cc4625d"><enum>(3)</enum><header>Prohibition</header><text>No fee may be charged, collected, or paid in connection with the execution of a qualified divestiture.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ide751d3455b874c51a5f83c98f4ccb285"><enum>(c)</enum><header>National Security Act of 1947</header><text>Section 801 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3161">50 U.S.C. 3161</external-xref>) is amended by adding at the end the following new subsection:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id6243fbdb876f493eadd77f2c169c585d"><subsection id="id1fe9fc96a9ed4afbaacef7c9b8a8fe9b"><enum>(c)</enum><text>No fee may be charged, collected, or paid in connection access to classified information.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idde91db2ff0df467097d796b866eb6f9f"><enum>808.</enum><header>Offenses involving espionage</header><subsection id="id3211066074e3481d830bdc8270f05968"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/213">Chapter 213</external-xref> of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="ida69194937a7748bab9f733e507dd309a"><section id="id00723ec80b1b4400a554512370702bc6"><enum>3302.</enum><header>Espionage offenses</header><text display-inline="no-display-inline">Notwithstanding any other provision of law, an indictment may be found or an information may be instituted at any time without limitation for a violation of section 794 or a conspiracy to violate such section.</text></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idc0529e3143fb498e81422e3a25700501"><enum>(b)</enum><header>Clerical amendment</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/213">chapter 213</external-xref> of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idDD37EF2E413344F5A7108A13690F4C61"><toc><toc-entry bold="off" level="section">3302. Espionage offenses.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id3fd685a5e1e048698a4640376048400c" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Conforming amendment</header><text>Section 19 of the Internal Security Act of 1950 (<external-xref legal-doc="usc" parsable-cite="usc/18/792">18 U.S.C. 792</external-xref> note; 64 Stat. 1005) is amended by striking <quote>, 793, or 794</quote> and inserting <quote>or 793</quote>.</text></subsection></section><section id="id450ae2b22cba4bdeac020c3c5c388893"><enum>809.</enum><header>Parental bereavement leave</header><text display-inline="no-display-inline">Section 6329d(b)(1) of title 5, United States Code, is amended by inserting <quote>, including any instance of the natural or spontaneous loss of an unborn child (as defined in section 1841(d) of title 18), such as through miscarriage, stillbirth, or a loss that occurs due to a medical intervention for a pregnancy emergency, such as the treatment of an ectopic pregnancy</quote> after <quote>of the employee</quote>.</text></section><section id="id85ad961e32d04c3083461acb8edce688"><enum>810.</enum><header>Definition of foreign instrumentality for purposes of economic espionage prohibition</header><text display-inline="no-display-inline">Section 1839(1) of title 18, United States Code, is amended—</text><paragraph id="id551b06e12396489486d9fe2329a64439"><enum>(1)</enum><text>by striking <quote>that is substantially owned</quote> and inserting the following: “that is—</text><quoted-block style="OLC" display-inline="no-display-inline" id="ide20a4c671bff48fea8df13c13f38da0f"><subparagraph commented="no" display-inline="no-display-inline" id="id8472d40c290d4054bfbbaf6cb6786001"><enum>(A)</enum><text display-inline="yes-display-inline">substantially owned</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf7426d7a0f6c47468eaa594dadd2c9a2"><enum>(2)</enum><text>by adding at the end the following: “or</text><quoted-block style="OLC" display-inline="no-display-inline" id="id261cb6f778264cba83f025c3b9a295f4"><subparagraph commented="no" display-inline="no-display-inline" id="id27fe2aff3e614ac9b4ba313f0080aa41"><enum>(B)</enum><text>domiciled in a covered nation, as defined in section 4872 of title 10;</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="id287f1eea6d4f4b4c9e64cd33cc231583"><enum>811.</enum><header>Protection of trade secrets</header><subsection commented="no" display-inline="no-display-inline" id="id4b90bfdfbbf44901b10e173d4a8c6737"><enum>(a)</enum><header display-inline="yes-display-inline">Requiring advantage to foreign entity or injury to United States under economic espionage statute</header><text display-inline="yes-display-inline">Section 1831(a) of title 18, United States Code, is amended, in the matter preceding paragraph (1), by striking <quote>benefit any foreign government, foreign instrumentality, or foreign agent</quote> and inserting <quote>provide any advantage to a foreign government, foreign instrumentality, or foreign agent, or injure or disadvantage in any way the United States, an instrumentality of the United States, or an agent of the United States</quote>.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id5f57dd931fd44f13bd77fb4f6cc88f59"><enum>(b)</enum><header display-inline="yes-display-inline">Extending jurisdiction over economic espionage and trade secret offenses</header><text display-inline="yes-display-inline">Section 1837 of title 18, United States Code, is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id34b9769e2a284c81b4072e7e978f7f6e"><enum>(1)</enum><text>in paragraph (1), by striking <quote>or</quote> at the end;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida4227f5786ea45059bfaf13dad2426b5"><enum>(2)</enum><text>in paragraph (2), by striking the period at the end and inserting a semicolon; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8e562491cb3d40aeaaef6f5d46d4958f"><enum>(3)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idd73c582356f5497f9c88fc41d533f80b"><paragraph id="id139b469ed6974eb79c91d376d1f12391"><enum>(3)</enum><text>the victim is—</text><subparagraph commented="no" display-inline="no-display-inline" id="idca18cb42b09f47e6a499e4b9c5bdd771"><enum>(A)</enum><text display-inline="yes-display-inline">a natural person who is a citizen or permanent resident alien of the United States; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide1c46140777d421d84f5daedf61708c6"><enum>(B)</enum><text display-inline="yes-display-inline">a person, including an organization, headquartered or incorporated in the United States; or</text></subparagraph></paragraph><paragraph id="idbe503d64c9114bac97a75817fa0cc346"><enum>(4)</enum><text>an act committed in furtherance of the offense used or took place through—</text><subparagraph commented="no" display-inline="no-display-inline" id="idf025eb2921b847e481d86c714d071c88"><enum>(A)</enum><text display-inline="yes-display-inline">communications in interstate or foreign commerce; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc1a00592e72c424b886aea82edf28873"><enum>(B)</enum><text display-inline="yes-display-inline">financial infrastructure in the United States.</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id68ee1302431b465597c551bf9d24fd83"><enum>(c)</enum><header display-inline="yes-display-inline">Criminalizing unauthorized transmission of trade secrets outside the United States</header><text display-inline="yes-display-inline">Section 1832 of title 18, United States Code, is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idbe795c4667824f039648a2807266f2a5"><subsection id="idff8f5f2183d64fed9a29be556328ac79"><enum>(c)</enum><header>Transmission of trade secrets outside the United States</header><paragraph commented="no" display-inline="no-display-inline" id="id14abfaabb3594c92a13864ac0fba2a57"><enum>(1)</enum><header display-inline="yes-display-inline">Offense</header><text>It shall be unlawful for a person to, without authorization, knowingly—</text><subparagraph commented="no" display-inline="no-display-inline" id="id5dc82926ac2041e1894974eefd0b4c2a"><enum>(A)</enum><text display-inline="yes-display-inline">transmit a trade secret outside the United States;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id904e655dda514123aa5b608761b11e7f"><enum>(B)</enum><text>attempt to commit an offense described in subparagraph (A); or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida5f5c30f82694bc5bf6f72b107053635"><enum>(C)</enum><text display-inline="yes-display-inline">conspire with one or more other persons to commit an offense described in subparagraph (A).</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idb58c20bbdc2a47e9a0c3eefe4cac327e"><enum>(2)</enum><header>Penalties</header><subparagraph commented="no" display-inline="no-display-inline" id="ida7adb71e1bdd4c1fbdecc6e89b66afd3"><enum>(A)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Except as provided in subparagraph (B), any person who violates paragraph (1) shall be fined not more than $5,000,000, imprisoned not more than 5 years, or both.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id67f707b98f2b4440a5c87136e648107f"><enum>(B)</enum><header>Organizations</header><text display-inline="yes-display-inline">Any organization that commits an offense described in paragraph (1) shall be fined not less than 3 times the value of the stolen trade secret to the victim, including expenses for research and design and other costs of reproducing the trade secret that the organization has thus avoided.</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id902cfa4eb0eb4f11ad4ce7704742701a"><enum>(d)</enum><header display-inline="yes-display-inline">Criminalizing inciting economic espionage and theft of trade secrets</header><text display-inline="yes-display-inline"><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/90">Chapter 90</external-xref> of title 18, United States Code, is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id367937c3dc914f559163b07abb71857f"><enum>(1)</enum><text>in section 1831, by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idc9bd2b05aba14d398328a10ad851fd30"><subsection id="id0f2bd5aba9254b408f03a3db9283b940"><enum>(c)</enum><header>Incitement or solicitation of economic espionage</header><paragraph commented="no" display-inline="no-display-inline" id="id78a47d455833435b9eba1878b20ba7ba"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>It shall be unlawful for a person to solicit, command, induce, or otherwise endeavor to persuade another person to engage in an offense described in subsection (a).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ide3d1d2e644db41958ff4d14c6425a178"><enum>(2)</enum><header>Penalties</header><text>Any person who violates paragraph (1) shall be fined under this title or imprisoned not more than 10 years, or both.</text></paragraph></subsection><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id47f3213e3ceb4b909c9505d2596990c7"><enum>(2)</enum><text>in section 1832, as amended by subsection (c), by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id0c80c211ed4f411594e1f20f1725a2c5"><subsection id="id03c6c2a0eb324c7dad5cea937196a22a"><enum>(d)</enum><header>Incitement or solicitation of theft of trade secrets</header><paragraph commented="no" display-inline="no-display-inline" id="id4b8ad80635394edb80ff38b4c8f0c0a4"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>It shall be unlawful for a person to solicit, command, induce, or otherwise endeavor to persuade another person to engage in an offense described in subsection (a) or (c).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id40a413aff0ba4dc4ae52364249fe9eec"><enum>(2)</enum><header>Penalties</header><text>Any person who violates paragraph (1) shall be fined under this title or imprisoned not more than 10 years, or both.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id345bdc1614eb42d29c0c31aef94ae60e"><enum>(e)</enum><header display-inline="yes-display-inline">Definition of foreign instrumentality for purposes of economic espionage prohibition</header><text display-inline="yes-display-inline">Section 1839(1) of title 18, United States Code, is amended—</text><paragraph id="id821419bf50064687b52e2972d18d8a49"><enum>(1)</enum><text>by striking <quote>that is substantially owned</quote> and inserting the following: “that is—</text><quoted-block style="OLC" display-inline="no-display-inline" id="ide0a3d42a842b4fc4a12f9247b9dcebc3"><subparagraph commented="no" display-inline="no-display-inline" id="id18c7a98aa9354bdba02f77f2719ad42a"><enum>(A)</enum><text display-inline="yes-display-inline">substantially owned</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5898f54e79ca4320b93dcf4fb4bbfd1c"><enum>(2)</enum><text>by adding at the end the following: “or</text><quoted-block style="OLC" display-inline="no-display-inline" id="idce6a5729815a41a58033d310ef6766c9"><subparagraph commented="no" display-inline="no-display-inline" id="id3d7968c0f5ad41f0b00c8fba988924c4"><enum>(B)</enum><text>domiciled in a covered nation, as defined in section 4872 of title 10;</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="ideb9ed560dbd349fca77b8ee84866167e"><enum>812.</enum><header>Technical amendments</header><subsection id="idd1f9d2779c524e338ce546656225dbe8"><enum>(a)</enum><header>Definition of Armed Forces in National Security Act of 1947</header><text>Section 605(8) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3126">50 U.S.C. 3126(8)</external-xref>) is amended by inserting <quote>Space Force,</quote> after <quote>Marine Corps,</quote>.</text></subsection><subsection id="id6467a50e75df4909b73d7bc72c220dda" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>National Intelligence University</header><text>Section 6801(a)(4) of the Intelligence Authorization Act for Fiscal Year 2026 (<external-xref legal-doc="public-law" parsable-cite="pl/119/60">Public Law 119–60</external-xref>) is amended in the matter preceding subparagraph (A) by striking <quote>3327</quote> and inserting <quote>3227</quote>.</text></subsection></section></title></legis-body><endorsement><action-date>May 20, 2026</action-date><action-desc>Read twice and placed on the calendar</action-desc></endorsement></bill> 

