[160国会纪录卷,第147(星期四,2014年12月4日)] [家] [网页H8385-H8632] [...]运动由麦基翁先生麦基翁先生提供的。议长先生,我在办公桌的议案。扬声器临时。秘书会指定运动。The text of the motion is as follows: Mr. McKeon moves that the House concur in the Senate amendment to H.R. 3979 with an amendment consisting of the text of Rules Committee Print 113-58 modified by the amendments printed in part A of House Report 113-646 and the amendment specified in section 5 of House Resolution 770. The text of the House amendment to the Senate amendment to the text is as follows: [[Page H8388]] In lieu of the matter proposed to be inserted by the Senate amendment to H.R. 3979, insert the following: SECTION 1. SHORT TITLE. (a) Short Title.--This Act may be cited as the``卡尔·莱文和霍华德P.'巴克”麦基翁国防授权行事2015财年“”。[...] SEC。1052 RESPONSE防御系分类信息对妥协。(一)调查结果.--国会作出以下结论:(1)分类信息事业滥用和对美国的国家安全持久的损害,往往妥协的对作战人员的安全产生直接影响。(2)2010年,成千上万的机密文件被非法复制,并在互联网上公布。(3)分类信息已经在许多公开的著作和手稿危及当前的操作被披露。(4)2013年,有近170万文件从美国政府的信息系统下载,威胁美国的国家安全,并把美国人员的生命处于极度危险。大部分的损害的信息涉及到的功能,操作,战术,技术,和美国武装部队的程序,是在美国历史上最大的单一定量妥协。(5)美国国防部正在采取措施,缓解由这些泄露的危害。(6)国会必须保持获悉的减排努力,以确保美国的国家安全保护的进步。 (b) Reports Required.-- (1) Initial report.--Not later than 60 days after the date of the enactment of this Act, the Secretary of Defense shall submit to the congressional defense committees a report on actions taken by the Secretary in response to significant compromises of classified information. Such report shall include each of the following: (A) A description of any changes made to Department of Defense policies or guidance [[Page H8450]] relating to significant compromises of classified information, including regarding security clearances for employees of the Department, information technology, and personnel actions. (B) An overview of the efforts made by any task force responsible for the mitigation of such compromises of classified information. (C) A description of the resources of the Department that have been dedicated to efforts relating to such compromises. (D) A description of the plan of the Secretary to continue evaluating the damage caused by, and to mitigate the damage from, such compromises. (E) A general description and estimate of the anticipated costs associated with mitigating such compromises. (2) Updates to report.--During calendar years 2015 and 2016, the Secretary shall submit to the congressional defense committees quarterly updates to the report required by paragraph (1). Each such update shall include information regarding any changes or progress with respect to the matters covered by such report. [...] SEC. 1627. PROHIBITION ON NATIONAL INTELLIGENCE PROGRAM CONSOLIDATION. (a) Prohibition.--No amounts authorized to be appropriated or otherwise made available to the Department of Defense may be used during the period beginning on the date of the enactment of this Act and ending on December 31, 2015, to execute-- (1) the separation of the National Intelligence Program budget from the Department of Defense budget; (2) the consolidation of the National Intelligence Program budget within the Department of Defense budget; or (3) the establishment of a new appropriations account or appropriations account structure for the National Intelligence Program budget. (b) Definitions.--In this section: (1) National intelligence program.--The term ``National Intelligence Program'' has the meaning given the term in section 3 of the National Security Act of 1947 (50 U.S.C. 3003). (2) National intelligence program budget.--The term ``National Intelligence Program budget'' means the portions of the Department of Defense budget designated as part of the National Intelligence Program. SEC. 1628. PERSONNEL SECURITY AND INSIDER THREAT. (a) Report Required.--Not later than March 30, 2015, the Secretary of Defense shall submit to Congress a report on the plans of the Department to address-- (1) the adoption of an interim capability to continuously evaluate the security status of the employees and contractors of the Department who have been determined eligible for and granted access to classified information by the Department of Defense Central Adjudication Facilities; (2) the use of an interim system to assist in developing requirements, lessons learned, business rules, privacy standards, and operational concepts applicable to the objective automated records checks and continuous evaluation capability required by the strategy for modernizing personnel security; (3) the engineering for an interim system and the objective automated records checks and continuous evaluation capability for initial investigations and reinvestigations required by the strategy for modernizing personnel security to support automation-assisted insider threat analyses conducted across the law enforcement, personnel security, human resources, counterintelligence, physical security, network behavior monitoring, and cybersecurity activities of all the components of the Department of Defense, pursuant to Executive Order 13587; (4) how competitive processes and open systems designs will be used to acquire advanced commercial technologies throughout the life cycle of the objective continuous evaluation capability required by the strategy for modernizing personnel security; (5) how the senior agency official in the Department of Defense for insider threat detection and prevention will be supported by experts in counterintelligence, personnel security, law enforcement, human resources, physical security, network monitoring, cybersecurity, and privacy and civil liberties from relevant components of the Department and experts in information technology, large-scale data analysis, systems engineering, and program acquisition; (6) how the senior agency official, in developing the integrated, automation-assisted insider threat capability, will be supported by-- (A) the Under Secretary of Defense for Acquisition, Technology, and Logistics; (B) the Chief Information Officer of the Department of Defense; and (C) the Under Secretary of Defense for Personnel and Readiness; and (7) who will be responsible and accountable for managing the development and fielding of the automation-assisted insider threat capability. (b) Inclusion of Gaps.--The report required under subsection (a) shall include specific gaps in policy and statute to address the requirements placed on the Department by section 907(c) of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) and Executive Order 13587. (c) Strategy for Modernizing Personnel Security Defined.-- In this section, the term ``strategy for modernizing personnel security'' means the strategy developed under section 907(c) of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66). [...]