[国会记录第160卷第147号(2014年12月4日星期四)][House] [page H8385-H8632][…[英语泛读材料McKeon先生提出的动议McKeon先生。议长先生,我桌上有一份动议。临时发言人。书记官将指定该动议。运动的文本如下:麦肯先生将在参议院,众议院同意修正案3979号决议的修正案组成的文本打印113 - 58修改的规则委员会修改打印部分房屋报告113 - 646年和第五节中指定的修正案的房子770号决议。众议院修正案对参议院修正案的文本如下:[[Page H8388]]代替参议院修正案对第3979号决议建议插入的内容,插入以下内容:短标题。(一)短标题。——本法案可引证为“卡尔•莱文和霍华德P。“巴克”麦肯国防授权2015年财政年度法案。[...]秒。1052.辩护署妥协的答复。(a)调查结果.--国会提出以下调查结果:(1)分类信息的妥协导致美国国家安全造成不分青红皂白和持久的损害,并且往往会对战争的安全产生直接影响。(2)2010年,数十万个分类文件被非法复制和透露在互联网上。(3)在危及当前行动的众多公共作品和手稿中披露了分类信息。(4)2013年,从美国政府信息系统下载了近1,700,000份文件,威胁着美国的国家安全,并将美国人员的生活处于极端风险。损害的大部分信息涉及美国武装部队的能力,运营,策略,技术和程序,是美国历史上的最大数量妥协。(5)国防部正在采取措施减轻这些泄漏造成的损害。(6)必须保留国会,了解缓解努力的进展,以确保保护美国国家安全。 (b) Reports Required.-- (1) Initial report.--Not later than 60 days after the date of the enactment of this Act, the Secretary of Defense shall submit to the congressional defense committees a report on actions taken by the Secretary in response to significant compromises of classified information. Such report shall include each of the following: (A) A description of any changes made to Department of Defense policies or guidance [[Page H8450]] relating to significant compromises of classified information, including regarding security clearances for employees of the Department, information technology, and personnel actions. (B) An overview of the efforts made by any task force responsible for the mitigation of such compromises of classified information. (C) A description of the resources of the Department that have been dedicated to efforts relating to such compromises. (D) A description of the plan of the Secretary to continue evaluating the damage caused by, and to mitigate the damage from, such compromises. (E) A general description and estimate of the anticipated costs associated with mitigating such compromises. (2) Updates to report.--During calendar years 2015 and 2016, the Secretary shall submit to the congressional defense committees quarterly updates to the report required by paragraph (1). Each such update shall include information regarding any changes or progress with respect to the matters covered by such report. [...] SEC. 1627. PROHIBITION ON NATIONAL INTELLIGENCE PROGRAM CONSOLIDATION. (a) Prohibition.--No amounts authorized to be appropriated or otherwise made available to the Department of Defense may be used during the period beginning on the date of the enactment of this Act and ending on December 31, 2015, to execute-- (1) the separation of the National Intelligence Program budget from the Department of Defense budget; (2) the consolidation of the National Intelligence Program budget within the Department of Defense budget; or (3) the establishment of a new appropriations account or appropriations account structure for the National Intelligence Program budget. (b) Definitions.--In this section: (1) National intelligence program.--The term ``National Intelligence Program'' has the meaning given the term in section 3 of the National Security Act of 1947 (50 U.S.C. 3003). (2) National intelligence program budget.--The term ``National Intelligence Program budget'' means the portions of the Department of Defense budget designated as part of the National Intelligence Program. SEC. 1628. PERSONNEL SECURITY AND INSIDER THREAT. (a) Report Required.--Not later than March 30, 2015, the Secretary of Defense shall submit to Congress a report on the plans of the Department to address-- (1) the adoption of an interim capability to continuously evaluate the security status of the employees and contractors of the Department who have been determined eligible for and granted access to classified information by the Department of Defense Central Adjudication Facilities; (2) the use of an interim system to assist in developing requirements, lessons learned, business rules, privacy standards, and operational concepts applicable to the objective automated records checks and continuous evaluation capability required by the strategy for modernizing personnel security; (3) the engineering for an interim system and the objective automated records checks and continuous evaluation capability for initial investigations and reinvestigations required by the strategy for modernizing personnel security to support automation-assisted insider threat analyses conducted across the law enforcement, personnel security, human resources, counterintelligence, physical security, network behavior monitoring, and cybersecurity activities of all the components of the Department of Defense, pursuant to Executive Order 13587; (4) how competitive processes and open systems designs will be used to acquire advanced commercial technologies throughout the life cycle of the objective continuous evaluation capability required by the strategy for modernizing personnel security; (5) how the senior agency official in the Department of Defense for insider threat detection and prevention will be supported by experts in counterintelligence, personnel security, law enforcement, human resources, physical security, network monitoring, cybersecurity, and privacy and civil liberties from relevant components of the Department and experts in information technology, large-scale data analysis, systems engineering, and program acquisition; (6) how the senior agency official, in developing the integrated, automation-assisted insider threat capability, will be supported by-- (A) the Under Secretary of Defense for Acquisition, Technology, and Logistics; (B) the Chief Information Officer of the Department of Defense; and (C) the Under Secretary of Defense for Personnel and Readiness; and (7) who will be responsible and accountable for managing the development and fielding of the automation-assisted insider threat capability. (b) Inclusion of Gaps.--The report required under subsection (a) shall include specific gaps in policy and statute to address the requirements placed on the Department by section 907(c) of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) and Executive Order 13587. (c) Strategy for Modernizing Personnel Security Defined.-- In this section, the term ``strategy for modernizing personnel security'' means the strategy developed under section 907(c) of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66). [...]