Subscribe to ODNI news via emailSubscribe via RSStumblr offtwitter off 2Like ODNI on FacebookView ODNI photos on FlickrVisit ODNI’s YouTube Channelscribd off

DNI

Ref Book - CIPA

Friday, August 03, 2012

Classified Information Procedures Act


> Back to the Table of Contents <
 

(Public Law 96–456 of October 15, 1980; 94 STAT. 2025)

An Act To provide certain pretrial, trial, and appellate procedures for criminal cases involving classified information.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

Definitions

Section 1. [18  U.S.C. App. §1]

(a) “Classified information”, as used in this Act, means any information or material that has been determined by the United States Government pursuant to an Executive order, statute, or regulation, to require protection against unauthorized disclosure for reasons of national security and any restricted data, as defined in paragraph r. of section 11 of the Atomic Energy Act of 1954 (42 U.S.C. §2014(y)).

(b) “National security”, as used in this Act, means the national defense and foreign relations of the United States.

Pretrial Conference

Sec. 2. [18 U.S.C. App. §2]

At any time after the filing of the indictment or information, any party may move for a pretrial conference to consider matters relating to classified information that may arise in connection with the prosecution. Following such motion, or on its own motion, the court shall promptly hold a pretrial conference to establish the timing of requests for discovery, the provision of notice required by section 5 of this Act, and the initiation of the procedure established by section 6 of this Act. In addition, at the pretrial conference the court may consider any matters which relate to classified information or which may promote a fair and expeditious trial. No admission made by the defendant or by any attorney for the defendant at such a conference may be used against the defendant unless the admission is in writing and is signed by the defendant and by the attorney for the defendant.

Protective Orders

Sec. 3. [18 U.S.C. App. §3]

Upon motion of the United States, the court shall issue an order to protect against the disclosure of any classified information disclosed by the United States to any defendant in any criminal case in a district court of the United States.

Discovery of Classified Information by Defendants

Sec. 4. [18 U.S.C. App. §4 ]

The court, upon a sufficient showing, may authorize the United States to delete specified items of classified information from documents to be made available to the defendant through discovery under the Federal Rules of Criminal Procedure, to substitute a summary of the information for such classified documents, or to substitute a statement admitting relevant facts that the classified information would tend to prove. The court may permit the United States to make a request for such authorization in the form of a written statement to be inspected by the court alone. If the court enters an order granting relief following such an ex parte showing, the entire text of the statement of the United States shall be sealed and preserved in the records of the court to be made available to the appellate court in the event of an appeal.

Notice of Defendant’s Intention to Disclose Classified Information

Sec. 5. [18 U.S.C. App. §5 ]

(a) Notice by Defendant.—If a defendant reasonably expects to disclose or to cause the disclosure of classified information in any manner in connection with any trial or pretrial proceeding involving the criminal prosecution of such defendant, the defendant shall, within the time specified by the court or, where no time is specified, within thirty days prior to trial, notify the attorney for the United States and the court in writing. Such notice shall include a brief description of the classified information.  Whenever a defendant learns of additional classified information he reasonably expects to disclose at any such proceeding, he shall notify the attorney for the United States and the court in writing as soon as possible thereafter and shall include a brief description of the classified information. No defendant shall disclose any information known or believed to be classified in connection with a trial or pretrial proceeding until notice has been given under this subsection and until the United States has been afforded a reasonable opportunity to seek a determination pursuant to the procedure set forth in section 6 of this Act, and until the time for the United States to appeal such determination under section 7 has expired or any appeal under section 7 by the United States is decided.

(b) Failure to Comply.—If the defendant fails to comply with the requirements of subsection (a) the court may preclude disclosure of any classified information not made the subject of notification and may prohibit the examination by the defendant of any witness with respect to any such information.

Procedures for Cases Involving Classified Information

Sec. 6. [18 U.S.C. App. §6 ]

(a) Motion for Hearing.—Within the time specified by the court for the filing of a motion under this section, the United States may request the court to conduct a hearing to make all determinations concerning the use, relevance, or admissibility of classified information that would otherwise be made during the trial or pretrial proceeding. Upon such a request, the court shall conduct such a hearing. Any hearing held pursuant to this subsection (or any portion of such hearing specified in the request of the Attorney General) shall be held in camera if the Attorney General certifies to the court in such petition that a public proceeding may result in the disclosure of classified information. As to each item of classified information, the court shall set forth in writing the basis for its determination. Where the United States’ motion under this subsection is filed prior to the trial or pretrial proceeding, the court shall rule prior to the commencement of the relevant proceeding.

(b) Notice.—

(1) Before any hearing is conducted pursuant to a request by the United States under subsection (a), the United States shall provide the defendant with notice of the classified information that is at issue. Such notice shall identify the specific classified information at issue whenever that information previously has been made available to the defendant by the United States. When, the United States has not previously made the information available to the defendant in connection with the case, the information may be described by generic category, in such form as the court may approve, rather than by identification of the specific information of concern to the United States.

(2) Whenever the United States requests a hearing under subsection (a), the court, upon request of the defendant, may order the United States to provide the defendant, prior to trial, such details as to the portion of the indictment or information at issue in the hearing as are needed to give the defendant fair notice to prepare for the hearing.

(c) Alternative Procedure for Disclosure of Classified Information.—

(1) Upon any determination by the court authorizing the disclosure of specific classified information under the procedures established by this section, the United States may move that, in lieu of the disclosure of such specific classified information, the court order—

(A) the substitution for such classified information of a statement admitting relevant facts that the specific classified information would tend to prove; or

(B) the substitution for such classified information of a summary of the specific classified information. The court shall grant such a motion of the United States if it finds that the statement or summary will provide the defendant with substantially the same ability to make his defense as would disclosure of the specific classified information. The court shall hold a hearing on any motion under this section. Any such hearing shall be held in camera at the request of the Attorney General.

(2) The United States may, in connection with a motion under paragraph (1), submit to the court an affidavit of the Attorney General certifying that disclosure of classified information would cause identifiable damage to the national security of the United States and explaining the basis for the classification of such information. If so requested by the United States, the court shall examine such affidavit in camera and ex parte.

(d) Sealing of Records of in Camera Hearings.—If at the close of an in camera hearing under this Act (or any portion of a hearing under this Act that is held in camera) the court determines that the classified information at issue may not be disclosed or elicited at the trial or pretrial proceeding, the record of such in camera hearing shall be sealed and preserved by the court for use in the event of an appeal. The defendant may seek reconsideration of the court’s determination prior to or during trial.

(e) Prohibition on Disclosure of Classified Information by Defendant, Relief for Defendant when United States Opposes Disclosure.—

(1) Whenever the court denies a motion by the United States that it issue an order under subsection (c) and the United States files with the court an affidavit of the Attorney General objecting to disclosure of the classified information at issue, the court shall order that the defendant not disclose or cause the disclosure of such information.

(2) Whenever a defendant is prevented by an order under paragraph (1) from disclosing or causing the disclosure of classified information, the court shall dismiss the indictment or information; except that, when the court determines that the interests of justice would not be served by dismissal of the indictment or information, the court shall order such other action, in lieu of dismissing the indictment or information, as the court determines is appropriate. Such action may include, but need not be limited to—

(A) dismissing specified counts of the indictment or information;

(B) finding against the United States on any issue as to which the excluded classified information relates; or

(C) striking or precluding all or part of the testimony of a witness.

An order under this paragraph shall not take effect until the court has afforded the United States an opportunity to appeal such order under section 7, and thereafter to withdraw its objection to the disclosure of the classified information at issue.

 (f) Reciprocity.—Whenever the court determines pursuant to subsection (a) that classified information may be disclosed in connection with a trial or pretrial proceeding, the court shall, unless the interests of fairness do not so require, order the United States to provide the defendant with the information it expects to use to rebut the classified information. The court may place the United States under a continuing duty to disclose such rebuttal information. If the United States fails to comply with its obligation under this subsection, the court may exclude any evidence not made the subject of a required disclosure and may prohibit the examination by the United States of any witness with respect to such information.

Interlocutory Appeal

Sec. 7. [18 U.S.C. App. §7 ]

(a) An interlocutory appeal by the United States taken before or after the defendant has been placed in jeopardy shall lie to a court of appeals from a decision or order of a district court in a criminal case authorizing the disclosure of classified information, imposing sanctions for nondisclosure of classified information, or refusing a protective order sought by the United States to prevent the disclosure of classified information.

(b) An appeal taken pursuant to this section either before or during trial shall be expedited by the court of appeals. Prior to trial, an appeal shall be taken within fourteen days after the decision or order appealed from and the trial shall not commence until the appeal is resolved. If an appeal is taken during trial, the trial court shall adjourn the trial until the appeal is resolved and the court of appeals (1) shall hear argument on such appeal within four days of the adjournment of the trial, excluding intermediate weekends and holidays, (2) may dispense with written briefs other than the supporting materials previously submitted to the trial court, (3) shall render its decision within four days of argument on appeal, excluding intermediate weekends and holidays and (4) may dispense with the issuance of a written opinion in rendering its decision. Such appeal and decision shall not affect the right of the defendant, in a subsequent appeal from a judgment of conviction to claim as error reversal by the trial court on remand of a ruling appealed from during trial.

Introduction of Classified Information

Sec. 8. [18 U.S.C. App. §8 ]

(a) Classified status.—Writings, recordings, and photographs containing classified information may be admitted into evidence without change in their classification status.

(b) Precautions by Court.—The court, in order to prevent unnecessary disclosure of classified information involved in any criminal proceeding, may order admission into evidence of only part of a writing, recording, or photograph, or may order admission into evidence of the whole writing, recording, or photograph with excision of some or all of the classified information contained therein, unless the whole ought in fairness be considered.

(c) Taking of Testimony.—During the examination of a witness in any criminal proceeding, the United States may object to any question or line of inquiry that may require the witness to disclose classified information not previously found to be admissible. Following such an objection, the court shall take such suitable action to determine whether the response is admissible as will safeguard against the compromise of any classified information. Such action may include requiring the United States to provide the court with a proffer of the witness’ response to the question or line of inquiry and requiring the defendant to provide the court with a proffer of the nature of the information he seeks to elicit.

Security Procedures

Sec. 9. [18 U.S.C. App. §9 ]

(a) Within one hundred and twenty days of the date of the enactment of this Act, the Chief Justice of the United States, in consultation with the Attorney General, the Director of National Intelligence, and the Secretary of Defense, shall prescribe rules establishing procedures for the protection against unauthorized disclosure of any classified information in the custody of the United States district courts, courts of appeal, or Supreme Court. Such rules, and any changes in such rules, shall be submitted to the appropriate committees of Congress and shall become effective forty-five days after such submission.

(b) Until such time as rules under subsection (a) first become effective, the Federal courts shall in each case involving classified information adopt procedures to protect against the unauthorized disclosure of such information. 

Coordination Requirements Relating to the Prosecution of Cases Involving Classified Information

Sec. 9A. [18 U.S.C. App. §9A ]

(a) Briefings Required.—The Assistant Attorney General for the Criminal Division or the Assistant Attorney General for National Security, as appropriate, and the appropriate United States attorney, or the designees of such officials, shall provide briefings to the senior agency official, or the designee of such official, with respect to any case involving classified information that originated in the agency of such senior agency official.

(b) Timing of Briefings.—Briefings under subsection (a) with respect to a case shall occur—

(1) as soon as practicable after the Department of Justice and the United States attorney concerned determine that a prosecution or potential prosecution could result; and

(2) at such other times thereafter as are necessary to keep the senior agency official concerned fully and currently informed of the status of the prosecution.

(c) Senior Agency Official Defined.—In this section, the term “senior agency official” has the meaning given that term in section 1.1 of Executive Order No. 12958.

Identification of Information related to the National Defense

Sec. 10. [18 U.S.C. App. §10 ]

In any prosecution in which the United States must establish that material relates to the national defense or constitutes classified information, the United States shall notify the defendant, within the time before trial specified by the court, of the portions of the material that it reasonably expects to rely upon to establish the national defense or classified information element of the offense.

Amendment to the Act

Sec. 11. [18 U.S.C. App. §11 ]

Sections 1 through 10 of this Act may be amended as provided in section 2076, title 28, United States Code.

Attorney General Guidelines

Sec. 12. [18 U.S.C. App. §12 ]

(a) Within one hundred and eighty days of enactment of this Act, the Attorney General shall issue guidelines specifying the factors to be used by the Department of Justice in rendering a decision whether to prosecute a violation of Federal law in which, in the judgment of the Attorney General, there is a possibility that classified information will be revealed. Such guidelines shall be transmitted to the appropriate committees of Congress.

(b) When the Department of Justice decides not to prosecute a violation of Federal law pursuant to subsection (a), an appropriate official of the Department of Justice shall prepare written findings detailing the reasons for the decision not to prosecute. The findings shall include—

(1) the intelligence information which the Department of Justice officials believe might be disclosed,

(2) the purpose for which the information might be disclosed,

(3) the probability that the information would be disclosed, and

(4) the possible consequences such disclosure would have on the national security.

Reports to Congress

Sec. 13. [18 U.S.C. App. §13 ]

(a) Consistent with applicable authorities and duties, including those conferred by the Constitution upon the executive and legislative branches, the Attorney General shall report orally or in writing semiannually to the Permanent Select Committee on Intelligence of the United States House of Representatives, the Select Committee on Intelligence of the United States Senate, and the chairmen and ranking minority members of the Committees on the Judiciary of the Senate and House of Representatives on all cases where a decision not to prosecute a violation of Federal law pursuant to section 12(a) has been made.

(b) In the case of the semiannual reports (whether oral or written) required to be submitted under subsection (a) to the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate, the submittal dates for such reports shall be as provided in section 507 of the National Security Act of 1947.

(c) The Attorney General shall deliver to the appropriate committees of Congress a report concerning the operation and effectiveness of this Act and including suggested amendments to this Act. For the first three years this Act is in effect, there shall be a report each year. After three years, such reports shall be delivered as necessary.

Functions of Attorney General may be Exercised By Deputy Attorney General or a Designated Assistant Attorney General

Sec. 14. [18 U.S.C. App. §14 ]

The functions and duties of the Attorney General under this Act may be exercised by the Deputy Attorney General , the Associate Attorney General, or by an Assistant Attorney General designated by the Attorney General for such purpose and may not be delegated to any other official.

Effective Date

Sec. 15. [18 U.S.C. App. §15 ]

The provisions of this Act shall become effective upon the date of the enactment of this Act, but shall not apply to any prosecution in which an indictment or information was filed before such date.

Short Title

Sec. 16. [18 U.S.C. App. §16 ]

That this Act may be cited as the “Classified Information Procedures Act”.

> Back to the Table of Contents <

Ref Book - Criteria on Thresholds for Reporting Intelligence Oversight Matters

Friday, August 03, 2012

Reporting Intelligence Oversight Matters

> Back to the Table of Contents <

Criteria on Thresholds for Reporting Intelligence Oversight Matters and Instructions Relating to Formatting and Scheduling

Questions concerning the implementation of EO 13462, or intelligence oversight reporting in general, may be submitted to the IOB’s General Counsel by calling 202-456-2352, or to the ODNI IOB Team by calling 703-482-6304 (ODNI/OIG) or 703-275-2523 (ODNI/OGC).


Intelligence oversight reporting serves as an early warning of intelligence activities of which the President should be informed, through either his Intelligence Oversight Board (IOB) or the Director of National Intelligence (DNI), or both, and provides a means by which the Executive Branch may timely identify and correct any deficiencies in the conduct of its intelligence activities.  The following criteria on thresholds for reporting intelligence oversight matters to the Intelligence Oversight Board, and instructions on formatting and scheduling of reports, are issued under the authority of Executive Order 13462.
 

I.  Criteria on Thresholds for Reporting.  The heads of departments with organizations in the Intelligence Community (IC), or the heads of such organizations, or their designees, shall:

A.  Report to the IOB, with copies to the DNI, any intelligence activity with respect to which there is reason to believe may be unlawful or contrary to executive order (EO) or presidential directive (PD).  The following guidance applies to determining whether a particular matter should be reported:

1.  “Intelligence activities” are defined in Part 3.4(e) of EO 12333 and, for purposes of these criteria, include, but are not limited to, the acquisition, collection, retention, analysis, and dissemination of intelligence information.

2.  Intelligence activities are reportable if a reasonable person would believe they may be unlawful or contrary to EO or PD without waiting for substantiation, investigation, formal adjudication, or resolution of the issue of whether a particular matter is unlawful or contrary to EO or PD.

3.  Intelligence activities to be reported under EOs 13462 and 12333 are not limited to those that concern “United States persons,” as defined in Part 3.4(i) of EO 12333 or in any successor EO.

4.  “Executive order or presidential directive” means, for purposes of implementing these criteria, a document signed by the President of the United States that has the force of law for the Executive Branch or constitutes the exercise by the President of his Executive authority.  Reports may include violations of procedures and guidelines that heads of departments of IC components have established to implement EO 12333, or a successor order, provided, however, that such matters are of potential presidential interest or deemed appropriate for the IOB’s review, e.g., because they involve the apparent violation of substantive rights of individuals.

5.  Reportable events include the initiation of, and significant developments in, investigations or other inquiries relating to the legality or propriety of intelligence activities.

6.  Initial reports made on the basis of incomplete or inaccurate reporting are to be updated as additional information becomes available.  Subsequent or updated reports should be identified in such a manner that they can be accurately related to the relevant initial reports.

7.  Intelligence activities are reportable to the IOB if such activities are required to be reported or have been reported to the Attorney General as required by law or other directive, including the Memorandum of Understanding on Reporting of Information Concerning Federal Crimes (1995).

8.  Any intelligence activity that is to be reported to any congressional committee or member of Congress because it is or may be unlawful or contrary to executive order or otherwise “significant or highly sensitive” (see paragraph B, below) shall also be reported to the IOB and DNI generally before such a congressional report is made.  Any report concerning intelligence activities that is submitted to any committee or member of Congress shall also be submitted to the IOB and DNI if the commencement of the investigation or other inquiry regarding such activities was also reportable under these criteria.

B.     Report to the DNI, and the IOB as appropriate, significant or highly sensitive matters, whether or not unlawful or contrary to EO or PD.

1. “Significant or highly sensitive matters” are developments or circumstances involving intelligence activities that could impugn the reputation or integrity of the IC, or otherwise call into question the propriety of intelligence activities.

2.  Such matters might be manifested in or by:

                  a.  congressional inquiries or investigations;

                        b.  adverse media coverage;

                        c.  impact on foreign relations or foreign partners; or

                        d.  unauthorized disclosure of protected information.

 

II.  Content of Reports.  Intelligence oversight reports should include (to the extent practicable without compromising the timeliness of reporting) the following:

A. A narrative describing each intelligence activity in question.

B. Why the matter is being reported, i.e., it is:

1.  a potential violation of law (cite the relevant law, if a judgment has been made);

2.  potentially contrary to EO or PD (cite the relevant section or part of the EO or PD);

3.  a potential violation of agency procedures implementing EO 12333 (cite the specific rule or procedure, if a judgment has been made);

4.  “‘significant’ because…”; or

5.  “‘highly sensitive’ because... .”

C.  An explanation and analysis of how or why the incident occurred.

D.  An assessment of any impact of the incident on national security or international relations, as well as any mitigation efforts, including success and failures of such efforts.

E.  Any remedial action the IC element has taken or is taking to prevent recurrence of the incident being reported.

F.  An assessment of any impact the reported intelligence activity may have on civil liberties or protected privacy rights.

G.  How the IC element concerned is addressing any information improperly acquired, handled, used, destroyed, etc., as a consequence of the mater being reported.

H.  A summary of the gravity, frequency, trends, and patterns of matters reported for the quarter.

I.  Any additional information that the reporting official considers relevant for purposes of fully and completely informing the IOB and the DNI on intelligence oversight matters.

 

III. Formatting of Reports.  Reports may be formatted in accordance with departmental or agency policies, provided all the substantive information described above is included in each report.

 

IV. Schedule for Reporting.

A.      Significant or highly sensitive matters must be reported immediately.

1.  Significant or highly sensitive matters may be reported orally, if necessary, and followed up with a written report as soon as possible thereafter.  The preference is for written reports.

2.  Significant or highly sensitive matters that may be unlawful of contrary to EO or PD shall be reported to the DNI and IOB.

3.  Significant or highly sensitive matters that are NOT unlawful or contrary to EO or PD shall be reported to the DNI.

B.     Routine reports shall be submitted on a quarterly basis.  The first report for the calendar year shall cover 1 January through 31 March, and so on for each quarter of the year.

C.     Quarterly reports are due the last day of the month following the end of the quarter.  For example, a report for the first quarter of the calendar year is due 30 April.

D.     All IC elements must submit reports at least quarterly, even if a component has not been made aware of any reportable matter during the reporting period.


> Back to the Table of Contents <

Ref Book - EO 13526

Friday, August 03, 2012

Executive Order 13526

Classified National Security Information

> Back to the Table of Contents <

(Federal Register Vol. 75, No. 2 (January 5, 2010))

This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism. Our democratic principles require that the American people be informed of the activities of their Government. Also, our Nation’s progress depends on the free flow of information both within the Government and to the American people. Nevertheless, throughout our history, the national defense has required that certain information be maintained in confidence in order to protect our citizens, our democratic institutions, our homeland security, and our interactions with foreign nations. Protecting information critical to our Nation’s security and demonstrating our commitment to open Government through accurate and accountable application of classification standards and routine, secure, and effective declassification are equally important priorities.


NOW, THEREFORE, I, BARACK OBAMA, by the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:

 

PART 1—ORIGINAL CLASSIFICATION

 

Section 1.1. Classification Standards.

(a) Information may be originally classified under the terms of this order only if all of the following conditions are met:

(1) an original classification authority is classifying the information;

(2) the information is owned by, produced by or for, or is under the control of the United States Government;

(3) the information falls within one or more of the categories of information listed in section 1.4 of this order; and

(4) the original classification authority determines that the unauthorized disclosure of the information reasonably could be expected to result in damage to the national security, which includes defense against transnational terrorism, and the original classification authority is able to identify or describe the damage.

(b) If there is significant doubt about the need to classify information, it shall not be classified. This provision does not:

(1) amplify or modify the substantive criteria or procedures for classification; or

(2) create any substantive or procedural rights subject to judicial review.

(c) Classified information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information.

(d) The unauthorized disclosure of foreign government information is presumed to cause damage to the national security.

 

Sec. 1.2. Classification Levels.

(a) Information may be classified at one of the following three levels:

(1) ‘‘Top Secret’’ shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe.

(2) ‘‘Secret’’ shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe.

(3) ‘‘Confidential’’ shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe.

(b) Except as otherwise provided by statute, no other terms shall be used to identify United States classified information.

(c) If there is significant doubt about the appropriate level of classification, it shall be classified at the lower level.

 

Sec. 1.3. Classification Authority.

(a) The authority to classify information originally may be exercised only by:

(1) the President and the Vice President;

(2) agency heads and officials designated by the President; and

(3) United States Government officials delegated this authority pursuant to paragraph (c) of this section.

(b) Officials authorized to classify information at a specified level are also authorized to classify information at a lower level.

(c) Delegation of original classification authority.

(1) Delegations of original classification authority shall be limited to the minimum required to administer this order. Agency heads are responsible for ensuring that designated subordinate officials have a demonstrable and continuing need to exercise this authority.

(2) ‘‘Top Secret’’ original classification authority may be delegated only by the President, the Vice President, or an agency head or official designated pursuant to paragraph (a)(2) of this section.

(3) ‘‘Secret’’ or ‘‘Confidential’’ original classification authority may be delegated only by the President, the Vice President, an agency head or official designated pursuant to paragraph (a)(2) of this section, or the senior agency official designated under section 5.4(d) of this order, provided that official has been delegated ‘‘Top Secret’’ original classification authority by the agency head.

(4) Each delegation of original classification authority shall be in writing and the authority shall not be redelegated except as provided in this order. Each delegation shall identify the official by name or position.

(5) Delegations of original classification authority shall be reported or made available by name or position to the Director of the Information Security Oversight Office.

(d) All original classification authorities must receive training in proper classification (including the avoidance of over-classification) and declassification as provided in this order and its implementing directives at least once a calendar year. Such training must include instruction on the proper safeguarding of classified information and on the sanctions in section 5.5 of this order that may be brought against an individual who fails to classify information properly or protect classified information from unauthorized disclosure. Original classification authorities who do not receive such mandatory training at least once within a calendar year shall have their classification authority suspended by the agency head or the senior agency official designated under section 5.4(d) of this order until such training has taken place. A waiver may be granted by the agency head, the deputy agency head, or the senior agency official if an individual is unable to receive such training due to unavoidable circumstances. Whenever a waiver is granted, the individual shall receive such training as soon as practicable.

(e) Exceptional cases. When an employee, government contractor, licensee, certificate holder, or grantee of an agency who does not have original classification authority originates information believed by that person to require classification, the information shall be protected in a manner consistent with this order and its implementing directives. The information shall be transmitted promptly as provided under this order or its implementing directives to the agency that has appropriate subject matter interest and classification authority with respect to this information. That agency shall decide within 30 days whether to classify this information.

 

Sec. 1.4. Classification Categories.

Information shall not be considered for classification unless its unauthorized disclosure could reasonably be expected to cause identifiable or describable damage to the national security in accordance with section 1.2 of this order, and it pertains to one or more of the following:

(a) military plans, weapons systems, or operations;

(b) foreign government information;

(c) intelligence activities (including covert action), intelligence sources or methods, or cryptology;

(d) foreign relations or foreign activities of the United States, including confidential sources;

(e) scientific, technological, or economic matters relating to the national security;

(f) United States Government programs for safeguarding nuclear materials or facilities;

(g) vulnerabilities or capabilities of systems, installations, infrastructures, projects, plans, or protection services relating to the national security; or

(h) the development, production, or use of weapons of mass destruction.

 

Sec. 1.5. Duration of Classification.

(a) At the time of original classification, the original classification authority shall establish a specific date or event for declassification based on the duration of the national security sensitivity of the information. Upon reaching the date or event, the information shall be automatically declassified. Except for information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, the date or event shall not exceed the time frame established in paragraph (b) of this section.

(b) If the original classification authority cannot determine an earlier specific date or event for declassification, information shall be marked for declassification 10 years from the date of the original decision, unless the original classification authority otherwise determines that the sensitivity of the information requires that it be marked for declassification for up to 25 years from the date of the original decision.

(c) An original classification authority may extend the duration of classification up to 25 years from the date of origin of the document, change the level of classification, or reclassify specific information only when the standards and procedures for classifying information under this order are followed.

(d) No information may remain classified indefinitely. Information marked for an indefinite duration of classification under predecessor orders, for example, marked as ‘‘Originating Agency’s Determination Required,’’ or classified information that contains incomplete declassification instructions or lacks declassification instructions shall be declassified in accordance with part 3 of this order.

 

Sec. 1.6. Identification and Markings.

(a) At the time of original classification, the following shall be indicated in a manner that is immediately apparent:

(1) one of the three classification levels defined in section 1.2 of this order;

(2) the identity, by name and position, or by personal identifier, of the original classification authority;

(3) the agency and office of origin, if not otherwise evident;

(4) declassification instructions, which shall indicate one of the following:

(A) the date or event for declassification, as prescribed in section 1.5(a);

(B) the date that is 10 years from the date of original classification, as prescribed in section 1.5(b);

(C) the date that is up to 25 years from the date of original classification, as prescribed in

section 1.5(b); or

(D) in the case of information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, the marking prescribed in implementing directives issued pursuant to this order; and

(5) a concise reason for classification that, at a minimum, cites the applicable

classification categories in section 1.4 of this order.

(b) Specific information required in paragraph (a) of this section may be excluded if it would reveal additional classified information.

(c) With respect to each classified document, the agency originating the document shall, by marking or other means, indicate which portions are classified, with the applicable classification level, and which portions are unclassified. In accordance with standards prescribed in directives issued under this order, the Director of the Information Security Oversight Office may grant and revoke temporary waivers of this requirement. The Director shall revoke any waiver upon a finding of abuse.

(d) Markings or other indicia implementing the provisions of this order, including abbreviations and requirements to safeguard classified working papers, shall conform to the standards prescribed in implementing directives issued pursuant to this order.

(e) Foreign government information shall retain its original classification markings or shall be assigned a U.S. classification that provides a degree of protection at least equivalent to that required by the entity that furnished the information. Foreign government information retaining its original classification

markings need not be assigned a U.S. classification marking provided that the responsible agency determines that the foreign government markings are adequate to meet the purposes served by U.S. classification markings.

(f) Information assigned a level of classification under this or predecessor orders shall be considered as classified at that level of classification despite the omission of other required markings. Whenever such information is used in the derivative classification process or is reviewed for possible declassification, holders of such information shall coordinate with an appropriate classification authority for the application of omitted markings.

(g) The classification authority shall, whenever practicable, use a classified addendum whenever classified information constitutes a small portion of an otherwise unclassified document or prepare a product to allow for dissemination at the lowest level of classification possible or in unclassified form.

(h) Prior to public release, all declassified records shall be appropriately marked to reflect their declassification.

 

Sec. 1.7. Classification Prohibitions and Limitations.

(a) In no case shall information be classified, continue to be maintained as classified, or fail to be declassified in order to:

(1) conceal violations of law, inefficiency, or administrative error;

(2) prevent embarrassment to a person, organization, or agency;

(3) restrain competition; or

(4) prevent or delay the release of information that does not require protection in the interest of the national security.

(b) Basic scientific research information not clearly related to the national security shall not be classified.

(c) Information may not be reclassified after declassification and release to the public under proper  authority unless: (1) the reclassification is personally approved in writing by the agency head based on a document-by-document determination by the agency that reclassification is required to prevent significant and demonstrable damage to the national security;

(2) the information may be reasonably recovered without bringing undue attention to the information;

(3) the reclassification action is reported promptly to the Assistant to the President for National Security Affairs (National Security Advisor) and the Director of the Information Security Oversight Office; and

(4) for documents in the physical and legal custody of the National Archives and Records Administration (National Archives) that have been available for public use, the agency head has, after making the determinations required by this paragraph, notified the Archivist of the United States (Archivist), who shall suspend public access pending approval of the reclassification action by the Director of the Information Security Oversight Office. Any such decision by the Director may be appealed

by the agency head to the President through the National Security Advisor. Public access shall remain suspended pending a prompt decision on the appeal.

(d) Information that has not previously been disclosed to the public under proper authority may be classified or reclassified after an agency has received a request for it under the Freedom of Information Act (5 U.S.C. 552), the Presidential Records Act, 44 U.S.C. 2204(c)(1), the Privacy Act of 1974

(5 U.S.C. 552a), or the mandatory review provisions of section 3.5 of this order only if such classification meets the requirements of this order and is accomplished on a document-by-document basis with the personal participation or under the direction of the agency head, the deputy agency head, or the senior agency official designated under section 5.4 of this order. The requirements in this paragraph also apply to those situations in which information has been declassified in accordance with a specific date or

event determined by an original classification authority in accordance with section 1.5 of this order.

(e) Compilations of items of information that are individually unclassified may be classified if the compiled information reveals an additional association or relationship that:

(1) meets the standards for classification under this order; and

(2) is not otherwise revealed in the individual items of information.

 

Sec. 1.8. Classification Challenges.

(a) Authorized holders of information who, in good faith, believe that its classification status is improper are encouraged and expected to challenge the classification status of the information in accordance with agency procedures established under paragraph (b) of this section.

(b) In accordance with implementing directives issued pursuant to this order, an agency head or senior agency official shall establish procedures under which authorized holders of information, including authorized holders outside the classifying agency, are encouraged and expected to challenge

the classification of information that they believe is improperly classified or unclassified. These procedures shall ensure that:

(1) individuals are not subject to retribution for bringing such actions;

(2) an opportunity is provided for review by an impartial official or panel; and

(3) individuals are advised of their right to appeal agency decisions to the Interagency Security Classification Appeals Panel (Panel) established by section 5.3 of this order.

(c) Documents required to be submitted for prepublication review or other administrative process pursuant to an approved nondisclosure agreement are not covered by this section.

 

Sec. 1.9. Fundamental Classification Guidance Review.

(a) Agency heads shall complete on a periodic basis a comprehensive review of the agency’s classification guidance, particularly classification guides, to ensure the guidance reflects current circumstances and to identify classified information that no longer requires protection and can be declassified. The initial fundamental classification guidance review shall be completed within 2 years

of the effective date of this order.

(b) The classification guidance review shall include an evaluation of classified information to determine if it meets the standards for classification under section 1.4 of this order, taking into account an up-to-date assessment of likely damage as described under section 1.2 of this order.

(c) The classification guidance review shall include original classification authorities and agency subject matter experts to ensure a broad range of perspectives.

(d) Agency heads shall provide a report summarizing the results of the classification guidance review to the Director of the Information Security Oversight Office and shall release an unclassified version of this report to the public.

 

PART 2—DERIVATIVE CLASSIFICATION

 

Sec. 2.1. Use of Derivative Classification.

(a) Persons who reproduce, extract, or summarize classified information, or who apply classification markings derived from source material or as directed by a classification guide, need not possess original classification authority.

(b) Persons who apply derivative classification markings shall:

(1) be identified by name and position, or by personal identifier, in a manner that is immediately apparent for each derivative classification action;

(2) observe and respect original classification decisions; and

(3) carry forward to any newly created documents the pertinent classification markings. For information derivatively classified based on multiple sources, the derivative classifier shall carry forward:

(A) the date or event for declassification that corresponds to the longest period of classification among the sources, or the marking established pursuant to section 1.6(a)(4)(D) of this order; and

(B) a listing of the source materials.

(c) Derivative classifiers shall, whenever practicable, use a classified addendum whenever classified information constitutes a small portion of an otherwise unclassified document or prepare a product to allow for dissemination at the lowest level of classification possible or in unclassified form.

(d) Persons who apply derivative classification markings shall receive training in the proper application of the derivative classification principles of the order, with an emphasis on avoiding over-classification, at least once every 2 years. Derivative classifiers who do not receive such training at least once every 2 years shall have their authority to apply derivative classification markings suspended until they have received such training. A waiver may be granted by the agency head, the deputy agency head, or the senior agency official if an individual is unable to receive such training due to unavoidable circumstances. Whenever a waiver is granted, the individual shall receive such training as soon as practicable.

 

Sec. 2.2. Classification Guides.

(a) Agencies with original classification authority shall prepare classification guides to facilitate the proper and uniform derivative classification of information. These guides shall conform to standards

contained in directives issued under this order.

(b) Each guide shall be approved personally and in writing by an official who:

(1) has program or supervisory responsibility over the information or is the senior agency official; and

(2) is authorized to classify information originally at the highest level of classification prescribed in the guide.

(c) Agencies shall establish procedures to ensure that classification guides are reviewed and updated as provided in directives issued under this order.

(d) Agencies shall incorporate original classification decisions into classification guides on a timely basis and in accordance with directives issued under this order.

(e) Agencies may incorporate exemptions from automatic declassification approved pursuant to section 3.3(j) of this order into classification guides, provided that the Panel is notified of the intent to take such action for specific information in advance of approval and the information remains

in active use.

(f) The duration of classification of a document classified by a derivative classifier using a classification guide shall not exceed 25 years from the date of the origin of the document, except for:

(1) information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction; and

(2) specific information incorporated into classification guides in accordance with section 2.2(e) of this order.

 

PART 3—DECLASSIFICATION AND DOWNGRADING

 

Sec. 3.1. Authority for Declassification.

(a) Information shall be declassified as soon as it no longer meets the standards for classification under this order.

(b) Information shall be declassified or downgraded by:

(1) the official who authorized the original classification, if that official is still serving in the same position and has original classification authority;

(2) the originator’s current successor in function, if that individual has original classification authority;

(3) a supervisory official of either the originator or his or her successor in function, if the supervisory official has original classification authority; or

(4) officials delegated declassification authority in writing by the agency head or the senior agency official of the originating agency.

(c) The Director of National Intelligence (or, if delegated by the Director of National Intelligence, the Principal Deputy Director of National Intelligence) may, with respect to the Intelligence Community, after consultation with the head of the originating Intelligence Community element or department, declassify, downgrade, or direct the declassification or downgrading of information or intelligence relating to intelligence sources, methods, or activities.

(d) It is presumed that information that continues to meet the classification requirements under this order requires continued protection. In some exceptional cases, however, the need to protect such information may be outweighed by the public interest in disclosure of the information, and in these cases the information should be declassified. When such questions arise, they shall be referred to the agency head or the senior agency official. That official will determine, as an exercise of discretion, whether the public interest in disclosure outweighs the damage to the national security that might reasonably be expected from disclosure. This provision does not:

(1) amplify or modify the substantive criteria or procedures for classification; or

(2) create any substantive or procedural rights subject to judicial review.

(e) If the Director of the Information Security Oversight Office determines that information is classified in violation of this order, the Director may require the information to be declassified by the agency that originated the classification. Any such decision by the Director may be appealed to the President through the National Security Advisor. The information shall remain classified pending a prompt decision on the appeal.

(f) The provisions of this section shall also apply to agencies that, under the terms of this order, do not have original classification authority, but had such authority under predecessor orders.

(g) No information may be excluded from declassification under section 3.3 of this order based solely on the type of document or record in which it is found. Rather, the classified information must be considered on the basis of its content.

(h) Classified nonrecord materials, including artifacts, shall be declassified as soon as they no longer meet the standards for classification under this order.

(i) When making decisions under sections 3.3, 3.4, and 3.5 of this order, agencies shall consider the final decisions of the Panel.

 
Sec. 3.2. Transferred Records.

(a) In the case of classified records transferred in conjunction with a transfer of functions, and not merely for storage purposes, the receiving agency shall be deemed to be the originating agency for purposes of this order.

(b) In the case of classified records that are not officially transferred as described in paragraph (a) of this section, but that originated in an agency that has ceased to exist and for which there is no successor agency, each agency in possession of such records shall be deemed to be the originating agency for purposes of this order. Such records may be declassified or downgraded by the agency in possession of the records after consultation with any other agency that has an interest in the subject matter of the records.

(c) Classified records accessioned into the National Archives shall be declassified or downgraded by the Archivist in accordance with this order, the directives issued pursuant to this order, agency declassification guides, and any existing procedural agreement between the Archivist and the relevant agency head.

(d) The originating agency shall take all reasonable steps to declassify classified information contained in records determined to have permanent historical value before they are accessioned into the National Archives. However, the Archivist may require that classified records be accessioned into the National Archives when necessary to comply with the provisions of the Federal Records Act. This provision does not apply to records transferred to the Archivist pursuant to section 2203 of title 44, United States Code, or records for which the National Archives serves as the custodian of the records of an agency or organization that has gone out of existence.

(e) To the extent practicable, agencies shall adopt a system of records management that will facilitate the public release of documents at the time such documents are declassified pursuant to the provisions for automatic declassification in section 3.3 of this order.

 

Sec. 3.3. Automatic Declassification.

(a) Subject to paragraphs (b)–(d) and (g)–(j) of this section, all classified records that (1) are more than 25 years old and (2) have been determined to have permanent historical value under title 44, United States Code, shall be automatically declassified whether or not the records have been reviewed. All classified records shall be automatically declassified on December 31 of the year that is 25 years from the date of origin, except as provided in paragraphs (b)–(d) and (g)–(j) of this section. If the date of origin of an individual record cannot be readily determined, the date of original classification shall be used instead.

(b) An agency head may exempt from automatic declassification under paragraph (a) of this section specific information, the release of which should clearly and demonstrably be expected to:

(1) reveal the identity of a confidential human source, a human intelligence source, a relationship with an intelligence or security service of a foreign government or international organization, or a nonhuman intelligence source; or impair the effectiveness of an intelligence method currently in use, available for use, or under development;

(2) reveal information that would assist in the development, production, or use of weapons of mass destruction;

(3) reveal information that would impair U.S. cryptologic systems or activities;

(4) reveal information that would impair the application of state-of-theart technology within a U.S. weapon system;

(5) reveal formally named or numbered U.S. military war plans that remain in effect, or reveal operational or tactical elements of prior plans that are contained in such active plans;

(6) reveal information, including foreign government information, that would cause serious harm to relations between the United States and a foreign government, or to ongoing diplomatic activities of the United States;

(7) reveal information that would impair the current ability of United States Government officials to protect the President, Vice President, and other protectees for whom protection services, in the interest of the national security, are authorized;

(8) reveal information that would seriously impair current national security emergency preparedness plans or reveal current vulnerabilities of systems, installations, or infrastructures relating to the national security; or

(9) violate a statute, treaty, or international agreement that does not permit the automatic or unilateral declassification of information at 25 years.

(c)(1) An agency head shall notify the Panel of any specific file series of records for which a review or assessment has determined that the information within that file series almost invariably falls within one or more of the exemption categories listed in paragraph (b) of this section and that the agency proposes to exempt from automatic declassification at 25 years.

(2) The notification shall include:

(A) a description of the file series;

(B) an explanation of why the information within the file series is almost invariably exempt from automatic declassification and why the information must remain classified for a longer period of time; and

(C) except when the information within the file series almost invariably identifies a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, a specific date or event for declassification of the information, not to exceed December 31 of the year that is 50 years from the date of origin of the records.

(3) The Panel may direct the agency not to exempt a designated file series or to declassify the information within that series at an earlier date than recommended. The agency head may appeal such a decision to the President through the National Security Advisor.

(4) File series exemptions approved by the President prior to December 31, 2008, shall remain valid without any additional agency action pending Panel review by the later of December 31, 2010, or December 31 of the year that is 10 years from the date of previous approval.

(d) The following provisions shall apply to the onset of automatic declassification:

(1) Classified records within an integral file block, as defined in this order, that are otherwise subject to automatic declassification under this section shall not be automatically declassified until December 31 of the year that is 25 years from the date of the most recent record within the file block.

(2) After consultation with the Director of the National Declassification Center (the Center) established by section 3.7 of this order and before the records are subject to automatic declassification, an agency head or senior agency official may delay automatic declassification for up to five additional years for classified information contained in media that make a review for possible declassification exemptions more difficult or costly.

(3) Other than for records that are properly exempted from automatic declassification, records containing classified information that originated with other agencies or the disclosure of which would affect the interests or activities of other agencies with respect to the classified information and could reasonably be expected to fall under one or more of the exemptions in paragraph (b) of this section shall be identified prior to the onset of automatic declassification for later referral to those agencies.

(A) The information of concern shall be referred by the Center established by section 3.7 of this order, or by the centralized facilities referred to in section 3.7(e) of this order, in a prioritized and scheduled manner determined by the Center.

(B) If an agency fails to provide a final determination on a referral made by the Center within 1 year of referral, or by the centralized facilities referred to in section 3.7(e) of this order within 3 years of referral, its equities in the referred records shall be automatically declassified.

(C) If any disagreement arises between affected agencies and the Center regarding the referral review period, the Director of the Information Security Oversight Office shall determine the appropriate period of review of referred records.

(D) Referrals identified prior to the establishment of the Center by section 3.7 of this order shall be subject to automatic declassification only in accordance with subparagraphs (d)(3)(A)–(C) of this section.

(4) After consultation with the Director of the Information Security Oversight Office, an agency head may delay automatic declassification for up to 3 years from the date of discovery of classified records that were inadvertently not reviewed prior to the effective date of automatic declassification.

(e) Information exempted from automatic declassification under this section shall remain subject to the mandatory and systematic declassification review provisions of this order.

(f) The Secretary of State shall determine when the United States should commence negotiations with the appropriate officials of a foreign government or international organization of governments to modify any treaty or international agreement that requires the classification of information contained in records affected by this section for a period longer than 25 years from the date of its creation, unless the treaty or international agreement pertains to information that may otherwise remain classified beyond 25 years under this section.

(g) The Secretary of Energy shall determine when information concerning foreign nuclear programs that was removed from the Restricted Data category in order to carry out provisions of the National Security Act of 1947, as amended, may be declassified. Unless otherwise determined, such information shall be declassified when comparable information concerning the United States nuclear program is declassified.

(h) Not later than 3 years from the effective date of this order, all records exempted from automatic declassification under paragraphs (b) and (c) of this section shall be automatically declassified on December 31 of a year that is no more than 50 years from the date of origin, subject to the following:

(1) Records that contain information the release of which should clearly and demonstrably be expected to reveal the following are exempt from automatic declassification at 50 years:

(A) the identity of a confidential human source or a human intelligence source; or

(B) key design concepts of weapons of mass destruction.

(2) In extraordinary cases, agency heads may, within 5 years of the onset of automatic declassification, propose to exempt additional specific information from declassification at 50 years.

(3) Records exempted from automatic declassification under this paragraph shall be automatically declassified on December 31 of a year that is no more than 75 years from the date of origin unless an agency head, within 5 years of that date, proposes to exempt specific information from declassification

at 75 years and the proposal is formally approved by the Panel.

(i) Specific records exempted from automatic declassification prior to the establishment of the Center described in section 3.7 of this order shall be subject to the provisions of paragraph (h) of this section in a scheduled and prioritized manner determined by the Center.

(j) At least 1 year before information is subject to automatic declassification under this section, an agency head or senior agency official shall notify the Director of the Information Security Oversight Office, serving as Executive Secretary of the Panel, of any specific information that the agency proposes to exempt from automatic declassification under paragraphs (b) and (h) of this section.

(1) The notification shall include:

(A) a detailed description of the information, either by reference to information in specific records or in the form of a declassification guide;

(B) an explanation of why the information should be exempt from automatic declassification and must remain classified for a longer period of time; and

(C) a specific date or a specific and independently verifiable event for automatic declassification of specific records that contain the information proposed for exemption.

(2) The Panel may direct the agency not to exempt the information or to declassify it at an earlier date than recommended. An agency head may appeal such a decision to the President through the National Security Advisor. The information will remain classified while such an appeal is pending.

(k) For information in a file series of records determined not to have permanent historical value, the duration of classification beyond 25 years shall be the same as the disposition (destruction) date of those records in each Agency Records Control Schedule or General Records Schedule, although the duration of classification shall be extended if the record has been retained for business reasons beyond the scheduled disposition date.

 

Sec. 3.4. Systematic Declassification Review.

(a) Each agency that has originated classified information under this order or its predecessors shall establish and conduct a program for systematic declassification review for records of permanent historical value exempted from automatic declassification under section 3.3 of this order. Agencies shall prioritize their review of such records in accordance with priorities established by the Center.

(b) The Archivist shall conduct a systematic declassification review program for classified records:

(1) accessioned into the National Archives; (2) transferred to the Archivist pursuant to 44 U.S.C. 2203; and (3) for which the National Archives serves as the custodian for an agency or organization that has gone out of existence.

 

Sec. 3.5. Mandatory Declassification Review.

(a) Except as provided in paragraph (b) of this section, all information classified under this order or predecessor orders shall be subject to a review for declassification by the originating agency if:

(1) the request for a review describes the document or material containing the information with sufficient specificity to enable the agency to locate it with a reasonable amount of effort;

(2) the document or material containing the information responsive to the request is not contained within an operational file exempted from search and review, publication, and disclosure under 5 U.S.C. 552 in

accordance with law; and

(3) the information is not the subject of pending litigation.

(b) Information originated by the incumbent President or the incumbent Vice President; the incumbent President’s White House Staff or the incumbent Vice President’s Staff; committees, commissions, or boards appointed by the incumbent President; or other entities within the Executive Office of the President that solely advise and assist the incumbent President is exempted from the provisions of paragraph (a) of this section. However, the Archivist shall have the authority to review, downgrade, and declassify papers or records of former Presidents and Vice Presidents under the control of the Archivist pursuant to 44 U.S.C. 2107, 2111, 2111 note, or 2203. Review procedures developed by the Archivist shall provide for consultation with agencies having primary subject matter interest and shall be consistent with the provisions of applicable laws or lawful agreements that pertain to the respective Presidential papers or records. Agencies with primary subject matter interest shall be notified promptly of the archivist’s decision. Any final decision by the Archivist may be appealed by the requester or an

agency to the Panel. The information shall remain classified pending a prompt decision on the appeal.

(c) Agencies conducting a mandatory review for declassification shall declassify information that no longer meets the standards for classification under this order. They shall release this information unless withholding is otherwise authorized and warranted under applicable law.

(d) If an agency has reviewed the requested information for declassification within the past 2 years, the agency need not conduct another review and may instead inform the requester of this fact and the prior review decision and advise the requester of appeal rights provided under subsection (e)

of this section.

(e) In accordance with directives issued pursuant to this order, agency heads shall develop procedures to process requests for the mandatory review of classified information. These procedures shall apply to information classified under this or predecessor orders. They also shall provide a means for administratively appealing a denial of a mandatory review request, and for notifying the requester of the right to appeal a final agency decision to the Panel.

(f) After consultation with affected agencies, the Secretary of Defense shall develop special procedures for the review of cryptologic information; the Director of National Intelligence shall develop special procedures for the review of information pertaining to intelligence sources, methods, and activities; and the Archivist shall develop special procedures for the review of information accessioned into the National Archives.

(g) Documents required to be submitted for prepublication review or other administrative process pursuant to an approved nondisclosure agreement are not covered by this section.

(h) This section shall not apply to any request for a review made to an element of the Intelligence Community that is made by a person other than an individual as that term is defined by 5 U.S.C. 552a(a)(2), or by a foreign government entity or any representative thereof.

 

Sec. 3.6. Processing Requests and Reviews.

Notwithstanding section 4.1(i) of this order, in response to a request for information under the Freedom

of Information Act, the Presidential Records Act, the Privacy Act of 1974, or the mandatory review provisions of this order:

(a) An agency may refuse to confirm or deny the existence or nonexistence of requested records whenever the fact of their existence or nonexistence is itself classified under this order or its predecessors.

(b) When an agency receives any request for documents in its custody that contain classified information that originated with other agencies or the disclosure of which would affect the interests or activities of other agencies with respect to the classified information, or identifies such documents in the process of implementing sections 3.3 or 3.4 of this order, it shall refer copies of any request and the pertinent documents to the originating agency for processing and may, after consultation with the originating

agency, inform any requester of the referral unless such association is itself classified under this order or its predecessors. In cases in which the originating agency determines in writing that a response under paragraph

(a) of this section is required, the referring agency shall respond to the requester in accordance with that paragraph.

(c) Agencies may extend the classification of information in records determined not to have permanent historical value or nonrecord materials, including artifacts, beyond the time frames established in sections 1.5(b) and 2.2(f) of this order, provided:

(1) the specific information has been approved pursuant to section 3.3(j) of this order for exemption from automatic declassification; and

(2) the extension does not exceed the date established in section 3.3(j) of this order.

 

Sec. 3.7. National Declassification Center.

(a) There is established within

the National Archives a National Declassification Center to streamline declassification processes, facilitate quality-assurance measures, and implement standardized training regarding the declassification of records determined to have permanent historical value. There shall be a Director of the Center who shall be appointed or removed by the Archivist in consultation with the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence.

(b) Under the administration of the Director, the Center shall coordinate:

(1) timely and appropriate processing of referrals in accordance with section 3.3(d)(3) of this order for accessioned Federal records and transferred presidential records.

(2) general interagency declassification activities necessary to fulfill the requirements of sections 3.3 and 3.4 of this order;

(3) the exchange among agencies of detailed declassification guidance to enable the referral of records in accordance with section 3.3(d)(3) of this order;

(4) the development of effective, transparent, and standard declassification work processes, training, and quality assurance measures;

(5) the development of solutions to declassification challenges posed by electronic records, special media, and emerging technologies;

(6) the linkage and effective utilization of existing agency databases and the use of new technologies to document and make public declassification review decisions and support declassification activities under the purview of the Center; and

(7) storage and related services, on a reimbursable basis, for Federal records containing classified national security information.

(c) Agency heads shall fully cooperate with the Archivist in the activities of the Center and shall:

(1) provide the Director with adequate and current declassification guidance to enable the referral of records in accordance with section 3.3(d)(3) of this order; and

(2) upon request of the Archivist, assign agency personnel to the Center who shall be delegated authority by the agency head to review and exempt or declassify information originated by their agency contained in records accessioned into the National Archives, after consultation with subjectmatter experts as necessary.

(d) The Archivist, in consultation with representatives of the participants in the Center and after input from the general public, shall develop priorities for declassification activities under the purview of the Center that take into account the degree of researcher interest and the likelihood of declassification.

(e) Agency heads may establish such centralized facilities and internal operations to conduct internal declassification reviews as appropriate to achieve optimized records management and declassification business processes. Once established, all referral processing of accessioned records shall take place at the Center, and such agency facilities and operations shall be coordinated with the Center to ensure the maximum degree of consistency in policies and procedures that relate to records determined to have permanent historical value.

(f) Agency heads may exempt from automatic declassification or continue the classification of their own originally classified information under section 3.3(a) of this order except that in the case of the Director of National Intelligence, the Director shall also retain such authority with respect to the Intelligence Community.

(g) The Archivist shall, in consultation with the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, the Director of National Intelligence, the Director of the Central Intelligence Agency, and the Director of the Information Security Oversight Office, provide the

National Security Advisor with a detailed concept of operations for the Center and a proposed implementing directive under section 5.1 of this order that reflects the coordinated views of the aforementioned agencies.

 

PART 4—SAFEGUARDING

 

Sec. 4.1. General Restrictions on Access.

(a) A person may have access to classified information provided that:

(1) a favorable determination of eligibility for access has been made by an agency head or the agency head’s designee;

(2) the person has signed an approved nondisclosure agreement; and

(3) the person has a need-to-know the information.

(b) Every person who has met the standards for access to classified information in paragraph (a) of this section shall receive contemporaneous training on the proper safeguarding of classified information and on the criminal, civil, and administrative sanctions that may be imposed on an individual who fails to protect classified information from unauthorized disclosure.

(c) An official or employee leaving agency service may not remove classified information from the agency’s control or direct that information be declassified in order to remove it from agency control.

(d) Classified information may not be removed from official premises without proper authorization.

(e) Persons authorized to disseminate classified information outside the executive branch shall ensure the protection of the information in a manner equivalent to that provided within the executive branch.

(f) Consistent with law, executive orders, directives, and regulations, an agency head or senior agency official or, with respect to the Intelligence Community, the Director of National Intelligence, shall establish uniform procedures to ensure that automated information systems, including networks and telecommunications systems, that collect, create, communicate, compute, disseminate, process, or store classified information:

(1) prevent access by unauthorized persons;

(2) ensure the integrity of the information; and

(3) to the maximum extent practicable, use:

(A) common information technology standards, protocols, and interfaces that maximize the availability of, and access to, the information in a form and manner that facilitates its authorized use; and

(B) standardized electronic formats to maximize the accessibility of information to persons who meet the criteria set forth in section 4.1(a) of this order.

(g) Consistent with law, executive orders, directives, and regulations, each agency head or senior agency official, or with respect to the Intelligence Community, the Director of National Intelligence, shall establish controls to ensure that classified information is used, processed, stored, reproduced, transmitted, and destroyed under conditions that provide adequate protection and prevent access by unauthorized persons.

(h) Consistent with directives issued pursuant to this order, an agency shall safeguard foreign government information under standards that provide a degree of protection at least equivalent to that required by the government or international organization of governments that furnished the information. When adequate to achieve equivalency, these standards may be less restrictive than the safeguarding standards that ordinarily apply to U.S. ‘‘Confidential’’ information, including modified handling and transmission and allowing access to individuals with a need-to-know who have not otherwise been cleared for access to classified information or executed an approved nondisclosure agreement.

(i)(1) Classified information originating in one agency may be disseminated to another agency or U.S. entity by any agency to which it has been made available without the consent of the originating agency, as long as the criteria for access under section 4.1(a) of this order are met, unless the originating agency has determined that prior authorization is required for such dissemination and has marked or indicated such requirement on the medium containing the classified information in accordance with implementing

directives issued pursuant to this order.

(2) Classified information originating in one agency may be disseminated by any other agency to which it has been made available to a foreign government in accordance with statute, this order, directives implementing this order, direction of the President, or with the consent of the originating agency. For the purposes of this section, ‘‘foreign government’’ includes any element of a foreign government, or an international organization of governments, or any element thereof.

(3) Documents created prior to the effective date of this order shall not be disseminated outside any other agency to which they have been made available without the consent of the originating agency. An agency head or senior agency official may waive this requirement for specific information that originated within that agency.

(4) For purposes of this section, the Department of Defense shall be considered one agency, except that any dissemination of information regarding intelligence sources, methods, or activities shall be consistent with directives issued pursuant to section 6.2(b) of this order.

(5) Prior consent of the originating agency is not required when referring records for declassification review that contain information originating in more than one agency.

 

Sec. 4.2. Distribution Controls.

(a) The head of each agency shall establish procedures in accordance with applicable law and consistent with directives issued pursuant to this order to ensure that classified information is accessible to the maximum extent possible by individuals who meet the criteria set forth in section 4.1(a) of this order.

(b) In an emergency, when necessary to respond to an imminent threat to life or in defense of the homeland, the agency head or any designee may authorize the disclosure of classified information (including information marked pursuant to section 4.1(i)(1) of this order) to an individual or individuals

who are otherwise not eligible for access. Such actions shall be taken only in accordance with directives implementing this order and any procedure issued by agencies governing the classified information, which shall be designed to minimize the classified information that is disclosed under these circumstances and the number of individuals who receive it. Information disclosed under this provision or implementing directives and procedures shall not be deemed declassified as a result of such disclosure or subsequent use by a recipient. Such disclosures shall be reported promptly to the originator of the classified information. For purposes of this section, the Director of National Intelligence may issue an implementing directive

governing the emergency disclosure of classified intelligence information.

(c) Each agency shall update, at least annually, the automatic, routine, or recurring distribution mechanism for classified information that it distributes. Recipients shall cooperate fully with distributors who are updating distribution lists and shall notify distributors whenever a relevant change in status occurs.

 

Sec. 4.3. Special Access Programs.

(a) Establishment of special access programs. Unless otherwise authorized by the President, only the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence, or the principal deputy of each, may create a special access program. For special access programs pertaining to intelligence sources, methods, and activities (but not including military

operational, strategic, and tactical programs), this function shall be exercised by the Director of National Intelligence. These officials shall keep the number of these programs at an absolute minimum, and shall establish them only when the program is required by statute or upon a specific finding that:

(1) the vulnerability of, or threat to, specific information is exceptional; and

(2) the normal criteria for determining eligibility for access applicable to information classified at the same level are not deemed sufficient to protect the information from unauthorized disclosure.

(b) Requirements and limitations.

(1) Special access programs shall be limited to programs in which the number of persons who ordinarily will have access will be reasonably small and commensurate with the objective of providing enhanced protection for the information involved.

(2) Each agency head shall establish and maintain a system of accounting for special access programs consistent with directives issued pursuant to this order.

(3) Special access programs shall be subject to the oversight program established under section 5.4(d) of this order. In addition, the Director of the Information Security Oversight Office shall be afforded access to these programs, in accordance with the security requirements of each program, in order to perform the functions assigned to the Information Security Oversight Office under this order. An agency head may limit access to a special access program to the Director of the Information Security Oversight Office and no more than one other employee of the Information Security Oversight Office or, for special access programs that are extraordinarily sensitive and vulnerable, to the Director only.

(4) The agency head or principal deputy shall review annually each special access program to determine whether it continues to meet the requirements of this order.

(5) Upon request, an agency head shall brief the National Security Advisor, or a designee, on any or all of the agency’s special access programs.

(6) For the purposes of this section, the term ‘‘agency head’’ refers only to the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence, or the principal deputy of each.

(c) Nothing in this order shall supersede any requirement made by or under 10 U.S.C. 119.

 

Sec. 4.4. Access by Historical Researchers and Certain Former Government Personnel.

(a) The requirement in section 4.1(a)(3) of this order that access to classified information may be granted only to individuals who have a need-to-know the information may be waived for persons who:

(1) are engaged in historical research projects;

(2) previously have occupied senior policy-making positions to which they were appointed or designated by the President or the Vice President; or

(3) served as President or Vice President.

(b) Waivers under this section may be granted only if the agency head or senior agency official of the originating agency:

(1) determines in writing that access is consistent with the interest of the national security;

(2) takes appropriate steps to protect classified information from unauthorized disclosure or compromise, and ensures that the information is safeguarded in a manner consistent with this order; and

(3) limits the access granted to former Presidential appointees or designees and Vice Presidential appointees or designees to items that the person originated, reviewed, signed, or received while serving as a Presidential or Vice Presidential appointee or designee.

 

PART 5—IMPLEMENTATION AND REVIEW

 

Sec. 5.1. Program Direction.

(a) The Director of the Information Security Oversight Office, under the direction of the Archivist and in consultation with the National Security Advisor, shall issue such directives as are necessary to implement this order. These directives shall be binding on the agencies. Directives issued by the Director of the Information Security Oversight Office shall establish standards for:

(1) classification, declassification, and marking principles;

(2) safeguarding classified information, which shall pertain to the handling, storage, distribution, transmittal, and destruction of and accounting for classified information;

(3) agency security education and training programs;

(4) agency self-inspection programs; and

(5) classification and declassification guides.

(b) The Archivist shall delegate the implementation and monitoring functions of this program to the Director of the Information Security Oversight Office.

(c) The Director of National Intelligence, after consultation with the heads of affected agencies and the Director of the Information Security Oversight Office, may issue directives to implement this order with respect to the protection of intelligence sources, methods, and activities. Such directives shall be consistent with this order and directives issued under paragraph (a) of this section.

 

Sec. 5.2. Information Security Oversight Office.

(a) There is established within the National Archives an Information Security Oversight Office. The Archivist shall appoint the Director of the Information Security Oversight Office, subject to the approval of the President.

(b) Under the direction of the Archivist, acting in consultation with the National Security Advisor, the Director of the Information Security Oversight Office shall:

(1) develop directives for the implementation of this order;

(2) oversee agency actions to ensure compliance with this order and its implementing directives;

(3) review and approve agency implementing regulations prior to their issuance to ensure their consistency with this order and directives issued under section 5.1(a) of this order;

(4) have the authority to conduct on-site reviews of each agency’s program established under this order, and to require of each agency those reports and information and other cooperation that may be necessary to fulfill its responsibilities. If granting access to specific categories of classified information would pose an exceptional national security risk, the affected agency head or the senior agency official shall submit a written justification recommending the denial of access to the President through the National Security Advisor within 60 days of the request for access. Access shall be denied pending the response;

(5) review requests for original classification authority from agencies or officials not granted original classification authority and, if deemed appropriate, recommend Presidential approval through the National Security Advisor;

(6) consider and take action on complaints and suggestions from persons within or outside the Government with respect to the administration of the program established under this order;

(7) have the authority to prescribe, after consultation with affected agencies, standardization of forms or procedures that will promote the implementation of the program established under this order;

(8) report at least annually to the President on the implementation of this order; and

(9) convene and chair interagency meetings to discuss matters pertaining to the program established by this order.

Sec. 5.3. Interagency Security Classification Appeals Panel.

(a) Establishment and administration.

(1) There is established an Interagency Security Classification Appeals Panel. The Departments of State, Defense, and Justice, the National Archives, the Office of the Director of National Intelligence, and the National Security Advisor shall each be represented by a senior-level representative who is a full-time or permanent part-time Federal officer or employee designated to serve as a member of the Panel by the respective agency head. The President shall designate a Chair from among the members of the Panel.

(2) Additionally, the Director of the Central Intelligence Agency may appoint a temporary representative who meets the criteria in paragraph (a)(1) of this section to participate as a voting member in all Panel deliberations and associated support activities concerning classified information originated by the Central Intelligence Agency.

(3) A vacancy on the Panel shall be filled as quickly as possible as provided in paragraph (a)(1) of this section.

(4) The Director of the Information Security Oversight Office shall serve as the Executive Secretary of the Panel. The staff of the Information Security Oversight Office shall provide program and administrative support for the Panel.

(5) The members and staff of the Panel shall be required to meet eligibility for access standards in order to fulfill the Panel’s functions.

(6) The Panel shall meet at the call of the Chair. The Chair shall schedule meetings as may be necessary for the Panel to fulfill its functions in a timely manner.

(7) The Information Security Oversight Office shall include in its reports to the President a summary of the Panel’s activities.

(b) Functions. The Panel shall:

(1) decide on appeals by persons who have filed classification challenges under section 1.8 of this order;

(2) approve, deny, or amend agency exemptions from automatic declassification as provided in section 3.3 of this order;

(3) decide on appeals by persons or entities who have filed requests for mandatory declassification review under section 3.5 of this order; and

(4) appropriately inform senior agency officials and the public of final Panel decisions on appeals under sections 1.8 and 3.5 of this order.

(c) Rules and procedures. The Panel shall issue bylaws, which shall be published in the Federal Register. The bylaws shall establish the rules and procedures that the Panel will follow in accepting, considering, and issuing decisions on appeals. The rules and procedures of the Panel shall provide that the Panel will consider appeals only on actions in which:

(1) the appellant has exhausted his or her administrative remedies within the responsible agency;

(2) there is no current action pending on the issue within the Federal courts; and

(3) the information has not been the subject of review by the Federal courts or the Panel within the past 2 years.

(d) Agency heads shall cooperate fully with the Panel so that it can fulfill its functions in a timely and fully informed manner. The Panel shall report to the President through the National Security Advisor any instance in which it believes that an agency head is not cooperating fully with the Panel.

(e) The Panel is established for the sole purpose of advising and assisting the President in the discharge of his constitutional and discretionary authority to protect the national security of the United States. Panel decisions are committed to the discretion of the Panel, unless changed by the President.

(f) An agency head may appeal a decision of the Panel to the President through the National Security Advisor. The information shall remain classified pending a decision on the appeal.

 

Sec. 5.4. General Responsibilities.

Heads of agencies that originate or handle classified information shall:

(a) demonstrate personal commitment and commit senior management to the successful implementation of the program established under this order;

(b) commit necessary resources to the effective implementation of the program established under this order;

(c) ensure that agency records systems are designed and maintained to optimize the appropriate sharing and safeguarding of classified information, and to facilitate its declassification under the terms of this order when it no longer meets the standards for continued classification; and

(d) designate a senior agency official to direct and administer the program, whose responsibilities shall include:

(1) overseeing the agency’s program established under this order, provided an agency head may designate a separate official to oversee special access programs authorized under this order. This official shall provide a full accounting of the agency’s special access programs at least annually;

(2) promulgating implementing regulations, which shall be published in the Federal Register to the extent that they affect members of the public;

(3) establishing and maintaining security education and training programs;

(4) establishing and maintaining an ongoing self-inspection program, which shall include the regular reviews of representative samples of the agency’s original and derivative classification actions, and shall authorize appropriate agency officials to correct misclassification actions not covered by sections 1.7(c) and 1.7(d) of this order; and reporting annually to the Director of the Information Security Oversight Office on the agency’s self-inspection program;

(5) establishing procedures consistent with directives issued pursuant to this order to prevent unnecessary access to classified information, including procedures that:

(A) require that a need for access to classified information be established before initiating administrative clearance procedures; and

(B) ensure that the number of persons granted access to classified information meets the mission needs of the agency while also satisfying operational and security requirements and needs;

(6) developing special contingency plans for the safeguarding of classified information used in or near hostile or potentially hostile areas;

(7) ensuring that the performance contract or other system used to rate civilian or military personnel performance includes the designation and management of classified information as a critical element or item to be evaluated in the rating of:

(A) original classification authorities;

(B) security managers or security specialists; and

(C) all other personnel whose duties significantly involve the creation or handling of classified information, including personnel who regularly apply derivative classification markings;

(8) accounting for the costs associated with the implementation of this order, which shall be reported to the Director of the Information Security Oversight Office for publication;

(9) assigning in a prompt manner agency personnel to respond to any request, appeal, challenge, complaint, or suggestion arising out of this order that pertains to classified information that originated in a component of the agency that no longer exists and for which there is no clear successor in function; and

(10) establishing a secure capability to receive information, allegations, or complaints regarding over-classification or incorrect classification within the agency and to provide guidance to personnel on proper classification as needed.

 

Sec. 5.5. Sanctions.

(a) If the Director of the Information Security Oversight Office finds that a violation of this order or its implementing directives has occurred, the Director shall make a report to the head of the agency or to the senior agency official so that corrective steps, if appropriate, may be taken.

(b) Officers and employees of the United States Government, and its contractors, licensees, certificate holders, and grantees shall be subject to appropriate sanctions if they knowingly, willfully, or negligently:

(1) disclose to unauthorized persons information properly classified under this order or predecessor orders;

(2) classify or continue the classification of information in violation of this order or any implementing directive;

(3) create or continue a special access program contrary to the requirements of this order; or

(4) contravene any other provision of this order or its implementing directives.

(c) Sanctions may include reprimand, suspension without pay, removal, termination of classification authority, loss or denial of access to classified information, or other sanctions in accordance with applicable law and agency regulation.

(d) The agency head, senior agency official, or other supervisory official shall, at a minimum, promptly remove the classification authority of any individual who demonstrates reckless disregard or a pattern of error in applying the classification standards of this order.

(e) The agency head or senior agency official shall:

(1) take appropriate and prompt corrective action when a violation or infraction under paragraph (b) of this section occurs; and

(2) notify the Director of the Information Security Oversight Office when a violation under paragraph (b)(1), (2), or (3) of this section occurs.

 

PART 6—GENERAL PROVISIONS

 

Sec. 6.1. Definitions.

For purposes of this order:

(a) ‘‘Access’’ means the ability or opportunity to gain knowledge of classified information.

(b) ‘‘Agency’’ means any ‘‘Executive agency,’’ as defined in 5 U.S.C. 105; any ‘‘Military department’’ as defined in 5 U.S.C. 102; and any other entity within the executive branch that comes into the possession of classified information.

(c) ‘‘Authorized holder’’ of classified information means anyone who satisfies the conditions for access stated in section 4.1(a) of this order.

(d) ‘‘Automated information system’’ means an assembly of computer hardware, software, or firmware configured to collect, create, communicate, compute, disseminate, process, store, or control data or information.

(e) ‘‘Automatic declassification’’ means the declassification of information based solely upon:

(1) the occurrence of a specific date or event as determined by the original classification authority; or

(2) the expiration of a maximum time frame for duration of classification established under this order.

(f) ‘‘Classification’’ means the act or process by which information is determined to be classified information.

(g) ‘‘Classification guidance’’ means any instruction or source that prescribes the classification of specific information.

(h) ‘‘Classification guide’’ means a documentary form of classification guidance issued by an original classification authority that identifies the elements of information regarding a specific subject that must be classified and establishes the level and duration of classification for each such element.

(i) ‘‘Classified national security information’’ or ‘‘classified information’’ means information that has been determined pursuant to this order or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form.

(j) ‘‘Compilation’’ means an aggregation of preexisting unclassified items of information.

(k) ‘‘Confidential source’’ means any individual or organization that has provided, or that may reasonably be expected to provide, information to the United States on matters pertaining to the national security with the expectation that the information or relationship, or both, are to be held in confidence.

(l) ‘‘Damage to the national security’’ means harm to the national defense or foreign relations of the United States from the unauthorized disclosure of information, taking into consideration such aspects of the information as the sensitivity, value, utility, and provenance of that information.

(m) ‘‘Declassification’’ means the authorized change in the status of information from classified information to unclassified information.

(n) ‘‘Declassification guide’’ means written instructions issued by a declassification authority that describes the elements of information regarding a specific subject that may be declassified and the elements that must remain classified.

(o) ‘‘Derivative classification’’ means the incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information. Derivative classification includes the classification of information based on classification guidance. The duplication or reproduction of existing classified information is not derivative classification.

(p) ‘‘Document’’ means any recorded information, regardless of the nature of the medium or the method or circumstances of recording.

(q) ‘‘Downgrading’’ means a determination by a declassification authority that information classified and safeguarded at a specified level shall be classified and safeguarded at a lower level.

(r) ‘‘File series’’ means file units or documents arranged according to a filing system or kept together because they relate to a particular subject or function, result from the same activity, document a specific kind of transaction, take a particular physical form, or have some other relationship arising out of their creation, receipt, or use, such as restrictions on access or use.

(s) ‘‘Foreign government information’’ means:

(1) information provided to the United States Government by a foreign government or governments, an international organization of governments, or any element thereof, with the expectation that the information, the source of the information, or both, are to be held in confidence;

(2) information produced by the United States Government pursuant to or as a result of a joint arrangement with a foreign government or governments, or an international organization of governments, or any element thereof, requiring that the information, the arrangement, or both, are to be held in confidence; or

(3) information received and treated as ‘‘foreign government information’’ under the terms of a predecessor order.

(t) ‘‘Information’’ means any knowledge that can be communicated or documentary material, regardless of its physical form or characteristics, that is owned by, is produced by or for, or is under the control of the United States Government.

(u) ‘‘Infraction’’ means any knowing, willful, or negligent action contrary to the requirements of this order or its implementing directives that does not constitute a ‘‘violation,’’ as defined below.

(v) ‘‘Integral file block’’ means a distinct component of a file series, as defined in this section, that should be maintained as a separate unit in order to ensure the integrity of the records. An integral file block may

consist of a set of records covering either a specific topic or a range of time, such as a Presidential administration or a 5-year retirement schedule within a specific file series that is retired from active use as a group. For purposes of automatic declassification, integral file blocks shall contain only records dated within 10 years of the oldest record in the file block.

(w) ‘‘Integrity’’ means the state that exists when information is unchanged from its source and has not been accidentally or intentionally modified, altered, or destroyed.

(x) ‘‘Intelligence’’ includes foreign intelligence and counterintelligence as defined by Executive Order 12333 of December 4, 1981, as amended, or by a successor order.

(y) ‘‘Intelligence activities’’ means all activities that elements of the Intelligence Community are authorized to conduct pursuant to law or Executive Order 12333, as amended, or a successor order.

(z) ‘‘Intelligence Community’’ means an element or agency of the U.S. Government identified in or designated pursuant to section 3(4) of the National Security Act of 1947, as amended, or section 3.5(h) of Executive Order 12333, as amended.

(aa) ‘‘Mandatory declassification review’’ means the review for declassification of classified information in response to a request for declassification that meets the requirements under section 3.5 of this order.

(bb) ‘‘Multiple sources’’ means two or more source documents, classification guides, or a combination of both.

(cc) ‘‘National security’’ means the national defense or foreign relations of the United States.

(dd) ‘‘Need-to-know’’ means a determination within the executive branch in accordance with directives issued pursuant to this order that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function.

(ee) ‘‘Network’’ means a system of two or more computers that can exchange data or information.

(ff) ‘‘Original classification’’ means an initial determination that information requires, in the interest of the national security, protection against unauthorized disclosure.

(gg) ‘‘Original classification authority’’ means an individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President, to classify information in the first instance.

(hh) ‘‘Records’’ means the records of an agency and Presidential papers or Presidential records, as those terms are defined in title 44, United States Code, including those created or maintained by a government contractor, licensee, certificate holder, or grantee that are subject to the sponsoring agency’s control under the terms of the contract, license, certificate, or grant.

(ii) ‘‘Records having permanent historical value’’ means Presidential papers or Presidential records and the records of an agency that the Archivist has determined should be maintained permanently in accordance with title 44, United States Code.

(jj) ‘‘Records management’’ means the planning, controlling, directing, organizing, training, promoting, and other managerial activities involved with respect to records creation, records maintenance and use, and records disposition in order to achieve adequate and proper documentation of the policies and transactions of the Federal Government and effective and economical management of agency operations.

(kk) ‘‘Safeguarding’’ means measures and controls that are prescribed to protect classified information.

(ll) ‘‘Self-inspection’’ means the internal review and evaluation of individual agency activities and the agency as a whole with respect to the implementation of the program established under this order and its implementing directives.

(mm) ‘‘Senior agency official’’ means the official designated by the agency head under section 5.4(d) of this order to direct and administer the agency’s program under which information is classified, safeguarded, and declassified.

(nn) ‘‘Source document’’ means an existing document that contains classified information that is incorporated, paraphrased, restated, or generated in new form into a new document.

(oo) ‘‘Special access program’’ means a program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.

(pp) ‘‘Systematic declassification review’’ means the review for declassification of classified information contained in records that have been determined by the Archivist to have permanent historical value in accordance with title 44, United States Code.

(qq) ‘‘Telecommunications’’ means the preparation, transmission, or communication of information by electronic means.

(rr) ‘‘Unauthorized disclosure’’ means a communication or physical transfer of classified information to an unauthorized recipient.

(ss) ‘‘U.S. entity’’ includes:

(1) State, local, or tribal governments;

(2) State, local, and tribal law enforcement and firefighting entities;

(3) public health and medical entities;

(4) regional, state, local, and tribal emergency management entities, including State Adjutants General and other appropriate public safety entities; or

(5) private sector entities serving as part of the nation’s Critical Infrastructure/ Key Resources.

(tt) ‘‘Violation’’ means:

(1) any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information;

(2) any knowing, willful, or negligent action to classify or continue the classification of information contrary to the requirements of this order or its implementing directives; or

(3) any knowing, willful, or negligent action to create or continue a special access program contrary to the requirements of this order.

(uu) ‘‘Weapons of mass destruction’’ means any weapon of mass destruction as defined in 50 U.S.C. 1801(p).

 

Sec. 6.2. General Provisions

(a) Nothing in this order shall supersede any requirement made by or under the Atomic Energy Act of 1954, as amended, or the National Security Act of 1947, as amended. ‘‘Restricted Data’’ and ‘‘Formerly Restricted Data’’ shall be handled, protected, classified, downgraded, and declassified in conformity with the provisions of the Atomic Energy Act of 1954, as amended, and regulations issued under that Act.

(b) The Director of National Intelligence may, with respect to the Intelligence Community and after consultation with the heads of affected departments and agencies, issue such policy directives and guidelines as the Director of National Intelligence deems necessary to implement this order with respect to the classification and declassification of all intelligence and intelligence-related information, and for access to and dissemination of all intelligence and intelligence-related information, both in its final form

and in the form when initially gathered. Procedures or other guidance issued by Intelligence Community element heads shall be in accordance with such policy directives or guidelines issued by the Director of National Intelligence. Any such policy directives or guidelines issued by the Director of National Intelligence shall be in accordance with directives issued by the Director of the Information Security Oversight Office under section 5.1(a) of this order.

(c) The Attorney General, upon request by the head of an agency or the Director of the Information Security Oversight Office, shall render an interpretation of this order with respect to any question arising in the course of its administration.

(d) Nothing in this order limits the protection afforded any information by other provisions of law, including the Constitution, Freedom of Information Act exemptions, the Privacy Act of 1974, and the National Security Act of 1947, as amended. This order is not intended to and does not create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person. The foregoing is

in addition to the specific provisos set forth in sections 1.1(b), 3.1(c) and 5.3(e) of this order.

(e) Nothing in this order shall be construed to obligate action or otherwise affect functions by the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.

(f) This order shall be implemented subject to the availability of appropriations.

(g) Executive Order 12958 of April 17, 1995, and amendments thereto, including Executive Order 13292 of March 25, 2003, are hereby revoked as of the effective date of this order.

 

Sec. 6.3. Effective Date.

This order is effective 180 days from the date of this order, except for sections 1.7, 3.3, and 3.7, which are effective immediately.

 

Sec. 6.4. Publication.

The Archivist of the United States shall publish this Executive Order in the Federal Register.

 

-/S/- Barack Obama

THE WHITE HOUSE,
December 29, 2009.

> Back to the Table of Contents <

Ref Book - Homeland Security Act of 2002

Friday, August 03, 2012

Homeland Security Act of 2002

> Back to the Table of Contents <

(Public Law 107-296 of November 25, 2002; 116 STAT. 2135)

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,


Short Title; Table of Contents.

Section 1. [6 U.S.C. §101 note]

(a) Short Title.—This Act may be cited as the “Homeland Security Act of 2002”.

 
(b) Table of Contents.—The table of contents for this Act is as follows:

Sec. 1.          Short title; table of contents.

Sec. 2.          Definitions.

Sec. 3.          Construction; severability.

Sec. 4.          Effective date.

 Title I—Department of Homeland Security

Sec. 101.      Executive department; mission.

Sec. 102.      Secretary; functions.

Sec. 103.      Other officers.

 Title II—Information Analysis and Infrastructure Protection

 Subtitle A—Information and Analysis and Infrastructure Protection; Access to Information

Sec. 201.      Information and Analysis and Infrastructure Protection.

Sec. 202.      Access to information.

Sec. 203.      Homeland Security Advisory System.

Sec. 204.      Homeland security information sharing.

Sec. 205.      Comprehensive information technology network architecture.

Sec. 206.      Coordination with information sharing environment.

Sec. 207.      Intelligence components.

Sec. 208.      Training for employees of intelligence components.

Sec. 209.      Intelligence training development for State and local government officials.

Sec. 210.      Information sharing incentives.

Sec. 210A.    Department of Homeland Security State, Local, and Regional Information Fusion Center Initiative.

Sec. 210B.    Homeland Security Information Sharing Fellows Program.

Sec. 210C.    Rural Policing Institute.

Sec. 210D.    Interagency Threat Assessment and Coordination Group.

Sec. 210E.    National Asset Database.

Sec. 210F.     Classified Information Advisory Officer

 

Subtitle B—Critical Infrastructure Information

Sec. 211.      Short title.

Sec. 212.      Definitions.

Sec. 213.       Designation of critical infrastructure protection program

Sec. 214.      Protection of voluntarily shared critical infrastructure information.

Sec. 215.      No private right of action.

 Subtitle C—Information Security

Sec. 221.      Procedures for sharing information.

Sec. 222.      Privacy Officer.

Sec. 223.      Enhancement of non-Federal cybersecurity.

Sec. 224.      Net guard.

Sec. 225.      Cyber Security Enhancement Act of 2002.

 Subtitle D—Office of Science and Technology

Sec. 231.      Establishment of office; Director.

Sec. 232.      Mission of office; duties.

Sec. 233.      Definition of law enforcement technology.

Sec. 234.      Abolishment of Office of Science and Technology of National Institute of Justice; transfer of functions.

Sec. 235.      National Law Enforcement and Corrections Technology Centers.

Sec. 236.      Coordination with other entities within Department of Justice.

Sec. 237.      Amendments relating to National Institute of Justice.

 Title III—Science and Technology in Support of Homeland Security

Sec. 301.      Under Secretary for Science and Technology.

Sec. 302.      Responsibilities and authorities of the Under Secretary for Science and Technology.

Sec. 303.      Functions transferred.

Sec. 304.      Conduct of certain public health-related activities.

Sec. 305.      Federally funded research and development centers.

Sec. 306.      Miscellaneous provisions.

Sec. 307.      Homeland Security Advanced Research Projects Agency.

Sec. 308.      Conduct of research, development, demonstration, testing and evaluation.

Sec. 309.      Utilization of Department of Energy national laboratories and sites in support of homeland security activities.

Sec. 310.      Transfer of Plum Island Animal Disease Center, Department of Agriculture.

Sec. 311.      Homeland Security Science and Technology Advisory Committee.

Sec. 312.      Homeland Security Institute.

Sec. 313.      Technology clearinghouse to encourage and support innovative solutions to enhance homeland security.

Sec. 314.      Office for Interoperability and Compatibility.

Sec. 315.      Emergency communications interoperability research and development.

Sec. 316.      National Biosurveillance Integration Center.

Sec. 317.      Promoting antiterrorism through international cooperation program.
 

Title IV—Directorate of Border and Transportation Security

 Subtitle A—Under Secretary for Border and Transportation Security

Sec. 401.      Under Secretary for Border and Transportation Security.

Sec. 402.      Responsibilities.

Sec. 403.      Functions transferred.

 Subtitle B—United States Customs Service

Sec. 411.      Establishment; Commissioner of Customs.

Sec. 412.      Retention of customs revenue functions by Secretary of the Treasury.

Sec. 413.      Preservation of customs funds.

Sec. 414.      Separate budget request for customs.

Sec. 415.      Definition.

Sec. 416.      GAO report to Congress.

Sec. 417.      Allocation of resources by the Secretary.

Sec. 418.      Reports to Congress.

Sec. 419.      Customs user fees.

Subtitle C—Miscellaneous Provisions

Sec. 421.      Transfer of certain agricultural inspection functions of the Department of Agriculture.

Sec. 422.      Functions of Administrator of General Services.

Sec. 423.      Functions of Transportation Security Administration.

Sec. 424.      Preservation of Transportation Security Administration as a distinct entity.

Sec. 425.      Explosive detection systems.

Sec. 426.      Transportation security.

Sec. 427.      Coordination of information and information technology.

Sec. 428.      Visa issuance.

Sec. 429.      Information on visa denials required to be entered into electronic data system.

Sec. 430.      Office for Domestic Preparedness.

Sec. 431.      Office of Cargo Security Policy.

 

Subtitle D—Immigration Enforcement Functions

Sec. 441.      Transfer of functions to Under Secretary for Border and Transportation Security.

Sec. 442.      Establishment of Bureau of Border Security.

Sec. 443.      Professional responsibility and quality review.

Sec. 444.      Employee discipline.

Sec. 445.      Report on improving enforcement functions.

Sec. 446.      Sense of Congress regarding construction of fencing near San Diego, California.

 

Subtitle E—Citizenship and Immigration Services

Sec. 451.      Establishment of Bureau of Citizenship and Immigration Services.

Sec. 452.      Citizenship and Immigration Services Ombudsman.

Sec. 453.      Professional responsibility and quality review.

Sec. 454.      Employee discipline.

Sec. 455.      Effective date.

Sec. 456.      Transition.

Sec. 457.      Funding for citizenship and immigration services.

Sec. 458.      Backlog elimination.

Sec. 459.      Report on improving immigration services.

Sec. 460.      Report on responding to fluctuating needs.

Sec. 461.      Application of Internet-based technologies.

Sec. 462.      Children’s affairs.

 

Subtitle F—General Immigration Provisions

Sec. 471.      Abolishment of INS.

Sec. 472.      Voluntary separation incentive payments.

Sec. 473.      Authority to conduct a demonstration project relating to disciplinary action.

Sec. 474.      Sense of Congress.

Sec. 475.      Director of Shared Services.

Sec. 476.      Separation of funding.

Sec. 477.      Reports and implementation plans.

Sec. 478.      Immigration functions.

 

Title V—Emergency Preparedness and Response

Sec. 501.      Definitions.

Sec. 502.      Definition.

Sec. 503.      Federal Emergency Management Agency.

Sec. 504.      Authorities and responsibilities.

Sec. 505.      Functions transferred.

Sec. 506.      Preserving the Federal Emergency Management Agency.

Sec. 507.      Regional Offices.

Sec. 508.      National Advisory Council.

Sec. 509.      National Integration Center.

Sec. 510.      Credentialing and typing.

Sec. 511.      The National Infrastructure Simulation and Analysis Center.

Sec. 512.      Evacuation plans and exercises.

Sec. 513.      Disability Coordinator.

Sec. 514.      Department and Agency officials.

Sec. 515.      National Operations Center.

Sec. 516.      Chief Medical Officer.

Sec. 517.      Nuclear incident response.

Sec. 518.      Conduct of certain public health-related activities.

Sec. 519.      Use of national private sector networks in emergency response.

Sec. 520.      Use of commercially available technology, goods, and services.

Sec. 521.      Procurement of security countermeasures for strategic national stockpile.

Sec. 522.      Model standards and guidelines for critical infrastructure workers.

Sec. 523.      Guidance and recommendations.

Sec. 524.      Voluntary private sector preparedness accreditation and certification program.

Sec. 525.       Acceptance of gifts.

 

Title VI—Treatment of Charitable Trusts for Members of the Armed Forces of the United States and Other Governmental Organizations

Sec. 601.      Treatment of charitable trusts for members of the Armed Forces of the United States and other governmental organizations.

 

Title VII—Management

Sec. 701.      Under Secretary for Management.

Sec. 702.      Chief Financial Officer.

Sec. 703.      Chief Information Officer.

Sec. 704.      Chief Human Capital Officer.

Sec. 705.      Establishment of Officer for Civil Rights and Civil Liberties.

Sec. 706.      Consolidation and co-location of offices.

Sec. 707.      Quadrennial Homeland Security Review.

 

Title VIII—Coordination with Non-Federal Entities; Inspector General; United States Secret Service; Coast Guard; General Provisions

 

Subtitle A—Coordination with Non-Federal Entities

Sec. 801.      Office for State and Local Government Coordination.

 

Subtitle B—Inspector General

Sec. 811.      Authority of the Secretary.

Sec. 812.      Law enforcement powers of Inspector General agents.

 

Subtitle C—United States Secret Service

Sec. 821.      Functions transferred.

 

Subtitle D—Acquisitions

Sec. 831.      Research and development projects.

Sec. 832.      Personal services.

Sec. 833.      Special streamlined acquisition authority.

Sec. 834.      Unsolicited proposals.

Sec. 835.      Prohibition on contracts with corporate expatriates.

 

Subtitle E—Human Resources Management

Sec. 841.      Establishment of Human Resources Management System.

Sec. 842.      Labor-management relations.

Sec. 843.      Use of counternarcotics enforcement activities in certain employee performance appraisals.

Sec. 844.      Homeland Security Rotation Program.

Sec. 845.      Homeland Security Education Program.

 

Subtitle F—Federal Emergency Procurement Flexibility

Sec. 851.      Definition.

Sec. 852.      Procurements for defense against or recovery from terrorism or nuclear, biological, chemical, or radiological attack.

Sec. 853.      Increased simplified acquisition threshold for procurements in support of humanitarian or peacekeeping operations or contingency operations.

Sec. 854.      Increased micro-purchase threshold for certain procurements.

Sec. 855.      Application of certain commercial items authorities to certain procurements.

Sec. 856.      Use of streamlined procedures.

Sec. 857.      Review and report by Comptroller General.

Sec. 858.      Identification of new entrants into the Federal marketplace.

 

Subtitle G—Support Anti-terrorism by

Fostering Effective Technologies Act of 2002

Sec. 861.      Short title.

Sec. 862.      Administration.

Sec. 863.      Litigation management.

Sec. 864.      Risk management.

Sec. 865.      Definitions.

 

Subtitle H—Miscellaneous Provisions

Sec. 871.      Advisory committees.

Sec. 872.       Reorganization.

Sec. 873.      Use of appropriated funds.

Sec. 874.      Future Year Homeland Security Program.

Sec. 875.      Miscellaneous authorities.

Sec. 876.      Military activities.

Sec. 877.      Regulatory authority and preemption.

Sec. 878.      Counternarcotics officer.

Sec. 879.      Office of International Affairs.

Sec. 880.      Prohibition of the Terrorism Information and Prevention System.

Sec. 881.      Review of pay and benefit plans.

Sec. 882.      Office for National Capital Region Coordination.

Sec. 883.      Requirement to comply with laws protecting equal employment opportunity and providing whistleblower protections.

Sec. 884.      Federal Law Enforcement Training Center.

Sec. 885.      Joint Interagency Task Force.

Sec. 886.      Sense of Congress reaffirming the continued importance and applicability of the Posse Comitatus Act.

Sec. 887.      Coordination with the Department of Health and Human Services under the Public Health Service Act.

Sec. 888.      Preserving Coast Guard mission performance.

Sec. 889.      Homeland security funding analysis in President’s budget.

Sec. 890.      Air Transportation Safety and System Stabilization Act.

 

Subtitle I—Information Sharing

Sec. 891.      Short title; findings; and sense of Congress.

Sec. 892.      Facilitating homeland security information sharing procedures.

Sec. 893.      Report.

Sec. 894.      Authorization of appropriations.

Sec. 895.      Authority to share grand jury information.

Sec. 896.      Authority to share electronic, wire, and oral interception information.

Sec. 897.      Foreign intelligence information.

Sec. 898.      Information acquired from an electronic surveillance.

Sec. 899.      Information acquired from a physical search.

 

Subtitle J—Secure Handling of Ammonium Nitrate

Sec. 899A.    Definitions.
Sec. 899B.    Regulation of the sale and transfer of ammonium nitrate.
Sec. 899C.    Inspection and auditing of records.
Sec. 899D.    Administrative provisions.
Sec. 899E.    Theft reporting requirement.
Sec. 899F.     Prohibitions and penalty.
Sec. 899G.    Protection from civil liability.
Sec. 899H.    Preemption of other laws.
Sec. 899I.     Deadlines for regulations.
Sec. 899J.     Authorization of appropriations.



Title IX—National Homeland Security Council

Sec. 901.      National Homeland Security Council.

Sec. 902.      Function.

Sec. 903.      Membership.

Sec. 904.      Other functions and activities.

Sec. 905.      Staff composition.

Sec. 906.      Relation to the National Security Council.

 

Title X—Information Security

Sec. 1001.    Information security.

Sec. 1002.    Management of information technology.

Sec. 1003.    National Institute of Standards and Technology.

Sec. 1004.    Information Security and Privacy Advisory Board.

Sec. 1005.    Technical and conforming amendments.

Sec. 1006.    Construction.

 

Title XI—department of Justice Divisions

 

Subtitle A—Executive Office for Immigration Review

Sec. 1101.    Legal status of EOIR.

Sec. 1102.    Authorities of the Attorney General.

Sec. 1103.    Statutory construction.

 

Subtitle B—Transfer of the Bureau of Alcohol,

Tobacco and Firearms to the Department of Justice

Sec. 1111.    Bureau of Alcohol, Tobacco, Firearms, and Explosives.

Sec. 1112.    Technical and conforming amendments.

Sec. 1113.    Powers of agents of the Bureau of Alcohol, Tobacco, Firearms, and Explosives.

Sec. 1114.    Explosives training and research facility.

Sec. 1115.    Personnel management demonstration project.

 

Subtitle C—Explosives

Sec. 1121.    Short title.

Sec. 1122.    Permits for purchasers of explosives.

Sec. 1123.    Persons prohibited from receiving or possessing explosive materials.

Sec. 1124.    Requirement to provide samples of explosive materials and ammonium nitrate.

Sec. 1125.    Destruction of property of institutions receiving Federal financial assistance.

Sec. 1126.    Relief from disabilities.

Sec. 1127.    Theft reporting requirement.

Sec. 1128.    Authorization of appropriations.

 

Title XII—Airline War Risk Insurance Legislation

Sec. 1201.    Air carrier liability for third party claims arising out of acts of terrorism.

Sec. 1202.    Extension of insurance policies.

Sec. 1203.    Correction of reference.

Sec. 1204.    Report.

 

Title XIII—Federal Workforce Improvement

 

Subtitle A—Chief Human Capital Officers

Sec. 1301.    Short title.

Sec. 1302.    Agency Chief Human Capital Officers.

Sec. 1303.    Chief Human Capital Officers Council.

Sec. 1304.    Strategic human capital management.

Sec. 1305.    Effective date.

 

Subtitle B—Reforms Relating to

Federal Human Capital Management

Sec. 1311.    Inclusion of agency human capital strategic planning in performance plans and programs performance reports.

Sec. 1312.    Reform of the competitive service hiring process.

Sec. 1313.    Permanent extension, revision, and expansion of authorities for use of voluntary separation incentive pay and voluntary early retirement.

Sec. 1314.    Student volunteer transit subsidy.

 

Subtitle C—Reforms Relating to the Senior Executive Service

Sec. 1321.    Repeal of recertification requirements of senior executives.

Sec. 1322.    Adjustment of limitation on total annual compensation.

 

Subtitle D—Academic Training

Sec. 1331.    Academic training.

Sec. 1332.    Modifications to National Security Education Program.

 

Title XIV—Arming Pilots Against Terrorism

Sec. 1401.    Short title.

Sec. 1402.    Federal Flight Deck Officer Program.

Sec. 1403.    Crew training.

Sec. 1404.    Commercial airline security study.

Sec. 1405.    Authority to arm flight deck crew with less-than-lethal weapons.

Sec. 1406.    Technical amendments.

 

Title XV—Transition

 

Subtitle A—Reorganization Plan

Sec. 1501.    Definitions.

Sec. 1502.    Reorganization plan.

Sec. 1503.    Review of congressional committee structures.

 

Subtitle B—Transitional Provisions

Sec. 1511.    Transitional authorities.

Sec. 1512.    Savings provisions.

Sec. 1513.    Terminations.

Sec. 1514.    National identification system not authorized.

Sec. 1515.    Continuity of Inspector General oversight.

Sec. 1516.    Incidental transfers.

Sec. 1517.    Reference.

 

Title XVI—Corrections to Existing Law Relating to

Airline Transportation Security

Sec. 1601.    Retention of security sensitive information authority at Department of Transportation.

Sec. 1602.    Increase in civil penalties.

Sec. 1603.    Allowing United States citizens and United States nationals as screeners.

 

Title XVII—Conforming and Technical Amendments

Sec. 1701.    Inspector General Act of 1978.

Sec. 1702.    Executive Schedule.

Sec. 1703.    United States Secret Service.

Sec. 1704.    Coast Guard.

Sec. 1705.    Strategic national stockpile and smallpox vaccine development.

Sec. 1706.    Transfer of certain security and law enforcement functions and authorities.

Sec. 1707.    Transportation security regulations.

Sec. 1708.    National Bio-Weapons Defense Analysis Center.

Sec. 1709.    Collaboration with the Secretary of Homeland Security.

Sec. 1710.    Railroad safety to include railroad security.

Sec. 1711.    Hazmat safety to include hazmat security.

Sec. 1712.    Office of Science and Technology Policy.

Sec. 1713.    National Oceanographic Partnership Program.

Sec. 1714.    Clarification of definition of manufacturer.

Sec. 1715.    Clarification of definition of vaccine-related injury or death.

Sec. 1716.    Clarification of definition of vaccine.

Sec. 1717.    Effective date.

 

Title XVIII—Emergency Communications

Sec. 1801.    Office for Emergency Communications.

Sec. 1802.    National Emergency Communications Plan.

Sec. 1803.    Assessments and reports.

Sec. 1804.    Coordination of Federal emergency communications grant programs.

Sec. 1805.    Regional emergency communications coordination.

Sec. 1806.    Emergency Communications Preparedness Center.

Sec. 1807.    Urban and other high-risk area communications capabilities.

Sec. 1808.    Definition.

Sec. 1809.    Interoperable Emergency Communications Grant Program.

Sec. 1810.    Border interoperability demonstration project.

 

Title XIX—Domestic Nuclear Detection office

Sec. 1901.     Domestic Nuclear Detection Office.

Sec. 1902.     Mission of Office.

Sec. 1903.     Hiring authority.

Sec. 1904.     Testing authority.

Sec. 1905.     Relationship to other Department entities and Federal agencies.

Sec. 1906.     Contracting and grant making authorities.

Sec. 1907.     Joint annual interagency review of global nuclear detection.

 

Title XX—Homeland Security Grants

Sec. 2001.     Definitions.

 

Subtitle A—Grants to States and High-Risk Urban Areas

Sec. 2002.     Homeland Security Grant Programs.

Sec. 2003.     Urban Area Security Initiative.

Sec. 2004.     State Homeland Security Grant Program.

Sec. 2005.     Grants to directly eligible tribes.

Sec. 2006.     Terrorism prevention.

Sec. 2007.     Prioritization.

Sec. 2008.     Use of funds.

Subtitle B—Grants Administration

Sec. 2021.     Administration and coordination.

Sec. 2022.     Accountability.

Sec. 2023.     Identification of Reporting Redundancies and Development of Performance Metrics.

 

Definitions
 

Sec. 2. [6 U.S.C. §101]

In this Act, the following definitions apply:

(1) Each of the terms “American homeland” and “homeland” means the United States.

(2) The term “appropriate congressional committee” means any committee of the House of Representatives or the Senate having legislative or oversight jurisdiction under the Rules of the House of Representatives or the Senate, respectively, over the matter concerned.

(3) The term “assets” includes contracts, facilities, property, records, unobligated or unexpended balances of appropriations, and other funds or resources(other than personnel).

(4) The term “critical infrastructure” has the meaning given that term in section 1016(e) of Public Law 107-56(42 U.S.C. §5195c(e)).

(5) The term “Department” means the Department of Homeland Security.

(6) The term “emergency response providers” includes Federal, State, and local governmental and nongovernmental emergency public safety, fire, law enforcement, emergency response, emergency medical(including hospital emergency facilities), and related personnel, agencies, and authorities.

(7) The term “executive agency” means an executive agency and a military department, as defined, respectively, in sections 105 and 102 of title 5, United States Code.

(8) The term “functions” includes authorities, powers, rights, privileges, immunities, programs, projects, activities, duties, and responsibilities.

(9) The term “intelligence component of the Department: means any element or entity of the Department that collects, gathers, processes, analyzes, produces, or disseminates intelligence information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, or national intelligence, as defined under section 3(5) of the National Security Act of 1947 (50 U.S.C. §401a(5)), except—

(A) the United States Secret Service; and

(B) the Coast Guard, when operating under the direct authority of the Secretary of Defense or Secretary of the Navy pursuant to section 3 of title 14, United States Code, except that nothing in this paragraph shall affect or diminish the authority and responsibilities of the Commandant of the Coast Guard to command or control the Coast Guard as an armed force or the authority of the Director of National Intelligence with respect to the Coast Guard as an element of the intelligence community (as defined under section 3(4) of the National Security Act of 1947 (50 U.S.C. §401a(4)).

(10) The term “key resources” means publicly or privately controlled resources essential to the minimal operations of the economy and government.

(11) The term “local government” means—

(A) a county, municipality, city, town, township, local public authority, school district, special district, intrastate district, council of governments(regardless of whether the council of governments is incorporated as a nonprofit corporation under State law), regional or interstate government entity, or agency or instrumentality of a local government;

(B) an Indian tribe or authorized tribal organization, or in Alaska a Native village or Alaska Regional Native Corporation; and

(C) a rural community, unincorporated town or village, or other public entity.

(12) The term “major disaster” has the meaning given in section 102(2) of the Robert T. Stafford Disaster Relief and Emergency Assistance Act(42 U.S.C. §5122).

(13) The term “personnel” means officers and employees.

(14) The term “Secretary” means the Secretary of Homeland Security.

(15) The term “State” means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, the Virgin Islands, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and any possession of the United States.

(16) The term “terrorism” means any activity that—

(A) involves an act that—

(i) is dangerous to human life or potentially destructive of critical infrastructure or key resources; and

(ii) is a violation of the criminal laws of the United States or of any State or other subdivision of the United States; and

(B) appears to be intended—

(i) to intimidate or coerce a civilian population;

(ii) to influence the policy of a government by intimidation or coercion; or

(iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping.

(17)(A) The term “United States”, when used in a geographic sense, means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, the Virgin Islands, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, any possession of the United States, and any waters within the jurisdiction of the United States.

(B) Nothing in this paragraph or any other provision of this Act shall be construed to modify the definition of “United States” for the purposes of the Immigration and Nationality Act or any other immigration or nationality law.

(18) The term “voluntary preparedness standards” means a common set of criteria for preparedness, disaster management, emergency management, and business continuity programs, such as the American National Standards Institute’s National Fire Protection Association Standard on Disaster/Emergency Management and Business Continuity Programs (ANSI/NFPA 1600).
 

 
TITLE I—DEPARTMENT OF HOMELAND SECURITY

 
Executive Department; Mission
 

Sec. 101. [6 U.S.C. §111]

(a) Establishment.—There is established a Department of Homeland Security, as an executive department of the United States within the meaning of title 5, United States Code.

(b) Mission.—

(1) In General.—The primary mission of the Department is to—

(A) prevent terrorist attacks within the United States;

(B) reduce the vulnerability of the United States to terrorism;

(C) minimize the damage, and assist in the recovery, from terrorist attacks that do occur within the United States;

(D) carry out all functions of entities transferred to the Department, including by acting as a focal point regarding natural and manmade crises and emergency planning;

(E) ensure that the functions of the agencies and subdivisions within the Department that are not related directly to securing the homeland are not diminished or neglected except by a specific explicit Act of Congress;

(F) ensure that the overall economic security of the United States is not diminished by efforts, activities, and programs aimed at securing the homeland;

(G) monitor connections between illegal drug trafficking and terrorism, coordinate efforts to sever such connections, and otherwise contribute to efforts to interdict illegal drug trafficking; and

(H) monitor connections between illegal drug trafficking and terrorism, coordinate efforts to sever such connections, and otherwise contribute to efforts to interdict illegal drug trafficking.

(2) Responsibility for investigating and prosecuting terrorism.—Except as specifically provided by law with respect to entities transferred to the Department under this Act, primary responsibility for investigating and prosecuting acts of terrorism shall be vested not in the Department, but rather in Federal, State, and local law enforcement agencies with jurisdiction over the acts in question.

  
Secretary; Functions
 

Sec. 102. [6 U.S.C. §112]

(a) Secretary.—

(1) In general.—There is a Secretary of Homeland Security, appointed by the President, by and with the advice and consent of the Senate.

(2) Head of department.—The Secretary is the head of the Department and shall have direction, authority, and control over it.

(3) Functions vested in secretary.—All functions of all officers, employees, and organizational units of the Department are vested in the Secretary.

(b) Functions.—The Secretary—

(1) except as otherwise provided by this Act, may delegate any of the Secretary’s functions to any officer, employee, or organizational unit of the Department;

(2) shall have the authority to make contracts, grants, and cooperative agreements, and to enter into agreements with other executive agencies, as may be necessary and proper to carry out the Secretary’s responsibilities under this Act or otherwise provided by law; and

(3) shall take reasonable steps to ensure that information systems and databases of the Department are compatible with each other and with appropriate databases of other Departments.

(c) Coordination with Non-Federal Entities.—With respect to homeland security, the Secretary shall coordinate through the Office of State and Local Coordination(established under section 801)(including the provision of training and equipment) with State and local government personnel, agencies, and authorities, with the private sector, and with other entities, including by:

(1) coordinating with State and local government personnel, agencies, and authorities, and with the private sector, to ensure adequate planning, equipment, training, and exercise activities;

(2) coordinating and, as appropriate, consolidating, the Federal Government’s communications and systems of communications relating to homeland security with State and local government personnel, agencies, and authorities, the private sector, other entities, and the public; and

(3) distributing or, as appropriate, coordinating the distribution of, warnings and information to State and local government personnel, agencies, and authorities and to the public.

(d) Meetings of National Security Council.—The Secretary may, subject to the direction of the President, attend and participate in meetings of the National Security Council.

(e) Issuance of Regulations.—The issuance of regulations by the Secretary shall be governed by the provisions of chapter 5 of title 5, United States Code, except as specifically provided in this Act, in laws granting regulatory authorities that are transferred by this Act, and in laws enacted after the date of enactment of this Act.

(f) Special Assistant to the Secretary.—The Secretary shall appoint a Special Assistant to the Secretary who shall be responsible for—

(1) creating and fostering strategic communications with the private sector to enhance the primary mission of the Department to protect the American homeland;

(2) advising the Secretary on the impact of the Department’s policies, regulations, processes, and actions on the private sector;

(3) interfacing with other relevant Federal agencies with homeland security missions to assess the impact of these agencies’ actions on the private sector;

(4) creating and managing private sector advisory councils composed of representatives of industries and associations designated by the Secretary to—

(A) advise the Secretary on private sector products, applications, and solutions as they relate to homeland security challenges;

(B) advise the Secretary on homeland security policies, regulations, processes, and actions that affect the participating industries and associations; and

(C) advise the Secretary on private sector preparedness issues, including effective methods for—

(i) promoting voluntary preparedness standards to the private sector; and

(ii) assisting the private sector in adopting voluntary preparedness standards;

(5) working with Federal laboratories, federally funded research and development centers, other federally funded organizations, academia, and the private sector to develop innovative approaches to address homeland security challenges to produce and deploy the best available technologies for homeland security missions;

(6) promoting existing public-private partnerships and developing new public-private partnerships to provide for collaboration and mutual support to address homeland security challenges;

(7) assisting in the development and promotion of private sector best practices to secure critical infrastructure;

(8) providing information to the private sector regarding voluntary preparedness standards and the business justification for preparedness and promoting to the private sector the adoption of voluntary preparedness standards;

(9) coordinating industry efforts, with respect to functions of the Department of Homeland Security, to identify private sector resources and capabilities that could be effective in supplementing Federal, State, and local government agency efforts to prevent or respond to a terrorist attack;

(10) coordinating with the Directorate of Border and Transportation Security and the Assistant Secretary for Trade Development of the Department of Commerce on issues related to the travel and tourism industries; and

(11) consulting with the Office of State and Local Government Coordination and Preparedness on all matters of concern to the private sector, including the tourism industry.

(g) Standards Policy.—All standards activities of the Department shall be conducted in accordance with section 12(d) of the National Technology Transfer Advancement Act of 1995(15 U.S.C. §272 note) and Office of Management and Budget Circular A-119.

 
Other Officers
 

Sec. 103. [6 U.S.C. §113]

(a) Deputy Secretary; Under Secretaries.—There are the following officers, appointed by the President, by and with the advice and consent of the Senate:

(1) A Deputy Secretary of Homeland Security, who shall be the Secretary’s first assistant for purposes of subchapter III of chapter 33 of title 5, United States Code.

(2) An Under Secretary for Science and Technology.

(3) An Under Secretary for Border and Transportation Security.

(4) An Administrator of the Federal Emergency Management Agency

(5) A Director of the Bureau of Citizenship and Immigration Services.

(6) An Under Secretary for Management.

(7) A Director of the Office of Counternarcotics Enforcement .

(8) An Under Secretary responsible for overseeing critical infrastructure protection, cybersecurity, and other related programs of the Department.

(9) Not more than 12 Assistant Secretaries.

(10) A General Counsel, who shall be the chief legal officer of the Department.

(b) Inspector General.—There shall be in the Department an Office of Inspector General and an Inspector General at the head of such office, as provided in the Inspector General Act of 1978(5 U.S.C. App.).

(c) Commandant of the Coast Guard.—To assist the Secretary in the performance of the Secretary’s functions, there is a Commandant of the Coast Guard, who shall be appointed as provided in section 44 of title 14, United States Code, and who shall report directly to the Secretary. In addition to such duties as may be provided in this Act and as assigned to the Commandant by the Secretary, the duties of the Commandant shall include those required by section 2 of title 14, United States Code.

 (d) Other Officers.—To assist the Secretary in the performance of the Secretary’s functions, there are the following officers, appointed by the President:

(1) A Director of the Secret Service.

(2) A Chief Information Officer.

(3) An Officer for Civil Rights and Civil Liberties.

(4) A Director for Domestic Nuclear Detection

(e) Chief Financial Officer.  There shall be in the Department a Chief Financial Officer, as provided in chapter 9 of title 31, United States Code [31 U.S.C. §§901 et seq,].

(f) Performance of Specific Functions.—Subject to the provisions of this Act, every officer of the Department shall perform the functions specified by law for the official’s office or prescribed by the Secretary.

 
TITLE II—INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION

 
Subtitle A—Information and Analysis and Infrastructure Protection; Access to Information

 
Information and Analysis and Infrastructure Protection; Access to Information
 

Sec. 201. [6 U.S.C. §121]

(a) Intelligence and Analysis and Infrastructure Protection.—There shall be in the Department an Office of Intelligence and Analysis and an Office of Infrastructure Protection.

(b) Under Secretary for Intelligence and Analysis and Assistant Secretary for Infrastructure Protection—

(1) Office of Intelligence and Analysis.—The Office of Intelligence and Analysis shall be headed by an Under Secretary for Intelligence and Analysis, who shall be appointed by the President, by and with the advice and consent of the Senate.

(2) Chief Intelligence Officer.—The Under Secretary for Intelligence and Analysis shall serve as the Chief Intelligence Officer of the Department.

(3) Office of Infrastructure Protection.—The Office of Infrastructure Protection shall be headed by an Assistant Secretary for Infrastructure Protection, who shall be appointed by the President.

(c) Discharge of Responsibilities.—The Secretary shall ensure that the responsibilities of the Department relating to information analysis and infrastructure protection, including those described in subsection (d), are carried out through the Under Secretary for Intelligence and Analysis or the Assistant Secretary for Infrastructure Protection, as appropriate.

(d) Responsibilities of Secretary Relating to Intelligence and Analysis and Infrastructure Protection.—The responsibilities of the Secretary relating to intelligence analysis and infrastructure protection shall be as follows:

(1) To access, receive, and analyze law enforcement information, intelligence information, and other information from agencies of the Federal Government, State and local government agencies(including law enforcement agencies), and private sector entities, and to integrate such information, in support of the mission responsibilities of the Department and the functions of the National Counterterrorism Center established under section 119 of the National Security Act of 1947 ( 50 U.S.C. §404o), in order to—

(A) identify and assess the nature and scope of terrorist threats to the homeland;

(B) detect and identify threats of terrorism against the United States; and

(C) understand such threats in light of actual and potential vulnerabilities of the homeland.

(2) To carry out comprehensive assessments of the vulnerabilities of the key resources and critical infrastructure of the United States, including the performance of risk assessments to determine the risks posed by particular types of terrorist attacks within the United States(including an assessment of the probability of success of such attacks and the feasibility and potential efficacy of various countermeasures to such attacks).

(3) To integrate relevant information, analyses, and vulnerability assessments(whether such information, analyses, or assessments are provided or produced by the Department or others) in order to identify priorities for protective and support measures by the Department, other agencies of the Federal Government, State and local government agencies and authorities, the private sector, and other entities.

(4) To ensure, pursuant to section 202, the timely and efficient access by the Department to all information necessary to discharge the responsibilities under this section, including obtaining such information from other agencies of the Federal Government.

(5) To develop a comprehensive national plan for securing the key resources and critical infrastructure of the United States, including power production, generation, and distribution systems, information technology and telecommunications systems(including satellites), electronic financial and property record storage and transmission systems, emergency preparedness communications systems, and the physical and technological assets that support such systems.

(6) To recommend measures necessary to protect the key resources and critical infrastructure of the United States in coordination with other agencies of the Federal Government and in cooperation with State and local government agencies and authorities, the private sector, and other entities.

(7) To review, analyze, and make recommendations for improvements to the policies and procedures governing the sharing of information within the scope of the information sharing environment established under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485), including homeland security information, terrorism information, and weapons of mass destruction information, and any policies, guidelines, procedures, instructions, or standards established under that section.

(8) To disseminate, as appropriate, information analyzed by the Department within the Department, to other agencies of the Federal Government with responsibilities relating to homeland security, and to agencies of State and local governments and private sector entities with such responsibilities in order to assist in the deterrence, prevention, preemption of, or response to, terrorist attacks against the United States.

(9) To consult with the Director of National Intelligence and other appropriate intelligence, law enforcement, or other elements of the Federal Government to establish collection priorities and strategies for information, including law enforcement-related information, relating to threats of terrorism against the United States through such means as the representation of the Department in discussions regarding requirements and priorities in the collection of such information.

(10) To consult with State and local governments and private sector entities to ensure appropriate exchanges of information, including law enforcement-related information, relating to threats of terrorism against the United States.

(11) To ensure that—

(A) any material received pursuant to this Act is protected from unauthorized disclosure and handled and used only for the performance of official duties; and

(B) any intelligence information under this Act is shared, retained, and disseminated consistent with the authority of the Director of National Intelligence to protect intelligence sources and methods under the National Security Act of 1947(50 U.S.C. §401 et seq.) and related procedures and, as appropriate, similar authorities of the Attorney General concerning sensitive law enforcement information.

(12) To request additional information from other agencies of the Federal Government, State and local government agencies, and the private sector relating to threats of terrorism in the United States, or relating to other areas of responsibility assigned by the Secretary, including the entry into cooperative agreements through the Secretary to obtain such information.

(13) To establish and utilize, in conjunction with the chief information officer of the Department, a secure communications and information technology infrastructure, including data-mining and other advanced analytical tools, in order to access, receive, and analyze data and information in furtherance of the responsibilities under this section, and to disseminate information acquired and analyzed by the Department, as appropriate.

(14) To ensure, in conjunction with the chief information officer of the Department, that any information databases and analytical tools developed or utilized by the Department—

(A) are compatible with one another and with relevant information databases of other agencies of the Federal Government; and

(B) treat information in such databases in a manner that complies with applicable Federal law on privacy.

(15) To coordinate training and other support to the elements and personnel of the Department, other agencies of the Federal Government, and State and local governments that provide information to the Department, or are consumers of information provided by the Department, in order to facilitate the identification and sharing of information revealed in their ordinary duties and the optimal utilization of information received from the Department.

(16) To coordinate with elements of the intelligence community and with Federal, State, and local law enforcement agencies, and the private sector, as appropriate.

(17) To provide intelligence and information analysis and support to other elements of the Department.

(18) To coordinate and enhance integration among the intelligence components of the Department, including through strategic oversight of the intelligence activities of such components.

(19) To establish the intelligence collection, processing, analysis, and dissemination priorities, policies, processes, standards, guidelines, and procedures for the intelligence components of the Department, consistent with any directions from the President and, as applicable, the Director of National Intelligence.

(20) To establish a structure and process to support the missions and goals of the intelligence components of the Department.

(21) To ensure that, whenever possible, the Department—

(A) produces and disseminates unclassified reports and analytic products based on open-source information; and

(B) produces and disseminates such reports and analytic products contemporaneously with reports or analytic products concerning the same or similar information that the Department produced and disseminated in a classified format.

(22) To establish within the Office of Intelligence and Analysis an internal continuity of operations plan.

(23) Based on intelligence priorities set by the President, and guidance from the Secretary and, as appropriate, the Director of National Intelligence—

(A) to provide to the heads of each intelligence component of the Department guidance for developing the budget pertaining to the activities of such component; and

(B) to present to the Secretary a recommendation for a consolidated budget for the intelligence components of the Department, together with any comments from the heads of such components.

(24) To perform such other duties relating to such responsibilities as the Secretary may provide.

(25) To prepare and submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security in the House of Representatives, and to other appropriate congressional committees having jurisdiction over the critical infrastructure or key resources, for each sector identified in the National Infrastructure Protection Plan, a report on the comprehensive assessments carried out by the Secretary of the critical infrastructure and key resources of the United States, evaluating threat, vulnerability, and consequence, as required under this subsection. Each such report—

(A) shall contain, if applicable, actions or countermeasures recommended or taken by the Secretary or the head of another Federal agency to address issues identified in the assessments;

(B) shall be required for fiscal year 2007 and each subsequent fiscal year and shall be submitted not later than 35 days after the last day of the fiscal year covered by the report; and

(C) may be classified.

(e) Staff.—

(1) In General.—The Secretary shall provide the Office of Intelligence and Analysis and Office of Infrastructure Protection with a staff of analysts having appropriate expertise and experience to assist the such offices in discharging responsibilities under this section.

(2) Private Sector Analysts.—Analysts under this subsection may include analysts from the private sector.

(3) Security Clearances.—Analysts under this subsection shall possess security clearances appropriate for their work under this section.

(f) Detail of Personnel.—

(1) In General.—In order to assist the Office of Intelligence and Analysis and Office of Infrastructure Protection in discharging responsibilities under this section, personnel of the agencies referred to in paragraph(2) may be detailed to the Department for the performance of analytic functions and related duties.

(2) Covered Agencies.—The agencies referred to in this paragraph are as follows:

(A) The Department of State.

(B) The Central Intelligence Agency.

(C) The Federal Bureau of Investigation.

(D) The National Security Agency.

(E) The National Geospatial-Intelligence Agency.

(F) The Defense Intelligence Agency.

(G) Any other agency of the Federal Government that the President considers appropriate.

(3) Cooperative Agreements.—The Secretary and the head of the agency concerned may enter into cooperative agreements for the purpose of detailing personnel under this subsection.

(4) Basis.—The detail of personnel under this subsection may be on a reimbursable or non-reimbursable basis.

(g) Functions Transferred.—In accordance with title XV, there shall be transferred to the Secretary, for assignment to the U Office of Intelligence and Analysis and Office of Infrastructure Protection under this section, the functions, personnel, assets, and liabilities of the following:

(1) The National Infrastructure Protection Center of the Federal Bureau of Investigation(other than the Computer Investigations and Operations Section), including the functions of the Attorney General relating thereto.

(2) The National Communications System of the Department of Defense, including the functions of the Secretary of Defense relating thereto.

(3) The Critical Infrastructure Assurance Office of the Department of Commerce, including the functions of the Secretary of Commerce relating thereto.

(4) The National Infrastructure Simulation and Analysis Center of the Department of Energy and the energy security and assurance program and activities of the Department, including the functions of the Secretary of Energy relating thereto.

(5) The Federal Computer Incident Response Center of the General Services Administration, including the functions of the Administrator of General Services relating thereto.

(h) Inclusion of Certain Elements of the Department as Elements of the Intelligence Community.—Section 3(4) of the National Security Act of 1947(50 U.S.C. §401(a)) is amended—

(1) by striking “and” at the end of subparagraph(I);

(2) by redesignating subparagraph(J) as subparagraph(K); and

(3) by inserting after subparagraph(I) the following new subparagraph:

“(J) the elements of the Department of Homeland Security concerned with the analyses of foreign intelligence information; and”.

 
Access to Information

 
Sec. 202. [6 U.S.C. §122]

(a) In General.—

(1) Threat and Vulnerability Information.—Except as otherwise directed by the President, the Secretary shall have such access as the Secretary considers necessary to all information, including reports, assessments, analyses, and unevaluated intelligence relating to threats of terrorism against the United States and to other areas of responsibility assigned by the Secretary, and to all information concerning infrastructure or other vulnerabilities of the United States to terrorism, whether or not such information has been analyzed, that may be collected, possessed, or prepared by any agency of the Federal Government.

(2) Other Information.—The Secretary shall also have access to other information relating to matters under the responsibility of the Secretary that may be collected, possessed, or prepared by an agency of the Federal Government as the President may further provide.

(b) Manner of Access.—Except as otherwise directed by the President, with respect to information to which the Secretary has access pursuant to this section—

(1) the Secretary may obtain such material upon request, and may enter into cooperative arrangements with other executive agencies to provide such material or provide Department officials with access to it on a regular or routine basis, including requests or arrangements involving broad categories of material, access to electronic databases, or both; and

(2) regardless of whether the Secretary has made any request or entered into any cooperative arrangement pursuant to paragraph(1), all agencies of the Federal Government shall promptly provide to the Secretary—

(A) all reports(including information reports containing intelligence which has not been fully evaluated), assessments, and analytical information relating to threats of terrorism against the United States and to other areas of responsibility assigned by the Secretary;

(B) all information concerning the vulnerability of the infrastructure of the United States, or other vulnerabilities of the United States, to terrorism, whether or not such information has been analyzed;

(C) all other information relating to significant and credible threats of terrorism against the United States, whether or not such information has been analyzed; and

(D) such other information or material as the President may direct.

(c) Treatment Under Certain Laws.—The Secretary shall be deemed to be a Federal law enforcement, intelligence, protective, national defense, immigration, or national security official, and shall be provided with all information from law enforcement agencies that is required to be given to the Director of Central Intelligence, under any provision of the following:

(1) The USA PATRIOT Act of 2001(Public Law 107-56).

(2) Section 2517(6) of title 18, United States Code.

(3) Rule 6(e)(3)(C) of the Federal Rules of Criminal Procedure.

(d) Access to Intelligence and Other Information.—

(1) Access by Elements of Federal Government.—Nothing in this title shall preclude any element of the intelligence community(as that term is defined in section 3(4) of the National Security Act of 1947(50 U.S.C. §401a(4)), or any other element of the Federal Government with responsibility for analyzing terrorist threat information, from receiving any intelligence or other information relating to terrorism.

(2) Sharing of Information.—The Secretary, in consultation with the Director of Central Intelligence, shall work to ensure that intelligence or other information relating to terrorism to which the Department has access is appropriately shared with the elements of the Federal Government referred to in paragraph(1), as well as with State and local governments, as appropriate.

(3) To integrate relevant information, analysis, and vulnerability assessments (regardless of whether such information, analysis or assessments are provided by or produced by the Department) in order to—

(A) identify priorities for protective and support measures regarding terrorist and other threats to homeland security by the Department, other agencies of the Federal Government, State, and local government agencies and authorities, the private sector, and other entities; and

 

(B) prepare finished intelligence and information products in both classified and unclassified formats, as appropriate, whenever reasonably expected to be of benefit to a State, local, or tribal government (including a State, local, or tribal law enforcement agency) or a private sector entity.
 

Homeland Security Advisory System
 

Sec. 203. [6 U.S.C. §124]

(a) Requirement.—The Secretary shall administer the Homeland Security Advisory System in accordance with this section to provide advisories or warnings regarding the threat or risk that acts of terrorism will be committed on the homeland to Federal, State, local, and tribal government authorities and to the people of the United States, as appropriate. The Secretary shall exercise primary responsibility for providing such advisories or warnings.

(b) Required Elements.—In administering the Homeland Security Advisory System, the Secretary shall—

(1) establish criteria for the issuance and revocation of such advisories or warnings;

(2) develop a methodology, relying on the criteria established under paragraph (1), for the issuance and revocation of such advisories or warnings;

(3) provide, in each such advisory or warning, specific information and advice regarding appropriate protective measures and countermeasures that may be taken in response to the threat or risk, at the maximum level of detail practicable to enable individuals, government entities, emergency response providers, and the private sector to act appropriately;

(4) whenever possible, limit the scope of each such advisory or warning to a specific region, locality, or economic sector believed to be under threat or at risk; and

(5) not, in issuing any advisory or warning, use color designations as the exclusive means of specifying homeland security threat conditions that are the subject of the advisory or warning.

 
Homeland Security Information Sharing

 
Sec. 204. [6 U.S.C. §124A]

(a) Information Sharing.—Consistent with section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485), the Secretary, acting through the Under Secretary for Intelligence and Analysis, shall integrate the information and standardize the format of the products of the intelligence components of the Department containing homeland security information, terrorism information, weapons of mass destruction information, or national intelligence (as defined in section 3(5) of the National Security Act of 1947 (50 U.S.C. §401a(5))) except for any internal security protocols or personnel information of such intelligence components, or other administrative processes that are administered by any chief security officer of the Department.

(b) Information Sharing and Knowledge Management Officers.—For each intelligence component of the Department, the Secretary shall designate an information sharing and knowledge management officer who shall report to the Under Secretary for Intelligence and Analysis regarding coordinating the different systems used in the Department to gather and disseminate homeland security information or national intelligence (as defined in section 3(5) of the National Security Act of 1947 (50 U.S.C. §401a(5))).

(c) State, Local, and Private-Sector Sources of Information—

(1) Establishment of Business Processes.—The Secretary, acting through the Under Secretary for Intelligence and Analysis or the Assistant Secretary for Infrastructure Protection, as appropriate, shall—

(A) establish Department-wide procedures for the review and analysis of information provided by State, local, and tribal governments and the private sector;

(B) as appropriate, integrate such information into the information gathered by the Department and other departments and agencies of the Federal Government; and

(C) make available such information, as appropriate, within the Department and to other departments and agencies of the Federal Government.

(2) Feedback.—The Secretary shall develop mechanisms to provide feedback regarding the analysis and utility of information provided by any entity of State, local, or tribal government or the private sector that provides such information to the Department.

(d) Training and Evaluation of Employees—

(1) Training.—The Secretary, acting through the Under Secretary for Intelligence and Analysis or the Assistant Secretary for Infrastructure Protection, as appropriate, shall provide to employees of the Department opportunities for training and education to develop an understanding of—

(A) the definitions of homeland security information and national intelligence (as defined in section 3(5) of the National Security Act of 1947 (50 U.S.C. §401a(5))); and

(B) how information available to such employees as part of their duties—

(i) might qualify as homeland security information or national intelligence; and

(ii) might be relevant to the Office of Intelligence and Analysis and the intelligence components of the Department.

(2) Evaluations.—The Under Secretary for Intelligence and Analysis shall—

(A) on an ongoing basis, evaluate how employees of the Office of Intelligence and Analysis and the intelligence components of the Department are utilizing homeland security information or national intelligence, sharing information within the Department, as described in this title, and participating in the information sharing environment established under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485); and

(B) provide to the appropriate component heads regular reports regarding the evaluations under subparagraph (A).

 
Comprehensive Information Technology Network Architecture
 

Sec. 205. [6 U.S.C. §124B]

(a) Establishment.—The Secretary, acting through the Under Secretary for Intelligence and Analysis, shall establish, consistent with the policies and procedures developed under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485), and consistent with the enterprise architecture of the Department, a comprehensive information technology network architecture for the Office of Intelligence and Analysis that connects the various databases and related information technology assets of the Office of Intelligence and Analysis and the intelligence components of the Department in order to promote internal information sharing among the intelligence and other personnel of the Department.

(b) Comprehensive Information Technology Network Architecture Defined.—The term “comprehensive information technology network architecture” means an integrated framework for evolving or maintaining existing information technology and acquiring new information technology to achieve the strategic management and information resources management goals of the Office of Intelligence and Analysis.

 
Coordination with Information Sharing Environment

Sec. 206. [6 U.S.C. §124C]

(a) Guidance.—All activities to comply with sections 203, 204, and 205 shall be—

(1) consistent with any policies, guidelines, procedures, instructions, or standards established under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485);

(2) implemented in coordination with, as appropriate, the program manager for the information sharing environment established under that section;

(3) consistent with any applicable guidance issued by the Director of National Intelligence; and

(4) consistent with any applicable guidance issued by the Secretary relating to the protection of law enforcement information or proprietary information.

(b) Consultation.—In carrying out the duties and responsibilities under this subtitle, the Under Secretary for Intelligence and Analysis shall take into account the views of the heads of the intelligence components of the Department.

 
Intelligence Components
 

Sec. 207. [6 U.S.C. §124D]

Subject to the direction and control of the Secretary, and consistent with any applicable guidance issued by the Director of National Intelligence, the responsibilities of the head of each intelligence component of the Department are as follows:

(1) To ensure that the collection, processing, analysis, and dissemination of information within the scope of the information sharing environment, including homeland security information, terrorism information, weapons of mass destruction information, and national intelligence (as defined in section 3(5) of the National Security Act of 1947 (50 U.S.C. §401a(5))), are carried out effectively and efficiently in support of the intelligence mission of the Department, as led by the Under Secretary for Intelligence and Analysis.

(2) To otherwise support and implement the intelligence mission of the Department, as led by the Under Secretary for Intelligence and Analysis.

(3) To incorporate the input of the Under Secretary for Intelligence and Analysis with respect to performance appraisals, bonus or award recommendations, pay adjustments, and other forms of commendation.

(4) To coordinate with the Under Secretary for Intelligence and Analysis in developing policies and requirements for the recruitment and selection of intelligence officials of the intelligence component.

(5) To advise and coordinate with the Under Secretary for Intelligence and Analysis on any plan to reorganize or restructure the intelligence component that would, if implemented, result in realignments of intelligence functions.

(6) To ensure that employees of the intelligence component have knowledge of, and comply with, the programs and policies established by the Under Secretary for Intelligence and Analysis and other appropriate officials of the Department and that such employees comply with all applicable laws and regulations.

(7) To perform such other activities relating to such responsibilities as the Secretary may provide.

 
Training for Employees of Intelligence Components

 
Sec. 208. [6 U.S.C. §124E]

The Secretary shall provide training and guidance for employees, officials, and senior executives of the intelligence components of the Department to develop knowledge of laws, regulations, operations, policies, procedures, and programs that are related to the functions of the Department relating to the collection, processing, analysis, and dissemination of information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, or national intelligence (as defined in section 3(5) of the National Security Act of 1947 (50 U.S.C. §401a(5))).
 

Intelligence Training Development for State and Local Government Officials
 

Sec. 209. [6 U.S.C. §124F]

(a) Curriculum.—The Secretary, acting through the Under Secretary for Intelligence and Analysis, shall—

(1) develop a curriculum for training State, local, and tribal government officials, including law enforcement officers, intelligence analysts, and other emergency response providers, in the intelligence cycle and Federal laws, practices, and regulations regarding the development, handling, and review of intelligence and other information; and

(2) ensure that the curriculum includes executive level training for senior level State, local, and tribal law enforcement officers, intelligence analysts, and other emergency response providers.

(b) Training.—To the extent possible, the Federal Law Enforcement Training Center and other existing Federal entities with the capacity and expertise to train State, local, and tribal government officials based on the curriculum developed under subsection (a) shall be used to carry out the training programs created under this section. If such entities do not have the capacity, resources, or capabilities to conduct such training, the Secretary may approve another entity to conduct such training.

(c) Consultation.—In carrying out the duties described in subsection (a), the Under Secretary for Intelligence and Analysis shall consult with the Director of the Federal Law Enforcement Training Center, the Attorney General, the Director of National Intelligence, the Administrator of the Federal Emergency Management Agency, and other appropriate parties, such as private industry, institutions of higher education, nonprofit institutions, and other intelligence agencies of the Federal Government.

 
Information Sharing Incentives
 

Sec. 210. [6 U.S.C. §124G]

(a) Awards.—In making cash awards under chapter 45 of title 5, United States Code, the President or the head of an agency, in consultation with the program manager designated under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485), may consider the success of an employee in appropriately sharing information within the scope of the information sharing environment established under that section, including homeland security information, terrorism information, and weapons of mass destruction information, or national intelligence (as defined in section 3(5) of the National Security Act of 1947 (50 U.S.C. §401a(5)), in a manner consistent with any policies, guidelines, procedures, instructions, or standards established by the President or, as appropriate, the program manager of that environment for the implementation and management of that environment.

(b) Other Incentives.—The head of each department or agency described in section 1016(i) of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485(i)), in consultation with the program manager designated under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485), shall adopt best practices regarding effective ways to educate and motivate officers and employees of the Federal Government to participate fully in the information sharing environment, including—

(1) promotions and other nonmonetary awards; and

(2) publicizing information sharing accomplishments by individual employees and, where appropriate, the tangible end benefits that resulted.

 
Department of Homeland Security State, Local, and Regional Fusion Center Initiative

 
Sec. 210A. [6 U.S.C. §124H]

(a) Establishment.—The Secretary, in consultation with the program manager of the information sharing environment established under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485), the Attorney General, the Privacy Officer of the Department, the Officer for Civil Rights and Civil Liberties of the Department, and the Privacy and Civil Liberties Oversight Board established under section 1061 of the Intelligence Reform and Terrorism Prevention Act of 2004 (5 U.S.C. §601 note), shall establish a Department of Homeland Security State, Local, and Regional Fusion Center Initiative to establish partnerships with State, local, and regional fusion centers.

(b) Department Support and Coordination.—Through the Department of Homeland Security State, Local, and Regional Fusion Center Initiative, and in coordination with the principal officials of participating State, local, or regional fusion centers and the officers designated as the Homeland Security Advisors of the States, the Secretary shall—

(1) provide operational and intelligence advice and assistance to State, local, and regional fusion centers;

(2) support efforts to include State, local, and regional fusion centers into efforts to establish an information sharing environment;

(3) conduct tabletop and live training exercises to regularly assess the capability of individual and regional networks of State, local, and regional fusion centers to integrate the efforts of such networks with the efforts of the Department;

(4) coordinate with other relevant Federal entities engaged in homeland security-related activities;

(5) provide analytic and reporting advice and assistance to State, local, and regional fusion centers;

(6) review information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that is gathered by State, local, and regional fusion centers, and to incorporate such information, as appropriate, into the Department’s own such information;

(7) provide management assistance to State, local, and regional fusion centers;

(8) serve as a point of contact to ensure the dissemination of information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information;

(9) facilitate close communication and coordination between State, local, and regional fusion centers and the Department;

(10) provide State, local, and regional fusion centers with expertise on Department resources and operations;

(11) provide training to State, local, and regional fusion centers and encourage such fusion centers to participate in terrorism threat-related exercises conducted by the Department; and

(12) carry out such other duties as the Secretary determines are appropriate.

(c) Personnel Assignment.—

(1) In General.—The Under Secretary for Intelligence and Analysis shall, to the maximum extent practicable, assign officers and intelligence analysts from components of the Department to participating State, local, and regional fusion centers.

(2) Personnel Sources.—Officers and intelligence analysts assigned to participating fusion centers under this subsection may be assigned from the following Department components, in coordination with the respective component head and in consultation with the principal officials of participating fusion centers:

(A) Office of Intelligence and Analysis.

(B) Office of Infrastructure Protection.

(C) Transportation Security Administration.

(D) United States Customs and Border Protection.

(E) United States Immigration and Customs Enforcement.

(F) United States Coast Guard.

(G) Other components of the Department, as determined by the Secretary.

(3) Qualifying Criteria—

(A) In General.—The Secretary shall develop qualifying criteria for a fusion center to participate in the assigning of Department officers or intelligence analysts under this section.

(B) Criteria.—Any criteria developed under subparagraph (A) may include—

(i) whether the fusion center, through its mission and governance structure, focuses on a broad counterterrorism approach, and whether that broad approach is pervasive through all levels of the organization;

(ii) whether the fusion center has sufficient numbers of adequately trained personnel to support a broad counterterrorism mission;

(iii) whether the fusion center has—

(I) access to relevant law enforcement, emergency response, private sector, open source, and national security data; and

(II) the ability to share and analytically utilize that data for lawful purposes;

(iv) whether the fusion center is adequately funded by the State, local, or regional government to support its counterterrorism mission; and

(v) the relevancy of the mission of the fusion center to the particular source component of Department officers or intelligence analysts.

(4) Prerequisite.—

(A) Intelligence Analysis, Privacy, and Civil Liberties Training.—Before being assigned to a fusion center under this section, an officer or intelligence analyst shall undergo—

(i) appropriate intelligence analysis or information sharing training using an intelligence-led policing curriculum that is consistent with—

(I) standard training and education programs offered to Department law enforcement and intelligence personnel; and

(II) the Criminal Intelligence Systems Operating Policies under part 23 of title 28, Code of Federal Regulations (or any corresponding similar rule or regulation);

(ii) appropriate privacy and civil liberties training that is developed, supported, or sponsored by the Privacy Officer appointed under section 222 and the Officer for Civil Rights and Civil Liberties of the Department, in consultation with the Privacy and Civil Liberties Oversight Board established under section 1061 of the Intelligence Reform and Terrorism Prevention Act of 2004 (5 U.S.C. §601 note); and

(iii) such other training prescribed by the Under Secretary for Intelligence and Analysis.

(B) Prior Work Experience in Area.—In determining the eligibility of an officer or intelligence analyst to be assigned to a fusion center under this section, the Under Secretary for Intelligence and Analysis shall consider the familiarity of the officer or intelligence analyst with the State, locality, or region, as determined by such factors as whether the officer or intelligence analyst—

(i) has been previously assigned in the geographic area; or

(ii) has previously worked with intelligence officials or law enforcement or other emergency response providers from that State, locality, or region.

(5) Expedited Security Clearance Processing.—The Under Secretary for Intelligence and Analysis—

(A) shall ensure that each officer or intelligence analyst assigned to a fusion center under this section has the appropriate security clearance to contribute effectively to the mission of the fusion center; and

(B) may request that security clearance processing be expedited for each such officer or intelligence analyst and may use available funds for such purpose.

(6) Further Qualifications.—Each officer or intelligence analyst assigned to a fusion center under this section shall satisfy any other qualifications the Under Secretary for Intelligence and Analysis may prescribe.

(d) Responsibilities.—An officer or intelligence analyst assigned to a fusion center under this section shall—

(1) assist law enforcement agencies and other emergency response providers of State, local, and tribal governments and fusion center personnel in using information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, to develop a comprehensive and accurate threat picture;

(2) review homeland security-relevant information from law enforcement agencies and other emergency response providers of State, local, and tribal government;

(3) create intelligence and other information products derived from such information and other homeland security-relevant information provided by the Department; and

(4) assist in the dissemination of such products, as coordinated by the Under Secretary for Intelligence and Analysis, to law enforcement agencies and other emergency response providers of State, local, and tribal government, other fusion centers, and appropriate Federal agencies.

(e) Border Intelligence Priority.—

(1) In General.—The Secretary shall make it a priority to assign officers and intelligence analysts under this section from United States Customs and Border Protection, United States Immigration and Customs Enforcement, and the Coast Guard to participating State, local, and regional fusion centers located in jurisdictions along land or maritime borders of the United States in order to enhance the integrity of and security at such borders by helping Federal, State, local, and tribal law enforcement authorities to identify, investigate, and otherwise interdict persons, weapons, and related contraband that pose a threat to homeland security.

(2) Border Intelligence Products.—When performing the responsibilities described in subsection (d), officers and intelligence analysts assigned to participating State, local, and regional fusion centers under this section shall have, as a primary responsibility, the creation of border intelligence products that—

(A) assist State, local, and tribal law enforcement agencies in deploying their resources most efficiently to help detect and interdict terrorists, weapons of mass destruction, and related contraband at land or maritime borders of the United States;

(B) promote more consistent and timely sharing of border security-relevant information among jurisdictions along land or maritime borders of the United States; and

(C) enhance the Department’s situational awareness of the threat of acts of terrorism at or involving the land or maritime borders of the United States.

(f) Database Access.—In order to fulfill the objectives described under subsection (d), each officer or intelligence analyst assigned to a fusion center under this section shall have appropriate access to all relevant Federal databases and information systems, consistent with any policies, guidelines, procedures, instructions, or standards established by the President or, as appropriate, the program manager of the information sharing environment for the implementation and management of that environment.

(g) Consumer Feedback.—

(1) In General.—The Secretary shall create a voluntary mechanism for any State, local, or tribal law enforcement officer or other emergency response provider who is a consumer of the intelligence or other information products referred to in subsection (d) to provide feedback to the Department on the quality and utility of such intelligence products.

(2) report.—Not later than one year after the date of the enactment of the Implementing Recommendations of the 9/11 Commission Act of 2007, and annually thereafter, the Secretary shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report that includes a description of the consumer feedback obtained under paragraph (1) and, if applicable, how the Department has adjusted its production of intelligence products in response to that consumer feedback.

(h) Rule of Construction.—

(1) In General.—The authorities granted under this section shall supplement the authorities granted under section 201(d) and nothing in this section shall be construed to abrogate the authorities granted under section 201(d).

(2) Participation.—Nothing in this section shall be construed to require a State, local, or regional government or entity to accept the assignment of officers or intelligence analysts of the Department into the fusion center of that State, locality, or region.

(i) Guidelines.—The Secretary, in consultation with the Attorney General, shall establish guidelines for fusion centers created and operated by State and local governments, to include standards that any such fusion center shall—

(1) collaboratively develop a mission statement, identify expectations and goals, measure performance, and determine effectiveness for that fusion center;

(2) create a representative governance structure that includes law enforcement officers and other emergency response providers and, as appropriate, the private sector;

(3) create a collaborative environment for the sharing of intelligence and information among Federal, State, local, and tribal government agencies (including law enforcement officers and other emergency response providers), the private sector, and the public, consistent with any policies, guidelines, procedures, instructions, or standards established by the President or, as appropriate, the program manager of the information sharing environment;

(4) leverage the databases, systems, and networks available from public and private sector entities, in accordance with all applicable laws, to maximize information sharing;

(5) develop, publish, and adhere to a privacy and civil liberties policy consistent with Federal, State, and local law;

(6) provide, in coordination with the Privacy Officer of the Department and the Officer for Civil Rights and Civil Liberties of the Department, appropriate privacy and civil liberties training for all State, local, tribal, and private sector representatives at the fusion center;

(7) ensure appropriate security measures are in place for the facility, data, and personnel;

(8) select and train personnel based on the needs, mission, goals, and functions of that fusion center;

(9) offer a variety of intelligence and information services and products to recipients of fusion center intelligence and information; and

(10) incorporate law enforcement officers, other emergency response providers, and, as appropriate, the private sector, into all relevant phases of the intelligence and fusion process, consistent with the mission statement developed under paragraph (1), either through full time representatives or liaison relationships with the fusion center to enable the receipt and sharing of information and intelligence.

(j) Definitions.—In this section—

(1) the term “fusion center” means a collaborative effort of 2 or more Federal, State, local, or tribal government agencies that combines resources, expertise, or information with the goal of maximizing the ability of such agencies to detect, prevent, investigate, apprehend, and respond to criminal or terrorist activity;

(2) the term “information sharing environment” means the information sharing environment established under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485);

(3) the term “intelligence analyst” means an individual who regularly advises, administers, supervises, or performs work in the collection, gathering, analysis, evaluation, reporting, production, or dissemination of information on political, economic, social, cultural, physical, geographical, scientific, or military conditions, trends, or forces in foreign or domestic areas that directly or indirectly affect national security;

(4) the term “intelligence-led policing” means the collection and analysis of information to produce an intelligence end product designed to inform law enforcement decision making at the tactical and strategic levels; and

(5) the term “terrorism information” has the meaning given that term in section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485).

(k) Authorization of Appropriations.—There is authorized to be appropriated $10,000,000 for each of fiscal years 2008 through 2012, to carry out this section, except for subsection (i), including for hiring officers and intelligence analysts to replace officers and intelligence analysts who are assigned to fusion centers under this section.


Homeland Security Information Sharing Fellows Program
 

Sec. 210B. [6 U.S.C. §124I]

(a) Establishment.—

(1) In General.—The Secretary, acting through the Under Secretary for Intelligence and Analysis, and in consultation with the Chief Human Capital Officer, shall establish a fellowship program in accordance with this section for the purpose of—

(A) detailing State, local, and tribal law enforcement officers and intelligence analysts to the Department in accordance with subchapter VI of chapter 33 of title 5, United States Code, to participate in the work of the Office of Intelligence and Analysis in order to become familiar with—

(i) the relevant missions and capabilities of the Department and other Federal agencies; and

(ii) the role, programs, products, and personnel of the Office of Intelligence and Analysis; and

(B) promoting information sharing between the Department and State, local, and tribal law enforcement officers and intelligence analysts by assigning such officers and analysts to—

(i) serve as a point of contact in the Department to assist in the representation of State, local, and tribal information requirements;

(ii) identify information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that is of interest to State, local, and tribal law enforcement officers, intelligence analysts, and other emergency response providers;

(iii) assist Department analysts in preparing and disseminating products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that are tailored to State, local, and tribal law enforcement officers and intelligence analysts and designed to prepare for and thwart acts of terrorism; and

(iv) assist Department analysts in preparing products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that are tailored to State, local, and tribal emergency response providers and assist in the dissemination of such products through appropriate Department channels.

(2) Program Name.—The program under this section shall be known as the “Homeland Security Information Sharing Fellows Program.”

(b) Eligibility.—

(1) In General.—In order to be eligible for selection as an Information Sharing Fellow under the program under this section, an individual shall—

(A) have homeland security-related responsibilities;

(B) be eligible for an appropriate security clearance;

(C) possess a valid need for access to classified information, as determined by the Under Secretary for Intelligence and Analysis;

(D) be an employee of an eligible entity; and

(E) have undergone appropriate privacy and civil liberties training that is developed, supported, or sponsored by the Privacy Officer and the Officer for Civil Rights and Civil Liberties, in consultation with the Privacy and Civil Liberties Oversight Board established under section 1061 of the Intelligence Reform and Terrorism Prevention Act of 2004 (5 U.S.C. §601 note).

(2) Eligible Entities.—In this subsection, the term “eligible entity” means—

(A) a State, local, or regional fusion center;

(B) a State or local law enforcement or other government entity that serves a major metropolitan area, suburban area, or rural area, as determined by the Secretary;

(C) a State or local law enforcement or other government entity with port, border, or agricultural responsibilities, as determined by the Secretary;

(D) a tribal law enforcement or other authority; or

(E) such other entity as the Secretary determines is appropriate.

(c) Optional Participation.—No State, local, or tribal law enforcement or other government entity shall be required to participate in the Homeland Security Information Sharing Fellows Program.

(d) Procedures for Nomination and Selection.—

(1) In General.—The Under Secretary for Intelligence and Analysis shall establish procedures to provide for the nomination and selection of individuals to participate in the Homeland Security Information Sharing Fellows Program.

(2) Limitations.—The Under Secretary for Intelligence and Analysis shall—

(A) select law enforcement officers and intelligence analysts representing a broad cross-section of State, local, and tribal agencies; and

(B) ensure that the number of Information Sharing Fellows selected does not impede the activities of the Office of Intelligence and Analysis.

 
Rural Policing Institute
 

Sec. 210C. [6 U.S.C. §124J]

(a) In General.—The Secretary shall establish a Rural Policing Institute, which shall be administered by the Federal Law Enforcement Training Center, to target training to law enforcement agencies and other emergency response providers located in rural areas. The Secretary, through the Rural Policing Institute, shall—

(1) evaluate the needs of law enforcement agencies and other emergency response providers in rural areas;

(2) develop expert training programs designed to address the needs of law enforcement agencies and other emergency response providers in rural areas as identified in the evaluation conducted under paragraph (1), including training programs about intelligence-led policing and protections for privacy, civil rights, and civil liberties;

(3) provide the training programs developed under paragraph (2) to law enforcement agencies and other emergency response providers in rural areas; and

(4) conduct outreach efforts to ensure that local and tribal governments in rural areas are aware of the training programs developed under paragraph (2) so they can avail themselves of such programs.

(b) Curricula.—The training at the Rural Policing Institute established under subsection (a) shall—

(1) be configured in a manner so as not to duplicate or displace any law enforcement or emergency response program of the Federal Law Enforcement Training Center or a local or tribal government entity in existence on the date of enactment of the Implementing Recommendations of the 9/11 Commission Act of 2007; and

(2) to the maximum extent practicable, be delivered in a cost-effective manner at facilities of the Department, on closed military installations with adequate training facilities, or at facilities operated by the participants.

(c) Definition.—In this section, the term “rural” means an area that is not located in a metropolitan statistical area, as defined by the Office of Management and Budget.

(d) Authorization of Appropriations.—There are authorized to be appropriated to carry out this section (including for contracts, staff, and equipment)—

(1) $10,000,000 for fiscal year 2008; and

(2) $5,000,000 for each of fiscal years 2009 through 2013.
 

Interagency Threat assessment and Coordination Group
 

Sec. 210D. [6 U.S.C. §124K]

(a) In General.—To improve the sharing of information within the scope of the information sharing environment established under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485) with State, local, tribal, and private sector officials, the Director of National Intelligence, through the program manager for the information sharing environment, in coordination with the Secretary, shall coordinate and oversee the creation of an Interagency Threat Assessment and Coordination Group (referred to in this section as the “ITACG”).

(b) Composition of ITACG.—The ITACG shall consist of—

(1) an ITACG Advisory Council to set policy and develop processes for the integration, analysis, and dissemination of federally-coordinated information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information; and

(2) an ITACG Detail comprised of State, local, and tribal homeland security and law enforcement officers and intelligence analysts detailed to work in the National Counterterrorism Center with Federal intelligence analysts for the purpose of integrating, analyzing, and assisting in the dissemination of federally-coordinated information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, through appropriate channels identified by the ITACG Advisory Council.

(c) Responsibilities of Program Manager.—The program manager shall—

(1) monitor and assess the efficacy of the ITACG;

(2) not later than 180 days after the date of the enactment of the Implementing Recommendations of the 9/11 Commission Act of 2007, and at least annually thereafter, submit to the Secretary, the Attorney General, the Director of National Intelligence, the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the progress of the ITACG; and

(3) in each report required by paragraph (2) submitted after the date of the enactment of the Reducing Over–Classification Act, include an assessment of whether the detailees under subsection (d)(5) have appropriate access to all relevant information, as required by subsection (g)(2)(C).

(d) Responsibilities of Secretary.—The Secretary, or the Secretary’s designee, in coordination with the Director of the National Counterterrorism Center and the ITACG Advisory Council, shall—

(1) create policies and standards for the creation of information products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that are suitable for dissemination to State, local, and tribal governments and the private sector;

(2) evaluate and develop processes for the timely dissemination of federally-coordinated information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, to State, local, and tribal governments and the private sector;

(3) establish criteria and a methodology for indicating to State, local, and tribal governments and the private sector the reliability of information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, disseminated to them;

(4) educate the intelligence community about the requirements of the State, local, and tribal homeland security, law enforcement, and other emergency response providers regarding information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information;

(5) establish and maintain the ITACG Detail, which shall assign an appropriate number of State, local, and tribal homeland security and law enforcement officers and intelligence analysts to work in the National Counterterrorism Center who shall—

(A) educate and advise National Counterterrorism Center intelligence analysts about the requirements of the State, local, and tribal homeland security and law enforcement officers, and other emergency response providers regarding information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information;

(B) assist National Counterterrorism Center intelligence analysts in integrating, analyzing, and otherwise preparing versions of products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information that are unclassified or classified at the lowest possible level and suitable for dissemination to State, local, and tribal homeland security and law enforcement agencies in order to help deter and prevent terrorist attacks;

(C) implement, in coordination with National Counterterrorism Center intelligence analysts, the policies, processes, procedures, standards, and guidelines developed by the ITACG Advisory Council;

(D) assist in the dissemination of products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, to State, local, and tribal jurisdictions only through appropriate channels identified by the ITACG Advisory Council;

(E) make recommendations, as appropriate, to the Secretary or the Secretary's designee, for the further dissemination of intelligence products that could likely inform or improve the security of a State, local, or tribal government, (including a State, local, or tribal law enforcement agency) or a private sector entity; and

(F) report directly to the senior intelligence official from the Department under paragraph (6);

(6) detail a senior intelligence official from the Department of Homeland Security to the National Counterterrorism Center, who shall—

(A) manage the day-to-day operations of the ITACG Detail;

(B) report directly to the Director of the National Counterterrorism Center or the Director’s designee; and

(C) in coordination with the Director of the Federal Bureau of Investigation, and subject to the approval of the Director of the National Counterterrorism Center, select a deputy from the pool of available detailees from the Federal Bureau of Investigation in the National Counterterrorism Center;

(7) establish, within the ITACG Advisory Council, a mechanism to select law enforcement officers and intelligence analysts for placement in the National Counterterrorism Center consistent with paragraph (5), using criteria developed by the ITACG Advisory Council that shall encourage participation from a broadly representative group of State, local, and tribal homeland security and law enforcement agencies; and

(8) compile an annual assessment of the ITACG Detail's performance, including summaries of customer feedback, in preparing, disseminating, and requesting the dissemination of intelligence products intended for State, local and tribal government (including State, local, and tribal law enforcement agencies) and private sector entities; and

(9) provide the assessment developed pursuant to paragraph (8) to the program manager for use in the annual reports required by subsection (c)(2).

(e) Membership.—The Secretary, or the Secretary’s designee, shall serve as the chair of the ITACG Advisory Council, which shall include—

(1) representatives of—

(A) the Department;

(B) the Federal Bureau of Investigation;

(C) the National Counterterrorism Center;

(D) the Department of Defense;

(E) the Department of Energy;

(F) the Department of State; and

(G) other Federal entities as appropriate;

(2) the program manager of the information sharing environment, designated under section 1016(f) of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485(f)), or the program manager’s designee; and

(3) executive level law enforcement and intelligence officials from State, local, and tribal governments.

(f) Criteria.—The Secretary, in consultation with the Director of National Intelligence, the Attorney General, and the program manager of the information sharing environment established under section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. §485), shall—

(1) establish procedures for selecting members of the ITACG Advisory Council and for the proper handling and safeguarding of products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, by those members; and

(2) ensure that at least 50 percent of the members of the ITACG Advisory Council are from State, local, and tribal governments.

(g) Operations.—

(1) In General.—Beginning not later than 90 days after the date of enactment of the Implementing Recommendations of the 9/11 Commission Act of 2007, the ITACG Advisory Council shall meet regularly, but not less than quarterly, at the facilities of the National Counterterrorism Center of the Office of the Director of National Intelligence.

(2) Management.—Pursuant to section 119(f)(E) of the National Security Act of 1947 (50 U.S.C. §404o(f)(E)), the Director of the National Counterterrorism Center, acting through the senior intelligence official from the Department of Homeland Security detailed pursuant to subsection (d)(6), shall ensure that—

(A) the products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, prepared by the National Counterterrorism Center and the ITACG Detail for distribution to State, local, and tribal homeland security and law enforcement agencies reflect the requirements of such agencies and are produced consistently with the policies, processes, procedures, standards, and guidelines established by the ITACG Advisory Council;

(B) in consultation with the ITACG Advisory Council and consistent with sections 102A(f)(1)(B)(iii) and 119(f)(E) of the National Security Act of 1947 (50 U.S.C. §402 et seq.), all products described in subparagraph (A) are disseminated through existing channels of the Department and the Department of Justice and other appropriate channels to State, local, and tribal government officials and other entities;

(C) all detailees under subsection (d)(5) have appropriate access to all relevant information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, available at the National Counterterrorism Center in order to accomplish the objectives under that paragraph;

(D) all detailees under subsection (d)(5) have the appropriate security clearances and are trained in the procedures for handling, processing, storing, and disseminating classified products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information; and

(E) all detailees under subsection (d)(5) complete appropriate privacy and civil liberties training.

(h) Inapplicability of the Federal Advisory Committee Act.—The Federal Advisory Committee Act (5 U.S.C. App.) shall not apply to the ITACG or any subsidiary groups thereof.

(i) Authorization of Appropriations.—There are authorized to be appropriated such sums as may be necessary for each of fiscal years 2008 through 2012 to carry out this section, including to obtain security clearances for the State, local, and tribal participants in the ITACG.

 
National Asset Database

 
Sec. 210E. [6 U.S.C. §124L]

(a) Establishment.—

(1) National Asset Database.—The Secretary shall establish and maintain a national database of each system or asset that—

(A) the Secretary, in consultation with appropriate homeland security officials of the States, determines to be vital and the loss, interruption, incapacity, or destruction of which would have a negative or debilitating effect on the economic security, public health, or safety of the United States, any State, or any local government; or

(B) the Secretary determines is appropriate for inclusion in the database.

(2) Prioritized Critical Infrastructure List.—In accordance with Homeland Security Presidential Directive-7, as in effect on January 1, 2007, the Secretary shall establish and maintain a single classified prioritized list of systems and assets included in the database under paragraph (1) that the Secretary determines would, if destroyed or disrupted, cause national or regional catastrophic effects.

(b) Use of Database.—The Secretary shall use the database established under subsection (a)(1) in the development and implementation of Department plans and programs as appropriate.

(c) Maintenance of Database—

(1) In General.—The Secretary shall maintain and annually update the database established under subsection (a)(1) and the list established under subsection (a)(2), including—

(A) establishing data collection guidelines and providing such guidelines to the appropriate homeland security official of each State;

(B) regularly reviewing the guidelines established under subparagraph (A), including by consulting with the appropriate homeland security officials of States, to solicit feedback about the guidelines, as appropriate;

(C) after providing the homeland security official of a State with the guidelines under subparagraph (A), allowing the official a reasonable amount of time to submit to the Secretary any data submissions recommended by the official for inclusion in the database established under subsection (a)(1);

(D) examining the contents and identifying any submissions made by such an official that are described incorrectly or that do not meet the guidelines established under subparagraph (A); and

(E) providing to the appropriate homeland security official of each relevant State a list of submissions identified under subparagraph (D) for review and possible correction before the Secretary finalizes the decision of which submissions will be included in the database established under subsection (a)(1).

(2) Organization of Information in Database.—The Secretary shall organize the contents of the database established under subsection (a)(1) and the list established under subsection (a)(2) as the Secretary determines is appropriate. Any organizational structure of such contents shall include the categorization of the contents—

(A) according to the sectors listed in National Infrastructure Protection Plan developed pursuant to Homeland Security Presidential Directive-7; and

(B) by the State and county of their location.

(3) Private Sector Integration.—The Secretary shall identify and evaluate methods, including the Department’s Protected Critical Infrastructure Information Program, to acquire relevant private sector information for the purpose of using that information to generate any database or list, including the database established under subsection (a)(1) and the list established under subsection (a)(2).

(4) Retention of Classification.—The classification of information required to be provided to Congress, the Department, or any other department or agency under this section by a sector-specific agency, including the assignment of a level of classification of such information, shall be binding on Congress, the Department, and that other Federal agency.

(d) Reports.—

(1) Report Required.—Not later than 180 days after the date of the enactment of the Implementing Recommendations of the 9/11 Commission Act of 2007, and annually thereafter, the Secretary shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the database established under subsection (a)(1) and the list established under subsection (a)(2).

(2) Contents of Report.—Each such report shall include the following:

(A) The name, location, and sector classification of each of the systems and assets on the list established under subsection (a)(2).

(B) The name, location, and sector classification of each of the systems and assets on such list that are determined by the Secretary to be most at risk to terrorism.

(C) Any significant challenges in compiling the list of the systems and assets included on such list or in the database established under subsection (a)(1).

(D) Any significant changes from the preceding report in the systems and assets included on such list or in such database.

(E) If appropriate, the extent to which such database and such list have been used, individually or jointly, for allocating funds by the Federal Government to prevent, reduce, mitigate, or respond to acts of terrorism.

(F) The amount of coordination between the Department and the private sector, through any entity of the Department that meets with representatives of private sector industries for purposes of such coordination, for the purpose of ensuring the accuracy of such database and such list.

(G) Any other information the Secretary deems relevant.

(3) Classified Information.—The report shall be submitted in unclassified form but may contain a classified annex.

(e) Inspector General Study.—By not later than two years after the date of enactment of the Implementing Recommendations of the 9/11 Commission Act of 2007, the Inspector General of the Department shall conduct a study of the implementation of this section.

(f) National Infrastructure Protection Consortium.—The Secretary may establish a consortium to be known as the “National Infrastructure Protection Consortium”. The Consortium may advise the Secretary on the best way to identify, generate, organize, and maintain any database or list of systems and assets established by the Secretary, including the database established under subsection (a)(1) and the list established under subsection (a)(2). If the Secretary establishes the National Infrastructure Protection Consortium, the Consortium may—

(1) be composed of national laboratories, Federal agencies, State and local homeland security organizations, academic institutions, or national Centers of Excellence that have demonstrated experience working with and identifying critical infrastructure and key resources; and

(2) provide input to the Secretary on any request pertaining to the contents of such database or such list.
 

CLASSIFIED INFORMATION ADVISORY OFFICER

SEC. 210F. [6 U.S.C. §124M]

(a) REQUIREMENT TO ESTABLISH.—The Secretary shall identify and designate within the Department a Classified Information Advisory Officer, as described in this section.

(b) RESPONSIBILITIES.—The responsibilities of the Classified Information Advisory Officer shall be as follows:

(1) To develop and disseminate educational materials and to develop and administer training programs to assist state, local, and tribal governments (including state, local, and tribal law enforcement agencies) and private sector entities—

(A) in developing plans and policies to respond to requests related to classified information without communicating such information to individuals who lack appropriate security clearances;

(B) regarding the appropriate procedures for challenging classification designations of information received by personnel of such entities; and

(C) on the means by which such personnel may apply for security clearances.

(2) To inform the Under Secretary for Intelligence and Analysis on policies and procedures that could facilitate the sharing of classified information with such personnel, as appropriate.

(c) INITIAL DESIGNATION.—Not later than 90 days after the date of the enactment of the Reducing Over–Classification Act, the Secretary shall—

(1) designate the initial Classified Information Advisory Officer; and

(2) submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a written notification of the designation.

 

TITLE V—EMERGENCY PREPAREDNESS AND RESPONSE
 

Sec. 515.  National Operations Center. [6 U.S.C. §321D]

(a) Definition

In this section, the term “situational awareness” means information gathered from a variety of sources that, when communicated to emergency managers and decision makers, can form the basis for incident management decisionmaking.

(b) Establishment

The National Operations Center is the principal operations center for the Department and shall—

 

(1) provide situational awareness and a common operating picture for the entire Federal Government, and for State, local, and tribal governments as appropriate, in the event of a natural disaster, act of terrorism, or other man-made disaster; and

(2) ensure that critical terrorism and disaster-related information reaches government decision-makers.

(c) State and local fire service representation

(1) Establishment of position

The Secretary shall, in consultation with the Administrator of the United States Fire Administration, establish a fire service position at the National Operations Center established under subsection (b) to ensure the effective sharing of information between the Federal Government and State and local fire services.

(2) Designation of position

The Secretary shall designate, on a rotating basis, a State or local fire service official for the position described in paragraph (1).

(3) Management

The Secretary shall manage the position established pursuant to paragraph (1) in accordance with such rules, regulations, and practices as govern other similar rotating positions at the National Operations Center.

 
TITLE VIII–COORDINATION WITH NON-FEDERAL ENTITIES; INSPECTOR GENERAL; UNITED STATES SECRET SERVICE; COAST GUARD; GENERAL PROVISIONS

 
Subtitle A—Coordination with Non-Federal Entities

Sec. 801. Office for State and Local Government Coordination

[6 U.S.C. §361]

(a) Establishment

There is established within the Office of the Secretary the Office for State and Local Government Coordination, to oversee and coordinate departmental programs for and relationships with State and local governments.

(b) Responsibilities

The Office established under subsection (a) of this section shall—

(1) coordinate the activities of the Department relating to State and local government;

(2) assess, and advocate for, the resources needed by State and local government to implement the national strategy for combating terrorism;

 

(3) provide State and local government with regular information, research, and technical support to assist local efforts at securing the homeland; and

(4) develop a process for receiving meaningful input from State and local government to assist the development of the national strategy for combating terrorism and other homeland security activities.

 
Subtitle I—Information Sharing

 
Short Title; Findings; and Sense of Congress.

 
Sec. 891. [6 U.S.C. §481]

(a) Short Title.—This subtitle may be cited as the “Homeland Security Information Sharing Act”.

(b) Findings.—Congress finds the following:

(1) The Federal Government is required by the Constitution to provide for the common defense, which includes terrorist attack.

(2) The Federal Government relies on State and local personnel to protect against terrorist attack.

(3) The Federal Government collects, creates, manages, and protects classified and sensitive but unclassified information to enhance homeland security.

(4) Some homeland security information is needed by the State and local personnel to prevent and prepare for terrorist attack.

(5) The needs of State and local personnel to have access to relevant homeland security information to combat terrorism must be reconciled with the need to preserve the protected status of such information and to protect the sources and methods used to acquire such information.

(6) Granting security clearances to certain State and local personnel is one way to facilitate the sharing of information regarding specific terrorist threats among Federal, State, and local levels of government.

(7) Methods exist to declassify, redact, or otherwise adapt classified information so it may be shared with State and local personnel without the need for granting additional security clearances.

(8) State and local personnel have capabilities and opportunities to gather information on suspicious activities and terrorist threats not possessed by Federal agencies.

(9) The Federal Government and State and local governments and agencies in other jurisdictions may benefit from such information.

(10) Federal, State, and local governments and intelligence, law enforcement, and other emergency preparation and response agencies must act in partnership to maximize the benefits of information gathering and analysis to prevent and respond to terrorist attacks.

(11) Information systems, including the National Law Enforcement Telecommunications System and the Terrorist Threat Warning System, have been established for rapid sharing of classified and sensitive but unclassified information among Federal, State, and local entities.

(12) Increased efforts to share homeland security information should avoid duplicating existing information systems.

(c) Sense of Congress.—It is the sense of Congress that Federal, State, and local entities should share homeland security information to the maximum extent practicable, with special emphasis on hard-to-reach urban and rural communities.
 

Facilitating Homeland Security Information Sharing Procedures
 

Sec. 892. [6 U.S.C. §482]

(a) Procedures for Determining Extent of Sharing of Homeland Security Information.—

(1) The President shall prescribe and implement procedures under which relevant Federal agencies—

(A) share relevant and appropriate homeland security information with other Federal agencies, including the Department, and appropriate State and local personnel;

(B) identify and safeguard homeland security information that is sensitive but unclassified; and

(C) to the extent such information is in classified form, determine whether, how, and to what extent to remove classified information, as appropriate, and with which such personnel it may be shared after such information is removed.

(2) The President shall ensure that such procedures apply to all agencies of the Federal Government.

(3) Such procedures shall not change the substantive requirements for the classification and safeguarding of classified information.

(4) Such procedures shall not change the requirements and authorities to protect sources and methods.

(b) Procedures for Sharing of Homeland Security Information.—

(1) Under procedures prescribed by the President, all appropriate agencies, including the intelligence community, shall, through information sharing systems, share homeland security information with Federal agencies and appropriate State and local personnel to the extent such information may be shared, as determined in accordance with subsection(a), together with assessments of the credibility of such information.

(2) Each information sharing system through which information is shared under paragraph(1) shall—

(A) have the capability to transmit unclassified or classified information, though the procedures and recipients for each capability may differ;

(B) have the capability to restrict delivery of information to specified subgroups by geographic location, type of organization, position of a recipient within an organization, or a recipient’s need to know such information;

(C) be configured to allow the efficient and effective sharing of information; and

(D) be accessible to appropriate State and local personnel.

(3) The procedures prescribed under paragraph(1) shall establish conditions on the use of information shared under paragraph(1)—

(A) to limit the redissemination of such information to ensure that such information is not used for an unauthorized purpose;

(B) to ensure the security and confidentiality of such information;

(C) to protect the constitutional and statutory rights of any individuals who are subjects of such information; and

(D) to provide data integrity through the timely removal and destruction of obsolete or erroneous names and information.

(4) The procedures prescribed under paragraph(1) shall ensure, to the greatest extent practicable, that the information sharing system through which information is shared under such paragraph include existing information sharing systems, including, but not limited to, the National Law Enforcement Telecommunications System, the Regional Information Sharing System, and the Terrorist Threat Warning System of the Federal Bureau of Investigation.

(5) Each appropriate Federal agency, as determined by the President, shall have access to each information sharing system through which information is shared under paragraph(1), and shall therefore have access to all information, as appropriate, shared under such paragraph.

(6) The procedures prescribed under paragraph(1) shall ensure that appropriate State and local personnel are authorized to use such information sharing systems—

(A) to access information shared with such personnel; and

(B) to share, with others who have access to such information sharing systems, the homeland security information of their own jurisdictions, which shall be marked appropriately as pertaining to potential terrorist activity.

(7) Under procedures prescribed jointly by the Director of Central Intelligence and the Attorney General, each appropriate Federal agency, as determined by the President, shall review and assess the information shared under paragraph(6) and integrate such information with existing intelligence.

(c) Sharing of Classified Information and Sensitive but Unclassified Information With State and Local Personnel.—

(1) The President shall prescribe procedures under which Federal agencies may, to the extent the President considers necessary, share with appropriate State and local personnel homeland security information that remains classified or otherwise protected after the determinations prescribed under the procedures set forth in subsection(a).

(2) It is the sense of Congress that such procedures may include 1 or more of the following means:

(A) Carrying out security clearance investigations with respect to appropriate State and local personnel.

(B) With respect to information that is sensitive but unclassified, entering into nondisclosure agreements with appropriate State and local personnel.

(C) Increased use of information-sharing partnerships that include appropriate State and local personnel, such as the Joint Terrorism Task Forces of the Federal Bureau of Investigation, the Anti-Terrorism Task Forces of the Department of Justice, and regional Terrorism Early Warning Groups.

(3)(A) The Secretary shall establish a program to provide appropriate training to officials described in subparagraph(B) in order to assist such officials in—

(i) identifying sources of potential terrorist threats through such methods as the Secretary determines appropriate;

(ii) reporting information relating to such potential terrorist threats to the appropriate Federal agencies in the appropriate form and manner;

(iii) assuring that all reported information is systematically submitted to and passed on by the Department for use by appropriate Federal agencies; and

(iv) understanding the mission and roles of the intelligence community to promote more effective information sharing among Federal, State, and local officials and representatives of the private sector to prevent terrorist attacks against the United States.

(B) The officials referred to in subparagraph (A) are officials of State and local government agencies and representatives of private sector entities with responsibilities relating to the oversight and management of first responders, counterterrorism activities, or critical infrastructure.

(C) The Secretary shall consult with the Attorney General to ensure that the training program established in subparagraph(A) does not duplicate the training program established in section 908 of the USA PATRIOT Act (Public Law 107-56; 28 U.S.C. §509 note).

(D) The Secretary shall carry out this paragraph in consultation with the Director of Central Intelligence and the Attorney General.

(d) Responsible Officials.—For each affected Federal agency, the head of such agency shall designate an official to administer this Act with respect to such agency.

(e) Federal Control of Information.—Under procedures prescribed under this section, information obtained by a State or local government from a Federal agency under this section shall remain under the control of the Federal agency, and a State or local law authorizing or requiring such a government to disclose information shall not apply to such information.

(f) Definitions.—As used in this section:

(1) The term “homeland security information” means any information possessed by a Federal, State, or local agency that—

(A) relates to the threat of terrorist activity;

(B) relates to the ability to prevent, interdict, or disrupt terrorist activity;

(C) would improve the identification or investigation of a suspected terrorist or terrorist organization; or

(D) would improve the response to a terrorist act.

(2) The term “intelligence community” has the meaning given such term in section 3(4) of the National Security Act of 1947(50 U.S.C. §401a(4)).

(3) The term “State and local personnel” means any of the following persons involved in prevention, preparation, or response for terrorist attack:

(A) State Governors, mayors, and other locally elected officials.

(B) State and local law enforcement personnel and firefighters.

(C) Public health and medical professionals.

(D) Regional, State, and local emergency management agency personnel, including State adjutant generals.

(E) Other appropriate emergency response agency personnel.

(F) Employees of private-sector entities that affect critical infrastructure, cyber, economic, or public health security, as designated by the Federal Government in procedures developed pursuant to this section.

(4) The term “State” includes the District of Columbia and any commonwealth, territory, or possession of the United States.

(g) Construction.—Nothing in this Act shall be construed as authorizing any department, bureau, agency, officer, or employee of the Federal Government to request, receive, or transmit to any other Government entity or personnel, or transmit to any State or local entity or personnel otherwise authorized by this Act to receive homeland security information, any information collected by the Federal Government solely for statistical purposes in violation of any other provision of law relating to the confidentiality of such information.
 

Report
 

Sec. 893. [6 U.S.C. §483]

(a) Report Required.—Not later than 12 months after the date of the enactment of this Act, the President shall submit to the congressional committees specified in subsection(b) a report on the implementation of section 892. The report shall include any recommendations for additional measures or appropriation requests, beyond the requirements of section 892, to increase the effectiveness of sharing of information between and among Federal, State, and local entities.

(b) Specified Congressional Committees.—The congressional committees referred to in subsection(a) are the following committees:

(1) The Permanent Select Committee on Intelligence and the Committee on the Judiciary of the House of Representatives.

(2) The Select Committee on Intelligence and the Committee on the Judiciary of the Senate.

 

Authorization of Appropriations
 

Sec. 894. [6 U.S.C. §484]

There are authorized to be appropriated such sums as may be necessary to carry out section 892.

 

Authority to Share Grand Jury Information
 

Sec. 895.

Rule 6(e) of the Federal Rules of Criminal Procedure [18 U.S.C. App.] is amended—

(1) in paragraph(2), by inserting “, or of guidelines jointly issued by the Attorney General and Director of Central Intelligence pursuant to Rule 6,” after “Rule 6”; and

(2) in paragraph(3)—

(A) in subparagraph(A)(ii), by inserting “or of a foreign government” after “(including personnel of a state or subdivision of a state”;

(B) in subparagraph(C)(i)—

(i) in subclause(I), by inserting before the semicolon the following: “or, upon a request by an attorney for the government, when sought by a foreign court or prosecutor for use in an official criminal investigation”;

(ii) in subclause(IV)—

(I) by inserting “or foreign” after “may disclose a violation of State”;

(II) by inserting “or of a foreign government” after “to an appropriate official of a State or subdivision of a State”; and

(III) by striking “or” at the end;

(iii) by striking the period at the end of subclause(V) and inserting “; or”; and

(iv) by adding at the end the following:

 
“(VI) when matters involve a threat of actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power, domestic or international sabotage, domestic or international terrorism, or clandestine intelligence gathering activities by an intelligence service or network of a foreign power or by an agent of a foreign power, within the United States or elsewhere, to any appropriate federal, state, local, or foreign government official for the purpose of preventing or responding to such a threat.”; and

 
(C) in subparagraph(C)(iii)—

(i) by striking “Federal”;

(ii) by inserting “or clause (i)(VI)” after “clause (i)(V)”; and

(iii) by adding at the end the following: “Any state, local, or foreign official who receives information pursuant to clause (i)(VI) shall use that information only consistent with such guidelines as the Attorney General and Director of Central Intelligence shall jointly issue.”.

 
Authority to Share Electronic, Wire, and Oral Interception Information
 

Sec. 896.

Section 2517 of title 18, United States Code, is amended by adding at the end the following:
 

“(7) Any investigative or law enforcement officer, or other Federal official in carrying out official duties as such Federal official, who by any means authorized by this chapter, has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived there from, may disclose such contents or derivative evidence to a foreign investigative or law enforcement officer to the extent that such disclosure is appropriate to the proper performance of the official duties of the officer making or receiving the disclosure, and foreign investigative or law enforcement officers may use or disclose such contents or derivative evidence to the extent such use or disclosure is appropriate to the proper performance of their official duties.

“(8) Any investigative or law enforcement officer, or other Federal official in carrying out official duties as such Federal official, who by any means authorized by this chapter, has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived there from, may disclose such contents or derivative evidence to any appropriate Federal, State, local, or foreign government official to the extent that such contents or derivative evidence reveals a threat of actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power, domestic or international sabotage, domestic or international terrorism, or clandestine intelligence gathering activities by an intelligence service or network of a foreign power or by an agent of a foreign power, within the United States or elsewhere, for the purpose of preventing or responding to such a threat. Any official who receives information pursuant to this provision may use that information only as necessary in the conduct of that person’s official duties subject to any limitations on the unauthorized disclosure of such information, and any State, local, or foreign official who receives information pursuant to this provision may use that information only consistent with such guidelines as the Attorney General and Director of Central Intelligence shall jointly issue.”.

   
Foreign Intelligence Information

Sec. 897.

(a) Dissemination Authorized.—Section 203(d)(1) of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001(Public Law 107-56; 50 U.S.C. §403-5d) is amended by adding at the end the following: “Consistent with the responsibility of the Director of Central Intelligence to protect intelligence sources and methods, and the responsibility of the Attorney General to protect sensitive law enforcement information, it shall be lawful for information revealing a threat of actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power, domestic or international sabotage, domestic or international terrorism, or clandestine intelligence gathering activities by an intelligence service or network of a foreign power or by an agent of a foreign power, within the United States or elsewhere, obtained as part of a criminal investigation to be disclosed to any appropriate Federal, State, local, or foreign government official for the purpose of preventing or responding to such a threat. Any official who receives information pursuant to this provision may use that information only as necessary in the conduct of that person’s official duties subject to any limitations on the unauthorized disclosure of such information, and any State, local, or foreign official who receives information pursuant to this provision may use that information only consistent with such guidelines as the Attorney General and Director of Central Intelligence shall jointly issue.”.

(b) Conforming Amendments.—Section 203(c) of that Act is amended—

(1) by striking “section 2517(6)” and inserting “paragraphs (6) and (8) of section 2517 of title 18, United States Code,”; and

(2) by inserting “and (VI)” after “Rule 6(e)(3)(C)(i)(V)”.

 
Information Acquired from Electronic Surveillance

 
Sec. 898.

Section 106(k)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1806) is amended by inserting after “law enforcement officers” the following: “or law enforcement personnel of a State or political subdivision of a State(including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)”.
 

Information Acquired from a Physical Search

Sec. 899.

Section 305(k)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1825) is amended by inserting after “law enforcement officers” the following: “or law enforcement personnel of a State or political subdivision of a State(including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)”.

 
TITLE XV—TRANSITION

Subtitle B—Transitional Provisions
 

SEC. 1512.  SAVINGS PROVISIONS. [6 U.S.C. §552]
(a) COMPLETED ADMINISTRATIVE ACTIONS.—(1) Completed administrative actions of an agency shall not be affected by the enactment of this Act or the transfer of such agency to the Department, but shall continue in effect according to their terms until amended, modified, superseded, terminated, set aside, or revoked in accordance with law by an officer of the United States or a court of competent jurisdiction, or by operation of law.
(2) For purposes of paragraph (1), the term "completed administrative action" includes orders, determinations, rules, regulations, personnel actions, permits, agreements, grants, contracts, certificates, licenses, registrations, and privileges.
(b) PENDING PROCEEDINGS.—Subject to the authority of the Secretary under this Act—
(1) pending proceedings in an agency, including notices of proposed rulemaking, and applications for licenses, permits, certificates, grants, and financial assistance, shall continue notwithstanding the enactment of this Act or the transfer of the agency to the Department, unless discontinued or modified under the same terms and conditions and to the same extent that such discontinuance could have occurred if such enactment or transfer had not occurred; and
(2) orders issued in such proceedings, and appeals therefrom, and payments made pursuant to such orders, shall issue in the same manner and on the same terms as if this Act had not been enacted or the agency had not been transferred, and any such orders shall continue in effect until amended, modified, superseded, terminated, set aside, or revoked by an officer of the United States or a court of competent jurisdiction, or by operation of law.
(c) PENDING CIVIL ACTIONS.—Subject to the authority of the Secretary under this Act, pending civil actions shall continue notwithstanding the enactment of this Act or the transfer of an agency to the Department, and in such civil actions, proceedings shall be had, appeals taken, and judgments rendered and enforced in the same manner and with the same effect as if such enactment or transfer had not occurred.
(d) REFERENCES.—References relating to an agency that is transferred to the Department in statutes, Executive orders, rules, regulations, directives, or delegations of authority that precede such transfer or the effective date of this Act shall be deemed to refer, as appropriate, to the Department, to its officers, employees, or agents, or to its corresponding organizational units or functions. Statutory reporting requirements that applied in relation to such an agency immediately before the effective date of this Act shall continue to apply following such transfer if they refer to the agency by name.
(e) EMPLOYMENT PROVISIONS.—(1) Notwithstanding the generality of the foregoing (including subsections (a) and (d)), in and for the Department the Secretary may, in regulations prescribed jointly with the Director of the Office of Personnel Management, adopt the rules, procedures, terms, and conditions, established by statute, rule, or regulation before the effective date of this Act, relating to employment in any agency transferred to the Department pursuant to this Act; and
(2) except as otherwise provided in this Act, or under authority granted by this Act, the transfer pursuant to this Act of personnel shall not alter the terms and conditions of employment, including compensation, of any employee so transferred.
(f) STATUTORY REPORTING REQUIREMENTS.—Any statutory reporting requirement that applied to an agency, transferred to the Department under this Act, immediately before the effective date of this Act shall continue to apply following that transfer if the statutory requirement refers to the agency by name.



> Back to the Table of Contents <

Ref Book - Patriot Act 2005

Friday, August 03, 2012

PATRIOT Act of 2005

> Back to the Table of Contents <

(Public Law 109-177 of  March 9, 2006, 120 STAT. 192)

An Act To extend and modify authorities needed to combat terrorism, and for other purposes.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

Short Title; Table of Contents
 

Section 1.

(a) Short Title.—This Act may be cited as the “USA PATRIOT Improvement and Reauthorization Act of 2005”.

(b) Table of Contents.—The table of contents for this Act is as follows:

 

Sec. 1.          Short title; table of contents.

 

Title I—USA PATRIOT Improvement and Reauthorization Act

Sec. 101.      References to, and modification of short title for, USA PATRIOT Act.

Sec. 102.      USA PATRIOT Act sunset provisions.

Sec. 103.      Extension of sunset relating to individual terrorists as agents of foreign powers.

Sec. 104.      Section 2332b and the material support sections of title 18, United States Code.

Sec. 105.      Duration of FISA surveillance of non-United States persons under section 207 of the USA PATRIOT Act.

Sec. 106.      Access to certain business records under section 215 of the USA PATRIOT Act.

Sec. 106A.    Audit on access to certain business records for foreign intelligence purposes.

Sec. 107.      Enhanced oversight of good-faith emergency disclosures under section 212 of the USA PATRIOT Act.

Sec. 108.      Multipoint electronic surveillance under section 206 of the USA PATRIOT Act.

Sec. 109.      Enhanced congressional oversight.

Sec. 110.      Attacks against railroad carriers and mass transportation systems.

Sec. 111.      Forfeiture.

Sec. 112.      Section 2332b(g)(5)(B) amendments relating to the definition of Federal crime of terrorism.

Sec. 113.      Amendments to section 2516(1) of title 18, United States Code.

Sec. 114.      Delayed notice search warrants.

Sec. 115.      Judicial review of national security letters.

Sec. 116.      Confidentiality of national security letters.

Sec. 117.      Violations of nondisclosure provisions of national security letters.

Sec. 118.      Reports on national security letters.

Sec. 119.      Audit of use of national security letters.

Sec. 120.      Definition for forfeiture provisions under section 806 of the USA PATRIOT Act.

Sec. 121.      Penal provisions regarding trafficking in contraband cigarettes or smokeless tobacco.

Sec. 122.      Prohibition of narco-terrorism.

Sec. 123.      Interfering with the operation of an aircraft.

Sec. 124.      Sense of Congress relating to lawful political activity.

Sec. 125.      Removal of civil liability barriers that discourage the donation of fire equipment to volunteer fire companies.

Sec. 126.      Report on data-mining activities.

Sec. 127.      Sense of Congress.

Sec. 128.      USA PATRIOT Act section 214; authority for disclosure of additional information in connection with orders for pen register and trap and trace authority under FISA.

 

Title II—Terrorist Death Penalty Enhancement

Sec. 201.      Short title.

 

Subtitle A—Terrorist penalties enhancement Act

Sec. 211.      Death penalty procedures for certain air piracy cases occurring before enactment of the Federal Death Penalty Act of 1994.

Sec. 212.      Postrelease supervision of terrorists.

 

Subtitle B—Federal Death Penalty Procedures

Sec. 221.      Elimination of procedures applicable only to certain Controlled Substances Act cases.

Sec. 222.      Counsel for financially unable defendants.

 

Title III—Reducing Crime and Terrorism at America’s Seaports

Sec. 301.      Short title.

Sec. 302.      Entry by false pretenses to any seaport.

Sec. 303.      Criminal sanctions for failure to heave to, obstruction of boarding, or providing false information.

Sec. 304.      Criminal sanctions for violence against maritime navigation, placement of destructive devices.

Sec. 305.      Transportation of dangerous materials and terrorists.

Sec. 306.      Destruction of, or interference with, vessels or maritime facilities.

Sec. 307.      Theft of interstate or foreign shipments or vessels.

Sec. 308.      Stowaways on vessels or aircraft.

Sec. 309.      Bribery affecting port security.

Sec. 310.      Penalties for smuggling goods into the United States.

Sec. 311.      Smuggling goods from the United States.

 

Title IV—Combating Terrorism Financing

Sec. 401.      Short title.

Sec. 402.      Increased penalties for terrorism financing.

Sec. 403.      Terrorism-related specified activities for money laundering.

Sec. 404.      Assets of persons committing terrorist acts against foreign countries or international organizations.

Sec. 405.      Money laundering through hawalas.

Sec. 406.      Technical and conforming amendments relating to the USA PATRIOT Act.

Sec. 407.      Cross reference correction.

Sec. 408.      Amendment to amendatory language.

Sec. 409.      Designation of additional money laundering predicate.

Sec. 410.      Uniform procedures for criminal forfeiture.

 

Title V—Miscellaneous Provisions

Sec. 501.      Residence of United States attorneys and assistant United States attorneys.

Sec. 502.      Interim appointment of United States Attorneys.

Sec. 503.      Secretary of Homeland Security in Presidential line of succession.

Sec. 504.      Bureau of Alcohol, Tobacco and Firearms to the Department of Justice.

Sec. 505.      Qualifications of United States Marshals.

Sec. 506.      Department of Justice intelligence matters.

Sec. 507.      Review by Attorney General.

 

Title VI—Secret Service

Sec. 601.      Short title.

Sec. 602.      Interference with national special security events.

Sec. 603.      False credentials to national special security events.

Sec. 604.      Forensic and investigative support of missing and exploited children cases.

Sec. 605.      The Uniformed Division, United States Secret Service.

Sec. 606.      Savings provisions.

Sec. 607.      Maintenance as distinct entity.

Sec. 608.      Exemptions from the Federal Advisory Committee Act.

 

Title VII—Combat Methamphetamine Epidemic Act of 2005

Sec. 701.      Short title.

 

Subtitle A—Domestic regulation of precursor chemicals

Sec. 711.      Scheduled listed chemical products; restrictions on sales quantity, behind-the-counter access, and other safeguards.

Sec. 712.      Regulated transactions.

Sec. 713.      Authority to establish production quotas.

Sec. 714.      Penalties; authority for manufacturing; quota.

Sec. 715.      Restrictions on importation; authority to permit imports for medical, scientific, or other legitimate purposes.

Sec. 716.      Notice of importation or exportation; approval of sale or transfer by importer or exporter.

Sec. 717.      Enforcement of restrictions on importation and of requirement of notice of transfer.

Sec. 718.      Coordination with United States Trade Representative.

 

Subtitle B—International regulation of precursor chemicals

Sec. 721.      Information on foreign chain of distribution; import restrictions regarding failure of distributors to cooperate.

Sec. 722.      Requirements relating to the largest exporting and importing countries of certain precursor chemicals.

Sec. 723.      Prevention of smuggling of methamphetamine into the United States from Mexico.

 

Subtitle C—Enhanced criminal penalties for methamphetamine production and trafficking

Sec. 731.      Smuggling methamphetamine or methamphetamine precursor chemicals into the United States while using facilitated entry programs.

Sec. 732.      Manufacturing controlled substances on Federal property.

Sec. 733.      Increased punishment for methamphetamine kingpins.

Sec. 734.      New child-protection criminal enhancement.

Sec. 735.      Amendments to certain sentencing court reporting requirements.

Sec. 736.      Semiannual reports to Congress.

 

 

Subtitle D—Enhanced environmental regulation of methamphetamine byproducts

Sec. 741.      Biennial report to Congress on agency designations of by-products of methamphetamine laboratories as hazardous materials.

Sec. 742.      Methamphetamine production report.

Sec. 743.      Cleanup costs.

 

Subtitle E—Additional programs and activities

Sec. 751.      Improvements to Department of Justice drug court grant program.

Sec. 752.      Drug courts funding.

Sec. 753.      Feasibility study on Federal drug courts.

Sec. 754.      Grants to hot spot areas to reduce availability of methamphetamine.

Sec. 755.      Grants for programs for drug-endangered children.

Sec. 756.      Authority to award competitive grants to address methamphetamine use by pregnant and parenting women offenders.

 

TITLE IUSA PATRIOT IMPROVEMENT AND REAUTHORIZATION ACT

 

Reference to, and Modification of Short Title for, USA PATRIOT Act

 

Sec. 101.

(a) References to USA PATRIOT Act.—A reference in this Act to the USA PATRIOT Act shall be deemed a reference to the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT Act) of 2001.

(b) Modification of Short Title of USA PATRIOT Act.—Section 1(a) of the USA PATRIOT Act is amended to read as follows:

 

“(a) Short Title.—This Act may be cited as the ‘Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001’ or the ‘USA PATRIOT Act’.”.

 

USA PATRIOT Act Sunset Provisions

 

Sec. 102.

(a) In General.—Section 224 of the USA PATRIOT Act is repealed.

(b) Sections 206 and 215 Sunset.—

(1) In General.—Effective December 31, 2009, the Foreign Intelligence Surveillance Act of 1978 is amended so that sections 501, 502, and 105(c)(2) read as they read on October 25, 2001.

(2) Exception.—With respect to any particular foreign intelligence investigation that began before the date on which the provisions referred to in paragraph (1) cease to have effect, or with respect to any particular offense or potential offense that began or occurred before the date on which such provisions cease to have effect, such provisions shall continue in effect.

 

Extension of Sunset Relating to Individual Terrorists as Agents of Foreign Powers

 

Sec. 103.

Section 6001(b) of the Intelligence Reform and Terrorism Prevention Act of 2004 (Public Law 108-458; 118 Stat. 3742) is amended to read as follows:

“(b) Sunset.—

“(1) In General.—Except as provided in paragraph (2), the amendment made by subsection (a) shall cease to have effect on June 1, 2015.

“(2) Exception.—With respect to any particular foreign intelligence investigation that began before the date on which the provisions referred to in paragraph (1) cease to have effect, or with respect to any particular offense or potential offense that began or occurred before the date on which the provisions cease to have effect, such provisions shall continue in effect.”.

 

Section 233b and the Material Support Sections of Title 18, United States Code

 

Sec. 104.

Section 6603 of the Intelligence Reform and Terrorism Prevention Act of 2004 (Public Law 108-458; 118 Stat. 3762) is amended by striking subsection (g).

 

Duration of FISA Surveillance of Non-United States Persons Under Section 207 of the USA PATRIOT Act

 

Sec. 105.

(a) Electronic Surveillance.—Section 105(e) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1805(e)) is amended—

(1) in paragraph (1)(B), by striking “, as defined in section 101(b)(1)(A)” and inserting “who is not a United States person”; and

(2) in subsection (2)(B), by striking “as defined in section 101(b)(1)(A)” and inserting “who is not a United States person”.

(b) Physical Search.—Section 304(d) of such Act (50 U.S.C. §1824(d)) is amended—

(1) in paragraph (1)(B), by striking “as defined in section 101(b)(1)(A)” and inserting “who is not a United States person”; and

(2) in paragraph (2), by striking “as defined in section 101(b)(1)(A)” and inserting “who is not a United States person”.

(c) Pen Registers, trap and Trace Devices.—Section 402(e) of such Act (50 U.S.C. §1842(e)) is amended—

(1) by striking “(e) An” and inserting “(e)(1) Except as provided in paragraph (2), an”; and

(2) by adding at the end the following new paragraph:

 

“(2) In the case of an application under subsection (c) where the applicant has certified that the information likely to be obtained is foreign intelligence information not concerning a United States person, an order, or an extension of an order, under this section may be for a period not to exceed one year.”.

 

Access to Certain Business Records Under Section 215 of the USA PATRIOT Act

 

Sec. 106.

(a) Director Approval for Certain Applications.—Subsection (a) of section 501 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1861(a)) is amended—

(1) in paragraph (1), by striking “The Director” and inserting “Subject to paragraph (3), the Director”; and

(2) by adding at the end the following:

 

“(3) In the case of an application for an order requiring the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person, the Director of the Federal Bureau of Investigation may delegate the authority to make such application to either the Deputy Director of the Federal Bureau of Investigation or the Executive Assistant Director for National Security (or any successor position). The Deputy Director or the Executive Assistant Director may not further delegate such authority.”.

 

(b) Factual Basis for Requested Order.—Subsection (b)(2) of such section is amended to read as follows:

 

“(2) shall include—

“(A) a statement of facts showing that there are reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation (other than a threat assessment) conducted in accordance with subsection (a)(2) to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, such things being presumptively relevant to an authorized investigation if the applicant shows in the statement of the facts that they pertain to—

“(i) a foreign power or an agent of a foreign power;

“(ii) the activities of a suspected agent of a foreign power who is the subject of such authorized investigation; or

“(iii) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigation; and

“(B) an enumeration of the minimization procedures adopted by the Attorney General under subsection (g) that are applicable to the retention and dissemination by the Federal Bureau of Investigation of any tangible things to be made available to the Federal Bureau of Investigation based on the order requested in such application.”.

 

(c) Clarification of Judicial Discretion.—Subsection (c)(1) of such section is amended to read as follows:

 

“(c)(1) Upon an application made pursuant to this section, if the judge finds that the application meets the requirements of subsections (a) and (b), the judge shall enter an ex parte order as requested, or as modified, approving the release of tangible things.  Such order shall direct that minimization procedures adopted pursuant to subsection (g) be followed.”.

 

(d) Additional Protections.—Subsection (c)(2) of such section is amended to read as follows:

 

“(2) An order under this subsection—

“(A) shall describe the tangible things that are ordered to be produced with sufficient particularity to permit them to be fairly identified;

“(B) shall include the date on which the tangible things must be provided, which shall allow a reasonable period of time within which the tangible things can be assembled and made available;

“(C) shall provide clear and conspicuous notice of the principles and procedures described in subsection (d);

“(D) may only require the production of a tangible thing if such thing can be obtained with a subpoena duces tecum issued by a court of the United States in aid of a grand jury investigation or with any other order issued by a court of the United States directing the production of records or tangible things; and

“(E) shall not disclose that such order is issued for purposes of an investigation described in subsection (a).”.

 

 (e) Prohibitions on Disclosure.—Subsection (d) of such section is amended to read as follows:

 

“(d)(1) No person shall disclose to any other person that the Federal Bureau of Investigation has sought or obtained tangible things pursuant to an order under this section, other than to—

“(A) those persons to whom disclosure is necessary to comply with such order;

“(B) an attorney to obtain legal advice or assistance with respect to the production of things in response to the order; or

“(C) other persons as permitted by the Director of the Federal Bureau of Investigation or the designee of the Director.

“(2)(A) A person to whom disclosure is made pursuant to paragraph (1) shall be subject to the nondisclosure requirements applicable to a person to whom an order is directed under this section in the same manner as such person.

“(B) Any person who discloses to a person described in subparagraph (A), (B), or (C) of paragraph (1) that the Federal Bureau of Investigation has sought or obtained tangible things pursuant to an order under this section shall notify such person of the nondisclosure requirements of this subsection.

“(C) At the request of the Director of the Federal Bureau of Investigation or the designee of the Director, any person making or intending to make a disclosure under this section shall identify to the Director or such designee the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, but in no circumstance shall a person be required to inform the Director or such designee that the person intends to consult an attorney to obtain legal advice or legal assistance.”.

 

(f) Judicial Review.—

(1) Petition Review Pool.—Section 103 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1803) is amended by adding at the end the following new subsection:

 

“(e)(1) Three judges designated under subsection (a) who reside within 20 miles of the District of Columbia, or, if all of such judges are unavailable, other judges of the court established under subsection (a) as may be designated by the presiding judge of such court, shall comprise a petition review pool which shall have jurisdiction to review petitions filed pursuant to section 501(f)(1).

“(2) Not later than 60 days after the date of the enactment of the USA PATRIOT Improvement and Reauthorization Act of 2005, the court established under subsection (a) shall adopt and, consistent with the protection of national security, publish procedures for the review of petitions filed pursuant to section 501(f)(1) by the panel established under paragraph (1).  Such procedures shall provide that review of a petition shall be conducted in camera and shall also provide for the designation of an acting presiding judge.”.

 

(2) Proceedings.—Section 501 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1861) is further amended by adding at the end the following new subsection:

 

“(f)(1) A person receiving an order to produce any tangible thing under this section may challenge the legality of that order by filing a petition with the pool established by section 103(e)(1).  The presiding judge shall immediately assign the petition to one of the judges serving in such pool.  Not later than 72 hours after the assignment of such petition, the assigned judge shall conduct an initial review of the petition.  If the assigned judge determines that the petition is frivolous, the assigned judge shall immediately deny the petition and affirm the order.  If the assigned judge determines the petition is not frivolous, the assigned judge shall promptly consider the petition in accordance with the procedures established pursuant to section 103(e)(2).  The judge considering the petition may modify or set aside the order only if the judge finds that the order does not meet the requirements of this section or is otherwise unlawful.  If the judge does not modify or set aside the order, the judge shall immediately affirm the order and order the recipient to comply therewith.  The assigned judge shall promptly provide a written statement for the record of the reasons for any determination under this paragraph.

“(2) A petition for review of a decision to affirm, modify, or set aside an order by the United States or any person receiving such order shall be to the court of review established under section 103(b), which shall have jurisdiction to consider such petitions.  The court of review shall provide for the record a written statement of the reasons for its decision and, on petition of the United States or any person receiving such order for writ of certiorari, the record shall be transmitted under seal to the Supreme Court, which shall have jurisdiction to review such decision.

“(3) Judicial proceedings under this subsection shall be concluded as expeditiously as possible.  The record of proceedings, including petitions filed, orders granted, and statements of reasons for decision, shall be maintained under security measures established by the Chief Justice of the United States in consultation with the Attorney General and the Director of National Intelligence.

“(4) All petitions under this subsection shall be filed under seal.  In any proceedings under this subsection, the court shall, upon request of the government, review ex parte and in camera any government submission, or portions thereof, which may include classified information.”.

 

(g) Minimization Procedures and Use of Information.—Section 501 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1861) is further amended by adding at the end the following new subsections:

 

“(g) Minimization Procedures.—

“(1) In General.—Not later than 180 days after the date of the enactment of the USA PATRIOT Improvement and Reauthorization Act of 2005, the Attorney General shall adopt specific minimization procedures governing the retention and dissemination by the Federal Bureau of Investigation of any tangible things, or information therein, received by the Federal Bureau of Investigation in response to an order under this title.

“(2) Defined.—In this section, the term ‘minimization procedures’ means—

“(A) specific procedures that are reasonably designed in light of the purpose and technique of an order for the production of tangible things, to minimize the retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons consistent with the need of the United States to obtain, produce, and disseminate foreign intelligence information;

“(B) procedures that require that nonpublicly available information, which is not foreign intelligence information, as defined in section 101(e)(1), shall not be disseminated in a manner that identifies any United States person, without such person’s consent, unless such person’s identity is necessary to understand foreign intelligence information or assess its importance; and

“(C) notwithstanding subparagraphs (A) and (B), procedures that allow for the retention and dissemination of information that is evidence of a crime which has been, is being, or is about to be committed and that is to be retained or disseminated for law enforcement purposes.

“(h) Use of Information.—Information acquired from tangible things received by the Federal Bureau of Investigation in response to an order under this title concerning any United States person may be used and disclosed by Federal officers and employees without the consent of the United States person only in accordance with the minimization procedures adopted pursuant to subsection (g).  No otherwise privileged information acquired from tangible things received by the Federal Bureau of Investigation in accordance with the provisions of this title shall lose its privileged character.  No information acquired from tangible things received by the Federal Bureau of Investigation in response to an order under this title may be used or disclosed by Federal officers or employees except for lawful purposes.”.

 

(h) Enhanced Oversight.—Section 502 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1862) is amended—

(1) in subsection (a)—

(A) by striking “semiannual basis” and inserting “annual basis”; and

(B) by inserting “and the Committee on the Judiciary” after “and the Select Committee on Intelligence”;

(2) in subsection (b)—

(A) by striking “On a semiannual basis” and all that follows through “the preceding 6-month period” and inserting “In April of each year, the Attorney General shall submit to the House and Senate Committees on the Judiciary and the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence a report setting forth with respect to the preceding calendar year”;

(B) in paragraph (1), by striking “and” at the end;

(C) in paragraph (2), by striking the period at the end and inserting  “; and”; and

(D) by adding at the end the following new paragraph:

 

“(3) the number of such orders either granted, modified, or denied for the production of each of the following:

“(A) Library circulation records, library patron lists, book sales records, or book customer lists.

“(B) Firearms sales records.

“(C) Tax return records.

“(D) Educational records.

“(E) Medical records containing information that would identify a person.”; and

 

(3) by adding at the end the following new subsection:

 

“(c)(1) In April of each year, the Attorney General shall submit to Congress a report setting forth with respect to the preceding year—

“(A) the total number of applications made for orders approving requests for the production of tangible things under section 501; and

“(B) the total number of such orders either granted, modified, or denied.

“(2) Each report under this subsection shall be submitted in unclassified form.”.

 

Audit on Access to Certain Business Records for Foreign Intelligence Purposes

 

Sec. 106A.

(a) Audit.—The Inspector General of the Department of Justice shall perform a comprehensive audit of the effectiveness and use, including any improper or illegal use, of the investigative authority provided to the Federal Bureau of Investigation under title V of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1861 et seq.).

(b) Requirements.—The audit required under subsection (a) shall include—

(1) an examination of each instance in which the Attorney General, any other officer, employee, or agent of the Department of Justice, the Director of the Federal Bureau of Investigation, or a designee of the Director, submitted an application to the Foreign Intelligence Surveillance Court (as such term is defined in section 301(3) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1821(3))) for an order under section 501 of such Act during the calendar years of 2002 through 2006, including—

(A) whether the Federal Bureau of Investigation requested that the Department of Justice submit an application and the request was not submitted to the court (including an examination of the basis for not submitting the application);

(B) whether the court granted, modified, or denied the application  (including an examination of the basis for any modification or denial);

(2) the justification for the failure of the Attorney General to issue implementing procedures governing requests for the production of tangible things under such section in a timely fashion, including whether such delay harmed national security;

(3) whether bureaucratic or procedural impediments to the use of such requests for production prevent the Federal Bureau of Investigation from taking full advantage of the authorities provided under section 501 of such Act;

(4) any noteworthy facts or circumstances relating to orders under such section, including any improper or illegal use of the authority provided under such section; and

(5) an examination of the effectiveness of such section as an investigative tool, including—

(A) the categories of records obtained and the importance of the information acquired to the intelligence activities of the Federal Bureau of Investigation or any other Department or agency of the Federal Government;

(B) the manner in which such information is collected, retained, analyzed, and disseminated by the Federal Bureau of Investigation, including any direct access to such information (such as access to “raw data”) provided to any other Department, agency, or instrumentality of Federal, State, local, or tribal governments or any private sector entity;

(C) with respect to calendar year 2006, an examination of the minimization procedures adopted by the Attorney General under section 501(g) of such Act and whether such minimization procedures protect the constitutional rights of United States persons;

(D) whether, and how often, the Federal Bureau of Investigation utilized information acquired pursuant to an order under section 501 of such Act to produce an analytical intelligence product for distribution within the Federal Bureau of Investigation, to the intelligence community (as such term is defined in section 3(4) of the National Security Act of 1947 (50 U.S.C. §401a(4))), or to other Federal, State, local, or tribal government Departments, agencies, or instrumentalities; and

(E) whether, and how often, the Federal Bureau of Investigation provided such information to law enforcement authorities for use in criminal proceedings.

(c) Submission Dates.—

(1) Prior Years.—Not later than one year after the date of the enactment of this Act, or upon completion of the audit under this section for calendar years 2002, 2003, and 2004, whichever is earlier, the Inspector General of the Department of Justice shall submit to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate a report containing the results of the audit conducted under this section for calendar years 2002, 2003, and 2004.

(2) Calendar Years 2005 and 2006.—Not later than December 31, 2007, or upon completion of the audit under this section for calendar years 2005 and 2006, whichever is earlier, the Inspector General of the Department of Justice shall submit to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate a report containing the results of the audit conducted under this section for calendar years 2005 and 2006.

(d) Prior Notice to Attorney General and Director of National Intelligence; Comments.—

(1) Notice.—Not less than 30 days before the submission of a report under subsection (c)(1) or (c)(2), the Inspector General of the Department of Justice shall provide such report to the Attorney General and the Director of National Intelligence.

(2) Comments.—The Attorney General or the Director of National Intelligence may provide comments to be included in the reports submitted under subsections (c)(1) and (c)(2) as the Attorney General or the Director of National Intelligence may consider necessary.

(e) Unclassified Form.—The reports submitted under subsections (c)(1) and  (c)(2) and any comments included under subsection (d)(2) shall be in unclassified form, but may include a classified annex.

 

Enhanced Oversight of Good-Faith Emergency Disclosures under Section 212 of the USA PATRIOT Act

 

Sec. 107.

(a) Enhanced Oversight.—Section 2702 of title 18, United States Code, is amended by adding at the end the following:

 

“(d) reporting of Emergency Disclosures.—On an annual basis, the Attorney General shall submit to the Committee on the Judiciary of the House of Representatives and the Committee on the Judiciary of the Senate a report containing—

“(1) the number of accounts from which the Department of Justice has received voluntary disclosures under subsection (b)(8); and

“(2) a summary of the basis for disclosure in those instances where—

“(A) voluntary disclosures under subsection (b)(8) were made to the Department of Justice; and

“(B) the investigation pertaining to those disclosures was closed without the filing of criminal charges.”.

 

(b) Technical Amendments to Conform Communications and Customer Records Exceptions.—

(1) Voluntary Disclosures.—Section 2702 of title 18, United States Code, is amended—

(A) in subsection (b)(8), by striking “Federal, State, or local”; and

(B) by striking paragraph (4) of subsection (c) and inserting the following:

“(4) to a governmental entity, if the provider, in good faith, believes that an emergency involving danger of death or serious physical injury to any person requires disclosure without delay of information relating to the emergency;”.

 

(2) Definitions.—Section 2711 of title 18, United States Code, is amended—

(A) in paragraph (2), by striking “and” at the end;

(B) in paragraph (3), by striking the period at the end and inserting  “; and”; and

(C) by adding at the end the following:

“(4) the term ‘governmental entity’ means a department or agency of the United States or any State or political subdivision thereof.”.

 

(c) Additional Exception.—Section 2702(a) of title 18, United States Code, is amended by inserting “or (c)” after “Except as provided in subsection (b)”.

 

Multipoint Electronic Surveillance under Section 206 of the USA PATRIOT Act

 

Sec. 108.

(a) Inclusion of Specific Facts in Application.—

(1) Application.—Section 104(a)(3) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1804(a)(3)) is amended by inserting “specific” after “description of the”.

(2) Order.—Subsection (c) of section 105 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1805(c)) is amended—

(A) in paragraph (1)(A) by striking “target of the electronic surveillance” and inserting “specific target of the electronic surveillance identified or described in the application pursuant to section 104(a)(3)”; and

(B) in paragraph (2)(B), by striking “where the Court finds” and inserting  “where the Court finds, based upon specific facts provided in the application,”.

(b) Additional Directions.—Such subsection is further amended—

(1) by striking “An order approving” and all that follows through “specify” and inserting “(1) Specifications—An order approving an electronic surveillance under this section shall specify”;

(2) in paragraph (1)(F), by striking “; and” and inserting a period;

(3) in paragraph (2), by striking “direct” and inserting “DIRECTIONS—An order approving an electronic surveillance under this section shall direct”; and

(4) by adding at the end the following new paragraph:

 

“(3) Special Directions for Certain Orders.—An order approving an electronic surveillance under this section in circumstances where the nature and location of each of the facilities or places at which the surveillance will be directed is unknown shall direct the applicant to provide notice to the court within ten days after the date on which surveillance begins to be directed at any new facility or place, unless the court finds good cause to justify a longer period of up to 60 days, of—

“(A) the nature and location of each new facility or place at which the electronic surveillance is directed;

“(B) the facts and circumstances relied upon by the applicant to justify the applicant’s belief that each new facility or place at which the electronic surveillance is directed is or was being used, or is about to be used, by the target of the surveillance;

“(C) a statement of any proposed minimization procedures that differ from those contained in the original application or order, that may be necessitated by a change in the facility or place at which the electronic surveillance is directed; and

“(D) the total number of electronic surveillances that have been or are being conducted under the authority of the order.”.

 

(c) Enhanced Oversight.—

(1) Report to Congress.—Section 108(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1808(a)(1)) is amended by inserting “, and the Committee on the Judiciary of the Senate,” after “Senate Select Committee on Intelligence”.

(2) Modification of Semiannual Report Requirement on Activities under Foreign Intelligence Surveillance Act of 1978.—Paragraph (2) of section 108(a) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1808(a)) is amended to read as follows:

 

“(2) Each report under the first sentence of paragraph (1) shall include a description of—

“(A) the total number of applications made for orders and extensions of orders approving electronic surveillance under this title where the nature and location of each facility or place at which the electronic surveillance will be directed is unknown;

“(B) each criminal case in which information acquired under this Act has been authorized for use at trial during the period covered by such report; and

“(C) the total number of emergency employments of electronic surveillance under section 105(f) and the total number of subsequent orders approving or denying such electronic surveillance.”.

 

Enhanced Congressional Oversight

 

Sec. 109.

(a) Emergency Physical Searches.—Section 306 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1826) is amended—

(1) in the first sentence, by inserting “, and the Committee on the Judiciary of the Senate,” after “the Senate”;

(2) in the second sentence, by striking “and the Committees on the Judiciary of the House of Representatives and the Senate” and inserting “and the Committee on the Judiciary of the House of Representatives”;

(3) in paragraph (2), by striking “and” at the end;

(4) in paragraph (3), by striking the period at the end and inserting  “; and”; and

(5) by adding at the end the following:

 

“(4) the total number of emergency physical searches authorized by the Attorney General under section 304(e) and the total number of subsequent orders approving or denying such physical searches.”.

 

(b) Emergency Pen Registers and Trap and Trace Devices.—Section 406(b) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1846(b)) is amended—

(1) in paragraph (1), by striking “and” at the end;

(2) in paragraph (2), by striking the period at the end and inserting  “; and”; and

(3) by adding at the end the following:

 

“(3) the total number of pen registers and trap and trace devices whose installation and use was authorized by the Attorney General on an emergency basis under section 403, and the total number of subsequent orders approving or denying the installation and use of such pen registers and trap and trace devices.”.

 

(c) Additional Report.—At the beginning and midpoint of each fiscal year, the Secretary of Homeland Security shall submit to the Committees on the Judiciary of the House of Representatives and the Senate, a written report providing a description of internal affairs operations at U.S. Citizenship and Immigration Services, including the general state of such operations and a detailed description of investigations that are being conducted (or that were conducted during the previous six months) and the resources devoted to such investigations.  The first such report shall be submitted not later than April 1, 2006.

(d) Rules and Procedures for FISA Courts.—Section 103 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1803) is amended by adding at the end the following:

 

“(f)(1) The courts established pursuant to subsections (a) and (b) may establish such rules and procedures, and take such actions, as are reasonably necessary to administer their responsibilities under this Act.

“(2) The rules and procedures established under paragraph (1), and any modifications of such rules and procedures, shall be recorded, and shall be transmitted to the following:

“(A) All of the judges on the court established pursuant to subsection (a).

“(B) All of the judges on the court of review established pursuant to subsection (b).

“(C) The Chief Justice of the United States.

“(D) The Committee on the Judiciary of the Senate.

“(E) The Select Committee on Intelligence of the Senate.

“(F) The Committee on the Judiciary of the House of Representatives.

“(G) The Permanent Select Committee on Intelligence of the House of Representatives.

“(3) The transmissions required by paragraph (2) shall be submitted in unclassified form, but may include a classified annex.”.

 

Judicial Review of National Security Letters

 

Sec. 115.

Chapter 223 of title 18, United States Code, is amended—

(1) by inserting at the end of the table of sections the following new item:

 

“3511. Judicial review of requests for information.”; and

 

(2) by inserting after section 3510 the following:

Ҥ3511. Judicial review of requests for information

“(a) The recipient of a request for records, a report, or other information under section 2709(b) of this title, section 626(a) or (b) or 627(a) of the Fair Credit Reporting Act, section 1114(a)(5)(A) of the Right to Financial Privacy Act, or section 802(a) of the National Security Act of 1947 may, in the United States district court for the district in which that person or entity does business or resides, petition for an order modifying or setting aside the request.  The court may modify or set aside the request if compliance would be unreasonable, oppressive, or otherwise unlawful.

“(b)(1) The recipient of a request for records, a report, or other information under section 2709(b) of this title, section 626(a) or (b) or 627(a) of the Fair Credit Reporting Act, section 1114(a)(5)(A) of the Right to Financial Privacy Act, or section 802(a) of the National Security Act of 1947, may petition any court described in subsection (a) for an order modifying or setting aside a nondisclosure requirement imposed in connection with such a request.

“(2) If the petition is filed within one year of the request for records, a report, or other information under section 2709(b) of this title, section 626(a) or (b) or 627(a) of the Fair Credit Reporting Act, section 1114(a)(5)(A) of the Right to Financial Privacy Act, or section 802(a) of the National Security Act of 1947, the court may modify or set aside such a nondisclosure requirement if it finds that there is no reason to believe that disclosure may endanger the national security of the United States, interfere with a criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person.  If, at the time of the petition, the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the Federal Bureau of Investigation, or in the case of a request by a department, agency, or instrumentality of the Federal Government other than the Department of Justice, the head or deputy head of such department, agency, or instrumentality, certifies that disclosure may endanger the national security of the United States or interfere with diplomatic relations, such certification shall be treated as conclusive unless the court finds that the certification was made in bad faith.

“(3) If the petition is filed one year or more after the request for records, a report, or other information under section 2709(b) of this title, section 626(a) or (b) or 627(a) of the Fair Credit Reporting Act, section 1114(a)(5)(A) of the Right to Financial Privacy Act, or section 802(a) of the National Security Act of 1947, the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the Federal Bureau of Investigation, or his designee in a position not lower than Deputy Assistant Director at Bureau headquarters or a Special Agent in Charge in a Bureau field office designated by the Director, or in the case of a request by a department, agency, or instrumentality of the Federal Government other than the Federal Bureau of Investigation, the head or deputy head of such department, agency, or instrumentality, within ninety days of the filing of the petition, shall either terminate the nondisclosure requirement or re-certify that disclosure may result in a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person.  In the event of re-certification, the court may modify or set aside such a nondisclosure requirement if it finds that there is no reason to believe that disclosure may endanger the national security of the United States, interfere with a criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person.  If the recertification that disclosure may endanger the national security of the United States or interfere with diplomatic relations is made by the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the Federal Bureau of Investigation, such certification shall be treated as conclusive unless the court finds that the recertification was made in bad faith.  If the court denies a petition for an order modifying or setting aside a nondisclosure requirement under this paragraph, the recipient shall be precluded for a period of one year from filing another petition to modify or set aside such nondisclosure requirement.

“(c) In the case of a failure to comply with a request for records, a report, or other information made to any person or entity under section 2709(b) of this title, section 626(a) or (b) or 627(a) of the Fair Credit Reporting Act, section 1114(a)(5)(A) of the Right to Financial Privacy Act, or section 802(a) of the National Security Act of 1947, the Attorney General may invoke the aid of any district court of the United States within the jurisdiction in which the investigation is carried on or the person or entity resides, carries on business, or may be found, to compel compliance with the request.  The court may issue an order requiring the person or entity to comply with the request.  Any failure to obey the order of the court may be punished by the court as contempt thereof.  Any process under this section may be served in any judicial district in which the person or entity may be found.

“(d) In all proceedings under this section, subject to any right to an open hearing in a contempt proceeding, the court must close any hearing to the extent necessary to prevent an unauthorized disclosure of a request for records, a report, or other information made to any person or entity under section 2709(b) of this title, section 626(a) or (b) or 627(a) of the Fair Credit Reporting Act, section 1114(a)(5)(A) of the Right to Financial Privacy Act, or section 802(a) of the National Security Act of 1947.  Petitions, filings, records, orders, and subpoenas must also be kept under seal to the extent and as long as necessary to prevent the unauthorized disclosure of a request for records, a report, or other information made to any person or entity under section 2709(b) of this title, section 626(a) or (b) or 627(a) of the Fair Credit Reporting Act, section 1114(a)(5)(A) of the Right to Financial Privacy Act, or section 802(a) of the National Security Act of 1947.

“(e) In all proceedings under this section, the court shall, upon request of the government, review ex parte and in camera any government submission or portions thereof, which may include classified information.”.

 

Confidentiality of National Security Letters

 

Sec. 116.

(a) Section 2709(c) of title 18, United States Code, is amended to read:

 

“(c) Prohibition of Certain Disclosure.—

“(1) If the Director of the Federal Bureau of Investigation, or his designee in a position not lower than Deputy Assistant Director at Bureau headquarters or a Special Agent in Charge in a Bureau field office designated by the Director, certifies that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, no wire or electronic communications service provider, or officer, employee, or agent thereof, shall disclose to any person (other than those to whom such disclosure is necessary to comply with the request or an attorney to obtain legal advice or legal assistance with respect to the request) that the Federal Bureau of Investigation has sought or obtained access to information or records under this section.

“(2) The request shall notify the person or entity to whom the request is directed of the nondisclosure requirement under paragraph (1).

“(3) Any recipient disclosing to those persons necessary to comply with the request or to an attorney to obtain legal advice or legal assistance with respect to the request shall inform such person of any applicable nondisclosure requirement.  Any person who receives a disclosure under this subsection shall be subject to the same prohibitions on disclosure under paragraph (1).

“(4) At the request of the Director of the Federal Bureau of Investigation or the designee of the Director, any person making or intending to make a disclosure under this section shall identify to the Director or such designee the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, but in no circumstance shall a person be required to inform the Director or such designee that the person intends to consult an attorney to obtain legal advice or legal assistance.”.

 

(b) Section 626(d) of the Fair Credit Reporting Act (15 U.S.C. §1681u(d)) is amended to read:

 

“(d) Confidentiality.—

“(1) If the Director of the Federal Bureau of Investigation, or his designee in a position not lower than Deputy Assistant Director at Bureau headquarters or a Special Agent in Charge in a Bureau field office designated by the Director, certifies that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, no consumer reporting agency or officer, employee, or agent of a consumer reporting agency shall disclose to any person (other than those to whom such disclosure is necessary to comply with the request or an attorney to obtain legal advice or legal assistance with respect to the request) that the Federal Bureau of Investigation has sought or obtained the identity of financial institutions or a consumer report respecting any consumer under subsection (a), (b), or (c), and no consumer reporting agency or officer, employee, or agent of a consumer reporting agency shall include in any consumer report any information that would indicate that the Federal Bureau of Investigation has sought or obtained such information on a consumer report.

“(2) The request shall notify the person or entity to whom the request is directed of the nondisclosure requirement under paragraph (1).

“(3) Any recipient disclosing to those persons necessary to comply with the request or to an attorney to obtain legal advice or legal assistance with respect to the request shall inform such persons of any applicable nondisclosure requirement.  Any person who receives a disclosure under this subsection shall be subject to the same prohibitions on disclosure under paragraph (1).

“(4) At the request of the Director of the Federal Bureau of Investigation or the designee of the Director, any person making or intending to make a disclosure under this section shall identify to the Director or such designee the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, but in no circumstance shall a person be required to inform the Director or such designee that the person intends to consult an attorney to obtain legal advice or legal assistance.”.

 

(c) Section 627(c) of the Fair Credit Reporting Act (15 U.S.C. §1681v(c)) is amended to read:

 

“(c) Confidentiality.—

“(1) If the head of a government agency authorized to conduct investigations of intelligence or counterintelligence activities or analysis related to international terrorism, or his designee, certifies that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, no consumer reporting agency or officer, employee, or agent of such consumer reporting agency, shall disclose to any person (other than those to whom such disclosure is necessary to comply with the request or an attorney to obtain legal advice or legal assistance with respect to the request), or specify in any consumer report, that a government agency has sought or obtained access to information under subsection (a).

“(2) The request shall notify the person or entity to whom the request is directed of the nondisclosure requirement under paragraph (1).

“(3) Any recipient disclosing to those persons necessary to comply with the request or to any attorney to obtain legal advice or legal assistance with respect to the request shall inform such persons of any applicable nondisclosure requirement.  Any person who receives a disclosure under this subsection shall be subject to the same prohibitions on disclosure under paragraph (1).

“(4) At the request of the authorized Government agency, any person making or intending to make a disclosure under this section shall identify to the requesting official of the authorized Government agency the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, but in no circumstance shall a person be required to inform such requesting official that the person intends to consult an attorney to obtain legal advice or legal assistance.”.

 

(d) Section 1114(a)(3) of the Right to Financial Privacy Act (12 U.S.C. §3414(a)(3)) is amended to read as follows:

 

“(3)(A) If the Government authority described in paragraph (1) or the Secret Service, as the case may be, certifies that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, no financial institution, or officer, employee, or agent of such institution, shall disclose to any person (other than those to whom such disclosure is necessary to comply with the request or an attorney to obtain legal advice or legal assistance with respect to the request) that the Government authority or the Secret Service has sought or obtained access to a customer’s financial records.

“(B) The request shall notify the person or entity to whom the request is directed of the nondisclosure requirement under subparagraph (A).

“(C) Any recipient disclosing to those persons necessary to comply with the request or to an attorney to obtain legal advice or legal assistance with respect to the request shall inform such persons of any applicable nondisclosure requirement.  Any person who receives a disclosure under this subsection shall be subject to the same prohibitions on disclosure under subparagraph (A).

“(D) At the request of the authorized Government agency or the Secret Service, any person making or intending to make a disclosure under this section shall identify to the requesting official of the authorized Government agency or the Secret Service the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, but in no circumstance shall a person be required to inform such requesting official that the person intends to consult an attorney to obtain legal advice or legal assistance.”.

 

(e) Section 1114(a)(5)(D) of the Right to Financial Privacy Act (12 U.S.C. §3414(a)(5)(D)) is amended to read:

 

“(D) Prohibition of Certain Disclosure.—

“(i) If the Director of the Federal Bureau of Investigation, or his designee in a position not lower than Deputy Assistant Director at Bureau headquarters or a Special Agent in Charge in a Bureau field office designated by the Director, certifies that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, no financial institution, or officer, employee, or agent of such institution, shall disclose to any person (other than those to whom such disclosure is necessary to comply with the request or an attorney to obtain legal advice or legal assistance with respect to the request) that the Federal Bureau of Investigation has sought or obtained access to a customer’s or entity’s financial records under subparagraph (A).

“(ii) The request shall notify the person or entity to whom the request is directed of the nondisclosure requirement under clause (i).

“(iii) Any recipient disclosing to those persons necessary to comply with the request or to an attorney to obtain legal advice or legal assistance with respect to the request shall inform such persons of any applicable nondisclosure requirement.  Any person who receives a disclosure under this subsection shall be subject to the same prohibitions on disclosure under clause (i).

“(iv) At the request of the Director of the Federal Bureau of Investigation or the designee of the Director, any person making or intending to make a disclosure under this section shall identify to the Director or such designee the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, but in no circumstance shall a person be required to inform the Director or such designee that the person intends to consult an attorney to obtain legal advice or legal assistance.”.

 

 (f) Section 802(b) of the National Security Act of 1947 (50 U.S.C. §436(b)) is amended to read as follows:

 

“(b) Prohibitions of Certain Disclosure.—

“(1) If an authorized investigative agency described in subsection (a) certifies that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, no governmental or private entity, or officer, employee, or agent of such entity, may disclose to any person (other than those to whom such disclosure is necessary to comply with the request or an attorney to obtain legal advice or legal assistance with respect to the request) that such entity has received or satisfied a request made by an authorized investigative agency under this section.

“(2) The request shall notify the person or entity to whom the request is directed of the nondisclosure requirement under paragraph (1).

“(3) Any recipient disclosing to those persons necessary to comply with the request or to an attorney to obtain legal advice or legal assistance with respect to the request shall inform such persons of any applicable nondisclosure requirement.  Any person who receives a disclosure under this subsection shall be subject to the same prohibitions on disclosure under paragraph (1).

“(4) At the request of the authorized investigative agency, any person making or intending to make a disclosure under this section shall identify to the requesting official of the authorized investigative agency the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, but in no circumstance shall a person be required to inform such official that the person intends to consult an attorney to obtain legal advice or legal assistance.”.

 

Violations of Nondisclosure Provisions of National Security Letters

 

Sec. 117.

Section 1510 of title 18, United States Code, is amended by adding at the end the following:

 

“(e) Whoever, having been notified of the applicable disclosure prohibitions or confidentiality requirements of section 2709(c)(1) of this title, section 626(d)(1) or 627(c)(1) of the Fair Credit Reporting Act (15 U.S.C. §1681u(d)(1) or 1681v(c)(1)), section 1114(a)(3)(A) or 1114(a)(5)(D)(i) of the Right to Financial Privacy Act (12 U.S.C. §3414(a)(3)(A) or 3414(a)(5)(D)(i)), or section 802(b)(1) of the National Security Act of 1947 (50 U.S.C. §436(b)(1)), knowingly and with the intent to obstruct an investigation or judicial proceeding violates such prohibitions or requirements applicable by law to such person shall be imprisoned for not more than five years, fined under this title, or both.”.

 

Reports on National Security Letters

 

Sec. 118.

(a) Existing Reports.—Any report made to a committee of Congress regarding national security letters under section 2709(c)(1) of title 18, United States Code, section 626(d) or 627(c) of the Fair Credit Reporting Act (15 U.S.C. §1681u(d) or 1681v(c)), section 1114(a)(3) or 1114(a)(5)(D) of the Right to Financial Privacy Act (12 U.S.C. §3414(a)(3) or 3414(a)(5)(D)), or section 802(b) of the National Security Act of 1947 (50 U.S.C. §436(b)) shall also be made to the Committees on the Judiciary of the House of Representatives and the Senate.

(b) Enhanced Oversight of Fair Credit Reporting Act Counterterrorism National Security Letter.—Section 627 of the Fair Credit Reporting Act (15 U.S.C. §1681(v)) is amended by inserting at the end the following new subsection:

 

“(f) Reports to Congress.—(1) On a semi-annual basis, the Attorney General shall fully inform the Committee on the Judiciary, the Committee on Financial Services, and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary, the Committee on Banking, Housing, and Urban Affairs, and the Select Committee on Intelligence of the Senate concerning all requests made pursuant to subsection (a).

“(2) In the case of the semiannual reports required to be submitted under paragraph (1) to the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate, the submittal dates for such reports shall be as provided in section 507 of the National Security Act of 1947 (50 U.S.C. §415b).”.

 

(c) Report on Requests for National Security Letters.—

(1) In General.—In April of each year, the Attorney General shall submit to Congress an aggregate report setting forth with respect to the preceding year the total number of requests made by the Department of Justice for information concerning different United States persons under—

(A) section 2709 of title 18, United States Code (to access certain communication service provider records), excluding the number of requests for subscriber information;

(B) section 1114 of the Right to Financial Privacy Act (12 U.S.C. §3414) (to obtain financial institution customer records);

(C) section 802 of the National Security Act of 1947 (50 U.S.C. §436) (to obtain financial information, records, and consumer reports);

(D) section 626 of the Fair Credit Reporting Act (15 U.S.C. §1681u) (to obtain certain financial information and consumer reports); and

(E) section 627 of the Fair Credit Reporting Act (15 U.S.C. §1681v) (to obtain credit agency consumer records for counterterrorism investigations).

(2) Unclassified Form.—The report under this section shall be submitted in unclassified form.

(d) National Security Letter Defined.—In this section, the term “national security letter” means a request for information under one of the following provisions of law:

(1) Section 2709(a) of title 18, United States Code (to access certain communication service provider records).

(2) Section 1114(a)(5)(A) of the Right to Financial Privacy Act (12 U.S.C. §3414(a)(5)(A)) (to obtain financial institution customer records).

(3) Section 802 of the National Security Act of 1947 (50 U.S.C. §436) (to obtain financial information, records, and consumer reports).

(4) Section 626 of the Fair Credit Reporting Act (15 U.S.C. §1681u) (to obtain certain financial information and consumer reports).

(5) Section 627 of the Fair Credit Reporting Act (15 U.S.C. §1681v) (to obtain credit agency consumer records for counterterrorism investigations).

 

Audit of Use of National Security Letters

 

Sec. 119.

(a) Audit.—The Inspector General of the Department of Justice shall perform an audit of the effectiveness and use, including any improper or illegal use, of national security letters issued by the Department of Justice.

(b) Requirements.—The audit required under subsection (a) shall include—

(1) an examination of the use of national security letters by the Department of Justice during calendar years 2003 through 2006;

(2) a description of any noteworthy facts or circumstances relating to such use, including any improper or illegal use of such authority; and

(3) an examination of the effectiveness of national security letters as an investigative tool, including—

(A) the importance of the information acquired by the Department of Justice to the intelligence activities of the Department of Justice or to any other department or agency of the Federal Government;

(B) the manner in which such information is collected, retained, analyzed, and disseminated by the Department of Justice, including any direct access to such information (such as access to “raw data”) provided to any other department, agency, or instrumentality of Federal, State, local, or tribal governments or any private sector entity;

(C) whether, and how often, the Department of Justice utilized such information to produce an analytical intelligence product for distribution within the Department of Justice, to the intelligence community (as such term is defined in section 3(4) of the National Security Act of 1947 (50 U.S.C. §401a(4))), or to other Federal, State, local, or tribal government departments, agencies, or instrumentalities;

(D) whether, and how often, the Department of Justice provided such information to law enforcement authorities for use in criminal proceedings;

(E) with respect to national security letters issued following the date of the enactment of this Act, an examination of the number of occasions in which the Department of Justice, or an officer or employee of the Department of Justice, issued a national security letter without the certification necessary to require the recipient of such letter to comply with the nondisclosure and confidentiality requirements potentially applicable under law; and

(F) the types of electronic communications and transactional information obtained through requests for information under section 2709 of title 18, United States Code, including the types of dialing, routing, addressing, or signaling information obtained, and the procedures the Department of Justice uses if content information is obtained through the use of such authority.

(c) Submission Dates.—

(1) Prior Years.—Not later than one year after the date of the enactment of this Act, or upon completion of the audit under this section for calendar years 2003 and 2004, whichever is earlier, the Inspector General of the Department of Justice shall submit to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate a report containing the results of the audit conducted under this subsection for calendar years 2003 and 2004.

(2) Calendar Years 2005 and 2006.—Not later than December 31, 2007, or upon completion of the audit under this subsection for calendar years 2005 and 2006, whichever is earlier, the Inspector General of the Department of Justice shall submit to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate a report containing the results of the audit conducted under this subsection for calendar years 2005 and 2006.

(d) Prior Notice to Attorney General And Director of National Intelligence; Comments.—

(1) Notice.—Not less than 30 days before the submission of a report under subsection (c)(1) or (c)(2), the Inspector General of the Department of Justice shall provide such report to the Attorney General and the Director of National Intelligence.

(2) Comments.—The Attorney General or the Director of National Intelligence may provide comments to be included in the reports submitted under subsection (c)(1) or (c)(2) as the Attorney General or the Director of National Intelligence may consider necessary.

(e) Unclassified Form.—The reports submitted under subsection (c)(1) or  (c)(2) and any comments included under subsection (d)(2) shall be in unclassified form, but may include a classified annex.

(f) Minimization Procedures Feasibility.—Not later than February 1, 2007, or upon completion of review of the report submitted under subsection (c)(1), whichever is earlier, the Attorney General and the Director of National Intelligence shall jointly submit to the Committee on the Judiciary and the Permanent Select Committee on Intelligence of the House of Representatives and the Committee on the Judiciary and the Select Committee on Intelligence of the Senate a report on the feasibility of applying minimization procedures in the context of national security letters to ensure the protection of the constitutional rights of United States persons.

(g) National Security Letter Defined.—In this section, the term “national security letter” means a request for information under one of the following provisions of law:

(1) Section 2709(a) of title 18, United States Code (to access certain communication service provider records).

(2) Section 1114(a)(5)(A) of the Right to Financial Privacy Act (12 U.S.C. §3414(a)(5)(A)) (to obtain financial institution customer records).

(3) Section 802 of the National Security Act of 1947 (50 U.S.C. §436) (to obtain financial information, records, and consumer reports).

(4) Section 626 of the Fair Credit Reporting Act (15 U.S.C. §1681u) (to obtain certain financial information and consumer reports).

(5) Section 627 of the Fair Credit Reporting Act (15 U.S.C. §1681v) (to obtain credit agency consumer records for counterterrorism investigations).

 

USA PATRIOT Act Section 214; Authority for Disclosure of Additional Information in Connection with Orders for Pen Register and Trap and Trace Authority Under FISA

 

Sec. 128.

(a) Records.—Section 402(d)(2) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1842(d)(2)) is amended—

(1) in subparagraph (A)—

(A) in clause (ii), by adding “and” at the end; and

(B) in clause (iii), by striking the period at the end and inserting a semicolon;

(2) in subparagraph (B)(iii), by striking the period at the end and inserting “; and”; and

(3) by adding at the end the following:

 

“(C) shall direct that, upon the request of the applicant, the provider of a wire or electronic communication service shall disclose to the Federal officer using the pen register or trap and trace device covered by the order—

“(i) in the case of the customer or subscriber using the service covered by the order (for the period specified by the order)—

“(I) the name of the customer or subscriber;

“(II) the address of the customer or subscriber;

“(III) the telephone or instrument number, or other subscriber number or identifier, of the customer or subscriber, including any temporarily assigned network address or associated routing or transmission information;

“(IV) the length of the provision of service by such provider to the customer or subscriber and the types of services utilized by the customer or subscriber;

“(V) in the case of a provider of local or long distance telephone service, any local or long distance telephone records of the customer or subscriber;

“(VI) if applicable, any records reflecting period of usage (or sessions) by the customer or subscriber; and

“(VII) any mechanisms and sources of payment for such service, including the number of any credit card or bank account utilized for payment for such service; and

“(ii) if available, with respect to any customer or subscriber of incoming or outgoing communications to or from the service covered by the order—

“(I) the name of such customer or subscriber;

“(II) the address of such customer or subscriber;

“(III) the telephone or instrument number, or other subscriber number or identifier, of such customer or subscriber, including any temporarily assigned network address or associated routing or transmission information; and

“(IV) the length of the provision of service by such provider to such customer or subscriber and the types of services utilized by such customer or subscriber.”.

 
 (b) Enhanced Oversight.—Section 406(a) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. §1846(a)) is amended by inserting “, and the Committee on the Judiciary of the House of Representatives and the Committee on the Judiciary of the Senate,” after “of the Senate”.

> Back to the Table of Contents <

You are leaving DNI.gov

You have selected to open
http://www.anotherwebsite.com

If you would like to not see this alert again, please click the
"Do not show me this again" check box below