Publications

Print

[Senate Report 105-185]
[From the U.S. Government Printing Office]



105th Congress                                                   Report
                                 SENATE

 2d Session                                                     105-185
_______________________________________________________________________


 
 AUTHORIZING APPROPRIATIONS FOR FISCAL YEAR 1999 FOR THE INTELLIGENCE 
ACTIVITIES OF THE UNITED STATES GOVERNMENT AND THE CENTRAL INTELLIGENCE 
     AGENCY RETIREMENT AND DISABILITY SYSTEM AND FOR OTHER PURPOSES

                                _______
                                

                  May 7, 1998.--Ordered to be printed

_______________________________________________________________________


 Mr. Shelby, from the Select Committee on Intelligence, submitted the 
                               following

                              R E P O R T

                         [To accompany S. 2052]

    The Select Committee on Intelligence, having considered the 
original bill (S. 2052), which authorizes appropriations for 
fiscal year 1999 for intelligence-related activities and 
programs of the United States Government, the Community 
Management Account, and the Central Intelligence Agency 
Retirement and Disability System, and which accomplishes other 
purposes, reports favorably thereon and recommends that the 
bill pass.

                          purpose of the bill

    This bill will:
          (1) Authorize appropriations for fiscal year 1999 for 
        (a) the intelligence activities and programs of the 
        United States Government; (b) the Central Intelligence 
        Agency Retirement and Disability System; and (c) the 
        Community Management Account of the Director of Central 
        Intelligence;
          (2) Authorize the personnel ceilings as of September 
        30, 1999, for intelligence activities of the United 
        States Government and for the Community Management 
        Account of the Director of Central Intelligence;
          (3) Authorize the Director of Central Intelligence, 
        with Office of Management and Budget approval, to 
        exceed the personnel ceilings by up to two percent;
          (4) Extend for one additional year the President's 
        authority to delay the imposition of proliferation-
        related sanctions when necessary to protect an 
        intelligence source or method or an on-going criminal 
        investigation;
          (5) Extend for two additional years the Secretary of 
        Defense's authority to engage in commercial activities 
        as security for intelligence collection activities;
          (6) Amend the National Security Education Act of 1991 
        to include the study of counter-proliferation within 
        the scope of the Act;
          (7) Extend for two additional years the Director of 
        Central Intelligence's authority under the Central 
        Intelligence Agency Voluntary Separation Pay Act of 
        1993 to offer separation pay to employees;
          (8) Authorize the Director of Central Intelligence to 
        designate personnel to carry firearms to protect 
        current and former Agency personnel and their immediate 
        families;
          (9) Authorize the Central Intelligence Agency's 
        Inspector General to review and comment in the 
        Inspector General's semiannual reports on existing and 
        proposed legislation relating to programs and 
        operations of the Agency;
          (10) Authorize the Attorney General or a designated 
        attorney for the Government to apply for a court order 
        authorizing the installation and use of a pen register 
        or trap and trace device for an investigation to gather 
        foreign intelligence information or information 
        concerning international terrorism;
          (11) Authorize the Director of the Federal Bureau of 
        Investigation or a designee to apply for a court order 
        to require common carriers, public accommodation 
        facilities, or vehicle rental facilities to release 
        certain records in their possession relating to a 
        foreign intelligence or international terrorism 
        investigation; and
          (12) Ensure that employees within the Intelligence 
        Community are made aware that they may, without prior 
        authorization, disclose certain information to 
        Congress, including classified information, that they 
        reasonably believe is specific and direct evidence of--
        a violation of law, rule or regulation; a false 
        statement to Congress on an issue of material fact; or 
        gross mismanagement, a gross waste of funds, a flagrant 
        abuse of authority, or a substantial and specific 
        danger to public health or safety.

             classified supplement to the COMMITTEE REPORT

    The classified nature of United States intelligence 
activities prevents the Committee from disclosing the details 
of its budgetary recommendations in this Report.
    The Committee has prepared a classified supplement to this 
Report, which contains (a) the classified annex to this Report 
and (b) the classified schedule of authorizations which is 
incorporated by reference in the Act and has the same legal 
status as public law. The classified annex to this report 
explains the full scope and intent of the Committee's action as 
set forth in the classified schedule of authorizations. The 
classified annex has the same status as any Senate Report, and 
the Committee fully expects the Intelligence Community to 
comply with the limitations, guidelines, directions, and 
recommendations contained therein.
    The classified supplement to the Committee Report is 
available for review by any Member of the Senate, subject to 
the provisions of Senate Resolution 400 of the 94th Congress.
    The classified supplement is made available to the 
Committees on Appropriations of the Senate and the House of 
Representatives and to the President. The President shall 
provide for appropriate distribution within the Executive 
Branch.

                       scope of committee review

    The Committee conducted a detailed review of the fiscal 
year 1999 budget requests for the National Foreign Intelligence 
Program (NFIP) of the Director of Central Intelligence; the 
Joint Military Intelligence Program (JMIP) of the Deputy 
Secretary of Defense; and the Tactical Intelligence and Related 
Activities (TIARA) of the military services. The Committee's 
review entailed a series of briefings and hearings with senior 
intelligence officials, numerous staff briefings, review of 
budget justification materials, and numerous written responses 
provided by the Intelligence Community to specific questions 
posed by the Committee. The Committee also monitors compliance 
with numerous reporting requirements contained in statute. Each 
report is scrutinized by the Committee and appropriate action 
is taken when necessary.
    In accordance with a Memorandum of Agreement with the 
Senate Armed Services Committee (SASC), the Committee is 
including its recommendations on both JMIP and TIARA in its 
public report and classified annex. The Senate Select Committee 
on Intelligence (SSCI) has agreed that JMIP and TIARA issues 
will continue to be authorized in the defense authorization 
bill. The SASC has also agreed to involve the SSCI staff in 
staff-level defense authorization conference meetings and to 
provide the Chairman and Vice Chairman of the SSCI the 
opportunity to consult with the SASC Chairman and Ranking 
Member before a JMIP or TIARA issue is finally closed out in 
conference in a manner with which they disagree. The Committee 
looks forward to continuing its productive relationship with 
the SASC on all issues of mutual concern.
    In addition to its annual review of the Administration's 
budget request, the Committee performs continuing oversight of 
various intelligence activities and programs. The Committee has 
a dedicated audit staff that conducts indepth audits and 
reviews of specific programs and activities identified by the 
Committee as needing a thorough and concentrated scrutiny. For 
example, the Committee audit staff recently concluded 
examinations of the use of cover by the Central Intelligence 
Agency and the administration of the Foreign Intelligence 
Surveillance Act of 1978. These inquiries frequently lead to 
Committee action with respect to the authorities, applicable 
laws, and budget of the activity or program concerned.
    The Committee also established a Technical Advisory Group 
(TAG) in 1997. The TAG is an independent panel of twenty-two 
experts drawn from the private sector. Each member of the TAG 
was selected by the Committee for their extensive expertise in 
a particular discipline. The purpose of the TAG is to provide 
the Committee an objective and comprehensive evaluation of 
various intelligence programs and activities. Many of the TAG 
members have never worked within the Intelligence Community and 
therefore being a fresh and independent perspective to 
intelligence programs and activities. The results of these 
examinations and the TAG will be discussed later in its report.

                       committee recommendations

    The vast majority of the Committee's specific 
recommendations relating to the Administration's budget request 
for intelligence and intelligence-related activities are 
classified and are contained in the classified schedule of 
authorizations and the classified annex. The Committee is 
committed, however, to making its concerns and priorities for 
intelligence programs and activities public to the greatest 
extent possible consistent with the nation's security. 
Therefore, the Committee has included in this report 
information that is unclassified and available to the public.

                 national foreign intelligence program

Areas of committee emphasis

    The Committee has continued its bipartisan efforts to 
``right-size'' and ``re-tool'' U.S. Intelligence Community 
programs and activities to reflect the new, post-Cold War era 
threats and challenges to U.S. national security.
    Specifically, the Committee recommends important new 
investments and initiatives in high-priority areas. These 
include: aggressive efforts in what the committee chairman has 
called the ``five C's'' (counter-proliferation, counter-
narcotics, counter-terrorism, counter-intelligence, and covert 
action); bolstering advanced research and development across 
the Intelligence Community to maintain the U.S. technological 
edge; improving the skills and tools of clandestine service 
personnel; developing new and innovative approaches to 
understanding ``hardtarget'' countries; building up 
capabilities in the area of measurments and signatures intelligence; 
and enhancing analytical capabilities as well as tools for conducting 
information operations.
    The Commission recommends significant funding increases in 
each of the priority areas listed above. At the same time, 
however, the Committee recommends reductions in programs and 
activities that are lower-priority or poorly justified, 
redundant, or that cannot be executed. Details of the 
Committee's recommendations are included in the Classified 
Annex accompanying this report.

Department of Defense Foreign Counterintelligence Program (DoD FCIP)

    The Committee notes the precipitous decrease in personnel 
and funding requested for the DoD FCIP since fiscal year 1993. 
The resources dedicated to the military's counterintelligence 
mission have decreased by nearly one half in five years. This 
significant decline, however, has been accompanied by a marked 
increase in operational tempo and increased emphasis on force 
protection which draws heavily on counterintelligence 
resources.
    As Congress strives to achieve and maintain a balanced 
budget, the Committee recognizes the need to reduce spending in 
many areas. The Committee is concerned, however, that certain 
programs and activities within the DoD FCIP have been cut 
without a realistic evaluation of the impact on the 
Department's counterintelligence mission. It appears to the 
Committee that the concept of doing more with less has led to 
declining morale, lack of training, and attrition of personnel 
with a corresponding loss of expertise. Further, the decreases 
in FCIP funding belie the growing dependence by commanders in 
the field on information collected by counterintelligence 
personnel. A 1996 Director of Central Intelligence study 
estimated that nearly 70% of the information used by combatant 
commanders for force protection comes from counterintelligence 
and HUMINT personnel. If this is indeed the case, the Committee 
would expect the counterintelligence mission to be targeted for 
funding increases to strengthen our collection capabilities and 
enhance our analytical capability in the field.
    Therefore, the Secretary of Defense shall submit, by March 
15, 1999, a report to the Congressional Intelligence Committee 
comparing the decrease in DoD FCIP, service TIARA, and Security 
and Intelligence Activities funding over the last five years 
with the operational demands placed on the Department's 
counterintelligence forces. The comparison shall address the 
average deployment schedule of counterintelligence personnel 
for each of the past five years. The report shall also explain 
the analytical methodology used by the Department to conduct 
mission impact analysis before it mandates cuts to the 
counterintelligence force structure. If such an analysis is 
conducted, the report shall include the Department's mission 
impact conclusions for the past five years. If no impact 
analysis is conducted, the report shall explain why no such 
analysis is conducted. The report shall also determine the 
optimum counterintelligence force structure considering 
intelligence requirements, operational tempo, and increased 
emphasis on force protection over the last five years.

Federal Bureau of Investigation foreign counterintelligence

    The Committee's audit staff recently completed a 
comprehensive review of the implementation and administration 
of the Foreign Intelligence Surveillance Act of 1978. During 
the course of this examination, the audit staff encountered 
many instances where the FBI has failed to address 
technological challenges that may, in time, degrade the 
Bureau's ability to collected critical counterintelligence and 
counter-terrorism information. Further, the audit revealed a 
Bureau-wide deficiency in information systems modernization and 
implementation. The dearth and diversity of information systems 
technology throughout the National Security Division, in 
particular, suggests that the Bureau has yet to develop a 
unified and comprehensive plan to address this challenge. The 
Committee believe that the Bureau either has neglected an 
opportunity to maximize the efficiencies available through 
automation, or lack the requisite resources, expertise and 
vision to develop, install, and operate Bureau-wide systems.
    The Committee understands that a Strategic Management Task 
Force within the Bureau is conducting a comprehensive review of 
the use of collection and information systems technology 
throughout the FBI. While this effort is long overdue, the 
Committee is encouraged by this initiative. The Committee urges 
the Director to share the findings and recommendations of this 
review with the Congressional Intelligence Committees. The 
Committee is concerned that the ability to conduct electronic 
surveillance may fall prey to the advance of technology if the 
Bureau does not keep pace with new software and hardware 
developments. Additionally, the Committee wishes to emphasize 
the need for systems that link elements within the National 
Security Division so that counterintelligence and counter-
terrorism information may be disseminated, shared, and accessed 
simultaneously by agents, language specialists, and analysts.

National Drug Intelligence Center

    As the Managers indicated in the Conference Report 
accompanying S. 858, the Intelligence Authorization Act for 
Fiscal Year 1998, the continued funding of the National Drug 
Intelligence Center (NDIC) from the National Foreign 
Intelligence Program deserves study. The Committee is prepared 
to support and provide additional resources for meritorious 
initiatives generated by the NDIC to the extent that the NDIC 
is truly an element of the Intelligence Community. The 
Committee cannot evaluate such initiatives, however, until it 
receives the report mandated in last year's Act. Congress urged 
the President to carefully examine the operations of the NDIC 
and report to the Congressional Intelligence Committees before 
April 1, 1998. Additionally, the managers directed that this 
examination should be undertaken and reported as a part of the 
National Counter-Narcotics Architecture Review being prepared 
by the Office of National Drug Control Policy (ONDCP). To date, 
no report has been received.
    Despite numerous attempts to obtain this information from 
the ONDCP, no information has been made available to support 
accurate and responsible budgeting of NDIC activities. The 
mandated report required detailed information on current and 
proposed efforts to structure the NDIC to effectively 
coordinate and consolidate strategic drug intelligence from 
national security and law enforcement agencies. It also 
required a detailed description of those steps that have been 
taken to ensure that the relevant national security and law 
enforcement agencies are providing the NDIC with access to data 
needed to accomplish this task.
    The Manager's also agreed that upon receipt of this report, 
the Committees would reconsider whether it is appropriate to 
continue funding the NDIC as a part of the National Foreign 
Intelligence Program.
    Therefore, because the report has not yet been received, 
the transfer of funds described in Section 104(e)(2), shall not 
be undertaken until 30 days after the Congressional 
Intelligence Committees are in receipt of the report mandated 
in the Intelligence Authorization Act for Fiscal Year 1998.

Money laundering activity by foreign narcotics traffickers

    The Committee is concerned by the number and magnitude of 
illicit financial transactions that take place within American 
financial systems initiated by foreign narcotics trafficking 
organizations. The Committee has received several briefings and 
reports from various government agencies, conducted hearings on 
this and related issues, and understands that the magnitude of 
the problem may exceed several hundred billion dollars 
annually.
    The Committee has concluded that there is not enough 
emphasis being placed on combating this serious problem. 
Accordingly, the Committee has augmented the resources of the 
DCI's Crime and Narcotics Center to begin to address this 
shortfall. It is also the Committee's intention to investigate 
this area further and consider, when appropriate, legislative 
initiatives.

Central Services Program Working Capital Fund (CSPWCF)

    The Committee strongly supports the Central Intelligence 
Agency's Directorate of Administration (DA) as it continues to 
make steady progress in its initiative--begun in fiscal year 
1998--to put administrative service providers on a business-
like footing through use of the CSPWCF. The Logistics Operation 
Center (LOC) was the first business area shifted into the CSP.
    The budget request did not include funds for CSPWCF because 
the DA continues to refine estimates of the funds required to 
shift six additional business areas--transportation services, 
facilities management and maintenance, foreign field 
communications, applications development, training, and 
telephone services--into CSPWCF in fiscal year 1999. By the end 
of fiscal year 1998, however, the DA will be able to determine 
the exact amount of funds needed for the CSPWCF in fiscal year 
1999 and will address funding as a fiscal year 1999 issue. Once 
those estimates are known, the Committee urges the Director of 
Central Intelligence to adequately fund any CSPWCF needs.

Commercial imagery

    Since 1993, the Committee has advocated the acquisition and 
use of commercial imagery where practicable. The Committee has 
urged the Department of Defense and the Intelligence Community 
to more aggressively pursue the use of commercial imagery.
    Through numerous briefings with the National Imagery and 
Mapping Agency, the National Reconnaissance Office, and 
industry representatives, the Committee is convinced that 
commercial imagery can satisfy a significant quantity of U.S. 
medium resolution imagery requirements. Current private sector 
launch plans will provide possibly up to six U.S.-owned 
satellites that can provide imagery with resolution of one 
meter prior to the launch of the first satellite in a follow-
on, government operated satellite imagery constellation. 
Unfortunately, NIMA has yet to solicit private sector proposals 
for acquisition of medium resolution imagery, nor has NIMA 
evaluated the potential purchase of a commercial satellite to 
meet future U.S. needs for medium resolution imagery.
    In an effort to implement increased use of domestic 
commercial imagery, the Committee recommends that the Senate 
Armed Services Committee adopt a ``buy America'' legislative 
provision related to acquisition of commercial imagery and 
further recommends an additional $10.0 million authorization 
for appropriations for purchase of commercial imagery.

Imagery archiving

    The Committee is concerned that the Intelligence Community 
and Defense have not adequately addressed the preservation of 
space and airborne reconnaissance imagery. While much of the 
current value of the investment in imagery reflects national 
defense requirements, the future value cannot adequately be 
estimated. The Committee recognizes that the life expectancy of 
archived imagery is dependent on the media on which it is 
stored and that some types of media may not survive for long-
term use. Therefore the Committee directs the Director of 
Central Intelligence and Deputy Secretary of Defense to conduct 
a review of archiving and preservation practices for imagery 
collected from space and airborne platforms, and deliver to the 
Committee, not later than March 15, 1999, a report on current 
and future plans to maintain those archives indefinitely at the 
lowest cost. The report should also address the architecture 
for accessing the imagery digitally in a geospatial reference 
frame. If the study projects a reduction in imagery holdings, 
the rationale for such reduction shall be explained. Finally, 
the Committee directs the Director, National Imagery and 
Mapping Agency, to investigate new data storage technologies to 
determine whether their application will decreasearchival costs 
by allowing, among other things, higher density storage, longer term 
storage between restorations, or less stringent storage-environment 
requirements, while maintaining data quality.

Intelligence dissemination architecture

    The Committee notes the progress being made by the 
Department of Defense in developing a coherent, near-real time 
intelligence data dissemination architecture. Plans being 
developed for the Integrated Broadcast System (IBS) will serve 
as a focal point for continued progress in this regard. The 
Navy, as Executive Agent for IBS, is to be commended for moving 
quickly to get the initial broadcast service platform in space. 
There remains, however, an area of some concern with respect to 
the overall dissemination architecture relating to the specific 
bandwidths being acquired within the National Foreign 
Intelligence Program to support specific broadcast needs that 
do not seem to have any validated linkage to the IBS program.
    The Committee is aware that the Tactical Related 
Applications (TRAP) Data Dissemination system (TDDS) will 
provide multiple channels for rapid broadcast of critical 
intelligence information in support of tactical operations. The 
distribution center for TDDS is called Upgraded Dissemination 
Ground Segment (UDGS) and will become operational in fiscal 
year 1999. This is a very capable system with capacity that is 
global in scope and flexible in format. This bandwidth must be 
factored into the IBS architecture and managed as part of that 
architecture.
    Therefore the Committee directs that the Assistant 
Secretary of Defense for Command, Control, Communications, and 
Intelligence, with the Executive Agent for IBS and the 
Acquisition Agent for IBS, prepare a study that shows the 
integration of broadcast systems into the IBS program. This 
study should validate the location of the UDGS as optimum for 
the IBS program and give detailed descriptions of the various 
intelligence source inputs, as well as the information 
management scheme that will be implemented to ensure the 
military customer is getting the necessary information in a 
usable format. Specifically, the Committee seeks to ensure that 
the adjudication and deconfliction authorities are adequate to 
maintain broadcast discipline and ensure that the customer 
identifies and receives critical intelligence information, as 
defined by the customer, in a timely manner.
    The Committee does not believe that a robust architecture 
implies a single dissemination system. The Committee is 
concerned that broadcast services are being buried within 
intelligence ``stovepipes'', when they could better serve the 
same customers in a more efficient and effective manner if they 
were brought under centralized control within the Department of 
Defense. This issue has languished in the Department for 
several years and acquisition decisions have been effected that 
are not consistent with a ``system of systems'' approach. The 
report directed above shall be due not later than March 15, 
1999.

NSA declassification

    The National Security Agency has several declassification 
programs, which are split among many offices, and funding for 
which is buried in the budget submissions of those offices. NSA 
was unable to provide the Committee with the total amount 
requested for all declassification programs in fiscal year 
1999. In addition, with respect to the only declassification 
program specifically identified in the Congressional Budget 
Justification Book, NSA was unable to explain how those 
resources would be allocated. It is impossible for the 
Committee to determine the scale of the declassification 
effort, the effectiveness of declassification tools, and how 
well NSA is meeting declassification requirements. To enhance 
oversight, the Committee directs the Director of NSA to 
consolidate all declassification programs into a single budget 
submission beginning in fiscal year 2000, to include a 
breakdown of how the resources will be allocated.

                  joint military intelligence program

Joint SIGINT Avionics Family

    The objective of Joint SIGINT Avionics (JSAF) is the 
creation of functional commonality and interoperability among 
all U.S. airborne reconnaissance platforms, regardless of 
service or airframe type. Commonality and interoperability are 
accomplished through an open architecture, common sensor 
payload, and software reconfigurable processors. The 
development is being accomplished through a series of 
technology modules that can be incrementally integrated into 
existing systems and platforms.
    The JSAF is designed to adapt to rapidly changing future 
threat capabilities through software exploitation rather than 
by more costly hardware alterations and upgrades. The program 
is divided into a low band subsystem (LBSS) and a high band 
subsystem (HBSS). The system design relies on commercial off-
the-shelf software and hardware to increase affordability. 
Initial system implementation is planned for completion in 
fiscal year 2007.
    Currently, there are four platforms scheduled to receive 
either the LBSS, the HBSS, or both. The Air force plans to 
install JSAF on two platforms, the RC-135 Rivet Joint and the 
Air Force special platform. There are 16 of each of the two 
platforms in the Air Force. The navy plans to install JSAF on 
its EP-3E aircraft. The Navy maintains 12 EP-3E platforms. The 
Army plans to install JSAF on nine Airborne Reconnaissance Low 
(ARL) aircraft for a total of 53 manned platforms. Under the 
present plan, the Air Force special platform will be the only 
aircraft equipped with the LBSS and the HBSS.
    The LBSS/HBSS production schedule (including development 
units) is as follows:

----------------------------------------------------------------------------------------------------------------
                                                                              Fiscal years--                    
                                                         -------------------------------------------------------
                                                           2000   2001   2002   2003   2004   2005   2006   2007
----------------------------------------------------------------------------------------------------------------
LBSS....................................................  \1\ 3      9     10     10      9      7      4      1
HBSS....................................................  \1\ 1      3      3      3      3      3      1  .....
----------------------------------------------------------------------------------------------------------------
\1\ Developmental units.                                                                                        

    In an effort to expedite delivery of this capability, the 
Committee reviewed as accelerated production effort that would 
not increase program risk. The Committee found that the 
delivery schedule could be accelerated by up to three years in 
the case of the Air Force special platform, and two years with 
other platforms, by requiring that platforms be equipped with 
JSAF components at their next depot maintenance (PDM).
    Under the current plan, both low and high band subsystems 
begin delivery to the services in fiscal year 2001 and conclude 
delivery in fiscal year 2007. During this period, some aircraft 
will go through a PDM cycle and not have the new component 
installed even though the components could be readily 
available. Maintaining these older systems when they could be 
replaced will increase support costs. An accelerated delivery 
schedule consistent with platform PDM schedules would be as 
follows:

------------------------------------------------------------------------
                                             Fiscal years--             
                               -----------------------------------------
                                 2000   2001   2002   2003   2004   2005
------------------------------------------------------------------------
LBSS..........................  \1\ 3     10     14     14      7      5
HBSS..........................  \1\ 1      4  .....      6  .....      6
------------------------------------------------------------------------
\1\ Developmental units.                                                

    The accelerated schedule does not increase risk and has no 
budgetary impact in fiscal year 1999. It requires that funding 
be accelerated in fiscal years 2000 through 2003 over current 
plans. The accelerated schedule not only delivers capability 
faster, but also saves $44 million in initial JSAF costs over 
the current acquisition plan. The alternative funding profile 
would be as follows:

                                            [In millions of dollars]                                            
----------------------------------------------------------------------------------------------------------------
                                                                 Fiscal years--                                 
                                          Prior  ---------------------------------------------    TC      Total 
                                           yrs.     2000     2001     2002     2003     2004                    
----------------------------------------------------------------------------------------------------------------
Baseline...............................     34.6     24.1    192.0    173.5    164.1    105.4     152.4    846.1
Acclerated.............................     34.6     29.7    212.1    238.4    218.5     42.9      25.9    802.1
                                        ------------------------------------------------------------------------
Delta..................................        0     +5.6    +20.1    +64.9    +54.4    -62.5    -126.5    -44.0
----------------------------------------------------------------------------------------------------------------

    The Committee recommends the adoption of language directing 
the Department of Defense to adopt an accelerated JSAF 
acquisition strategy consistent with the earliest platform 
availability for PDM schedules.

Defense Airborne Reconnaissance Program integration & support

    The budget request included $17.04 million, an increase of 
more than 100 percent over fiscal year 1998, for program 
integration and support. The budget justification materials did 
not demonstrate a convincing requirement for such a dramatic 
increase. One of the stated justifications for these funds is 
development of transfer plans of Unmanned Aerial Vehicle (UAV) 
capabilities to the services. Given the serious delays in both 
the High Altitude Endurance UAV and Tactical UAV programs, 
coupled with the Air Force's negative experience with the 
Predator program and the fact that the Air Force has conducted 
detailed planning for assumption of responsibility for the High 
Altitude Endurance UAV program, the Committee finds the 
administration's rationale redundant.
    Therefore, the Committee recommends a reduction of $8.0 
million for Defense Airborne Reconnaissance Program Integration 
and Support for fiscal year 1999.

Common ground segment

    The Committee remains concerned about the delays in the 
High Altitude Endurance Unmanned Aerial Vehicle (HAE UAV) 
Advanced Concept Technology Demonstration (ACTD), especially 
with regard to the Dark Star UAV, which continues to fall 
further behind schedule. Information provided to the Committee 
casts serious doubt on the viability of the Dark Star portion 
of the ACTD.
    Because of repeated schedule delays and program problems 
the Committee believes that the administration request for 
fiscal year 1999 for the Common Ground Segment cannot be 
executed in an efficient manner. Therefore, the Committee 
recommends a reduction of $8.0 million in Common Ground Segment 
for fiscal year 1999.

Dark Star

    Dark Star is the Low Observation air vehicle component in 
the HAE UAV Advanced Concept Technology Demonstration (ACTD) 
currently managed by the Defense Advanced Research Projects 
Agency (DARPA). The Dark Star program remains plagued by 
program delays and is substantially behind the projected 
schedule. The Congress has appropriated more than $100.0 
million for fiscal years 1997 and 1998 combined, and the 
administration has requested $40.5 million for fiscal year 
1999.
    The Committee believes that the unexpended prior year funds 
and a reduced fiscal year 1999 authorization for appropriations 
will be sufficient to sustain the Dark Star ACTD through the 
upcoming fiscal year. Therefore, the Committee recommends a 
reduction of $10.0 million for Dark Star in fiscal year 1999.

Interferometric synthetic aperture radar

    Forward deployed U.S. armed forces have a need for up-to-
date and highly accurate maps that provide three-dimensional 
location of targets, including altitude, latitude and 
longitude, and for reconstruction of terrain in a three-
dimensional setting for planning combat missions. Airborne 
interferometric synthetic aperture radar (IFSAR) has the 
potential to provide such maps with an accuracy and timeliness 
that meets the demanding digital terrain elevation data (DTED) 
Level 5 specifications. Such performance would meet all 
validated Army and Air Force requirements for battlefield 
visualization and precision strike. A demonstration IFSAR at 
somewhat lower performance parameters flew successfully on a 
commercial jet in support of U.S. forces in Bosnia. The 
Committee believes that this capability can now be transferred 
to an operational military platform.
    Therefore, the Committee recommends an addition of $4.0 
million within the Advanced Topographic Mapping System (ATOMS) 
program for fiscal year 1999 to expedite development of a DTED 
Level 5 IFSAR for installation on the Army's Airborne 
Reconnaissance Low (ARL) platform.

       improving intelligence community management and operation

The biological and chemical weapons threat

    In March and April 1998, the Committee held a series of 
joint hearings with the Judiciary Subcommittee on Technology, 
Terrorism & Government Information to receive both open and 
classified testimony on the subject of the biological and 
chemical threats to the United States by states and non-state 
actors such as terrorists, and on the United States 
government's strategy and capabilities to prevent or respond to 
such an attack. Witnesses included the Attorney General, the 
Director of the FBI, senior intelligence community officials, 
medical experts from the U.S. Army and the Centers for Disease 
Control, and expert private witnesses. In addition, Committee 
staff met with and debriefed a defector who until 1992 served 
as a senior scientist in the Soviet/Russian offensive 
biological weapons program.
    In the wake of the 1993 World Trade Center bombing, the 
1995 Aum Shinrikyo attack in the Tokyo subway, and most 
recently, the arrests in Las Vegas of persons suspected of 
possessing deadly anthrax agent, the Committee has been 
concerned by the proliferation of biological and chemical 
weapons and the growing prospect of a terrorist attack against 
the United States using biological or chemical agents. The 
Committee has initiated or supported a number of programs to 
enhance the Intelligence Community's capabilities to monitor 
this threat, including new legislative authorities in the 
Intelligence Authorization Act of Fiscal Year 1999 to collect 
certain kinds of critical preliminary information of relevance 
to FBI investigations into international terrorism, and to 
provide policymakers with the information and tools needed to 
support U.S. counter-proliferation and counter-terrorism 
policies. The Classified Annex to the Intelligence 
Authorization Act for Fiscal Year 1999 continues the 
Committee's efforts in this regard.
    The threat of biological or chemical attack poses 
extraordinary and, in some cases, unique challenges, ranging 
from the difficulty of detecting the production of such agents 
and providing timely warning of a potential attack, to the 
consequences of a biological event, which could under certain 
circumstances be more lethal than a nuclear explosion. Of 
particular concern, from the Committee's viewpoint, are the 
ready availability and dual use nature of the materials and 
equipment used to prepare biological and chemical agents; the 
relative ease with which a small group of terrorists could 
produce such substances (compared, for example, with nuclear 
weapons); the possibility of genetic engineering to defeat 
countermeasures and increase the virulence and infectivity of 
biological agents; the threats posed by the Iraqi and Iranian 
biological weapons programs; and concerns over Russia's 
remaining offensive biological warfare program, which according 
to published reports could include biological warheads on 
ICBMs, as well as the potential for transfer of scientific 
expertise, or actual biological agents, from the Russian 
program to rogue states or terrorist groups.
    Many of the challenges cited above are intrinsic to the 
nature of biological and chemical weapons, or otherwise largely 
beyond the capacity of the U.S. Government to influence. The 
Committee is disturbed, however, by public reports that a major 
interagency study has revealed widespread problems and 
deficiencies in the U.S. Government's counter-terrorism 
strategy and capabilities, including intelligence programs and 
activities under the Committee's jurisdiction. This is 
discussed in greater detail in the Classified Annex, where the 
Committee is directing that the Director of Central 
Intelligence and the Attorney General report to the Committee 
on measures they are taking or intend to take to address any 
shortcomings they have identified.

DoD IG oversight of intelligence issues

    In 1995, responding to Congressional concerns about DoD IG 
oversight of DoD organizations within the Intelligence 
Community, the DoD IG established an Office of Intelligence 
Review. The Office of Intelligence Review's mission includes 
overseeing DoD intelligence programs and activities as well as 
coordinating activities of the Inspectors General within DoD 
intelligence agencies such as NSA, NRO, and DIA. Many products 
of the Office of Intelligence Review have been very useful to 
this Committee.
    In January 1998, as a result of overall DoD IG downsizing, 
the Office of Intelligence Review was made a separate entity 
reporting directly to the DoD IG. However, as part of this 
reorganization, the staffing of the Office of Intelligence 
Review was cut nearly in half. While the Committee applauds the 
increased oversight potential created by establishing a 
separate DoD IG office dedicated to reviewing intelligence 
programs and activities, it is concerned that currentDoD IG 
resource constraints could result in the Office of Intelligence Review 
being reduced to an ineffective level or eliminated completely. Over 
the next fiscal year the Committee will be evaluating the Office of 
Intelligence Review's ability to continue to provide quality products 
at its current staffing level.

Computer-proliferation education and training

    The United States faces a qualitatively new proliferation 
challenge to its national security interests. Because the 
proliferation of weapons of mass destruction (WMD) and their 
delivery systems poses a paramount, long term threat to the 
country, the Committee is of the view that the country should 
utilize education as an essential tool in support of the 
training of counter-proliferation specialists equipped to 
address this threat.
    At the present time, however, explicit program authority is 
not available to train American students adequately to confront 
the proliferation challenge. Particularly noticeable by its 
absence is government support for graduate training in the 
counter-proliferation area, which includes WMD technologies and 
capabilities, missile and other delivery system technologies 
and capabilities, existing and required domestic response 
capabilities, motivations and techniques of state and 
subnational proliferators, and a careful assessment of existing 
counter-proliferation regimes.
    The National Security Education Act (NSEA) was enacted in 
1991 ``to provide the necessary resources, accountability, and 
flexibility to meet the national security education needs of 
the United States, especially as such needs change over time''. 
As drafted in 1991, the NSEA emphasized language and area 
studies. Since then, the national security needs of the country 
have changed. In an effort to generate limited but sustained 
Federal support for counter-proliferation activities and 
studies, the Committee amends the National Security Education 
Act of 1991 to (1) specify counter-proliferation studies as a 
primary area for Federal support, and (2) require that the 
National Security Education Board established by the Act 
include the Secretary of Energy. The Committee has as a goal 
the allocation of not less than one-third of the amounts 
specified under the Act for the awarding of fellowships to 
graduate students and grants to institutions of higher learning 
in the field of counter-proliferation training and studies.
    In addressing the threats posed by the proliferation of 
weapons of mass destruction, the Committee has not only been 
supportive of the funding requests of the Intelligence 
Community in combating this threat, but has also pointed the 
way toward enhanced efforts by the community in newer, 
nontraditional areas. Committee support for funding of counter-
proliferation education and training through an amended 
National Security Education Act is not only consistent with 
these efforts but can ultimately contribute to their success.

           impact of technology on the intelligence community

Technical Advisory Group

    In 1997, the Committee established a Technical Advisory 
Group (TAG) to consider selected, highly significant technical 
issues relating to national security or intelligence. The TAG 
is comprised of leading U.S. scientists and experts in 
technology and intelligence. The Committee wishes to thank the 
TAG members for the many hours they devoted to examining both 
the HUMINT and SIGINT capabilities of the Intelligence 
Community (IC). The TAG concluded that intelligence collection 
will pay an increasingly important role in defending U.S. 
national security interests, and recommended that the IC 
develop a comprehensive plan for transition to the future which 
recognizes the technically sophisticated, rapidly changing 
world that now confronts the IC. The Committee will continue to 
review the recommendations of this distinguished group and work 
with the Director of Central Intelligence to implement them. 
Many of the initial recommendations of the TAG have been 
incorporated throughout the Intelligence Authorization Act of 
1999.

Encryption

    The Committee remains concerned about efforts to 
inappropriately ease or remove export restrictions on hardware 
and software encryption products. Export controls on encryption 
and other products serve a clearly defined purpose--to protect 
our nation's security. Therefore, the Committee believes that 
the effects on U.S. national security must be the paramount 
concern when considering any proposed change to encryption 
export policy, and will seek referral of any legislation 
regarding encryption export policy under its jurisdiction 
established under Senate Resolution 400.
    Export restrictions on encryption products assist the 
Intelligence Community in its signals intelligence mission. By 
collecting and analyzing signals intelligence, U.S. 
intelligence agencies seek to understand the policies, 
intentions, and plans of foreign state and nonstate actors. 
Signals intelligence plays an important role in the formation 
of American foreign and defense policy. It is also a 
significant factor in U.S. efforts to protect its citizens and 
soldiers against terrorism, the proliferation of weapons of 
mass destruction, narcotics trafficking, international crime 
and other threats to our nation's security.
    While the Committee recognizes the commercial interest in 
easing or removing export restrictions, it believes the safety 
of our citizens and soldiers should be the predominant concern 
when considering U.S. policy towards the export of any product. 
The Committee supports the continued control of encryption 
products, and believes that a comprehensive strategy on 
encryption export policy can and must be developed that 
addresses national security concerns as well as the promotion 
of American commercial interests abroad. The Committee looks 
forward to working with senior Administration officials in 
developing such a strategy.

Intelligence Community role in national infrastructure protection

    The Committee believes the Intelligence Community has an 
important role to play in the protection of our nation's 
critical infrastructure. The President's Commission on Critical 
Infrastructure Protection (PCCIP) issued a report in October 
1997 which identified five critical infrastructures--energy, 
banking and finance, transportation, vital human services, and 
telecommunications--that are essential to national defense, 
public safety, economic prosperity, and quality of life. In 
pursuit of greater effectiveness and efficiency, the private 
and public sector entities which manage these infrastructures 
have integrated advanced information and communications 
technologies into their systems. However, the widespread use 
and interlinkage of computer and telecommunications throughout 
these infrastructures has created new vulnerabilities which, if 
not addressed, pose significant risks to our national security.
    In response to the recommendations included in the PCCIP 
Report, the Administration in February 1998 created a National 
Infrastructure Protection Center (NIPC) within the Federal 
Bureau of Investigation. The NIPC will be composed of the 
former Computer Investigations and Infrastructure Threat 
Assessment Center (CITAC), originally funded through the NFIP, 
and other offices whose responsibilities include operational 
response to computer intrusion incidents, and indications and 
warnings for infrastructure and key asset protection. To be 
successful in performing its mission, the NIPC must rely on the 
Intelligence Community to provide timely and reliable 
information regarding possible intrusions, disruptions, and 
attacks committed by foreign actors on the critical 
infrastructures.
    In its version of the Intelligence Authorization Act for 
Fiscal Year 1998 the Committee directed the Director of Central 
Intelligence, the Secretary of Defense, and the Director of the 
Federal Bureau of Investigation to submit a report articulating 
a counterintelligence strategy for critical infrastructure 
protection. The Committee received this report on March 30, 
1998. While describing how intelligence agencies have chosen to 
approach the infrastructure protection issue, this report did 
not provide a detailed counterintelligence strategy nor did it 
provide adequate information regarding current or planned 
counterintelligence activities. With the creation of the NIPC, 
the Committee believes the Intelligence Community needs a 
comprehensive strategy to address counterintelligence, threat 
assessment, indications and warnings, and other intelligence 
requirements necessary to assist the NIPC in its infrastructure 
protection mission. Therefore, the Committee directs the 
Director of Central Intelligence and the Secretary of Defense 
to perform a joint review to determine the proper role of the 
Intelligence Community in critical infrastructure protection.
    This review should: identify the assets and capabilities of 
the Intelligence Community which may be of value to the 
protection of the critical infrastructures; identify which 
capabilities or technologies useful to intelligence collection 
or analysis on infrastructure protection are presently lacking 
within the Intelligence Community, including the capability to 
provide indications and warnings; provide a counterintelligence 
strategy designed to protect information regarding 
vulnerabilities in United States infrastructure; state what, if 
any, additional collection requirements have been implemented 
to gain insight into activity against U.S. systems; describe 
any training programs developed to increase awareness and 
knowledge of analysts and collectors regarding infrastructure 
protection concerns; explain how the Intelligence Community 
will use its expertise and assets to assist the critical 
infrastructures protection mission of the NIPC and other 
government entities; and detail how the Intelligence Community 
will provide timely and actionable intelligence regarding 
foreign intrusions and attacks to the NIPC and other government 
entities involved in critical infrastructure protection. This 
review should also propose how protective techniques and 
technologies developed or identified by the Intelligence 
Community may be shared with the private and public sector 
actors that manage these infrastructures. The Committee directs 
that the review of the Intelligence Community's role in 
infrastructure protection be provided to the Congressional 
Intelligence Committees not later than March 15, 1999.

Assessment of the Intelligence Community's information infrastructure

    In recent years, the Intelligence Community has 
incorporated advanced computer and telecommunications 
technologies into its organizations to improve their 
intelligence collection and analytical capabilities, to 
increase the productivity of its workforce, and to facilitate 
communications between different member organizations. As the 
agencies and offices of the Intelligence Community become more 
reliant on these technologies, they have become more vulnerable 
to intrusions, disruptions, and attacks against these systems. 
The Committee realizes that any breakdown in the information 
infrastructure of the Intelligence Community will adversely 
affect its ability to provide timely intelligence to our 
national security policymakers and military leaders.
    To address this potential vulnerability, the Committee 
directs the Director of Central Intelligence and the Secretary 
Of Defense to formulate an Intelligence Community information 
infrastructure security program to ensure the viability and 
effectiveness of the Intelligence Community's information 
infrastructure. This program shall develop and implement 
procedures, practices, policies, and technologies designed to 
secure and protect the IC's information infrastructure from 
intrusion, disruptions, and attacks. It should also provide 
internal controls, audit features, and other necessary elements 
to address possible insider attacks and other 
counterintelligence concerns. The Committee directs that the 
Director of Central Intelligence and the Secretary of Defense 
forward a report to the Congressional Intelligence Committees 
not later than March 15, 1999.
    The Committee is also concerned that there is no formal, 
periodic review of the technologies and practices used by the 
Intelligence Community to provide security and protection for 
its information infrastructure. Therefore, the Committee 
directs the Director of Central Intelligence and the Secretary 
of Defense to perform regular, periodic assessments of 
theprocedures, policies, and technologies implemented by the various 
intelligence agencies and offices to secure and protect their computer 
and telecommunications systems. These assessments shall be performed on 
at least an annual basis. Further, the Committee directs that the 
Intelligence Community complete an initial series of assessments by the 
end of fiscal year 1999.
    These assessments should include the following: a 
determination of the adequacy of information infrastructure 
security procedures and policies; a review of any technologies 
in use to provide security and/or protect information 
infrastructure; and the result of aggressive systematic, 
controlled testing of the Intelligence Community's computer and 
telecommunications systems for vulnerabilities to intrusion, 
denial of use, attack, or other disruptive activity. These 
assessments shall be provided by the Director of Central 
Intelligence and the Secretary of Defense to the Congressional 
Defense Committees not later than March 15, 1999.

                 DISCLOSURE OF INFORMATION TO CONGRESS

Background and need for legislation

    It is not generally known that the ``Whistle Blower 
Protection Act'' does not cover employees of the agencies 
within the Intelligence Community. See 5 U.S.C. Sec. Sec. 2301 
et seq. The ``whistle blower'' statute also expressly 
proscribes the disclosure of information that is specifically 
required by Executive Order to be kept secret in the interest 
of national defense or the conduct of foreign affairs. 
Therefore, employees within the Intelligence Community are not 
protected from adverse personnel action if they choose to 
disclose such information, irrespective of its classification, 
to Congress. In fact, an employee who discloses classified 
information to Congress without prior approval is specifically 
subject to sanctions which may include reprimand, termination 
of security clearance, suspension without pay, or removal. See 
Exec. Order No. 12,958, 60 Fed. Reg. 19825 (1995). Some types 
of unauthorized disclosures are also subject to criminal 
sanctions. See 18 U.S.C. Sec. Sec. 641, 793, 794, 798, 952 
(1996); 50 U.S.C. Sec. 783(b) (1996).
    In accordance with Executive Order No. 12,958, classified 
information must remain under the control of the originating 
agency and may not be disseminated without proper 
authorization. Consequently, an Executive Branch employee may 
not disclose classified information to Congress without prior 
approval. In fact, employees are advised that the agency will 
provide ``access as is necessary for Congress to perform its 
legislative functions. * * *'' ``Information Security Oversight 
Office, General Services Administration, Classified Information 
Nondislcosure Agreement (SF-312) Briefing Booklet,'' at 66. In 
other words, the executive agency will decide what Members of 
Congress may ``need to know'' to perform their constitutional 
oversight functions. The President, in effect, asserts that he 
has exclusive or plenary authority to oversee the regulation of 
national security information.
    In response to the Administration's position, the Select 
Committee on Intelligence of the United States Senate reported 
the Intelligence Authorization Act for Fiscal Year 1998, which 
included a provision that specifically addressed this issue. 
See S. 858, 105th Cong., 1st Sess. Sec. 306 (1997). The Senate 
passed the bill by a vote of ninety-eight to one. Shortly after 
the Senate vote, the Administration issued a Statement of 
Administration Policy stating that section 306 was 
unconstitutional, and that if it remained in the bill in its 
present form, senior advisers would recommend that the 
President veto the bill.
    Section 306 directed the President to inform all Executive 
Branch employees that disclosing classified information to an 
appropriate oversight committee to their Congressional 
representative is not prohibited by any law, executive order, 
or regulation or otherwise contrary to public policy, if the 
employee reasonably believes that the classified information 
evidences: a violation of any law, rule, or regulation; a false 
statement to Congress on an issue of material fact; or gross 
mismanagement, a gross waste of funds, an abuse of authority, 
or a substantial and specific danger to public health or 
safety. This provision was intended to ensure that Congress 
received information necessary to fulfill its constitutional 
oversight responsibilities. It was also intended to protect 
employees from adverse actions based on what was heretofore 
considered an unauthorized disclosure to Congress.
    The Committee intended disclosure to an appropriate 
oversight committee to mean disclosure to cleared staff or a 
member of the committee with jurisdiction over the agency 
involved in the wrongdoing. Members or committee staff who 
received such information from an employee were to be presumed 
to have received it in their capacity as members or staff of 
the appropriate oversight committee. The Committee believed 
that this presumption was necessary because Members and staff 
are responsible for ensuring that the information is protected 
in accordance with committee rules and brought to the attention 
of the leadership of the committee. The President, by informing 
Executive Branch employees as directed in section 306, would 
have authorized disclosure to the appropriate oversight 
committee or members, thereby recognizing that these committees 
and members have a ``need to know'' the information as required 
by current Executive Branch restrictions on disclosure of 
classified information.
    In conference, members of the House Permanent Select 
Committee on Intelligence (HPSCI) and the Senate Select 
Committee (SSCI) did not agree to include section 306 as passed 
by the Senate. The Senate offered to amend section 306, thereby 
significantly narrowing the scope of the provision to cover 
only employees of agencies within the Intelligence Community 
(the Senate-passed version covered all executive employees). 
The Senate amendment further narrowed the provision by allowing 
disclosure only to committees with primary jurisdiction over 
the agencies involved (the original language also allowed 
disclosure to a Member of Congress who represented the 
employee).
    The Chairman and Ranking Member of the House Committee 
expressed concern over the possible constitutional implications 
of such language. They were also mindful of the 
Administration's veto threat as expressed in the Statement of 
Administration Policy. The Chairman and vice Chairman of the 
Senate Select Committee, in deference to their Housecolleague's 
concerns, agreed to amend the provision to express a sense of the 
Congress that Members of Congress have equal standing with officials of 
the Executive Branch to receive classified information so that Congress 
may carry out its oversight responsibilities.
    The managers' decision not to include section 306 of the 
Senate bill in the conference report, however, was not intended 
by either body to be interpreted as agreement with the 
Administration's position on whether it is constitutional for 
Congress to legislate on this subject matter. The managers' 
actions were also not to be interpreted as expressing agreement 
with the opinion of the Justice Department's Office of Legal 
Counsel, which explicitly stated that only the President may 
determine when Executive Branch employees may disclose 
classified information to Members of Congress. The managers 
asserted in their Conference Report that members of 
congressional committees have a need to know information, 
classified or otherwise, that directly relates to their 
responsibility to conduct vigorous and thorough oversight of 
the activities of the executive departments and agencies within 
their committees' jurisdiction. Therefore, the President may 
not assert an unimpeded authority to determine otherwise.
    While the managers recognized the Chief Executive's derived 
constitutional authority to protect sensitive national security 
information, they did not agree with the Administration that 
the authority is exclusive. Members of both committees also 
agreed that whatever the scope of the President's authority, it 
may not be asserted against Congress to withhold evidence of 
misconduct or wrongdoing and thereby impede Congress in 
exercising its constitutional legislative and oversight 
authority. Therefore, the managers committed to hold hearings 
on this issue and develop appropriate legislative solutions in 
the second session of the 105th Congress.
    The Senate Select Committee held public hearings on 
February 4 and 11, 1998 to examine the constitutional 
implications of legislation such as section 306. The Committee 
heard from constitutional scholars and legal experts on both 
sides of the issue. Mr. Randolph D. Moss, Deputy Assistant 
Attorney General from the Department of Justice Office of Legal 
Counsel, testified in support of the Administration's position 
that section 306 and any similar language represents an 
unconstitutional infringement on the President's authority as 
Commander in Chief and Chief Executive. Mr. Moss asserted the 
following:
    (A) The President, as Commander in Chief, Chief Executive, 
and sole organ of the Nation in its external relations has 
ultimate and unimpeded authority over the collection, 
retention, and dissemination of intelligence and other national 
security information.
    (B) Any congressional enactment that may be interpreted to 
divest the President of his ultimate control over national 
security information is an unconstitutional usurpation of the 
exclusive authority of the Executive.
    (C) The Senate's language vests lower-ranking personnel in 
the Executive Branch with a ``right'' to furnish such 
information to a Member of Congress without prior official 
authorization from the President or his delegee. Therefore, 
section 306 and any similar provision is unconstitutional.
    The Committee also heard Professor Peter Raven-Hansen, Glen 
Earl Weston Research Professor of Law from the George 
Washington University Law School, and Dr. Louis Fisher, Senior 
Specialist (Separation of Powers) from the Congressional 
Research Service, testify that the President's authority in 
this area is not exclusive. Hence, these experts believed that 
Congress already has authority to regulate the collection, 
retention, and dissemination of national security information. 
Professor Raven-Hansen and Dr. Fisher asserted the following:
    (A) A claim of exclusive authority must be substantiated by 
an explicit textual grant of such authority by the 
Constitution.
    (B) There is no express constitutional language regarding 
the regulation of national security information as it pertains 
to the President.
    (C) The President's authority to regulate national security 
information is an implied authority flowing from his 
responsibilities as Commander in Chief and Chief Executive.
    (D) As the regulation of national security information is 
implicit in the command authority of the President, it is 
equally implicit in the broad array of national security and 
foreign affairs authorities vested in the Congress by the 
Constitution. In fact, Congress has legislated extensively over 
a long period of time to require the President to provide 
information to Congress.
    (E) Congress may legislate in this area because the 
Executive and Legislative Branches share constitutional 
authority to regulate national security information.
    (F) The Supreme Court has never decided a case that 
specifically addressed this issue.
    (G) The provision is constitutional because it does not 
prevent the President from accomplishing his constitutionally 
assigned functions, and because any intrusion upon his 
authority is justified by an overriding need to promote 
objectives within the constitutional authority of Congress.
    The Committee found the last argument to be persuasive and 
determined that the Administration's intransigence on this 
issue compelled the Committee to act.
    Following the public hearing on February 11th, the 
Committee met to mark up a modified version of section 306. One 
amendment was offered by a member of the Committee and 
wasadopted unanimously. The bill was favorably reported from the 
Committee on February 23, 1998. The Senate considered the bill (S. 
1668) on March 9, 1998 and passed it on a roll call vote of 93 to one. 
The bill was sent to the House of Representatives and has yet to be 
considered by that body. Despite assurances by the Chairman and Ranking 
Member of the Permanent Select Committee on Intelligence of the House 
of Representatives, the HPSCI has not, as of this printing, held a 
hearing or met to consider similar legislation. Therefore, in light of 
the relatively short legislative calendar in this session, the 
Committee has included this provision in order to give the House of 
Representatives another opportunity to consider the benefits of this 
type of legislation.
    This bill as passed by the U.S. Senate is contained in 
title V of this bill and is explained in the section by section 
analysis.

              SECTION-BY-SECTION ANALYSIS AND EXPLANATION

                    TITLE I--INTELLIGENCE ACTIVITIES

Sec. 101. Authorization for appropriations

    Section 101 lists departments, agencies, and other elements 
of the United States Government for whose intelligence and 
intelligence-related activities the Act authorizes 
appropriations for fiscal year 1999.

Sec. 102. Classified schedule of authorizations

    Section 102 makes clear that the details of the amounts 
authorized to be appropriated for intelligence and 
intelligence-related activities and personnel ceilings for the 
entities listed in section 101 for fiscal year 1999 are 
contained in a classified Schedule of Authorizations. The 
Schedule of Authorizations is incorporated into the Act by this 
section.

Sec. 103. Personnel ceiling adjustments

    Section 103 authorizes the Director of Central 
Intelligence, with the approval of the Director of the Office 
of Management and Budget, in fiscal year 1999 to exceed the 
personnel ceilings applicable to the components of the 
Intelligence Community under section 102 by an amount not to 
exceed 2 percent of the total of the ceilings applicable under 
section 102. The Director may exercise this authority only when 
necessary to the performance of important intelligence 
functions or to the maintenance of a stable personnel force, 
and any exercise of this authority must be reported to the two 
intelligence committees of the Congress.

Sec. 104. Community management account

    Section 104 provides certain details concerning the amount 
and composition of the Community Management Account (CMA) of 
the Director of Central Intelligence.
    Subsection (a) authorizes appropriations in the amount of 
$138,623,000 for fiscal year 1999 for the staffing and 
administration of various components under the CMA. Subsection 
(a) also authorizes funds identified for the Advanced Research 
and Development Committee and the Environmental Intelligence 
and Applications Program to remain available for two years.
    Subsection (b) authorizes a total of 283 full-time 
personnel for elements within the CMA for fiscal year 1999 and 
provides that such personnel may be permanent employees of the 
CMA element or detailed from other elements of the United 
States Government.
    Subsection (c) explicitly authorizes the classified portion 
of the CMA.
    Subsection (d) requires that personnel be detailed on a 
reimbursable basis, with certain exceptions.
    Subsection (e) authorizes $27,000,000 of the amount 
authorized for the CMA under subsection (a) to be made 
available for the National Drug Intelligence Center (NDIC) in 
Johnstown, Pennsylvania. Subsection (c) requires the Director 
of Central Intelligence to transfer the $27,000,000 to the 
Department of Justice to be used for NDIC activities under 
authority of the Attorney General, and subject to section 
103(d)(1) of the National Security Act. The Committee has also 
restricted the transfer of the funds authorized in subsection 
(e) pending the receipt by the congressional intelligence 
committees of a report mandated in the Intelligence 
Authorization Act for Fiscal Year 1998.

 TILE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM

Sec. 201. Authorization of appropriations

    Section 201 authorizes appropriations in the amount of 
$201,500,000 for fiscal year 1999 for the Central Intelligence 
Agency Retirement and Disability Fund.

                     TITLE III--GENERAL PROVISIONS

Sec. 301. Increase in employee compensation and benefits authorized by 
        law

    Section 301 provides that appropriations authorized by the 
conference report for salary, pay, retirement and other 
benefits for federal employees may be increased by such 
additional orsupplemental amounts as may be necessary for 
increases in such compensation or benefits authorized by law.

Sec. 302. Restriction on conduct of intelligence activities

    Section 302 provides that the authorization of 
appropriations by the conference report shall not be deemed to 
constitute authority for the conduct of any intelligence 
activity which is not otherwise authorized by the Constitution 
or laws of the United States.

Sec. 303. Extension of application of sanctions laws to intelligence 
        activities

    Section 303 extends until January 6, 2000, the authority 
first granted by section 303 of the Intelligence Authorization 
Act for Fiscal Year 1996 for the President to delay the 
imposition of an economic, cultural, diplomatic, or other 
sanction upon his determination that proceeding with the 
sanction could compromise an ongoing criminal investigation or 
an intelligence source or method. This authority was extended 
until January 6, 1998, by section 304 of the Intelligence 
Authorization Act for Fiscal Year 1997, and again until January 
6, 1999, by section 304 of the Intelligence Authorization Act 
for Fiscal Year 1998. There is a continuing need for this 
authority in the event that an automatic or immediate 
imposition of sanctions would seriously jeopardize a criminal 
investigation or sources and methods of intelligence 
collection.

Sec. 304. Extension of authority to engage in commercial activities as 
        security for intelligence collection activities

    Section 304 amends section 431(a) of title 10 to extend 
current Department of Defense authority to engage in commercial 
activities as security for intelligence collection activities 
until December 31, 2000.

Sec. 305. Modification of National Security Education Program

    Section 305 amends the David C. Boren National Security 
Education Act of 1991, by adding counter-proliferation studies 
as an area of primary emphasis in the Act. Section 305 
substitutes the Secretary of Energy for the Director of the 
United States Information Service as a Member of the National 
Security Education Board, which continues to include the 
Secretaries of Defense, Education, State, and Commerce, and the 
Director of Central Intelligence.

Sec. 306. Technical amendments

    Section 306 makes technical corrections to section 5(a)(1) 
and section 6 of the Central Intelligence Agency (CIA) Act of 
1949 and section 201(c) of the CIA Retirement Act. The cross-
reference in section 5(a)(1) of the CIA Act to subparagraphs 
(B) and (C) of section 102(a)(2) of the National Security Act 
is no longer current or accurate, and should cite instead to 
subsections (a)(2) and (a)(3) of section 102. Section 805(a) of 
the Intelligence Authorization Act for Fiscal Year 1997 (Pub. 
L. No. 104-293) changed what had been sections 102 (a)(2)(B) 
and (C) of the National Security Act to sections 102 (a)(2) and 
(a)(3) of the Act. Similarly, the cross-references in section 5 
(a)(1) and section 6 of the CIA Act to ``subsection (c)(5) of 
section 103'' and to ``section 103 (c)(5) of the National 
Security Act of 1947 (50 U.S.C. Sec. 403-3 (c)(5));'' 
respectively, are no longer current or accurate. The cross-
reference in section 201 (c) of the CIA Retirement Act to that 
same provision of the National Security Act is also outdated. 
Section 807 (a)(2) of the Intelligence Authorization Act for 
Fiscal Year 1997 changed what had been section 103 (c)(5) to 
section 103 (c)(6) (50 U.S.C. Sec. 403-3 (c)(6)). Section 401 
of the present legislation simply updates the cross-references 
in section 5 (a)(1) and section 6 of the CIA Act and section 
201 (c) of the CIA Retirement Act to the pertinent provision of 
the National Security Act.

                 TITLE IV--CENTRAL INTELLIGENCE AGENCY

Sec. 401. Extension of separation pay program for voluntary separation 
        of CIA employees

    Section 401 amends section 2(f) of the CIA Voluntary 
Separation Pay Act, Public Law 103-36, 50 U.S.C. Sec. 403-4 
note, to extend the Agency's authority to offer separation 
incentives until September 30, 2001. Without this amendment, 
the Agency's authority to offer such incentives would expire on 
September 30, 1999.
    The net impact of the six CIA ``early out'' exercises thus 
far, along with normal attrition and reduced hiring, has been a 
significant drop in the Agency's on-duty strength since the 
separation incentive program began in FY 1993. However, rapid 
worldwide technological change and increasing concern about 
such diverse issues as international terrorism, proliferation, 
drug trafficking, and political instability require the Agency 
to do more to address the skills mix of the Agency population.
    The Agency must continue to reduce or eliminate outdated 
professions, accelerate the transfer of resources from support 
to mission-critical work, and hire people with state-of-the-art 
skills. Voluntary Separation Incentive Pay authority--used for 
specific, targeted populations--will help the CIA achieve those 
goals without resorting to involuntary separations in certain 
occupational categories. The incentive pay would be targeted 
principally at individuals in outdated occupations and skill 
categories who would not be separating via regular attrition or 
switching to another work area after retraining.
    Incentive authority through the year 2001 will help enable 
the Agency to ensure its workforce has the right skills in the 
right areas at the right time.

Sec. 402. Additional duties for Inspector General of Central 
        Intelligence Agency

    Section 402 gives the CIA Office of Inspector General (OIG) 
responsibility to review and comment in the Inspector General's 
(IG) semiannual reports on existing and proposed legislation 
relating to programs and operations of the Agency. Review and 
comment by the IG on legislation will complement the IG's 
responsibility to promote economy and efficiency in Agency 
programs and operations and will be useful to the DCI and the 
intelligence committees of Congress as an independent source of 
analysis.
    This function enables the IG to express OIG's views 
concerning the impact of legislation on the economy and 
efficiency of Agency activities and the prevention and 
detection of fraud in such activities. While such a function is 
implicit in the broad mandate of the Inspector General, the 
Committee believes that authority for legislative review should 
be recognized explicitly in the statute.

       TITLE V--DISCLOSURE OF CLASSIFIED INFORMATION TO CONGRESS

Sec. 501. Encouragement of disclosure of certain information to 
        Congress

    Section 501 is divided into subsections (a) through (d). 
Subsection (a)(1) directs the President to take appropriate 
actions to inform the employees of agencies covered in 
subsection (d) and employees of contractors of such agencies 
that the disclosure of information described in paragraph (2) 
to individuals referred to in paragraph (3) is not prohibited 
by law, executive order, or regulation or otherwise contrary to 
public policy. In other words, the President is directed to 
inform ``covered employees'' that it will not be considered an 
``unauthorized disclosure'' if they provide certain information 
to Congress, if that information is provided to the appropriate 
member and the information falls within the specified 
categories.
    Subsection (a)(1) does not, however, define the means by 
which the President must implement this direction. The 
Committee refrained from expressly stating the types of actions 
that the President should take as we have in previous measures. 
See, e.g., Counterintelligence and Security Enhancements Act of 
1994, Pub. L. No. 103-359, title VIII, Sec. 802(a), 108 Stat. 
3435 (1994). The Committee has intentionally allowed the 
President a great deal of latitude to implement this 
legislation. The Committee does not, however, intend this 
permissive approach to be interpreted as license ity to promote 
economy and efficiency in Agency programs and operations and 
will be useful to the DCI and the intelligence committees of 
Congress as an independent source of analysis.
    This function enables the IG to express OIG's views 
concerning the impact of legislation on the economy and 
efficiency of Agency activities and the prevention and 
detection of fraud in such activities. While such a function is 
implicit in the broad mandate of the Inspectuch information. 
This language is consistent with the argument propounded by the 
Administration in a brief that it filed in the Supreme Court in 
1989. See Brief for Appellees, American Foreign Service 
Association v. Garfinkel, 488 U.S. 923 (1988) (No. 87-2127). In 
the Garfinkel brief the Department of Justice stated that ``the 
President has uniformly limited access to classified 
information to persons who have a need to know the particular 
information, such as a congressional committee having specific 
jurisdiction over the subject matter.'' Id at 16 (emphasis 
added).
    Paragraph (1)(C) is intended to ensure that members receive 
information only in their capacity as a member of the committee 
concerned. The Committee is adamant that any information 
received by a member of one of the appropriate committees be 
protected in accordance with that committee's rules for 
safeguarding classified material and be reported to the 
committee's leadership. Accordingly, a member is not free to 
accept covered information as a member of a committee 
unrestrained by such rules or to withhold knowledge of the 
information from the committee's leadership. The various 
national security committees enjoy a long history of trust with 
the Executive Branch and that record will be continued.
    Paragraph (2) defines the type of information that an 
employee may bring to Congress. It is intended to cover all 
information in the covered categories, including classified 
information. Paragraphs (2)(A) and (C) are taken nearly 
verbatim from the text of the ``Whistle Blower Protection Act'' 
and are intended to have the same meaning. See 5 U.S.C. 
Sec. 2302(b)(8)(A)(i)-(ii) (1994 & Supp. II 1996). The 
Committee did slightly narrow the language, however, to cover 
only flagrant abuses of authority. The Committee intended to 
address only those abuses that are so objectionable as to 
warrant the attention of Congress.
    Paragraph (2)(B) is not found in the ``whistle blower'' 
statute and was added to ensure that information pertaining to 
a false statement to Congress is brought to our attention. In 
the interest of legislative efficiency, however, the Committee 
is most concerned with those false statements that pertain to 
an issue of material fact. The material facts of an issue are 
those facts that a reasonable person would consider important 
in reviewing that particular issue. Congress depends on the 
accuracy of the information provided to it, and when our 
oversight is based on false information, we must be made aware 
of it even if the President would prefer to withhold the fact 
that false information has been provided.
    Paragraph (3) refers to the individuals to whom information 
described in paragraph (2) may be disclosed. Although the 
Senate Select Committee on Intelligence is composed, inter 
alia, of members from the Committee on Appropriations, Armed 
Services, and the Judiciary, we recognize that those committees 
share jurisdiction with this Committee and each has as 
itsprimary responsibilities the oversight of some of the department, 
agencies or elements of the Federal Government to which such 
information relates. As noted earlier, the individuals to whom 
information may be disclosed was narrowed significantly from section 
306 of the Intelligence Authorization Act of Fiscal Year 1998 to 
further ensure the protection of the information.
    Paragraph (4) recognizes the inviolability of the rule of 
secrecy in grand jury proceedings. The Committee does not 
intend this legislation to circumvent the obligation of secrecy 
imposed by Rule 6(e) of the Federal Rules of Criminal Procedure 
and therefore paragraph (1)(A) does not apply to such 
information. The Committee does not believe, however, that 
disclosures to Congress fall under the rubric or other statutes 
that prohibit the disclosure of certain information. The 
Congress is an entity of the federal government and is capable 
of protecting such information in the same manner as an 
executive agency or department. Accordingly, the Committee does 
not view a disclosure to Congress as a disclosure outside of 
the government.
    Subsection (b) directs the President to submit a report to 
Congress on the actions taken under subsection (a). The 
Committee expects to see a report that describes any procedures 
established or guidance given to the various agencies, 
departments, or elements. If the President gives wide 
discretion to agency heads, the Committee would also like the 
report to address how each agency or department has implemented 
this legislation.
    Section (c) is intended to protect the integrity of other 
reporting requirements enacted into relevant law.
    Section (d) defines the covered agencies. These are the 
agencies exempted from the ``whistle blower'' statute. See 5 
U.S.C. Sec. 2302(a)(2)(C)(ii) (1994 & Supp. II 1996).

      TITLE VI--FOREIGN INTELLIGENCE AND INTERNATIONAL TERRORISM 
                             INVESTIGATIONS

Sec. 601. Pen registers and trap and trace devices in foreign 
        intelligence and international terrorism investigations

    Section 601 amends the Foreign Intelligence Surveillance 
Act of 1978, 50 U.S.C. Sec. 1802, et seq. (FISA) to authorize 
pen registers and trap and trace devices in foreign 
intelligence and international terrorism investigations being 
conducted by the FBI under guidelines approved by the Attorney 
General. In particular, it authorizes FISA judges to issue a 
pen register or a trap and trace order upon a certification 
that the information sought is relevant to such an ongoing 
investigation.
    The amendment allows the use of pen registers and trap and 
trace devices in foreign intelligence and international 
terrorism investigations. Although such devices can be utilized 
at present, current procedures do not reflect changes in the 
law since FISA was enacted. Before the use of such device 
today, the complete FISA predicate for actual interception of 
the oral or verbal contents on the communication itself must be 
satisfied. That predicate is designed to satisfy strict 
constitutional requirements or the conduct of a ``search'' 
within the meaning of the Fourth Amendment. However, and 
subsequent to passage of FISA in 1978, the Supreme Court held 
in Smith v. Maryland, 442 U.S. 735 (1979), that accessing 
numbers dialed to contact another communications facility is 
not a Fourth Amendment ``search''. Thus, current procedures 
impose a standard that is more rigorous than the constitution 
requires. Section 501 establishes a predicate for the use of 
pen registers or trap and trace devices that is consistent with 
that opinion and is analogous to the statutory standard for the 
use of these devices in criminal investigations. This authority 
is necessary in order to permit, as is the case in criminal 
investigations, the use of this very valuable investigative 
tool at the critical early stages of foreign intelligence and 
international terrorism investigations.
    Unlike the criminal standard, however, this section 
requires substantially more than mere ``relevance'' to an 
ongoing investigation see 18 U.S.C. Sec. 3122(b)(2). In 
addition to relevancy, the government must also demonstrate 
that the telephone line involved has been or is about to be 
used in communication with an international terrorist or a 
person engaged in clandestine intelligence activities that may 
involve a violation of law.
    Each application must also be approved by the Attorney 
General or a designated attorney for the Government, with 
certification by the Federal Bureau of Investigation that the 
underlying investigation is being conducted under guidelines 
approved by the Attorney General. It is the committees 
understanding that the ``designated attorney'' for the 
Government will be the Counsel for Intelligence Policy in the 
Department of Justice. Further delegation of this authority 
should be done only after the committee is briefed on the 
compelling need for it.
    Applications must be submitted to the Foreign Intelligence 
Surveillance Court established by FISA; however, the section 
also allows the designation of Federal magistrates to hear 
applications for and grant orders approving the installation 
and use of pen registers or trap and trace devices. This 
procedure will possibly permit these applications to be heard 
in a more timely manner and is an appropriate analog to that 
used in criminal investigations. The committee expects that the 
exercise of this new authority will be carefully monitored by 
the Justice Department, and that no magistrates will be 
designated to hear applications until the committee is briefed 
on the compelling need to do so, which could be demonstrated, 
for example, by the number of applications presented to the 
FISA Court under this new procedure.
    Upon request of the applicant, the order authorizing the 
use of such devices can require that the provider of a wire or 
electronic communication service, landlord, custodian, or other 
person not disclose the existence of the investigation or of 
the pen register until ordered by the Court. The order can also 
direct hat any records concerning the pen register or trap and 
trace device held by such persons be maintained under security 
procedures approved by the Attorney General and the Director of 
Central Intelligence. These two provisions are identical to 
existing FISA provisions regarding electronic surveillance and 
are necessary to protect the FBI's foreignintelligence 
investigations from disclosure to hostile powers or international 
terrorist organizations. In addition, the new section includes 
restrictions or the use of information and the requirement for 
continuing congressional oversight, similar to provisions in Sec. 106 
and 107 of the FISA.

Sec. 602. Access to certain business records for foreign intelligence 
        and international terrorism investigations

    Section 602 also amends the Foreign Intelligence 
Surveillance Act (FISA) by giving the Federal Bureau of 
Investigation, in conducting foreign intelligence and 
international terrorism investigations, authority to apply for 
court orders to obtain records to common carriers, hotels, 
communications providers, and storage facilities.
    Under existing criminal law, grand jury subpoenas may be 
issued, and the Attorney General has delegated authority to 
certain Federal agencies in narcotics investigations to issue 
administrative subpoenas. No analogue to these authorities 
exists in foreign intelligence and international terrorism 
investigations. When the FBI seeks common carrier records 
relating to the clandestine activities of an agent of a foreign 
power or an international terrorist, compliance is voluntary, 
and some entities have chosen not to cooperate.
    This new section requires that any or all of the four 
entities (common carrier, hotel, communications provider, and/
or storage facility) comply with a court order based on the 
certification by the FBI that the records are sought for 
foreign intelligence purposes, and that there are specific and 
articulable facts giving reason to believe that the person to 
whom the records pertain is a foreign power or an agent of a 
foreign power.
    The section also requires that any or all of the four 
covered entities not disclose the fact that the FBI has sought 
or obtained the records in question. This is necessary to 
protect the existence of the investigation from hostile foreign 
powers or international terrorist groups.
    The terms ``common carrier,'' public accommodation 
facility,'' ``physical storage facility,'' and ``vehicle rental 
facility'' are defined. These are the four entities where the 
greatest need for compulsory access exists because of their 
frequent use by subjects of FBI foreign intelligence and 
international terrorism investigations.
    In additional, the section includes provisions for 
continuing congressional oversight. The committee feels 
strongly that these provisions are necessary to insure that 
these new authorities are carefully executed.

                            committee action

    On May 7, 1998 the Select Committee on Intelligence 
approved the bill and ordered that it be favorably reported.

                           estimate of costs

    Pursuant to paragraph 11(a) of rule XXVI of the Standing 
Rules of the Senate, the estimated costs incurred in carrying 
out the provisions of this bill, for fiscal year 1999, are set 
forth in the classified annex to this bill. Estimates of the 
costs incurred in carrying out this bill in the five fiscal 
years thereafter are not available from the Executive Branch, 
and therefore the Committee deems it impractical, pursuant to 
paragraph 11(a)(3) of rule XXVI of the Standing Rules of the 
Senate, to include such estimates in this report.

                    evaluation of regulatory impact

    In accordance with paragraph 11(b) of rule XXXVI of the 
Standing Rules of the Senate, the Committee finds that no 
regulatory impact will be incurred by implementing the 
provisions of this legislation.

                        changes in existing law

    In the opinion of the Committee, it is necessary to 
dispense with the requirements of section 12 of rule XXVI of 
the Standing Rules of the Senate in order to expedite the 
business of the Senate.