Senate approves intelligence reform bill

The Senate Wednesday afternoon voted to clear the measure overhauling intelligence operations, culminating a dramatic turnaround for a bill that had appeared dead only to be resuscitated by compromise and lobbying from the White House and families of victims of the Sept. 11, 2001, terrorist attacks.

The House passed the measure Monday on a 336-75 vote, so it now heads to President Bush for his signature.

"We are rebuilding a structure that was designed for a different enemy at a different time, a structure that was designed for the Cold War and has not proved agile enough to deal with the threats of the 21st century," said Senate Governmental Affairs Committee Chairwoman Susan Collins, R-Maine.

Senate Intelligence Committee Chairman Pat Roberts, R-Kan., promised senators who were uneasy with the legislation that his committee would "need to nurture this new intelligence structure over the years" through the intelligence reauthorization process.

Senate Armed Services Committee ranking member Carl Levin, D-Mich., who refused to sign the intelligence conference report, said today he would vote for the bill, but not before voicing his objections to language excluded from it because of White House opposition.

Levin said the rejected Senate language would have given Congress the ability to hear "unvarnished testimony" from witnesses who do not have to first clear their statements with the White House. Levin also said other deleted language would have created a national intelligence director with more independence from the White House.

Levin said past administrations, including those involved in the Vietnam and Iraq, have "shaped and distorted [intelligence] to support administration policies." Levin said of those and other omissions, "It seems to me the bill is weakened as a result."

Sen. Robert Byrd, D-W.Va., also raised his concerns about the legislation, which he said he would vote against.

Collins and Governmental Affairs ranking member Joseph Lieberman, D-Conn. -- who together led a bipartisan effort to pass the legislation -- said that the bill largely would reflect the 41 recommendations made by the 9/11 Commission by creating a national intelligence director with strong budgetary authority, a national counterterrorism center, an independent civil liberties board and provisions to ensure the nation's 15 intelligence agencies better share information to prevent another terrorist attack.

But House Judiciary Committee Chairman James Sensenbrenner Wednesday kept up his fight against the bill, even after it was approved by the House Tuesday night. Sensenbrenner fought to the bitter end for provisions to ban states from giving drivers' licenses to illegal immigrants and to mandate stricter criteria for immigrants claiming asylum. He said he would offer the two items as stand-alone legislation on the first day of next year's session.

"We'll have this teed up for the first must-pass legislation," said Sensenbrenner, referring to a promise made by House Speaker Hastert and Majority Leader DeLay to include the items on the first legislation to be voted on by the House next year.

Sensenbrenner said the items should not be included in immigration overhaul legislation President Bush would like to craft next year because immigration change should not be "mixed up" with national security issues.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.