Page:United States Statutes at Large Volume 113 Part 1.djvu/964

This page needs to be proofread.

113 STAT. 940 PUBLIC LAW 106-65—OCT. 5, 1999 (1) the theft of sophisticated United States nuclear weapons design information; and (2) the targeting by the People's Republic of China of United States nuclear weapons codes and other national security information of strategic concern. Deadline. (b) INITIAL REPORT.—The first report under this section shall be transmitted not later than March 1, 2000. 42 USC 7383f. SEC. 3152. REPORT ON COUNTERINTELLIGENCE AND SECURITY PRAC- TICES AT NATIONAL LABORATORIES. Deadline. (a) IN GENERAL.— Not later than March 1 of each year, the Secretary of Energy shall submit to the Congress a report for the preceding year on counterintelligence and security practices at the facilities of the national laboratories (whether or not classified activities are carried out at the facility). (b) CONTENT OF REPORT.— The report shall include, with respect to each national laboratory, the following: (1) The number of employees, including full-time counterintelligence and security professionals and contractor employees. (2) A description of the counterintelligence and security training courses conducted and, for each such course, any requirement that employees successfully complete that course. (3) A description of each contract awarded that provides an incentive for the effective performance of counterintelligence or security activities. (4) A description of the requirement that an employee report the travel to sensitive countries of that employee (whether or not the travel was for official business). (5) The number of trips by individuals who traveled to sensitive countries, with identification of the sensitive countries visited. 42 USC 7383g. SEC. 3153. REPORT ON SECURITY VULNERABILITIES OF NATIONAL LABORATORY COMPUTERS. Deadline. (a) REPORT REQUIRED,—Not later than March 1 of each year, the National Coimterintelligence Policy Board shall prepare a report on the security vulnerabilities of the computers of the national laboratories. (b) PREPARATION OF REPORT. —In preparing the report, the National Counterintelligence Policy Board shall establish a so-called "red team" of individuals to perform an operational evaluation of the security vulnerabilities of the computers of one or more national laboratories, including by direct experimentation. Such individuals shall be selected by the National Counterintelligence Policy Board from among employees of the Department of Defense, the National Security Agency, the Central Intelligence Agency, the Federal Bureau of Investigation, and of other agencies, and may be detailed to the National Counterintelligence Policy Board from such agencies without reimbursement and without interruption or loss of civil service status or privilege. (c) SUBMISSION OF REPORT TO SECRETARY OF ENERGY AND TO Deadline. FBI DIRECTOR.— Not later than March 1 of each year, the report shall be submitted in classified and unclassified form to the Secretary of Energy and the Director of the Federal Bureau of Investigation. Deadline. (d) FORWARDING TO CONGRESSIONAL COMMITTEES. — Not later than 30 days after the report is submitted, the Secretary and