[Congressional Record Volume 159, Number 107 (Wednesday, July 24, 2013)]
[House]
[Pages H5002-H5031]


             DEPARTMENT OF DEFENSE APPROPRIATIONS ACT, 2014

[...]

                 Amendment No. 99 Offered by Mr. Pompeo

  The Acting CHAIR. It is now in order to consider amendment No. 99 
printed in House Report 113-170.
  Mr. POMPEO. Mr. Chairman, I rise as the designee of Mr. Nugent to 
offer the Nugent amendment.


                        Parliamentary Inquiries

  Mr. POLIS. Mr. Chairman, I have a point of parliamentary inquiry.
  The Acting CHAIR. The gentleman may state his parliamentary inquiry.
  Mr. POLIS. Mr. Chairman, is it in order for a designee to offer an 
amendment on behalf of its sponsor on this bill?
  The Acting CHAIR. Would the gentleman please restate the 
parliamentary inquiry.
  Mr. POLIS. Mr. Chairman, is it in order for a designee to offer an 
amendment on behalf of its sponsor on this rule?
  The Acting CHAIR. Under the terms of House Report 113-170, the named 
sponsor of an amendment may name a designee.
  Mr. POLIS. Mr. Chairman, point of further parliamentary inquiry.
  The Acting CHAIR. The gentleman may state his inquiry.
  Mr. POLIS. Does the gentleman from Kansas have a formal designation 
of the gentleman from Florida (Mr. Nugent)?
  The Acting CHAIR. The Chair has been made aware that the gentleman 
from Kansas is the designee of the gentleman from Florida.
  Mr. POLIS. I thank the Chair.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of the bill (before the short title), add the 
     following:
       Sec. __. None of funds made available by this Act may be 
     used by the National Security Agency to--
       (1) conduct an acquisition pursuant to section 702 of the 
     Foreign Intelligence Surveillance Act of 1978 for the purpose 
     of targeting a United States person; or
       (2) acquire, monitor, or store the contents (as such term 
     is defined in section 2510(8) of title 18, United States 
     Code) of any electronic communication of a United States

[[Page H5022]]

     person from a provider of electronic communication services 
     to the public pursuant to section 501 of the Foreign 
     Intelligence Surveillance Act of 1978.

  The Acting CHAIR. Pursuant to House Resolution 312, the gentleman 
from Kansas (Mr. Pompeo) and a Member opposed each will control 7\1/2\ 
minutes.
  The Chair recognizes the gentleman from Kansas.
  Mr. POMPEO. Mr. Chairman, the amendment I offer this evening 
clarifies and confirms the scope of two programs that Mr. Snowden 
illegally exposed while sitting in a hotel room in Communist China.
  First, the amendment clarifies that under section 702 no U.S. citizen 
or person in the U.S. can be targeted, period. I say again, no U.S. 
person under section 702 may be targeted in any way by the United 
States Government. While there are other specific authorities the U.S. 
person may be subject to an investigation, the U.S. Government may not 
do so under section 702. That's what this amendment intends to clarify.
  The second part of the amendment clarifies section 215, also known as 
section 501 of FISA. The amendment clarifies that no content of 
communications can be stored or collected by the National Security 
Agency--that's no emails, no video clips, no Skype. No record of the 
actual conversation or the contents thereof may be recorded or 
collected by the National Security Agency. I can't repeat that enough. 
That's the intent of this amendment.
  I want to make clear to everyone that, contrary to the suggestions of 
some, the NSA has not been acting outside of the scope of its 
authorities. The Meta-Data program is carefully designed with program 
layers of oversight by all three branchs of government. This is 
precisely the way our government ought to operate, with input from 
Article I and Article II and Article III of the United States 
Constitution.
  It is, of course, our duty to ensure that the NSA stays within these 
legal bounds here in Congress, and this amendment makes those 
boundaries perfectly clear for everyone to know and understand.
  And we shouldn't mislead the American people into thinking that the 
NSA has been acting illegally. There is perhaps no program in the 
United States Government that is as carefully monitored and overseen as 
the programs this amendment attempts to clarify.
  To the extent that some in this Chamber wish to review or provide 
more protections and controls for these programs, we should proceed 
through a carefully considered and debated legislative process so that 
the full implications for our security are clearly understood.
  Mr. Chairman, I reserve the balance of my time.
  Mr. VISCLOSKY. Mr. Chairman, I rise in opposition to the amendment.
  The Acting CHAIR. The gentleman from Indiana is recognized for 7\1/2\ 
minutes.

                              {time}  1745

  Mr. VISCLOSKY. Mr. Chair, I yield 1\1/2\ minutes to the gentleman 
from New York (Mr. Nadler).
  Mr. NADLER. Mr. Chairman, this amendment has been described and 
offered as an alternative to the Amash-Conyers amendment that we will 
consider next. It is not.
  This amendment restates the existing ban on the intentional targeting 
of United States persons under section 702. It also places into law for 
the next fiscal year the Obama administration's current ban on 
collecting the contents of the communications of U.S. persons under 
section 215. I agree with these prohibitions. But they have nothing to 
do with the current misuse of section 215 to engage in the 
suspicionless, bulk collection of Americans' telephone records.
  The dragnet collection under section 215 telephone metadata program 
reveals call information--including all numbers dialed, all incoming 
phone numbers and call duration--but not the content of communications. 
Therefore, this amendment would have no impact whatsoever on this 
misuse of section 215. Metadata reveals highly personal and sensitive 
information, including, for example, when and how often one calls the 
doctor, a journalist, or the local Tea Party or ACLU affiliate. By 
tracing the pattern of calls, the government can paint a detailed 
picture of anyone's personal, professional, and political associations 
and activities.
  Congress never authorized this type of unchecked, sweeping 
surveillance of our citizens. It is this problem--the indiscriminate, 
bulk collection of metadata under section 215--that we need to fix 
right now.
  The Amash-Conyers amendment does so by restoring the required 
reasonable relationship between the collection of records and specific 
persons being investigated under section 215. The Amash-Conyers 
amendment ensures that this standard is not ignored by the 
administration or by the FISA Court, as is happening now.
  This amendment does not fix the problem with 215. The Amash-Conyers 
amendment does. However you vote on this amendment, and I intend to 
vote in favor of it, it is imperative that we also vote in favor of the 
Amash-Conyers amendment because this amendment, although doing no harm, 
does not solve the problems that Congress and Mr. Sensenbrenner and 
many others have articulated with respect to the misuse of section 215 
of the PATRIOT Act.
  Mr. POMPEO. Mr. Chairman, I reserve the balance of my time.
  Mr. VISCLOSKY. Mr. Chairman, I yield 3 minutes to the gentleman from 
Texas (Mr. Thornberry).
  Mr. THORNBERRY. I thank the gentleman from Indiana for yielding, and 
I thank the gentleman from Kansas for offering this amendment, because 
it helps focus on what concerns most Americans and it clarifies what 
really is and is not happening.
  Mr. Chairman, sometimes it is a challenge for those of us on the 
Intelligence Committee to talk openly about this--even the safeguards--
in some of these programs. But this amendment helps make it clear and 
reassures Americans about some of the things they may have read or 
heard that is occurring with NSA. But at the same time, this amendment 
is not an overreaction that actually increases the danger that 
Americans face from terrorism around the world.
  This amendment says clearly that NSA cannot acquire information for 
the purpose of targeting Americans, and it says clearly that NSA may 
not acquire, monitor, or store the content of the communication of any 
Americans.
  I think the key point that Members need to know is there are multiple 
layers of safeguards to make sure that these programs operate exactly 
in the way that the FISA Court has laid them out to operate.
  The Intelligence Committees of both the House and Senate do a 
considerable amount of oversight, get regular reports. Even if somebody 
accidentally punches a ``2'' versus a ``3'' on their keyboard, we get a 
report about that. And it even goes so far as members of the 
Intelligence Committee can go sit next to the analysts and watch what 
they are doing.
  But it is not just the Intelligence Committees. The FISA Court has 
oversight of the same sorts of reports. They can change the guidelines 
that it operates under. But in addition to that, there are internal 
inspector general monitoring of these. So you get every branch of 
government involved in making sure that the safeguards are in place and 
those same safeguards will be in place to make sure that the provisions 
of the gentleman's amendment are followed as well.
  Some, however, Mr. Chairman, would do away with these programs. No 
amount of safeguards are good for them. But they never say what would 
replace them, they never say what would fill the gap in meeting our 
responsibilities to defend Americans. They would just have them go 
away, and I guess assume that somehow or other that Americans could be 
made safe.
  The truth is, we had been incredibly successful and somewhat lucky 
since 9/11 as far as preventing further terrorist attacks on our 
homeland. That is because of the work of the military, intelligence 
professionals, law enforcement and, as I say, a fair amount of luck.
  But these programs at NSA have made a crucial contribution to that 
success over the last decade. It seems to me it would be foolhardy to 
toss them away, as some would want to do.
  I think this amendment strikes the right approach. I also believe, 
Mr. Chairman, The Wall Street Journal makes a good point in today's 
editorial when it says:


[[Page H5023]]


       The last thing Congress should do is kill a program in a 
     rush to honor the reckless claims of Mr. Snowden and his 
     apologists.

  Mr. POMPEO. Mr. Chairman, I am happy to yield 3 minutes to the 
ranking member of the House Intelligence Committee, the gentleman from 
Maryland (Mr. Ruppersberger).
  Mr. RUPPERSBERGER. Thank you, Mr. Pompeo.
  Mr. Chairman, I rise in support of the Pompeo amendment.
  This amendment strongly reaffirms that in America, privacy and 
security must coexist together. This amendment states in no uncertain 
terms that the government cannot use section 702 of the Foreign 
Intelligence Surveillance Act, FISA, to intentionally target an 
American for surveillance.
  This important amendment also reaffirms that phone conversations 
cannot be collected through section 215 of the PATRIOT Act. It makes 
the intentions of Congress very clear.
  I believe the Pompeo amendment makes a powerful statement that NSA 
cannot target Americans for the collection or listen to their phone 
calls. I urge my colleagues to vote ``yes.'' However, I do understand 
the concerns of the American people and of Congress when it comes to 
these programs.
  On the House Intelligence Committee, we are reviewing and evaluating 
potential ways to change the FISA Act that will provide the 
intelligence community with the tools it needs to keep our country safe 
while also protecting privacy and civil liberties. We are committed to 
having this important discussion. However, I do have concerns about the 
amendment we will debate next.
  The Amash amendment is an on/off switch for section 215 of the 
PATRIOT Act. It will have an immediate operational impact and our 
country will be more vulnerable to terrorist attacks. This authority 
has helped prevent terrorist attacks on U.S. soil. A planned attack on 
the New York City subway system was stopped because of section 215.

  But the Amash amendment passes this authority and it will end it. 
This amendment goes too far, too fast, on the wrong legislative 
vehicle. We need to debate the scope of this program, and we are, but 
this is an extreme knee-jerk reaction to the situation.
  This program has been authorized and reauthorized by Congress. It 
receives extensive oversight by the Intelligence Committee and is a 
vital tool for our intelligence community to protect our Nation. 
Remember, 9/11 happened in part because we failed to connect the dots. 
One of the critical tools we now have and use to connect those dots is 
section 215 of the PATRIOT Act. Remember, this is just phone records--
just phone numbers--no conversations.
  I respectfully urge a ``no'' vote on the Amash amendment and a 
``yes'' vote on the Pompeo amendment.
  Mr. VISCLOSKY. Mr. Chairman, I yield 2 minutes to the gentlewoman 
from the State of California (Ms. Lofgren).
  Ms. LOFGREN. Thank you, Mr. Visclosky.
  Mr. Chairman, I urge a ``no'' vote on the amendment. Why? Because it 
restates current law, and current law has been interpreted by the 
administration in a way that is, frankly, contrary to the intent of the 
crafters of the PATRIOT Act.
  Section 215 of the PATRIOT Act says that you can obtain information 
that is relevant to a national security investigation.
  Now, what has happened since Congress enacted that provision? It is a 
low bar, but under the NSA's interpretation, it is no bar at all. 
Because, as has been widely reported, they are collecting the 
information about every phone call made by every American. Clearly, 
that is not relevant to a terrorist investigation.
  I think it is important to note that business records that are the 
subject of 215 include a lot of sensitive information. What are 
business records? phone records? Internet records? credit card records? 
medical records? Are these things that we would voluntarily give up to 
the government? No. They are incredibly sensitive, and that's why they 
are being sought.
  I do think it is important to note that the amendment that will 
follow after this one doesn't end the ability of the government to 
pursue terrorism. We are all for that. It merely requires that the 
government adhere to the law, which requires that there be relevance to 
a terrorist investigation.
  I certainly do not challenge the motivation of the gentleman who has 
offered this amendment, but I do think if you think that this provides 
a remedy, then you are wrong. This provides a fig leaf.
  We should vote against it, and I hope that we will move on to the 
Amash amendment and solve the problem today.
  Mr. POMPEO. Mr. Chairman, I am prepared to close. I reserve the 
balance of my time.
  Mr. VISCLOSKY. Mr. Chairman, I yield back the balance of my time.
  Mr. POMPEO. Mr. Chairman, I would just like to correct a couple of 
things.
  This legislation is not a fig leaf. It is intended to clarify some 
things that have been said, some beliefs that people hold, about what 
section 215 authorizes and what section 702 authorizes.
  It is intended to make crystal clear to everyone here, as well as to 
the American public, the boundaries of these two important national 
security programs. These laws have been in place and interpreted by 
multiple administrations in the same way. There was no change in this 
law when this President came into office, and we should continue to 
support these programs regardless of who is the Commander in Chief for 
the United States.
  Mr. Chairman, I would ask my colleagues to support this amendment, 
and I yield back the balance of my time.
  The Acting CHAIR. The question is on the amendment offered by the 
gentleman from Kansas (Mr. Pompeo).
  The question was taken; and the Acting Chair announced that the ayes 
appeared to have it.
  Mr. POMPEO. Mr. Chairman, I demand a recorded vote.
  The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further 
proceedings on the amendment offered by the gentleman from Kansas will 
be postponed.


                 Amendment No. 100 Offered by Mr. Amash

  The Acting CHAIR. It is now in order to consider amendment No. 100 
printed in House Report 113-170.
  Mr. AMASH. Mr. Chairman, I have an amendment at the desk.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of the bill (before the short title), insert the 
     following new section:
       Sec. __.  None of the funds made available by this Act may 
     be used to execute a Foreign Intelligence Surveillance Court 
     order pursuant to section 501 of the Foreign Intelligence 
     Surveillance Act of 1978 (50 U.S.C. 1861) that does not 
     include the following sentence: ``This Order limits the 
     collection of any tangible things (including telephone 
     numbers dialed, telephone numbers of incoming calls, and the 
     duration of calls) that may be authorized to be collected 
     pursuant to this Order to those tangible things that pertain 
     to a person who is the subject of an investigation described 
     in section 501 of the Foreign Intelligence Surveillance Act 
     of 1978 (50 U.S.C. 1861).''.

  The Acting CHAIR. Pursuant to House Resolution 312, the gentleman 
from Michigan (Mr. Amash) and a Member opposed each will control 7\1/2\ 
minutes.
  The Chair recognizes the gentleman from Michigan.
  Mr. AMASH. Mr. Chairman, I yield myself 1 minute.
  We are here today for a very simple reason: to defend the Fourth 
Amendment, to defend the privacy of each and every American.
  As the Director of National Intelligence has made clear, the 
government collects the phone records without suspicion of every single 
American in the United States.
  My amendment makes a simple, but important change. It limits the 
government's collection of the records to those records that pertain to 
a person who is the subject of an investigation pursuant to section 
215.

                              {time}  1800

  Opponents of this amendment will use the same tactic that every 
government throughout history has used to justify its violation of 
rights--fear. They will tell you that the government must violate the 
rights of the American people to protect us against those who hate our 
freedoms. They will tell you there is no expectation of privacy in 
documents that are stored with a third party. Tell that to the American

[[Page H5024]]

people. Tell that to our constituents back home.
  We are here to answer one question for the people we represent: Do we 
oppose the suspicionless collection of every American's phone records?
  I reserve the balance of my time.
  Mr. YOUNG of Florida. Madam Chairman, I rise to claim the time in 
opposition to the gentleman's amendment.
  The Acting CHAIR. The gentleman is recognized for 7\1/2\ minutes.
  Mr. YOUNG of Florida. I am very happy to yield 3 minutes to the very 
distinguished chairman of the House Intelligence Committee, the 
gentleman from Michigan (Mr. Rogers).
  Mr. ROGERS of Michigan. I thank the gentleman.
  Mr. Chairman, I think the American people and, certainly, some well-
intentioned Members in this Chamber have legitimate concerns. They 
should be addressed. We should have time and education on what actually 
happens in the particular program of which we speak.
  I will pledge to each one of you today and give you my word that this 
fall, when we do the Intel authorization bill, that we will work to 
find additional privacy protections with this program which have no 
email, no phone calls, no names, and no addresses.
  Fourteen Federal judges have said, yes, this comports with the 
Constitution; 800 cases around the 1979 case have affirmed the 
underpinnings of the legality of this case--800. So 14 judges are 
wrong, and 800 different cases are wrong. The legislators on both 
Intelligence committees--Republicans and Democrats--are all wrong.
  Why is it that people of both parties came together and looked at 
this program at a time when our Nation was under siege by those 
individuals who wanted to bring violence to the shores of the United 
States?
  It is that those who know it best support the program because we 
spend as much time on this to get it right, to make sure the oversight 
is right. No other program has the legislative branch, the judicial 
branch, and the executive branch doing the oversight of a program like 
this. If we had this in the other agencies, we would not have problems.
  Think about who we are in this body. Have 12 years gone by and our 
memories faded so badly that we've forgotten what happened on September 
11?
  This bill turns off a very specific program. It doesn't stop so-
called ``spying'' and other things that this has been alleged to do. 
That's not what's happening. It's not a surveillance bill. It's not 
monitoring. It doesn't do any of those things.
  What happened after September 11 that we didn't know on September 
10--again, passing this amendment takes us back to September 10, and 
afterwards we said, wow, there is a seam, a gap--was somebody leading 
up to the September 11 attacks who was a terrorist overseas, called a 
``terrorist,'' living amongst us in the United States, and we missed it 
because we didn't have this capability.
  What if we'd have caught it?
  The good news is we don't have to what-if. It's not theoretical. 
Fifty-four times this and the other program stopped and thwarted 
terrorist attacks both here and in Europe--saving real lives. This 
isn't a game. This is real. It will have a real consequence. This is 
hard.
  Think about the people who came here before us in this great body--
Madison, Lincoln, Kennedy served here--and about the issues they dealt 
with and about the politics of ``big'' and of moving America forward 
while upholding the article I mandate to this House in that we must 
provide for the general defense of the United States. Think of those 
challenges. Think of those challenges that they met.
  Are we so small that we can only look at our Facebook ``likes'' today 
in this Chamber, or are we going to stand up and find out how many 
lives we can save?
  Let us get back to the big politics of protecting America and of 
moving America forward. Soundly reject this amendment. Let's do this 
right in the Intel authorization bill.
  Mr. AMASH. I yield 1 minute to the gentleman from Michigan (Mr. 
Conyers).
  Mr. CONYERS. I thank the gentleman for yielding to me.
  Ladies and gentlemen of the House, this amendment will not stop the 
proper use of the PATRIOT Act or stop the FISA authorities from 
conducting terrorism and intelligence investigations. I'd never block 
that.
  All this amendment is intending to do is to curtail the ongoing 
dragnet collection and storage of the personal records of innocent 
Americans. It does not defund the NSA, and it will continue to allow 
them to conduct full-fledged surveillance as long as it relates to an 
actual investigation.
  Our joining together on this bipartisan amendment demonstrates our 
joint commitment to ensure that our fight against terrorism and 
espionage follows the rule of law and the clear intent of the statutes 
passed by this Congress. I urge my colleagues on both sides of the 
aisle to vote for this amendment.
  I rise in support of this amendment, which I am cosponsoring with my 
colleague from Michigan, Representative Justin Amash.
  This amendment will prevent mass collection of personal records, such 
as phone calling information, under Section 215 of the USA PATRIOT Act. 
When Congress passed and later revised this provision, we did not 
intend for it to authorize the bulk, indiscriminate collection of 
personal information of individuals not under investigation.
  However, we have learned that this law has been misused to allow the 
collection of call detail information on every phone call made in the 
United States under a bizarre interpretation of the statute's 
authorization to collect ``relevant'' information. As my colleague and 
author of the statute, Representative Jim Sensenbrenner, has stated, 
``This expansive characterization of relevance makes a mockery of the 
legal standard.''
  This amendment will not stop the proper use of PATRIOT Act and FISA 
authorities to conduct terrorism and intelligence investigations. All 
this amendment is intended to do is curtail the ongoing dragnet 
collection and storage of the personal records of innocent Americans. 
It does not defund the NSA, and it would continue to allow them to 
conduct full fledged surveillance as long as it relates to an actual 
investigation.
  Our joining together on this bipartisan amendment demonstrates our 
joint commitment to ensuring that our fight against terrorism and 
espionage follows the rule of law and the clear intent of the statutes 
passed by Congress. I urge my colleagues on both sides of the aisle to 
vote for this amendment to demonstrate our bipartisan commitment to 
protecting individual liberty.
  Mr. YOUNG of Florida. I am very happy to yield 2\1/2\ minutes to the 
gentlelady from Minnesota (Mrs. Bachmann).
  Mrs. BACHMANN. I thank the gentleman from Florida.
  Madam Chair, this is a very important issue that we are taking up 
today because the number one duty of the Federal Government is the 
safety of the American people--of our constituents and of our own 
skins, the skins of each one of us in this Chamber today. As we know 
all too well, national security is a real and present danger, and it is 
something that we have to take quite seriously. We can't deal in false 
narratives.
  A false narrative has emerged that the Federal Government is taking 
in the content of Americans' phone calls. It's not true. It's not 
happening.
  A false narrative has emerged that the Federal Government is taking 
in the content of the American people's emails. It's not true. It's not 
happening.
  We need to deal in facts. The facts are real, and the facts are 
these:
  The only people who have benefited from the revelation of classified 
information by someone who worked for this government--who 
intentionally and without authorization declassified some of the most 
sensitive national security information that we have--are those who are 
engaged in Islamic jihad. They will have been benefited, and those whom 
we seek to protect will have not.
  Consider this:
  There is more information about each one of us contained in the phone 
book that sits at home on your kitchen counter than information that is 
in the National Security Database that we're talking about today. Your 
name, your address are in the phone book. Your name, your address are 
not in this National Security Database.
  No other nation in the world has the advantage that the United States 
of America has on national security--no

[[Page H5025]]

other nation--and we by this amendment today would agree to handcuff 
ourselves and our allies by restricting ourselves? Let it not be. Let 
us not deal in false narratives. Let us deal in facts that will keep 
the American people safe.
  When you look at an envelope, when a letter is put in the mail, is 
there a privacy right as to what has been written on that envelope? No, 
there isn't. There is a privacy right as to what is contained inside 
that envelope. That's a Fourth Amendment right.
  Is there a Fourth Amendment right to the record that you called 
someone on a certain day? No, there isn't--that's a record--but there 
is a Fourth Amendment right to what's in that phone call. Let's deal in 
reality, not in false narratives.
  Mr. AMASH. I yield 1 minute to the gentleman from Wisconsin (Mr. 
Sensenbrenner).
  Mr. SENSENBRENNER. Madam Chair, I rise in strong support of the Amash 
amendment. I do so as the person who was the principal author of the 
PATRIOT Act in 2001, who got that law through quickly after 9/11 and 
who supported and managed its 2006 reauthorization.
  Let me make this perfectly clear that unlike what we have heard from 
speakers on the other side of this issue, this amendment does not stop 
the collection of data under section 215--the people who are subject to 
an investigation of an authorized terrorist plot. What it does do is to 
prevent the collection of data of people who are not subject to an 
investigation.
  Now, relevance is required in any type of a grand jury subpoena or in 
a criminal collection of data for a criminal trial. This goes far 
beyond what the NSA is doing. The time has come to stop it, and the way 
we stop it is to approve this amendment.
  Mr. YOUNG of Florida. I reserve the balance of my time.
  Mr. AMASH. I yield 30 seconds to the gentleman from Colorado (Mr. 
Polis).
  Mr. POLIS. I thank the gentleman from Michigan for his leadership on 
this important issue.
  Madam Chair, reports of the NSA surveillance program have broad and 
far-reaching consequences.
  Many Americans feel that our fundamental liberties as a country and 
our constitutional rights are threatened. In addition, it has ruined 
and hurt our reputation abroad--threatening our trade relationships 
with allies, threatening American jobs as a result, and putting in 
danger our cooperative security relationships that we need to fight the 
war on terror.
  The responsible thing to do is to show some contrition. Let's pass 
this amendment. Let's make sure that we can have a practical approach 
that shows that protecting our liberties and securities are consistent 
and critical for the United States of America. I urge a ``yes'' vote.
  Mr. YOUNG of Florida. I continue to reserve the balance of my time.
  Mr. AMASH. I yield 30 seconds to the gentleman from South Carolina 
(Mr. Mulvaney).
  Mr. MULVANEY. Madam Chair, here is the question:
  It's a question of balancing privacy versus security. It's a question 
beyond that. It's a question of who will do the balancing.
  Right now, the balancing is being done by people we do not know, by 
people we do not elect and, in large part right now, by somebody who 
has admitted lying to this body at a hearing. That's wrong.
  We should be doing the balancing. We were elected to do that. We need 
to pass this amendment so that we can do the balancing, not the folks 
who are not elected and whom we do not know.
  Mr. YOUNG of Florida. I continue to reserve the balance of my time.
  Mr. AMASH. May I inquire of the Chair how much time remains.
  The Acting CHAIR (Ms. Ros-Lehtinen). The gentleman from Michigan has 
3\1/2\ minutes remaining.
  Mr. AMASH. Madam Chair, I yield 30 seconds to the gentlewoman from 
California (Ms. Lofgren).
  Ms. LOFGREN. I want to talk about the much ballyhooed oversight.
  Every year, there is a report to the Judiciary Committee, an annual 
report, on section 215. This year, the report was eight sentences--less 
than a full page. To think that the Congress has substantial oversight 
of this program is simply incorrect. I cannot match Mr. Sensenbrenner's 
brilliant remarks; but I do agree that when we wrote the PATRIOT Act 
relevance had a meaning.
  Madam Chair, I submit for the Record a letter to Mr. Sensenbrenner 
from the Department of Justice, which basically says, because 300 
inquiries were made, the records of every single American became 
relevant. That's a joke.
                                       U.S. Department of Justice,


                                Office of Legislative Affairs,

                                    Washington, DC, July 16, 2013.
     Hon. F. James Sensenbrenner, Jr.,
     House of Representatives,
     Washington, DC.
       Dear Representative Sensenbrenner: This responds to your 
     letter to the Attorney General date June 6, 2013, regarding 
     the ``business records'' provision of the Foreign 
     Intelligence Surveillance Act (FISA), 50 U.S.C. Sec. 1861, 
     enacted as section 215 of the USA PATRIOT Act.
       As you know, on June 5, 2013, the media reported the 
     unauthorized disclosure of a classified judicial order issued 
     under this provision that has been used to support a 
     sensitive intelligence collection program. Under this 
     program, which has been briefed to Congress and repeatedly 
     authorized by the Foreign Intelligence Surveillance Court 
     (FISC), the Federal Bureau of Investigation (FBI) obtains 
     authorization to collect telephony metadata, including the 
     telephone numbers dialed and the date, time and duration of 
     calls, from certain telecommunications service providers. The 
     National Security Agency (NSA), in turn, archives and 
     analyzes this information under carefully controlled 
     circumstances and provides leads to the FBI or others in the 
     Intelligence Community for counterterrorism purposes. Aspects 
     of this program remain classified, and there are limits to 
     what can be said about it in an unclassified letter. 
     Department of Justice and Intelligence Community staff are 
     available to provide you a briefing on the program at your 
     request.
       In your letter, you asked whether this intelligence 
     collection program is consistent with the requirements of 
     section 215 and the limits of that authority. Under section 
     215, the Director of the FBI may apply to the FISC for an 
     order directing the production of any tangible things, 
     including business records, for investigations to protect 
     against international terrorism. To issue such an order, the 
     FISC must determine that (1) there are reasonable grounds to 
     believe that the things sought are relevant to an authorized 
     investigation, other than a threat assessment; (2) the 
     investigation is being conducted under guidelines approved by 
     the Attorney General under Executive Order 12333; and (3) if 
     a U.S. person is the subject of the investigation, the 
     investigation is not being conducted solely upon the basis of 
     First Amendment protected activities. In addition, the FISC 
     may only require the production of items that can be obtained 
     with a grand jury subpoena or any other court order directing 
     the production of records or tangible things. Finally, the 
     program must, of course, comport with the Constitution.
       The telephony metadata program satisfies each of these 
     requirements. The lawfulness of the telephony metadata 
     collection program has repeatedly been affirmed by the FISC. 
     In the years since its inception, multiple FISC judges have 
     granted 90-day extensions of the program after concluding 
     that it meets all applicable legal requirements.
       Of particular significance to your question is the 
     relevance to an authorized international terrorism 
     investigation of the telephony metadata collected through 
     this program. First, it is critical to understand the program 
     in the context of the restrictions imposed by the court. 
     Those restrictions strictly limit the extent to which the 
     data is reviewed by the government. In particular, the FISC 
     allows the data to be queried for intelligence purposes only 
     when there is reasonable suspicion, based on specific facts, 
     that a particular query term, such as a telephone number, is 
     associated with a specific foreign terrorist organization 
     that was previously identified to and approved by the court. 
     NSA has reported that in 2012, fewer than 300 unique 
     identifiers were used to query the data after meeting this 
     standard. This means that only a very small fraction of the 
     records is ever reviewed by any person, and only specially 
     cleared counterterrorism personnel specifically trained in 
     the court-approved procedures can access the records to 
     conduct queries. The information generated in response to 
     these limited queries is not only relevant to authorized 
     investigations of international terrorism, but may be 
     especially significant in helping the government identify and 
     disrupt terrorist plots.
       The large volume of telephony metadata is relevant to FBI 
     investigations into specific foreign terrorist organizations 
     because the intelligence tools that NSA uses to identify the 
     existence of potential terrorist communications within the 
     data require collecting and storing large volumes of the 
     metadata to enable later analysis. If not collected and held 
     by NSA, the metadata may not continue to be available for the 
     period that NSA has deemed necessary for national security 
     purposes because it need not be retained by 
     telecommunications service providers. Moreover, unless the 
     data is aggregated by NSA, it may not be possible to identify 
     telephony

[[Page H5026]]

     metadata records that cross different telecommunications 
     networks. The bulk collection of telephony metadata--i.e. the 
     collection of a large volume and high percentage of 
     information about unrelated communications--is therefore 
     necessary to identify the much smaller subset of terrorist-
     related telephony metadata records contained within the data. 
     It also allows NSA to make connections related to terrorist 
     activities over time and can assist counterterrorism 
     personnel to discover whether known or suspected terrorists 
     have been in contact with other persons who may be engaged in 
     terrorist activities, including persons and activities inside 
     the United States. Because the telephony metadata must be 
     available in bulk to allow NSA to identify the records of 
     terrorist communications, there are ``reasonable grounds to 
     believe'' that the data is relevant to an authorized 
     investigation to protect against international terrorism, as 
     section 215 requires, even though most of the records in the 
     dataset are not associated with terrorist activity.
       The program is consistent with the Constitution as well as 
     with the statute. As noted above, the only type of 
     information acquired under the program is telephony metadata, 
     not the content of any communications, not the identity, 
     address or financial information of any party to the 
     communication, and not geolocational information. Under 
     longstanding Supreme Court precedent, there is no reasonable 
     expectation of privacy with respect to this kind of 
     information that individuals have already provided to third-
     party businesses, and such information therefore is not 
     protected by the Fourth Amendment. See Smith v. Maryland, 442 
     U.S. 735, 739-42 (1979).
       Moreover, it is important to bear in mind that activities 
     carried out pursuant to FISA, including those conducted under 
     this program, are subject to stringent limitations and robust 
     oversight by all three branches of government. As noted 
     above, by order of the FISC, the Government is prohibited 
     from indiscriminately sifting through the telephony metadata 
     it acquires. Instead, all information that is acquired is 
     subject to strict, court-imposed restrictions on review and 
     handling that provide significant and reasonable safeguards 
     for U.S. persons. The basis for a query must be documented in 
     writing in advance and must be approved by one of a limited 
     number of highly trained analysts. The FISC reviews the 
     program approximately every 90 days.
       The Department of Justice conducts rigorous oversight to 
     ensure the telephony metadata is being handled in strict 
     compliance with the FISC's orders, and the Department of 
     Justice and The Office of the Director of National 
     Intelligence (ODNI) conduct thorough and regular reviews to 
     ensure the program is implemented in compliance with the law.
       The program is also subject to extensive congressional 
     oversight. The classified details of the program have been 
     briefed to the Judiciary and Intelligence Committees on many 
     occasions. In addition, in December 2009, the Department of 
     Justice worked with the Intelligence Community to provide a 
     classified briefing paper to the House and Senate 
     Intelligence Committees to be made available to all Members 
     of Congress regarding the telephony metadata collection 
     program. It is our understanding that both Intelligence 
     Committees made this document available to all Members prior 
     to the February 2010 reauthorization of section 215. That 
     briefing paper clearly explained that the government and the 
     FISC had interpreted Section 215 to authorize the collection 
     of telephony metadata in bulk. An updated version of the 
     briefing paper was provided to the Senate and House 
     Intelligence Committees again in February 2011 in connection 
     with the reauthorization that occurred later that year.
       Finally, we do not agree with the suggestion in your letter 
     that the Department's March 9, 2011 public testimony on 
     section 215 conveyed a misleading impression as to how this 
     authority is used. Quoting a portion of that testimony, your 
     letter states that it ``left the committee with the 
     impression that the Administration was using the business 
     records provision sparingly and for specific materials. The 
     recently released FISA order, however, could not have been 
     drafted more broadly,'' In fact, key language in the 
     testimony in question noted that orders issued pursuant to 
     section 215 ``have also been used to support important and 
     highly sensitive intelligence collection operations, on which 
     this committee and others have been separately briefed.'' We 
     hope that the explanation above regarding the use of this 
     authority to identify specific terrorism-related telephony 
     metadata records helps to clarify the point.
       The recent unauthorized disclosure of this and other 
     classified intelligence activities has caused serious harm to 
     our national security. Since the disclosure of the telephony 
     metadata collection program, the Department of Justice and 
     the Intelligence Community have worked to ensure that 
     Congress and the American people understand how the program 
     operates, its importance to our security, and the rigorous 
     oversight that is applied. As part of this effort, senior 
     officials from ODNI, NSA, DOJ and FI31 provided a classified 
     briefing for all House Members on June 11, 2013 and separate 
     classified briefings to the House Democratic Caucus and the 
     House Republican Conference on June 26, 2013.
       The Department of Justice is committed to ensuring that our 
     efforts to protect national security are conducted lawfully 
     and respect the privacy and civil liberties of all Americans. 
     We look forward to continuing to work with you and others in 
     the Congress to ensure that we meet this objective.
       We hope this information is helpful. Please do not hesitate 
     to contact this office if we may provide additional 
     assistance with this or any other matter.
           Sincerely,
                                                  Peter J. Kadzik,
                      Principal Deputy Assistant Attorney General.

  Mr. AMASH. I yield 30 seconds to the gentleman from Texas (Mr. 
Barton).
  (Mr. BARTON asked and was given permission to revise and extend his 
remarks.)
  Mr. BARTON. I thank the gentleman.
  Madam Chair, this is not about how sincere the NSA people are in 
implementing this technique. It is not about how careful they are. It 
is whether they have the right to collect the data in the first place 
on every phone call on every American every day.
  The PATRIOT Act did not specifically authorize it. Section 215 talks 
about tangible things that are relevant to an authorized security 
investigation. In the NSA's interpretation of that, ``relevant'' is all 
data all the time. That is simply wrong. We should support the Amash 
amendment and vote for it.

                              {time}  1815

  Mr. AMASH. Madam Chair, I yield 15 seconds to the gentleman from 
South Carolina (Mr. Duncan).
  Mr. DUNCAN of South Carolina. Madam Chair, amendment IV:

       The right of the people to be secure in their persons, 
     house, papers, and effects, against unreasonable searches and 
     seizures, shall not be violated, and no warrants shall issue, 
     but upon probable cause, supported by oath or affirmation, 
     and particularly describing the place to be searched, and the 
     persons or things to be seized.

  Those who choose to trade liberty for security will find they have 
neither.
  Mr. AMASH. Madam Chair, I yield 30 seconds to the gentleman from 
Texas (Mr. Poe).
  Mr. POE of Texas. Warrants need to be particular and specific about 
the place to be searched and the items to be seized.
  No judge would ever sign a general search warrant like the British 
did, allowing the police to search every house on the block, much less 
seize everybody's phone records, but this is what has happened under 
section 215 under the government.
  The government has gone too far in the name of security and the 
Fourth Amendment has been bruised.
  Rein in government invasion. No more dragnet operations. Get a 
specific warrant based on probable cause, or stay out of our lives.
  And that's just the way it is.
  Mr. AMASH. I yield 30 seconds to the gentleman from New York (Mr. 
Nadler).
  Mr. NADLER. Madam Chairperson, this amendment stops the government 
from misusing section 215, to engage in the dragnet collection of all 
of our personal telephone records. Congress did not grant the executive 
the authority to collect everything it wants so long as it limits any 
subsequent search of that data.
  This amendment restores the requirement that records sought are 
relevant to an authorized foreign intelligence or terrorist 
investigation. It restores the minimal relevant standard required by 
Congress but ignored by successive administrations.
  No administration should be permitted to operate above or beyond the 
law as they have done in this respect. I therefore urge all of my 
colleagues to vote in favor of the Amash-Conyers amendment.
  Mr. AMASH. I yield 30 seconds to the gentleman from Virginia (Mr. 
Griffith).
  Mr. GRIFFITH of Virginia. General warrants, writs of assistance, 
that's what we're looking at, and the Founding Fathers found that to be 
anathema. What they're doing does violate the Fourth Amendment. We took 
an oath to uphold the Constitution, and we're supposed to rely on a 
secret agency that deals with a secret court that deals with a 
selective secrecy committee; and Members of Congress are limited to 
their access to the actions of that committee, but we're supposed to 
trust them.
  Folks, we've got a job to do. Vote ``yes.''

[[Page H5027]]

  Mr. AMASH. Madam Chair, may I inquire as to how much time remains?
  The Acting CHAIR. The gentleman from Michigan has 45 seconds 
remaining, and the gentleman from Florida has 2 minutes remaining.
  Mr. AMASH. I yield 30 seconds to the gentlelady from Hawaii (Ms. 
Gabbard).
  Ms. GABBARD. Madam Chairwoman, countless men and women from my State 
of Hawaii and all across the country have worn the uniform and put 
their lives on the line to protect our freedoms and our liberties. I 
cannot in good conscience vote to take a single dollar from the pockets 
of hardworking taxpayers from across the country to pay for programs 
which infringe on the very liberties and freedoms our troops have 
fought and died for.
  Ben Franklin said:

       They who give up essential liberty to obtain a little 
     temporary safety deserve neither liberty nor safety.

  Mr. AMASH. Madam Chair, I yield myself such time as I may consume.
  We're here to answer one question for the people we represent: Do we 
oppose the suspicion list collection of every American's phone records?
  When you had the chance to stand up for Americans' privacy, did you?
  Please support the Amash amendment and oppose the NSA's blanket 
surveillance of our constituents.
  I yield back the balance of my time.
  Mr. YOUNG of Florida. Madam Chairwoman, I yield 2 minutes for the 
closing argument to the gentleman from Arkansas (Mr. Cotton).
  Mr. COTTON. Madam Chairwoman, I rise to strongly urge opposition to 
the Amash amendment.
  This program has stopped dozens of terrorist attacks. That means it's 
saved untold American lives.
  This amendment is not simple. It does not limit the program. It does 
not modify it. It does not constrain the program. It ends the program. 
It blows it up. Some of you've heard the analogy that if you want to 
search for a needle in a haystack, you have to have the haystack. This 
takes a leaf blower and blows away the entire haystack. You will not 
have this program if this amendment passes. And it does so, despite all 
of the safeguards you have already heard.
  This program is constitutional under Supreme Court precedent--not 
recent precedent. Precedent goes back to 1979, just 2 years after I was 
born, the year that one of the young sponsors of this amendment was 
born. This program is approved by large bipartisan majorities of this 
body on the statute--text that they approved, not their secret intents 
or wishes.
  It is overseen by article III judges who have been confirmed by the 
Senate and are independent of the executive branch. It is reviewed by 
the Intelligence Committees, and it is executed primarily by military 
officers, not generals, but the majors and the colonels who have been 
fighting and bleeding for this country for 12 years.
  What is it, metadata? It sounds kind of scary. It's nothing more than 
an Excel spreadsheet with five columns: called to, called from, date, 
time, and the duration. Five columns, billions of rows. It's in a 
lockbox. It can't be searched unless you have specific suspicion of a 
number being used by a terrorist. Only then do they go into that 
database and do they run a search for what that number has been 
calling.
  Why do you need it? Verizon, AT&T, other companies will not keep this 
data for the years necessary. Secondly, you need it quickly. When I was 
in Iraq as a platoon leader with the 101st Airborne, if we rolled up a 
bad guy and we found a cell phone or we found a thumb drive, we would 
immediately upload that data so intelligence professionals could search 
it so they could go roll up another bad guy, because you only have a 
few hours to stop a terrorist once you catch another terrorist.
  Folks, we are at war. You may not like that truth. I wish it weren't 
the truth. But it is the truth. We're at war. Do not take this tool 
away from our warriors on the frontline.
  Mr. YOUNG of Florida. I yield back the balance of my time.
  The Acting CHAIR. The question is on the amendment offered by the 
gentleman from Michigan (Mr. Amash).
  The question was taken; and the Acting Chair announced that the noes 
appeared to have it.
  Mr. AMASH. Madam Chair, I demand a recorded vote.
  The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further 
proceedings on the amendment offered by the gentleman from Michigan 
will be postponed.

[...]

                 Amendment No. 99 Offered by Mr. Pompeo

  The Acting CHAIR. The unfinished business is the demand for a 
recorded vote on the amendment offered by the gentleman from Kansas 
(Mr. Pompeo) on which further proceedings were postponed and on which 
the ayes prevailed by voice vote.
  The Clerk will redesignate the amendment.
  The Clerk redesignated the amendment.


                             Recorded Vote

  The Acting CHAIR. A recorded vote has been demanded.
  A recorded vote was ordered.
  The vote was taken by electronic device, and there were--ayes 409, 
noes 12, not voting 12, as follows:

                             [Roll No. 411]

                               AYES--409

     Aderholt
     Alexander
     Amash
     Amodei
     Andrews
     Bachmann
     Bachus
     Barber
     Barr
     Barrow (GA)
     Barton
     Bass
     Benishek
     Bentivolio
     Bera (CA)
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Bishop (UT)
     Black
     Blackburn
     Blumenauer
     Bonamici
     Bonner
     Boustany
     Brady (PA)
     Brady (TX)
     Braley (IA)
     Bridenstine
     Brooks (AL)
     Brooks (IN)
     Broun (GA)
     Brown (FL)
     Brownley (CA)
     Buchanan
     Bucshon
     Burgess
     Butterfield
     Calvert
     Camp
     Cantor
     Capito
     Capps
     Cardenas
     Carney
     Carson (IN)
     Carter
     Cartwright
     Cassidy
     Castor (FL)
     Castro (TX)
     Chabot
     Chaffetz
     Chu
     Cicilline
     Clarke
     Clay
     Cleaver
     Clyburn
     Coffman
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Connolly
     Cook
     Cooper
     Costa
     Cotton
     Courtney
     Cramer
     Crawford
     Crenshaw
     Crowley
     Cuellar
     Culberson
     Cummings
     Daines
     Davis (CA)
     Davis, Danny
     Davis, Rodney
     DeFazio
     DeGette
     Delaney
     DeLauro
     DelBene
     Denham
     Dent
     DeSantis
     DesJarlais
     Deutch
     Diaz-Balart
     Dingell
     Doggett
     Doyle
     Duckworth
     Duffy
     Duncan (SC)
     Duncan (TN)
     Ellison
     Ellmers
     Engel
     Enyart
     Eshoo
     Esty
     Farenthold
     Farr
     Fattah
     Fincher
     Fitzpatrick
     Fleischmann
     Fleming
     Flores
     Forbes
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Franks (AZ)
     Frelinghuysen
     Gabbard
     Gallego
     Garamendi
     Garcia
     Gardner
     Garrett
     Gerlach
     Gibbs
     Gibson
     Gingrey (GA)
     Gohmert
     Goodlatte
     Gosar
     Gowdy
     Granger
     Graves (GA)
     Graves (MO)
     Grayson
     Green, Al
     Green, Gene
     Griffin (AR)
     Griffith (VA)
     Grimm
     Guthrie
     Gutierrez
     Hahn
     Hall
     Hanabusa
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (FL)
     Hastings (WA)
     Heck (NV)
     Heck (WA)
     Hensarling
     Higgins
     Himes
     Hinojosa
     Holding
     Hoyer
     Hudson
     Huelskamp
     Huffman
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Israel
     Issa
     Jackson Lee
     Jeffries
     Jenkins
     Johnson (GA)
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jones
     Jordan
     Joyce
     Kaptur
     Keating
     Kelly (IL)
     Kelly (PA)
     Kennedy
     Kildee
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kingston
     Kinzinger (IL)
     Kirkpatrick
     Kline
     Kuster
     Labrador
     LaMalfa
     Lamborn
     Lance
     Langevin
     Lankford
     Larsen (WA)
     Larson (CT)

[[Page H5028]]


     Latham
     Latta
     Lee (CA)
     Levin
     Lewis
     Lipinski
     LoBiondo
     Loebsack
     Long
     Lowenthal
     Lowey
     Lucas
     Luetkemeyer
     Lujan Grisham (NM)
     Lujan, Ben Ray (NM)
     Lummis
     Lynch
     Maffei
     Maloney, Carolyn
     Maloney, Sean
     Marchant
     Marino
     Massie
     Matheson
     Matsui
     McCarthy (CA)
     McCaul
     McClintock
     McCollum
     McDermott
     McGovern
     McHenry
     McIntyre
     McKeon
     McKinley
     McMorris Rodgers
     McNerney
     Meadows
     Meehan
     Meeks
     Meng
     Messer
     Mica
     Michaud
     Miller (FL)
     Miller (MI)
     Miller, Gary
     Miller, George
     Moore
     Moran
     Mullin
     Mulvaney
     Murphy (FL)
     Murphy (PA)
     Nadler
     Napolitano
     Neal
     Neugebauer
     Noem
     Nolan
     Nugent
     Nunes
     Nunnelee
     O'Rourke
     Olson
     Owens
     Palazzo
     Pascrell
     Pastor (AZ)
     Paulsen
     Payne
     Pearce
     Pelosi
     Perlmutter
     Perry
     Peters (CA)
     Peters (MI)
     Peterson
     Petri
     Pingree (ME)
     Pittenger
     Pitts
     Pocan
     Poe (TX)
     Pompeo
     Posey
     Price (GA)
     Price (NC)
     Quigley
     Radel
     Rahall
     Reed
     Reichert
     Renacci
     Ribble
     Rice (SC)
     Richmond
     Rigell
     Roby
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Rooney
     Ros-Lehtinen
     Roskam
     Ross
     Rothfus
     Roybal-Allard
     Royce
     Ruiz
     Runyan
     Ruppersberger
     Rush
     Ryan (OH)
     Ryan (WI)
     Salmon
     Sanchez, Linda T.
     Sanchez, Loretta
     Sanford
     Sarbanes
     Scalise
     Schakowsky
     Schiff
     Schneider
     Schrader
     Schwartz
     Schweikert
     Scott (VA)
     Scott, Austin
     Scott, David
     Sensenbrenner
     Serrano
     Sessions
     Sewell (AL)
     Shea-Porter
     Sherman
     Shimkus
     Shuster
     Simpson
     Sinema
     Sires
     Slaughter
     Smith (MO)
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Southerland
     Speier
     Stewart
     Stivers
     Stockman
     Stutzman
     Swalwell (CA)
     Takano
     Terry
     Thompson (CA)
     Thompson (MS)
     Thompson (PA)
     Thornberry
     Tiberi
     Tierney
     Tipton
     Titus
     Tonko
     Tsongas
     Turner
     Upton
     Valadao
     Van Hollen
     Vargas
     Veasey
     Vela
     Velazquez
     Visclosky
     Wagner
     Walberg
     Walden
     Walorski
     Walz
     Wasserman Schultz
     Waters
     Watt
     Waxman
     Weber (TX)
     Webster (FL)
     Welch
     Wenstrup
     Westmoreland
     Whitfield
     Williams
     Wilson (FL)
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Woodall
     Yarmuth
     Yoder
     Yoho
     Young (AK)
     Young (FL)
     Young (IN)

                                NOES--12

     Becerra
     Capuano
     Cohen
     Conyers
     Edwards
     Fudge
     Grijalva
     Holt
     Honda
     Lofgren
     Polis
     Rangel

                             NOT VOTING--12

     Barletta
     Beatty
     Bustos
     Campbell
     Coble
     Herrera Beutler
     Horsford
     McCarthy (NY)
     Negrete McLeod
     Pallone
     Rokita
     Schock

                              {time}  1847

  Messrs. COLLINS of New York, GALLEGO, HASTINGS of Florida, Mrs. 
BACHMANN, Ms. SHEA-PORTER, Mr. DOYLE, Ms. LEE of California, Ms. KELLY 
of Illinois, Ms. DeGETTE, Messrs. McGOVERN, McDERMOTT, GRIMM, LEWIS, 
PEARCE, PAYNE, ANDREWS, and CARSON of Indiana changed their vote from 
``no'' to ``aye.''
  So the amendment was agreed to.
  The result of the vote was announced as above recorded.


                 Amendment No. 100 Offered by Mr. Amash

  The Acting CHAIR. The unfinished business is the demand for a 
recorded vote on the amendment offered by the gentleman from Michigan 
(Mr. Amash) on which further proceedings were postponed and on which 
the noes prevailed by voice vote.
  The Clerk will redesignate the amendment.
  The Clerk redesignated the amendment.


                             Recorded Vote

  The Acting CHAIR. A recorded vote has been demanded.
  A recorded vote was ordered.
  The Acting CHAIR. This will be a 2-minute vote.
  The vote was taken by electronic device, and there were--ayes 205, 
noes 217, not voting 12, as follows:

                             [Roll No. 412]

                               AYES--205

     Amash
     Amodei
     Bachus
     Barton
     Bass
     Becerra
     Bentivolio
     Bishop (UT)
     Black
     Blackburn
     Blumenauer
     Bonamici
     Brady (PA)
     Braley (IA)
     Bridenstine
     Broun (GA)
     Buchanan
     Burgess
     Capps
     Capuano
     Cardenas
     Carson (IN)
     Cartwright
     Cassidy
     Chabot
     Chaffetz
     Chu
     Cicilline
     Clarke
     Clay
     Cleaver
     Clyburn
     Coffman
     Cohen
     Connolly
     Conyers
     Courtney
     Cramer
     Crowley
     Cummings
     Daines
     Davis, Danny
     Davis, Rodney
     DeFazio
     DeGette
     DeLauro
     DelBene
     DeSantis
     DesJarlais
     Deutch
     Dingell
     Doggett
     Doyle
     Duffy
     Duncan (SC)
     Duncan (TN)
     Edwards
     Ellison
     Eshoo
     Farenthold
     Farr
     Fattah
     Fincher
     Fitzpatrick
     Fleischmann
     Fleming
     Fudge
     Gabbard
     Garamendi
     Gardner
     Garrett
     Gibson
     Gohmert
     Gosar
     Gowdy
     Graves (GA)
     Grayson
     Green, Gene
     Griffin (AR)
     Griffith (VA)
     Grijalva
     Hahn
     Hall
     Harris
     Hastings (FL)
     Holt
     Honda
     Huelskamp
     Huffman
     Huizenga (MI)
     Hultgren
     Jeffries
     Jenkins
     Johnson (OH)
     Jones
     Jordan
     Keating
     Kildee
     Kingston
     Labrador
     LaMalfa
     Lamborn
     Larson (CT)
     Lee (CA)
     Lewis
     Loebsack
     Lofgren
     Lowenthal
     Lujan Grisham (NM)
     Lujan, Ben Ray (NM)
     Lummis
     Lynch
     Maffei
     Maloney, Carolyn
     Marchant
     Massie
     Matsui
     McClintock
     McCollum
     McDermott
     McGovern
     McHenry
     McMorris Rodgers
     Meadows
     Mica
     Michaud
     Miller, Gary
     Miller, George
     Moore
     Moran
     Mullin
     Mulvaney
     Nadler
     Napolitano
     Neal
     Nolan
     Nugent
     O'Rourke
     Owens
     Pascrell
     Pastor (AZ)
     Pearce
     Perlmutter
     Perry
     Petri
     Pingree (ME)
     Pocan
     Poe (TX)
     Polis
     Posey
     Price (GA)
     Radel
     Rahall
     Rangel
     Ribble
     Rice (SC)
     Richmond
     Roe (TN)
     Rohrabacher
     Ross
     Rothfus
     Roybal-Allard
     Rush
     Salmon
     Sanchez, Linda T.
     Sanchez, Loretta
     Sanford
     Sarbanes
     Scalise
     Schiff
     Schrader
     Schweikert
     Scott (VA)
     Sensenbrenner
     Serrano
     Shea-Porter
     Sherman
     Smith (MO)
     Smith (NJ)
     Southerland
     Speier
     Stewart
     Stockman
     Swalwell (CA)
     Takano
     Thompson (MS)
     Thompson (PA)
     Tierney
     Tipton
     Tonko
     Tsongas
     Vela
     Velazquez
     Walz
     Waters
     Watt
     Waxman
     Weber (TX)
     Welch
     Williams
     Wilson (SC)
     Yarmuth
     Yoder
     Yoho
     Young (AK)

                               NOES--217

     Aderholt
     Alexander
     Andrews
     Bachmann
     Barber
     Barr
     Barrow (GA)
     Benishek
     Bera (CA)
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Boehner
     Bonner
     Boustany
     Brady (TX)
     Brooks (AL)
     Brooks (IN)
     Brown (FL)
     Brownley (CA)
     Bucshon
     Butterfield
     Calvert
     Camp
     Cantor
     Capito
     Carney
     Carter
     Castor (FL)
     Castro (TX)
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Cook
     Cooper
     Costa
     Cotton
     Crawford
     Crenshaw
     Cuellar
     Culberson
     Davis (CA)
     Delaney
     Denham
     Dent
     Diaz-Balart
     Duckworth
     Ellmers
     Engel
     Enyart
     Esty
     Flores
     Forbes
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Franks (AZ)
     Frelinghuysen
     Gallego
     Garcia
     Gerlach
     Gibbs
     Gingrey (GA)
     Goodlatte
     Granger
     Graves (MO)
     Green, Al
     Grimm
     Guthrie
     Gutierrez
     Hanabusa
     Hanna
     Harper
     Hartzler
     Hastings (WA)
     Heck (NV)
     Heck (WA)
     Hensarling
     Higgins
     Himes
     Hinojosa
     Holding
     Hoyer
     Hudson
     Hunter
     Hurt
     Israel
     Issa
     Jackson Lee
     Johnson (GA)
     Johnson, E. B.
     Johnson, Sam
     Joyce
     Kaptur
     Kelly (IL)
     Kelly (PA)
     Kennedy
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kinzinger (IL)
     Kirkpatrick
     Kline
     Kuster
     Lance
     Langevin
     Lankford
     Larsen (WA)
     Latham
     Latta
     Levin
     Lipinski
     LoBiondo
     Long
     Lowey
     Lucas
     Luetkemeyer
     Maloney, Sean
     Marino
     Matheson
     McCarthy (CA)
     McCaul
     McIntyre
     McKeon
     McKinley
     McNerney
     Meehan
     Meeks
     Meng
     Messer
     Miller (FL)
     Miller (MI)
     Murphy (FL)
     Murphy (PA)
     Neugebauer
     Noem
     Nunes
     Nunnelee
     Olson
     Palazzo
     Paulsen
     Payne
     Pelosi
     Peters (CA)
     Peters (MI)
     Peterson
     Pittenger
     Pitts
     Pompeo
     Price (NC)
     Quigley
     Reed
     Reichert
     Renacci
     Rigell
     Roby
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rooney
     Ros-Lehtinen
     Roskam
     Royce
     Ruiz
     Runyan
     Ruppersberger
     Ryan (OH)
     Ryan (WI)
     Schakowsky
     Schneider
     Schwartz
     Scott, Austin
     Scott, David
     Sessions
     Sewell (AL)
     Shimkus
     Shuster
     Simpson
     Sinema
     Sires
     Slaughter
     Smith (NE)
     Smith (TX)
     Smith (WA)
     Stivers
     Stutzman
     Terry
     Thompson (CA)
     Thornberry
     Tiberi
     Titus
     Turner
     Upton
     Valadao
     Van Hollen
     Vargas
     Veasey
     Visclosky
     Wagner
     Walberg
     Walden
     Walorski
     Wasserman Schultz
     Webster (FL)
     Wenstrup
     Westmoreland
     Whitfield
     Wilson (FL)
     Wittman
     Wolf
     Womack
     Woodall
     Young (FL)
     Young (IN)

                             NOT VOTING--12

     Barletta
     Beatty
     Bustos
     Campbell
     Coble
     Herrera Beutler
     Horsford
     McCarthy (NY)
     Negrete McLeod
     Pallone
     Rokita
     Schock

                              {time}  1851

  Mr. CICILLINE changed his vote from ``no'' to ``aye.''
  So the amendment was rejected.
  The result of the vote was announced as above recorded.


                          Personal Explanation

  Mrs. BEATTY. Mr. Chair, on rollcall Nos. 411--Pompeo amendment #99, 
``yes'' and 412--Amash amendment #100, ``No.''

[...]