This bill authorizes FY2026 intelligence and intelligence‑related activities and layers a large set of policy changes onto the annual funding vehicle. Beyond the classified Schedule of Authorizations, the measure contains criminal provisions, new operational authorities, acquisition and personnel reforms, reassignments of intelligence centers, and new mandates on emerging technologies, biotechnology, and classification practices.
If enacted as written, agencies across the intelligence community, the Department of Defense, the Department of Homeland Security, and civilian regulators would face new reporting, procurement, and coordination obligations — and private sector vendors and research centers would face new restrictions or compliance obligations tied to national security, supply‑chain and counterintelligence concerns. The bill mixes short technical fixes (procurement thresholds and OTA language) with longer‑term institutional change (transfers of centers and DNI authority adjustments).
At a Glance
What It Does
Authorizes FY2026 intelligence appropriations and attaches dozens of policy provisions: criminalizes unauthorized entry at IC property, gives the CIA limited authority to detect, warn, disable, seize or destroy unmanned aircraft at designated facilities (with FAA coordination and reporting), revises acquisition and OTA caps, and creates new rules for AI, biotech, and commercial data use. The bill also reorganizes and transfers several IC components and tightens rules on foreign‑linked vendors and contractors.
Who It Affects
Elements of the intelligence community (DNI, CIA, NSA, NGA, NRO, DIA, FBI Directorate of Intelligence, Treasury I&A, DHS I&A), DoD acquisition and program offices, National Laboratories, election system vendors, commercial AI and geospatial vendors, biotech suppliers, and contractors who operate near or provide services to IC facilities.
Why It Matters
This is more than annual budget language: it changes who does what inside the IC (several transfers and eliminations), grants operational authorities (notably for counter‑UAS), and sets new procurement, foreign‑investment, and data‑handling guardrails that will reshape how agencies buy and evaluate AI, genomic, and geospatial products.
More articles like this one.
A weekly email with all the latest developments on this topic.
What This Bill Actually Does
The bill starts as an Intelligence Authorization Act — a cover vehicle for a long list of substantive policy changes. It authorizes FY2026 classified funding via the usual classified Schedule of Authorizations and sets the familiar limits on transfers and reprogrammings for the National Intelligence Program.
It separately authorizes $514 million for the CIA Retirement and Disability Fund (appearing in Title II).
Title III and surrounding provisions are operational and statutory: the bill adds a federal crime for unauthorized entry onto intelligence community property with escalating penalties; it gives the CIA explicit domestic authorities to detect, warn, disrupt, seize, or destroy unmanned aircraft systems at certain “covered” CIA and ODNI facilities inside the United States, subject to FAA coordination, privacy safeguards, semiannual briefings to Congressional intelligence and appropriations committees, and a statutory retention cap for intercepted communications. That authority is narrow (must be predicated on a Director‑defined credible threat), requires risk‑based assessments with FAA coordination, and includes a forfeiture provision for seized drones.Acquisition and workforce changes are spread across Titles III–IV and Title VI: other‑transaction authority limits are adjusted (notably higher ceilings for NSA/NRO transactions with notification rules), a plan to reform IC acquisition is required, and the Director is asked to identify commonly used AI functions for reuse and to expand AI security testing and a shared testbed.
The bill creates an Intelligence Community Technology Bridge Fund to subsidize transition of R&D to prototypes, directs the IC to boost biotech talent and secure genomic data, and directs procurement preference language for domestic synthetic DNA/RNA. It also adds AI governance: identifying high‑impact AI use cases, requiring inventories of such use cases, and setting minimum oversight, testing, and human‑in‑the‑loop expectations.Organizationally, the measure reassigns responsibilities and structures: it transfers the National Counterintelligence and Security Center to the FBI, moves the National Counterproliferation and Biosecurity Center to the CIA, redesignates the National Counterterrorism Center (adding counternarcotics), requires a plan to transfer the National Intelligence University to the National Defense University, and sunsets or terminates several DNI offices and coordination bodies.
The DNI’s authorities and reporting duties are adjusted — the bill both centralizes some review responsibilities and removes or limits certain newer authorities, while requiring a staffing reduction plan and timelines for the ODNI.Finally, the bill includes crosscutting civil‑liberty and oversight measures: expanded whistleblower protections and procedures for IC whistleblowers, tighter unmasking rules and reporting, mandated annual reporting on FBI case data and on sensitive commercially available information used by the IC, declassification reviews (including anomalous health incidents and COVID‑19 related material), and new classification/declassification notification requirements to Congress. It also contains election‑security items — required penetration testing, a coordinated vulnerability disclosure pilot for election systems, and other cybersecurity measures.
The Five Things You Need to Know
CIA counter‑UAS authority: the bill authorizes the CIA Director and designated security personnel to detect, warn, disrupt, seize, take control of, or use reasonable force to disable or destroy unmanned aircraft at designated ‘covered’ CIA and certain ODNI facilities, requires FAA coordination, semiannual briefings to Congress, and generally limits retention of intercepted communications to 180 days absent narrow exceptions.
Unauthorized access penalty: the bill creates a new criminal offense for entering marked IC property without authorization — first offense up to 180 days’ imprisonment, second offense up to 3 years, third or subsequent offense up to 10 years.
OTA and acquisition changes: the bill raises other‑transaction ceiling language for NSA and NRO prototype projects (up to $500 million) with a 14‑day congressional notification requirement for awards above $100 million and explicitly permits heads of IC elements to enter follow‑on production transactions under delegated authorities.
Major organizational transfers: the National Counterintelligence and Security Center transfers to the FBI, the National Counterproliferation and Biosecurity Center transfers to the CIA, and the National Counterterrorism Center is redesignated and tasked to include counternarcotics; each transfer carries planning and reporting timelines.
Contractor restrictions at IC sites: the bill prohibits contractors or subcontractors from collecting, retaining, or selling location data from cellular‑enabled devices at designated intelligence community locations and requires contractor certifications (false certification treated as material for False Claims Act purposes).
Section-by-Section Breakdown
Every bill we cover gets an analysis of its key sections.
Authorization and classified schedule; fund controls
Title I is the fiscal core: it authorizes appropriations for FY2026 intelligence activities and points to the accompanying classified Schedule of Authorizations as the specification of amounts. It retains the standard prohibition on transfers/reprogrammings of National Intelligence Program funds until established procedures are satisfied and preserves the ability to increase employee compensation as authorized by law. Practically, this keeps the classified budget process and the DNI/Appropriations committee visibility mechanisms intact while reasserting the standard transfer guardrails.
CIA Retirement and Disability Fund authorization
Title II authorizes a specific appropriation of $514,000,000 for the Central Intelligence Agency Retirement and Disability Fund for FY2026. This is a discrete, line‑item authorization that funds the CIA pension and disability system independent from the annual classified authorizations and is written as a fixed amount in the public text.
Operational authorities, counter‑UAS, acquisition, and IC practice mandates
Title III is an operational grab bag: it adds a new federal trespass/unauthorized entry offense for IC property, and inserts a detailed statute giving CIA personnel specific counter‑UAS powers within U.S. territory for 'covered' facilities. That counter‑UAS statute lays out definitions, a risk‑based assessment process coordinated with DOT/FAA, allowed actions (intercept, warn, disrupt controls, seize, use force), privacy constraints (retention limits and disclosure rules), testing and FAA coordination requirements, semiannual reporting and notifications to Congress, and an eventual statutory sunset for certain authorities. Acquisition and administrative changes here include adjusted OTA ceilings, an explicit provision allowing follow‑on production through delegated authority, and a narrow change to what counts as a ‘major system’ so that software programs can be excluded at the Director’s discretion. The Title also mandates an annual analytic objectivity survey and training requirements to combat politicization.
DNI authority and IC efficiency reforms; organizational reassignments
Title IV focuses on internal authority, oversight, and structure. It revises the DNI’s responsibilities and eliminates or alters several DNI authorities (including repeals of certain personnel transfer authorities), demands DNI plans to reform acquisition and reduce ODNI staff, and directs the DNI to centralize or redirect specific functions. The Title mandates plans and timelines for moving the National Counterintelligence and Security Center into the FBI, redesignating and expanding the National Counterterrorism Center, transferring the National Counterproliferation and Biosecurity Center to CIA, and transferring the National Intelligence University to the National Defense University — each transfer contains reporting requirements, transition deadlines, and requirements to protect staff during reductions.
Targeted country and regional measures, China‑focused authorities
Title V contains dozens of country‑specific mandates. Of note: multiple China‑focused provisions — prohibiting IC contracts with identified Chinese military companies involved in biotechnology, requiring a China Economic Power reporting cell, ordering assessments of CCP wealth, and bolstering reporting on Chinese influence operations. Other items include requirements to assess unmanned aircraft threats at U.S. borders, enhance intelligence sharing on foreign‑adversary biotech threats, and expand counter‑narcotics cooperation with Mexico. These are a mix of reporting, assessment, and prohibition mechanics designed to align IC posture with strategic competition priorities.
AI, biotech, genomic data, domestic sourcing, and transition funding
This Title creates the Intelligence Community Technology Bridge Fund to help move R&D to prototypes, directs the IC to expand biotech recruitment and secure genomic data, requires preference for domestically produced synthetic DNA/RNA for IC procurement unless waived, and substantially reforms IC AI governance. It assigns more functions to the AI Security Center (testbed, vendor access, researcher support), requires inventories and minimum standards for high‑impact AI use cases, mandates shared testing benchmarks and risk management practices, and asks for policies to keep vendor contracts from locking the government out of data and derivative rights.
Classification/declassification, clearance procedure parity, whistleblower protections, anomalous health incidents
These Titles add several oversight reforms: notification requirements to Congress when certain declassifications occur; removal of caps on compensatory damages for retaliatory clearance revocations; establishment of parity and process‑based routes for clearance appeals; new whistleblower protections (including for disclosures to offices of legislative/congressional affairs and prohibitions on revealing a whistleblower’s identity as reprisal); procedural clarifications for urgent complaints to Inspectors General; and requirements to standardize reporting, review, and declassification of anomalous health incident intelligence. Together they formalize additional due‑process, reporting and transparency expectations across the IC.
This bill is one of many.
Codify tracks hundreds of bills on Defense across all five countries.
Explore Defense in Codify Search →Who Benefits and Who Bears the Cost
Every bill creates winners and losers. Here's who stands to gain and who bears the cost.
Who Benefits
- FBI — Gains counterintelligence authorities and assets when the National Counterintelligence and Security Center (NCSC) transfers in; FBI counterintelligence mission and oversight footprint expand, consolidating national counterintelligence functions under one investigative agency.
- CIA leadership — Receives expanded operational authority to counter drone threats at high‑risk facilities, plus acquisition of the National Counterproliferation and Biosecurity Center, which centralizes biosecurity mission sets at CIA.
- Domestic biotech and synthetic biology suppliers — Receive preference in intelligence community procurement for synthetic DNA/RNA; the bill encourages domestic sourcing and security‑cleared supply chains, creating market opportunities for U.S. manufacturers.
- AI and technology firms (U.S.‑based) participating in IC testbeds — The AI Security Center testbed and the Technology Bridge Fund create funded transition pathways and research access for companies and labs moving prototypes toward IC adoption.
- Military and defense acquisition offices — Increased clarity around OTA ceilings and acquisition reform planning can speed prototype contracting and follow‑on production, particularly for NSA, NRO, and DoD customers.
Who Bears the Cost
- Foreign vendors and Chinese‑linked companies — Explicit prohibitions and lists target entities (especially in biotechnology and telecommunications), reducing their ability to contract with the IC and potentially cutting them out of U.S. markets.
- Commercial vendors of election systems and smaller suppliers — New mandatory penetration testing, coordinated vulnerability disclosure expectations, and increased evaluation/certification duties increase compliance costs and technical testing burdens.
- Intelligence community management and ODNI — Required reorganization, staff reductions, and transfer plans will impose transition costs and short‑term capacity gaps as programs and personnel move or are restructured.
- Contractors providing services near IC facilities — The strict ban on collecting or selling location data at covered IC sites forces vendors to alter data practices, invest in compliance, and submit certifications, with False Claims consequences for misstatements.
- Civil aviation stakeholders and FAA — CIA counter‑UAS authorities carry operational risks for the National Airspace System and require ongoing FAA coordination and mitigation work to ensure safety, increasing burden on FAA and airspace managers.
Key Issues
The Core Tension
The central dilemma is classic: strengthen national security by expanding authorities, centralizing functions, and hardening procurement — while preserving civil liberties, aviation safety, innovation, and international collaboration. Every measure that tightens control (counter‑UAS powers, vendor bans, declassification pushes) reduces a different set of risks — but creates implementation, cost, or rights challenges that will demand active management and additional resources.
This bill bundles many policy objectives into a single appropriation vehicle — a classic annual IC authorization move. That packaging makes tradeoffs harder to tease apart: operational authorities (CIA counter‑UAS) are attached to broad structural changes (center transfers and DNI authority shifts) and procurement/preference rules for sensitive tech (synthetic DNA, AI procurement guardrails).
Implementation will be the real test: moving an operational center into FBI ownership, simultaneously preserving classified equities and protecting staff, requires heavy legal, personnel and budget choreography. The planning and reporting deadlines in the bill mitigate some operational risk, but they presume cooperation across agencies, timely appropriations, and sufficient administrative bandwidth.
The counter‑UAS authority at CIA facilities is the clearest example of a practical tension. It grants strong tactical options — interception, seizure, even destruction — while requiring FAA coordination and privacy safeguards.
The statutory privacy limits (180‑day retention, specific disclosure gates) and FAA risk assessments limit harm to civil liberties and aviation safety, but real‑world deployment will require working out airspace safety, interference to wireless services, and post‑seizure forensics. Likewise, AI and biotech provisions encourage domestic sourcing and security protections, but they risk slowing procurement, raising costs, and narrowing supplier pools unless funded and implemented with transition assistance.
Finally, the bill centralizes certain functions (e.g., transfers into FBI/CIA) while removing other DNI coordinating authorities: centralization can improve accountability but also concentrates risk if transitions are rushed.
Try it yourself.
Ask a question in plain English, or pick a topic below. Results in seconds.