PILLAR Act

Download PDF
Bill ID: 119/hr/5078
Last Updated: November 20, 2025

Sponsored by

Rep. Ogles, Andrew [R-TN-5]

ID: O000175

Bill's Journey to Becoming a Law

Track this bill's progress through the legislative process

Latest Action

Invalid Date

Introduced

📍 Current Status

Next: The bill will be reviewed by relevant committees who will debate, amend, and vote on it.

🏛️

Committee Review

🗳️

Floor Action

âś…

Passed Senate

🏛️

House Review

🎉

Passed Congress

🖊️

Presidential Action

⚖️

Became Law

📚 How does a bill become a law?

1. Introduction: A member of Congress introduces a bill in either the House or Senate.

2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.

3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.

4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.

5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.

6. Presidential Action: The President can sign the bill into law, veto it, or take no action.

7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!

Bill Summary

Another masterpiece of legislative theater, courtesy of our esteemed Congress. The PILLAR Act (HR 5078) is a shining example of how politicians can take a simple concept – reauthorizing a cybersecurity grant program – and turn it into a bloated, self-serving monstrosity.

**Main Purpose & Objectives:** The bill's primary objective is to reauthorize the State and Local Cybersecurity Grant Program, which provides funding for state and local governments to enhance their cybersecurity capabilities. But don't be fooled; this bill has more to do with padding the pockets of contractors and consultants than actually improving national security.

**Key Provisions & Changes to Existing Law:** The bill makes several changes to existing law, including:

* Expanding the definition of "information systems" to include operational technology systems that use artificial intelligence (because, you know, AI is a magic solution to all cybersecurity problems). * Adding new terms like "foreign entity of concern" and "multi-factor authentication," which are just buzzwords designed to make politicians sound intelligent. * Requiring grant recipients to implement continuous vulnerability assessments and threat mitigation practices (yawn), because that's not something they should have been doing already.

**Affected Parties & Stakeholders:** The usual suspects will benefit from this bill:

* Contractors and consultants who will receive lucrative grants and contracts to "enhance" state and local cybersecurity capabilities. * Politicians who can claim credit for "improving national security" without actually doing anything meaningful. * State and local governments, which will receive funding to buy more cybersecurity snake oil.

**Potential Impact & Implications:** The impact of this bill will be negligible, except for the following:

* More taxpayer dollars will be wasted on ineffective cybersecurity initiatives. * The cybersecurity industry will continue to profit from fear-mongering and selling overpriced solutions to gullible politicians. * Our national security will remain compromised due to the lack of meaningful action.

In conclusion, the PILLAR Act is a classic example of legislative malpractice. It's a cynical attempt to appear proactive on cybersecurity while actually doing nothing to address the real problems. Bravo, Congress! You've managed to create another bill that's more concerned with appearances than actual results.

Related Topics

Government Operations & Accountability Civil Rights & Liberties Criminal Justice & Law Enforcement Federal Budget & Appropriations State & Local Government Affairs Congressional Rules & Procedures Small Business & Entrepreneurship National Security & Intelligence Transportation & Infrastructure
Generated using Llama 3.1 70B (Dr. Haus personality)

đź’° Campaign Finance Network

Rep. Ogles, Andrew [R-TN-5]

Congress 119 • 2024 Election Cycle

Total Contributions
$129,458
17 donors
PACs
$0
Organizations
$0
Committees
$0
Individuals
$129,458

No PAC contributions found

No organization contributions found

No committee contributions found

1
WINTERSTEEN, JAMES
1 transaction
$13,200
2
BEAMAN, LEE MR.
2 transactions
$12,850
3
DAVIS, MICHAEL
2 transactions
$12,540
4
BURNS, DONALD
2 transactions
$8,898
5
FISHER, KENNETH L.
1 transaction
$6,600
6
FISHER, SHERRILYN
1 transaction
$6,600
7
RAMSEY, DAVE
1 transaction
$6,600
8
MOSING, GREG
1 transaction
$6,600
9
SHOCKLEY, QIANG
1 transaction
$6,600
10
GUO, MING
1 transaction
$6,600
11
KENNINGER, STEVEN
1 transaction
$6,600
12
JAQUISH, GAIL
1 transaction
$6,600
13
ELAM, LULU ROGERS
1 transaction
$6,270
14
ROGERS, JESSICA
1 transaction
$6,000
15
ALLEN, JARED
1 transaction
$5,800
16
GIDEON, CECILE
1 transaction
$5,600
17
RICE, THOMAS A
1 transaction
$5,500

Donor Network - Rep. Ogles, Andrew [R-TN-5]

PACs
Organizations
Individuals
Politicians

Hub layout: Politicians in center, donors arranged by type in rings around them.

Loading...

Showing 18 nodes and 20 connections

Total contributions: $129,458

Top Donors - Rep. Ogles, Andrew [R-TN-5]

Showing top 17 donors by contribution amount

17 Individuals

Project 2025 Policy Matches

This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.

Introduction

Low 59.1%
Pages: 251-253

— 218 — Mandate for Leadership: The Conservative Promise NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER (NCSC) The Senate Select Committee on Intelligence (SSCI) has taken a keen inter- est in possibly updating the codified language underpinning much of the nation’s counterintelligence apparatus. “Spy vs. spy” threats continue to exist, but the rise of China and (to an extent) Russia’s machinations move beyond the governmental sphere to technological, economic, supply chain, cyber, academic, state, and local espionage threats at a level our country has never seen. The asymmetric threat includes cyber, nontraditional collection, and issues involving legitimate busi- nesses serving as collection platforms. Barring statutory changes that could occur before 2025, a future conserva- tive President should further empower and resource the IC by executive order or through suggested changes in the Counterintelligence Enhancement Act (CEA) of 2002.32 NCSC was given some authority for outreach efforts on behalf of the IC for counterintelligence education, insider threats, and broader U.S. government best practices, but there remain significant deltas between Title 50 and non–Title 50 entities’ protections. Primary operational elements should remain at the FBI and CIA, with the Bureau and NCSC collaborating on nongovernmental outreach. While there is no need to create a separate agency, a future President and DNI should amplify NCSC’s authorities and roles with respect to counterintelligence strategy, policy, outreach, and governance, including supporting necessary Joint Duty Assignments (JDA) for FBI and CIA personnel. At the same time, the FBI requires significant additional resources and legal authorities to fulfill its statu- tory role as the lead operational counterintelligence agency in dealing with the ever-growing threats posed by our adversaries. The CEA should be updated to include foreign espionage efforts aimed at universities. Corporate America, technology companies, research institutions, and academia must be willing, educated partners in this generational fight to protect our national security interests, economic interests, national sovereignty, and intellectual prop- erty as well as the broader rules-based order—all while avoiding the tendency to cave to the left-wing activists and investors who ignore the China threat and increasingly dominate the corporate world. Reinstitution of the National Security Higher Education Advisory Board and the National Security Business Alliance Council should be prioritized with leadership from the NCSC, the FBI, or a com- bination of both entities. When the CCP steals at least $400 billion–$600 billion in intellectual prop- erty each year, it is time to devote some strategic thinking to exactly how and to what degree counterintelligence efforts can help to protect America’s commercial endeavors. If Chinese strategic technology gains are happening almost entirely in transnational commercial space, for example, and the private sector is also gath- ering and analyzing some critical intelligence, these essential data points should assist in national-level counterintelligence efforts. — 219 — Intelligence Community The NCSC was created in the aftermath of 9/11 as the Terrorist Threat Integra- tion Center (TTIC), which later became the National Counterterrorism Center (NCTC) pursuant to President George W. Bush’s Executive Order 13354.33 The NCTC was an organization of approximately three dozen detainees from across the U.S. government with a mandate to integrate counterterrorism intelligence and missions, including terrorist screening. Eventually: In November 2014 the Director of National Intelligence (DNI) established NCSC by combining [the Office of the National Counterintelligence Executive] with the Center for Security Evaluation, the Special Security Center and the National Insider Threat Task Force, to effectively integrate and align counterintelligence and security mission areas under a single organizational construct. The Director of NCSC serves in support of the DNI’s role as Security Executive Agent (SecEA) to develop, implement, oversee and integrate personnel security initiatives throughout the U.S. Government.34 NCSC has added value in such areas as fusing cross-community intelligence for terrorism watchlisting purposes and improving information sharing while carrying roughly half of the overall cadre for the ODNI. An incoming Administration should focus NCTC on integrative tasks, many of which cannot be carried out elsewhere in the IC, but should not use personnel and resources for redundant analyses that duplicate the work of such other IC entities as the FBI and CIA. ADDITIONAL AREAS FOR REFORM Analytical Integrity. The “tradecraft” of intelligence analysis is mostly a col- lection of lessons learned over decades about what works and does not work in a profession whose high-stakes work is performed by thousands but that also bears little outside scrutiny and provides few metrics by which to gauge success or failure on a regular basis. These lessons have accumulated from: l The perceived misuse of intelligence by consumers as was the case with respect to war-related assessments in the Johnson and Bush Administrations; l Failures such as the failures to warn of the collapse of the Soviet Union and the specific threat of 9/11; l Successes in piecing together tactical and often technical puzzles such as estimates of Iranian nuclear program maturation; and l Strategic victories such as anticipating critical geopolitical developments that have been years in the making.

Introduction

Low 59.1%
Pages: 251-253

— 218 — Mandate for Leadership: The Conservative Promise NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER (NCSC) The Senate Select Committee on Intelligence (SSCI) has taken a keen inter- est in possibly updating the codified language underpinning much of the nation’s counterintelligence apparatus. “Spy vs. spy” threats continue to exist, but the rise of China and (to an extent) Russia’s machinations move beyond the governmental sphere to technological, economic, supply chain, cyber, academic, state, and local espionage threats at a level our country has never seen. The asymmetric threat includes cyber, nontraditional collection, and issues involving legitimate busi- nesses serving as collection platforms. Barring statutory changes that could occur before 2025, a future conserva- tive President should further empower and resource the IC by executive order or through suggested changes in the Counterintelligence Enhancement Act (CEA) of 2002.32 NCSC was given some authority for outreach efforts on behalf of the IC for counterintelligence education, insider threats, and broader U.S. government best practices, but there remain significant deltas between Title 50 and non–Title 50 entities’ protections. Primary operational elements should remain at the FBI and CIA, with the Bureau and NCSC collaborating on nongovernmental outreach. While there is no need to create a separate agency, a future President and DNI should amplify NCSC’s authorities and roles with respect to counterintelligence strategy, policy, outreach, and governance, including supporting necessary Joint Duty Assignments (JDA) for FBI and CIA personnel. At the same time, the FBI requires significant additional resources and legal authorities to fulfill its statu- tory role as the lead operational counterintelligence agency in dealing with the ever-growing threats posed by our adversaries. The CEA should be updated to include foreign espionage efforts aimed at universities. Corporate America, technology companies, research institutions, and academia must be willing, educated partners in this generational fight to protect our national security interests, economic interests, national sovereignty, and intellectual prop- erty as well as the broader rules-based order—all while avoiding the tendency to cave to the left-wing activists and investors who ignore the China threat and increasingly dominate the corporate world. Reinstitution of the National Security Higher Education Advisory Board and the National Security Business Alliance Council should be prioritized with leadership from the NCSC, the FBI, or a com- bination of both entities. When the CCP steals at least $400 billion–$600 billion in intellectual prop- erty each year, it is time to devote some strategic thinking to exactly how and to what degree counterintelligence efforts can help to protect America’s commercial endeavors. If Chinese strategic technology gains are happening almost entirely in transnational commercial space, for example, and the private sector is also gath- ering and analyzing some critical intelligence, these essential data points should assist in national-level counterintelligence efforts.

Introduction

Low 58.3%
Pages: 229-231

— 196 — Mandate for Leadership: The Conservative Promise Simultaneously, Russia, China, and lesser adversaries exploit the more open networks of countries like the U.S. to undermine democracy through disinformation and propaganda. They have attempted to influence U.S. elections; enabled or encouraged actors to exploit cyber vulnerabilities to commit theft of real or intellectual property; and have challenged U.S. governmental, military, and critical infrastructure networks with targeted malware. In short, the cyberspace era has gradually evolved from one of exploration, innovation, and cooperation to one that retains these features but is also marked by aggressive competition and persistent threats. To meet this reality, the State Department must move beyond its traditional model of attempting to establish non-binding, informal world standards of acceptable cyberspace behavior. The State Department should work with allies to establish a clear framework of enforceable norms for actions in cyberspace, moving beyond the voluntary norms of the United Nations Group of Governmental Experts.26 The State Department should also assist the Department of Defense to go “on offence” against adversaries. “Deterrence as a strategic approach has not stemmed the onslaught of cyber aggression below the level of armed conflict.”27 The traditional U.S. defensive approach based on deterrence followed by reaction to crossed “red lines” is no longer effective. Adversaries can evade this strategy through multiple tactical lines of action below the level of armed conflict, and such actions have a cumulative strategic effect. The State Department’s role should be to work with allies and engage with adversaries when necessary to draw clear lines of unacceptable conduct. Global financial infrastructure, nuclear controls, and public health are particularly important areas in which consensus may even be found across ideological lines. These mission-essential institutional initiatives should be joined with others to establish a presidentially directed and durable U.S. foreign policy. CONCLUSION The next conservative President has the opportunity and the duty to restructure the creation and execution of U.S. foreign policy so that it is focused on his or her vision for the nation's role in the world. The policy ideas and reform recommen- dations outlined in this chapter provide guidance about how the State Department can contribute to this objective. In the main, this chapter refocuses attention away from the special interests and social experiments that are used in some quarters to capture U.S. foreign policy.

Showing 3 of 5 policy matches

About These Correlations

Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.