Securing Reliable Power for Advanced Technologies Act

Download PDF
Bill ID: 119/hr/5927
Last Updated: November 11, 2025

Sponsored by

Rep. Barr, Andy [R-KY-6]

ID: B001282

Bill's Journey to Becoming a Law

Track this bill's progress through the legislative process

Latest Action

Invalid Date

Introduced

📍 Current Status

Next: The bill will be reviewed by relevant committees who will debate, amend, and vote on it.

🏛️

Committee Review

🗳️

Floor Action

âś…

Passed Senate

🏛️

House Review

🎉

Passed Congress

🖊️

Presidential Action

⚖️

Became Law

📚 How does a bill become a law?

1. Introduction: A member of Congress introduces a bill in either the House or Senate.

2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.

3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.

4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.

5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.

6. Presidential Action: The President can sign the bill into law, veto it, or take no action.

7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!

Bill Summary

Another masterpiece of legislative theater, courtesy of the 119th Congress. The "Securing Reliable Power for Advanced Technologies Act" - a title that screams "we have no idea what we're doing, but it sounds good." Let's dissect this mess.

**Main Purpose & Objectives:** The bill's primary objective is to accelerate the development of critical artificial intelligence infrastructure projects by designating them as priority national defense projects. Because, you know, AI is a matter of national security... or so they claim. In reality, it's just a thinly veiled attempt to funnel more taxpayer money into the pockets of tech giants and their lobbyists.

**Key Provisions & Changes to Existing Law:** The bill amends the Defense Production Act of 1950 to include critical AI infrastructure projects as priority national defense projects. This means that these projects will receive expedited permitting, licensing, and approval processes - because who needs environmental impact assessments or public input when it comes to national security? The President can designate covered projects, which includes data centers, high-performance computing facilities, dispatchable baseload electric generation facilities, and associated transmission infrastructure.

**Affected Parties & Stakeholders:** The usual suspects: tech companies, energy corporations, and their lobbyists. These are the ones who will benefit from the expedited permitting process and the influx of taxpayer dollars. The general public? Not so much. They'll be stuck with the environmental and social costs of these projects, while the benefits accrue to a select few.

**Potential Impact & Implications:** This bill is a classic case of "regulatory capture" - where industry interests hijack the legislative process to serve their own needs. By designating AI infrastructure as a national security priority, the government is essentially giving tech companies a blank check to build whatever they want, wherever they want, with minimal oversight. The environmental and social implications will be significant, but hey, who cares when there's money to be made?

In conclusion, this bill is a masterclass in legislative doublespeak. It's a thinly veiled attempt to serve the interests of tech companies and energy corporations at the expense of the public good. But hey, at least it sounds good - "Securing Reliable Power for Advanced Technologies Act" has a nice ring to it, doesn't it?

Related Topics

Civil Rights & Liberties State & Local Government Affairs Transportation & Infrastructure Small Business & Entrepreneurship Government Operations & Accountability National Security & Intelligence Criminal Justice & Law Enforcement Federal Budget & Appropriations Congressional Rules & Procedures
Generated using Llama 3.1 70B (Dr. Haus personality)

đź’° Campaign Finance Network

Rep. Barr, Andy [R-KY-6]

Congress 119 • 2024 Election Cycle

Total Contributions
$63,750
20 donors
PACs
$0
Organizations
$52,650
Committees
$0
Individuals
$0

No PAC contributions found

1
WINRED TECHNICAL SERVICES
7 transactions
$13,900
2
FEDERATED INDIANS OF GRATON RANCHERIA
2 transactions
$6,600
3
WATSON GLASS
2 transactions
$6,600
4
ENTERPRISE TARPAULIN PRODUCTS, INC.
1 transaction
$3,300
5
NORTH MONTGOMERY MATERIALS LLC
1 transaction
$3,300
6
PROFESSIONAL MEDICAL ASSOCIATES, P.C.
1 transaction
$3,300
7
SOUTHLAND STRUCTURAL LLC
1 transaction
$3,300
8
MORONGO BAND OF MISSION INDIANS
2 transactions
$3,000
9
CHEROKEE NATION
1 transaction
$2,500
10
ARGUTA RESOURCES, LLC
1 transaction
$2,500
11
BARONA BAND OF MISSION INDIANS
1 transaction
$1,500
12
TED J. BALESTRERI ENTERPRISES
1 transaction
$1,000
13
DOBBS EYE CLINIC, P.A.
1 transaction
$1,000
14
QUEENSLAKE
1 transaction
$300
15
MICHIGAN AGGREGATES ASSOCIATION PAC
1 transaction
$300
16
NORTH WOODS YOGA
1 transaction
$250

No committee contributions found

No individual contributions found

Donor Network - Rep. Barr, Andy [R-KY-6]

PACs
Organizations
Individuals
Politicians

Hub layout: Politicians in center, donors arranged by type in rings around them.

Loading...

Showing 21 nodes and 30 connections

Total contributions: $63,750

Top Donors - Rep. Barr, Andy [R-KY-6]

Showing top 20 donors by contribution amount

16 Orgs4 Committees

Project 2025 Policy Matches

This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.

Introduction

Low 59.7%
Pages: 251-253

— 218 — Mandate for Leadership: The Conservative Promise NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER (NCSC) The Senate Select Committee on Intelligence (SSCI) has taken a keen inter- est in possibly updating the codified language underpinning much of the nation’s counterintelligence apparatus. “Spy vs. spy” threats continue to exist, but the rise of China and (to an extent) Russia’s machinations move beyond the governmental sphere to technological, economic, supply chain, cyber, academic, state, and local espionage threats at a level our country has never seen. The asymmetric threat includes cyber, nontraditional collection, and issues involving legitimate busi- nesses serving as collection platforms. Barring statutory changes that could occur before 2025, a future conserva- tive President should further empower and resource the IC by executive order or through suggested changes in the Counterintelligence Enhancement Act (CEA) of 2002.32 NCSC was given some authority for outreach efforts on behalf of the IC for counterintelligence education, insider threats, and broader U.S. government best practices, but there remain significant deltas between Title 50 and non–Title 50 entities’ protections. Primary operational elements should remain at the FBI and CIA, with the Bureau and NCSC collaborating on nongovernmental outreach. While there is no need to create a separate agency, a future President and DNI should amplify NCSC’s authorities and roles with respect to counterintelligence strategy, policy, outreach, and governance, including supporting necessary Joint Duty Assignments (JDA) for FBI and CIA personnel. At the same time, the FBI requires significant additional resources and legal authorities to fulfill its statu- tory role as the lead operational counterintelligence agency in dealing with the ever-growing threats posed by our adversaries. The CEA should be updated to include foreign espionage efforts aimed at universities. Corporate America, technology companies, research institutions, and academia must be willing, educated partners in this generational fight to protect our national security interests, economic interests, national sovereignty, and intellectual prop- erty as well as the broader rules-based order—all while avoiding the tendency to cave to the left-wing activists and investors who ignore the China threat and increasingly dominate the corporate world. Reinstitution of the National Security Higher Education Advisory Board and the National Security Business Alliance Council should be prioritized with leadership from the NCSC, the FBI, or a com- bination of both entities. When the CCP steals at least $400 billion–$600 billion in intellectual prop- erty each year, it is time to devote some strategic thinking to exactly how and to what degree counterintelligence efforts can help to protect America’s commercial endeavors. If Chinese strategic technology gains are happening almost entirely in transnational commercial space, for example, and the private sector is also gath- ering and analyzing some critical intelligence, these essential data points should assist in national-level counterintelligence efforts. — 219 — Intelligence Community The NCSC was created in the aftermath of 9/11 as the Terrorist Threat Integra- tion Center (TTIC), which later became the National Counterterrorism Center (NCTC) pursuant to President George W. Bush’s Executive Order 13354.33 The NCTC was an organization of approximately three dozen detainees from across the U.S. government with a mandate to integrate counterterrorism intelligence and missions, including terrorist screening. Eventually: In November 2014 the Director of National Intelligence (DNI) established NCSC by combining [the Office of the National Counterintelligence Executive] with the Center for Security Evaluation, the Special Security Center and the National Insider Threat Task Force, to effectively integrate and align counterintelligence and security mission areas under a single organizational construct. The Director of NCSC serves in support of the DNI’s role as Security Executive Agent (SecEA) to develop, implement, oversee and integrate personnel security initiatives throughout the U.S. Government.34 NCSC has added value in such areas as fusing cross-community intelligence for terrorism watchlisting purposes and improving information sharing while carrying roughly half of the overall cadre for the ODNI. An incoming Administration should focus NCTC on integrative tasks, many of which cannot be carried out elsewhere in the IC, but should not use personnel and resources for redundant analyses that duplicate the work of such other IC entities as the FBI and CIA. ADDITIONAL AREAS FOR REFORM Analytical Integrity. The “tradecraft” of intelligence analysis is mostly a col- lection of lessons learned over decades about what works and does not work in a profession whose high-stakes work is performed by thousands but that also bears little outside scrutiny and provides few metrics by which to gauge success or failure on a regular basis. These lessons have accumulated from: l The perceived misuse of intelligence by consumers as was the case with respect to war-related assessments in the Johnson and Bush Administrations; l Failures such as the failures to warn of the collapse of the Soviet Union and the specific threat of 9/11; l Successes in piecing together tactical and often technical puzzles such as estimates of Iranian nuclear program maturation; and l Strategic victories such as anticipating critical geopolitical developments that have been years in the making.

Introduction

Low 59.7%
Pages: 251-253

— 218 — Mandate for Leadership: The Conservative Promise NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER (NCSC) The Senate Select Committee on Intelligence (SSCI) has taken a keen inter- est in possibly updating the codified language underpinning much of the nation’s counterintelligence apparatus. “Spy vs. spy” threats continue to exist, but the rise of China and (to an extent) Russia’s machinations move beyond the governmental sphere to technological, economic, supply chain, cyber, academic, state, and local espionage threats at a level our country has never seen. The asymmetric threat includes cyber, nontraditional collection, and issues involving legitimate busi- nesses serving as collection platforms. Barring statutory changes that could occur before 2025, a future conserva- tive President should further empower and resource the IC by executive order or through suggested changes in the Counterintelligence Enhancement Act (CEA) of 2002.32 NCSC was given some authority for outreach efforts on behalf of the IC for counterintelligence education, insider threats, and broader U.S. government best practices, but there remain significant deltas between Title 50 and non–Title 50 entities’ protections. Primary operational elements should remain at the FBI and CIA, with the Bureau and NCSC collaborating on nongovernmental outreach. While there is no need to create a separate agency, a future President and DNI should amplify NCSC’s authorities and roles with respect to counterintelligence strategy, policy, outreach, and governance, including supporting necessary Joint Duty Assignments (JDA) for FBI and CIA personnel. At the same time, the FBI requires significant additional resources and legal authorities to fulfill its statu- tory role as the lead operational counterintelligence agency in dealing with the ever-growing threats posed by our adversaries. The CEA should be updated to include foreign espionage efforts aimed at universities. Corporate America, technology companies, research institutions, and academia must be willing, educated partners in this generational fight to protect our national security interests, economic interests, national sovereignty, and intellectual prop- erty as well as the broader rules-based order—all while avoiding the tendency to cave to the left-wing activists and investors who ignore the China threat and increasingly dominate the corporate world. Reinstitution of the National Security Higher Education Advisory Board and the National Security Business Alliance Council should be prioritized with leadership from the NCSC, the FBI, or a com- bination of both entities. When the CCP steals at least $400 billion–$600 billion in intellectual prop- erty each year, it is time to devote some strategic thinking to exactly how and to what degree counterintelligence efforts can help to protect America’s commercial endeavors. If Chinese strategic technology gains are happening almost entirely in transnational commercial space, for example, and the private sector is also gath- ering and analyzing some critical intelligence, these essential data points should assist in national-level counterintelligence efforts.

Introduction

Low 59.3%
Pages: 239-241

— 206 — Mandate for Leadership: The Conservative Promise local, and tribal elements. The order should consider stipulating what to do with DOD cyber agencies, most notably the NSA, in terms of strategic (for example, the President and the DNI) vs. tactical support (for example, support for the warfighter) in conjunction with ongoing congressionally mandated reviews of the future dual-hatted relationship. l Enhance the DNI’s role in overseeing execution of the National Intelligence Program budget under the President’s authority. This should be done in a manner that is consistent with Congress’s intent as embodied in IRTPA. Under the executive order as written today, the DNI “shall oversee and direct the implementation of the National Intelligence Program.” In practice, the DNI’s authority to oversee execution of the IC’s budget remains constrained by an inability to address changing intelligence priorities and mandate the implementation of appropriated NIP funding to higher intelligence priorities. The DNI should have the President’s direction to address emerging but catastrophic threats such as those posed by bioweapons. Clarifying how much budget authority the DNI has in conjunction (within the limits of congressional appropriations) with OMB and IC-member Cabinet officials to move around money and personnel is crucial, but positions will not always be fungible. It will probably be necessary to hold IC leadership accountable at intransigent agencies and to restructure areas through executive orders in close conjunction with OMB, as needed. l Clarify the DNI’s role as leader of the IC as an enterprise in building the IC’s capabilities around its open-source collection and analytic missions. The exponential growth in open-source information, often called OSINT, is not disputed. In the IC, the use of publicly available information, notwithstanding the authorities within IRTPA for the DNI to manage OSINT, remains disaggregated. The explosion of private-sector intelligence products and expertise should signal to IC leadership that duplicative efforts are unnecessary and that limited resources should be focused on problematic collection tasks. The IC should avoid duplication of what is already being done well in the private sector and focus instead on complex questions that cannot be answered by conventional and frequently increasing numbers of commercial tools and capabilities. If necessary, for lack of results from the National Open Source Committee, the DNI should appoint the Principal Deputy Director of National Intelligence (PDDNI) as chairman to prioritize and promote accountability for the IC’s 18 agencies toward this effort. — 207 — Intelligence Community l Prioritize security clearance reform. Security clearance reform has made significant progress under Trusted Workforce 2.0, a governmentwide background investigation reform that was implemented beginning in 2018 with the goal of creating one system with reciprocity across organizations. This included allowing movement from periodic reinvestigations toward a Continuous Vetting (CV) program with automated records checks, adjudication of flags, the “mitigat[ion of] personnel security situations before they become a larger problem,” or the suspension or revocation of clearances.15 However, human resources onboarding operations in major agencies such as the CIA, FBI, and NSA remain to be resolved. As executive agent for security clearances, the DNI must require results from agencies that resist implementation, enforce the 48-hour reciprocity guidance, and target human resources operations that fail to attract and expediently onboard qualified personnel. Additional “carrots and sticks” from executive order reform language, including moving the Security Services Directorate from NCSC to ODNI with elevated status, may be necessary. It is unacceptable for agencies to hinder opportunities for cross- agency assignments, use public–private partnerships inefficiently because of constraints on the transferability of security clearances, and lose future talent because of extraordinary delays in backend operations. Proper vetting to speed the onboarding of personnel with much-needed expertise is vital to the IC’s future. l Ensure the DNI’s authority. The DNI’s authority should be similar to an orchestra conductor’s. An incoming conservative President will appoint whomever he chooses as DNI, but there should be agreement between the incoming DNI and President with advice and counsel from the Presidential Personnel Office on selecting positions overseen by the DNI throughout subordinate agencies, as well as concurrence by relevant Cabinet officials and the CIA. This exists by executive order, but many Presidents, PPOs, and Cabinet agency heads do not follow executive order guidance and necessary norms. The importance of trust, character, and the ability to work together to achieve a joint set of intelligence goals established by the President cannot be overstated: It is a mission that can be accomplished only with the conductor and his orchestra playing in sync. l Provide additional support for such economic and supply chain– focused agencies as the Department of Commerce. Information sharing and feedback can help subagencies like the Commerce Department’s Bureau of Industry and Security to improve their understanding of the

Showing 3 of 5 policy matches

About These Correlations

Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.