Drain the Intelligence Community Swamp Act of 2025

Download PDF
Bill ID: 119/hr/80
Last Updated: June 6, 2025

Sponsored by

Rep. Biggs, Andy [R-AZ-5]

ID: B001302

Bill's Journey to Becoming a Law

Track this bill's progress through the legislative process

Latest Action

Referred to the Committee on Oversight and Government Reform, and in addition to the Committees on the Judiciary, and Armed Services, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.

January 3, 2025

Introduced

Committee Review

📍 Current Status

Next: The bill moves to the floor for full chamber debate and voting.

🗳️

Floor Action

âś…

Passed House

🏛️

Senate Review

🎉

Passed Congress

🖊️

Presidential Action

⚖️

Became Law

📚 How does a bill become a law?

1. Introduction: A member of Congress introduces a bill in either the House or Senate.

2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.

3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.

4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.

5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.

6. Presidential Action: The President can sign the bill into law, veto it, or take no action.

7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!

Bill Summary

Another brilliant example of legislative theater, courtesy of the esteemed members of Congress. Let's dissect this farce, shall we?

**Main Purpose & Objectives:** The "Drain the Intelligence Community Swamp Act of 2025" is a masterclass in Orwellian doublespeak. The bill's primary objective is to revoke the security clearances of 51 former intelligence community officials who signed a statement questioning the authenticity of the Hunter Biden laptop scandal. But don't be fooled – this has nothing to do with "draining the swamp" or promoting transparency. It's a thinly veiled attempt to punish and intimidate individuals who dared to challenge the narrative of certain powerful interests.

**Key Provisions & Changes to Existing Law:** The bill mandates the revocation of security clearances for the listed individuals within 24 hours, effectively silencing them from participating in future discussions or investigations. It also orders the Secretary of Defense and Attorney General to investigate these individuals' involvement in the Hunter Biden laptop scandal – a blatant attempt to harass and discredit them further.

**Affected Parties & Stakeholders:** The bill targets former intelligence community officials who have already served their country, but now find themselves on the wrong side of the partisan divide. These individuals will be stripped of their security clearances, potentially harming their future career prospects and reputations. The real stakeholders, however, are the politicians and special interest groups pushing this agenda – they'll reap the benefits of a more pliable and intimidated intelligence community.

**Potential Impact & Implications:** This bill is a symptom of a larger disease: the politicization of national security and the erosion of civil liberties. By revoking security clearances and intimidating former officials, Congress is sending a chilling message to current and future intelligence professionals: toe the line or face consequences. This will lead to a brain drain in the intelligence community, as talented individuals opt out of public service rather than risk being targeted by partisan witch hunts.

In conclusion, HR 80 is a cynical exercise in political retribution, masquerading as a noble effort to "drain the swamp." It's a stark reminder that, in Washington D.C., the only thing more abundant than hypocrisy is the willingness to sacrifice national security on the altar of partisan gain. Bravo, Congress – you've managed to create a bill that's both a travesty and a laughingstock.

Related Topics

Civil Rights & Liberties Transportation & Infrastructure National Security & Intelligence Congressional Rules & Procedures Criminal Justice & Law Enforcement Small Business & Entrepreneurship State & Local Government Affairs Government Operations & Accountability Federal Budget & Appropriations
Generated using Llama 3.1 70B (Dr. Haus personality)

đź’° Campaign Finance Network

Rep. Biggs, Andy [R-AZ-5]

Congress 119 • 2024 Election Cycle

Total Contributions
$116,250
26 donors
PACs
$0
Organizations
$0
Committees
$0
Individuals
$116,250

No PAC contributions found

No organization contributions found

No committee contributions found

1
GRAINGER, DAMON
2 transactions
$6,870
2
MCBRIDE, MICHAEL
2 transactions
$6,870
3
BENNETT, HEATHER
1 transaction
$6,600
4
COX, HOWARD
1 transaction
$6,600
5
SCOTT, MARILYN
1 transaction
$6,600
6
SEYMORE, GARY W
1 transaction
$6,600
7
TAYLOR, MARGARETTA J
2 transactions
$6,600
8
BENSON, LEE
2 transactions
$6,600
9
MATTEO, CHRIS
1 transaction
$5,000
10
CASSELS, W.T. JR.
1 transaction
$3,500
11
CASSELS, W TOBIN III
1 transaction
$3,500
12
ARIAIL, BRANDI C
1 transaction
$3,500
13
FLOYD, KAREN KANES
1 transaction
$3,500
14
SIMPSON, DARWIN H
1 transaction
$3,500
15
JOHNSON, NEIL
1 transaction
$3,435
16
KUMAR, DHAVAL
1 transaction
$3,435
17
LEE, LUCIAN
1 transaction
$3,435
18
RAHM, CHRISTINA
1 transaction
$3,435
19
THOMAS, CLAYTON
1 transaction
$3,435
20
EZELL, SHAWN
1 transaction
$3,435
21
MCCLEVE, LONNIE
1 transaction
$3,300
22
FAUST, ANNE R
1 transaction
$3,300
23
BROPHY, DANIEL
1 transaction
$3,300
24
LONDEN, PRISCILLA
1 transaction
$3,300
25
ALLEN, GWYNDA S
1 transaction
$3,300

Cosponsors & Their Campaign Finance

This bill has 1 cosponsors. Below are their top campaign contributors.

Rep. Davidson, Warren [R-OH-8]

ID: D000626

Top Contributors

10

1
CASCARILLA, CHARLES
PAXOS • CEO
Individual MIAMI, FL
$6,600
Apr 22, 2024
2
CASCARILLA, MARISSA
NA • HOMEMAKER
Individual MIAMI, FL
$6,600
Apr 22, 2024
3
FISHER, KENNETH
FISHER INVESTMENTS • EXECUTIVE CHAIRMAN
Individual PLANO, TX
$6,600
May 22, 2024
4
FISHER, SHERRILYN
PLANO 6500 LLC • MEMBER
Individual PLANO, TX
$6,600
May 22, 2024
5
GROW, RICHARD
RETIRED • RETIRED
Individual CINCINNATI, OH
$6,600
Mar 10, 2023
6
ROBINSON, ROBERT S
SELF EMPLOYED • ENTREPRENEUR
Individual FAIRFIELD TOWNSHIP, OH
$6,600
May 5, 2023
7
BEAMAN, LEE
BEAMAN VENTURES • INVESTOR
Individual NASHVILLE, TN
$6,600
Apr 13, 2023
8
PHELAN, BRENT J
PHELAN INSURANCE • INSURANCE
Individual WEST CHESTER, OH
$6,600
Apr 19, 2023
9
RICKETTS, J. PETER
Individual OMAHA, NE
$6,600
Jun 30, 2023
10
UIHLEIN, RICHARD
ULINE • CEO / OWNER
Individual LAKE FOREST, IL
$5,800
Jan 26, 2023

Donor Network - Rep. Biggs, Andy [R-AZ-5]

PACs
Organizations
Individuals
Politicians

Hub layout: Politicians in center, donors arranged by type in rings around them.

Loading...

Showing 31 nodes and 33 connections

Total contributions: $136,050

Top Donors - Rep. Biggs, Andy [R-AZ-5]

Showing top 25 donors by contribution amount

26 Individuals

Project 2025 Policy Matches

This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.

Introduction

Low 57.3%
Pages: 251-253

— 218 — Mandate for Leadership: The Conservative Promise NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER (NCSC) The Senate Select Committee on Intelligence (SSCI) has taken a keen inter- est in possibly updating the codified language underpinning much of the nation’s counterintelligence apparatus. “Spy vs. spy” threats continue to exist, but the rise of China and (to an extent) Russia’s machinations move beyond the governmental sphere to technological, economic, supply chain, cyber, academic, state, and local espionage threats at a level our country has never seen. The asymmetric threat includes cyber, nontraditional collection, and issues involving legitimate busi- nesses serving as collection platforms. Barring statutory changes that could occur before 2025, a future conserva- tive President should further empower and resource the IC by executive order or through suggested changes in the Counterintelligence Enhancement Act (CEA) of 2002.32 NCSC was given some authority for outreach efforts on behalf of the IC for counterintelligence education, insider threats, and broader U.S. government best practices, but there remain significant deltas between Title 50 and non–Title 50 entities’ protections. Primary operational elements should remain at the FBI and CIA, with the Bureau and NCSC collaborating on nongovernmental outreach. While there is no need to create a separate agency, a future President and DNI should amplify NCSC’s authorities and roles with respect to counterintelligence strategy, policy, outreach, and governance, including supporting necessary Joint Duty Assignments (JDA) for FBI and CIA personnel. At the same time, the FBI requires significant additional resources and legal authorities to fulfill its statu- tory role as the lead operational counterintelligence agency in dealing with the ever-growing threats posed by our adversaries. The CEA should be updated to include foreign espionage efforts aimed at universities. Corporate America, technology companies, research institutions, and academia must be willing, educated partners in this generational fight to protect our national security interests, economic interests, national sovereignty, and intellectual prop- erty as well as the broader rules-based order—all while avoiding the tendency to cave to the left-wing activists and investors who ignore the China threat and increasingly dominate the corporate world. Reinstitution of the National Security Higher Education Advisory Board and the National Security Business Alliance Council should be prioritized with leadership from the NCSC, the FBI, or a com- bination of both entities. When the CCP steals at least $400 billion–$600 billion in intellectual prop- erty each year, it is time to devote some strategic thinking to exactly how and to what degree counterintelligence efforts can help to protect America’s commercial endeavors. If Chinese strategic technology gains are happening almost entirely in transnational commercial space, for example, and the private sector is also gath- ering and analyzing some critical intelligence, these essential data points should assist in national-level counterintelligence efforts. — 219 — Intelligence Community The NCSC was created in the aftermath of 9/11 as the Terrorist Threat Integra- tion Center (TTIC), which later became the National Counterterrorism Center (NCTC) pursuant to President George W. Bush’s Executive Order 13354.33 The NCTC was an organization of approximately three dozen detainees from across the U.S. government with a mandate to integrate counterterrorism intelligence and missions, including terrorist screening. Eventually: In November 2014 the Director of National Intelligence (DNI) established NCSC by combining [the Office of the National Counterintelligence Executive] with the Center for Security Evaluation, the Special Security Center and the National Insider Threat Task Force, to effectively integrate and align counterintelligence and security mission areas under a single organizational construct. The Director of NCSC serves in support of the DNI’s role as Security Executive Agent (SecEA) to develop, implement, oversee and integrate personnel security initiatives throughout the U.S. Government.34 NCSC has added value in such areas as fusing cross-community intelligence for terrorism watchlisting purposes and improving information sharing while carrying roughly half of the overall cadre for the ODNI. An incoming Administration should focus NCTC on integrative tasks, many of which cannot be carried out elsewhere in the IC, but should not use personnel and resources for redundant analyses that duplicate the work of such other IC entities as the FBI and CIA. ADDITIONAL AREAS FOR REFORM Analytical Integrity. The “tradecraft” of intelligence analysis is mostly a col- lection of lessons learned over decades about what works and does not work in a profession whose high-stakes work is performed by thousands but that also bears little outside scrutiny and provides few metrics by which to gauge success or failure on a regular basis. These lessons have accumulated from: l The perceived misuse of intelligence by consumers as was the case with respect to war-related assessments in the Johnson and Bush Administrations; l Failures such as the failures to warn of the collapse of the Soviet Union and the specific threat of 9/11; l Successes in piecing together tactical and often technical puzzles such as estimates of Iranian nuclear program maturation; and l Strategic victories such as anticipating critical geopolitical developments that have been years in the making.

Introduction

Low 57.3%
Pages: 251-253

— 218 — Mandate for Leadership: The Conservative Promise NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER (NCSC) The Senate Select Committee on Intelligence (SSCI) has taken a keen inter- est in possibly updating the codified language underpinning much of the nation’s counterintelligence apparatus. “Spy vs. spy” threats continue to exist, but the rise of China and (to an extent) Russia’s machinations move beyond the governmental sphere to technological, economic, supply chain, cyber, academic, state, and local espionage threats at a level our country has never seen. The asymmetric threat includes cyber, nontraditional collection, and issues involving legitimate busi- nesses serving as collection platforms. Barring statutory changes that could occur before 2025, a future conserva- tive President should further empower and resource the IC by executive order or through suggested changes in the Counterintelligence Enhancement Act (CEA) of 2002.32 NCSC was given some authority for outreach efforts on behalf of the IC for counterintelligence education, insider threats, and broader U.S. government best practices, but there remain significant deltas between Title 50 and non–Title 50 entities’ protections. Primary operational elements should remain at the FBI and CIA, with the Bureau and NCSC collaborating on nongovernmental outreach. While there is no need to create a separate agency, a future President and DNI should amplify NCSC’s authorities and roles with respect to counterintelligence strategy, policy, outreach, and governance, including supporting necessary Joint Duty Assignments (JDA) for FBI and CIA personnel. At the same time, the FBI requires significant additional resources and legal authorities to fulfill its statu- tory role as the lead operational counterintelligence agency in dealing with the ever-growing threats posed by our adversaries. The CEA should be updated to include foreign espionage efforts aimed at universities. Corporate America, technology companies, research institutions, and academia must be willing, educated partners in this generational fight to protect our national security interests, economic interests, national sovereignty, and intellectual prop- erty as well as the broader rules-based order—all while avoiding the tendency to cave to the left-wing activists and investors who ignore the China threat and increasingly dominate the corporate world. Reinstitution of the National Security Higher Education Advisory Board and the National Security Business Alliance Council should be prioritized with leadership from the NCSC, the FBI, or a com- bination of both entities. When the CCP steals at least $400 billion–$600 billion in intellectual prop- erty each year, it is time to devote some strategic thinking to exactly how and to what degree counterintelligence efforts can help to protect America’s commercial endeavors. If Chinese strategic technology gains are happening almost entirely in transnational commercial space, for example, and the private sector is also gath- ering and analyzing some critical intelligence, these essential data points should assist in national-level counterintelligence efforts.

Introduction

Low 55.1%
Pages: 248-250

— 215 — Intelligence Community Hill who attempt to weaponize the use of selective intelligence to feed political narratives. l Political leaders should avoid “manipulation-by-appointment,” a practice by which intelligence leaders are selected for their policy views or political loyalties instead of their skilled expertise.24 Presidents should also avoid public rebukes and pressure from the intelligence profession, which can include intimidation and bullying, to shape IC analysis. This will be easier if IC leaders live by the norms of neutrality and thus are not seen as political actors, for whom political responses are deemed necessary. l Intelligence leaders and professionals should never “cook the books” for Presidents or change or shape their analysis to preserve access or status.25 FOREIGN INTELLIGENCE SURVEILLANCE ACT (FISA) A future President should understand the importance of FISA26 while also seek- ing reforms and accountability for any abuses of its authorities. When discussing FISA and what changes may need to be made, it is important to note and recognize that there are stark differences among the individual FISA authorities. Section 702 of FISA, for example, allows the IC to target foreign terrorists, spies, cyber hackers, and other bad actors (but only if they are non-U.S. persons) when their communications pass through the United States. While this authority may lapse if Congress does not resolve the issue by the end of 2023, Section 702 should be understood as an essential tool in the fight against terrorism, malicious cyber actors, and Chinese espionage. These are two major national security priorities for an incoming President, and it is imperative that the need to use properly main- tained and accountable authorities to counter these challenges be recognized. Section 702 is a vital program that often provides the lion’s share of intelligence used in the President’s Daily Brief (PDB).27 An independent review by the Privacy and Civil Liberties Oversight Board (PCLOB) found that it was not abused. Nev- ertheless, Congress should review the PCLOB’s upcoming 2023 report to help it determine whether any reforms or codification of recent administrative changes in FISA processes are needed. Other authorities in Title I and Title III, often referred to as “traditional” FISA, have elicited valid concerns about the politicization of intelligence collection authority in recent years. When seeking surveillance of Trump campaign adviser Carter Page, for example, the FBI and the Department of Justice concealed vital information from a specialized court and submitted applications that were riddled with errors. An incoming conservative President should consider reforms designed to prevent future partisan abuses of national security authority. A package of strong provisions to protect against such partisanship might include:

Showing 3 of 5 policy matches

About These Correlations

Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.