Page:United States Statutes at Large Volume 121.djvu/335

 121 STAT. 314

PUBLIC LAW 110–53—AUG. 3, 2007

dkrause on GSDDPC44 with PUBLAW

(D) by striking paragraph (5), as so redesignated, and inserting the following: ‘‘(5) TERRORISM INFORMATION.—The term ‘terrorism information’— ‘‘(A) means all information, whether collected, produced, or distributed by intelligence, law enforcement, military, homeland security, or other activities relating to— ‘‘(i) the existence, organization, capabilities, plans, intentions, vulnerabilities, means of finance or material support, or activities of foreign or international terrorist groups or individuals, or of domestic groups or individuals involved in transnational terrorism; ‘‘(ii) threats posed by such groups or individuals to the United States, United States persons, or United States interests, or to those of other nations; ‘‘(iii) communications of or by such groups or individuals; or ‘‘(iv) groups or individuals reasonably believed to be assisting or associated with such groups or individuals; and ‘‘(B) includes weapons of mass destruction information.’’; and (E) by adding at the end the following: ‘‘(6) WEAPONS OF MASS DESTRUCTION INFORMATION.—The term ‘weapons of mass destruction information’ means information that could reasonably be expected to assist in the development, proliferation, or use of a weapon of mass destruction (including a chemical, biological, radiological, or nuclear weapon) that could be used by a terrorist or a terrorist organization against the United States, including information about the location of any stockpile of nuclear materials that could be exploited for use in such a weapon that could be used by a terrorist or a terrorist organization against the United States.’’; (2) in subsection (b)(2)— (A) in subparagraph (H), by striking ‘‘and’’ at the end; (B) in subparagraph (I), by striking the period at the end and inserting a semicolon; and (C) by adding at the end the following: ‘‘(J) integrates the information within the scope of the information sharing environment, including any such information in legacy technologies; ‘‘(K) integrates technologies, including all legacy technologies, through Internet-based services, consistent with appropriate security protocols and safeguards, to enable connectivity among required users at the Federal, State, and local levels; ‘‘(L) allows the full range of analytic and operational activities without the need to centralize information within the scope of the information sharing environment; ‘‘(M) permits analysts to collaborate both independently and in a group (commonly known as ‘collective and noncollective collaboration’), and across multiple levels of national security information and controlled unclassified information; ‘‘(N) provides a resolution process that enables changes by authorized officials regarding rules and policies for the

VerDate Aug 31 2005

13:52 Jan 23, 2009

Jkt 059194

PO 00001

Frm 00312

Fmt 6580

Sfmt 6581

M:\STATUTES\2007\59194PT1.001

APPS10

PsN: 59194PT1

�