A resolution affirming the critical importance of preserving the United States' advantage in artificial intelligence and ensuring that the United States achieves and maintains artificial intelligence dominance.
Download PDFSponsored by
Sen. Coons, Christopher A. [D-DE]
ID: C001088
Bill's Journey to Becoming a Law
Track this bill's progress through the legislative process
Latest Action
Invalid Date
Introduced
📍 Current Status
Next: The bill will be reviewed by relevant committees who will debate, amend, and vote on it.
Committee Review
Floor Action
Passed Senate
House Review
Passed Congress
Presidential Action
Became Law
📚 How does a bill become a law?
1. Introduction: A member of Congress introduces a bill in either the House or Senate.
2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.
3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.
4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.
5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.
6. Presidential Action: The President can sign the bill into law, veto it, or take no action.
7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!
Bill Summary
Another brilliant example of congressional grandstanding, wrapped in a veneer of patriotism and techno-jargon. Let's dissect this farce.
**Main Purpose & Objectives:** This resolution is a masterclass in stating the obvious while accomplishing nothing concrete. Its primary objective is to affirm the importance of preserving America's lead in artificial intelligence (AI) because... well, who wouldn't want that? It's like resolving to support motherhood and apple pie. The real purpose is to provide a platform for politicians to posture about national security, economic prosperity, and global leadership.
**Key Provisions & Changes to Existing Law:** None. This resolution doesn't propose any actual legislation or changes to existing law. It's a feel-good exercise in rhetoric, commending the White House AI Action Plan (which is likely a similarly vacuous document) and applauding efforts to deny China access to advanced chips. The "provisions" are merely a series of non-binding affirmations and declarations.
**Affected Parties & Stakeholders:** The usual suspects: politicians seeking to burnish their national security credentials, tech companies looking for government handouts or favorable treatment, and voters who will be convinced that this resolution is somehow meaningful. China, the supposed adversary, will likely respond with its own PR campaign, further fueling the cycle of nationalist posturing.
**Potential Impact & Implications:** Zero. This resolution won't change the trajectory of AI development in the United States or anywhere else. It's a Potemkin village of policy-making, designed to create the illusion of action without actually doing anything. The real decisions about AI research and development will continue to be made by corporations, researchers, and other stakeholders, not by Congress.
In short, this resolution is a classic case of "legislative theater," where politicians pretend to address a pressing issue while accomplishing nothing of substance. It's a waste of time, energy, and taxpayer dollars. Now, if you'll excuse me, I have better things to do than watch this farce unfold.
Related Topics
💰 Campaign Finance Network
Sen. Coons, Christopher A. [D-DE]
Congress 119 • 2024 Election Cycle
No PAC contributions found
No committee contributions found
Donor Network - Sen. Coons, Christopher A. [D-DE]
Hub layout: Politicians in center, donors arranged by type in rings around them.
Showing 17 nodes and 22 connections
Total contributions: $71,000
Top Donors - Sen. Coons, Christopher A. [D-DE]
Showing top 16 donors by contribution amount
Project 2025 Policy Matches
This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.
Introduction
— 216 — Mandate for Leadership: The Conservative Promise l Stiffer penalties and mandatory investigations when intelligence leaks are aimed at domestic political targets, l Tighter controls on otherwise lawful intercepts that also collect the communications of domestic political figures, l An express prohibition on politically motivated use of intelligence authorities, and l Reforms to improve the accountability of the Justice Department and the Foreign Intelligence Surveillance Court. To keep intelligence credentials from being used for partisan purposes, former high-ranking intelligence officials who retain a clearance should remain subject to the Hatch Act after they leave government to deter them from tying their political stands or activism to their continuing privilege of access to classified government information. The IC should be prohibited from monitoring so-called domestic disinformation. Such activity can easily slip into suppression of an opposition party’s speech, is corrosive of First Amendment protections, and raises questions about impartiality when the IC chooses not to act. CHINA-FOCUSED CHANGES, REFORMS, AND RESOURCES The term “whole of government” is all too frequently overused, but in responding to the generational threat posed by the Chinese Communist Party, that is exactly the approach that our national security apparatus should adopt. CIA Director William Burns has formally established a China Mission Center focused on these efforts, but it can be successful only if it is given the necessary personnel, cross-community collaboration, and resources. That is uncertain at this point, and just how seriously the organization is taking the staffing of the center is unclear. A critical strategic question for an incoming Administration and IC lead- ers will be: How, when, and with whom do we share our classified intelligence? Understanding when to pass things to liaisons and for what purpose will be vital to outmaneuvering China in the intelligence sphere. Questions for a President will include: l What is our overarching conception of the adversarial relationship and competition? l How does intelligence-sharing fit into that conception? — 217 — Intelligence Community Some Members of Congress have said that intelligence relationships such as the Five Eyes28 should be expanded to include other allies in the Asia–Pacific in, for example, a “Nine Eyes” framework. This fails to take into account the fact that any blanket expansion would necessarily involve protecting the sources and methods of a larger and quite possibly more diverse group of member countries that might or might not have congruent interests. That being said, however, a future conservative President should consider what resources and information-sharing relationships could be included in an ad hoc or quasi-formal intelligence expansion (for example, with the Quad) among nations trying to counter the threat from China. Significant technology, language skills, and financial intelligence resources are needed to counter China’s capabilities.29 The IC was caught flat-footed by the recent discovery of China’s successful test of a nuclear-capable hypersonic missile. No longer can America’s information and technological dominance be assumed. China’s gains and intense focus on emerging technologies have taken it in some areas from being a near-peer competitor to probably being ahead of the United States. China’s centralized government allocates endless resources (sometimes inefficiently) to its strategic “Made in China 2025” and military apparatuses, which combine government, military, and private-sector activities on quantum infor- mation sciences and technologies, artificial intelligence (AI), machine learning, biotechnologies, and advanced robotics. The IC must do more than understand these advancements: It must rally non- government and allied partners and inspire unified action to counter them. In addition, to combat China’s economic espionage, authorities and loopholes in the Foreign Agents Registration Act (FARA)30 will have to be examined and addressed in conjunction with the Attorney General. Many issues within the broader government can be tied back to a more general congressional understanding of the threat due to the compartmentalization of committee jurisdictions and the responsibilities of executive agencies to brief on the nature of the threat. Broader committee jurisdictions should receive additional intelligence from IC agencies as necessary to inform China’s unique and more com- prehensive threat across layers of the U.S. government bureaucracy and economy. Former DNI John Ratcliffe increased the intelligence budget as it related to China by 20 percent. “When people ask me why I did that,” he explained in an interview, “I say, ‘Because no one would let me increase it by 40%.’ I had an $85 billion combined annual budget for both the national intelligence program and military intelligence program. My perspective was, ‘Whatever we’re spending on countering China, it isn’t enough.’”31 From an intelligence standpoint, the need to understand Chinese motivations, capabilities, and intent will be of paramount importance to a future conservative President. It is therefore also of paramount importance that the “whole of government” be rowing together.
Introduction
— 221 — Intelligence Community influence and the FBI’s warnings about continued efforts through the 2022 mid- terms highlight the folly of undue certainty without consideration of alternatives. On election influence and other controversial issues, such as the origin of COVID-19, analysts at the most powerful intelligence agencies have increasingly tended to use the leeway they have been given to insert their political views into their work in order to influence (if possibly even control) the analytic process. They do this in ways that attempt to squash dissent and impair the creation of a culture in which entrenched views are challenged and unpopular analytical lines can sur- vive or not according to their merits. To help the United States and its leaders to outcompete China across mul- tifaceted societal, economic, military, and technological threats, the IC’s capability to conduct strategic intelligence analysis that is relevant to policymak- ers in both parties must be rebuilt and strengthened. Because Beijing may be a peer or even exceed U.S. capabilities in some areas, the post-9/11 analytic focus on quick-turnaround secrets is not good enough. Strategic planning—informed by intelligence—must take place for the United States to stay ahead of whatever new threats China may pose. An incoming conservative President will have the opportunity to signal the demand for such strategic products and prioritize their production through communications to intelligence leaders and formal mechanisms such as shifting priorities within the National Intelligence Priority Framework and structuring the President’s Daily Brief. The incoming DNI should also emphasize implementing the recommendations in the Ombudsman’s report, especially regarding objectiv- ity, the inclusion of dissenting viewpoints, and more serious efforts to hold senior leaders accountable for backchannel attempts to change or suppress analytic views. Accounting for the long history of intelligence failures and surprises, an incom- ing conservative President must appreciate the ambiguity, complexity, limits, and assumptions inherent in intelligence assessments. Intelligence often deals with the human dimension in complex decision systems within a foreign country or organi- zation, and this makes consistently accurate predictions difficult if not impossible to develop. Seeing something and understanding what you are seeing are two dif- ferent things, so a President should consistently and patiently press the IC about its potential biases, assumptions, methodology, and sourcing. With regard to election-threat analysis and politically controversial topics, agency leaders should take seriously the Ombudsman’s admonition that we need to maintain tradecraft standards across all countries and topics by ensuring that equitable standards apply across all foreign threat actors. Analysis should be put forward without regard to the domestic political ramifications of intelligence conclusions. “Obligation to Share” and Real-Time Auditing Capability. The fed- eral government has made admirable progress in recent years by being more — 222 — Mandate for Leadership: The Conservative Promise forward-leaning in sharing cyber threat intelligence with private-sector partners and the public, emphasizing that the protective nature of such information is of value only if put into the right hands at the right time. Since critical infrastructure and services are overwhelmingly owned, managed, and defended by the private sector in the United States, there has been an increasing emphasis on declassify- ing intelligence and sharing actionable information with private-sector partners, often through industry-specific Information Sharing and Analysis Centers (ISACs); regional meetings of government and private-sector experts called InfraGard, run by the FBI; direct public notification from the Department of Homeland Security, the FBI, and (increasingly) the NSA; and more discreet one-on-one engagements led by the collecting agencies. These programs properly recognize the private sector’s role in providing cyber- security for Americans; in practice, however, the intelligence shared by the U.S. government through these venues is too often already known or no longer relevant by the time it makes its way through the downgrade process for sharing. In addition, government-shared information often needs to take advantage of the opportunity to provide contexts, such as attribution, trends, and size of the observed cyber problem. As warranted, additional context should be provided to the private sector as a matter of routine. To continue improving the U.S. government’s ability to defend the country’s most vital networks, the IC must adopt an “obligation to share” policy process, including the capacity for “write to release” intelligence products whereby newly discovered technical indicators, targeting, and other intelligence relevant to cyber defense are automatically provided either to the public or to targeted entities within 48 hours of their collection—which is how counterterrorism intel- ligence has been managed for years when it comes to a “duty to warn.” Under this policy, agency heads should still have the flexibility to withhold intelligence for operational or counterintelligence reasons but would need to report regularly to Congress on the number of and justification for exceptions. This policy would make sharing intelligence and defending networks the default, as it already is in the rest of the cybersecurity community outside the IC, to improve the quantity, relevance, and timeliness of defensive information while ensuring accountability for top leaders when they must withhold this information. One of the most significant challenges within the IC is presented by the need to share information promptly among the 18 elements of the intelligence enterprise. The only long-term solution to the understandable tension between the need to share information and the need to protect intelligence sources and methods is a robust real-time auditing capability that electronically flags unauthorized access. Under an identity management system with real-time audit, even the most sensi- tive information acquired by America’s intelligence agencies can be shared, and the access to and use of that information are appropriately monitored. Establishing
Introduction
— 221 — Intelligence Community influence and the FBI’s warnings about continued efforts through the 2022 mid- terms highlight the folly of undue certainty without consideration of alternatives. On election influence and other controversial issues, such as the origin of COVID-19, analysts at the most powerful intelligence agencies have increasingly tended to use the leeway they have been given to insert their political views into their work in order to influence (if possibly even control) the analytic process. They do this in ways that attempt to squash dissent and impair the creation of a culture in which entrenched views are challenged and unpopular analytical lines can sur- vive or not according to their merits. To help the United States and its leaders to outcompete China across mul- tifaceted societal, economic, military, and technological threats, the IC’s capability to conduct strategic intelligence analysis that is relevant to policymak- ers in both parties must be rebuilt and strengthened. Because Beijing may be a peer or even exceed U.S. capabilities in some areas, the post-9/11 analytic focus on quick-turnaround secrets is not good enough. Strategic planning—informed by intelligence—must take place for the United States to stay ahead of whatever new threats China may pose. An incoming conservative President will have the opportunity to signal the demand for such strategic products and prioritize their production through communications to intelligence leaders and formal mechanisms such as shifting priorities within the National Intelligence Priority Framework and structuring the President’s Daily Brief. The incoming DNI should also emphasize implementing the recommendations in the Ombudsman’s report, especially regarding objectiv- ity, the inclusion of dissenting viewpoints, and more serious efforts to hold senior leaders accountable for backchannel attempts to change or suppress analytic views. Accounting for the long history of intelligence failures and surprises, an incom- ing conservative President must appreciate the ambiguity, complexity, limits, and assumptions inherent in intelligence assessments. Intelligence often deals with the human dimension in complex decision systems within a foreign country or organi- zation, and this makes consistently accurate predictions difficult if not impossible to develop. Seeing something and understanding what you are seeing are two dif- ferent things, so a President should consistently and patiently press the IC about its potential biases, assumptions, methodology, and sourcing. With regard to election-threat analysis and politically controversial topics, agency leaders should take seriously the Ombudsman’s admonition that we need to maintain tradecraft standards across all countries and topics by ensuring that equitable standards apply across all foreign threat actors. Analysis should be put forward without regard to the domestic political ramifications of intelligence conclusions. “Obligation to Share” and Real-Time Auditing Capability. The fed- eral government has made admirable progress in recent years by being more
Showing 3 of 5 policy matches
About These Correlations
Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.