Report text available as:

  • TXT
  • PDF   (PDF provides a complete and accurate display of this text.) Tip ?
                                                     Calendar No. 381
115th Congress     }                                     {      Report
                                 SENATE
 2d Session        }                                     {     115-351
_______________________________________________________________________

                                     



          DEPARTMENT OF HOMELAND SECURITY REAUTHORIZATION ACT

                               __________

                              R E P O R T

                                 of the

                   COMMITTEE ON HOMELAND SECURITY AND

                          GOVERNMENTAL AFFAIRS

                          UNITED STATES SENATE

                              to accompany

                               H.R. 2825

           TO AMEND THE HOMELAND SECURITY ACT OF 2002 TO MAKE
          CERTAIN IMPROVEMENTS IN THE LAWS ADMINISTERED BY THE
         SECRETARY OF HOMELAND SECURITY, AND FOR OTHER PURPOSES

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]


               November 13, 2018.--Ordered to be printed
               
                                   ______
		 
                     U.S. GOVERNMENT PUBLISHING OFFICE 
		 
89-010                    WASHINGTON : 2018                 
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
        COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

                    RON JOHNSON, Wisconsin, Chairman
JOHN McCAIN, Arizona                 CLAIRE McCASKILL, Missouri
ROB PORTMAN, Ohio                    THOMAS R. CARPER, Delaware
RAND PAUL, Kentucky                  HEIDI HEITKAMP, North Dakota
JAMES LANKFORD, Oklahoma             GARY C. PETERS, Michigan
MICHAEL B. ENZI, Wyoming             MAGGIE HASSAN, New Hampshire
JOHN HOEVEN, North Dakota            KAMALA D. HARRIS, California
STEVE DAINES, Montana                DOUG JONES, Alabama

                  Christopher R. Hixon, Staff Director
                Gabrielle D'Adamo Singer, Chief Counsel
        Michael J. Lueptow, Chief Counsel for Homeland Security
               Margaret E. Daum, Minority Staff Director
       Charles A. Moskowitz, Minority Senior Legislative Counsel
                 Subhasri Ramanathan, Minority Counsel
                     Laura W. Kilbride, Chief Clerk







                                                      Calendar No. 381
115th Congress     }                                     {      Report
                                 SENATE
 2d Session        }                                     {     115-351
======================================================================



 
          DEPARTMENT OF HOMELAND SECURITY REAUTHORIZATION ACT

                                _______
                                

               November 13, 2018.--Ordered to be printed

                                _______
                                

 Mr. Johnson, from the Committee on Homeland Security and Governmental 
                    Affairs, submitted the following

                              R E P O R T

                        [To accompany H.R. 2825]

      [Including cost estimate of the Congressional Budget Office]

    The Committee on Homeland Security and Governmental 
Affairs, to which was referred the bill (H.R. 2825) to amend 
the Homeland Security Act of 2002 to make certain improvements 
in the laws administered by the Secretary of Homeland Security, 
and for other purposes, having considered the same, reports 
favorably thereon with an amendment and recommends that the 
bill, as amended, do pass.

                                CONTENTS

                                                                   Page
  I. Purpose and Summary..............................................1
 II. Background and Need for the Legislation..........................2
III. Legislative History.............................................25
 IV. Section-by-Section Analysis.....................................27
  V. Evaluation of Regulatory Impact.................................59
 VI. Congressional Budget Office Cost Estimate.......................59
VII. Changes in Existing Law Made by the Act, as Reported............63

                         I. Purpose and Summary

    H.R. 2825 authorizes the Department of Homeland Security 
(DHS or the Department) and makes improvements to multiple 
Department policies and programs. The Act includes seven titles 
covering headquarters, acquisition accountability, intelligence 
and information sharing, emergency preparedness, the Federal 
Emergency Management Agency, a new Cybersecurity and 
Infrastructure Security Agency, and other matters.

              II. Background and the Need for Legislation

    In response to the terrorist attacks against the United 
States on September 11, 2001, Congress established the 
Department with the passage of the Homeland Security Act of 
2002.\1\ The establishment of the Department represented the 
most significant transformation of the U.S. Government in over 
a half-century.\2\ Prior to its creation, homeland security 
activities were spread across more than 100 Federal 
organizations.\3\ DHS was created to be America's ``single, 
unified homeland security structure that will improve 
protection against today's threats and be flexible enough to 
help meet the unknown threats of the future.''\4\ Since 2002, 
DHS has undergone internal reorganizations and consolidations 
to create efficiencies, enhance mission effectiveness, and 
reduce duplication of effort across Department components. 
Today, DHS consists of 14 operational and support components, 
in addition to the Office of the Secretary.\5\
---------------------------------------------------------------------------
    \1\Pub. L. No. 107-296 (107th Cong.) (2002).
    \2\U.S. Department of Homeland Security, DHS, (June 2002), https://
www.dhs.gov/sites/default/files/publications/book_0.pdf.
    \3\Id.
    \4\Id.
    \5\U.S. Department of Homeland Security, Operational and Support 
Components, https://www.dhs.gov/operational-and-support-components.
---------------------------------------------------------------------------
    The Department has five core missions and responsibilities 
that include: ``prevent terrorism and enhanc[e] security; 
secure and manage our borders; enforce and administer our 
immigration laws; safeguard and secure cyberspace; and ensure 
resilience to disasters.''\6\
---------------------------------------------------------------------------
    \6\DHS, Our Mission, https://www.dhs.gov/our-mission (last updated 
May 11, 2016).
---------------------------------------------------------------------------
    Authorizing legislation is a critical responsibility of 
Congress to provide direction for the missions, activities, and 
offices of executive agencies. Therefore, this Committee aims 
to provide DHS comprehensive guidance in a reauthorization of 
the Department to clarify its organization, authorities, and 
responsibilities.

                       Title I--DHS Headquarters

    The Department has not been fully reauthorized since its 
inception over fifteen years ago. As the threat landscape 
continues to evolve, the Department adjusted its organization 
and activities to address emerging threats and protect the U.S. 
homeland.\7\ This evolution of the Department's duties and 
organization, including the structure and operations of the DHS 
Headquarters, has never been codified in statute.
---------------------------------------------------------------------------
    \7\See, e.g., The Department of Homeland Security, (June 2002), 
available at https://www.dhs.gov/sites/default/files/publications/
book_0.pdf. Compare Department of Homeland Security Original 
Organization Chart, March 2003, available at https://www.dhs.gov/
xlibrary/assets/dhs-org-chart-2003.pdf, with Department of Homeland 
Security Organization Chart, available at https://www.dhs.gov/sites/
default/files/publications/18_0519_DHS_Organizational_Chart.pdf (May 
21, 2018).
---------------------------------------------------------------------------
    Title I of the Homeland Security Act of 2002 established 
DHS, its mission, and the roles and responsibilities of several 
offices and officers in the Department that directly support 
the DHS Secretary in management of the Department and its 
activities.\8\ However, not all components of the DHS 
Headquarters were initially outlined in the Homeland Security 
Act of 2002, and the functionality of headquarters components 
has evolved over the past fifteen years.
---------------------------------------------------------------------------
    \8\Pub. L. No. 107-296 (107th Cong.) (2002).
---------------------------------------------------------------------------
    The Department's Headquarters and management have struggled 
with a variety of issues since initial authorization and 
establishment. GAO and the DHS OIG have consistently cited 
challenges with oversight of management, acquisitions and 
procurement, workforce strategic planning and retention, and 
stakeholder engagement. For example, since 2003, GAO has 
consistently placed management functions of the Department on 
its High Risk List.\9\ The initial undertaking of consolidating 
22 different agencies and organizations into one cabinet-level 
department posed great challenges in and of itself. However, as 
the threat landscape and the DHS mission evolved over the 
years, so did the management challenges. In 2013, DHS made 
enough progress in its operational components that GAO 
refocused its reporting specifically on DHS Headquarters.\10\ 
For DHS to succeed, the institutional framework for the 
Department's Headquarters, including offices and critical 
leadership positions, need clearly defined roles and 
authorities as directed by Congress.
---------------------------------------------------------------------------
    \9\Gov't Accountability Office, GAO-17-317, Strengthening 
Department of Homeland Security Management Functions, https://
www.gao.gov/highrisk/strengthening_homeland_security/why_did_study.
    \10\Id.
---------------------------------------------------------------------------
    Title I of this Act codifies some of the organizational 
changes DHS has made to address challenges and enhance 
oversight and management of critical initiatives. This 
legislation clarifies responsibilities for key leadership roles 
within the Headquarters, including the Chief Acquisitions 
Officer and Chief Human Capital Officer (CHCO), to ensure 
effective and strategic management of all of the Department's 
resources. One specific authority granted to chief officers to 
make management more effective is the ability for Headquarters 
to directly oversee their operational component counterparts.
    Another position codified in the Act but not included in 
the Homeland Security Act of 2002 is the Chief Procurement 
Officer, tasked with oversight of procurement contracts and 
major acquisitions for DHS.\11\ DHS has historically struggled 
with large-scale procurements and acquisition programs.\12\ For 
example, the Secure Border Initiative Network (SBInet) 
technology acquisition process started in November 2005 to 
enhance security along the entire southwest border.\13\ The DHS 
Office of Inspector General (OIG), the Government 
Accountability Office (GAO), and hearings held by the Committee 
have highlighted the failures of SBInet due to acquisition 
management deficits.\14\ DHS ended the multi-billion dollar 
project after numerous schedule delays, cost overruns, and 
technical problems.\15\ Ultimately the program cost the 
taxpayers $1 billion and only provides security to 53 miles of 
the 387-mile Arizona-Mexico border.\16\ By codifying the Chief 
Procurement Officer's position, role, and responsibilities, the 
Act provides needed organizational controls at DHS Headquarters 
to oversee and implement consistent procurement activities of 
DHS components.
---------------------------------------------------------------------------
    \11\Pub. L. No. 107-296 (107th Cong.) (2002).
    \12\Gov't Accountability Office, GAO-17-346SP, Earlier Requirements 
Definition and Clear Documentation of Key Decisions Could Facilitate 
Ongoing Progress (2017), https://www.gao.gov/products/GAO-17-346SP.
    \13\Gov't Accountability Office, GAO-08-131T, Observations on 
Selected Aspects of SBInet Program Implementation (2007), https://
www.gao.gov/assets/120/118254.pdf.
    \14\Gov't Accountability Office, GAO-10-840T, DHS Needs to Follow 
Through on Plans to Reassess and Better Manage Key Technology Program 
(2010), https://www.gao.gov/new.items/d10840t.pdf; Securing the Border: 
Fencing, Infrastructure, and Technology Force Multipliers: S. Homeland 
Sec. & Governmental Affairs Comm., 114th Cong. (2015) (Statement of 
Chairman Ron Johnson); and Border Security: Moving Beyond the Virtual 
Fence: S. Homeland Sec. & Governmental Affairs Comm., 114th Cong. 
(2010) (Statement of Chairman Joseph Lieberman).
    \15\Gov't Accountability Office, GAO-14-368, Arizona Border 
Surveillance Technology Plan: Additional Actions Needed to Strengthen 
Management and Assess Effectiveness (2014), https://www.gao.gov/assets/
670/661297.pdf.
    \16\Id.
---------------------------------------------------------------------------
    The Committee remains concerned about the ability of the 
Department to effectively manage its resources to execute its 
mission. The Act contains a provision that enhances the 
Committee's ability to conduct oversight of the Department's 
budget and increases transparency of how its resources are used 
to carry out vital homeland security programs and operations. 
Specifically, the Act requires DHS to submit annual reports to 
the Homeland Security Committees (as defined in the 
legislation) that include information regarding the transfer 
and reprogramming of funds to address unforeseen costs and 
operational surges through 2023.
    The Committee was concerned that the Department was not 
sufficiently organized to address threats posed by chemical, 
biological, radiological and nuclear weapons. Building on other 
Federal entities' efforts to consolidate and streamline their 
weapons of mass destruction mission functions, Congress 
required DHS to review its weapons of mass destruction 
responsibilities and consider how best to restructure these 
functions.\17\ DHS submitted its report in June 2015.\18\ GAO 
subsequently concluded that the Department's proposed 
reorganization did not include an assessment of the potential 
problems, costs, and benefits resulting from its consolidation 
proposal.\19\ Congress did not enact legislation to consolidate 
the Department's chemical, biological, radiological, nuclear, 
and explosives functions as outlined in the 2015 proposal.\20\ 
In October 2017, acting through authorities provided under 
section 872 of the Homeland Security Act of 2002, the 
Department notified Congress of its plans to reorganize and 
combine its weapons of mass destruction mission functions into 
a Countering Weapons of Mass Destruction (CWMD) office.\21\ 
This reorganization was effective December 2017.\22\
---------------------------------------------------------------------------
    \17\Senate explanatory statement accompanying the Consolidated and 
Further Continuing Appropriations Act, 2013, Pub. L. No. 113-6, 127 
Stat. 198 (2013), 159 Cong. Rec. S1547 (daily ed. Mar. 11, 2013). See 
also H.R. Rep. No. 112-492, at 13-14 (2012).
    \18\Gov't Accountability Office, GAO-16-603, DHS's Chemical, 
Biological, Nuclear and Explosives Program Consolidation Proposal Could 
Better Consider Benefits and Limitations (2016), https://www.gao.gov/
products/GAO-16-603.
    \19\Gov't Accountability Office, GAO-16-603, DHS's Chemical, 
Biological, Nuclear and Explosives Program Consolidation Proposal Could 
Better Consider Benefits and Limitations (2016), https://www.gao.gov/
products/GAO-16-603.
    \20\See H.R. 3875, Department of Homeland Security CBRNE Defense 
Act of 2015, 114th Cong.; see also Examining the Department of Homeland 
Security's Efforts to Counter Weapons of Mass Destruction, H. Homeland 
Sec. Comm., Emergency Preparedness, Response, and Communications 
Subcomm., 115th Cong. (2017), https://homeland.house.gov/hearing/
examining-department-homeland-securitys-efforts-counter-weapons-mass-
destruction/.
    \21\Letter from The Honorable Elaine Duke, Acting Secretary, Dep't 
of Homeland Sec., to The Honorable Ron Johnson, Chairman, to Homeland 
Sec. & Governmental Affairs Comm. (Oct. 6, 2017); Letter from The 
Honorable Elaine Duke, Acting Secretary, Dep't of Homeland Sec., to The 
Honorable Claire McCaskill, Ranking Member, Homeland Sec. & 
Governmental Affairs Comm. (Oct. 6, 2017).
    \22\Press Release, Dep't of Homeland Sec., Secretary Nielsen 
Announces the Establishment of the Countering Weapons of Mass 
Destruction Office (Dec. 7, 2017), https://www.dhs.gov/news/2017/12/07/
secretary-nielsen-announces-establishment-countering-weapons-mass-
destruction-office.
---------------------------------------------------------------------------
    This Act authorizes the establishment of the CWMD office 
within DHS and codifies a basic organizational structure in 
which the Domestic Nuclear Detection Office (DNDO) and portions 
of the Office of Health Affairs comprise the new CWMD office. 
Because questions remain about the new organizational 
structure,\23\ the CWMD office is authorized for a five-year 
period, after which time, Congress is required to re-authorize 
the office. If Congress does not reauthorize the office, the 
entities and functions comprising the office will be structured 
as they were preceding the enactment of this Act.
---------------------------------------------------------------------------
    \23\Examining the Department of Homeland Security's Efforts to 
Counter Weapons of Mass Destruction, H. Homeland Sec. Comm., Emergency 
Preparedness, Response, and Communications Subcomm., 115th Cong. 
(2017), https://homeland.house.gov/hearing/examining-department-
homeland-securitys-efforts-counter-weapons-mass-destruction/ (Statement 
of Chairman Ray Donovan).
---------------------------------------------------------------------------
    Title I also includes authorizing language related to human 
resources and other matters, which are intended, in part, to 
support the Department's efforts to enhance strategic workforce 
planning and improve overall employee effectiveness and morale. 
The Committee remains concerned that DHS has not taken the 
steps necessary to develop workforce plans that identify and 
address critical skills gaps across the Department. DHS remains 
on GAO's High-Risk List due in part to its inability to fully 
address human capital management challenges through the 
identification of the people and resources needed to fill 
critical mission support positions, specifically information 
technology and acquisition positions.\24\ The authorizing 
language codifies the role and responsibilities of the 
Department's CHCO and includes provisions to address human 
capital management deficiencies. Specifically, the CHCO is 
charged with executing strategic resource plans that are driven 
by industry best practices, assessing the resourcing 
requirements for mission-support functions, and assessing the 
Department's efforts to recruit and retain employees in rural 
areas. The CHCO is to make policy recommendations to the 
Secretary and Congress, as necessary, to enhance the 
Department's human capital management processes.
---------------------------------------------------------------------------
    \24\Roundtable-Reauthorizing DHS: Positioning DHS to Address New & 
Emerging Threats to the Homeland, S. Homeland Sec. & Governmental 
Affairs Comm. 5, 115th Cong. (2017), https://www.hsgac.senate.gov/imo/
media/doc/Testimony-Scott-2018-02-07.pdf (Statement of George A. Scott, 
Managing Director, GAO Homeland Security & Justice).
---------------------------------------------------------------------------
    The Committee is also concerned that DHS consistently ranks 
at or near the bottom of the annual Federal Employee Viewpoint 
Survey (FEVS) administered by the U.S. Office of Personnel 
Management.\25\ Despite year-over-year improvements based on 
the most recent survey results, the Committee remains concerned 
about the overall employee morale and effectiveness of 
management to create a high-performing culture across 
components of the Department.
---------------------------------------------------------------------------
    \25\Joe Davidson, Report ranks best and worst agencies for federal 
employees, Wash. Post (Dec. 15, 2016), https://www.washingtonpost.com/
news/powerpost/wp/2016/12/15/report-ranks-best-and-worst-agencies-for-
federal-employees/?utm_term=.0f79787e3498.
---------------------------------------------------------------------------
    However, the Committee also recognizes the Department's 
efforts to improve historically-low employee morale. For 
instance, DHS has taken steps to strengthen employee engagement 
by implementing a GAO recommendation to establish metrics to 
evaluate the success of the Department's employment engagement 
action plans.\26\ The Department's 2017 FEVS scores are 
indicative of this progress, as DHS's scores increased across 
four areas--leadership and knowledge management, results-
oriented performance culture, talent management, and job 
satisfaction.\27\
---------------------------------------------------------------------------
    \26\Roundtable-Reauthorizing DHS: Positioning DHS to Address New & 
Emerging Threats to the Homeland, S. Homeland Sec. & Governmental 
Affairs Comm. 7, 115th Cong. (2017), https://www.hsgac.senate.gov/imo/
media/doc/Testimony-Scott-2018-02-07.pdf (Statement of George A. Scott, 
Managing Director, GAO Homeland Security & Justice).
    \27\Id.; Best Places to Work in the Federal Government, Agency 
Report: Department of Homeland Security, http://bestplacestowork.org/
BPTW/rankings/detail/HS00.
---------------------------------------------------------------------------
    In testimony before the Committee, George Scott, GAO's 
Managing Director for Homeland Security and Justice Issues, 
stated that improving DHS's employee morale is a ``significant 
undertaking that will likely require multiyear efforts'' to 
fully address.\28\ To better position DHS to continue improving 
morale, this Act requires an employee engagement and retention 
plan to enhance and build upon recent efforts to improve 
employee morale across the Department and its components.
---------------------------------------------------------------------------
    \28\Roundtable-Reauthorizing DHS: Positioning DHS to Address New & 
Emerging Threats to the Homeland, S. Homeland Sec. & Governmental 
Affairs Comm. 4, 115th Cong. (2017), https://www.hsgac.senate.gov/imo/
media/doc/Testimony-Scott-2018-02-07.pdf (Statement of George A. Scott, 
Managing Director, GAO Homeland Security & Justice).
---------------------------------------------------------------------------
    The ever-present threat of malicious cyber-related attacks 
on our nation's critical infrastructure and Federal computer 
networks represents a significant challenge for the Department. 
As the lead Federal agency responsible for coordinating with 
public and private sector partners to mitigate these threats, 
DHS must ensure that it effectively deploys the tools, 
capabilities and workforce necessary to execute its 
mission.\29\ GAO reported in February 2018 that DHS began the 
process of identifying its workforce capability gaps, but has 
yet to comply with a congressional mandate to identify and 
report Department-wide cybersecurity critical needs.\30\ As 
such, the Committee is concerned that DHS may not have a 
workforce with the skills to carry out its mission. Moreover, 
the Committee echoes concerns raised by the Office of 
Management and Budget that the ability to attract and retain 
cybersecurity and information technology talent poses 
significant challenges and risks throughout the Federal 
Government.\31\
---------------------------------------------------------------------------
    \29\U.S. Government Accountability Office, GAO-18-175, 
Cybersecurity Workforce: Urgent Need for DHS to Take Actions to 
Identify Its Position and Critical Skill Requirements, https://
www.gao.gov/assets/690/689880.pdf.
    \30\Id.
    \31\Federal Cybersecurity Workforce Strategy, Memorandum M-16-15, 
Office of Management and Budget (July 12, 2016).
---------------------------------------------------------------------------
    The Committee is also concerned that DHS is not 
sufficiently adhering to the Federal Information Technology 
Acquisition Reform Act (FITARA)--a bill aimed at reforming 
Federal information technology management and its acquisition 
workforce.\32\ For instance, according the most recent Biannual 
FITARA Scorecard released in November 2017 by the House 
Committee on Oversight and Government and GAO, DHS's score 
declined from a B- to C- over the previous reporting 
period.\33\
---------------------------------------------------------------------------
    \32\National Defense Authorization Act for Fiscal Year 2015, Pub. 
L. No. 113-291, division A, title VIII, subtitle D, 128 Stat. 3292, 
3438-50 (Dec. 19, 2014), 40 U.S.C. Sec. 11319(b)(1)(B)(ii).
    \33\OGR Biannual FITARA Scorecard, https://oversight.house.gov/wp-
content/uploads/2017/11/FITARA-Scorecard-5.0-.pdf.
---------------------------------------------------------------------------
    As a step toward addressing these issues, this Act includes 
provisions to incorporate cybersecurity into DHS research and 
development activities by ensuring that the Department has 
access to the tools and resources necessary to properly execute 
its cybersecurity mission. Specifically, this Act requires DHS 
to submit a report detailing new cybersecurity projects and 
develop a training program for acquisitions staff involved in 
acquiring new cybersecurity technologies. The language also 
authorizes a cybersecurity talent exchange program to 
strengthen public and private sector collaboration on 
cybersecurity, which will support the Department's ability to 
execute its cybersecurity responsibilities including enhancing 
infrastructure security.
    The Act also addresses an emerging threat related to U.S. 
election systems. DHS and the Intelligence Community confirmed 
that a number of states were targeted by Russia during the 2016 
Presidential election.\34\ While the Committee is pleased that 
DHS is working with state and local election officials to 
secure election infrastructure by providing a suite of tools 
including risk and vulnerability assessments, cyber hygiene 
scans, and intelligence threat feeds, we remain concerned about 
future efforts to interfere in U.S. elections and will continue 
conducting oversight of the Department's efforts.\35\ This Act 
requires the Secretary to prioritize providing assistance, as 
appropriate, to state and local election officials. DHS must 
provide a yearly unclassified report to Congress on the 
Department's responsibilities and activities coordinating the 
election infrastructure critical infrastructure sector and its 
priorities for enhancing the sector's security. The report may 
have a classified annex.
---------------------------------------------------------------------------
    \34\Assessing Russian Activities and Intentions in Recent US 
Elections, Office of Director of National Intelligence (Jan. 6, 2017), 
https://www.dni.gov/files/documents/ICA_2017_01.pdf.
    \35\Election Security, Hearing before the S. Select Comm. On 
Intelligence (Mar. 21, 2018), https://www.dhs.gov/news/2018/03/21/
written-testimony-dhs-senate-select-committee-intelligence-hearing-
titled-election (DHS Written Testimony); DHS Statement on NBC News 
Coverage of Election Hacking, Feb. 12, 2018, https://www.dhs.gov/news/
2018/02/12/dhs-statement-nbc-news-coverage-election-hacking.
---------------------------------------------------------------------------
    Title I also directs the Department to perform research and 
development on canine detection. It is a priority for the 
Committee to enhance national security and transportation 
screening capabilities, and DHS's canine detection program has 
proven to be an effective method to do so. The Committee held a 
hearing in 2016 to examine the capabilities of the program and 
how canines assist in homeland security.\36\ The hearing 
highlighted the effectiveness of the program and its ability to 
significantly increase DHS's capacity to detect illicit drugs, 
screen passengers and cargo, and provide security.\37\ This Act 
advises on areas of research and development to canine 
detection and encourages coordination between public and 
private sectors, as well as academia.
---------------------------------------------------------------------------
    \36\Dogs of DHS: How Canine Programs Contribute to Homeland 
Security, S. Homeland Sec. & Governmental Affairs Comm. (Mar. 3, 2016), 
https://www.hsgac.senate.gov/hearings/dogs-of-dhs-how-canine-programs-
contribute-to-homeland-security.
    \37\Id.
---------------------------------------------------------------------------

 Title II--Department of Homeland Security Acquisition Accountability 
                             and Efficiency

    DHS spends billions of dollars each year on acquisitions of 
critical programs and systems to accomplish its mission-
essential functions, and cost estimates for the Department's 
existing major acquisitions programs are over $180 billion.\38\ 
The Department's acquisitions include a broad range of goods 
and services, from air and marine vessels for the U.S. Coast 
Guard and Customs and Border Protection (CBP) to secure 
American borders and ports to Continuous Diagnostics and 
Mitigation (CDM) cybersecurity tools that support Federal 
agencies.\39\ Component agencies are empowered to establish and 
execute their own acquisitions processes, while the Department 
Headquarters is supposed to oversee and provide guidance and 
frameworks for the components' acquisitions management 
processes as well as for Department-wide review of major 
acquisitions programs.\40\
---------------------------------------------------------------------------
    \38\See U.S. Gov't Accountability Off., Homeland Security 
Acquisitions: DHS Has Strengthened Management, but Execution and 
Affordability Concerns Endure (March 2016), https://www.gao.gov/assets/
680/676240.pdf.
    \39\See Department of Homeland Security, Budget-in-Brief: Fiscal 
year 2019 (February 2019), https://www.dhs.gov/publication/fy-2019-
budget-brief.
    \40\Major acquisitions programs are programs with life cycle cost 
estimates amounting to greater than $300 million. U.S. Gov't 
Accountability Off., GAO-16-338SP, Homeland Security Acquisitions: DHS 
Has Strengthened Management, but Execution and Affordability Concerns 
Endure (Mar. 2016), https://www.gao.gov/assets/680/676240.pdf.
---------------------------------------------------------------------------
    As a result of combining 22 agencies--some legacy and 
others completely new entities--into one department to create 
DHS, the Department has faced a series of challenges in 
acquisitions management. Since 2003, acquisitions has been a 
primary driver of DHS's inclusion on the GAO ``high risk'' 
list, with GAO pointing to staffing, funding, requirements 
issues, and a lack of oversight and accountability that have 
resulted in increased costs, extended project timelines and 
execution failures in contract performance across the 
Department.\41\
---------------------------------------------------------------------------
    \41\See U.S. Gov't Accountability Off., DHS Management--High Risk 
Issue, https://www.gao.gov/key_issues/
dhs_implementation_and_transformation/issue_summary (last visited Oct. 
4, 2018); DHS Management and Acquisition Reform: Hearing Before the S. 
Comm. On Homeland Sec. and Gov't Affairs, 114th Cong. (March 16, 2016) 
(Statement of John Roth, Inspector General, Dep't of Homeland Sec. 1) 
https://www.oig.dhs.gov/assets/TM/2016/OIGtm-JR-031616.pdf, hereinafter 
``DHS Management and Acquisition Reform Hearing''; DHS Management and 
Acquisition Reform Hearing (Statement of Rebecca Gambler, Director, 
Homeland Security and Justice, and Michele Mackin, Director, 
Acquisition and Sourcing Management; U.S. Gov't Accountability Office, 
GAO-16-507T, Progress Made, but Work Remains in Strengthening 
Acquisition and Other Management Functions 16, https://www.gao.gov/
assets/680/675827.pdf, hereinafter ``DHS Management and Acquisition 
Reform Hearing'' (Statement of GAO).
---------------------------------------------------------------------------
    The Department has taken a series of steps to improve its 
acquisition processes since its formation in attempts to 
address these challenges. In 2008, DHS created its Acquisition 
Life Cycle Framework to improve efficiency and consistency in 
acquisition management, and it established the Office of 
Program Accountability and Risk Management (PARM) in 2011 to 
oversee major acquisition programs and workforce, develop 
program management policies, and collect performance data.\42\ 
DHS's 2013 Acquisition Management Directive 102 (MD 102) 
provided the framework for all Department policies and 
processes to manage current and future acquisitions and 
enterprise services.\43\ DHS attempted to strengthen 
acquisition oversight by empowering Component Acquisition 
Executives (CAEs) with authority over program managers, and 
with the CAEs reporting to the Under Secretary for Management 
(USM), who under departmental policy serves with the Deputy 
Secretary as the ultimate acquisition decision authority within 
the Department.\44\
---------------------------------------------------------------------------
    \42\See U.S. Gov't Accountability Off., GAO-15-292, Homeland 
Security Acquisitions: DHS Should Better Define Oversight Roles and 
Improve Program Reporting to Congress 5 (Mar. 2015), https://
www.gao.gov/assets/670/668975.pdf; DHS Management and Acquisition 
Reform Hearing (Statement of GAO).
    \43\See Dep't of Homeland Sec., Directive 102-1 (Rev 02), 
Acquisition Management Directive (February 2013), https://www.dhs.gov/
sites/default/files/publications/102-
01_Acquisition_Management_Directive_Rev02.pdf.
    \44\See U.S. Gov't Accountability Off., GAO-16-338SP, Homeland 
Security Acquisitions: DHS Has Strengthened Management, but Execution 
and Affordability Concerns Endure 5 (Mar. 31, 2016), https://
www.gao.gov/assets/680/676240.pdf; DHS Management and Acquisition 
Reform Hearing (Statement of GAO); U.S. Gov't Accountability Off., GAO-
15-292, Homeland Security Acquisitions: DHS Should Better Define 
Oversight Roles and Improve Program Reporting to Congress 13 (March 
2015), https://www.gao.gov/assets/670/668975.pdf.
---------------------------------------------------------------------------
    Although DHS has taken steps to establish greater rigor and 
structure for the Department's acquisition activities and 
improve management, the Committee remains concerned by GAO's 
findings of inconsistent implementation of the acquisition 
guidance and processes across the subordinate components and 
resulting wasteful spending of untold billions of taxpayer 
dollars.\45\ The Committee remains concerned that DHS continues 
to be beset by longstanding challenges in managing its major 
acquisition programs, resulting in the wasteful spending of 
untold billions of taxpayer dollars.
---------------------------------------------------------------------------
    \45\See U.S. Gov't Accountability Office, GAO-15-292, Homeland 
Security Acquisitions: DHS Should Better Define Oversight Roles and 
Improve Program Reporting to Congress (Mar. 2015), https://www.gao.gov/
assets/670/668975.pdf; U.S. Gov't Accountability Office, GAO-17-346SP, 
Homeland Security Acquisitions: Earlier Requirements Definition and 
Clear Documentation of Key Decisions Could Facilitate Ongoing Progress 
1 (2017), http://www.gao.gov/assets/690/683977.pdf; see also Dana 
Hedgpath, Congress Says DHS Oversaw $15 Billion in Failed Contracts, 
Wash. Post (Sept. 17, 2008), http://www.washingtonpost.com/wp-dyn/
content/article/2008/09/16/AR2008091603200.html.
---------------------------------------------------------------------------
    The lack of proper acquisition methodology and oversight 
across DHS not only has degraded the Department's ability to 
execute its mission, as evidenced by the SBInet failure, but 
also its basic management functions. For example, the 2017 
failure of the $24.2 million Performance and Learning 
Management System (PALMS) set back efforts to provide 
Department-wide improvement in efficiency and reliability of 
performance and learning management processes.\46\ The DHS OIG 
also reported in November 2017 that the Department's inadequate 
internal policies and competing priorities resulted in DHS 
failing to follow statutory requirements for using Other 
Transaction Authority (OTA) and reporting its use to 
Congress.\47\ The persistent challenges DHS has faced in 
management of its acquisitions have been a major factor 
contributing to DHS's inclusion on GAO's list of high-risk 
agencies and programs since the Department's creation.\48\
---------------------------------------------------------------------------
    \46\See Off. of the Inspector Gen., Dep't of Homeland Sec., PALMS 
Does Not Address Department Needs 8, 11 (June 30, 2017), https://
www.oig.dhs.gov/sites/default/files/assets/2017/OIG-17-91-Jun17.pdf.
    \47\See Off. of the Inspector Gen., Dep't of Homeland Sec., 
Department of Homeland Security's Use of Other Transaction Authority 1, 
7-8 (November 30, 2017), https://www.oig.dhs.gov/sites/default/files/
assets/2017-12/OIG-18-24-Nov17.pdf.
    \48\See U.S. Gov't Accountability Off., GAO-17-317, Hisk-Risk 
Series: Progress on Many High-Risk Areas, While Substantial Efforts 
Needed on Others (Feb. 2017), https://www.gao.gov/assets/690/
682765.pdf.
---------------------------------------------------------------------------
    To facilitate the Department developing a cohesive approach 
to acquisitions management, the Act requires DHS to provide 
clear written guidance on the requirements and responsibilities 
across DHS component agencies for it to successfully manage and 
hold accountable its procurement and oversight operations. In 
the face of the substantial issues continuing to challenge 
acquisition management across the Department, Title II of this 
Act codifies the roles and responsibilities of the key 
stakeholders in DHS acquisitions processes, including the Chief 
Financial Officer, the Chief Information Officer, and the USM 
of the Department. The USM is codified as the Department's 
Chief Acquisitions Officer, and therefore is responsible for 
acquisition oversight and management activities across DHS. To 
enable congressional oversight of the USM in fulfilling this 
role, the USM is required to develop and brief Congress on a 
multi-year acquisition strategy that will provide needed 
guidance to departmental components and drive strategically-
oriented and agile procurement activities across DHS.
    The Committee recognizes the need for an innovative, 
streamlined approach to improve acquisitions programs; however, 
the Department's inability to meet statutory requirements for 
using innovative mechanisms such as Other Transaction Authority 
indicate the need for enhanced oversight of these 
activities.\49\ This legislation establishes a wide scope of 
authorities for DHS to test emerging acquisitions practices but 
also delineates a reporting mechanism to Congress regarding the 
departmental use and impacts of innovative acquisitions 
mechanisms. To further enhance responsible resource management 
across the Department, Title II of this Act also limits DHS in 
its use of acquisitions vehicles that can restrict efficient 
and effective acquisitions management, such as bridge 
contracts, and prohibits the use of cost-plus contracts for 
major acquisition programs. DHS may only implement a cost-type 
contract for a major acquisition program after issuance of a 
written determination that the program's complexity and 
difficulty in establishing program requirements necessitate the 
use of a cost-type contract. DHS is also required to assess and 
report the root causes of any instances of breaches of major 
acquisition programs. Ultimately, these measures will help 
mitigate the risk of cost overruns.
---------------------------------------------------------------------------
    \49\See Off. of the Inspector Gen., Dep't of Homeland Sec., 
Department of Homeland Security's Use of Other Transaction Authority 1, 
7-8 (Nov. 30, 2017), https://www.oig.dhs.gov/sites/default/files/
assets/2017-12/OIG-18-24-Nov17.pdf.
---------------------------------------------------------------------------
    The Department's lack of a coordinated and centralized 
mechanism for overseeing suspension and debarment activities 
has contributed to inaccurate reporting and inadequate 
documentation of suspensions and debarments across DHS 
components.\50\ This legislation contains a provision to ensure 
that DHS appropriately addresses these weaknesses through the 
establishment of a suspension and debarment program that 
integrates information and facilitates centralized oversight 
and transparency of related activities across all DHS 
components. The DHS Chief Procurement Officer is also required 
to establish a process for reviewing performance of contractors 
and to integrate such considerations of performance into 
contract award determination processes.
---------------------------------------------------------------------------
    \50\DHS OIG, DHS Needs to Strengthen Its Suspension and Debarment 
Program, (Jan. 25, 2018), https://www.oig.dhs.gov/sites/default/files/
assets/2018-01/OIG-18-41-Jan18.pdf.
---------------------------------------------------------------------------

            Title III--Intelligence and Information Sharing

    Congress created the Department in 2002 in part to improve 
U.S. intelligence and information sharing to prevent another 
catastrophic attack like that of September 11th, 2001.\51\ 
Since the Department's creation, threats to the homeland have 
evolved. New technology provides a broader reach for terrorist 
propaganda and secure communications that are used to 
facilitate plots that remain beyond the reach of law 
enforcement.\52\ Congress has periodically reformed the U.S. 
Intelligence Community;\53\ DHS's intelligence and information 
sharing programs require a similar update.
---------------------------------------------------------------------------
    \51\See Subtitle I of Title VIII of the Homeland Security Act of 
2002, with the short title ``Homeland Security Information Sharing 
Act,'' https://www.gpo.gov/fdsys/pkg/PLAW-107publ296/pdf/PLAW-
107publ296.pdf; see also, Gov't Accountability Office, GAO-03-715T, 
Homeland Security: Information Sharing Responsibilities Challenges, and 
Key Management Issues (May 8, 2003), available at https://www.gao.gov/
products/GAO-03-715T.
    \52\Jihad 2.0: Social Media in the Next Evolution of Terrorist 
Recruitment: Hearing Before S. Comm. on Homeland Sec. & Governmental 
Affairs, 114th Cong. (2015); see also Threats to the Homeland: Hearing 
Before S. Comm. on Homeland Sec. & Governmental Affairs, 114th Cong. 
(2015); see also Fifteen Years After 9/11: Threats to the Homeland: 
Hearing Before S. Comm. on Homeland Sec. & Governmental Affairs, 114th 
Cong. (2016); see also Threats to the Homeland: Hearing Before S. Comm. 
on Homeland Sec. & Governmental Affairs, 115th Cong. (2017).
    \53\Intelligence Reform and Terrorism Prevention Act of 2004, Pub. 
L. No. 108-458 (108 Cong.) (2004); see also the Protect America Act of 
2007, Pub. L. No. 110-55 (110 Cong.) (2007).
---------------------------------------------------------------------------
    Congressional and watchdog oversight efforts of DHS since 
2002 have identified significant weaknesses and raised 
questions about the role, value, and effectiveness of DHS 
intelligence programs.\54\ For example, a bipartisan 
investigation conducted by the Committee's Permanent 
Subcommittee on Investigations reported in 2012 that Federally-
supported state and local fusion centers had not provided 
useful intelligence to support Federal counterterrorism 
efforts.\55\ A 2015 review of the Department's performance by 
the Committee's then-Ranking Member, Senator Tom Coburn, 
questioned the extent to which DHS is focused on its stated 
mission of terrorism prevention as opposed to response and 
recovery from terrorist acts.\56\ A more recent 2016 House of 
Representatives Homeland Security Committee Majority review 
also found that DHS intelligence analysts were not familiar 
with component data, that data sharing within the DHS 
intelligence enterprise was personality-driven and limited by 
incompatible systems and reporting formats, and that many 
components felt that DHS Intelligence and Analysis (I&A;) 
employees used the Chief Intelligence Officer's authority to 
dictate unreasonable Department-wide policies.\57\
---------------------------------------------------------------------------
    \54\S. Permanent Subcommittee on Investigations, Federal Support 
for and Involvement in State and Local Fusion Centers: Majority and 
Minority Staff Report (Oct. 3, 2012); U.S. Government Accountability 
Office, GAO 14-397, DHS Intelligence Analysis: Additional Actions 
Needed to Address Analytic Priorities and Workforce Challenges (June 
2014).
    \55\S. Permanent Subcommittee on Investigations, Federal Support 
for and Involvement in State and Local Fusion Centers: Majority and 
Minority Staff Report (Oct. 3, 2012).
    \56\Tom Coburn, A Review of the Department of Homeland Security's 
Missions and Performance, 21 (2015), https://www.hsgac.senate.gov/
download/?id=B92B8382-DBCE-403C-A08A-727F89C2BC9B.
    \57\House Homeland Security Committee, Reviewing The Department Of 
Homeland Security's Intelligence Enterprise, House Homeland Security 
Committee Majority Staff Report (Dec. 2016), https://
homeland.house.gov/wp-content/uploads/2016/12/Reviewing-DHS-
Intelligence-Enterprise-Report.pdf
---------------------------------------------------------------------------
    A 2014 audit by GAO found that I&A; products received 
``mixed reviews'' from its customers and that the Intelligence 
Community was among the customers that did not value I&A; 
products.\58\ Specifically, GAO's interviews ``with 
representatives of I&A;'s five customer groups indicate that 
customers in two groups--DHS leadership and state and local 
officials at fusion centers--found I&A;'s products to be useful, 
while customers in the other three groups--DHS components, the 
Intelligence Community, and private critical infrastructure 
sectors--generally did not.''\59\ GAO found that the 
Department's intelligence framework failed to establish 
strategic intelligence priorities.\60\ Instead, DHS allowed 
components to drive analysis that did not lead to intelligence 
products that ``aligned to support departmental 
priorities.''\61\
---------------------------------------------------------------------------
    \58\Government Accountability Office, GAO 14-397, DHS Intelligence 
Analysis: Additional Actions Needed to Address Analytic Priorities and 
Workforce Challenges (June 2014), https://www.gao.gov/assets/670/
663794.pdf.
    \59\Id. at 17.
    \60\Id. at Highlights.
    \61\Id.
---------------------------------------------------------------------------
    The Department has an important role to serve within the 
United States Intelligence Community. It collects and owns 
valuable raw intelligence and data about trade, travel, border 
crossings, immigration, cybersecurity incidents, and financial 
crimes, which is unique compared to data owned by other 
intelligence partners. DHS is the only Intelligence Community 
partner statutorily charged with sharing information and 
intelligence with state, local, tribal and territorial 
governments, and private sector partners.\62\ Strengthening the 
DHS intelligence enterprise and better serving these customers 
will help the Department carry out its missions.
---------------------------------------------------------------------------
    \62\Department of Homeland Security, Office of Intelligence and 
Analysis, https://www.dhs.gov/office-intelligence-and-analysis; and 
``Directorate for Information Analysis and Infrastructure Protection; 
Access to Information'' Subtitle A of Title II of the Homeland Security 
Act of 2002, Pub. L. No. 107-296 (107th Cong.) (2002).
---------------------------------------------------------------------------
    Title III of the Act directs the Secretary, acting through 
the Chief Intelligence Officer, to establish an intelligence 
doctrine for the Department. It requires the Secretary to 
prioritize the provision of expert staff who are knowledgeable 
about the intelligence functions of Department component 
programs to assist the Chief Intelligence Officer. It also 
codifies the existing Homeland Security Counter Threats 
Advisory Board to ensure ongoing Department-wide coordination. 
These provisions will enhance the effectiveness of the entire 
homeland security enterprise by addressing the longstanding 
challenges related to the lack of strategic priorities driving 
DHS component intelligence programs.
    Title III authorizes current efforts to integrate component 
systems into a unified Homeland Security Data Framework that 
facilitates Department-wide sharing. It also directs the Chief 
Intelligence Officer to exert greater authority over the 
intelligence enterprise within the Department by developing and 
disseminating guidelines for the processing, analysis, 
production, and dissemination of homeland security and 
terrorism information within the Department. These requirements 
will streamline sharing within the DHS intelligence enterprise 
by standardizing intelligence reporting formats and ensuring 
component data systems are interoperable.
    The Act also consolidates existing fusion center 
requirements and includes language that authorizes existing 
training to ensure fusion centers protect the privacy of U.S. 
persons while also providing meaningful support to Federal 
national security missions. It strengthens congressional 
oversight by requiring the Secretary to track the Federal 
funding provided to such centers.
    Title III requires several terrorism-related threat 
assessments and after-action reports. This Committee heard 
testimony from frontline responders to terrorism that ``the 
information gap still remains.''\63\ During the Committee's 
2016 hearing examining how the country's first responders 
prepare for and respond to terrorist incidents, former Boston 
Police Commissioner Edward Davis recommended that the Federal 
Government regularly audit ``the transfer of information'' 
related to terrorist suspects and activities before 
attacks.\64\ In response to limited information sharing prior 
to the 2016 Orlando nightclub attack, Chairman Johnson asked 
for ``a thorough, independent review'' of the FBI's removal of 
Omar Mateen from the Terrorist Screening Database.\65\ This 
Act's terrorism reporting requirements will require DHS to 
provide recommendations to Congress to improve threat and 
information sharing before events to better prevent 
terrorism.\66\ The Act also requires an explanation of gaps in 
national security that could be addressed to prevent future 
acts of terrorism and recommendations for measures to address 
identified gaps.
---------------------------------------------------------------------------
    \63\Frontline Response to Terrorism in America: Hearing Before the 
S. Comm. on Homeland Sec. & Governmental Affairs, 114th Cong. (2016) 
(testimony of Mark S. Ghilarducci, Director, California Office of 
Emergency Services and the Governor's Homeland Security Advisor).
    \64\Id. (testimony of Edward F. Davis III, Former Commissioner, 
Boston Police Department).
    \65\Press Release, United States Senator Ron Johnson, Chairman 
Johnson Seeks Independent Review of Why Orlando Terrorist Was Taken Off 
Terror Watchlist (July 27, 2016), https://www.hsgac.senate.gov/media/
majority-media/chairman-johnson-seeks-independent-review-of-why-
orlando-terrorist-was-taken-off-terror-watchlist.
    \66\Tom Coburn, A Review of the Department of Homeland Security's 
Missions and Performance 20 & 22 (2015), https://www.hsgac.senate.gov/
download/?id=B92B8382-DBCE-403C-A08A-727F89C2BC9B.
---------------------------------------------------------------------------
    This legislation also requires a report on the benefits, 
costs, and risks of a DHS-sponsored security clearance process 
for law enforcement partners to improve the Department's 
ability to transfer sensitive or classified information to 
first responders to prevent an attack.
    Several other requirements of Title III aim to improve the 
timely sharing of threat information with law enforcement. DHS 
is required to develop and share a list of its secure 
facilities with appropriate partners to improve those partners' 
timely access to classified threat information. A GAO report 
will assess the effectiveness of, and recommend improvements 
for, DHS staffing to fusion centers. DHS will also be required 
to share information with state and local law enforcement 
through fusion centers about the release of incarcerated 
terrorists.
    This Committee also suggests strengthening the Department's 
counternarcotics efforts through the use of the National 
Network of Fusion Centers.\67\ As the opioid epidemic continues 
to pose a serious threat to the health and safety of U.S. 
citizens, DHS must consider ways to include fusion centers in 
the information sharing process. A DHS strategy will highlight 
ways to support law enforcement investigations and suggest best 
practices for fusion center participation.
---------------------------------------------------------------------------
    \67\Senator Johnson suggested this role for fusion centers during 
the HSGAC nomination hearing for U/SIA Glawe on July 11, 2017; see also 
``Counternarcotics Officer'' Section 878 of Subtitle H of Title VIII of 
the Homeland Security Act of 2002, Pub. L. No. 107-296 (107th Cong.) 
(2002).
---------------------------------------------------------------------------
    Additionally, Title III requires DHS to focus on improving 
information sharing to counter threats from issues such as: 
opioid trafficking in the mail, virtual currencies, and border 
security vulnerabilities. A 2018 report by this Committee's 
Permanent Subcommittee on Investigations examined opioid 
trafficking in the international mail system and recommended 
increased information sharing about this threat.\68\ The 
legislation requires DHS to develop a strategy for such 
information sharing that incorporates DHS components, the U.S. 
Postal Service, and other stakeholders. It also requires DHS to 
brief Congress on a holistic assessment of the threat presented 
by terrorist use of pharmaceutical-based chemicals. The 
briefing will include an assessment of the Government's 
capability to mitigate such an attack and a strategy to address 
any gaps in those capabilities.
---------------------------------------------------------------------------
    \68\S. Permanent Subcomm. On Investigations, Staff Report, 
Combatting the Opioid Crisis: Exploiting Vulnerabilities in 
International Mail (Jan. 24, 2018), available at https://
www.hsgac.senate.gov/imo/media/doc/
Combatting%20the%20Opioid%20Crisis%20-
%20Exploiting%20Vulnerabilities%20in%20International%20Mail1.pdf.
---------------------------------------------------------------------------
    To counter this threat, Title III requires DHS, with other 
agencies, to consider the threats posed by distributed ledger 
technologies. This provision was included to counter potential 
use of virtual currency technologies by foreign actors, 
terrorists, and criminal organizations that turn to those tools 
for the perceived anonymity they offer.\69\
---------------------------------------------------------------------------
    \69\Zachary K. Goldman, Ellie Maruyama, Elizabeth Rosenberg, 
Edoardo Saravalle & Julia Solomon-Strauss, Terrorist Use of Virtual 
Currencies: Containing the Potential Threat, Center for New American 
Security (May 2017), available at https://s3.amazonaws.com/
files.cnas.org/documents/CNASReport-TerroristFinancing-Final.pdf.
---------------------------------------------------------------------------

     Title IV--Emergency Preparedness, Response, and Communications

    The Homeland Security Act of 2002 authorized DHS to 
administer Federal homeland security grant programs to assist 
state and local governments and other partners to enhance the 
homeland security enterprise.\70\ These grants focused on 
assisting state and local governments prepare for and respond 
to terrorist attacks, secure critical infrastructure, assist 
nonprofit organizations, and secure high-threat and high-risk 
urban areas.\71\ The Implementing Recommendations of the 9/11 
Commission Act of 2007 authorized a number of DHS grants and 
mandated some of their allocation methodologies.\72\
---------------------------------------------------------------------------
    \70\Pub. L. No. 107-296 (2002). Grant programs over time included: 
Nunn-Lugar-Domenici Program, Emergency Management Performance Grant 
Program, Homeland Security Grant Program, State Homeland Security Grant 
Program, Urban Area Security Initiative, Operation Stonegarden, 
Intercity Bus Security Grant Program, Intercity Passenger Rail 
Security--Amtrak Grant Program, Port Security Grant Program, Tribal 
Homeland Security Grant Program, and Transit Security Grant Program. 
See Cong. Research Serv., Department of Homeland Security Preparedness 
Grants: A Summary and Issues at 2 (Oct. 28, 2016), https://fas.org/sgp/
crs/homesec/R44669.pdf.
    \71\Cong. Research Serv., Department of Homeland Security 
Preparedness Grants: A Summary and Issues (Oct. 28, 2016), https://
fas.org/sgp/crs/homesec/R44669.pdf.
    \72\Pub. L. No. 110-53 (110th Cong.) (2007).
---------------------------------------------------------------------------
    The Federal Emergency Management Agency's (FEMA) Grants 
Program Directorate (GPD) administers the eight preparedness 
(non-disaster) grant programs.\73\ These programs ``support our 
grantees develop[ment] and sustain[ment of] capabilities at the 
state and local, tribal, and territorial levels and in our 
nation's highest-risk transit systems, ports, and along our 
borders to prevent, protect against, respond to, recover from, 
and mitigate terrorism and other high-consequence disasters and 
emergencies.''\74\
---------------------------------------------------------------------------
    \73\FEMA, Preparedness (Non-Disaster) Grants, https://www.fema.gov/
preparedness-non-disaster-grants (last updated Apr. 9, 2018).
    \74\FEMA, Grants, https://www.fema.gov/grants (last updated June 
14, 2018).
---------------------------------------------------------------------------
    All Federal emergency management preparedness non-disaster 
grants are based on capability targets and capability gaps 
identified during the Threat and Hazard Identification and Risk 
Assessment (THIRA) process, and assessed in the Stakeholder 
Preparedness Review (SPR).\75\ THIRA is a three-step common 
risk assessment process that assists individuals, businesses, 
faith-based organizations, nonprofit groups, schools and 
academia, and all levels of government to understand their 
risks and estimate capability requirements.\76\ SPR is a self-
assessment of a jurisdiction's current capability levels 
against the capability targets identified in its THIRA.\77\
---------------------------------------------------------------------------
    \75\FEMA, Stakeholder Preparedness Review, https://www.fema.gov/
stakeholder-preparedness-review (last updated May 31, 2018).
    \76\FEMA, Threat and Hazard Identification and Risk Assessment, 
http://www.fema.gov/threat-and-hazard-identification-and-risk-
assessment (last updated Feb. 7, 2018).
    \77\FEMA, About the Stakeholder Preparedness Review, http://
www.fema.gov/state-preparedness-report#wcm-survey-target-id (last 
updated Feb. 22, 2018).
---------------------------------------------------------------------------
    The DHS OIG and the GAO have consistently identified issues 
with the preparedness grants, such as lack of internal 
oversight and metrics to show that the grants are reducing the 
Nation's collective risk.\78\ In a 2016 report to DHS, the DHS 
OIG determined ``that FEMA had not adequately analyzed 
recurring recommendations to implement changes to improve its 
oversight of these grants. This occurred because FEMA did not 
clearly communicate internal roles and responsibilities and did 
not have policies and procedures to conduct substantive trend 
analyses of audit recommendations.''\79\ DHS OIG further 
determined that ``because FEMA regularly waives these 
questioned costs, the subgrantees have no motivation to comply 
with basic contracting and acquisition principles, and the 
problem will continue to fester.''\80\
---------------------------------------------------------------------------
    \78\See e.g. Gov't Accountability Office, GAO-16-38, Strengthening 
Regional Coordination Could Enhance Preparedness Efforts (2016), 
https://www.gao.gov/assets/680/674968.pdf; Gov't Accountability Office, 
GAO-12-526T, Managing Preparedness Grants and Assessing National 
Capabilities: Continuing Challenges Impede FEMA's Progress, (2012); 
Dep't of Homeland Security Office of Inspector General, OIG-16-49, 
Analysis of Recurring Audit Recommendations could Improve FEMA's 
Oversight of HSGP (2016) https://www.oig.dhs.gov/assets/Mgmt/2016/OIG-
16-49-Mar16.pdf.
    \79\Dep't of Homeland Security Office of Inspector General, OIG-17-
08, Major Management and Performance Challenges Facing the Department 
of Homeland Security at 6 (Nov. 2016) https://www.oig.dhs.gov/sites/
default/files/assets/2017/OIG-17-08-Nov16.pdf.
    \80\Preparedness, Response, and Rebuilding: Lessons from the 2017 
Disasters: Hearing Before the H. Comm. on Homeland Sec., 115th Cong. 
(2018) (statement of John Kelly, Acting Inspector General, Dep't of 
Homeland Sec. Office of Inspector General).
---------------------------------------------------------------------------
    In testimony before the Committee's Subcommittee on Federal 
Spending Oversight and Emergency Management in 2016, GAO 
highlighted FEMA's challenges in managing its preparedness 
grants.\81\ For example, GAO noted coordination challenges 
between FEMA headquarters and regional staff in managing 
preparedness grants, which create inefficiencies.\82\ GAO 
recommended that FEMA develop a plan with timeframes, goals, 
metrics, and milestones that target resolving longstanding 
challenges with its grants management model.\83\
---------------------------------------------------------------------------
    \81\FEMA: Assessing Progress, Performance, and Preparedness: 
Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 
Subcomm. On Fed. Spending Oversight & Emergency Mgmt., 114th Cong. 
(2016) (statement of Christopher Currie, Director of Emergency 
Management, National Preparedness, and Critical Infrastructure 
Protection, Homeland Security and Justice Team, U.S. Government 
Accountability Office) [hereinafter ``FEMA Preparedness Grant 
Hearing''].
    \82\FEMA: Assessing Progress, Performance, and Preparedness: 
Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 
114th Cong. (2016) (statement of Christopher Currie, Director of 
Emergency Management, National Preparedness, and Critical 
Infrastructure Protection, Homeland Security and Justice Team, U.S. 
Government Accountability Office).
    \83\FEMA: Assessing Progress, Performance, and Preparedness: 
Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 
114th Cong. (2016) (statement of Christopher Currie, Director of 
Emergency Management, National Preparedness, and Critical 
Infrastructure Protection, Homeland Security and Justice Team, U.S. 
Government Accountability Office).
---------------------------------------------------------------------------
    The Urban Area Security Initiative (UASI) and State 
Homeland Security Grant Program (SHSGP) have been identified as 
examples of FEMA grant programs that would be better served by 
stronger performance metrics. A 2012 Committee minority staff 
report, Safety at Any Price, noted that DHS issued guidance-
waiving requirements and expanded the allowable uses of certain 
grant programs to encourage state and local governments to use 
more than $8.2 billion in previously unspent grants as a 
stimulus package.\84\ The Committee report found that ``FEMA 
cannot demonstrate how UASI dollars (or for that matter, any 
other homeland security grant dollars) have helped to buy-down 
risk and enhance the nation's ability to prevent, respond to, 
or recover from manmade attacks or natural disasters.''\85\
---------------------------------------------------------------------------
    \84\Minority Staff Report, Sen. Tom Coburn, Safety at Any Price: 
Assessing the Impact of Homeland Security Spending in U.S. Cities (Dec. 
2012), https://info.publicintelligence.net/SenatorCoburn-UASI.pdf.
    \85\Minority Staff Report, Sen. Tom Coburn, Safety at Any Price: 
Assessing the Impact of Homeland Security Spending in U.S. Cities, 
(Dec. 2012) https://info.publicintelligence.net/SenatorCoburn-UASI.pdf.
---------------------------------------------------------------------------
    Additionally, coordination challenges among four FEMA grant 
programs that share similar goals and fund similar projects 
contribute to the risk of overlap and duplication among the 
grant programs.\86\ GAO recommended that FEMA take steps, as it 
develops its new Non-Disaster Grant Management System, to 
collect project information with sufficient detail to identify 
potential duplication among its grant programs.\87\
---------------------------------------------------------------------------
    \86\FEMA: Assessing Progress, Performance, and Preparedness: 
Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 
114th Cong. (2016) (statement of Christopher Currie, Director of 
Emergency Management, National Preparedness, and Critical 
Infrastructure Protection, Homeland Security and Justice Team, U.S. 
Government Accountability Office).
    \87\FEMA: Assessing Progress, Performance, and Preparedness: 
Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 
114th Cong. (2016) (statement of Christopher Currie, Director of 
Emergency Management, National Preparedness, and Critical 
Infrastructure Protection, Homeland Security and Justice Team, U.S. 
Government Accountability Office), https://www.gao.gov/assets/680/
676484.pdf.
---------------------------------------------------------------------------
    Similarly, a lack of coordination among Federal, state, 
tribal, and local government agencies that transmit public 
alerts over the radio, television, and on their wireless 
devices has created challenges to effectively communicating 
critical messages to the American public. While FEMA--which 
administers the Integrated Public Alert and Warning System 
(IPAWS)\88\ at the heart of our national emergency alert 
infrastructure--provides guidance to state, tribal, and local 
officials, it does not require them to follow common standards 
to participate in IPAWS. Without strong coordination, local 
governments widely differ on when and how to issue alerts, 
often adopting technology and establishing protocols that suit 
local needs without consideration of best practices that may 
help reduce the risk of issuing a false notification that could 
undermine the public's confidence in the emergency alert 
system. Coordination is a critical need because alerts pose 
national implications, as demonstrated by the false missile 
alert by the state of Hawaii in January 2018.\89\
---------------------------------------------------------------------------
    \88\Pub. L. No. 114-143 (114th Cong.) (2016).
    \89\Press Release, State of Hawaii, Dep't of Defense, Emergency 
Management Agency (Jan. 13, 2018), available at https://dod.hawaii.gov/
hiema/files/2018/01/20180113-NR-HI-EMA-statement-on-missile-launch-
false-alarm.pdf.
---------------------------------------------------------------------------
    GAO has also identified areas for improvement with FEMA's 
management of the THIRA process. In March 2013, GAO found that 
FEMA faced challenges that may call into question the 
usefulness of the THIRA process.\90\ For example, the National 
Preparedness Report noted that while many programs exist to 
build and sustain preparedness capabilities, challenges remain 
in measuring their progress over time.\91\ According to GAO, 
FEMA officials stated that the THIRA process is intended to 
develop a set of national capability performance requirements 
and measures.\92\ However, GAO reported in March 2016 that such 
requirements and measures had not yet been developed.
---------------------------------------------------------------------------
    \90\AFEMA has Made Progress in Improving Grant Management and 
Assessing Capabilities, but Challenges Remain: Hearing Before the H. 
Comm. on Homeland Sec., Subcomm. On Emergency Preparedness, Response, 
and Communications, 113th Cong. (2013) (statement of David Maurer, 
Director of Homeland Security and Justice, U.S. Government 
Accountability Office), https://www.gao.gov/assets/660/653122.pdf.
    \91\Id.
    \92\Id.
---------------------------------------------------------------------------
    Title IV of the Act authorizes the Department's existing 
preparedness grant programs including the UASI, SHSGP, Transit 
Security Grant Program, Port Security Grant Program, Operation 
Stonegarden, and the Non-Profit Security Grant Program. In 
conjunction with authorizing the grants, however, the 
legislation requires the creation of grants metrics to create 
transparency and accountability within the grant programs. The 
intent is to require DHS to develop effective metrics to 
measure the programs' effectiveness where it currently does 
not.
    Section 1410 requires the Administrator of FEMA to develop 
grant metrics and assess how well specific preparedness grants 
are closing capability gaps, if at all. These metrics will 
provide FEMA and Congress with the information needed to make 
more prudent and targeted investments in those programs moving 
forward.
    Additionally, Title IV's authorization of the UASI and 
SHSGP narrows the FEMA Administrator's previously broad 
discretion over what can be funded by the subject programs. 
This, combined with the newly created performance metrics, will 
ensure more prudent investment of grant funding.
    To address the potential overlap and duplication created by 
FEMA's multiple preparedness grants and give DHS flexibility to 
better direct funding to critical needs and capability gaps, 
Section 1412 of the Act requires DHS to evaluate the merits of 
consolidating the preparedness grant programs and/or 
transferring management of the programs to another entity 
within DHS. The Secretary is prohibited from implementing a 
grant program consolidation without prior congressional 
approval.
    To address a lack of standardization and coordination 
within the national emergency notification system network, 
Title IV requires the IPAWS subcommittee of the FEMA National 
Advisory Council to make recommendations on the best practices 
that state and local governments should follow to maintain the 
integrity of IPAWS. Additionally, it makes the Federal 
Government primarily responsible for alerting the public in the 
event of a missile threat.

              Title V--Federal Emergency Management Agency

    On April 1, 1979, President Jimmy Carter signed the 
executive order that created FEMA\93\ after decades of ad hoc 
disaster legislation and programs.\94\ Today, the centerpiece 
legislation for providing Federal aid for emergency and 
disaster relief is the Robert T. Stafford Disaster Relief and 
Emergency Assistance Act (Stafford Act).\95\ The Stafford Act 
provides an emergency preparedness framework for the protection 
of life and property from hazards. While it confers 
responsibility for emergency preparedness jointly to the 
Federal, state, and local governments, congressional intent for 
response and recovery was for the Federal Government to step in 
only when a state has been overwhelmed.\96\ The Post-Katrina 
Emergency Management Reform Act of 2006 (PKEMRA) provided 
important provisions, including the key principle that after a 
major disaster or emergency declaration, accelerated Federal 
assistance could be sent by FEMA even in the absence of a 
specific request by a state to save lives and prevent 
suffering.\97\
---------------------------------------------------------------------------
    \93\Executive Order 12127, March 31, 1979, https://www.hsdl.org/
?view&did;=464521.
    \94\Ranking Member Tom Coburn, An Imperfect Storm, U.S. Senate 
Homeland Security & Governmental Affairs Committee, Table A.1, 18, 
available at https://www.hsgac.senate.gov/download/?id=5518F153-BBB6-
4AFF-BCDB-F700A58479DD.
    \95\Pub. L. No. 100-707 (100th Cong.) (1988).
    \96\Id.
    \97\6 USC Sec. 701.
---------------------------------------------------------------------------
    The 2017 hurricanes and wildfires tested the limits of the 
nation's disaster response capabilities.\98\ In total, the 
Federal Government responded to 59 Federally-declared disasters 
and provided support through 16 emergency declarations and 62 
fire assistance declarations.\99\ The storms and fires affected 
roughly fifteen percent of the American population.\100\ The 
Federal response to the 2017 major hurricanes--Harvey, Irma, 
and Maria--tested an already strained FEMA workforce, which 
maintained surge staffing of the National Response Coordination 
Center for a record 76 consecutive days.\101\
---------------------------------------------------------------------------
    \98\Fed. Emergency Mgmt. Agency, FEMA Reflects on Historic Year 
(Dec. 29, 2017), available at https://www.fema.gov/news-release/2017/
12/29/fema-reflects-historic-year.
    \99\Id.
    \100\FEMA: Prioritizing a Culture of Preparedness: Hearing Before 
the S. Committee on Homeland Sec. & Governmental Affairs, 115th Cong. 
(Apr. 11, 2018), http://www.hsgac.senate.gov/download/2018-04-11-long-
testimony (statement of the Honorable Brock Long).
    \101\Fed. Emergency Mgmt. Agency, FEMA Reflects on Historic Year 
(Dec. 29, 2017), available at https://www.fema.gov/news-release/2017/
12/29/fema-reflects-historic-year.
---------------------------------------------------------------------------
    The unprecedented recovery effort that followed 2017's 
disasters highlighted the need to incentivize pre-disaster 
mitigation efforts.\102\ Informed by hurricanes Harvey, Irma, 
and Maria, FEMA's 2018-2022 Strategic Plan focuses on moving 
assistance efforts toward pre-event investment and giving 
states and localities the personnel and training that they need 
to respond to any disaster.\103\
---------------------------------------------------------------------------
    \102\FEMA: Prioritizing a Culture of Preparedness: Hearing Before 
the S. Committee on Homeland Sec. & Governmental Affairs, 115th Cong. 
(Apr. 11, 2018), https://www.hsgac.senate.gov/hearings/fema-
prioritizing-a-culture-of-preparedness (statement of the Honorable 
Brock Long).
    \103\Fed. Emergency Mgmt. Agency, 2018-2022 Strategic Plan, (2018), 
available at https://www.fema.gov/media-library-data/1521736077767-
89fc0afeacb7a93bd7b6a1091aaeba2b/strat_plan.pdf pp. 21-22.
---------------------------------------------------------------------------
    Finally, as evidenced by the false missile alert in Hawaii 
on January 13, 2018, public alert and warning systems carry 
significant ramifications if improperly managed or if state 
emergency management programs do not understand their levels of 
authority.\104\
---------------------------------------------------------------------------
    \104\Hawaii Emergency Mgmt. Agency, Press Release (Jan. 13, 2018) 
available at https://dod.hawaii.gov/hiema/files/2018/01/20180113-NR-HI-
EMA-statement-on-missile-launch-false-alarm.pdf.
---------------------------------------------------------------------------
    To address these issues, Title V of the Act reauthorizes 
FEMA, including authorizing amounts for management and 
administration purposes for Fiscal Year (FY) 2018, FY 2019, and 
FY 2020 and makes a number of reforms. The authorization levels 
would set the stage to provide FEMA with consistent funding as 
the agency continues to respond to disasters, help communities 
recover after a disaster, and mitigate against future 
disasters.
    Title V authorizes the National Domestic Preparedness 
Consortium (NDPC), a DHS partner providing training to 
emergency responders throughout the United States and its 
territories.\105\ Originally founded as a Department of Justice 
program in 1998, the NDPC now partners with DHS to deliver 
state and local training.\106\ To date, two million U.S. 
emergency responders have attended the 176 courses offered by 
NDPC. Section 1503 codifies this program and section 1504 
addresses the unique training issues of rural communities by 
authorizing DHS to establish a rural domestic preparedness 
consortium.
---------------------------------------------------------------------------
    \105\The National Domestic Preparedness Consortium, available at 
https://www.ndpc.us/pdf/About_NDPC.pdf.
    \106\Id.
---------------------------------------------------------------------------
    In 2006, by executive order, the DHS Center for Faith Based 
and Neighborhood Partnerships (DHS Center) was created with the 
mission of helping emergency managers effectively engage with 
faith and community-based groups.\107\ In 2010, the DHS Center 
expanded its focus to include human trafficking by becoming a 
founding member of the Blue Campaign, the Department's 
comprehensive, intra-agency approach to fighting human 
trafficking.\108\ Section 1505 of the Act codifies this 
program.
---------------------------------------------------------------------------
    \107\Department of Homeland Security, DHS Center for Faith-Based 
Neighborhood Partnerships, available at https://www.dhs.gov/dhs-center-
faith-based-neighborhood-partnerships (last accessed April 15, 2018).
    \108\Id.
---------------------------------------------------------------------------
    For FEMA employees, it takes years of training and 
experience to effectively deploy FEMA's programs to state, 
local, tribal, territorial governments and their disaster 
survivors.\109\ This Committee recognizes the importance and 
value of FEMA employees and the ability of FEMA to maintain a 
career ladder within the agency for retention of skilled 
response and recovery personnel. Section 1516 of the Act will 
allow the FEMA Administrator to appoint experienced personnel 
currently part of a temporary cadre to permanent positions in 
the agency. These employees will be assigned in the same manner 
as competitive service employees with competitive status when 
considered for transfer, reassignment, or promotion to such 
positions. To qualify for such an appointment, prospective 
employees must have maintained continuous service with the 
agency for three years prior.
---------------------------------------------------------------------------
    \109\U.S. Government Accountability Office, GAO-15-437, Federal 
Emergency Management Agency: Additional Planning and Data Collection 
Could Help Improve Workforce Management Efforts (Jul. 2015), available 
at https://www.gao.gov/assets/680/671276.pdf.
---------------------------------------------------------------------------
    Developing resilient capacity in communities prior to a 
disaster has proven to reduce loss of life as well as the 
economic disruption that occurs following a disaster.\110\ By 
investing more in pre-disaster mitigation funding, there is 
potential for a greater return on investment of taxpayer 
dollars by decreasing the overall cost of post-disaster 
spending over time, while also increasing the nation's overall 
resiliency and catastrophic readiness.\111\ The Committee 
supports the establishment of the National Public 
Infrastructure Pre-disaster Mitigation Assistance Program in 
Section 1519 of the Act, which will commit Federal funding to 
pre-disaster mitigation efforts. One hundred and eighty days 
after a major disaster declaration, an estimate would be made 
for the combined obligations of Stafford Act sections 403, 406, 
407, 408, 410, and 416 grant funding;\112\ consequently, an 
additional six percent of that estimate would be transferred 
from the Disaster Relief Fund (DRF) to this program for use.
---------------------------------------------------------------------------
    \110\FEMA: Prioritizing a Culture of Preparedness: Hearing Before 
the S. Committee on Homeland Sec. & Governmental Affairs, 115th Cong. 
(Apr. 11, 2018) available at https://www.hsgac.senate.gov/hearings/
fema-prioritizing-a-culture-of-preparedness (statement of the honorable 
Brock Long).
    \111\National Institute of Building Sciences, Natural Hazard 
Mitigation Saves: 2017 Interim Report, available at https://
www.nibs.org/page/mitigationsaves (last accessed Apr. 16, 2018).
    \112\Section 403 of the Stafford Act provides for Essential 
Assistance, Section 406 provides for Repair, Restoration, and 
Replacement of Damaged Facilities, Section 407 provides for Debris 
Removal, Section 408 provides for Federal Assistance to Individuals and 
Households, Section 410 provides for Unemployment Assistance, and 
Section 416 provides for Crisis Counseling Assistance and Training. 
Pub. L. No. 100-707 (100th Cong.) (1988).
---------------------------------------------------------------------------
    As previously noted, administrative costs associated with 
implementing FEMA's disaster recovery programs rest in large 
part at the state, local, tribal and territorial level.\113\ 
Often these costs can be substantially burdensome for the 
impacted entity to meet.\114\ Section 1515 of the Act will 
increase allowable funding percentages for administrative 
costs, which coupled with FEMA's efforts to reduce the 
complexity of the disaster administrative process, will empower 
state, local, tribal and territorial authorities to more 
effectively deliver vital recovery programs to disaster 
survivors.
---------------------------------------------------------------------------
    \113\Fed. Emergency Mgmt. Agency, Memorandum For: All Regional 
Directors, Jun. 2, 1993, available at https://www.fema.gov/media-
library-data/20130726-1717-25045-4279/
2_state_management_costs_for_disaster_assistance_programs.txt.
    \114\FEMA: Prioritizing a Culture of Preparedness: Hearing Before 
the S. Committee on Homeland Sec. & Governmental Affairs, 115th Cong. 
(Apr. 11, 2018) available at https://www.hsgac.senate.gov/hearings/
fema-prioritizing-a-culture-of-preparedness (statement of the honorable 
Brock Long).
---------------------------------------------------------------------------
    Finally, Section 1521 of the Act takes steps toward 
standardizing and promulgating best practices for public alert 
and warning systems. Additionally, due to the ramifications 
inherent to missile alerts and warnings, this section transfers 
authority to originate such warnings to the Federal Government.

       Title VI--Cybersecurity and Infrastructure Security Agency

    The Homeland Security Act of 2002 established DHS as 
responsible for leading and coordinating efforts to protect 
American critical infrastructure.\115\ Previous administrations 
have worked to further define the Department's role in 
protecting infrastructure, such as through President George W. 
Bush's Homeland Security Presidential Directive (HSPD) 7 and 
its superseding Presidential Policy Directive (PPD) 21, issued 
by President Obama, which required DHS to develop policies, 
methodologies, and approaches to ensure the security and 
resilience of the sixteen critical infrastructure sectors.\116\
---------------------------------------------------------------------------
    \115\See Homeland Security Act of 2002, Pub. L. No. 107-296, 
Subtitle B (107th Cong.) (2002).
    \116\See Homeland Security Presidential Directive (HSPD)-7, 
Critical Infrastructure Identification, Prioritization, and Protection 
(Dec. 17, 2003); Presidential Policy Directive (PPD)-21, Critical 
Infrastructure Security and Resilience (Feb. 12, 2013).
---------------------------------------------------------------------------
    The National Protection and Programs Directorate (NPPD) was 
established within DHS in 2007 to execute functions that 
protect Federal agencies and critical infrastructure from 
physical and cyber threats and hazards.\117\ NPPD is currently 
comprised of five divisions: the Federal Protective Service 
(FPS), the Office of Biometric Identity Management, the Office 
of Cybersecurity and Communications, the Office of Cyber and 
Infrastructure Analysis, and the Office of Infrastructure 
Protection.\118\
---------------------------------------------------------------------------
    \117\See 6 U.S.C. Sec. 315. See also 6 U.S.C. Sec. 452 (authorizing 
the Secretary of the Department of Homeland Security to allocate or 
reallocate functions among the officers of the Department, and to 
establish, consolidate, alter, or discontinue organizational units 
within the Department).
    \118\See U.S. Gov't Accountability Off., GAO-16-140T, National 
Protection and Programs Directorate: Factors to Consider when 
Reorganizing (Oct. 2015), https://www.gao.gov/assets/680/672944.pdf 
(last visited Oct. 10, 2018).
---------------------------------------------------------------------------
    The scope and nature of the Department's cybersecurity 
mission and role within the Federal Government has evolved to 
correspond to the changing threat environment and growth of the 
Federal Government's understanding of the cyber domain.\119\ 
This Committee and the Congress worked in the 113th and 114th 
Congresses to enact significant legislation empowering DHS with 
authorities and resources to fulfill its cybersecurity mission 
areas, including enhancing cybersecurity information sharing 
and Federal information security management.\120\ The Committee 
also enacted legislation to provide the Department with greater 
flexibility and resources to strengthen its cybersecurity 
workforce to carry out its authorities.\121\
---------------------------------------------------------------------------
    \119\See Homeland Security Act of 2002, Pub. L. No. 107-296, 
Sec. 223, 224, and 225 (107th Cong.) (2002).
    \120\See Congressional Research Service (CRS), DHS's Cybersecurity 
Mission--An Overview (June 2017); CRS, Cybersecurity Legislation in the 
113th and 114th Congress (March 2017); Cybersecurity Workforce 
Assessment Act, Pub. L. No. 113-246 (113th Cong.) (2014); Cybersecurity 
Enhancement Act of 2014, Pub. L. 113-274 (114th Cong.) (2014); Border 
Patrol Agent Pay Reform Act of 2014, Pub. L. No. 113-277 (114th Cong.) 
(2014); National Cybersecurity Protection Act of 2014, Pub. L. 113-282 
(114th Cong.) (2014); and Federal Information Security Modernization 
Act of 2014, Pub. L. 113-283 (114th Cong.) (2014).
    \121\Cybersecurity Act of 2015, Pub. L. 114-113, Div. N (included 
the Cybersecurity Information Sharing Act, National Cybersecurity 
Protection Advancement Act of 2015, Federal Cybersecurity Enhancement 
Act of 2015, and the Federal Cybersecurity Workforce Assessment Act of 
2015) (115th Cong.) (2015).
---------------------------------------------------------------------------
    However, past oversight of NPPD and NPPD's programs by the 
Committee and other independent oversight bodies like GAO have 
revealed challenges that limit the Directorate's ability to 
execute its critical missions. In September 2017, for example, 
GAO reported that DHS, and by extension NPPD, needs to ensure 
proper execution of its assigned responsibilities under the 
Federal Information Security Modernization Act (FISMA). 
Recommendations included improving coordination on the 
development of a plan and schedule to determine whether the 
security capability model established for evaluating the extent 
to which Federal agencies information security programs are 
FISMA compliant is useful and provides consistent and 
comparable results.\122\
---------------------------------------------------------------------------
    \122\See U.S. Gov't Accountability Off., GAO-17-549, Weaknesses 
Continue to Indicate Need for Effective Implementation of Policies and 
Practices (Sept. 2017), https://www.gao.gov/products/GAO-17-549.
---------------------------------------------------------------------------
    Additionally, the often ineffective and inefficient 
implementation of NPPD's primary mechanisms for sharing and 
disseminating information on cyber-related incidents to Federal 
and non-Federal stakeholders, including private sector 
entities, has raised questions about the agency's ability to 
identify cyber-based threats, mitigate vulnerabilities and 
manage risks.\123\ GAO reported in February 2017 that NPPD's 
National Cybersecurity and Communication and Integration Center 
(NCCIC) is not fully carrying out its statutorily required 
functions as mandated by the National Cybersecurity Protection 
Act and Cybersecurity Act.\124\ In its report, GAO identified a 
number of programmatic impediments inhibiting the NCCIC's 
performance including those relating to the consolidation of 
entry points for receiving and logging incident data and 
maintaining the NCCIC's relationship with Federal and non-
Federal customers.\125\
---------------------------------------------------------------------------
    \123\See U.S. Gov't Accountability Off., GAO-16-294, DHS Needs to 
Enhance Capabilities, Improve Planning, and Support Greater Adoption of 
Its National Cybersecurity Protection System (Jan. 2016), https://
www.gao.gov/products/GAO-16-294; U.S. Gov't Accountability Off., GAO-
17-163, DHS's National Integration Center Generally Performs Required 
Functions but Needs to Evaluate Its Activities More Completely (Feb. 
2017), https://www.gao.gov/products/GAO-17-163.
    \124\U.S. Gov't Accountability Off., GAO-17-163, DHS's National 
Integration Center Generally Performs Required Functions but Needs to 
Evaluate Its Activities More Completely (Feb. 2017), https://
www.gao.gov/products/GAO-17-163.
    \125\Id.
---------------------------------------------------------------------------
    Within NPPD's Office of Infrastructure Protection, the 
Chemical Facility Anti-Terrorism Standards (CFATS) program has 
also been the subject of a number of oversight hearings 
relating to the improper implementation and mismanagement of 
the program.\126\ CFATS was first authorized by Congress in 
2007 to identify and regulate high-risk chemical facilities to 
reduce the likelihood of those chemicals being used in a 
terrorist attack.\127\ Prior to reauthorizing the program in 
2014, the Committee held a hearing and released a Majority 
Staff Report that examined the extent to which the CFATS 
regulatory regime reduced the risk that terrorists could 
exploit vulnerabilities at chemical facilities.\128\ The report 
found ``fundamental problems in the design, implementation and 
management of CFATS.''\129\ The report further noted that the 
CFATS program ``focuses on the wrong threats, shifts risk to 
other parts of the chemical sector and supply chain, and is 
unable to determine if it is improving security at the 
facilities it regulates.''\130\ The 2014 CFATS reauthorization 
bill included a series of requirements aimed at addressing the 
issues highlight by the Committee and GAO.\131\ The Committee 
continues to monitor and assess the implementation of the CFATS 
program, as the next deadline for reauthorization is in 
December 2018.\132\
---------------------------------------------------------------------------
    \126\Department of Homeland Security--Chemical Facility Anti-
Terrorism Standards (CFACTS) Program: Hearing before the H. Comm. On 
Appropriations (Sept. 20, 2012), available at https://
appropriations.house.gov/calendar/eventsingle.aspx?EventID=303717; 
Evaluating Internal Operation and Implementation of the Chemical 
Facility Anti-Terrorism Standards program (CFATS) by the Department of 
Homeland Security: Hearing before the H. Energy & Commerce Comm. (Feb. 
3, 2012), available at https://energycommerce.house.gov/hearings/
evaluating-internal-operation-and-implementation-chemical-facility-
anti/; Charting a Path Forward for the Chemical Facilities Anti-
Terrorism Standards Program: Hearing before the S. Homeland Sec. & 
Governmental Affairs Comm. (May 14, 2014), available at https://
www.hsgac.senate.gov/hearings/charting-a-path-forward-for-the-chemical-
facilities-anti-terrorism-standards-program; Industry Views of the 
Chemical Facility Anti-Terrorism Standards Program: Hearing before the 
H. Cybersecurity & Infrastructure Protection Subcomm. (Feb. 15, 2018), 
available at https://homeland.house.gov/hearing/industry-views-
chemical-facility-anti-terrorism-standards-program/.
    \127\Dep't of Homeland Sec., Chemical Facility Anti-Terrorism 
Standards (CFATS), https://www.dhs.gov/chemical-facility-anti-
terrorism-standards (last visited Oct. 9, 2018).
    \128\Charting a Path Forward for the Chemical Facilities Anti-
Terrorism Standards Program: Hearing before the S. Homeland Sec. & 
Governmental Affairs Comm. (May 14, 2014), available at https://
www.hsgac.senate.gov/hearings/charting-a-path-forward-for-the-chemical-
facilities-anti-terrorism-standards-program; Majority Staff Rept., Sen. 
Tom Coburn, S. Homeland Sec. & Governmental Affairs Comm., Chemical 
Insecurity: An Assessment of Efforts to Secure the Nation's Chemical 
Facilities from Terrorist Threats (July 2014), abstract available at 
https://www.hsdl.org/?abstract&did;=762338 (copy on file with Comm.).
    \129\Majority Staff Rept., Sen. Tom Coburn, S. Homeland Sec. & 
Governmental Affairs Comm., Chemical Insecurity: An Assessment of 
Efforts to Secure the Nation's Chemical Facilities from Terrorist 
Threats (July 2014), abstract available at https://www.hsdl.org/
?abstract&did;=762338 (copy on file with Comm.).
    \130\Id.
    \131\See generally Protecting & Securing Chemical Facilities from 
Terrorist Attacks Act of 2014, Pub. L. No. 113-254 (113th Cong.) 
(2014).
    \132\Id.
---------------------------------------------------------------------------
    FPS is responsible for protecting Federal facilities and 
their grounds.\133\ The Department of Homeland Security 
Appropriations Act of 2010 transferred FPS, then within the 
General Services Administration, to NPPD.\134\ GAO and the DHS 
OIG have reported extensively on FPS's longstanding human 
capital and operational challenges.\135\ In January 2016, GAO 
reported that lack of coordination between GSA and FPS, 
agencies that share responsibility for protecting facilities 
that are Federally-owned or leased, ``created inefficiencies 
and security risks.''\136\
---------------------------------------------------------------------------
    \133\Dep't of Homeland Sec., The Federal Protective Service, 
https://www.dhs.gov/topic/federal-protective-service (last visited Oct. 
9, 2018).
    \134\Pub. L. No. 111-83 (2009); FPS, Annual Report Fiscal Year 
2015, DHS 5 (2015), available at https://www.dhs.gov/sites/default/
files/publications/Federal%20Protective%20Service%20
Annual%20Report%20508%20Compliant%20FY2015.pdf; DHS, Creation of the 
Department of Homeland Security, https://www.dhs.gov/creation-
department-homeland-security (last updated Sept. 24, 2015); DHS, 
Secretary Napolitano Announces Transfer of Federal Protective Service 
to National Protection and Programs Directorate (Oct. 29, 2009), 
https://www.dhs.gov/news/2009/10/29/transfer-federal-protective-
service-national-protection-and-programs-directorate.
    \135\Gov't Accountability Office, GAO-16-384, FPS: Enhancements to 
Performance Measures and Data Quality Processes Could Improve Human 
Capital Planning (Mar. 24, 2016), https://www.gao.gov/products/GAO-16-
384; Gov't Accountability Office, GAO-16-135, FPS and GSA Should 
Strengthen Collaboration to Enhance Facility Security (2016), https://
www.gao.gov/products/GAO-16-135; Dep't of Homeland Sec. Office of 
Inspector General, OIG-16-02, The FPS Vehicle Fleet is Not Managed 
Effectively (Oct. 2015), https://www.oig.dhs.gov/assets/Mgmt/2016/OIG-
16-02-Oct15.pdf.
    \136\Gov't Accountability Office, GAO-16-135, FPS and GSA Should 
Strengthen Collaboration to Enhance Facility Security (2016), https://
www.gao.gov/products/GAO-16-135.
---------------------------------------------------------------------------
    Department leadership has cited that the current name, the 
``National Protection and Programs Directorate,'' obscures the 
focus of the Directorate and presents challenges for a common 
understanding among agency employees and stakeholders of NPPD's 
mission. Further, the fractured organization of NPPD hinders 
timely information sharing and synchronous action between 
cybersecurity mission-oriented personnel with physical security 
personnel in the Directorate.\137\
---------------------------------------------------------------------------
    \137\Examining DHS's Cybersecurity Mission: Hearing before the H. 
Comm. on Homeland Sec., Subcomm. on Cybersecurity and Infrastructure 
Protection (Oct. 2017), https://www.dhs.gov/news/2017/10/03/written-
testimony-nppd-house-homeland-security-subcommittee-cybersecurity-and 
(written statement of Jeanette Manfra).
---------------------------------------------------------------------------
    To clarify and streamline its organizational structure and 
mission, Title VI of this Act renames NPPD the Cybersecurity 
and Infrastructure Security Agency (CISA), and repositions it 
as an operational component agency within the Department. The 
purpose of this reorganization is to enable DHS to more 
effectively execute its existing authorities for overseeing the 
protection of Federal civilian agencies' networks and enhance 
the security of the nation's critical infrastructure assets. 
CISA is to be led by a Director and Deputy Director responsible 
for leading the Department's cybersecurity and infrastructure 
protection programs and ensuring cross-divisional coordination 
of efforts within the agency. CISA will consist of three 
operational divisions--the Cybersecurity Division, 
Infrastructure Security Division, and Emergency Communications 
Division--all led by Assistant Directors.
    The electromagnetic pulse (EMP) and geomagnetic disturbance 
(GMD) threat spans multiple critical infrastructure sectors, 
requiring collaboration between these multiple agencies, 
including DHS, Department of Energy, Department of Defense, 
National Oceanic Atmospheric Administration, and others. 
According to GAO, DHS ``has the lead role in coordinating the 
overall federal effort to promote the security and resiliency 
of the nation's critical infrastructure . . . .''\138\ However, 
GAO has also found that DHS's coordination is lacking. 
Specifically, it found that DHS lacks specific roles and 
responsibilities for addressing EMP risks; DHS has not 
integrated opportunities to collect risk data to inform risk 
assessments; DHS and DOE did not take actions to identify 
critical electrical infrastructure assets; and DHS and DOE, in 
combination with industry, did not coordinate in recognizing 
and executing risk management activities to address EMP 
threats.\139\
---------------------------------------------------------------------------
    \138\U.S. Gov't Accountability Office, GAO-18-67, Critical 
Infrastructure Protection: Electricity Suppliers Have Taken Actions to 
Address Electromagnetic Risks, and Additional Research Is Ongoing 
(2018), https://www.gao.gov/products/GAO-18-67.
    \139\U.S. Gov't Accountability Office, GAO-16-243, Critical 
Infrastructure Protection: Federal Agencies Have Taken Actions to 
Address Electromagnetic Risks, but Opportunities Exist to Further 
Assess Risks and Strengthen Collaboration (2016), https://www.gao.gov/
products/GAO-16-243.
---------------------------------------------------------------------------
    This legislation adds language that makes explicit the CISA 
Director's responsibilities for overseeing DHS's EMP and GMD 
planning, protection, and preparedness activities. The Act also 
requires DHS to comply with language passed in the National 
Defense Authorization Act (NDAA) of 2017, which required DHS to 
recommend a strategy to Congress to protect and prepare U.S. 
critical infrastructure against EMPs and GMDs.\140\ The 2017 
NDAA also required DHS to submit a report to Congress on its 
progress and an estimated completion date for EMP and GMD 
national planning, research and development, progress on the 
recommended strategy, and outreach and education.\141\ Both the 
strategy and report were due in June 2017, and as of October 
2018, the Committee has yet to receive them. The Department's 
strategic approach to overseeing protection of critical 
infrastructure from EMP and GMD threats remains unclear.
---------------------------------------------------------------------------
    \140\NDAA of 2017, Pub. L. No. 114-328 (114th Cong.) (2016) at sec. 
1913(a)(2), Sec. 201(d)(26)(A).
    \141\Id. at sec. 1913(a)(3), Sec. 527(d).
---------------------------------------------------------------------------
    To ensure CISA continues to develop and promote cyber 
information sharing with private sector stakeholders in 
accordance with the Cybersecurity Act of 2015, the Act requires 
the director of CISA to publicly report information on the 
mechanisms and structures used by the agency for stakeholder 
outreach and engagement.\142\ This report should be updated, as 
appropriate, to reflect changes in the mechanisms used to share 
cyber information. This report would fulfill congressional 
mandates to enhance the quality and utilization of the 
information shared and disseminated by CISA with private sector 
entities and help resolve stakeholder engagement issues 
identified by GAO.
---------------------------------------------------------------------------
    \142\Cybersecurity Act of 2015, Pub. L. 114-113 (114th Cong.), Div. 
N (included the Cybersecurity Information Sharing Act, National 
Cybersecurity Protection Advancement Act of 2015, Federal Cybersecurity 
Enhancement Act of 2015, and the Federal Cybersecurity Workforce 
Assessment Act of 2015).
---------------------------------------------------------------------------
    This Act also includes provisions that would streamline the 
agency by relocating incongruent offices. Specifically, two 
offices currently residing within NPPD, the Office of Biometric 
Identity Management and FPS, support missions far broader than 
the streamlined CISA mission set of cybersecurity and critical 
infrastructure protection. This legislation transfers the 
Office of Biometric Identity Management to the Management 
Directorate of the Department to maintain its support and 
coordination function across DHS component agencies and other 
Federal agencies. The operations and facility-oriented nature 
of FPS requires further review to determine its appropriate 
location within the Department or another executive branch 
agency. Within 90 days after GAO completes a review of the 
FPS's organizational placement within, the Act requires DHS to 
conduct a review and to make a recommendation for the 
appropriate placement for FPS within DHS or another Federal 
agency.

                        Title VII--Other Matters

    When DHS was created in 2002, combining 22 existing 
agencies into a new Department, the original legislation 
maintained some of the prior congressional committees' 
jurisdictional responsibilities for overseeing component, 
offices, or programs within the Department.\143\ By the 
Department's count, it had ``congressional engagement'' with 79 
congressional committees or subcommittees during the 114th 
Congress.\144\ Although this Committee supports robust and 
thorough oversight of the Department, having too many 
committees involved may actually be hurting the Department. 
First, diversified congressional jurisdiction and oversight of 
DHS has required the Department to dedicate significant 
resources to responding to inquiries and oversight requests 
from many congressional committees. Second, diversified 
congressional jurisdiction and oversight of Congress has 
presented a logistical and political challenge for Congress to 
fully reauthorize the Department along with its components and 
programs. This has made it more difficult for Congress to pass 
comprehensive authorizing language, including to address 
recommendations made by watchdogs, and even to make technical 
and conforming changes to existing Federal statute.
---------------------------------------------------------------------------
    \143\Pub. L. 107-296 (107th Cong.) (2002).
    \144\Information provided by the Dep't of Homeland Sec. to 
Committee Staff (on file with the Committee).
---------------------------------------------------------------------------
    DHS reported that it participated in 211 hearings, 
providing 304 witnesses, and gave 4,157 briefings to Congress 
during the 114th Congress.\145\ DHS reported having 1,703 
engagements with 16 of the 21 standing House committees and 
1,295 engagements with 16 of the 20 standing Senate 
committees.\146\
---------------------------------------------------------------------------
    \145\Id.
    \146\Id.
---------------------------------------------------------------------------
    This Act requires a report on the resources needed to 
comply with congressional requests so Congress can have better 
information on the full scope of the resources DHS dedicates to 
complying with congressional engagements. It also authorizes a 
Commission to review congressional oversight of DHS. The 
Commission is required to conduct a comprehensive study and 
make recommendations to increase efficiency of the Department's 
interactions with Congress and ease the administrative burden.
    In addition to establishing the Commission, Title VII of 
the Act makes a number of technical and conforming changes to 
law.

                        III. Legislative History

    H.R. 2825 was introduced on June 8, 2017, by Representative 
Michael McCaul (R-TX-10) and Representative Clay Higgins (R-LA-
3). The Act has eleven additional cosponsors. The Department of 
Homeland Security Reauthorization Act was considered under 
suspension of the rules and passed by the House of 
Representatives on July 20, 2017, by a vote of 386 to 41. The 
Act was received in the Senate and referred to the Committee on 
Homeland Security and Governmental Affairs on July 20, 2017.
    The Committee considered H.R. 2825 at a business meeting on 
February 28, 2018, and continued its consideration on March 7, 
2018. A substitute amendment as modified was offered by 
Chairman Ron Johnson and Ranking Member Claire McCaskill and 
accepted by unanimous consent.
    Senator McCaskill offered McCaskill Amendment 1 as modified 
to adjust the authorization of appropriations levels for 
certain preparedness grant programs. The amendment was not 
adopted by a roll call vote of 7 yeas to 8 nays. Senators 
McCaskill, Carper, Heitkamp, Peters, Hassan, Harris and Jones 
voted in favor of the amendment. Senators Johnson, Portman, 
Paul, Lankford, and Daines voted against the amendment, and 
Senators McCain, Enzi and Hoeven voted against the amendment by 
proxy.
    Senator Rand Paul offered Paul Amendment 2 as modified. The 
amendment provides that a Federal employee who uncovers waste 
at an agency and saves the agency money is eligible for a cash 
reward. That amendment was adopted by voice vote with Senators 
Johnson, Portman, Paul, Lankford, Daines, McCaskill, Carper, 
Heitkamp, Peters, Hassan, Harris, and Jones present. Senator 
Carper voted ``no'' for the record.
    Senator Steve Daines offered two amendments. Daines 
Amendment 1 would broaden the Support Anti-Terrorism by 
Fostering Effective Technologies Act of 2002 to apply to 
qualifying cyber incidents. Daines Amendment 4 would prohibit 
DHS from conducting searches or seizures of an electronic 
device of a U.S. person when entering the United States. 
Senator Daines withdrew both amendments.
    Two amendments related to election security were offered by 
Senator Margaret Hassan and Senator James Lankford. Hassan 
Amendment 1 would authorize the Secretary of Homeland Security 
to carry out activities to assist in securing election 
infrastructure. Senator Hassan withdrew this amendment. 
Lankford Amendment 1 would designate DHS as the lead Federal 
agency for election security-related information sharing and 
require certain information sharing between DHS and other 
agencies as well as DHS and state election agencies and service 
providers. Senator Lankford withdrew this amendment.
    Senator Heidi Heitkamp offered and withdrew Heitkamp 
Amendment 1 regarding a floodwall on a property in North 
Dakota.
    Senator Kamala Harris offered and withdrew Harris Amendment 
6, that would waive the replacement fees for passports and 
immigration documents destroyed during a disaster.
    Senator Harris also offered Harris Amendment 7, thrice 
modified, that requires FEMA to establish guidelines for and 
conduct oversight of Operation Stonegarden grants. That 
amendment was adopted by voice vote with Senators Johnson, 
Portman, Paul, Lankford, Hoeven, McCaskill, Heitkamp, Peters, 
Hassan, Harris and Jones present.
    Twenty-six amendments were adopted by voice vote en bloc 
with Senators Johnson, Portman, Paul, Lankford, Daines, 
McCaskill, Carper, Heitkamp, Peters, Hassan, Harris, and Jones. 
Those amendments were: Carper-Heitkamp Amendment 2 and Carper 
Amendment 4 as thrice modified; Daines Amendment 2 as modified 
and Amendment 3; Hassan Amendment 2 as modified; Harris 
Amendment 1 as modified, 2 as modified, 3 as amended by a 
Johnson Second Degree Amendment, and 4 as modified; Heitkamp 
Amendments 2, 3, and 4; Jones Amendment 1 as modified; 
McCaskill Amendment 3 as twice modified; Paul Amendment 3 as 
modified, 4, 6 as modified, and 10; Peters Amendment 1 as 
modified; and Portman Amendment 1 and 2, Portman-Carper 
Amendment 3 as modified, Portman-Carper Amendment 4, Portman 
Amendment 5 as twice modified, Portman-Hassan Amendment 6 as 
modified, and Portman-Hassan Amendment 7 as modified.
    The Act, as amended by the substitute amendment as modified 
and twenty-eight amendments, was ordered reported favorably by 
a roll call vote of 10 yeas to 1 nays. Senators Johnson, 
Portman, Lankford, Hoeven, McCaskill, Heitkamp, Peters, Hassan, 
Harris, and Jones voted in the affirmative. Senator Paul voted 
in the negative. Senators McCain, Enzi, Daines and Carper were 
recorded for the record only as voting yea by proxy.
    Consistent with Committee Rule 11, the Committee reports 
the Act with a technical amendment by mutual agreement of the 
Chairman and Ranking Member.

        IV. Section-by-Section Analysis of the Act, as Reported


Section 1. Short title; table of contents

    This section designates the title of the Act as the 
``Department of Homeland Security Authorization Act'' and lists 
the table of contents.

         Title I--Department of Homeland Security Headquarters


                  SUBTITLE A--HEADQUARTERS OPERATIONS

Section 1101. Functions and components of Headquarters of Department of 
        Homeland Security

    Subsection (1) renames the office listed under Section 112 
of title 6, United States Code, through which the Secretary 
coordinates with non-Federal entities, to be the ``Office of 
Partnership and Engagement.'' Subsection (2) authorizes the 
individual components of the Department's Headquarters.

Section 1102. Responsibilities and functions of Chief Privacy and FOIA 
        Officer

    This section officially names the Department's senior 
official responsible for privacy established in Section 142 of 
title 6, United States Code, as the Chief Privacy Officer. This 
section also expands the Chief Privacy Officer's 
responsibilities to include serving as the Department's Chief 
Freedom of Information Act (FOIA) Officer and overseeing all 
agency components and activities to ensure Department-wide 
compliance with established privacy and FOIA policies.

Section 1103. Responsibilities of Chief Financial Officer

    This section clarifies and strengthens the role that the 
Department Chief Financial Officer (CFO) plays in leading and 
overseeing the integration of DHS's mission, strategic 
objectives and priorities, and performance against the 
objectives with its financial resource management. 
Additionally, this section establishes greater accountability 
of Department expenditures on conferences, requiring CFO 
oversight and component reports on expenditures above certain 
levels.

Section 1104. Chief Information Officer

    Subsection (a)(1) designates the Department Chief 
Information Officer (CIO), with responsibilities outlined in 
Section 3506 of title 44, United States Code, and Section 11319 
of title 40, United States Code, as an advisor to all 
Department leadership in any information technology-related 
activities. Subsection (a)(3) enhances information resource 
management by requiring the CIO to create and report on 
implementation of a strategic plan with clear metrics and 
resource alignments to accomplish DHS's information technology 
priorities. Subsection (b) requires the CIO to provide Congress 
with the Department software license policy required by the 
MEGABYTE Act of 2016 (40 U.S.C. 11302 note) and a biennial 
report on DHS's inventory and management of software licenses. 
Subsection (c) mandates a Comptroller General Review of 
implementation of this section's requirements by FY 2019.

Section 1105. Quadrennial homeland security review

    This section refines the approach for development of the 
Quadrennial Homeland Security Review (Review), required by 
Section 706 of the Homeland Security Act of 2002, as 
redesignated by this Act. DHS is required to engage with 
statutorily-established advisory committees on homeland 
security issues, implement a risk management approach in its 
strategic planning, and identify all resource requirements 
rather than purely budgetary elements in the Review. Subsection 
(a)(4) adjusts the annual deadline for the Review from December 
31 to September 30 to better ensure integration of the findings 
from the review into agency strategic and budgetary planning. 
This subsection also requires DHS to retain records of key 
information leveraged in development of the Review and provide 
Congress information on the Department's integration of the 
Review's findings into its acquisitions and financial 
management plans.

Section 1106. Office of Strategy, Policy, and Plans

    Subsection (a) abolishes the Department's Office of 
International Affairs and transfers its resources and functions 
to the Office of Strategy, Policy, and Plans.
    Subsection (b) designates eleven Assistant Secretary 
positions for the Department, three of which require 
Presidential appointments and eight appointed by the Secretary. 
This subsection also removes the limit of twelve Assistant 
Secretaries established by Section 113 of title 6, United 
States Code, but mandates that the Department receive statutory 
authorization to add additional Assistant Secretary positions.
    Subsection (c) authorizes the establishment of the Homeland 
Security Advisory Council and its role to advise the Secretary 
on homeland security issues.
    Subsection (d) establishes the Office of Legislative 
Affairs within DHS and requires the Assistant Secretary for 
Legislative Affairs to establish a reporting structure for 
departmental components' communications with Congress.
    Subsection (e) establishes an Office of Private Sector to 
advise the Secretary on private sector innovations and 
challenges, foster communications with industry, and assess the 
impact of the Department's activities and policies on the 
private sector.
    Subsection (f) includes definitions for ``assets'', 
``functions'', and ``personnel''.
    Subsection (g) requires DHS to identify and remediate any 
duplicative efforts across the Department, especially in 
components involved in international affairs, and report to 
Congress on actions taken pursuant to DHS and GAO findings 
regarding duplicated efforts.

Section 1107. Chief Procurement Officer

    This section authorizes the Chief Procurement Officer 
position and its role as the Department's senior procurement 
executive for purposes of Section 1702 of title 41, United 
States Code. The Chief Procurement Officer's duties include, 
among other things, advising Department leadership on 
procurement issues, leading management of procurement policies 
and activities, and ensuring appropriate oversight, 
accountability, and compliance with statutory requirements for 
DHS's procurement practices. This section also provides a 
definition for ``head of contracting activity.''

Section 1108. Chief Security Officer

    This section authorizes the Chief Security Officer position 
under DHS's USM. The Chief Security Officer's listed duties 
include supporting the Department in all security-related 
activities, including security policy management and educating 
the Department's workforce.

Section 1109. Office of Inspector General

    This section requires the proactive and timely reporting by 
Department components to the Inspector General of any 
allegations of misconduct regarding areas under the Inspector 
General's authorities for investigation, unless waived by the 
Inspector General.

Section 1110. Office for Civil Rights and Civil Liberties

    This section authorizes the Office for Civil Rights and 
Civil Liberties under the direction of the Chief Civil Rights 
and Civil Liberties Officer. The Office for Civil Rights and 
Civil Liberties shall advise and manage Department components 
in handling of equal opportunity policies, programs, and 
issues, and it investigates possible civil rights or civil 
liberty abuses. All Department components must appoint a senior 
level Federal employee as the Component Civil Rights and Civil 
Liberty Officer.

Section 1111. Science and Technology

    This section clarifies the role of the Under Secretary for 
Science and Technology as the senior advisor to the Secretary 
on the Department's research and development efforts and 
priorities. Subsection (b) replaces the Homeland Security 
Advanced Research Projects Agency with the Office of the Chief 
Scientist, which will be led by a Chief Scientist appointed by 
the Under Secretary for Science and Technology who fulfills the 
qualification requirements of this subsection. The Chief 
Scientist is responsible for advancing the Department's 
research and development capabilities to promote revolutionary 
changes to homeland security technologies and must meet 
advanced education requirements. The DHS Secretary is 
authorized to leverage an experimental personnel management 
system and use the hiring authorities established in the Strom 
Thurmond National Defense Authorization Act for Fiscal year 
1999 to hire personnel for the Science and Technology 
Directorate.

Section 1112. Department of Homeland Security Rotation Program

    Subsection (a) specifies enhancements to the management, 
protections, and accountability of the DHS's Rotation Program. 
It clarifies that Rotation Program participation is not 
required for all DHS employees, but only for certain personnel. 
The subsection emphasizes the purpose of the Rotation Program, 
specifically to enhance cross-office integration and skills 
through the diversity of exposure offered by the Rotation 
Program. The Rotation Program is required to establish 
administrative procedures to ensure fair access to information 
and equal opportunity for DHS employees as well as to protect 
the rights and competitiveness of the selected detailees during 
their rotation and upon their return to their home office. It 
also requires the establishment of an Intelligence Rotational 
Assignment Program under the same parameters to enhance the DHS 
Intelligence Enterprise employees' knowledge of other subject 
areas. The CHCO must also perform regular evaluations of and 
submit an annual report on the Homeland Security Rotation 
Program.
    Subsection (b) requires the Secretary to provide a status 
report to Congress on implementation of the Department's 
Rotation Programs.

Section 1113. Future Years Homeland Security Program

    This section amends the timeline, content, and reporting 
requirements of the DHS Future Years Homeland Security Program 
report established in Section 454 of title 6, United States 
Code. DHS must submit this report annually to the House 
Committee on Homeland Security and Senate Homeland Security and 
Governmental Affairs Committee within 60 days of submission of 
the President's budget. The report content must cover a period 
of five fiscal years and detail projected acquisition estimates 
and deployment schedules for major acquisitions for that time 
period. The Department must make these reports public, insofar 
as they do not include classified information. Classified 
information may be submitted to Congress in a separate document 
and not made public.

Section 1114. Field efficiencies plan

    This section requires DHS to develop and submit to Congress 
within 270 days of this Act's enactment a field efficiencies 
plan to evaluate opportunities for consolidation and economy of 
resources across the Department. In the plan, DHS must review 
the physical infrastructure and administrative functions of its 
components and propose recommendations driven by cost-benefit 
analyses for consolidation of facility, administrative, and 
logistical components and functions.

Section 1115. Management

    Section (a) requires DHS through FY 2023 to submit with its 
annual budget request information on any instances of the 
Secretary reprogramming or transferring funds to address 
unforeseen costs and address operational surges, or if any 
limitations on reprogramming funds affected the Secretary's 
ability to do so, over the previous year.
    Subsection (b) codifies a senior executive services 
position of the Chief Facilities and Logistics Officer for the 
Department, responsible for overseeing management of and 
providing mission support services for DHS's real property, 
facilities, and environmental and energy programs. This 
subsection also requires the USM to develop and update, in 
consultation with the Administrator of the General Services 
Administration (GSA), a five-year strategy for real property 
management for the Department. The strategy must be 
geographically organized and identify opportunities for 
optimization and consolidation to drive better efficiencies and 
cost savings, and include information on the Department 
Headquarters consolidation project. The Secretary must provide 
the regional strategies to Congress and, within its second 
updated strategy, report on the impacts of the strategy's 
implementation on the Department's operations and costs. This 
section also requires DHS to establish appropriate leadership 
and accountability within the Department to drive 
implementation of this plan. Components are required to 
identify a senior career employee to serve as regional property 
manager and a central point of contact, provide data to the USM 
on the component's real property holdings, and certify their 
implementation of the strategy to the USM. The Inspector 
General is required to review the regional real property 
strategies and issue findings on the effectiveness of the 
Department's efforts to manage its real property.

Section 1116. Report to Congress on cost savings and efficiency

    This section requires DHS to submit a report on the 
Department's management, physical, and personnel resources and 
activities as well as areas identified for potential cost 
savings, avoidances, and efficiencies across the Department. 
The report must examine each components' management and 
administrative costs and activities, the Department's major 
physical assets, and the Department's workforce composition and 
disposition to then provide management recommendations for 
addressing shortcomings and enhancing efficiencies. The report 
must be unclassified, though the Department may also submit a 
classified annex.

Section 1117. Countering weapons of mass destruction office

    This section establishes the CWMDO for DHS and an Assistant 
Secretary to oversee it. CWMDO's mission is to lead 
coordination and strategic policy for the Department to detect 
and protect against the transfer or storage of chemical, 
biological, radiological, and nuclear materials as well as any 
attack using such agents. The offices and senior executive 
leadership positions of the DNDO and the Office of Health 
Affairs are abolished by this section, and all of the 
aforementioned office's personnel and resources are transferred 
to the CWMDO. This section requires DHS to assess and report to 
Congress on the organization of the Department's chemical, 
biological, radiological, and nuclear activities to identify 
mission and efficiency enhancements achieved through the 
establishment of the CWMDO.
    This section also makes the DHS Chief Medical Officer 
appointed by the Secretary rather than the President and 
reorganizes the position to sit within the CWMDO. The Chief 
Medical Officer's responsibilities include providing medical 
operational support to departmental components and coordinating 
with state, local, and tribal governments, DHS components, and 
the medical community on medical and public health matters. The 
DHS USM, in coordination with the Chief Medical Officer, are 
responsible for overseeing and coordinating the Department's 
workforce health and medical activities, to include 
establishing medical, health, veterinary, and occupational 
health exposure policy, strategies, and initiatives for all DHS 
human and animal personnel. The Chief Medical Officer will be 
DHS' primary point of contact with other departments and 
agencies, and State, local, and tribal governments. The Chief 
Medical Officer will also coordinate the biodefense activities 
of the Department, as well as medical preparedness activities 
and training.
    There is a sunset provision for all provisions within this 
section. On the date five years after enactment of this Act, 
unless reauthorized, the CWMDO and the position of Assistant 
Secretary for CWMDO will be abolished after transferring all 
functions, personnel, and assets to the DNDO and OHA.

Section 1118. Activities related to international agreements; 
        activities related to children

    This section requires DHS to consider the needs of children 
in homeland security policy and planning by incorporating 
organizations representing the needs of children into the 
Department's stakeholder outreach under the Office of Strategy, 
Policy, and Plans.

Section 1119. Canine detection research and development

    This section obligates the Secretary, acting through the 
Under Secretary for Science and Technology, to conduct research 
and development of canine detection technology, which may 
include scientific advances, user techniques and procedures, 
national security policies, emerging threat protection, and 
training aids.

             SUBTITLE B--HUMAN RESOURCES AND OTHER MATTERS

Section 1131. Chief Human Capital Officer responsibilities

    This section expands the responsibilities of the DHS's CHCO 
to ensure workforce management within the Department measures 
effectiveness of strategic resource planning and is driven by 
industry best practices. The CHCO must also assess the 
resourcing requirements of the Department's mission support 
functions to minimize allocation of mission-critical staff to 
these support roles. To enhance transparency and participation 
Department-wide, the CHCO is also required to maintain a 
catalogue of development opportunities, including rotational 
programs, that can be easily accessed by all Department 
employees. In addition, the CHCO must assess the Department's 
efforts to recruit and retain employees in rural areas, make 
policy recommendations to the Secretary and Congress, and 
monitor significant employment contracts be developing 
performance measures.

Section 1132. Employee engagement and retention action plan

    This section requires the Secretary, through the CHCO, to 
create and implement a plan annually to enhance employee 
engagement, retention, morale, and communications across the 
Department. DHS must ensure the plan integrates input from all 
categories and locations of Department employees as well as 
through a variety of feedback mechanisms, including surveys. 
Each departmental component is then required to develop and 
implement a component-specific employee engagement plan that 
aligns with the Department-wide plan. The components must 
report on the status of implementation of their engagement 
plans to the CHCO. The Department and components must also 
submit their employee engagement plans to the House and Senate 
homeland security committees. This section shall terminate five 
years after the date of enactment of this Act.

Section 1133. Report discussing Secretary's responsibilities, 
        priorities, and an accounting of the Department's work 
        regarding election infrastructure

    This section requires the Secretary to continue to 
prioritize providing assistance, as appropriate, to state and 
local election officials. DHS must report to Congress annually 
on the Department's responsibilities and activities conducted 
coordinating the election infrastructure critical 
infrastructure sector and its priorities for enhancing the 
sector's security. The report must be unclassified but may have 
a classified annex.

Section 1134. Policy, guidance, training, and communication regarding 
        law enforcement personnel

    In order to streamline and modernize training for law 
enforcement personnel, this section requires the Secretary to 
assess the current training and implement a new strategic plan. 
The Secretary must take into account the amount of hours for 
training and continuing education currently provided, best 
practices, the technology being used, reviews and feedback 
about the training by law enforcement personnel, and 
potentially duplicative training programs. One year after 
enactment, the Secretary must submit a report on the progress 
of the strategic plan to HSGAC and the House Committee on 
Homeland Security. Two years after enactment, the Secretary 
must submit another assessment of the training programs to both 
committees. Finally, in the event of any Executive order or 
memorandum that changes law enforcement conduct policy, the 
Secretary must develop, implement, and publish a written plan 
to communicate the new policy to law enforcement and ensure 
they are trained accordingly. The Secretary must submit to both 
homeland security committees a report describing the plan and 
actions taken.

Section 1135. Hack DHS bug bounty pilot program

    This section provides a definition for ``bug bounty 
program,'' in which DHS hires and temporarily authorizes an 
approved individual or organization to identify and report 
vulnerabilities of Internet-facing information technology. The 
section establishes a pilot program, no later than 180 days 
after enactment, in which the Secretary shall award a 
competitive contract to an entity to manage the pilot program, 
designate mission-critical operations excluded from the 
program, and develop a process for interested entities to 
register for participation in the program. 180 days after the 
program ends, the Secretary must submit a report to both 
homeland security committees detailing the number of 
participants, the number of vulnerabilities reported, how those 
vulnerabilities are being remediated, and lessons learned.

Section 1136. Cost savings enhancements

    This section allows the Inspector General of the DHS (DHS 
IG) to pay a cash award to employees other than the Secretary 
who save the Department money by disclosing fraud, waste, or 
mismanagement of surplus funds to the DHS IG. Surplus funds are 
defined as funds that are not required for the purpose for 
which the amounts were made available or those funds that 
exceed the needed amounts to fully execute the purpose(s) for 
which those funds were made available. The cash award per 
employee cannot exceed the lesser of $10,000 or 1 percent of 
the cost savings to the Department resulting from the 
employee's disclosure.
    After determining that the surplus funds meet the surplus 
fund definitional requirements, the Department's CFO is 
responsible for transferring the surplus funds to the general 
fund of the Treasury, which must use the savings for deficit 
reduction. However, the Department can retain up to 10 percent 
of the surplus savings to pay for cash awards and other 
Department needs. The DHS Secretary is also responsible for 
submitting to the Secretary of the Treasury an annual report 
identifying the total savings achieved during the previous 
fiscal year under the program. This report is due by September 
30th of each fiscal year. The Secretary should also include the 
savings information in its budget request to the Office of 
Management and Budget. The Secretary of the Treasury is 
responsible for submitting an annual report to the House and 
Senate Appropriations Committees detailing the cost savings and 
cash awards. This provision includes a sunset provision that 
ends the program after six years from the date of enactment.

Section 1137. Cybersecurity research and development projects

    This section directs the Under Secretary for Science to 
support the research and development of new cybersecurity 
technologies. The DHS Secretary is responsible for submitting a 
report detailing the new cybersecurity projects to the House 
Committee on Homeland Security, the House Committee on Science, 
Space, and Technology, and the Senate Homeland Security and 
Governmental Affairs Committee. The Secretary is also 
responsible for developing a training program for acquisitions 
staff involved in acquiring new cybersecurity technologies. No 
additional funds are authorized to implement this section.

Section 1138. Cybersecurity talent exchange

    This section establishes a pilot cybersecurity talent 
exchange program with private sector cybersecurity firms. The 
program allows DHS employees to work for a cybersecurity firm 
in the private sector and for private sector cybersecurity 
experts to work as Congressional detailees at the DHS for up to 
four years. The Department and private sector firms each pay 
their respective employees while participating in the exchange 
program. The Secretary of the DHS must present a report on the 
program to congressional homeland security committees six years 
after the program is enacted. The program automatically 
terminates seven years after the enactment of this Act.

                       SUBTITLE C--OTHER MATTERS

Section 1141. Protection of personally identifiable information

    This section amends the Tariff Act of 1930 to require CBP 
to remove any personally identifiable information from vessel 
or aircraft manifests available for public disclosure before 
those manifests are disclosed.

Section 1142. Technical and conforming amendments

    This section makes technical amendments to the Homeland 
Security Act of 2002. The amendments include removing several 
outdated or completed reporting requirements for DHS to report 
to Congress on the status of key initiatives. This section also 
abolishes the position of Director of Shared Services and the 
Office of Counternarcotics at the DHS.

 Title II--Department of Homeland Security Acquisition Accountability 
                             and Efficiency


Section 1201. Definitions

    This section provides definitions to ensure common 
understanding of key acquisitions terms referenced in the 
acquisitions title, Title II, of this Act. This section 
references the statutory definition of ``acquisition'' 
established in Section 131 of title 41, United States Code, and 
also provides definitions for terms including ``acquisition 
decision authority,'' ``acquisition program baseline,'' 
``breach,'' ``life cycle cost,'' and ``major acquisition 
program.''

                  SUBTITLE A--ACQUISITION AUTHORITIES

Section 1211. Acquisition authorities for Under Secretary for 
        Management of the Department of Homeland Security

    This section codifies the DHS USM as the Department's Chief 
Acquisitions Officer. The USM will lead the Department's 
acquisition oversight and maintain the authority to approve, 
pause, modify, or cancel major acquisition programs. This 
section also establishes the USM's role in overseeing 
Department components' acquisition activities, especially in 
their functional capabilities and their compliance with 
Department acquisition policies. Subsection (3) establishes 
criteria for the USM to delegate acquisition decision authority 
to a Component Acquisition Executive based on program life 
cycle cost estimates and functional maturity of component 
acquisition operations and leadership. This section also 
clarifies the role for the Under Secretary for Science and 
Technology in DHS acquisitions management to enable the Science 
and Technology Directorate to effectively support current and 
future acquisition requirements. The Under Secretary for 
Science and Technology shall work with the USM to oversee and 
ensure necessary operational testing, evaluation, and 
independent validation of technologies and systems for major 
acquisition programs.

Section 1212. Acquisition authorities for Chief Financial Officer of 
        the Department of Homeland Security

    This section requires the DHS CFO to coordinate with the 
USM in overseeing the Department's acquisition activities to 
ensure that programs will be affordable and adequately funded 
over their life cycle.

Section 1213. Acquisition authorities for Chief Information Officer of 
        the Department of Homeland Security

    This section authorizes the DHS CIO to oversee the 
management of the Homeland Security Enterprise Architecture and 
ensure that information technology acquisitions meet all 
requirements of the Department's information technology 
management policies and standards. The CIO is also responsible 
for advising the Acquisition Review Board on information 
technology programs and developing strategic guidance for the 
Department's information technology acquisitions.

Section 1214. Acquisition authorities for Program Accountability and 
        Risk Management

    This section authorizes the PARM office within the DHS 
Management Directorate. An Executive Director shall lead the 
PARM office and be responsible for overseeing implementation of 
Department acquisition program policy to ensure accountability 
for performance, reliability of data, and consistency of 
acquisitions operations across the Department. The Executive 
Director is also responsible for supporting development of an 
acquisitions workforce strategy and creating certification 
standards for Department acquisition program managers.
    This section also emphasizes the requirement for all 
Department components to comply with existing acquisitions 
laws, regulations, and departmental directives. The 
responsibilities of the component leadership include 
documenting requirements, developing and verifying life cycle 
cost estimates, and maintaining schedules for the component's 
major acquisition programs.
    This section establishes the responsibility for the 
Secretary and relevant component leadership to ensure thorough, 
timely, and accurate documentation of acquisition activities 
and requirements. DHS components must submit certain 
acquisition documentation to the Secretary for a quarterly 
report to Congress on acquisitions. The Secretary may waive 
this requirement on a case-by-case basis, but must report to 
Congress annually on the waivers it issues under this 
authority.

Section 1215. Acquisition innovation

    This section recognizes the need for government to enable 
innovative approaches to streamline and improve acquisitions 
programs necessary for resourcing government initiatives and 
capabilities. The DHS USM is authorized to designate a 
Department lead for managing Department-wide acquisition 
innovation efforts. The USM is permitted to test emerging 
acquisitions best practices and leverage performance metrics 
for evaluating acquisition innovation effectiveness. DHS may 
also conduct industry outreach to assess the impacts of its 
acquisition innovation efforts on the private sector.
    This section requires DHS to report to the House and Senate 
homeland security committees to enable congressional oversight 
of the effectiveness of the Department's acquisition innovation 
activities. The report must include information regarding 
testing and dissemination of emerging acquisitions best 
practices; the measured performance of the departmental 
acquisitions activities; impacts of innovative DHS acquisitions 
mechanisms on the private sector; and any recommendations for 
improving departmental acquisitions innovation.

         SUBTITLE B--ACQUISITION PROGRAM MANAGEMENT DISCIPLINE

Section 1221. Acquisition Review Board

    This section codifies the DHS Acquisition Review Board, 
chaired by the USM, which ensures accountability and 
consistency in review of departmental acquisitions activities 
and programs. The Board convenes at the discretion of the 
Secretary to review major acquisition programs requiring 
authorization to proceed through its lifecycle phases or 
programs in breach of its requirements. The Board shall meet 
regularly to maintain oversight of Department acquisitions 
programs and ensure appropriate scheduled progress of major 
acquisition programs. Responsibilities of the Board include 
reviewing and overseeing acquisitions to determine compliance 
with and fulfillment of established requirements of the set 
acquisition life cycle framework, overseeing alignment and 
implementation of individual acquisitions with Department 
strategic initiatives, and ensuring development of requirements 
in consideration of trade-offs among cost, schedule, and 
performance objectives.
    This section also requires DHS to report to Congress 
following any decision by the Department to authorize a major 
acquisition program to proceed into the planning phase without 
the Department approving an acquisition program baseline. DHS 
must provide advanced written notice of the decision to 
Congress within one week of the signing of the acquisition 
decision memorandum and then submit the report detailing the 
rationale of the decision and associated action plan for 
establishing the baseline within 60 days of the memorandum's 
signature. The USM must also report annually to Congress 
through FY 2022 with information regarding the Board's 
meetings, results of acquisition program and document reviews, 
and efforts to implement acquisition oversight processes 
throughout the Department.

Section 1222. Department leadership councils

    This section authorizes the Secretary to establish 
Department leadership councils, including a Joint Requirements 
Council, to assist in coordination, improve management, and 
reduce duplication in acquisition programs. The mission of the 
Joint Requirements Council is to validate joint requirements 
that support the Department's mission activities, ensure 
integration of efficiencies in management of joint 
requirements, and recommend prioritized capabilities for 
validated joint requirements. The Council shall include senior 
leadership representing Department components as well as a 
chairperson appointed by the Secretary. This section also 
requires the Secretary to ensure that the DHS Future Years 
Homeland Security Program, as amended by this Act, is 
consistent with the recommendations of the Joint Requirements 
Council.

Section 1223. Excluded party list system waivers

    This section requires the Homeland Security Office of 
Legislative Affairs to submit to Congress notice of any waiver 
issued by the DHS Chief Procurement Officer or CFO permitting a 
Federal agency to engage in business with a contractor in the 
Excluded Party List System maintained by the GSA. DHS must 
report the waiver within five days of its issuance and explain 
the finding and rationale behind the USM's granting of the 
waiver.

Section 1224. Inspector General oversight of suspension and debarment

    This section requires the Inspector General of DHS to 
conduct audits to identify the improper awarding of grants or 
contracts to a suspended or debarred entity. The Inspector 
General is also required to review and assess the suspension 
and debarment program and the criteria for Department-wide 
implementation.

Section 1225. Suspension and debarment program and past performance

    This section codifies a suspension and debarment program 
within DHS and the components. It also mandates DHS institute 
policies to document decisions, refer suspensions or debarments 
to other Federal agencies, share information on contractors, 
and log a suspension or debarment decision in Government-wide 
databases. This section includes a requirement for Department 
or component lead procurement official to evaluate past 
performance reviews in solicitations. The section also provides 
a waiver option for the Department's Chief Procurement Officer.

     SUBTITLE C--ACQUISITION PROGRAM MANAGEMENT ACCOUNTABILITY AND 
                              TRANSPARENCY

Section 1231. Congressional notification for major acquisition programs

    This section establishes internal Department lines and 
thresholds of reporting as well as external reporting 
requirements to Congress in the case of a breach or a 
significant variance from the targeted cost or schedule of a 
major acquisition program. After any breach of a major 
acquisition program, the program manager must submit to 
Department leadership a root cause analysis that assesses the 
reasons for the shortcomings and provides a remediation plan to 
correct the issues. Within 30 days of the program manager's 
submission of the remediation plan, the USM shall report to 
Congress a review of the corrective actions taken pursuant to 
the remediation plan. If a likely cost overrun for a major 
acquisition program is greater than 20 percent or an 
anticipated delay is over 12 months from the specified 
acquisition program baseline, the USM is required to notify 
Congress. This section also provides definitions for 
acquisitions-related terms in this section such as 
``acquisition program baseline,'' ``best practices,'' 
``breach,'' and ``component acquisition executive.''

Section 1232. Multiyear acquisition strategy

    This section requires DHS to brief the appropriate 
congressional committees on a multiyear acquisition strategy to 
provide guidance and agility for the direction of the 
Department's acquisitions programs and activities. All updates 
of the acquisition strategy must be included in each annual 
Future Years Homeland Security Program required by this Act.

Section 1233. Report on bid protests

    This section establishes a requirement for the DHS 
Inspector General, in consultation with GAO, to evaluate and 
report to Congress on the prevalence and impact of bid protests 
on the Department's acquisition process. Among other things, 
the report must provide information including trends in bid 
protests filed with Federal courts and GAO, analysis and 
comparison of bid protests by varying criteria, an assessment 
of the cost and schedule impact of successful and unsuccessful 
bid protests, time spent preventing and responding to bid 
protests, and any resultant recommendations from the Inspector 
General.

Section 1234. Prohibition and limitations on use of cost-plus contracts

    This section restricts the Department's ability to use 
cost-type contracts, requiring the Secretary to modify 
departmental acquisition regulations to only permit fixed-price 
type contracts for any acquisitions, including major 
acquisition programs. Exceptions to this prohibition are only 
permitted where DHS justifies in writing that the level of 
program risk requires use of the cost-type contract model and 
that the Department will take necessary steps to enable fixed-
price awarding for any follow-on contracts for the same 
products or service. Subsection (c) authorizes the DHS 
Acquisition Review Board to approve the use of a cost-type 
contract for a major acquisition program only after generating 
a written determination that the Department's efforts in 
attempting to define requirements for a fixed-price contract 
for the program have been exhausted and that the program's 
complexity necessitates the use of a cost-type contract.

Section 1235. Bridge contracts

    This section requires the DHS Chief Procurement Officer to 
consult with the Office of Federal Procurement Policy to 
develop policies and procedures to minimize the Department's 
use of bridge contracts and ensure appropriate planning by 
contracting officials. The policies must ensure sufficient time 
and planning to review contract requirements and establish 
notifications to the Chief Procurement Officer for contracts 
not meeting timeliness standards or that require entering into 
bridge contracts. The Chief Procurement Officer shall provide 
public notice within 30 days of entering into a bridge contract 
and shall report to the House and Senate homeland security 
committees on a common definition for bridge contract and the 
status of departmental use of these contracts.

Section 1236. Acquisition reports

    This section requires the DHS USM to prepare and submit to 
Congress a semi-annual program accountability report that 
assesses the condition of the Department's acquisition 
programs. Component Acquisition Executives must also identify 
and report to the USM all component level 3 acquisition 
programs, and the component's policies and guidance regarding 
level 3 acquisitions. The USM is responsible for reporting to 
Congress that all such programs were identified and that 
Department components' policies comply with Department-wide 
guidance. DHS must also establish a repeatable process for 
identifying level 3 programs.

            Title III--Intelligence and Information Sharing


  SUBTITLE A--DEPARTMENT OF HOMELAND SECURITY INTELLIGENCE ENTERPRISE

Section 1301. Homeland intelligence doctrine

    This section directs the development of Department-wide 
guidance on the treatment and production of homeland security 
and terrorism-related information and intelligence to enhance 
component collaboration efforts. The Secretary, through the DHS 
Chief Intelligence Officer, shall create and disseminate 
written, unclassified guidance for all Department offices and 
components regarding the processing, analysis, production, and 
dissemination of homeland security and terrorism information. 
For five fiscal years upon enactment of this section, the 
Secretary shall annually review and make any necessary 
revisions to the established guidance.

Section 1302. Personnel for the Chief Intelligence Officer

    This section requires that DHS resource the Chief 
Intelligence Officer with an experienced and expert staff able 
to leverage an understanding of Department component programs 
and proficiency in intelligence functions to assist the Chief 
Intelligence Officer in his or her duties. This section 
recognizes the need for capable staff supporting the Chief 
Intelligence Officer role and enhancing coordination across the 
DHS Intelligence Enterprise.

Section 1303. Annual homeland terrorist threat assessments

    This section requires that the DHS Secretary, through the 
Under Secretary for Intelligence and Analysis, coordinate with 
all Department intelligence components and programs to conduct 
an annual, classified assessment of the terrorist threat to the 
homeland for five fiscal years following the enactment of this 
Act. The assessment shall leverage DHS component data to the 
greatest extent practicable to identify emerging and persistent 
threats conducting or facilitating terrorism, including 
terrorism-related threats to critical infrastructure and 
Federal civilian networks. The assessment must also provide 
information on individuals suspected of involvement in 
terrorist activity who were subsequently subjected to criminal 
or civil proceedings or denied entry into the United States.
    This section also requires the Secretary to submit an 
annual report to Congress detailing the status of and metrics 
used to evaluate DHS' anti-terrorism programs and policies. The 
report must include an accounting of the grants received and 
how they were used, DHS-sponsored training, and lessons 
learned. The Office of Civil Rights and Civil Liberties must 
also conduct an annual review to ensure that all anti-terrorism 
activities are respecting the privacy and civil rights and 
liberties of all persons.
    This section also amends 6 U.S.C. 609(b)(1) to specify that 
grant funds may not be used to support any organization or 
group that has funded, engaged in, or recruited to domestic or 
international terrorism.
    There is a sunset provision for the annual report 
provision: five years after enactment, the provision will be 
repealed.

Section 1304. Department of Homeland Security data framework

    Subsection (a) directs the DHS Secretary to develop a data 
framework, an ongoing DHS initiative to integrate component 
systems and homeland security data for access by authorized 
Department employees to support their duties. Subsection (b) 
outlines qualifications for employees permitted access to the 
data framework and requires that the Secretary establish 
guidance incentivizing a duty to share information across 
components. Subsection (c) permits the exclusion of certain 
information from the data framework, such as that with the 
potential to compromise sources and methods or criminal 
investigations. Subsection (d) directs the Secretary to 
implement mechanisms to identify security risks and safeguard 
civil liberties and privacy within the data framework systems 
capabilities. Subsection (e) gives the Department two years to 
implement the data framework. Subsection (f) establishes 
consistent communications requirements for DHS to report 
progress on the data framework's implementation and highlight 
any use cases of data framework information assisting in the 
disruption of terrorist activities. Subsection (g) includes 
definitions for the terms ``national intelligence'' and 
``appropriate congressional committee.''

Section 1305. Establishment of Insider Threat Program

    This section requires the Secretary to establish an Insider 
Threat Program, with the goal of preventing and responding to 
insider threat risks to critical assets. The Secretary must 
also establish a Steering Committee of key DHS leadership to 
manage and coordinate Department activities related to insider 
threats to DHS critical assets. This section outlines the 
responsibilities of both the Chief Intelligence Officer and the 
Chief Security Officer to coordinate with the Steering 
Committee in developing a Department strategy to mitigate 
insider threat risk and protect critical assets. DHS is 
required to establish a framework for disciplining employees 
engaged in insider misconduct, and this section establishes 
punishment criteria for misconduct and procedures for an 
employee to appeal allegations of insider misconduct. The 
Steering Committee must ensure not to use authorities provided 
in this section to deter, detect, or mitigate lawful 
disclosures of information, such as those established to 
protect whistleblowers. Definitions for several key terms, 
including ``critical assets'', ``insider misconduct'', and 
``insider threat'' are provided in this section. Additionally, 
the DHS Secretary must report to Congress on the Department's 
implementation of its insider threat risk mitigation strategy 
and the effectiveness of the Insider Threat Program.

Section 1306. Report on applications and threats of blockchain 
        technology

    This section requires the Secretary, in conjunction with 
the Secretary of the Treasury, the Attorney General, and the 
Director of National Intelligence, to assess the threat posed 
by blockchain technology, and submit a report to the Senate 
Committees on Armed Services; Intelligence; Banking, Housing, 
and Urban Affairs; and Homeland Security and Government 
Affairs' and the House Committees on Armed Services, Financial 
Services, and Homeland Security. The report must assess the 
potential offensive and defensive applications of blockchain 
and other distributed ledger technologies, the threat posed by 
the use of such technology by state sponsors of terrorism, the 
use or planned use of the technology by the Federal government, 
and the vulnerability of the U.S. critical infrastructure to 
attacks using such technology.
    This section also provides a definition for the terms 
``foreign terrorist organization'' and ``state sponsor of 
terrorism.''

Section 1307. Transnational criminal organizations threat assessment

    Subsection (a) requires the Under Secretary for 
Intelligence and Analysis to develop a threat assessment on 
whether human smuggling organizations and transnational 
criminal organizations are exploiting vulnerabilities in border 
security screening to enter the United States. Subsection (b) 
states that the Secretary of Homeland Security shall use this 
assessment to determine whether changes are needed regarding 
border security. Subsection (c) requires the Under Secretary to 
share threat information with appropriate state, local, and 
tribal law enforcement including officials operating within 
fusion centers consistent with requirements for classified 
information.

Section 1308. Department of Homeland Security Counter Threats Advisory 
        Board

    This section authorizes DHS to create a Counter Threats 
Advisory Board for the following two years after enactment of 
this Act and details the requirements for the Board. The Board 
shall consist of senior departmental component and headquarters 
representatives and coordinate intelligence and policy 
activities across DHS that relate to countering threats, such 
as in advising the Secretary on issuance of terrorism alerts 
under Section 124 of title 6, United States Code. The Under 
Secretary for Intelligence and Analysis shall chair the Board. 
The Secretary of Homeland Security, acting through the Under 
Secretary for Intelligence and Analysis, shall report to 
Congress on the status and activities of the Board within 90 
days of enactment of this Act.

Section 1309. Briefing on pharmaceutical-based agent threats

    This section requires the Assistant Secretary for the 
CWMDO, in consultation with other departments, to brief 
congressional committees on threats related to pharmaceutical-
based agents. The briefing must assess the threats posed and 
the materiel and non-materiel Federal capabilities to combat 
such threats, and must identify a strategy to address any 
capability gaps. This section also provides a definition for 
``pharmaceutical-based agent.''

              SUBTITLE B--STAKEHOLDER INFORMATION SHARING

Section 1311. Department of Homeland Security Fusion Center Partnership 
        Initiative

    This section renames DHS's State, Local, and Regional 
Fusion Center Initiative as the ``Department of Homeland 
Security Fusion Center Partnership Initiative''. The section 
mandates that principal officials of fusion centers take steps 
to support interagency coordination and lists those required 
actions, such as coordination with other heads to provide 
analytic intelligence advice. The Secretary shall make 
available criteria for sharing information and deploying 
personnel to support fusion centers in the National Network of 
Fusion Centers. In addition, the Secretary shall provide the 
fusion centers with training in protecting civil rights, 
encourage the full participation of the National Network, and 
track all Federal funding to each fusion center. Fusion centers 
along land or maritime borders shall be a priority for border 
intelligence efforts. Annually through 2024, the Under 
Secretary for Intelligence and Analysis shall report to 
Congress on the efforts of the Fusion Center Partnership 
Initiative. Within 180 days of enactment of this Act, the 
Comptroller General must submit a report to Congress on 
databases and datasets deployed to address gaps in information 
sharing across the National Network of Fusion Centers.

Section 1312. Fusion center personnel needs assessment

    This section requires the Comptroller General to conduct an 
assessment of DHS personnel assigned to fusion centers, 
including a determination of whether additional personnel are 
needed to enhance the Department's mission. The assessment 
should account for information regarding current personnel 
deployments, roles and responsibilities for required positions, 
and general Federal resources allocated across the fusion 
centers. It also provides definitions for the terms ``fusion 
center'' and ``National Network of Fusion Centers.''

Section 1313. Strategy for fusion centers supporting counternarcotics 
        initiatives through intelligence information sharing and 
        analysis

    The Under Secretary for Intelligence and Analysis shall 
submit to Congress a strategy for the fusion centers providing 
support to law enforcement counternarcotics investigations 
through intelligence information sharing and analysis. 
Additionally, the Under Secretary shall provide guidelines and 
best practices to fusion center leadership and employees to 
enhance their counternarcotics activities.

Section 1314. Program for State and local analyst clearances

    This section establishes greater congressional oversight of 
DHS's efforts providing access to classified information to 
state, local, tribal, and territorial analysts to ensure 
consistency with need to know requirements established in 
Executive Order No. 13526 (50 U.S.C. 3161). Within two years of 
the enactment of this section, the Under Secretary for 
Intelligence and Analysis must submit a report regarding the 
process for determining eligibility and issuance of Top Secret 
clearances, the effects of provisioning clearances on 
information sharing with non-Federal government partners, and 
the risks associated with providing such clearances.

Section 1315. Information technology assessment

    This section requires DHS to evaluate its information 
systems used to share homeland security information between the 
Department and the fusion centers. The assessment shall be led 
by the Department CIO and representatives from the National 
Network of Fusion Centers. The evaluation should include a 
review of the accessibility and ease of use of the systems by 
the fusion centers, an assessment of participation levels in 
using the information systems, and determinations of actions to 
improve interoperability of department information systems with 
those of the fusion centers.

Section 1316. Department of Homeland Security classified facility 
        inventory

    This section gives the Secretary the responsibility, to the 
extent practicable, to maintain an inventory of DHS facilities 
that are certified to house classified infrastructure of 
systems at the secret level or above. The Secretary must update 
and share the inventory with appropriate Department and non-
Federal Government personnel. The inventory shall include the 
location of the facilities, information regarding their 
physical dimensions and room capacity, the entities running the 
facilities, and the dates they were established.

Section 1317. Terror inmate information sharing

    Subsection (a) requires the Secretary, in coordination with 
other Federal officials when appropriate, to release 
information from a Federal correctional facility of individuals 
who may pose a terrorist threat. Subsection (b) specifies that 
the scope of the information shared must pertain to homeland 
security and regard individuals convicted of a Federal crime. 
Subsection (c) mandates Federal officials provide fusion 
centers at all levels with periodic threat assessments 
regarding the overall threat known from known or suspected 
terrorists. This includes the assessed risks of the population 
of their activity upon release. Subsection (e) emphasizes that 
this section does not require the establishment of a list of 
registry of individuals.

Section 1318. Annual report on Office for State and Local Law 
        Enforcement

    This section mandates that between FY 2019 and FY 2023, the 
Assistant Secretary for State and Local Law Enforcement shall 
submit a report on the activities of the Office for State and 
Local Law Enforcement. The report shall describe the Office's 
efforts to coordinate and share information with state, local, 
and tribal law enforcement agencies as well as their feedback 
on efforts. The report must also evaluate the Office's 
effectiveness by assessing progress against its performance 
metrics.

Section 1319. Annual catalog on Department of Homeland Security 
        training, publications, programs, and services for State, 
        local, and tribal law enforcement agencies

    This section requires that the Assistant Secretary for 
State and Local Law Enforcement produce and make available an 
annual catalog that summarizes opportunities for training, 
publications, and services from the Department and its 
components available to law enforcement agencies. The Assistant 
Secretary shall also coordinate with DHS components and other 
Federal agencies to consolidate and make available information 
on Federal resources intended to support fusion centers.

Section 1320. Chemical, biological, radiological, and nuclear 
        intelligence and information sharing

    This section mandates that the DHS Office of Intelligence 
and Analysis provide intelligence analysis of terrorist actors 
and chemical, biological, radiological, or nuclear threats to 
support homeland security efforts, including in sharing 
information to support state, local, tribal, or other Federal 
agency authorities. The Office shall integrate such analysis 
into risk assessments of these homeland security hazards. As 
appropriate, the Office of Intelligence and Analysis shall 
coordinate efforts and information sharing with other relevant 
Department components, including CWMDO, and the National 
Counter Proliferation Center. The DHS Secretary must report 
annually to Congress on the Department's progress in 
implementing chemical, biological, radiological, and nuclear 
intelligence and information sharing activities specified in 
this section.

Section 1321. Duty to report

    This section requires the Federal Government agency 
responsible for leading the investigation of an act of 
terrorism to provide an unclassified report to Congress on such 
act within one year after the investigation has been completed. 
The primary agency should collaborate with the Secretary of 
Homeland Security, the Attorney General, and the Director of 
the Federal Bureau of Investigation in generating this report. 
The report should include facts about the incident, an 
explanation of security gaps that could be addressed to prevent 
such acts, and any recommendations for additional measures to 
be taken to improve homeland security. This requirement may be 
waived in instances where the aforementioned parties or the 
head of the National Counterterrorism Center determine that 
such a report would jeopardize an ongoing investigation or 
prosecution.

Section 1322. Strategy for information sharing regarding narcotics 
        trafficking in international mail

    This section requires the Secretary, in coordination with 
CBP, to share counternarcotics information related to 
international mail, including best practices and known shippers 
of illegal narcotics, between DHS component, USPS, express 
consignment operators, and peer-to-peer payment platforms.

Section 1323. Constitutional limitations

    This section ensures that all gathering and information 
sharing activities under this title are carried out in 
accordance with the Constitution.

     Title VI--Emergency Preparedness, Response, and Communications


       SUBTITLE A--GRANTS, TRAINING, EXERCISES, AND COORDINATION

Section 1401. Urban Area Security Initiative

    This section requires states to provide relevant high-risk 
urban areas with an accounting of items and services purchased 
with funds given to the state under the UASI within 90 days of 
the use of the funds. This section also requires that a threat 
and hazard identification risk assessment and capability 
assessment be conducted as a prerequisite of receiving a grant 
under this section.

Section 1402. State Homeland Security Grant Program

    This section requires states participating in the SHSGP to 
conduct and submit a risk assessment of threats and hazards, 
including an assessment of capabilities to address the state's 
risk. The period of performance for grant recipients under the 
Program is established as no less than 36 months.

Section 1403. Grants to directly eligible tribes

    This section requires that the Secretary makes the funds 
available from grant awards to directly eligible tribes for a 
period of at least 36 months.

Section 1404. Law enforcement terrorism prevention

    Subsection (a) emphasizes the need for prioritization of 
grants under the SHSGP and UASI that enhance law enforcement 
terrorism prevention activities. Specifically, the Assistant 
Secretary for State and Local Law Enforcement must work with 
the FEMA Administrator to ensure that the 25 percent of grants 
set aside for these law enforcement purposes are in fact 
implemented to focus on such activities. To provide 
accountability to Congress on these efforts, this section 
requires the Administrator to report annually through FY 2022 
on the use of grants for law enforcement prevention terrorism 
prevention activities. Subsection (b) establishes that the 
Office of State and Local Law Enforcement now exists within the 
Office of Partnership and Engagement, as established in this 
Act.

Section 1405. Prioritization

    This section provides clarification to states and high-risk 
urban areas applying for grants under the UASI or the SHSGP. 
Applicants must use the population data requested as a 
consideration in its risk formula and assessment, including in 
accounting for population categories such as tourists, 
commuters, and military personnel. The FEMA Administrator is 
also directed to consider threat information from other 
relevant Federal agencies and field offices besides DHS as a 
consideration when allocating grants.

Section 1406. Allowable uses

    This section expands the scope in which funds may be used 
by recipients of grants under the SHSGP and the UASI to include 
enhancing medical preparedness or cybersecurity. Grant 
recipients' expenditures on communications are also required to 
align with the Statewide Communication Interoperability Plan 
and coordinate with the appropriate interoperability governance 
body for their State.

Section 1407. Approval of certain equipment

    This section requires the FEMA Administrator to establish 
and implement a review process for examining applications 
submitted under the SHSGP or UASI to use grants to purchase 
equipment or systems that do not meet national voluntary 
consensus standards, as established in Section 747 of title 6, 
United States Code. The review process should consider any use 
of the proposed system by Federal agencies and the nature of 
the ability of the system to fill a critical capability gap for 
the applicant. Within three years of enactment of this Act, the 
DHS Inspector General must submit to the House Committee on 
Homeland Security and the Senate Committee on Homeland Security 
and Governmental Affairs a report assessing implementation of 
this review process.

Section 1408. Authority for explosive ordnance disposal units to 
        acquire new or emerging technologies and capabilities

    This section authorizes the Secretary to grant an explosive 
ordnance disposal unit the authority to acquire technologies 
and capabilities that are not specified in the unit's 
authorized equipment allowance.

Section 1409. Memoranda of understanding

    This section requires the FEMA Administrator to enter into 
a memorandum of understanding with certain Department component 
leadership to outline responsibilities regarding policy and 
guidance for grant decisions. This will ensure that appropriate 
subject matter expertise from the components is integrated into 
management and guidance relating to the SHSGP, UASI, Port 
Security Grant Program, and Transit Security Grant Program.

Section 1410. Grants metrics

    This section requires the Administrator of FEMA to assess 
the impact of funds allocation and supported activities under 
the SHSGP and UASI have been used effectively to close 
capability gaps. The Administrator shall use information from 
the States and high-risk urban areas provided in their Threat 
and Hazard Identification and Risk Assessments and State 
Preparedness Reports (now known as the Stakeholder Preparedness 
Review by FEMA) to conduct the assessment. FEMA must provide an 
assessment of the data to Congress, which must include a 
comparison and assessment of the value of successive State 
Preparedness Reports and Hazard Identification and Risk 
Assessments. The DHS Inspector General must report to Congress 
with an evaluation of FEMA's assessment.

Section 1411. Grant management best practices

    This section requires the Administrator of FEMA to post 
information on the Agency's website with a summary of findings 
of areas identified by the DHS OIG for improvement and methods 
to address the shortcomings found in grant audits. FEMA shall 
also make public information on innovative approaches and 
projects used by grant recipients from the SHSGP and UASI.

Section 1412. Prohibition on consolidation

    This section mandates that the Secretary of DHS must 
receive authorization from Congress before implementing the 
National Preparedness Grant Program or any successor 
consolidated grant program. DHS is also required to conduct a 
study to determine any efficiencies and effectiveness a 
consolidated grant program would provide.

Section 1413. Maintenance of grant investments

    This section requires grant applicants under the SHSGP or 
the UASI to develop a plan for the maintenance of any equipment 
purchased with grant funds.

Section 1414. Transit Security Grant Program

    This section permits grant recipients under the Transit 
Security Grant Program to use funds to pay for backfill when 
personnel are sent to security training for a period of at 
least 36 months.

Section 1415. Port Security Grant Program

    This section requires the Secretary to provide funding for 
the Port Security Grant Program's period of performance for at 
least 36 months.

Section 1416. Cyber preparedness

    This section enhances information sharing that will 
contribute to management of cybersecurity risk by non-Federal 
government entities. The DHS National Cybersecurity and 
Communications Integration Center is required to share 
information and analysis of cybersecurity threats, 
vulnerabilities, and defense measures with State, local and 
regional fusion centers. DHS must share this information in a 
timely manner and in an unclassified form, whenever 
appropriate.

Section 1417. Operation Stonegarden

    This section establishes ``Operation Stonegarden,'' a DHS 
program to award grants for law enforcement agencies to enhance 
border security. The grant may be used to support equipment 
acquisition and maintenance, personnel, and border security 
activities. The Administrator must collect and maintain 
information on the Operation Stonegarden grants and establish 
guidelines for oversight of the program. The Administrator must 
also develop guidelines for financial review of the grants.
    The Administrator shall, in coordination with CBP, report 
at least annually from FY 2018 to FY 2022 to Congress on the 
expenditure of grants made under Operation Stonegarden. Each 
report must include information on how each grant recipient 
expended the funds and a list of all operations carried out 
using Operation Stonegarden grants.

Section 1418. Non-Profit Security Grant Program

    This section establishes the DHS ``Non-Profit Security 
Grant Program'' to award grants for eligible non-profit 
organizations to make security enhancements to protect against 
terrorist attacks. Eligibility for non-profit organizations is 
dependent upon the FEMA Administrator determining the 
organization to be at risk of a terrorist attack. The 
Administrator shall ensure that no less than 30% of the total 
funds appropriated under the Program are used for grants for 
eligible nonprofit organizations. The period of performance for 
this grant program is established as not less than 36 months.

Section 1419. Study of the use of grant funds for cybersecurity

    This section requires the Comptroller General to determine 
how grant funds under the SHSGP and UASI are used in 
preparation for and response to cybersecurity risks and 
incidents. The study must include information on obstacles and 
challenges in using grant funds for cybersecurity enhancement 
and any future plans for grant funds to support cybersecurity 
capabilities.

Section 1420. Joint counterterrorism awareness workshop series

    This section requires the Secretary, in coordination with 
the Director of National Counterterrorism Center and the 
Director of the Federal Bureau of Investigation, to establish a 
Counterterrorism Awareness Workshop Series to address emerging 
terrorist threats and help state and locals prevent and react 
to terrorist attacks. The workshop series shall review existing 
response and interdiction plans related to terrorist attacks 
and identify any gaps in such plans. The series must seek to 
improve situational awareness and information sharing, and to 
provide training and exercise in the event of an attack. The 
officials who participate in the series must submit a report 
after the conclusion of the series that addresses key findings 
and potential mitigation strategies to address gaps that were 
identified. This section authorizes $1,000,000 in 
appropriations for each of fiscal years 2018 through 2022.

Section 1421. Exercise on terrorist and foreign fighter travel; 
        national exercise program

    The Secretary shall develop and conduct an exercise to test 
capabilities and responsiveness to the terrorist and foreign 
fighter threat. The exercise shall include a scenario involving 
persons traveling to the United States to join a terrorist 
organization or terrorists infiltrating into the United States, 
and the exercise must include coordination with relevant 
Federal agencies and other key stakeholders. The Emerging 
Threats in the National Exercise Program will include exercises 
addressing emerging terrorist threats. No additional funds are 
authorized to carry out the requirements of this section.

Section 1422. Grants accountability

    This section permits the Inspector General, in his or her 
oversight of grants provided by the Department, to examine any 
records of its subcontractors or any agency in receipt of any 
grant awarded. The Inspector General may also interview any 
employee of the grantee regarding transactions relating to the 
contract. The Administrator or the Secretary shall provide a 
user-friendly means for grant recipients to comply with all 
reporting requirements. Five years after the date on which 
grants funds are distributed under a covered grant, the 
authority of a covered grant recipient is terminated. Upon the 
termination of this authority, any grant amounts that have not 
been expended shall return to the Administrator.

                       SUBTITLE B--COMMUNICATIONS

Section 1431. Responsibilities of Assistant Director for Emergency 
        Communications

    This section makes technical amendments to the 
responsibilities of the Assistant Director for Emergency 
Communications. It also expands the responsibilities of the 
Director to include assessing the impact of emerging 
technologies on interoperable emergency communications.

Section 1432. Annual reporting on activities of the Emergency 
        Communications Division

    This section requires the Assistant Director for Emergency 
Communications to report annually to Congress on the activities 
of the Office, including on outreach efforts to State, 
regional, local and tribal governments. Outreach efforts by the 
Emergency Communications Division to support interoperable 
communications by local governments and public safety agencies.

Section 1433. National Emergency Communications Plan

    This section requires the DHS Secretary in conjunction with 
the Director for Emergency Communications, to update the 
National Emergency Communications Plan at least every five 
years. DHS shall also, in its updates of the Communications 
Plan, consider the impact of emerging technologies on the 
ability to achieve emergency communication interoperability.

Section 1434. Technical edit

    This section makes a technical correction to the Emergency 
Communications Title of the Homeland Security Act of 2002.

Section 1435. Communications training

    This section requires the USM of DHS to develop a mechanism 
to verify that radio users within the Department receive 
initial and ongoing training on the use of the radio systems.

                       SUBTITLE C--OTHER MATTERS

Section 1451. Technical and conforming amendments

    This section makes technical amendments to the Homeland 
Security Act of 2002 regarding the content of Title IV of this 
Act. The section also defines the term ``Nuclear Incident 
Response Team.''

              Title V--Federal Emergency Management Agency


Section 1501. Short title

    This section states that this division may be cited as the 
``FEMA Reauthorization Act of 2018.''

Section 1502. Reauthorization of Federal Emergency Management Agency

    This section authorizes appropriations for FEMA as follows: 
$1,049,000,000 for FY 2018; $1,065,784,000 for FY 2019; and 
$1,082,836,544 for FY 2020.

Section 1503. National Domestic Preparedness Consortium

    This section authorizes the NDPC, as established under FEMA 
in Section 1102 of title 6, United States Code, to facilitate 
visibility, creation, validation, and delivery of training to 
emergency response providers. The Consortium is required to 
ensure whenever possible that the training it provides for 
emergency responders simulate real response environments. For 
the Center for Domestic Preparedness, this section authorizes 
the following appropriations: $63,939,000 for FY 2018; 
$64,962,024 for FY 2019; and $66,001,416 for FY 2020. For the 
members of the Consortium, as established in Section 1102 of 
title 6, United States Code, this section authorizes the 
following appropriations: $101,000,000 for FY 2018; 
$102,606,000 for FY 2019; and $104,247,856 for FY 2020. This 
section also amends the savings provision in statute for the 
Department to protect emergency preparedness spending for five 
of the seven Consortium members, requiring the Secretary to 
ensure that future amounts provided to these entities meet or 
exceed their provisions in FY 2015.

Section 1504. Rural Domestic Preparedness Consortium

    This section authorizes FEMA's Rural Domestic Preparedness 
Consortium, which consists of universities and non-profit 
organizations qualified to train emergency response providers 
in rural communities. The Rural Domestic Preparedness 
Consortium develops, tests, and provides training for emergency 
response providers of rural communities. This section 
authorizes the Consortium $5,000,000 of any appropriations for 
Continuing Training Grants.

Section 1505. Center for Faith-Based and Neighborhood Partnerships

    This section codifies the Center for Faith-Based and 
Neighborhood Partnerships. The Center leads outreach efforts 
between faith-based and community organizations and DHS 
security and emergency response efforts. The Director of the 
Center, appointed by the Secretary of DHS, is responsible for 
developing exercises and providing guidance to engage faith-
based and community organizations in enhancing their hazard and 
emergency response capabilities, including in how to secure 
their facilities and in combating human trafficking.

Section 1506. Emergency support functions

    This section enhances readiness and accountability in the 
development and implementation of the National Response 
Framework. FEMA must update the National Response Framework, as 
required in Section 314 of title 6, United States Code, at 
least every five years. Additionally, the President is required 
to work through the Administrator of FEMA to establish 
performance metrics for Federal entities with key 
responsibilities under the Framework's emergency support 
functions.

Section 1507. Review of National Incident Management System

    This section amends the requirement for the FEMA 
Administrator to ``periodically'' review the National Incident 
Management System, pursuant to Section 314 of title 6, United 
States Code, by mandating a review be conducted no less than 
every five years. This will help ensure consistent review by 
leadership and stakeholders as well as help ensure readiness of 
national emergency response capabilities.

Section 1508. Remedial action management program

    This section requires the FEMA Administrator to coordinate 
with the National Council on Disability and the National 
Advisory Council to establish a remedial action management 
program. The FEMA Administrator is required to work with other 
Federal agencies to use the program to learn from corrective 
actions identified during exercises or real-world events 
responding to natural or man-made disasters or emergency 
situations, including terrorism response. FEMA is required to 
report annually for five years on Federal agency corrective 
actions and their progress. FEMA must also, whenever possible, 
provide participants in simulated or real-world emergency 
responses after-action reports highlighting lessons learned and 
corrective actions.

Section 1509. Center for Domestic Preparedness

    This section requires FEMA to develop an implementation 
plan to address findings from the 2017 Management Review Team's 
report on live agent training at the Chemical, Ordnance, 
Biological, and Radiological Training Facility at the Center 
for Domestic Preparedness. The review examined the 
circumstances surrounding the discovery that the training 
facility was unknowingly using a highly toxic strain of ricin, 
ricin holotoxin, rather than the less toxic strain, ricin A-
chain, it had intended to use for training. The Administrator 
must provide Congress updates with information on the plan's 
implementation efforts to address the Management Review Team's 
recommendations to prevent such an incident from occurring in 
the future.

Section 1510. FEMA Senior Law Enforcement Advisor

    This section codifies the position of Senior Law 
Enforcement Advisor at FEMA, which shall be appointed by the 
FEMA Administrator and serve as an expert advisor to strengthen 
FEMA's coordination with law enforcement entities. The section 
mandates that the Advisor possess requisite qualifying 
experience in law enforcement, intelligence, information 
sharing, and emergency response. The Advisor's responsibilities 
include coordinating with and ensuring adequate consideration 
of state, local, and tribal law enforcement in efforts to 
protect against and respond to natural and man-made disasters 
and acts of terrorism.

Section 1511. Technical expert authorized

    This section codifies FEMA's Children's Technical Expert, 
responsible for understanding and integrating the needs of 
children into FEMA's emergency response activities. This 
expert, appointed by the Administrator of FEMA, shall ensure 
adequate representation and consideration of the unique needs 
of children in Agency initiatives, consistent with the 
requirement for the Department Office of Strategy, Policy, and 
Plans to consider children's needs established in Section 1120 
of this Act.

Section 1512. Mission support

    This section requires the Administrator of FEMA to 
designate a chief management official to serve as the principal 
advisor to the Administrator on management issues and 
activities, including emergency management operations and 
programs. The chief management official shall support the 
Administrator's management of five management lines of 
business: procurement, human resources, information technology 
and communications, real property, and security. In this role, 
the chief management official shall assist in development and 
implementation of management controls to enhance oversight and 
improve operations of FEMA. This section also clarifies that 
the roles of the chief management official in no way affect the 
responsibilities of the Assistant Administrator for National 
Continuity Programs if the issues relate to weather emergency 
operations-affiliated facilities. The Administrator is also 
required to report to Congress within 270 of enactment of this 
Act with a review of key management functions of the FEMA 
headquarters and regional offices as well as a strategy to 
capture data related to the management functions.

Section 1513. Strategic human capital plan

    This section reinstates a requirement from the Post Katrina 
Emergency Management Reform Act of 2006 (5 U.S.C. 10102(c)) 
that required the Administrator of FEMA to develop and submit 
to Congress a strategic human capital plan for improving FEMA's 
workforce. The plan must include a workforce gap analysis 
assessing required and current competencies, a plan of action 
for addressing any gaps in critical skills, performance 
metrics, and an assessment of the Agency's Surge Capacity Force 
workforce. The report is due no later than May 1, 2018, and 
resubmitted annually for the subsequent five years with updates 
on implementation status.

Section 1514. Office of Disability Integration and Coordination of 
        Department of Homeland Security

    This section codifies the Office of Disability Integration 
and Coordination (ODIC) within FEMA, which is responsible for 
ensuring integration of needs of and communication with 
individuals with disabilities and any special access or 
functional needs into emergency management activities. The 
Office shall have a Director, responsible for establishing 
guidance on matters related to individuals with disabilities in 
emergency planning and response efforts and overseeing 
integration of the Office's mission across the FEMA regional 
offices. The Director must also coordinate with key 
stakeholders, including organizations representing individuals 
with disabilities, to collaborate on issues regarding access 
and functional needs during emergencies and integrate them in 
Agency emergency response planning and activities. The 
Administrator of FEMA shall submit a report to Congress within 
120 days of enactment of this Act regarding the funding and 
staffing needs of the ODIC.

Section 1515. Management costs

    This section establishes fixed rates for the FEMA 
Administrator to reimburse states and local governments to 
cover both direct and indirect costs of administrating the 
disaster recovery projects. Reimbursement under hazard 
mitigation (Section 403 of the Robert T. Stafford Disaster 
Relief and Emergency Assistance Act) is set as no more than 15 
percent of the total amount of the grant award. Reimbursement 
under essential assistance, repair and replacement of damaged 
facilities, debris removal, or transportation assistance 
(Sections 403, 406, 407, and 507 of the Stafford Act, 
respectively) will not total more than 12 percent of the total 
award.

Section 1516. Performance of services

    The FEMA Administrator may appoint temporary personnel who 
have served continuously for three years to positions in FEMA 
in the same manner as competitive service employees. If 
appointed under this subsection, a person shall become a 
career-conditional employee.

Section 1517. Study to streamline and consolidate information 
        collection

    The FEMA Administrator shall conduct a study and develop a 
plan with the goal of making the collection of information from 
disaster assistance application and grantees more streamlined, 
efficient, and less duplicative. FEMA shall coordinate with the 
Small Business Administration and the Department of Housing and 
Urban Development to develop and provide to Congress a plan to 
regularly collect and report on information on Federal disaster 
assistance awarded.

Section 1518. Agency accountability

    This section enhances the transparency and accountability 
of disaster relief resource allocation. The FEMA Administrator 
must publish on FEMA's website specifics of any public 
assistance grant award, and mission assignment regarding a 
major disaster, or any contract amounting to over $1,000,000. 
The information provided in these reports will provide public 
visibility on the nature and impact of spending on disaster 
relief efforts. The Administrator shall also publish a monthly 
disaster relief report with information regarding resources 
used in support of disaster relief, including the amount of 
obligations for non-catastrophic events, as well as a 
description of FEMA's methodology in development of the report.

Section 1519. National public infrastructure predisaster hazard 
        mitigation

    This section expands the scope of the President's ability 
to use funds from the National Predisaster Mitigation Fund to 
include carrying out enforcement activities to implement the 
latest standards for design, construction, and maintenance of 
eligible residential facilities. The President is also 
permitted to withdraw amounts of financial assistance made 
available to a state that remain unobligated three years after 
funds were initially allocated. To be eligible for this 
financial assistance from the President, states must have 
received a major disaster declaration during the previous 
seven-year period. This section also allows the President to 
set aside an additional investment of up to six percent of the 
estimated aggregate of specified assistance grants to provide 
technical and financial assistance for national public 
infrastructure predisaster mitigation.
    The Administrator must also submit a report to Congress 
detailing the implications of the above additional use of the 
National Predisaster Fund and the redistribution of unobligated 
state funds. The report must include a justification, cost-
benefit analysis, and assessment of the stress placed on the 
Disaster Relief Fund by the extra spending. In addition, the 
report must provide an expenditure plan and an assessment of 
how to allocate the funds to mitigate risks to the most costly 
disaster impacts.

Section 1520. Technical amendments to national emergency management

    This section makes a number of technical changes to the 
Homeland Security Act of 2002 (6 U.S.C. 311 et seq.) in 
language regarding the functions, responsibilities, and 
requirements of FEMA and related activities for emergency 
management. Subsection (a)(3) amends language about types of 
disasters to which FEMA responds to include incidents that 
impact critical infrastructure. This subsection also adds a 
requirement for the FEMA Administrator to develop integrated 
frameworks that incorporate existing Government plans 
addressing various aspects of emergency planning and response.

Section 1521. Integrated public alert and warning system subcommittee

    This section adds to the list of recommendations made by 
the Integrated Public Alert Subcommittee of the National 
Advisory council to include recommendations for best practices 
of State, tribal, and local government officials to 
authenticate civil emergencies and initiate, modify, and cancel 
alerts. It also requires the Subcommittee to submit a second 
report to Congress detailing the recommendations described 
above. The termination of the Subcommittee is amended to five 
years after enactment, instead of three.
    The Administrator shall consider the Subcommittee 
recommendations and establish minimum requirements for State, 
tribal, and local government participation in the Integrated 
Public Alert and Warning System. The Administrator must also 
establish a process to ensure the incident management and 
warning tools used by those governments meet the established 
minimum requirements. In addition, the Administrator must 
ensure that the memoranda of understanding between the Agency 
and those governments ensure compliance with the minimum 
requirements.
    This section also places the authority to use the public 
alert and warning system to warn the public of a missile launch 
with the Federal Government, but allows the Secretary to 
delegate that authority to a State, tribal, or local entity 
after submitting a report to Congress explaining that the 
delegation is either more feasible or in the national security 
interest. The section also authorizes the President, upon 
verification of a missile threat, to alert the public of the 
threat.
    The Secretary is also required to establish a process to 
notify a State warning point of follow-up actions to a missile 
launch alert and work with the Governor of a State warning 
point to implement responsive action plans. The Secretary shall 
also report to Congress on the feasibility of establishing an 
alert designation that would concurrently alert the public and 
a State warning point of a missile threat. No later than one 
year after enactment, the Administrator must review the 
Emergency Operations Center of the Agency, the National Watch 
Center, and each Regional Watch Center of the Agency, and 
submit a report to Congress.
    This section also provides a definition for ``public alert 
and warning system.''

               Title VI--Cybersecurity and Infrastructure


Section 1601. Cybersecurity and Infrastructure Security Agency

    This section renames and reorganizes the DHS National 
Protection and Programs Directorate to be the new CISA, headed 
by a Director of Cybersecurity and Infrastructure Security. 
This section establishes the roles and responsibilities of 
CISA's leadership as well as the functions and responsibilities 
of CISA's three divisions: the Cybersecurity Division, the 
Infrastructure Security Division, and the Emergency 
Communications Division.
    The CISA Director is responsible for leading cybersecurity 
and critical infrastructure protection operations and policy 
for the CISA and coordinating with appropriate stakeholders to 
carry out the CISA's mission. A Deputy Director of 
Cybersecurity and Infrastructure Security shall assist the 
Director in management of the CISA's duties and activities. 
This section empowers the DHS Secretary to receive and analyze 
law enforcement information and intelligence from government 
and private sector entities to assess threats against and 
vulnerabilities of the United States homeland. The Secretary 
may, after notifying Congress, reallocate the functions 
established for CISA in this title.
    This section also establishes several reporting 
requirements to enhance congressional oversight of the newly-
established CISA. CISA must report to Congress on its 
activities and the improved operations of the functions 
previously established for the National Protection and Program 
Directorate after being reorganized under the CISA. CISA must 
also report annually to Congress on threats and activities 
relating to electromagnetic pulses and geomagnetic 
disturbances, and the DHS cybersecurity workforce.

Section 1602. Transfer of other entities

    This section transfers the Office of Biometric Identity 
Management under the Department's Management Directorate. 
Within 90 days of GAO completing its review of the Federal 
Protective Service's organization placement, The DHS Secretary 
must submit to Congress and the Office of Management and Budget 
a recommendation regarding an appropriate placement in the 
executive branch for the Federal Protective Service.

Section 1603. DHS report on cloud-based cybersecurity

    This section requires DHS to coordinate with the Office of 
Management and Budget and GSA to create and submit to Congress 
a report on the Department's role in cloud-based cybersecurity 
deployments for civilian Federal departments and agencies. This 
report will include information on the Department's plan for 
offering software-based Security Operations Center as a service 
(SOC-as-a-Service) capabilities. DHS must also discuss how the 
Department will adapt capabilities of its key cybersecurity 
programs, including the CDM Program and the intrusion detection 
and prevention system, to cloud environments.

Section 1604. Rule of construction

    This section establishes that nothing within Title VI of 
the Act may be construed as endowing the DHS Secretary with new 
authorities or limiting the statutory authority of any other 
Federal agency.

Section 1605. Prohibition on additional funding

    This section states that no additional funds are authorized 
for appropriation to carry out the provisions of this title in 
establishing the CISA.

                        Title VII--Other Matters


                       SUBTITLE A--MISCELLANEOUS

Section 1701. Authorization of appropriations for Office of Inspector 
        General

    This section authorizes an appropriation of $175 million to 
the DHS OIG for each of FYs 2018 and 2019.

Section 1702. Canine teams

    This section authorizes DHS components to request 
additional canine teams for the drug detection mission at the 
border if needed.

Section 1703. Report on resource requirements to respond to 
        congressional requests

    This section requires the DHS Secretary to report annually 
to Congress on requests made by Congress to the Department over 
the preceding five fiscal years. The report shall include 
information such as numbers of requests, breakdowns of requests 
by Congressional entity, and information on requests for 
duplicative briefings. The report must also include the number 
of written testimony and reports the Department had to prepare, 
a list of congressional document requests and subpoenas, a list 
of congressional questions for the record, and a list of 
congressional letter requests for information. DHS must submit 
this report to Congress for the next five years after passage 
of the Act.

Section 1704. Report on cooperation with the People's Republic of China 
        to combat illicit opioid shipments

    This section requires the DHS Secretary to submit a report 
to Congress on the current and future plans to work with 
Chinese government to reduce the flow of opioids from China to 
America. The report must be delivered within 90 days after the 
enactment of this Act.

  SUBTITLE B--COMMISSION TO REVIEW THE CONGRESSIONAL OVERSIGHT OF THE 
                    DEPARTMENT OF HOMELAND SECURITY

Section 1711. Short title

    This section establishes that this subtitle may be cited as 
the ``Congressional Commission to Review the Congressional 
Oversight of the Department of Homeland Security Act of 2018.''

Section 1712. Establishment

    This section establishes a legislative branch commission 
called the ``Congressional Commission to Review Congressional 
Oversight of the Department of Homeland Security.''

Section 1713. Members of the Commission

    This section establishes the membership composition of the 
Commission to be six members appointed within 45 days of 
enactment of this Act: two appointed by the Senate majority, 
two by the Senate minority, and one each by the House majority 
and minority. Commission members shall have expertise in 
homeland security and have prior senior leadership experience 
in the executive or legislative branches. Each member shall be 
appointed for the duration of the Commission, and shall not 
receive compensation. The appropriate Federal agencies shall 
cooperate with the Commission to expedite providing the members 
appropriate security clearances to the extent possible.

Sec 1714. Duties of the Commission

    This section outlines the Commission's duties. The 
Commission shall conduct a comprehensive study of the 
Department of Homeland Security, to include congressional 
oversight of the Department, in order to make recommendations 
on how committee jurisdictions in Congress could be modified to 
promote the mission of the agency and more effective oversight. 
If at least four members of the Commission vote in approval, 
the Commission shall submit to the President and Congress a 
statements of its findings based on the study as well as 
recommendations for legislation to remedy the issues presented.

Section 1715. Operation and powers of the Commission

    This section requires the heads of relevant executive 
branch agencies must consult with the Commission on matters 
within their respective areas of responsibility. The Commission 
shall meet within 30 days after the date on which the majority 
of the members are appointed and at the call of the 
chairperson. This section also requires the chairperson and 
vice chairperson to establish written rules of procedure, hold 
hearings, and may contract with government and private agencies 
for any purpose necessary to carry out its mission.

Sec 1716. Funding

    This section permits the chairperson of the Commission to 
receive a transfer from the Department of up to $1,000,000 to 
carry out its duties. The amounts transferred shall remain 
available until the Commission is terminated.

Sec 1717. Personnel

    This section requires the designation of an Executive 
Director for the Congressional Commission to Review 
Congressional Oversight of the Department of Homeland Security. 
The Executive Director shall be appointed by the chairperson 
and the vice chairperson and may appoint additional staff as 
they consider appropriate. Additionally, this section 
authorizes any Federal Government employee may be detailed to 
the Commission.

Sec 1718. Termination

    This section establishes the termination date of the 
Congressional Commission to Review Congressional Oversight of 
the Department of Homeland Security to be not later than 12 
months after the date of enactment of this Act.

            SUBTITLE C--TECHNICAL AND CONFORMING AMENDMENTS

Section 1731. Technical amendments to the Homeland Security Act of 2002

    This section makes technical amendments to the Homeland 
Security Act of 2002 to integrate changes from this title.

                   V. Evaluation of Regulatory Impact

    Pursuant to the requirements of paragraph 11(b) of rule 
XXVI of the Standing Rules of the Senate, the Committee has 
considered the regulatory impact of this Act and determined 
that the Act will have no regulatory impact within the meaning 
of the rules. The Committee agrees with the Congressional 
Budget Office's statement that the Act contains no 
intergovernmental or private-sector mandates as defined in the 
Unfunded Mandates Reform Act (UMRA) and would impose no costs 
on state, local, or tribal governments.

             VI. Congressional Budget Office Cost Estimate

                                     U.S. Congress,
                               Congressional Budget Office,
                                    Washington, DC, April 26, 2018.
Hon. Ron Johnson,
Chairman, Committee on Homeland Security and Governmental Affairs, U.S. 
        Senate, Washington, DC.
    Dear Mr. Chairman: The Congressional Budget Office has 
prepared the enclosed cost estimate for H.R. 2825, the DHS 
Authorization Act.
    If you wish further details on this estimate, we will be 
pleased to provide them. The CBO staff contact is Mark 
Grabowicz.
            Sincerely,
                                                Keith Hall,
                                                          Director.
    Enclosure.

H.R. 2825--DHS Authorization Act

    Summary: H.R. 2825 would authorize the appropriation of 
nearly $2.7 billion over the 2019-2023 period for programs in 
the Department of Homeland Security (DHS), mostly for 
activities carried out by the Federal Emergency Management 
Agency (FEMA). In addition, CBO estimates, the act would 
effectively authorize the appropriation of about $1.2 billion 
over the five-year period, mostly for other FEMA programs.
    Assuming appropriation of the authorized and estimated 
amounts, CBO estimates that implementing H.R. 2825 would cost 
about $3.2 billion over the 2019-2023 period. Enacting the 
legislation would affect direct spending; therefore, pay-as-
you-go procedures apply. However, we estimate that those 
effects would be insignificant in each year. The act would not 
affect revenues.
    CBO estimates that enacting H.R. 2825 would not 
significantly increase net direct spending or on-budget 
deficits in any of the four consecutive 10-year periods 
beginning in 2029.
    H.R. 2825 contains no intergovernmental or private-sector 
mandates as defined in the Unfunded Mandates Reform Act (UMRA).
    Estimated cost to the Federal Government: The estimated 
budgetary effect of H.R. 2825 is shown in the following table. 
The costs of the legislation fall within budget functions 450 
(community and regional development), 500 (education, training, 
employment, and social services), and 750 (administration of 
justice).

----------------------------------------------------------------------------------------------------------------
                                                              By fiscal year, in millions of dollars--
                                                   -------------------------------------------------------------
                                                      2018     2019     2020    2021    2022    2023   2019-2023
----------------------------------------------------------------------------------------------------------------
                                 INCREASES IN SPENDING SUBJECT TO APPROPRIATION
 
FEMA Programs:
    Authorization Level...........................    1,215    1,235    1,254       1       1       0     2,491
    Estimated Outlays.............................        0      652    1,008     492     182      73     2,407
DHS Inspector General:
    Authorization Level...........................      175      175        0       0       0       0       175
    Estimated Outlays.............................        0      158       18       0       0       0       175
Congressional Commission:
    Estimated Authorization Level.................        0        1        0       0       0       0         1
    Estimated Outlays.............................        0        1        0       0       0       0         1
Other FEMA Programs:
    Estimated Authorization Level.................        0      192      196     200     205     209     1,002
    Estimated Outlays.............................        0       13       42      82     128     173       438
FEMA Predisaster Hazard Mitigation Program:
    Estimated Authorization Level.................        0      120       24      24      24      24       216
    Estimated Outlays.............................        0        6       25      54      40      32       157
Reports:
    Estimated Authorization Level.................        0        9        3       3       3       3        20
    Estimated Outlays.............................        0        8        3       3       3       3        20
    Total Changes:
        Estimated Authorization Level.............    1,390    1,732    1,477     228     233     236     3,906
        Estimated Outlays.........................        0      838    1,097     631     352     281     3,199
----------------------------------------------------------------------------------------------------------------
Components may not sum to totals because of rounding; DHS = Department of Homeland Security; FEMA = Federal
  Emergency Management Agency.
The act would authorize the appropriation of $1,390 million for 2018. CBO does not estimate any outlays for
  those authorizations because appropriations for 2018 have already been provided.
CBO estimates that enacting H.R. 2825 would increase direct spending by less than $500,000 over the 2019-2028
  period.

    Basis of estimate: For this estimate, CBO assumes that H.R. 
2825 will be enacted near the end of fiscal year 2018. H.R. 
2825 would authorize appropriations totaling $1.39 billion for 
fiscal year 2018. CBO does not estimate outlays for the 2018 
authorizations because appropriations for 2018 have already 
been provided.
    CBO estimates that implementing H.R. 2825 would cost about 
$3.2 billion over the 2019-2023 period. For this estimate, CBO 
assumes that the authorized and estimated amounts will be 
provided each year beginning in 2019 and that spending will 
follow historical patterns.

Programs with specified authorizations

    H.R. 2825 would authorize the appropriation of nearly $2.7 
billion over the 2019-2023 period for programs in DHS, mostly 
for activities carried out by FEMA.
    FEMA Programs. Titles V and VI of H.R. 2825 would authorize 
a total of about $2.5 billion in fiscal years 2019 and 2020 for 
the management and administration of FEMA.
    The legislation would specifically authorize the following 
annual appropriations:
           About $1.1 billion through 2020 for overall 
        FEMA management and administration,
           About $165 million through 2020 in grants to 
        the National Domestic Preparedness Consortium, and
           $1 million through 2022 for a joint 
        counterterrorism awareness workshop.
    CBO estimates that implementing those provisions would cost 
about $2.4 billion over the 2019-2023 period.
    DHS Inspector General. H.R. 2825 would authorize the 
appropriation of $175 million for fiscal year 2019 for the DHS 
Office of Inspector General. CBO estimates that implementing 
the provision would cost $175 million over the 2019-2020 
period.
    Congressional Commission. H.R. 2825 would authorize the 
appropriation of $1 million for a commission to review 
Congressional oversight of DHS; the commission would terminate 
within one year of enactment of the legislation. Because the 
legislation does not specify a schedule for the authorization, 
CBO assumes that the funding will be provided in fiscal year 
2019. CBO estimates that implementing the provision would cost 
$1 million that year.

Other programs

    CBO estimates that carrying out the other activities 
described below would require appropriations of about $1.2 
billion over the 2019-2023 period.
    Other FEMA Programs. H.R. 2825 would strike provisions of 
current law that authorize appropriations for Transit Security 
Grants through 2011 and for Port Security Grants through 2013. 
Although those authorizations have expired, the programs 
received funds in 2018. The legislation would not change the 
nature of those programs' responsibilities. By striking the 
expired authorization but leaving the underlying programs in 
place, the legislation would effectively permanently authorize 
those programs. Using information from FEMA on current program 
funding and accounting for anticipated inflation, CBO estimates 
implementing H.R. 2825 would authorize appropriations for FEMA 
over the 2019-2023 period as follows:
           $469 million for the Transit Security Grant 
        Program, and
           $533 million for the Port Security Grant 
        Program.
    CBO estimates that implementing those provisions would cost 
$438 million over the 2019-2023 period and $564 million after 
2023.
    FEMA Predisaster Mitigation Fund. H.R. 2825 would create 
the National Public Infrastructure Predisaster Mitigation Fund. 
For each major disaster declared after August 1, 2017, an 
amount equal to 6 percent of the total estimated funding FEMA 
expects to provide for certain disaster response grants would 
be transferred into the proposed fund from amounts in the 
Disaster Relief Fund. The new fund would be used to provide 
technical and financial assistance to states and localities for 
hazard mitigation designed to reduce injury, loss of life, and 
damage and destruction of property. Amounts in the fund could 
be spent without further appropriation.
    After enactment, CBO estimates, about $120 million--6 
percent of the estimated $2 billion in relevant disaster 
response grants expected to be made for disasters declared 
after August 1, 2017--would be transferred to the proposed fund 
in 2019. In recent years, FEMA has been provided an average of 
$400 million a year for the relevant disaster response grants. 
Assuming that the Congress provides similar amounts in 
subsequent years, CBO estimates that $24 million (6 percent of 
$400 million) would be transferred to the fund each year.
    Because the provision does not change any underlying 
authority to provide disaster relief, in CBO's view the 
legislation implicitly authorizes the appropriation of amounts 
equal to the amounts that would be transferred from the 
Disaster Relief Fund to the Predisaster Mitigation Fund. Thus, 
on the basis of historical spending patterns, CBO estimates 
that spending under this section would total $157 million over 
the 2019-2023 period and $59 million after 2023.
    Reports and Reviews. H.R. 2825 would require DHS and the 
Government Accountability Office to prepare about 45 program 
reviews or reports (some annually) on various topics within the 
department's purview. Based on the cost of similar activities, 
CBO estimates that it would cost about $20 million over the 
2019-2023 period to prepare those reports and reviews.
    Pay-As-You-Go considerations: H.R. 2825 would increase 
direct spending for additional workers' compensation claims 
from private-sector employees working with DHS. The act would 
allow certain private-sector employees who are injured in the 
course of their work at the department to have related medical 
expenses paid through the federal workers' compensation 
program; such payments are considered mandatory spending. Based 
on the projected number of affected private-sector employees 
who will work with DHS, CBO estimates that the additional 
liability will increase direct spending by $50,000 to $100,000 
per year, starting in 2021, and by less than $500,000 over the 
2019-2028 period.
    The Statutory Pay-As-You-Go Act of 2010 establishes budget-
reporting and enforcement procedures for legislation affecting 
direct spending or revenues. CBO estimates that enacting H.R. 
2825 would have no significant effect on direct spending in any 
year. The bill would not affect revenues.
    Increase in long-term direct spending and deficits: CBO 
estimates that enacting H.R. 2825 would not significantly 
increase net direct spending or on-budget deficits in any of 
the four consecutive 10-year periods beginning in 2029.
    Mandates: H.R. 2825 contains no intergovernmental or 
private-sector mandates as defined in UMRA.
    Previous CBO estimate: On July 20, 2017, CBO transmitted a 
cost estimate for H.R. 2825, the DHS Authorization Act of 2017, 
as reported by the House Committee on Homeland Security on June 
28, 2017. CBO estimated that implementing that version of the 
legislation would cost $5.6 billion over the 2018-2022 period, 
assuming appropriation of the necessary amounts. The 
differences in the cost estimates are attributable to 
differences in provisions, differences in CBO's assumptions 
about the enactment date for each version of the legislation, 
and the fact that appropriations for 2018 have already been 
provided.
    Estimate prepared by: Federal costs: Robert Reese (FEMA); 
Mark Grabowicz (all Other DHS); Meredith Decker (workers' 
compensation); Mandates: Andrew Laughlin.
    Estimate reviewed by: Kim P. Cawley, Chief, Natural and 
Physical Resources Cost Estimates Unit; H. Samuel Papenfuss, 
Deputy Assistant Director for Budget Analysis.

       VII. Changes in Existing Law Made by the Act, as Reported

    In compliance with paragraph 12 of rule XXVI of the 
Standing Rules of the Senate, changes in existing law made by 
the bill, as reported, are shown as follows: (existing law 
proposed to be omitted is enclosed in brackets, new matter is 
printed in italic, and existing law in which no change is 
proposed is shown in roman):

HOMELAND SECURITY ACT OF 2002

           *       *       *       *       *       *       *


SEC. 1. SHORT TITLE; TABLE OF CONTENTS.

    (a) Short Title.--This Act may be cited as the ``Homeland 
Security Act of 2002.''
    (b) Table of Contents.--The table of contents for this Act 
is as follows:
Sec. 1. * * *
     * * * * * * *

                TITLE I--DEPARTMENT OF HOMELAND SECURITY

     * * * * * * *
Sec. 104. Insider Threat Program.

     [TITLE II--INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION]

                     TITLE II--INFORMATION ANALYSIS

  [Subtitle A--Information and Analysis and Infrastructure Protection; 
                         Access to Information]

       Subtitle A--Information and Analysis; Access to Information

[Sec. 201. Information and Analysis and Infrastructure Protection.]
Sec. 201. Information and analysis.
     * * * * * * *
[Sec. 210A. Department of Homeland Security State, Local, and Regional 
          Information Fusion Center Initiative.]
Sec. 210A. Department of Homeland Security Fusion Center Partnership 
          Initiative.
     * * * * * * *
[Sec. 210E. National Asset Database.]
Sec. 210E. Classified Information Advisory Officer.
[Sec. 210F. Classified Information Advisory Officer.]
Sec. 210F. Homeland intelligence doctrine.
Sec. 210G. Homeland terrorist threat assessments.
Sec. 210H. Report on terrorism prevention activities.
Sec. 210I. Departmental coordination to counter threats.
Sec. 210J. Chemical, biological, radiological, and nuclear intelligence 
          and information sharing.

            [Subtitle B--Critical Infrastructure Information]

[Sec. 211. Short title.]
[Sec. 212. Definitions.]
[Sec. 213. Designation of critical infrastructure protection program.]
[Sec. 214. Protection of voluntarily shared critical infrastructure 
          information.]
[Sec. 215. No private right of action.]

                   [Subtitle C--Information Security]

                    Subtitle B--Information Security

Sec. 221. * * *
Sec. 222. * * *
[Sec. 223. Enhancement of Federal and non-Federal cybersecurity.]
[Sec. 224. Net guard.]
[Sec. 225. Cyber Security Enhancement Act of 2002.]
[Sec. 226. Cybersecurity recruitment and retention.]
[Sec. 227. National cybersecurity and communications integration 
          center.]
[Sec. 228. Cybersecurity plans.]
[Sec. 228A. Cybersecurity strategy.]
[Sec. 229. Clearances.]
[Sec. 230. Federal intrusion detection and prevention system.]

             [Subtitle D--Office of Science and Technology]

              Subtitle C--Office of Science and Technology

     * * * * * * *

    TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY

     * * * * * * *
[Sec. 307. Homeland Security Advanced Research Projects Agency.]
Sec. 307. Office of the Chief Scientist.
     * * * * * * *
[Sec. 317. Promoting antiterrorism through international cooperation 
          program.]
[Sec. 319. EMP and GMD mitigation research and development.]
[Sec. 318. Social media working group.]
[Sec. 319. Transparency in research and development.]
Sec. 317. Promoting antiterrorism through international cooperation 
          program.
Sec. 318. Social media working group.
Sec. 319. Transparency in research and development.
Sec. 320. EMP and GMD mitigation research and development.
Sec. 321. Canine detection research and development.
Sec. 322. Cybersecurity Research and Development.

         TITLE IV--BORDER, MARITIME, AND TRANSPORTATION SECURITY

     * * * * * * *

                  Subtitle C--Miscellaneous Provisions

     * * * * * * *
[Sec. 431. Office of Cargo Security Policy.]
     * * * * * * *

               Subtitle F--General Immigration Provisions

     * * * * * * *
[Sec. 475. Director of Shared Services.]
Sec. 476. * * *
Sec. 477. * * *
[Sec. 478. Immigration functions.]
Sec. 478. Annual report on immigration functions.
     * * * * * * *

                 TITLE V--NATIONAL EMERGENCY MANAGEMENT

Sec. 501. * * *
[Sec. 502. Definition.]
     * * * * * * *
[Sec. 513. Disability Coordinator.]
Sec. 513. Office of Disability Integration and Coordination.
Sec. 514. * * *
Sec. 515. * * *
[Sec. 516. Chief medical officer.]
     * * * * * * *
[Sec. 524. Voluntary private sector preparedness accreditation and 
          certification program.]
     * * * * * * *
Sec. 529. Joint Counterterrorism Awareness Workshop Series.
Sec. 530. Center for Faith-Based and Neighborhood Partnerships.
Sec. 531. Senior Law Enforcement Advisor.
     * * * * * * *

                          TITLE VII--MANAGEMENT

     * * * * * * *
[Sec. 705. Establishment of Officer for Civil Rights and Civil 
          Liberties.]
[Sec. 706. Consolidation and co-location of offices.]
[Sec. 707. Quadrennial Homeland Security Review.]
[Sec. 708. Joint Task Forces.]
[Sec. 709. Office of Strategy, Policy, and Plans.]
Sec. 705. Civil Rights and Civil Liberties.
Sec. 706. Quadrennial homeland security review.
Sec. 707. Joint task forces.
Sec. 708. Office of Strategy, Policy, and Plans.
Sec. 709. Chief Procurement Officer.
Sec. 710. Chief Security Officer.
Sec. 711. Annual submittal to Congress of information on reprogramming 
          or transfers of funds to respond to operational surges.
Sec. 712. Chief Facilities and Logistics Officer.
Sec. 713. Long term real property strategies.
Sec. 714. Workforce health and medical support.
Sec. 715. Employee Engagement and Retention Action Plan.
Sec. 716. Acquisition Authorities for Program Accountability and Risk 
          Management.
Sec. 717. Acquisition documentation.
Sec. 718. Acquisition innovation.

 TITLE VIII--COORDINATION WITH NON-FEDERAL ENTITIES; INSPECTOR GENERAL; 
      UNITED STATES SECRET SERVICE; COAST GUARD; GENERAL PROVISIONS

     * * * * * * *

                      Subtitle B--Inspector General

[Sec. 811. Authority of the Secretary.]
[Sec. 812. Law enforcement powers of Inspector General agents.]
Sec. 811. Law enforcement powers of Inspector General agents.
     * * * * * * *

                        Subtitle D--Acquisitions

     * * * * * * *
Sec. 836. Acquisition Review Board.
Sec. 837. Congressional notification and other requirements for major 
          acquisition program breach.
Sec. 838. Multiyear acquisition strategy.
Sec. 839. Acquisition policies and guidance.

                 Subtitle E--Human Resources Management

     * * * * * * *
[Sec. 857. Review and report by Comptroller General.]
[Sec. 858. Identification of new entrants into the Federal marketplace.]
Sec. 857. Identification of new entrants into the Federal marketplace.
     * * * * * * *

                  Subtitle H--Miscellaneous Provisions

Sec. 871. * * *
[Sec. 872. Reorganization.]\147\
\147\The bill as reported by the Committee retained a provision in H.R. 
    2825 as passed by the House of Representatives that would have 
    removed Section 872 of the Homeland Security Act of 2002. Retaining 
    this provision of the House bill was a drafting error by the 
    Committee that will be corrected before any action is taken by the 
    full Senate on the bill on the floor. The Chairman favors DHS 
    retaining its ability to reorganize under Section 872.
Sec. 873. * * *
[Sec. 874. Future Year Homeland Security Program.]
Sec. 874. Future Years Homeland Security Program.
     * * * * * * *
[Sec. 878. Counternarcotics officer.]
[Sec. 879. Office of International Affairs.]
Sec. 880. Prohibition of the Terrorism Information and Prevention 
          System.
[Sec. 881. Review of pay and benefit plans.]
     * * * * * * *
Sec. 890B. Department Leadership Councils.
     * * * * * * *

                  TITLE XVIII--EMERGENCY COMMUNICATIONS

[Sec. 1801. Office for Emergency Communications.]
Sec. 1801. Emergency Communications Division.
     * * * * * * *

             [TITLE XIX--DOMESTIC NUCLEAR DETECTION OFFICE]

        TITLE XIX--COUNTERING WEAPONS OF MASS DESTRUCTION OFFICE

Sec. 1900. Definitions.
[Sec. 1901. Domestic Nuclear Detection Office.]

        Subtitle A--Countering Weapons of Mass Destruction Office

Sec. 1901. Countering Weapons of Mass Destruction Office.
[Sec. 1902. Mission of Office.]
[Sec. 1903. Hiring Authority.]
[Sec. 1904. Testing Authority.]
[Sec. 1905. Relationship to other Department entities and Federal 
          agencies.]
[Sec. 1906. Contracting and grant making authorities.]
[Sec. 1907. Joint annual interagency review of global nuclear detection 
          architecture.]

                    Subtitle B--Mission of the Office

Sec. 1921. Mission of the Office.
Sec. 1922. Relationship to other department entities and Federal 
          agencies.
Sec. 1923. Responsibilities.
Sec. 1924. Hiring authority.
Sec. 1925. Testing authority.
Sec. 1926. Contracting and grant making authorities.
Sec. 1927. Joint annual interagency review of global nuclear detection 
          architecture.

                    Subtitle C--Chief Medical Officer

Sec. 1931. Chief Medical Officer.

                   TITLE XX--HOMELAND SECURITY GRANTS

     * * * * * * *
Sec. 2009. Operation Stonegarden.
Sec. 2010. Non-Profit Security Grant Program.

                    Subtitle B--Grants Administration

     * * * * * * *
Sec. 2024. Memoranda of understanding with departmental components and 
          officer regarding the policy and guidance.
     * * * * * * *

      TITLE XXII--CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY

          Subtitle A--Cybersecurity and Infrastructure Security

Sec. 2201. Definitions.
Sec. 2202. Cybersecurity and Infrastructure Security Agency.
Sec. 2203. Cybersecurity Division.
Sec. 2204. Infrastructure Security Division.
Sec. 2205. Enhancement of Federal and non-Federal cybersecurity.
Sec. 2206. Net guard.
Sec. 2207. Cyber Security Enhancement Act of 2002.
Sec. 2208. Cybersecurity recruitment and retention.
Sec. 2209. National cybersecurity and communications integration center.
Sec. 2210. Cybersecurity plans.
Sec. 2211. Cybersecurity strategy.
Sec. 2212. Clearances.
Sec. 2213. Federal intrusion detection and prevention system.
Sec. 2214. National Asset Database.

             Subtitle B--Critical Infrastructure Information

Sec. 2221. Short title.
Sec. 2222. Definitions.
Sec. 2223. Designation of critical infrastructure protection program.
Sec. 2224. Protection of voluntarily shared critical infrastructure 
          information.
Sec. 2225. No private right of action.

SEC. 2. DEFINITIONS.

    In this chapter, the following definitions apply--
          (1) The term ``acquisition'' has the meaning given 
        the term in section 131 of title 41, United States 
        Code. 
          (2) The term ``acquisition decision authority'' means 
        the authority held by the Secretary, acting through the 
        Under Secretary for Management, to--
                  (A) ensure compliance with Federal law, the 
                Federal Acquisition Regulation, and Department 
                acquisition management directives;
                  (B) review, including approving, pausing, 
                modifying, or canceling, an acquisition 
                throughout the life cycle of the acquisition;
                  (C) ensure that acquisition program managers 
                have the resources necessary to successfully 
                execute an approved acquisition program;
                  (D) ensure good acquisition program 
                management of cost, schedule, risk, and system 
                performance of the acquisition program at 
                issue, including assessing acquisition program 
                baseline breaches and directing any corrective 
                action for those breaches; and
                  (E) ensure that acquisition program managers, 
                on an ongoing basis, monitor cost, schedule, 
                and performance against established baselines 
                and use tools to assess risks to an acquisition 
                program at all phases of the life cycle of the 
                acquisition program to avoid and mitigate 
                acquisition program baseline breaches.
          (3) The term ``acquisition decision event'' means, 
        with respect to an acquisition program, a predetermined 
        point within each of the acquisition phases at which 
        the person exercising the acquisition decision 
        authority determines whether the acquisition program 
        shall proceed to the next phase.
          (4) The term ``acquisition decision memorandum'' 
        means, with respect to an acquisition, the official 
        acquisition decision event record that includes a 
        documented record of decisions and assigned actions for 
        the acquisition, as determined by the person exercising 
        acquisition decision authority for the acquisition.
          (5) The term ``acquisition program'' means the 
        totality of activities directed to accomplish specific 
        goals and objectives, which may--
                  (A) provide new or improved capabilities in 
                response to approved requirements or sustain 
                existing capabilities; and
                  (B) have multiple projects to obtain specific 
                capability requirements or capital assets.
          (6) The term ``acquisition program baseline'', with 
        respect to an acquisition program, means a summary of 
        the cost, schedule, and performance parameters, 
        expressed in standard, measurable, quantitative terms, 
        which must be met in order to accomplish the goals of 
        the program.
          [(1)](7) * * *
          [(2)](8) * * *
          [(3)](9) * * *
          (10) The term ``best practices'', with respect to 
        acquisition, means a knowledge-based approach to 
        capability development that includes, at a minimum--
                  (A) identifying and validating needs;
                  (B) assessing alternatives to select the most 
                appropriate solution;
                  (C) establishing requirements;
                  (D) developing cost estimates and schedules 
                that consider the work necessary to develop, 
                plan, support, and install a program or 
                solution;
                  (E) identifying sources of funding that match 
                resources to requirements;
                  (F) demonstrating technology, design, and 
                manufacturing maturity;
                  (G) using milestones and exit criteria or 
                specific accomplishments that demonstrate 
                progress;
                  (H) adopting and executing standardized 
                processes with known success across programs;
                  (I) ensuring an adequate, well-trained, and 
                diverse workforce that is qualified and 
                sufficient in number to perform necessary 
                functions;
                  (J) developing innovative, effective, and 
                efficient processes and strategies;
                  (K) integrating risk management and 
                mitigation techniques for national security 
                considerations; and
                  (L) integrating the capabilities described in 
                subparagraphs (A) through (K) into the mission 
                and business operations of the Department.
          (11) The term ``breach'' means a failure to meet any 
        cost, schedule, or performance threshold specified in 
        the most recently approved acquisition program 
        baseline.
          (12) The term ``congressional homeland security 
        committees'' means--
                  (A) the Committee on Homeland Security of the 
                House of Representatives and the Committee on 
                Homeland Security and Governmental Affairs of 
                the Senate; and
                  (B) the Committee on Appropriations of the 
                House of Representatives and the Committee on 
                Appropriations of the Senate.
          (13) The term ``Component Acquisition Executive'' 
        means the senior acquisition official within a 
        component who is designated in writing by the Under 
        Secretary for Management, in consultation with the 
        component head, with authority and responsibility for 
        leading a process and staff to provide acquisition and 
        program management oversight, policy, and guidance to 
        ensure that statutory, regulatory, and higher level 
        policy requirements are fulfilled, including compliance 
        with Federal law, the Federal Acquisition Regulation, 
        and Department acquisition management directives 
        established by the Under Secretary for Management.
          (14) The term ``cost-type contract'' means a contract 
        that--
                  (A) provides for payment of allowable 
                incurred costs, to the extent prescribed in the 
                contract; and
                  (B) establishes an estimate of total cost for 
                the purpose of obligating funds and 
                establishing a ceiling that the contractor may 
                not exceed, except at the risk of the 
                contractor, without the approval of the 
                contracting officer.
          [(4)](15) * * *
          [(5)](16) * * *
          [(6)](17) * * *
          [(7)](18) * * *
          [(8)](19) * * *
          (20) The term ``fixed-price contract'' means a 
        contract that provides for a firm price or, in 
        appropriate cases, an adjustable price.
          [(9)](21) * * *
          [(10)](22) * * *
          [(11)](23) The term ``intelligence component of the 
        Department'' means any element or entity of the 
        Department that collects, gathers, processes, analyzes, 
        produces, or disseminates intelligence information 
        within the scope of the information sharing 
        environment, including homeland security information, 
        terrorism information, and weapons of mass destruction 
        information, or national intelligence, as defined under 
        section 3(5) of the National Security Act of 1947 (50 
        U.S.C. 401a(5)), except--(A) the United States Secret 
        Service; and (B) the Coast Guard, when operating under 
        the direct authority of the Secretary of Defense or 
        Secretary of the Navy pursuant to section 3 of title 
        14, United States Code, except that nothing in this 
        paragraph shall affect or diminish the authority and 
        responsibilities of the Commandant of the Coast Guard 
        to command or control the Coast Guard as an armed force 
        or the authority of the Director of National 
        Intelligence with respect to the Coast Guard as an 
        element of the intelligence community (as defined under 
        section 3(4) of the National Security Act of 1947 (50 
        U.S.C. 401a(4)).
          [(12)](24) The term ``key resources'' means publicly 
        or privately controlled resources essential to the 
        minimal operations of the economy and government.
          (25) The term ``life cycle cost'' means the total 
        cost of an acquisition, including all relevant costs 
        related to acquiring, owning, operating, maintaining, 
        and disposing of the system, project, service, or 
        product over a specified period of time.
          [(13)](26) * * *
          (27) The term ``major acquisition program'' means a 
        Department acquisition program that is estimated by the 
        Secretary or a designee of the Secretary to require an 
        eventual total expenditure of not less than 
        $300,000,000 (based on fiscal year 2017 constant 
        dollars) over the life cycle cost of the program.
          [(14)](28) * * *
          [(15)](29) * * *
          [(16)](30) * * *
          [(17)](31) * * *
          [(18)](32) * * *
          [(19)](33) * * *
          [(20)](34) * * *

           *       *       *       *       *       *       *


TITLE I--DEPARTMENT OF HOMELAND SECURITY

           *       *       *       *       *       *       *


SEC. 102. SECRETARY; FUNCTIONS.

    (a) * * *
    (b) Functions.--The Secretary--
          (1) * * *
          (2) coordinating and, as appropriate, consolidating, 
        the Federal Government's communications and systems of 
        communications relating to homeland security with State 
        and local government personnel, agencies, and 
        authorities, the private sector, other entities, and 
        the public; [and]
          (3) distributing or, as appropriate, coordinating the 
        distribution of, warnings and information to State and 
        local government personnel, agencies, and authorities 
        and to the public[.]; and
          (4) shall establish a Homeland Security Advisory 
        Council to provide advice and recommendations on 
        homeland security-related matters, including advice 
        with respect to the preparation of the quadrennial 
        homeland security review under section 706.
    (c) Coordination with Non-Federal entities.--With respect 
to homeland security, the Secretary shall coordinate [through 
the Office of State and Local Coordination (established under 
section 801 of this title)] through the Office of Partnership 
and Engagement (including the provision of training and 
equipment) with State and local government personnel, agencies, 
and authorities, with the private sector, and with other 
entities, including by--

           *       *       *       *       *       *       *

    (h) Headquarters.--
          (1) In general.--There is in the Department a 
        Headquarters.
          (2) Components.--The Department Headquarters shall 
        include each of the following:
                  (A) The Office of the Secretary, which shall 
                include--
                          (i) the Deputy Secretary;
                          (ii) the Chief of Staff; and
                          (iii) the Executive Secretary.
                  (B) The Management Directorate, including the 
                Office of the Chief Financial Officer.
                  (C) The Science and Technology Directorate.
                  (D) The Office of Strategy, Policy, and 
                Plans.
                  (E) The Office of the General Counsel.
                  (F) The Office of the Chief Privacy and FOIA 
                Officer.
                  (G) The Office for Civil Rights and Civil 
                Liberties.
                  (H) The Office of Operations Coordination.
                  (I) The Office of Intelligence and Analysis.
                  (J) The Office of Legislative Affairs.
                  (K) The Office of Public Affairs.
                  (L) The Office of the Inspector General.
                  (M) The Office of the Citizenship and 
                Immigration Services Ombudsman.
                  (N) The Countering Weapons of Mass 
                Destruction Office.
                  (O) The Office of Partnership and Engagement.

SEC. 103. OTHER OFFICERS.

    (a) Deputy Secretary; Under Secretaries; Assistant 
Secretaries and Other Officers._
          (1) In general.--Except as provided under paragraph 
        (2), there are the following officers, appointed by the 
        President, by and with the advice and consent of the 
        Senate:
                  (A) A Deputy Secretary of Homeland Security, 
                who shall be the Secretary's first assistant 
                for purposes of subchapter III of chapter 33 of 
                title 5, United States Code.

           *       *       *       *       *       *       *

                  (E) A Director of the [Bureau of] United 
                States Citizenship and Immigration Services.

           *       *       *       *       *       *       *

                  [(H) An Under Secretary responsible for 
                overseeing critical infrastructure protection, 
                cybersecurity, and other related programs of 
                the Department.]
                  (H) A Director of the Cybersecurity and 
                Infrastructure Security Agency.
                  [(I) Not more than 12 Assistant Secretaries.]
                  (I) An Administrator of the Transportation 
                Security Administration.

           *       *       *       *       *       *       *

          [(2) Assistant secretaries.--If any of the Assistant 
        Secretaries referred to under paragraph (1)(I) is 
        designated to be the Assistant Secretary for Health 
        Affairs, the Assistant Secretary for Legislative 
        Affairs, or the Assistant Secretary for Public Affairs, 
        that Assistant Secretary shall be appointed by the 
        President without the advice and consent of the 
        Senate.]
          (2) Assistant secretaries.--The following Assistant 
        Secretaries shall be appointed by the President or the 
        Secretary, as the case may be, without the advice and 
        consent of the Senate:
                  (A) Presidential appointments.--The 
                Department shall have the following Assistant 
                Secretaries appointed by the President:
                          (i) The Assistant Secretary for 
                        Public Affairs.
                          (ii) The Assistant Secretary for 
                        Legislative Affairs.
                          (iii) The Assistant Secretary for the 
                        Countering Weapons of Mass Destruction 
                        Office.
                          (iv) The Chief Medical Officer.
                  (B) Secretarial appointments.--The Department 
                shall have the following Assistant Secretaries 
                appointed by the Secretary:
                          (i) The Assistant Secretary for 
                        International Affairs.
                          (ii) The Assistant Secretary for 
                        Threat Prevention and Security Policy.
                          (iii) The Assistant Secretary for 
                        Border, Immigration, and Trade Policy.
                          (iv) The Assistant Secretary for 
                        Cybersecurity, Infrastructure, and 
                        Resilience Policy.
                          (v) The Assistant Secretary for 
                        Strategy, Planning, Analysis, and Risk.
                          (vi) The Assistant Secretary for 
                        State and Local Law Enforcement.
                          (vii) The Assistant Secretary for 
                        Partnership and Engagement.
                          (viii) The Assistant Secretary for 
                        Private Sector.
          (3) Limitation on creation of positions.--No 
        Assistant Secretary position may be created in addition 
        to the positions provided for by this section unless 
        such position is authorized by a statute enacted after 
        the date of the enactment of the DHS Authorization Act.
    (b) * * *
    (c) * * *
    (d) Other Officers.--To assist the Secretary in the 
performance of the Secretary's functions, there are the 
following officers, appointed by the President:
          (1) A Director of Secret Service.
          (2) A Chief Information Officer.
          (3) An Officer for Civil Rights and Civil Liberties.
          [(4) A Director for Domestic Nuclear Detection.]
          [(5)](4) Any Director of a Joint Task Force under 
        [section 708] section 707.
    (e) * * *
    (f) Special Assistant to the Secretary.--The Secretary 
shall appoint a Special Assistant to the Secretary who shall be 
responsible for--
          [(1) creating and fostering strategic communications 
        with the private sector to enhance the primary mission 
        of the Department to protect the American homeland;
          [(2) advising the Secretary on the impact of the 
        Department's policies, regulations, processes, and 
        actions on the private sector;
          [(3) interfacing with other relevant Federal agencies 
        with homeland security missions to assess the impact of 
        these agencies' actions on the private sector;
          [(4) creating and managing private sector advisory 
        councils composed of representatives of industries and 
        associations designated by the Secretary to--
                  [(A) advise the Secretary on private sector 
                products, applications, and solutions as they 
                relate to homeland security challenges;
                  [(B) advise the Secretary on homeland 
                security policies, regulations, processes, and 
                actions that affect the participating 
                industries and associations; and
                  [(C) advise the Secretary on private sector 
                preparedness issues, including effective 
                methods for--
                          [(i) promoting voluntary preparedness 
                        standards to the private sector; and
                          [(ii) assisting the private sector in 
                        adopting voluntary preparedness 
                        standards;
                  [(5) working with Federal laboratories, 
                federally funded research and development 
                centers, other federally funded organizations, 
                academia, and the private sector to develop 
                innovative approaches to address homeland 
                security challenges to produce and deploy the 
                best available technologies for homeland 
                security missions;
                  [(6) promoting existing public-private 
                partnerships and developing new public-private 
                partnerships to provide for collaboration and 
                mutual support to address homeland security 
                challenges;
                  [(7) assisting in the development and 
                promotion of private sector best practices to 
                secure critical infrastructure;]
                  [(8)](1) providing information to the private 
                sector regarding voluntary preparedness 
                standards and the business justification for 
                preparedness and promoting to the private 
                sector the adoption of voluntary preparedness 
                standards;
                  [(9)](2) coordinating industry efforts, with 
                respect to functions of the Department of 
                Homeland Security, to identify private sector 
                resources and capabilities that could be 
                effective in supplementing Federal, State, and 
                local government agency efforts to prevent or 
                respond to a terrorist attack;
                  [(10)](3) coordinating with the Commissioner 
                of U.S. Customs and Border Protection and the 
                Assistant Secretary for Trade Development of 
                the Department of Commerce on issues related to 
                the travel and tourism industries; and
                  [(11)](4) consulting with the Office of State 
                and Local Government Coordination and 
                Preparedness on all matters of concern to the 
                private sector, including the tourism industry.
    (g) * * *
    (h) Office of Legislative Affairs.--
          (1) In general.--Notwithstanding any other provision 
        of law, any report that the Department or a component 
        of the Department is required to submit to the 
        Committee on Appropriations of the Senate or the 
        Committee on Appropriations of the House of 
        Representatives under any provision of law shall be 
        submitted concurrently to the Committee on Homeland 
        Security and Governmental Affairs of the Senate and the 
        Committee on Homeland Security of the House of 
        Representatives.
          (2) Applicability.--Paragraph (1) shall apply with 
        respect to any report described in paragraph (1) that 
        is submitted on or after the date of enactment of the 
        DHS Authorization Act.
          (3) Notice.--The Secretary shall notify, in writing, 
        the chairmen and ranking members of the authorizing and 
        appropriating committees of jurisdiction regarding 
        policy memoranda, management directives, and 
        reprogramming notifications issued by the Department.
    (i) Office of Private Sector.--The Assistant Secretary for 
Private Sector shall be responsible for--
          (1) creating and fostering strategic communications 
        with the private sector to enhance the primary mission 
        of the Department to protect the American homeland;
          (2) advising the Secretary on the impact of the 
        Department's policies, regulations, processes, and 
        actions on the private sector;
          (3) interfacing with other relevant Federal agencies 
        with homeland security missions to assess the impact of 
        these agencies' actions on the private sector;
          (4) creating and managing private sector advisory 
        councils composed of representatives of industries and 
        associations designated by the Secretary to--
                  (A) advise the Secretary on private sector 
                products, applications, and solutions as they 
                relate to homeland security challenges; and
                  (B) advise the Secretary on homeland security 
                policies, regulations, processes, and actions 
                that affect the participating industries and 
                associations;
          (5) working with Federal laboratories, federally 
        funded research and development centers, other 
        federally funded organizations, academia, and the 
        private sector to develop innovative approaches to 
        address homeland security challenges to produce and 
        deploy the best available technologies for homeland 
        security missions;
          (6) promoting existing public-private partnerships 
        and developing new public-private partnerships to 
        provide for collaboration and mutual support to address 
        homeland security challenges; and
          (7) assisting in the development and promotion of 
        private sector best practices to secure critical 
        infrastructure.

SEC. 104. INSIDER THREAT PROGRAM.

    (a) Establishment.--The Secretary shall establish an 
Insider Threat Program within the Department, which shall--
          (1) provide training and education for employees of 
        the Department to identify, prevent, mitigate, and 
        respond to insider threat risks to the Department's 
        critical assets;
          (2) provide investigative support regarding potential 
        insider threats that may pose a risk to the 
        Department's critical assets; and
          (3) conduct risk mitigation activities for insider 
        threats.
    (b) Steering Committee.--
          (1) In general.--
                  (A) Establishment.--The Secretary shall 
                establish a Steering Committee within the 
                Department.
                  (B) Membership.--The membership of the 
                Steering Committee shall be as follows:
                          (i) The Under Secretary for 
                        Management and the Under Secretary for 
                        Intelligence and Analysis shall serve 
                        as the Co-Chairpersons of the Steering 
                        Committee.
                          (ii) The Chief Security Officer, as 
                        the designated Senior Insider Threat 
                        Official, shall serve as the Vice 
                        Chairperson of the Steering Committee.
                          (iii) The other members of the 
                        Steering Committee shall be comprised 
                        of representatives of--
                                  (I) the Office of 
                                Intelligence and Analysis;
                                  (II) the Office of the Chief 
                                Information Officer;
                                  (III) the Office of the 
                                General Counsel;
                                  (IV) the Office for Civil 
                                Rights and Civil Liberties;
                                  (V) the Privacy Office;
                                  (VI) the Office of the Chief 
                                Human Capital Officer;
                                  (VII) the Office of the Chief 
                                Financial Officer;
                                  (VIII) the Federal Protective 
                                Service;
                                  (IX) the Office of the Chief 
                                Procurement Officer;
                                  (X) the Science and 
                                Technology Directorate; and
                                  (XI) other components or 
                                offices of the Department as 
                                appropriate.
                  (C) Meetings.--The members of the Steering 
                Committee shall meet on a regular basis to 
                discuss cases and issues related to insider 
                threats to the Department's critical assets, in 
                accordance with subsection (a).
          (2) Responsibilities.--Not later than 1 year after 
        the date of the enactment of this section, the Under 
        Secretary for Management, the Under Secretary for 
        Intelligence and Analysis, and the Chief Security 
        Officer, in coordination with the Steering Committee, 
        shall--
                  (A) develop a holistic strategy for 
                Department-wide efforts to identify, prevent, 
                mitigate, and respond to insider threats to the 
                Department's critical assets;
                  (B) develop a plan to implement the insider 
                threat measures identified in the strategy 
                developed under subparagraph (A) across the 
                components and offices of the Department;
                  (C) document insider threat policies and 
                controls;
                  (D) conduct a baseline risk assessment of 
                insider threats posed to the Department's 
                critical assets;
                  (E) examine programmatic and technology best 
                practices adopted by the Federal Government, 
                industry, and research institutions to 
                implement solutions that are validated and 
                cost-effective;
                  (F) develop a timeline for deploying 
                workplace monitoring technologies, employee 
                awareness campaigns, and education and training 
                programs related to identifying, preventing, 
                mitigating, and responding to potential insider 
                threats to the Department's critical assets;
                  (G) consult with the Under Secretary for 
                Science and Technology and other appropriate 
                stakeholders to ensure the Insider Threat 
                Program is informed, on an ongoing basis, by 
                current information regarding threats, best 
                practices, and available technology; and
                  (H) develop, collect, and report metrics on 
                the effectiveness of the Department's insider 
                threat mitigation efforts.
    (c) Preservation of Merit System Rights.--
          (1) In general.--The Steering Committee shall not 
        seek to, and the authorities provided under this 
        section shall not be used to, deter, detect, or 
        mitigate disclosures of information by Government 
        employees or contractors that are lawful under and 
        protected by section 17(d)(5) of the Central 
        Intelligence Agency Act of 1949 (50 U.S.C. 3517(d)(5)) 
        (commonly known as the `Intelligence Community 
        Whistleblower Protection Act of 1998'), chapter 12 or 
        23 of title 5, United States Code, the Inspector 
        General Act of 1978 (5 U.S.C. App.), or any other 
        whistleblower statute, regulation, or policy.
          (2) Implementation.--
                  (A) In general.--Any activity carried out 
                under this section shall be subject to section 
                115 of the Whistleblower Protection Enhancement 
                Act of 2012 (5 U.S.C. 2302 note).
                  (B) Required statement.--Any activity to 
                implement or enforce any insider threat 
                activity or authority under this section or 
                Executive Order 13587 (50 U.S.C. 3161 note) 
                shall include the statement required by section 
                115 of the Whistleblower Protection Enhancement 
                Act of 2012 (5 U.S.C. 2302 note) that preserves 
                rights under whistleblower laws and section 
                7211 of title 5, United States Code, protecting 
                communications with Congress.
    (d) Definitions.--In this section:
          (1) Critical assets.--The term ``critical assets'' 
        means the resources, including personnel, facilities, 
        information, equipment, networks, or systems necessary 
        for the Department to fulfill its mission.
          (2) Employee.--The term ``employee'' has the meaning 
        given the term in section 2105 of title 5, United 
        States Code.
          (3) Insider.--The term ``insider'' means--
                  (A) any person who has or had authorized 
                access to Department facilities, information, 
                equipment, networks, or systems and is employed 
                by, detailed to, or assigned to the Department, 
                including members of the Armed Forces, experts 
                or consultants to the Department, industrial or 
                commercial contractors, licensees, certificate 
                holders, or grantees of the Department, 
                including all subcontractors, personal services 
                contractors, or any other category of person 
                who acts for or on behalf of the Department, as 
                determined by the Secretary; or
                  (B) State, local, tribal, territorial, and 
                private sector personnel who possess security 
                clearances granted by the Department.
          (4) Insider threat.--The term ``insider threat'' 
        means the threat that an insider will use his or her 
        authorized access, wittingly or unwittingly, to do harm 
        to the security of the United States, including damage 
        to the United States through espionage, terrorism, the 
        unauthorized disclosure of classified national security 
        information, or through the loss or degradation of 
        departmental resources or capabilities.
          (5) Steering committee.--The term ``Steering 
        Committee'' means the Steering Committee established 
        under subsection (b)(1)(A).

TITLE II--INFORMATION ANALYSIS [AND INFRASTRUCTURE PROTECTION]

           *       *       *       *       *       *       *


 Subtitle A--Information and Analysis [and Infrastructure Protection]; 
Access to Information

           *       *       *       *       *       *       *


SEC. 201. INFORMATION AND ANALYSIS [AND INFRASTRUCTURE PROTECTION].

    (a) Intelligence and Analysis [and infrastructure 
protection].--There shall be in the Department an Office of 
Intelligence and Analysis [and an Office of Infrastructure 
Protection].
    (b) Under Secretary for Information and Analysis [and 
assistant secretary for infrastructure protection].--
          (1) * * *
          (2) * * *
          [(3) Office of infrastructure protection.--The Office 
        of Infrastructure Protection shall be headed by an 
        Assistant Secretary for Infrastructure Protection, who 
        shall be appointed by the President.]
    (c) Discharge of Responsibilities.--The Secretary shall 
ensure that the responsibilities of the Department relating to 
information analysis [and infrastructure protection], including 
those described in subsection (d), are carried out through the 
Under Secretary for Intelligence and Analysis [or the Assistant 
Secretary for Infrastructure Protection, as appropriate].
    (d) Responsibilities of Secretary Relating To Intelligence 
and Analysis [and Infrastructure Protection].--The 
responsibilities of the Secretary relating to intelligence and 
analysis [and infrastructure protection] shall be as follows:
          (1) * * *

           *       *       *       *       *       *       *

          [(5) To develop a comprehensive national plan for 
        securing the key resources and critical infrastructure 
        of the United States, including power production, 
        generation, and distribution systems, information 
        technology and telecommunications systems (including 
        satellites), electronic financial and property record 
        storage and transmission systems, emergency 
        preparedness communications systems, and the physical 
        and technological assets that support such systems.]
          [(6) To recommend measures necessary to protect the 
        key resources and critical infrastructure of the United 
        States in coordination with other agencies of the 
        Federal Government and in cooperation with State and 
        local government agencies and authorities, the private 
        sector, and other entities.]
          [(7)](5) To review, analyze, and make recommendations 
        for improvements to the policies and procedures 
        governing the sharing of information within the scope 
        of the information sharing environment established 
        under section 1016 of the Intelligence Reform and 
        Terrorism Prevention Act of 2004 (6 U.S.C. 485), 
        including homeland security information, terrorism 
        information, and weapons of mass destruction 
        information, and any policies, guidelines, procedures, 
        instructions, or standards established under that 
        section.
          [(8)](6) To disseminate, as appropriate, information 
        analyzed by the Department within the Department, to 
        other agencies of the Federal Government with 
        responsibilities relating to homeland security, [and to 
        agencies of State and local governments and private 
        sector entities with such responsibilities in order to 
        assist in the deterrence, prevention, preemption of, or 
        response to, terrorist attacks against the United 
        States.] to State, local, and tribal governments and 
        private entities with such responsibilities, and, as 
        appropriate, to the public, in order to assist in 
        preventing, deterring, or responding to acts of 
        terrorism against the United States.
          [(9)](7) * * *
          [(10)](8) * * *
          [(11)](9) * * *
          [(12)](10) * * *
          [(13)](11) * * *
          [(14)](12) * * *
          [(15)](13) * * *
          [(16)](14) * * *
          [(17)](15) * * *
          [(18)](16) * * *
          [(19)](17) * * *
          [(20)](18) * * *
          [(21)](19) * * *
          [(22)](20) * * *
          [(23)](21) * * *
          [(24)](22) * * *
          [(25) To prepare and submit to the Committee on 
        Homeland Security and Governmental Affairs of the 
        Senate and the Committee on Homeland Security in the 
        House of Representatives, and to other appropriate 
        congressional committees having jurisdiction over the 
        critical infrastructure or key resources, for each 
        sector identified in the National Infrastructure 
        Protection Plan, a report on the comprehensive 
        assessments carried out by the Secretary of the 
        critical infrastructure and key resources of the United 
        States, evaluating threat, vulnerability, and 
        consequence, as required under this subsection. Each 
        such report--(A) shall contain, if applicable, actions 
        or countermeasures recommended or taken by the 
        Secretary or the head of another Federal agency to 
        address issues identified in the assessments; (B) shall 
        be required for fiscal year 2007 and each subsequent 
        fiscal year and shall be submitted not later than 35 
        days after the last day of the fiscal year covered by 
        the report; and (C) may be classified.]
          [(26)](23)
                  (A) * * *
                  (B) The recommended strategy under 
                subparagraph (A) shall--
                          (i) be based on findings of the 
                        research and development conducted 
                        under [section 319]section 320;

           *       *       *       *       *       *       *

                  (C) The Secretary may, if appropriate, 
                incorporate the recommended strategy into a 
                broader recommendation developed by the 
                Department to help protect and prepare critical 
                infrastructure from terrorism, cyber attacks, 
                and other threats if, as incorporated, the 
                recommended strategy complies with subparagraph 
                (B).
          (27) To carry out section 210G (relating to homeland 
        terrorist threat assessments) and section 210H 
        (relating to terrorism prevention activities).
    (e) Staff.--
          (1) In general.--The Secretary shall provide the 
        Office of Intelligence and Analysis [and the Office of 
        Infrastructure Protection] with a staff of analysts 
        having appropriate expertise and experience to assist 
        such offices in discharging responsibilities under this 
        section. The Secretary shall also provide the Chief 
        Intelligence Officer with a staff having appropriate 
        component intelligence program expertise and experience 
        to assist the Chief Intelligence Officer.

           *       *       *       *       *       *       *


SEC. 202. ACCESS TO INFORMATION.

    (a) * * *
    (b) * * *
    (c) Treatment Under Certain Laws.--The Secretary shall be 
deemed to be a Federal law enforcement, intelligence, 
protective, national defense, immigration, or national security 
official, and shall be provided with all information from law 
enforcement agencies that is required to be given to the 
[Director of Central Intelligence] Director of National 
Intelligence, under any provision of the following:
          (1) The USA PATRIOT Act of 2001 (Public Law 107-56).
          (2) Section 2517(6) of title 18, United States Code.
          (3) Rule 6(e)(3)(C) of the Federal Rules of Criminal 
        Procedure.
    (d) Access to Intelligence and Other Information.--
          (1) * * *
          (2) Sharing of information.--The Secretary, in 
        consultation with the [Director of Central 
        Intelligence] Director of National Intelligence, shall 
        work to ensure that intelligence or other information 
        relating to terrorism to which the Department has 
        access is appropriately shared with the elements of the 
        Federal Government referred to in paragraph (1), as 
        well as with State and local governments, as 
        appropriate.

           *       *       *       *       *       *       *


SEC. 204. HOMELAND SECURITY INFORMATION SHARING.

    (a) * * *
    (b) * * *
    (c) State, local, and private-sector sources of 
information.--
          (1) Establishment of business processes.--The 
        Secretary, acting through the Under Secretary for 
        Intelligence and Analysis or the [Assistant Secretary 
        for Infrastructure Protection] Director of the 
        Cybersecurity and Infrastructure Security Agency, as 
        appropriate, shall--

           *       *       *       *       *       *       *

    (d) Training and Evaluation of Employees.--
          (1) Training.--The Secretary, acting through the 
        Under Secretary for Intelligence and Analysis or the 
        [Assistant Secretary for Infrastructure 
        Protection]Director of the Cybersecurity and 
        Infrastructure Security Agency, as appropriate, shall 
        provide to employees of the Department opportunities 
        for training and education to develop an understanding 
        of--

           *       *       *       *       *       *       *


SEC. 210A. [DEPARTMENT OF HOMELAND SECURITY STATE, LOCAL, AND REGIONAL 
                    INFORMATION FUSION CENTER INITIATIVE.] DEPARTMENT 
                    OF HOMELAND SECURITY FUSION CENTER PARTNERSHIP 
                    INITIATIVE.

    (a) Establishment.--The Secretary in consultation with the 
program manager of the information sharing environment 
established under section 1016 of the Intelligence Reform and 
Terrorism Prevention Act of 2004 (6 U.S.C. 485), the Attorney 
General, the Privacy Officer of the Department, the Officer for 
Civil Rights and Civil Liberties of the Department, and the 
Privacy and Civil Liberties Oversight Board established under 
section 1061 of the Intelligence Reform and Terrorism 
Prevention Act of 2004 (5 U.S.C. 601 note), shall establish a 
Department of Homeland Security State, Local, and Regional 
Fusion Center Initiative to establish partnerships with State, 
local, and regional fusion centers. Beginning on the date of 
enactment of the Department of Homeland Security Authorization 
Act, such Initiative shall be known as the ``Department of 
Homeland Security Fusion Center Partnership Initiative''.
    [(b)]
    (b) Interagency Support and Coordination.--Through the 
Department of Homeland Security Fusion Center Partnership 
Initiative, in coordination with principal officials of fusion 
centers in the National Network of Fusion Centers and the 
officers designated as the Homeland Security Advisors of the 
States, the Secretary shall--
          (1) coordinate with the heads of other Federal 
        departments and agencies to provide operational, 
        analytic, and reporting intelligence advice and 
        assistance to the National Network of Fusion Centers 
        and to align homeland security intelligence activities 
        with other field based intelligence activities;
          (2) support the integration of fusion centers into 
        the information sharing environment, including by--
                  (A) providing for the effective dissemination 
                of information within the scope of the 
                information sharing environment to the National 
                Network of Fusion Centers;
                  (B) conducting outreach to such fusion 
                centers to identify any gaps in information 
                sharing;
                  (C) consulting with other Federal agencies to 
                develop methods to--
                          (i) address any such gaps identified 
                        under subparagraph (B), as appropriate; 
                        and
                          (ii) deploy or access such databases 
                        and datasets, as appropriate; and
                  (D) review information that is gathered by 
                the National Network of Fusion Centers to 
                identify that which is within the scope of the 
                information sharing environment, including 
                homeland security information (as defined in 
                section 892), terrorism information, and 
                weapons of mass destruction information and 
                incorporate such information, as appropriate, 
                into the Department's own such information;
          (3) facilitate close communication and coordination 
        between the National Network of Fusion Centers and the 
        Department and other Federal departments and agencies;
          (4) facilitate information sharing and expertise from 
        the national cybersecurity and communications 
        integration center under section 2209 to the National 
        Network of Fusion Centers;
          (5) coordinate the provision of training and 
        technical assistance, including training on the use of 
        Federal databases and datasets described in paragraph 
        (2), to the National Network of Fusion Centers and 
        encourage participating fusion centers to take part in 
        terrorism threat-related exercises conducted by the 
        Department;
          (6) ensure the dissemination of cyber threat 
        indicators and information about cybersecurity risks 
        and incidents to the national Network of Fusion 
        Centers;
          (7) ensure that each fusion center in the National 
        Network of Fusion Centers has a privacy policy approved 
        by the Chief Privacy Officer of the Department and a 
        civil rights and civil liberties policy approved by the 
        Officer for Civil Rights and Civil Liberties of the 
        Department;
          (8) develop and disseminate best practices on the 
        appropriate levels for staffing at fusion centers in 
        the National Network of Fusion Centers of qualified 
        representatives from State, local, tribal, and 
        territorial law enforcement, fire, emergency medical, 
        and emergency management services, and public health 
        disciplines, as well as the private sector;
          (9) to the maximum extent practicable, provide 
        guidance, training, and technical assistance to ensure 
        fusion centers operate in accordance with and in a 
        manner that protects privacy, civil rights, and civil 
        liberties afforded by the Constitution of the United 
        States;
          (10) to the maximum extent practicable, provide 
        guidance, training, and technical assistance to ensure 
        fusion centers are appropriately aligned with and able 
        to meaningfully support Federal homeland security, 
        national security, and law enforcement efforts, 
        including counterterrorism;
          (11) encourage the full participation of the National 
        Network of Fusion Centers in all assessment and 
        evaluation efforts conducted by the Department;
          (12) track all Federal funding provided to each 
        fusion center on an individualized basis as well as by 
        funding source;
          (13) ensure that none of the departmental information 
        or data provided or otherwise made available to fusion 
        center personnel is improperly disseminated, accessed 
        for unauthorized purposes, or otherwise used in a 
        manner inconsistent with Department guidance; and (14) 
        carry out such other duties as the Secretary determines 
        appropriate.
    (c) [Personnel Assignment] Resource Allocation._
          [(1) In general.--The Under Secretary for 
        Intelligence and Analysis shall, to the maximum extent 
        practicable, assign officers and intelligence analysts 
        from components of the Department to participating 
        State, local, and regional fusion centers.
          [(2) Personnel sources.--Officers and intelligence 
        analysts assigned to participating fusion centers under 
        this subsection may be assigned from the following 
        Department components, in coordination with the 
        respective component head and in consultation with the 
        principal officials of participating fusion centers:
                  [(A) Office of Intelligence and Analysis.
                  [(B) [Office of Infrastructure Protection] 
                Cybersecurity and Infrastructure Security 
                Agency.
                  [(C) Transportation Security Administration.
                  [(D) United States Customs and Border 
                Protection.
                  [(E) United States Immigration and Customs 
                Enforcement.
                  [(F) United States Coast Guard.
                  [(G) Other components of the Department, as 
                determined by the Secretary.]
          (1) Information Sharing and Personnel Assignment.--
                  (A) Information sharing.--The Under Secretary 
                for Intelligence and Analysis shall ensure 
                that, as appropriate--
                          (i) fusion centers in the National 
                        Network of Fusion Centers have access 
                        to homeland security information 
                        sharing systems; and
                          (ii) Department personnel are 
                        deployed to support fusion centers in 
                        the National Network of Fusion Centers 
                        in a manner consistent with the mission 
                        of the Department.
                  (B) Personnel assignment.--Department 
                personnel referred to in subparagraph (A)(ii) 
                may include the following:
                          (i) Intelligence officers.
                          (ii) Intelligence analysts.
                          (iii) Other liaisons from components 
                        and offices of the Department, as 
                        appropriate.
                  (C) Memoranda of understanding.--The Under 
                Secretary for Intelligence and Analysis shall 
                negotiate memoranda of understanding between 
                the Department and a State or local government, 
                in coordination with the appropriate 
                representatives from fusion centers in the 
                National Network of Fusion Centers, regarding 
                the exchange of information between the 
                Department and such fusion centers. Such 
                memoranda shall include the following:
                          (i) The categories of information to 
                        be provided by each entity to the other 
                        entity that are parties to any such 
                        memoranda
                          (ii) The contemplated uses of the 
                        exchanged information that is the 
                        subject of any such memoranda.
                          (iii) The procedures for developing 
                        joint products.
                          (iv) The information sharing dispute 
                        resolution processes.
                          (v) Any protections necessary to 
                        ensure the exchange of information 
                        accords with applicable law and 
                        policies.
          (2) Sources of support.--Information shared and 
        personnel assigned pursuant to paragraph (1) may be 
        shared or provided, as the case may be, by the 
        following Department components and offices, in 
        coordination with the respective component or office 
        head and in consultation with the principal officials 
        of fusion centers in the National Network of Fusion 
        Centers:
                  (A) The Office of Intelligence and Analysis.
                  (B) Cybersecurity and Infrastructure Security 
                Agency.
                  (C) The Transportation Security 
                Administration.
                  (D) U.S. Customs and Border Protection.
                  (E) U.S. Immigration and Customs Enforcement.
                  (F) The Coast Guard.
                  (G) The national cybersecurity and 
                communications integration center under section 
                2209.
                  (H) Other components or offices of the 
                Department, as determined by the Secretary.
          (3) [Qualifying criteria] Resource allocation 
        criteria._
                  [(A) In general.--The Secretary shall develop 
                qualifying criteria for a fusion center to 
                participate in the assigning of Department 
                officers or intelligence analysts under this 
                section.]
                  (A) In general.--The Secretary shall make 
                available criteria for sharing information and 
                deploying personnel to support a fusion center 
                in the National Network of Fusion Centers in a 
                manner consistent with the Department's mission 
                and existing statutory limits.
                  (B) * * *
          (4) Prerequisite.--
                  (A) * * *
                  (B) Prior work experience in area.--In 
                determining the eligibility of an officer or 
                intelligence analyst to be assigned to a fusion 
                center under this section, the Under Secretary 
                for Intelligence and Analysis shall consider 
                the familiarity of the officer or intelligence 
                analyst with the State, locality, or region in 
                which such fusion center is located, as 
                determined by such factors as whether the 
                officer or intelligence analyst--

           *       *       *       *       *       *       *

    (d) Responsibilities.--An officer or intelligence analyst 
assigned to a fusion center under this section shall--
          (1) * * *
          (2) * * *
          (3) create intelligence and other information 
        products derived from such information and other 
        homeland security-relevant information provided by the 
        Department; [and]
          (4) assist, in coordination with the national 
        cybersecurity and communications integration center 
        under section 2209, fusion centers in using information 
        relating to cybersecurity risks to develop a 
        comprehensive and accurate threat picture;
          [(4]](5) assist in the dissemination of such 
        products, as coordinated by the Under Secretary for 
        Intelligence and Analysis, to law enforcement agencies 
        and other emergency response providers of State, local, 
        and tribal [government] governments, other fusion 
        centers, and appropriate Federal agencies[.]; and
          (6) use Department information, including information 
        held by components and offices, to develop analysis 
        focused on the mission of the Department under section 
        101(b).
    (e) Border Intelligence Priority.--
          [(1) In general.--The Secretary shall make it a 
        priority to assign officers and intelligence analysts 
        under this section from United States Customs and 
        Border Protection, United States Immigration and 
        Customs Enforcement, and the Coast Guard to 
        participating State, local, and regional fusion centers 
        located in jurisdictions along land or maritime borders 
        of the United States in order to enhance the integrity 
        of and security at such borders by helping Federal, 
        State, local, and tribal law enforcement authorities to 
        identify, investigate, and otherwise interdict persons, 
        weapons, and related contraband that pose a threat to 
        homeland security.]
          (1) In general.--To the greatest extent practicable, 
        the Secretary shall make it a priority to allocate 
        resources, including departmental component personnel 
        with relevant expertise, to support the efforts of 
        fusion centers along land or maritime borders of the 
        United States to facilitate law enforcement agency 
        identification, investigation, and interdiction of 
        persons, weapons, and related contraband that pose a 
        threat to homeland security.
          (2) Border Intelligence Products.--When performing 
        the responsibilities described in subsection (d), 
        officers and intelligence analysts assigned to 
        [participating State, local, and regional fusion 
        centers] fusion centers in the National Network of 
        Fusion Centers under this section shall have, as a 
        primary responsibility, the creation of border 
        intelligence products that--

           *       *       *       *       *       *       *

    (j) Definitions.--In this section--
          (1) the term ``cybersecurity risk'' has the meaning 
        given such term in section 2209;
          [(1)](2) * * *
          [(2)](3) * * *
          [(3)](4) * * *
          [(4)](5) the term ``intelligence-led policing'' means 
        the collection and analysis of information to produce 
        an intelligence end product designed to inform law 
        enforcement decision making at the tactical and 
        strategic levels; [and]
          (6) the term ``National Network of Fusion Centers'' 
        means a decentralized arrangement of fusion centers 
        intended to enhance individual State and urban area 
        fusion centers ability to leverage the capabilities and 
        expertise of all fusion centers for the purpose of 
        enhancing analysis and homeland security information 
        sharing nationally; and
          [(5)](7) * * *
    [(k) Authorization of Appropriations.--There is authorized 
to be appropriated $10,000,000 for each of fiscal years 2008 
through 2012, to carry out this section, except for subsection 
(i), including for hiring officers and intelligence analysts to 
replace officers and intelligence analysts who are assigned to 
fusion centers under this section.]

           *       *       *       *       *       *       *


SEC. 210[F]E. CLASSIFIED INFORMATION ADVISORY OFFICER.

           *       *       *       *       *       *       *


SEC. 210F. HOMELAND INTELLIGENCE DOCTRINE.

    (a) In General.--Not later than 180 days after the date of 
the enactment of this section, the Secretary, acting through 
the Chief Intelligence Officer of the Department, in 
coordination with intelligence components of the Department, 
the Office of the General Counsel, the Privacy Office, and the 
Office for Civil Rights and Civil Liberties, shall develop and 
disseminate written Department-wide guidance for the 
processing, analysis, production, and dissemination of homeland 
security information (as such term is defined in section 892) 
and terrorism information (as such term is defined in section 
1016 of the Intelligence Reform and Terrorism Prevention Act of 
2004 (6 U.S.C. 485)).
    (b) Contents.--The guidance required under subsection (a) 
shall, at a minimum, include the following:
          (1) A description of guiding principles and purposes 
        of the Department's intelligence enterprise.
          (2) A summary of the roles and responsibilities, if 
        any, of each intelligence component of the Department 
        and programs of the intelligence components of the 
        Department in the processing, analysis, production, and 
        dissemination of homeland security information and 
        terrorism information, including relevant authorities 
        and restrictions applicable to each intelligence 
        component of the Department and programs of each such 
        intelligence component.
          (3) Guidance for the processing, analysis, and 
        production of such information, including descriptions 
        of component or program specific datasets that 
        facilitate the processing, analysis, and production.
          (4) Guidance for the dissemination of such 
        information, including within the Department, among and 
        between Federal departments and agencies, among and 
        between State, local, tribal, and territorial 
        governments, including law enforcement agencies, and 
        with foreign partners and the private sector.
          (5) A statement of intent regarding how the 
        dissemination of homeland security information and 
        terrorism information to the intelligence community (as 
        such term is defined in section 3(4) of the National 
        Security Act of 1947 (50 U.S.C. 3003(4))) and Federal 
        law enforcement agencies should assist the intelligence 
        community and Federal law enforcement agencies in 
        carrying out their respective missions.
          (6) A statement of intent regarding how the 
        dissemination of homeland security information and 
        terrorism information to State, local, tribal, and 
        territorial government agencies, including law 
        enforcement agencies, should assist the agencies in 
        carrying out their respective missions.
    (c) Form.--The guidance required under subsection (a) shall 
be disseminated in unclassified form, but may include a 
classified annex.
    (d) Annual Review.--For each of the 5 fiscal years 
beginning with the first fiscal year that begins after the date 
of the enactment of this section, the Secretary shall conduct a 
review of the guidance required under subsection (a) and, as 
appropriate, revise such guidance.

SEC. 210G. HOMELAND TERRORIST THREAT ASSESSMENTS.

    (a) In General.--Not later than 180 days after the date of 
the enactment of this section and for each of the following 5 
fiscal years (beginning in the first fiscal year that begins 
after the date of the enactment of this section), the 
Secretary, acting through the Under Secretary for Intelligence 
and Analysis, and using departmental information, including 
component information coordinated with each intelligence 
component of the Department and programs of each such 
intelligence component, and information provided through State 
and major urban area fusion centers, shall conduct an 
assessment of the terrorist threat to the homeland.
      (b) Contents.--Each assessment under subsection (a) shall 
include the following:
          (1) Empirical data assessing terrorist activities and 
        incidents over time in the United States, including 
        terrorist activities and incidents planned or supported 
        by foreign or domestic terrorists or persons outside of 
        the United States to occur in the homeland.
          (2) An evaluation of current terrorist tactics, as 
        well as ongoing and possible future changes in 
        terrorist tactics.
          (3) An assessment of criminal activity encountered or 
        observed by officers or employees of components which 
        is suspected of financing terrorist activity.
          (4) Detailed information on all individuals suspected 
        of involvement in terrorist activity and subsequently--
                  (A) prosecuted for a Federal criminal 
                offense, including details of the criminal 
                charges involved;
                  (B) placed into removal proceedings, 
                including details of the removal processes and 
                charges used;
                  (C) denied entry into the United States, 
                including details of the denial processes used; 
                or
                  (D) subjected to civil proceedings for 
                revocation of naturalization.
          (5) The efficacy and reach of foreign and domestic 
        terrorist organization propaganda, messaging, or 
        recruitment, including details of any specific 
        propaganda, messaging, or recruitment that contributed 
        to terrorist activities identified pursuant to 
        paragraph (1).
          (6) An assessment of threats, including cyber 
        threats, to the homeland, including to critical 
        infrastructure and Federal civilian networks.
          (7) An assessment of current and potential terrorism 
        and criminal threats posed by individuals and organized 
        groups seeking to unlawfully enter the United States.
          (8) An assessment of threats to the transportation 
        sector, including surface and aviation transportation 
        systems.
    (c) Additional Information.--The assessments required under 
subsection (a)--
          (1) shall, to the extent practicable, utilize 
        existing component data collected and existing 
        component threat assessments; and
          (2) may incorporate relevant information and analysis 
        from other agencies of the Federal Government, agencies 
        of State and local governments (including law 
        enforcement agencies), as well as the private sector, 
        disseminated in accordance with standard information 
        sharing procedures and policies.
      (d) Form.--The assessments required under subsection (a) 
shall be shared with the appropriate congressional committees 
and submitted in unclassified form, but may include separate 
classified annexes, if appropriate.

SEC. 210H. REPORT ON TERRORISM PREVENTION ACTIVITIES OF THE DEPARTMENT.

    (a) Annual Report.--Not later than 1 year after the date of 
enactment of this section, and annually thereafter, the 
Secretary shall submit to Congress an annual report that shall 
include the following:
          (1) A description of the status of the programs and 
        policies of the Department for countering violent 
        extremism and similar activities in the United States.
          (2) A description of the efforts of the Department to 
        cooperate with and provide assistance to other Federal 
        departments and agencies.
          (3) Qualitative and quantitative metrics for 
        evaluating the success of the programs and policies 
        described in paragraph (1) and the steps taken to 
        evaluate the success of those programs and policies.
          (4) An accounting of--
                  (A) grants and cooperative agreements awarded 
                by the Department to counter violent extremism; 
                and
                  (B) all training specifically aimed at 
                countering violent extremism sponsored by the 
                Department.
          (5) In coordination with the Under Secretary for 
        Intelligence and Analysis, an analysis of how the 
        activities of the Department to counter violent 
        extremism correspond and adapt to the threat 
        environment.
          (6) A summary of how civil rights and civil liberties 
        are protected in the activities of the Department to 
        counter violent extremism.
          (7) An evaluation of the use of grants and 
        cooperative agreements awarded under sections 2003 and 
        2004 to support efforts of local communities in the 
        United States to counter violent extremism, including 
        information on the effectiveness of those grants and 
        cooperative agreements in countering violent extremism.
          (8) A description of how the Department incorporated 
        lessons learned from the countering violent extremism 
        programs and policies and similar activities of 
        foreign, State, local, tribal, and territorial 
        governments and stakeholder communities.
          (9) A description of the decision process used by the 
        Department to rename or refocus the entities within the 
        Department that are focused on the issues described in 
        this subsection, including a description of the threat 
        basis for that decision.
    (b) Annual Review.--Not later than 1 year after the date of 
enactment of this section, and annually thereafter, the Office 
for Civil Rights and Civil Liberties of the Department shall--
          (1) conduct a review of the countering violent 
        extremism and similar activities of the Department to 
        ensure that all such activities of the Department 
        respect the privacy, civil rights, and civil liberties 
        of all persons; and
          (2) make publicly available on the website of the 
        Department a report containing the results of the 
        review conducted under paragraph (1).

SEC. 210I. DEPARTMENTAL COORDINATION ON COUNTER THREATS.

    (a) Establishment.--There is authorized in the Department, 
for a period of 2 years beginning after the date of enactment 
of this section, a Counter Threats Advisory Board (in this 
section referred to as the ``Board'') which shall--(1) be 
composed of senior representatives of departmental operational 
components and headquarters elements; and (2) coordinate 
departmental intelligence activities and policy and information 
related to the mission and functions of the Department that 
counter threats.
    (b) Charter.--There shall be a charter to govern the 
structure and mission of the Board, which shall--
          (1) direct the Board to focus on the current threat 
        environment and the importance of aligning departmental 
        activities to counter threats under the guidance of the 
        Secretary; and
          (2) be reviewed and updated as appropriate.
    (c) Members.--
          (1) In general.--The Board shall be composed of 
        senior representatives of departmental operational 
        components and headquarters elements.
          (2) Chair.--The Under Secretary for Intelligence and 
        Analysis shall serve as the Chair of the Board.
          (3) Members.--The Secretary shall appoint additional 
        members of the Board from among the following:
                  (A) The Transportation Security 
                Administration.
                  (B) U.S. Customs and Border Protection.
                  (C) U.S. Immigration and Customs Enforcement.
                  (D) The Federal Emergency Management Agency.
                  (E) The Coast Guard.
                  (F) U. S. Citizenship and Immigration 
                Services.
                  (G) The United States Secret Service.
                  (H) The Cybersecurity and Infrastructure 
                Security Agency.
                  (I) The Office of Operations Coordination.
                  (J) The Office of the General Counsel.
                  (K) The Office of Intelligence and Analysis.
                  (L) The Office of Strategy, Policy, and 
                Plans.
                  (M) The Science and Technology Directorate.
                  (N) The Office for State and Local Law 
                Enforcement.
                  (O) The Privacy Office.
                  (P) The Office for Civil Rights and Civil 
                Liberties.
                  (Q) Other departmental offices and programs 
                as determined appropriate by the Secretary.
    (d) Meetings.--The Board shall--
          (1) meet on a regular basis to discuss intelligence 
        and coordinate ongoing threat mitigation efforts and 
        departmental activities, including coordination with 
        other Federal, State, local, tribal, territorial, and 
        private sector partners; and
          (2) make recommendations to the Secretary.
    (e) Terrorism Alerts.--The Board shall advise the Secretary 
on the issuance of terrorism alerts under section 203.
    (f) Prohibition on Additional Funds.--No additional funds 
are authorized to carry out this section.

SEC. 210J. CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR INTELLIGENCE 
                    AND INFORMATION SHARING.

    (a) In General.--The Office of Intelligence and Analysis of 
the Department shall--
          (1) support homeland security-focused intelligence 
        analysis of terrorist actors, their claims, and their 
        plans to conduct attacks involving chemical, 
        biological, radiological, or nuclear materials against 
        the United States;
          (2) support homeland security-focused intelligence 
        analysis of global infectious disease, public health, 
        food, agricultural, and veterinary issues;
          (3) support homeland security-focused risk analysis 
        and risk assessments of the homeland security hazards 
        described in paragraphs (1) and (2), including the 
        transportation of chemical, biological, nuclear, and 
        radiological materials, by providing relevant 
        quantitative and nonquantitative threat information;
          (4) leverage existing and emerging homeland security 
        intelligence capabilities and structures to enhance 
        prevention, protection, response, and recovery efforts 
        with respect to a chemical, biological, radiological, 
        or nuclear attack;
          (5) share information and provide tailored analytical 
        support on these threats to State, local, and tribal 
        authorities, other Federal agencies, and relevant 
        national biosecurity and biodefense stakeholders, as 
        appropriate; and
          (6) perform other responsibilities, as assigned by 
        the Secretary.
    (b) Coordination.--Where appropriate, the Office of 
Intelligence and Analysis shall coordinate with other relevant 
Department components, including the Countering Weapons of Mass 
Destruction Office, the National Biosurveillance Integration 
Center, other agencies within the intelligence community, 
including the National Counter Proliferation Center, and other 
Federal, State, local, and tribal authorities, including 
officials from high-threat urban areas, State and major urban 
area fusion centers, and local public health departments, as 
appropriate, and enable such entities to provide 
recommendations on optimal information sharing mechanisms, 
including expeditious sharing of classified information, and on 
how such entities can provide information to the Department.
    (c) Definitions.--In this section:
          (1) Fusion center.--The term ``fusion center'' has 
        the meaning given the term in section 210A.
          (2) Intelligence community.--The term ``intelligence 
        community'' has the meaning given such term in section 
        3(4) of the National Security Act of 1947 (50 U.S.C. 
        401a(4)).
          (3) National biosecurity and biodefense 
        stakeholders.--The term ``national biosecurity and 
        biodefense stakeholders' means officials from Federal, 
        State, local, and tribal authorities and individuals 
        from the private sector who are involved in efforts to 
        prevent, protect against, respond to, and recover from 
        a biological attack or other phenomena that may have 
        serious health consequences for the United States, 
        including infectious disease outbreaks.

           *       *       *       *       *       *       *


Subtitle C--Information Strategy

           *       *       *       *       *       *       *


SEC. 222. PRIVACY OFFICER.

    (a) Appointment and Responsibilities.--The Secretary shall 
appoint a senior official in the Department, to be the Chief 
Privacy and FOIA Officer of the Department, who shall report 
directly [to the Secretary, to assume] to the Secretary. Such 
official shall have primary responsibility for privacy policy, 
including--
          (1) * * *

           *       *       *       *       *       *       *

          (5) coordinating with the Officer for Civil Rights 
        and Civil Liberties to ensure that--
                  (A) * * *
                  (B) Congress receives appropriate reports on 
                such programs, policies, and procedures; [and]
          [(6) preparing a report to Congress on an annual 
        basis on activities of the Department that affect 
        privacy, including complaints of privacy violations, 
        implementation of the Privacy Act of 1974 [5 U.S.C. 
        552a], internal controls, and other matters.]
          (6) developing guidance to assist components of the 
        Department in developing privacy policies and 
        practices;
          (7) establishing a mechanism to ensure such 
        components are in compliance with Federal regulatory 
        and statutory and Department privacy requirements, 
        mandates, directives, and policies, including 
        requirements under section 552 of title 5, United 
        States Code (commonly known as the ``Freedom of 
        Information Act'');
          (8) working with components and offices of the 
        Department to ensure that information sharing and 
        policy development activities incorporate privacy 
        protections;
          (9) serving as the Chief FOIA Officer of the 
        Department for purposes of section 552(j) of title 5, 
        United States Code (commonly known as the ``Freedom of 
        Information Act'');
          (10) preparing an annual report to Congress that 
        includes a description of the activities of the 
        Department that affect privacy during the fiscal year 
        covered by the report, including complaints of privacy 
        violations, implementation of section 552a of title 5, 
        United States Code (commonly known as the ``Privacy Act 
        of 1974''), internal controls, and other matters; and
          (11) carrying out such other responsibilities as the 
        Secretary determines are appropriate, consistent with 
        this section.

TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY

           *       *       *       *       *       *       *


SEC. 302. RESPONSIBILITIES AND AUTHORITIES OF THE UNDER SECRETARY FOR 
                    SCIENCE AND TECHNOLOGY.

    [The Secretary, acting through the Under]The Under 
Secretary for Science and Technology, shall have the 
responsibility for--
          (1) * * *
          (2) developing, in consultation with other 
        appropriate executive agencies, a national policy and 
        strategic plan for, identifying priorities, goals, 
        objectives and policies for, and coordinating the 
        Federal Government's civilian efforts to identify and 
        develop countermeasures to chemical, [biological,,] 
        biological, and other emerging terrorist threats, 
        including the development of comprehensive, research-
        based definable goals for such efforts and development 
        of annual measurable objectives and specific targets to 
        accomplish and evaluate the goals for such efforts;
          (3) supporting the Under Secretary for Intelligence 
        and Analysis and the [Assistant Secretary for 
        Infrastructure Protection] Director of the 
        Cybersecurity and Infrastructure Security Agency, by 
        assessing and testing homeland security vulnerabilities 
        and possible threats;
          (4) conducting basic and applied research, 
        development, demonstration, testing, [and 
        evaluation]evaluation, and standards coordination and 
        development activities that are relevant to any or all 
        elements of the Department, through both intramural and 
        extramural programs, except that such responsibility 
        does not extend to human health-related research and 
        development activities;
          (5) * * *
                  (A) preventing the importation of chemical, 
                [biological,,] biological, and related weapons 
                and material; and

           *       *       *       *       *       *       *


SEC. 307. [HOMELAND SECURITY ADVANCED RESEARCH PROJECTS AGENCY] OFFICE 
                    OF THE CHIEF SCIENTIST.

    (a) Definitions.--In this section:
          [(1) Fund.--The term ``Fund'' means the Acceleration 
        Fund for Research and Development of Homeland Security 
        Technologies established in subsection (c).]
          [(2)] (1) Homeland security research.--The term 
        ``homeland security research'' means research relevant 
        to the detection of, prevention of, protection against, 
        response to, attribution of, and recovery from homeland 
        security threats, particularly acts of terrorism.
          [(3) HSARPA.--The term ``HSARPA'' means the Homeland 
        Security Advanced Research Projects Agency established 
        in subsection (b).]
          [(4)] (2) Under secretary.--The term ``Under 
        Secretary'' means the Under Secretary for Science and 
        Technology.
    [(b) Homeland Security Advanced Research Projects Agency.--
          [(1) Establishment.--There is established the 
        Homeland Security Advanced Research Projects Agency.
          [(2) Director.--HSARPA shall be headed by a Director, 
        who shall be appointed by the Secretary. The Director 
        shall report to the Under Secretary.
          [(3) Responsibilities.--The Director shall administer 
        the Fund to award competitive, merit-reviewed grants, 
        cooperative agreements or contracts to public or 
        private entities, including businesses, federally 
        funded research and development centers, and 
        universities. The Director shall administer the Fund 
        to--
                  [(A) support basic and applied homeland 
                security research to promote revolutionary 
                changes in technologies that would promote 
                homeland security;
                  [(B) advance the development, testing and 
                evaluation, and deployment of critical homeland 
                security technologies;
                  [(C) accelerate the prototyping and 
                deployment of technologies that would address 
                homeland security vulnerabilities; and
                  [(D) conduct research and development for the 
                purpose of advancing technology for the 
                investigation of child exploitation crimes, 
                including child victim identification, 
                trafficking in persons, and child pornography, 
                and for advanced forensics.
          [(4) Targeted competitions.--The Director may solicit 
        proposals to address specific vulnerabilities 
        identified by the Director.
          [(5) Coordination.--The Director shall ensure that 
        the activities of HSARPA are coordinated with those of 
        other relevant research agencies, and may run projects 
        jointly with other agencies.
          [(6) Personnel.--In hiring personnel for HSARPA, the 
        Secretary shall have the hiring and management 
        authorities described in section 1101 of the Strom 
        Thurmond National Defense Authorization Act for Fiscal 
        Year 1999 (5 U.S.C. 3104 note; Public Law 105-261). The 
        term of appointments for employees under subsection 
        (c)(1) of that section may not exceed 5 years before 
        the granting of any extension under subsection (c)(2) 
        of that section.
          [(7) Demonstrations.--The Director, periodically, 
        shall hold homeland security technology demonstrations 
        to improve contact among technology developers, vendors 
        and acquisition personnel.]
    [(c) Fund.--
          [(1) Establishment.--There is established the 
        Acceleration Fund for Research and Development of 
        Homeland Security Technologies, which shall be 
        administered by the Director of HSARPA.
          [(2) Authorization of appropriations.--There are 
        authorized to be appropriated $500,000,000 to the Fund 
        for fiscal year 2003 and such sums as may be necessary 
        thereafter.
          [(3) Coast guard.--Of the funds authorized to be 
        appropriated under paragraph (2), not less than 10 
        percent of such funds for each fiscal year through 
        fiscal year 2005 shall be authorized only for the Under 
        Secretary, through joint agreement with the Commandant 
        of the Coast Guard, to carry out research and 
        development of improved ports, waterways and coastal 
        security surveillance and perimeter protection 
        capabilities for the purpose of minimizing the 
        possibility that Coast Guard cutters, aircraft, 
        helicopters, and personnel will be diverted from non-
        homeland security missions to the ports, waterways and 
        coastal security mission.]
    (b) Office of the Chief Scientist.--
          (1) Establishment.--There is established the Office 
        of the Chief Scientist.
          (2) Chief scientist.--The Office of the Chief 
        Scientist shall be headed by a Chief Scientist, who 
        shall be appointed by the Under Secretary.
          (3) Qualifications.--The Chief Scientist shall--
                  (A) be appointed from among distinguished 
                scientists with specialized training or 
                significant experience in a field related to 
                counterterrorism, traditional homeland security 
                missions, or national defense; and
                  (B) have earned an advanced degree at an 
                institution of higher education (as defined in 
                section 101 of the Higher Education Act of 1965 
                (20 U.S.C. 1001)).
          (4) Responsibilities.--The Chief Scientist shall 
        oversee all research and development to--
                  (A) support basic and applied homeland 
                security research to promote revolutionary 
                changes in technologies that would promote 
                homeland security;
                  (B) advance the development, testing and 
                evaluation, standards coordination and 
                development, and deployment of critical 
                homeland security technologies;
                  (C) accelerate the prototyping and deployment 
                of technologies that would address homeland 
                security vulnerabilities;
                  (D) promote the award of competitive, merit-
                reviewed grants, cooperative agreements or 
                contracts to public or private entities, 
                including business, federally funded research 
                and development centers, and universities; and
                  (E) oversee research and development for the 
                purpose of advancing technology for the 
                investigation of child exploitation crimes, 
                including child victim identification, 
                trafficking in persons, and child pornography, 
                and for advanced forensics.
          (5) Coordination.--The Chief Scientist shall ensure 
        that the activities of the Directorate for Testing and 
        Evaluation of Science and Technology are coordinated 
        with those of other relevant research agencies, and may 
        oversee projects jointly with other agencies.
          (6) Personnel.--In hiring personnel for the Science 
        and Technology Directorate, the Secretary shall have 
        the hiring and management authorities described in 
        section 1599h of title 10, United States Code. The term 
        of appointments for employees under subsection (c)(1) 
        of that section may not exceed 5 years before the 
        granting of any extension under subsection (c)(2) of 
        that section.
          (7) Demonstrations.--The Chief Scientist, 
        periodically, shall hold homeland security technology 
        demonstrations, pilots, field assessments, and 
        workshops to improve contact among technology 
        developers, vendors, component personnel, State, local, 
        and tribal first responders, and acquisition personnel.

           *       *       *       *       *       *       *


SEC. 315. EMERGENCY COMMUNICATIONS INTEROPERABILITY RESEARCH AND 
                    DEVELOPMENT.

    (a) In General.-- * * *
          (1) * * *
          (2) interoperable emergency communications 
        capabilities among emergency response providers and 
        relevant government officials, including by--
                  (A) supporting research on a competitive 
                basis, including through the [Directorate of 
                Science and Technology and Homeland Security 
                Advanced Research Projects Agency] Directorate 
                Science and Technology and the Chief Scientist; 
                and
                  (B) considering the establishment of a Center 
                of Excellence under the Department of Homeland 
                Security Centers of Excellence Program focused 
                on improving emergency response providers' 
                communication capabilities.
    (b) * * *
    (c) * * *

SEC. 316. NATIONAL BIOSURVEILLANCE INTEGRATION CENTER.

    (a) In General.--The [Secretary shall] Secretary, acting 
through the Assistant Secretary for Countering Weapons of Mass 
Destruction Office, shall establish, operate, and maintain a 
national Biosurveillance Integration Center (referred to in 
this section as the ``NBIC''), which shall be headed by a 
Directing Officer, under an office or directorate of the 
Department that is in existence as of the date of the enactment 
of this section.

SEC. 317. PROMOTING ANTITERRORISM THROUGH INTERNATIONAL COOPERATION 
                    PROGRAM.

    (a) * * *
    (b) Science and Technology Homeland Security International 
Cooperative Programs Office.--
          (1) * * *
          (2) Director.--The Office shall be headed by a 
        Director, who--
                  (A) shall be selected[, in consultation with 
                the Assistant Secretary for International 
                Affairs,] by and shall report to the Under 
                Secretary; and
                  (B) * * *
          (3) * * *
          (4) Coordination.--The Director shall ensure that the 
        activities under this subsection are coordinated with 
        [the Office of International Affairs and] the 
        Department of State and, as appropriate, the Department 
        of Defense, the Department of Energy, and other 
        relevant Federal agencies or interagency bodies. The 
        Director may enter into joint activities with other 
        Federal agencies.

           *       *       *       *       *       *       *

    (f) Animal and Zoonotic Diseases.--As part of the 
international cooperative activities authorized in this 
section, the Under Secretary, in coordination with [the Chief 
Medical Officer,] the Assistant Secretary for the Countering of 
Weapons of Mass Destruction Office, the Department of State, 
and appropriate officials of the Department of Agriculture, the 
Department of Defense, and the Department of Health and Human 
Services, may enter into cooperative activities with foreign 
countries, including African nations, to strengthen American 
preparedness against foreign animal and zoonotic diseases 
overseas that could harm the Nation's agricultural and public 
health sectors if they were to reach the United States.

           *       *       *       *       *       *       *


[SEC. 319.] SEC. 320. EMP AND GMD MITIGATION RESEARCH AND DEVELOPMENT.

    (a) * * *
    (b) * * *
    (c) Exemption from Disclosure.--
          (1) Information shared with the federal government.--
        [Section 214] Section 2224, and any regulations issued 
        pursuant to such section, shall apply to any 
        information shared with the Federal Government under 
        this section.
          (2) Information shared by the federal government.--
        Information shared by the Federal Government with a 
        State, local, or tribal government under this section 
        shall be exempt from disclosure under any provision of 
        State, local, or tribal freedom of information law, 
        open government law, open meetings law, open records 
        law, sunshine law, or similar law requiring the 
        disclosure of information or records.

SEC. 321. CANINE DETECTION RESEARCH AND DEVELOPMENT.

    (a) In General.--In furtherance of domestic preparedness 
and response, the Secretary, acting through the Under Secretary 
for Science and Technology, and in consultation with other 
relevant executive agencies, relevant State, local, and tribal 
governments, and academic and industry stakeholders, shall, to 
the extent practicable, conduct research and development of 
canine detection technology to mitigate the risk of the threats 
of existing and emerging weapons of mass destruction.
    (b) Scope.--The scope of the research and development under 
subsection (a) may include the following:
          (1) Canine-based sensing technologies.
          (2) Chem-Bio defense technologies.
          (3) New dimensions of olfaction biology.
          (4) Novel chemical sensing technologies.
          (5) Advances in metabolomics and volatilomics.
          (6) Advances in gene therapy, phenomics, and 
        molecular medicine.
          (7) Reproductive science and technology.
          (8) End user techniques, tactics, and procedures.
          (9) National security policies, standards and 
        practices for canine sensing technologies.
          (10) Protective technology, medicine, and treatments 
        for the canine detection platform.
          (11) Domestic capacity and standards development.
          (12) Emerging threat detection.
          (13) Training aids.
          (14) Genetic, behavioral, and physiological 
        optimization of the canine detection platform.
    (c) Coordination and Collaboration.--The Secretary, acting 
through the Under Secretary for Science and Technology, shall 
ensure research and development activities are conducted in 
coordination and collaboration with academia, all levels of 
government, and private sector stakeholders.
    (d) Authorization of Appropriations.--There are authorized 
to be appropriated such sums as are necessary to carry out this 
section.

SEC. 322. CYBERSECURITY RESEARCH AND DEVELOPMENT.

    (a) In General.--The Under Secretary for Science and 
Technology shall support the research, development, testing, 
evaluation, and transition of cybersecurity technologies, 
including fundamental research to improve the sharing of 
information, information security, analytics, and methodologies 
related to cybersecurity risks and incidents, consistent with 
current law.
    (b) Activities.--The research and development supported 
under subsection (a) shall serve the components of the 
Department and shall--
          (1) advance the development and accelerate the 
        deployment of more secure information systems;
          (2) improve and create technologies for detecting and 
        preventing attacks or intrusions, including real-time 
        continuous diagnostics, real-time analytic 
        technologies, and full life cycle information 
        protection;
          (3) improve and create mitigation and recovery 
        methodologies, including techniques and policies for 
        real-time containment of attacks and development of 
        resilient networks and information systems;
          (4) assist the development and support infrastructure 
        and tools to support cybersecurity research and 
        development efforts, including modeling, testbeds, and 
        data sets for assessment of new cybersecurity 
        technologies;
          (5) assist the development and support of 
        technologies to reduce vulnerabilities in industrial 
        control systems;
          (6) assist the development and support cyber 
        forensics and attack attribution capabilities;
          (7) assist the development and accelerate the 
        deployment of full information life cycle security 
        technologies to enhance protection, control, and 
        privacy of information to detect and prevent 
        cybersecurity risks and incidents;
          (8) assist the development and accelerate the 
        deployment of information security measures, in 
        addition to perimeter-based protections;
          (9) assist the development and accelerate the 
        deployment of technologies to detect improper 
        information access by authorized users;
          (10) assist the development and accelerate the 
        deployment of cryptographic technologies to protect 
        information at rest, in transit, and in use;
          (11) assist the development and accelerate the 
        deployment of methods to promote greater software 
        assurance;
          (12) assist the development and accelerate the 
        deployment of tools to securely and automatically 
        update software and firmware in use, with limited or no 
        necessary intervention by users and limited impact on 
        concurrently operating systems and processes; and
          (13) assist in identifying and addressing 
        unidentified or future cybersecurity threats.
    (c) Coordination.--In carrying out this section, the Under 
Secretary for Science and Technology shall coordinate 
activities with--
          (1) the Director of Cybersecurity and Infrastructure 
        Security;
          (2) the heads of other relevant Federal departments 
        and agencies, as appropriate; and
          (3) industry and academia.
    (d) Transition to Practice.--The Under Secretary for 
Science and Technology shall--
          (1) support projects carried out under this title 
        through the full life cycle of such projects, including 
        research, development, testing, evaluation, pilots, and 
        transitions;
          (2) identify mature technologies that address 
        existing or imminent cybersecurity gaps in public or 
        private information systems and networks of information 
        systems, protect sensitive information within and 
        outside networks of information systems, identify and 
        support necessary improvements identified during pilot 
        programs and testing and evaluation activities, and 
        introduce new cybersecurity technologies throughout the 
        homeland security enterprise through partnerships and 
        commercialization; and
          (3) target federally funded cybersecurity research 
        that demonstrates a high probability of successful 
        transition to the commercial market within 2 years and 
        that is expected to have a notable impact on the public 
        or private information systems and networks of 
        information systems.
    (e) Definitions.--In this section:
          (1) Cybersecurity risk.--The term ``cybersecurity 
        risk'' has the meaning given the term in section 2209.
          (2) Homeland security enterprise.--The term 
        ``homeland security enterprise'' means relevant 
        governmental and nongovernmental entities involved in 
        homeland security, including Federal, State, local, and 
        tribal government officials, private sector 
        representatives, academics, and other policy experts.
          (3) Incident.--The term ``incident'' has the meaning 
        given the term in section 2209.
          (4) Information system.--The term ``information 
        system'' has the meaning given the term in section 3502 
        of title 44, United States Code.
          (5) Software assurance.--The term ``software 
        assurance'' means confidence that software--
                  (A) is free from vulnerabilities, either 
                intentionally designed into the software or 
                accidentally inserted at any time during the 
                life cycle of the software; and
                  (B) functioning in the intended manner.

           *       *       *       *       *       *       *


TITLE IV--BORDER, MARITIME, AND TRANSPORTATION SECURITY

           *       *       *       *       *       *       *


Subtitle C--Miscellanous Provisions

           *       *       *       *       *       *       *


SEC. 427. COORDINATION OF INFORMATION AND INFORMATION TECHNOLOGY.

    (a) * * *
    (b) * * *
    [(c)] * * *

           *       *       *       *       *       *       *


[SEC. 431. OFFICE OF CARGO SECURITY POLICY.]

           *       *       *       *       *       *       *


Subtitle F--General Immigration Provisions

           *       *       *       *       *       *       *


[SEC. 475. DIRECTOR OF SHARED SERVICES.]

SEC. 476. SEPARATION OF FUNDING.

    (a) In General.--There shall be established separate 
accounts in the Treasury of the United States for appropriated 
funds and other deposits available for the [Bureau of 
Citizenship and Immigration Services] United States Citizenship 
and Immigration Services and the [Bureau of Border Security] 
U.S. Immigration and Customs Enforcement.
    (b) Separate Budgets.--To ensure that the [Bureau of 
Citizenship and Immigration Services] United States Citizenship 
and Immigration Services and the [Bureau of Border Security] 
U.S. Immigration and Customs Enforcement are funded to the 
extent necessary to fully carry out their respective functions, 
the Director of the Office of Management and Budget shall 
separate the budget requests for each such entity.
    (c) Fees.--Fees imposed for a particular service, 
application, or benefit shall be deposited into the account 
established under subsection (a) that is for the bureau with 
jurisdiction over the function to which the fee relates.
    (d) Fees Not Transferable.--No fee may be transferred 
between [the Bureau of Citizenship and Immigration Services] 
United States Citizenship and Immigration Services and [the 
Bureau of Border Security] U.S. Immigration and Customs 
Enforcement for purposes not authorized by section

           *       *       *       *       *       *       *


SEC. 478. ANNUAL REPORT ON IMMIGRATION FUNCTIONS.

    (a) Annual [Report.--
          [(1) In General.--One year]Report.--One year after 
        the date of the enactment of this Act, and each year 
        thereafter, the Secretary shall submit a report to the 
        President, to the Committees on the Judiciary and 
        Government Reform of the House of Representatives, and 
        to the Committees on the Judiciary and Government 
        Affairs of the Senate, on the impact the transfers made 
        by this subtitle has had on immigration functions.
    [(2)](b) [Matter Included] Matter Included.--The report 
shall address the following with respect to the period covered 
by the report:
          [(A)](1) The aggregate number of all immigration 
        applications and petitions received, and processed, by 
        the Department.
          [(B)](2) Region-by-region statistics on the aggregate 
        number of immigration applications and petitions filed 
        by an alien (or filed on behalf of an alien) and 
        denied, disaggregated by category of denial and 
        application or petition type.
          [(C)](3) The quantity of backlogged immigration 
        applications and petitions that have been processed, 
        the aggregate number awaiting processing, and a 
        detailed plan for eliminating the backlog.
          [(D)](4) The average processing period for 
        immigration applications and petitions, disaggregated 
        by application or petition type.
          [(E)](5) The number and types of immigration-related 
        grievances filed with any official of the Department of 
        Justice, and if those grievances were resolved.
          [(F)](6) Plans to address grievances and improve 
        immigration services.
          [(G)](7) Whether immigration-related fees were used 
        consistent with legal requirements regarding such use.
          [(H)](8) Whether immigration-related questions 
        conveyed by customers to the Department (whether 
        conveyed in person, by telephone, or by means of the 
        Internet) were answered effectively and efficiently.
    [(b) Sense of Congress Regarding Immigration Services.--It 
is the sense of Congress that--
          [(1) the quality and efficiency of immigration 
        services rendered by the Federal Government should be 
        improved after the transfers made by this subtitle take 
        effect; and
          [(2) the Secretary should undertake efforts to 
        guarantee that concerns regarding the quality and 
        efficiency of immigration services are addressed after 
        such effective date.]

           *       *       *       *       *       *       *


                 TITLE V--NATIONAL EMERGENCY MANAGEMENT

SEC. 501. DEFINITIONS.

    In this title--
          (1) * * *

           *       *       *       *       *       *       *

          (8) the term [``National Response Plan''] ``National 
        Response Framework'' means the [National Response Plan] 
        National Response Framework or any successor plan 
        prepared under section [502(a)(6)] 504(a)(6);
          (9) the term ``Nuclear Incident Response Team'' means 
        a resource that includes--
                  (A) those entities of the Department of 
                Energy that perform nuclear or radiological 
                emergency support functions (including accident 
                response, search response, advisory, and 
                technical operations functions), radiation 
                exposure functions at the medical assistance 
                facility known as the Radiation Emergency 
                Assistance Center/Training Site (REAC/TS), 
                radiological assistance functions, and related 
                functions; and
                  (B) those entities of the Environmental 
                Protection Agency that perform such support 
                functions (including radiological emergency 
                response functions) and related functions.
          [(9)](10) * * *
          [(10)](11) * * *
          [(11)](12) * * *
          [(12)](13) * * *
          [(13)](14) the term ``tribal government'' means the 
        government of any entity described in [section 
        2(13)(B)]section 2(26)(B); and
          [(14)](15) * * *

[SEC. 502. DEFINITION.]

SEC. 503. FEDERAL EMERGENCY MANAGEMENT AGENCY.

    (a) * * *
    (b) Mission.--
          (1) * * *
          (2) Specific activities.--In support of the primary 
        mission of the Agency, the Administrator shall--
                  (A) lead the Nation's efforts to prepare for, 
                protect against, respond to, recover from, and 
                mitigate against the risk of natural disasters, 
                acts of terrorism, and other manmade disasters, 
                including catastrophic incidents and incidents 
                impacting critical infrastructure;

           *       *       *       *       *       *       *

                  (G) provide funding, training, exercises, 
                technical assistance, planning, and other 
                assistance to build tribal, local, State, 
                regional, and national capabilities (including 
                communications capabilities), necessary to 
                respond to a natural disaster, act of 
                terrorism, or other man-made disaster; [and]
                  (H) develop and coordinate the implementation 
                of a risk-based, all-hazards strategy for 
                preparedness that builds those common 
                capabilities necessary to respond to natural 
                disasters, acts of terrorism, and other man-
                made disasters while also building the unique 
                capabilities necessary to respond to specific 
                types of incidents that pose the greatest risk 
                to our Nation[.]; and
                  (I) identify and integrate the needs of 
                children into activities to prepare for, 
                protect against, respond to, recover from, and 
                mitigate against natural disasters, acts of 
                terrorism, and other man-made disasters, 
                including catastrophic incidents, including by 
                appointing a technical expert, who may consult 
                with relevant outside organizations and 
                experts, as necessary, to coordinate such 
                activities, as necessary.
    (c) * * *

SEC. 504. AUTHORITY AND RESPONSIBILITIES.

    (a) * * *
          (1) * * *
          (2) * * *
          (3) providing the Federal Government's response to 
        terrorist attacks and major disasters, [including--] 
        (which shall include incidents impacting critical 
        infrastructure), including--

           *       *       *       *       *       *       *

          (4) aiding the recovery from terrorist attacks and 
        major disasters, including incidents impacting critical 
        infrastructure;
          (5) building a comprehensive national incident 
        management system with Federal, State, [and local] 
        local, and tribal government personnel, agencies, and 
        authorities, to respond to such attacks and disasters;
          (6) consolidating existing Federal Government 
        emergency response plans into a single, coordinated 
        [national response plan] national response framework, 
        which shall be reviewed and updated as required but not 
        less than every 5 years;
          (7) developing integrated frameworks, to include 
        consolidating existing Government plans addressing 
        prevention, protection, mitigation, and recovery with 
        such frameworks reviewed and updated as required, but 
        not less than every 5 years;
          [(7)](8) * * *
          [(8)](9) * * *
          [(9)](10) * * *
          [(10)](11) * * *
          [(11)](12) * * *
          [(12)](13) * * *
          [(13)](14) administering, periodically updating (but 
        not less than once every 5 years), and ensuring the 
        implementation of the [National Response Plan] National 
        Response Framework, including coordinating and ensuring 
        the readiness of each emergency support function under 
        the National Response Plan;
          [(14)](15) * * *
          [(15)](16) * * *
          [(16)](17) * * *
          [(17)](18) * * *
          [(18)](19) * * *
          [(19)](20) * * *
          [(20)](21) * * *
          [(21)](22) * * *
    (b) * * *

SEC. 505. FUNCTIONS TRANSFERRED.

    (a) * * *
    (b) Exceptions.--The following within the Preparedness 
Directorate shall not be transferred:
          (1) The Office of Infrastructure Protection.
          (2) The National Communications System.
          (3) The National Cybersecurity Division.
          [(4) The Office of the Chief Medical Officer.]
          [(5]](4) The functions, personnel, assets, 
        components, authorities, and liabilities of each 
        component described under paragraphs (1) [through (4)] 
        through (3).

SEC. 506. PRESERVING THE FEDERAL EMERGENCY MANAGEMENT AGENCY

    (a) * * *
    [(b) Reorganization.--Section 872 shall not apply to the 
Agency, including any function or organizational unit of the 
Agency.]\148\
---------------------------------------------------------------------------
    \148\The bill as reported by the Committee retained a provision in 
H.R. 2825 as passed by the House of Representatives that would have 
removed Section 872 of the Homeland Security Act of 2002. Retaining 
this provision of the House bill was a drafting error by the Committee 
that will be corrected before any action is taken by the full Senate on 
the bill on the floor. The Chairman favors DHS retaining its ability to 
reorganize under Section 872.
---------------------------------------------------------------------------
    [(c)](b) Prohibition on Changes to Missions.--
          (1) In general.--The Secretary may not substantially 
        or significantly reduce, including through a Joint Task 
        Force established under [section 708] section 707, the 
        authorities, responsibilities, or functions of the 
        Agency or the capability of the Agency to perform those 
        missions, authorities, responsibilities, except as 
        otherwise specifically provided in an Act enacted after 
        the date of enactment of the Post-Katrina Emergency 
        Management Reform Act of 2006.
          (2) Certain transfers prohibited.--No asset, 
        function, or mission of the Agency may be diverted to 
        the principal and continuing use of any other 
        organization, unit, or entity of the Department, 
        including a Joint Task Force established under [section 
        708] section 707, except for details or assignments 
        that do not reduce the capability of the Agency to 
        perform its missions.
    [(d)](c) * * *

SEC. 507. REGIONAL OFFICES.

    (a) * * *
    (b) * * *
    (c) Responsibilities.--
          (1) * * *
          (2) Responsibilities.--The responsibilities of a 
        Regional Administrator include--
                  (A) * * *

           *       *       *       *       *       *       *

                  (E) designating an individual responsible for 
                the development of strategic and operational 
                regional plans in support of the [National 
                Response Plan] National Response Framework;

           *       *       *       *       *       *       *

          (3) Training and exercise requirements.--
                  (A) Training.--The Administrator shall 
                require each Regional Administrator to undergo 
                specific training periodically to complement 
                the qualifications of the Regional 
                Administrator. Such training, as appropriate, 
                shall include training with respect to the 
                National Incident Management System, the 
                [National Response Plan] National Response 
                Framework, and such other subjects as 
                determined by the Administrator.
                  (B) * * *
    (d) * * *
    (e) * * *
    (f) Regional Office Strike Teams.--
          (1) * * *
                  (A) a designated Federal coordinating 
                officer;

           *       *       *       *       *       *       *

                  (G) individuals from the agencies with 
                primary responsibility for each of the 
                emergency support functions in the [National 
                Response Plan] National Response Framework.

           *       *       *       *       *       *       *


SEC. 508. NATIONAL ADVISORY COUNCIL.

    (a) * * *
    (b) Responsibilities.--
          (1) In general.--The National Advisory Council shall 
        advise the Administrator on all aspects of emergency 
        management. The National Advisory Council shall 
        incorporate State, local, and tribal government and 
        private sector input in the development and revision of 
        the national preparedness goal, the national 
        preparedness system, the National Incident Management 
        System, the [National Response Plan] National Response 
        Framework, and other related plans and strategies.
          (2) * * *
    (c) * * *
    (d) RESPONSE Subcommittee.--
          (1) * * *
          (2) Membership.--Notwithstanding subsection (c), the 
        RESPONSE Subcommittee shall be composed of the 
        following:
                  (A) [The Deputy Administrator, Protection and 
                National Preparedness] A Deputy Administrator 
                of the Federal Emergency Management Agency, or 
                designee.
                  (B) * * *
                  (C) * * *
                  (D) The [Director of the Office of Emergency 
                Communications of the Department of Homeland 
                Security] The Assistant Director for Emergency 
                Communications, or designee.

           *       *       *       *       *       *       *


SEC. 509. NATIONAL INTEGRATION CENTER.

    (a) In General.--There is established in the Agency a 
National Integration Center.
    (b) Responsibilities.--
          (1) In general.--The Administrator, through the 
        National Integration Center, and in consultation with 
        other Federal departments and agencies and the National 
        Advisory Council, shall ensure ongoing management and 
        maintenance of the National Incident Management System, 
        the [National Response Plan] National Response 
        Framework, National Protection Framework, National 
        Prevention Framework, National Mitigation Framework, 
        National Recovery Framework, and any [successor] 
        successors to such system or [plan] framework.
          (2) Specific responsibilities.--The National 
        Integration Center shall periodically, but not less 
        often than once every 5 years, review, and revise as 
        appropriate, the National Incident Management System 
        and the [National Response Plan] National Response 
        Framework, including--
                  (A) * * *
                  (B) * * *
                  (C) revising the Catastrophic Incident Annex, 
                finalizing and releasing the Catastrophic 
                Incident Supplement to the [National Response 
                Plan] National Response Framework, and ensuring 
                that both effectively address response 
                requirements in the event of a catastrophic 
                incident.
    (c) Incident Management.--
          (1) In general.--
                  (A) [National Response Plan] National 
                response framework._The Secretary, acting 
                through the Administrator, shall ensure that 
                the [National Response Plan] National Response 
                Framework provides for a clear chain of command 
                to lead and coordinate the Federal response to 
                any natural disaster, act of terrorism, or 
                other man-made disaster.
                  (B) Administrator.--The chain of the command 
                specified in the [National Response Plan] 
                National Response Framework shall--
          (2) Principal federal official; joint task force.--
        The Principal Federal Official (or the successor 
        thereto) or Director of a Joint Task Force established 
        under [section 708] section 707 shall not--
                  (A) * * *
                  (B) * * *

SEC. 510. CREDENTIALING AND TYPING.

    (a) In General.--The Administrator shall [enter into a 
memorandum of understanding] partner with the administrators of 
the Emergency Management Assistance Compact, State, local, and 
tribal governments, and organizations that represent emergency 
response providers, to collaborate on developing standards for 
deployment capabilities, including for credentialing and typing 
of incident management personnel, emergency response providers, 
and other personnel (including temporary personnel) and 
resources likely needed to respond to natural disasters, acts 
of terrorism, and other manmade disasters.
    (b) Distribution.--
          (1) In general.-- * * *
                  (A) each Federal agency that has 
                responsibilities under the [National Response 
                Plan] National Response Framework to aid that 
                agency with credentialing and typing incident 
                management personnel, emergency response 
                providers, and other personnel (including 
                temporary personnel) and resources likely 
                needed to respond to a natural disaster, act of 
                terrorism, or other man-made disaster; and
                  (B) * * *
          (2) * * *
    (c) Credentialing and Typing of Personnel.--Not later than 
6 months after receiving the standards provided under 
subsection (b), each Federal agency with responsibilities under 
the [National Response Plan] National Response Framework shall 
ensure that incident management personnel, emergency response 
providers, and other personnel (including temporary personnel) 
and resources likely needed to respond to a natural disaster, 
act of terrorism, or other manmade disaster are credentialed 
and typed in accordance with this section.

           *       *       *       *       *       *       *


SEC. 513. DISABILITY COORDINATOR.

    [(a) In General.--After consultation with organizations 
representing individuals with disabilities, the National 
Council on Disabilities, and the Interagency Coordinating 
Council on Preparedness and Individuals with Disabilities, 
established under Executive Order No. 13347 (6 U.S.C. 312 
note), the Administrator shall appoint a Disability 
Coordinator. The Disability Coordinator shall report directly 
to the Administrator, in order to ensure that the needs of 
individuals with disabilities are being properly addressed in 
emergency preparedness and disaster relief.
    [(b) Responsibilities.--The Disability Coordinator shall be 
responsible for--
          [(1) providing guidance and coordination on matters 
        related to individuals with disabilities in emergency 
        planning requirements and relief efforts in the event 
        of a natural disaster, act of terrorism, or other man-
        made disaster;
          [(2) interacting with the staff of the Agency, the 
        National Council on Disabilities, the Interagency 
        Coordinating Council on Preparedness and Individuals 
        with Disabilities established under Executive Order No. 
        13347 (6 U.S.C. 312 note), other agencies of the 
        Federal Government, and State, local, and tribal 
        government authorities regarding the needs of 
        individuals with disabilities in emergency planning 
        requirements and relief efforts in the event of a 
        natural disaster, act of terrorism, or other man-made 
        disaster;
          [(3) consulting with organizations that represent the 
        interests and rights of individuals with disabilities 
        about the needs of individuals with disabilities in 
        emergency planning requirements and relief efforts in 
        the event of a natural disaster, act of terrorism, or 
        other man-made disaster;
          [(4) ensuring the coordination and dissemination of 
        best practices and model evacuation plans for 
        individuals with disabilities;
          [(5) ensuring the development of training materials 
        and a curriculum for training of emergency response 
        providers, State, local, and tribal government 
        officials, and others on the needs of individuals with 
        disabilities;
          [(6) promoting the accessibility of telephone 
        hotlines and websites regarding emergency preparedness, 
        evacuations, and disaster relief;
          [(7) working to ensure that video programming 
        distributors, including broadcasters, cable operators, 
        and satellite television services, make emergency 
        information accessible to individuals with hearing and 
        vision disabilities;
          [(8) ensuring the availability of accessible 
        transportation options for individuals with 
        disabilities in the event of an evacuation;
          [(9) providing guidance and implementing policies to 
        ensure that the rights and wishes of individuals with 
        disabilities regarding post-evacuation residency and 
        relocation are respected;
          [(10) ensuring that meeting the needs of individuals 
        with disabilities are included in the components of the 
        national preparedness system established under section 
        644 of the Post-Katrina Emergency Management Reform Act 
        of 2006; and
          [(11) any other duties as assigned by the 
        Administrator.]

SEC. 513. OFFICE OF DISABILITY INTEGRATION AND COORDINATION.

    (a) In General.--There is established within the Agency an 
Office of Disability Integration and Coordination (in this 
section referred to as the ``Office''), which shall be headed 
by a Director.
    (b) Mission.--The mission of the Office is to ensure that 
individuals with disabilities and other access and functional 
needs are included in emergency management activities 
throughout the Agency by providing guidance, tools, methods, 
and strategies for the purpose of equal physical program and 
effective communication access.
    (c) Responsibilities.--In support of the mission of the 
Office, the Director shall--
          (1) provide guidance and coordination on matters 
        related to individuals with disabilities in emergency 
        planning requirements and relief efforts in the event 
        of a natural disaster, act of terrorism, or other man-
        made disaster;
          (2) oversee Office employees responsible for 
        disability integration in each regional office with 
        respect to carrying out the mission of the Office;
          (3) liaise with other employees of the Agency, 
        including nonpermanent employees, organizations 
        representing individuals with disabilities, other 
        agencies of the Federal Government, and State, local, 
        and tribal government authorities regarding the needs 
        of individuals with disabilities in emergency planning 
        requirements and relief efforts in the event of a 
        natural disaster, act of terrorism, or other man-made 
        disaster;
          (4) coordinate with the technical expert on the needs 
        of children within the Agency to provide guidance and 
        coordination on matters related to children with 
        disabilities in emergency planning requirements and 
        relief efforts in the event of a natural disaster, act 
        of terrorism, or other man-made disaster;
          (5) consult with organizations representing 
        individuals with disabilities about access and 
        functional needs in emergency planning requirements and 
        relief efforts in the event of a natural disaster, act 
        of terrorism, or other man-made disaster;
          (6) ensure the coordination and dissemination of best 
        practices and model evacuation plans for individuals 
        with disabilities;
          (7) collaborate with Agency leadership responsible 
        for training to ensure that qualified experts develop 
        easily accessible training materials and a curriculum 
        for the training of emergency response providers, 
        State, local, and tribal government officials, and 
        others on the needs of individuals with disabilities;
          (8) coordinate with the Emergency Management 
        Institute, the Center for Domestic Preparedness, Center 
        for Homeland Defense and Security, the United States 
        Fire Administration, the national exercise program 
        described in section 648(b) of the Post-Katrina 
        Emergency Management Reform Act of 2006 (6 U.S.C. 
        748(b)), and the National Domestic Preparedness 
        Consortium to ensure that content related to persons 
        with disabilities, access and functional needs, and 
        children are integrated into existing and future 
        emergency management trainings;
          (9) promote the accessibility of telephone hotlines 
        and websites regarding emergency preparedness, 
        evacuations, and disaster relief;
          (10) work to ensure that video programming 
        distributors, including broadcasters, cable operators, 
        and satellite television services, make emergency 
        information accessible to individuals with hearing and 
        vision disabilities;
          (11) ensure the availability of accessible 
        transportation options for individuals with 
        disabilities in the event of an evacuation;
          (12) provide guidance and implement policies to 
        ensure that the rights and feedback of individuals with 
        disabilities regarding post-evacuation residency and 
        relocation are respected;
          (13) ensure that meeting the needs of individuals 
        with disabilities are included in the components of the 
        national preparedness system established under section 
        644 of the Post-Katrina Emergency Management Reform Act 
        of 2006 (6 U.S.C. 744); and
          (14) perform any other duties as assigned by the 
        Administrator.
    (d) Director.--After consultation with organizations 
representing individuals with disabilities, the Administrator 
shall appoint a Director. The Director shall report directly to 
the Administrator, in order to ensure that the needs of 
individuals with disabilities are being properly addressed in 
emergency preparedness and disaster relief.
    (e) Organizations Representing Individuals with 
Disabilities Defined.--For purposes of this section, the term 
``organizations representing individuals with disabilities'' 
means the National Council on Disabilities, the Interagency 
Coordinating Council on Preparedness and Individuals with 
Disabilities, and other appropriate disability organizations.

SEC. 514. DEPARTMENT AND AGENCY OFFICIALS.

    (a) Deputy Administrators.--The President may appoint, by 
and with the advice and consent of the Senate, not more than 4 
Deputy Administrators to assist the Administrator in carrying 
out this title.
    [(b) Cybersecurity and Communications.--There is in the 
Department an Assistant Secretary for Cybersecurity and 
Communications.]
    [(c)](b) United States Fire Administration.--The 
Administrator of the United States Fire Administration shall 
have a rank equivalent to an assistant secretary of the 
Department.

SEC. 515. NATIONAL OPERATIONS CENTER.

    (a) * * *
    (b) * * *
    (c) State and Local Emergency Responder Representation.--
          (1) Establishment of positions.--The Secretary shall 
        establish a position, on a rotating basis, for a 
        representative of State [and local], local, and tribal 
        emergency responders at the National Operations Center 
        established under subsection (b) to ensure the 
        effective sharing of information between the Federal 
        Government and State [and local], local, and tribal 
        emergency response services.
          (2) * * *

[SEC. 516. CHIEF MEDICAL OFFICER.]

           *       *       *       *       *       *       *


SEC. 523. GUIDANCE AND RECOMMENDATIONS.

    (a) In General.--Consistent with their responsibilities and 
authorities under law, as of the day before the date of the 
enactment of this section, the Administrator and the [Assistant 
Secretary for Infrastructure Protection] Director of 
Cybersecurity and Infrastructure Security, in consultation with 
the private sector, may develop guidance or recommendations and 
identify best practices to assist or foster action by the 
private sector in--

           *       *       *       *       *       *       *

    (c) Small Business Concerns.--In developing guidance or 
recommendations or identifying best practices under subsection 
(a), the Administrator and the [Assistant Secretary for 
Infrastructure Protection] Director of Cybersecurity and 
Infrastructure Security shall take into consideration small 
business concerns (under the meaning given that term in section 
3 of the Small Business Act (15 U.S.C. 632)), including any 
need for separate guidance or recommendations or best 
practices, as necessary and appropriate.
    (d) * * *

[SEC. 524. VOLUNTARY PRIVATE SECTOR PREPAREDNESS ACCREDITATION AND 
                    CERTIFICATION PROGRAM.]

SEC. 525. ACCEPTANCE OF GIFTS.

    (a) Authority.--The [Secretary]Administrator may accept and 
use gifts of property, both real and personal, and may accept 
gifts of services, including from guest lecturers, for 
otherwise authorized activities of the Center for Domestic 
Preparedness that are related to efforts to prevent, prepare 
for, protect against, or respond to a natural disaster, act of 
terrorism, or other man-made disaster, including the use of a 
weapon of mass destruction.
    (b) Prohibition.--The [Secretary]Administrator may not 
accept a gift under this section if the [Secretary] 
Administrator determines that the use of the property or 
services would compromise the integrity or appearance of 
integrity of--
          (1) a program of the Department; or
          (2) an individual involved in a program of the 
        Department.
    (c) Report.--
          (1) In general.--The [Secretary]Administrator shall 
        submit to the Committee on Homeland Security of the 
        House of Representatives and the Committee on Homeland 
        Security and Governmental Affairs of the Senate an 
        annual report disclosing--
                  (A) any gifts that were accepted under this 
                section during the year covered by the report;
                  (B) how the gifts contribute to the mission 
                of the Center for Domestic Preparedness; and
                  (C) the amount of Federal savings that were 
                generated from the acceptance of the gifts.
          (2) Publication.--Each report required under 
        paragraph (1) shall be made publically available.

           *       *       *       *       *       *       *


SEC. 528. COORDINATION OF DEPARTMENT OF HOMELAND SECURITY EFFORTS 
                    RELATED TO FOOD, AGRICULTURE, AND VETERINARY 
                    DEFENSE AGAINST TERRORISM.

    (a) Program Required.--The Secretary, acting through the 
Assistant Secretary for [Health Affairs,] the Countering 
Weapons of Mass Destruction Office, shall carry out a program 
to coordinate the Department's efforts related to defending the 
food, agriculture, and veterinary systems of the United States 
against terrorism and other high-consequence events that pose a 
high risk to homeland security. is in the Department a Chief 
Medical Officer, who shall be appointed by the President.
    (b) * * *
    (C) * * *

SEC. 529. JOINT COUNTERTERRORISM AWARENESS WORKSHOP SERIES.

    (a) In General.--The Administrator, in consultation with 
the Director of the National Counterterrorism Center and the 
Director of the Federal Bureau of Investigation, shall 
establish a Joint Counterterrorism Awareness Workshop Series 
(in this section referred to as the ``Workshop Series'') to--
          (1) address emerging terrorist threats; and
          (2) enhance the ability of State and local 
        jurisdictions to prevent, protect against, respond to, 
        and recover from terrorist attacks.
    (b) Purpose.--The Workshop Series established under 
subsection (a) shall include--
          (1) reviewing existing preparedness, response, and 
        interdiction plans, policies, and procedures related to 
        terrorist attacks of the participating jurisdictions 
        and identifying gaps in those plans, operational 
        capabilities, response resources, and authorities;
          (2) identifying Federal, State, and local resources 
        available to address the gaps identified under 
        paragraph (1);
          (3) providing assistance, through training, 
        exercises, and other means, to build or sustain, as 
        appropriate, the capabilities to close those identified 
        gaps;
          (4) examining the roles and responsibilities of 
        participating agencies and respective communities in 
        the event of a terrorist attack;
          (5) improving situational awareness and information 
        sharing among all participating agencies in the event 
        of a terrorist attack; and
          (6) identifying and sharing best practices and 
        lessons learned from the Workshop Series.
    (c) Designation of Participating Cities.--The Administrator 
shall select jurisdictions to host a Workshop Series from those 
cities that--
          (1) are currently receiving, or that previously 
        received, funding under section 2003; and
          (2) have requested to be considered.
    (d) Workshop Series Participants.--Individuals from State 
and local jurisdictions and emergency response providers in 
cities designated under subsection (c) shall be eligible to 
participate in the Workshop Series, including--
          (1) senior elected and appointed officials;
          (2) law enforcement;
          (3) fire and rescue;
          (4) emergency management;
          (5) emergency medical services;
          (6) public health officials;
          (7) private sector representatives;
          (8) representatives of nonprofit organizations; and
          (9) other participants as deemed appropriate by the 
        Administrator.
    (e) Reports.--
          (1) Workshop series report.--The Administrator, in 
        consultation with the Director of the National 
        Counterterrorism Center, the Director of the Federal 
        Bureau of Investigation, and officials from the city in 
        which a Workshop Series is held, shall develop and 
        submit to all of the agencies participating in the 
        Workshop Series a report after the conclusion of the 
        Workshop Series that addresses--
                  (A) key findings about lessons learned and 
                best practices from the Workshop Series; and
                  (B) potential mitigation strategies and 
                resources to address gaps identified during the 
                Workshop Series.
          (2) Annual reports.--Not later than 1 year after the 
        date of enactment of this section and annually 
        thereafter for 5 years, the Administrator, in 
        consultation with the Director of the National 
        Counterterrorism Center and the Director of the Federal 
        Bureau of Investigation, shall submit to the Committee 
        on Homeland Security and Governmental Affairs of the 
        Senate and the Committee on Homeland Security of the 
        House of Representatives a comprehensive summary report 
        of the key themes, lessons learned, and best practices 
        identified during the Workshop Series held during the 
        previous year.
    (f) Authorization.--There is authorized to be appropriated 
$1,000,000 for each of fiscal years 2018 through 2022 to carry 
out this section.

SEC. 530. CENTER FOR FAITH-BASED AND NEIGHBORHOOD PARTNERSHIPS.

    (a) In General.--There is established in the Agency a 
Center for Faith-Based and Neighborhood Partnerships, headed by 
a Director appointed by the Secretary.
    (b) Mission.--The mission of the Center shall be to develop 
and coordinate departmental outreach efforts with faith-based 
and community organizations and serve as a liaison between 
those organizations and components of the Department for 
activities related to securing facilities, emergency 
preparedness and response, and combating human trafficking.
    (c) Responsibilities.--In support of the mission of the 
Center for Faith-Based and Neighborhood Partnerships, the 
Director shall--
          (1) develop exercises that engage faith-based and 
        community organizations to test capabilities for all 
        hazards, including active shooter incidents;
          (2) coordinate the delivery of guidance and training 
        to faith-based and community organizations related to 
        securing their facilities against natural disasters, 
        acts of terrorism, and other man-made disasters;
          (3) conduct outreach to faith-based and community 
        organizations regarding guidance, training, and 
        exercises and departmental capabilities available to 
        assist faith-based and community organizations to 
        secure their facilities against natural disasters, acts 
        of terrorism, and other man-made disasters;
          (4) facilitate engagement and coordination among the 
        emergency management community and faith-based and 
        community organizations;
          (5) deliver training and technical assistance to 
        faith-based and community organizations and provide 
        subject-matter expertise related to anti-human 
        trafficking efforts to help communities successfully 
        partner with other components of the Blue Campaign of 
        the Department; and
          (6) perform any other duties as assigned by the 
        Administrator.

SEC. 531. SENIOR LAW ENFORCEMENT ADVISOR.

    (a) Establishment.--The Administrator shall appoint a 
Senior Law Enforcement Advisor to serve as a qualified expert 
to the Administrator for the purpose of strengthening the 
Agency's coordination among State, local, and tribal law 
enforcement.
    (b) Qualifications.--The Senior Law Enforcement Advisor 
shall have an appropriate background with experience in law 
enforcement, information sharing, and other emergency response 
functions.
    (c) Responsibilities.--The Senior Law Enforcement Advisor 
shall--
          (1) coordinate on behalf of the Administrator with 
        the Office for State and Local Law Enforcement under 
        section 2006 for the purpose of ensuring State, local, 
        and tribal law enforcement receive consistent and 
        appropriate consideration in policies, guidance, 
        training, and exercises related to preventing, 
        preparing for, protecting against, and responding to 
        natural disasters, acts of terrorism, and other man-
        made disasters within the United States;
          (2) work with the Administrator and the Office for 
        State and Local Law Enforcement under section 2006 to 
        ensure grants to State, local, and tribal government 
        agencies, including programs under sections 2003, 2004, 
        and 2006(a), appropriately focus on terrorism 
        prevention activities; and
          (3) serve other appropriate functions as determined 
        by the Administrator.

           *       *       *       *       *       *       *


TITLE VII--MANAGEMENT

           *       *       *       *       *       *       *


SEC. 701. UNDER SECRETARY FOR MANAGEMENT.

    (a) In General.-- * * *
          (1) The budget, appropriations, expenditures of 
        funds, accounting, and finance.
          (2) Procurement and acquisition management.

           *       *       *       *       *       *       *

    (d) Acquisition and Related Responsibilities.--
          (1) In general.--Notwithstanding subsection (a) of 
        section 1702 of title 41, United States Code, the Under 
        Secretary for Management--
                  (A) is the Chief Acquisition Officer of the 
                Department;
                  (B) shall have the authorities and perform 
                the functions specified in subsection (b) of 
                such section; and
                  (C) shall perform all other functions and 
                responsibilities delegated by the Secretary or 
                described in this subsection.
          (2) Functions and responsibilities.--In addition to 
        the authorities and functions specified in section 
        1702(b) of title 41, United States Code, the functions 
        and responsibilities of the Under Secretary for 
        Management related to acquisition include the 
        following:
                  (A) Advising the Secretary regarding 
                acquisition management activities, taking into 
                account risks of failure to achieve cost, 
                schedule, or performance parameters, to ensure 
                that the Department achieves the mission of the 
                Department through the adoption of widely 
                accepted program management best practices and 
                standards and, where appropriate, acquisition 
                innovation best practices.
                  (B) Leading the acquisition oversight body of 
                the Department, the Acquisition Review Board, 
                and exercising the acquisition decision 
                authority to approve, pause, modify, including 
                the rescission of approvals of program 
                milestones, or cancel major acquisition 
                programs, unless the Under Secretary delegates 
                that authority to a Component Acquisition 
                Executive pursuant to paragraph (3).
                  (C) Establishing policies for acquisition 
                that implement an approach that takes into 
                account risks of failure to achieve cost, 
                schedule, or performance parameters that all 
                components of the Department shall comply with, 
                including outlining relevant authorities for 
                program managers to effectively manage 
                acquisition programs.
                  (D) Ensuring that each major acquisition 
                program has a Department-approved acquisition 
                program baseline pursuant to the acquisition 
                management policy of the Department.
                  (E) Ensuring that the heads of components and 
                Component Acquisition Executives comply with 
                Federal law, the Federal Acquisition 
                Regulation, and Department acquisition 
                management directives.
                  (F) Providing additional scrutiny and 
                oversight for an acquisition that is not a 
                major acquisition if--
                          (i) the acquisition is for a program 
                        that is important to departmental 
                        strategic and performance plans;
                          (ii) the acquisition is for a program 
                        with significant program or policy 
                        implications; and
                          (iii) the Secretary determines that 
                        the scrutiny and oversight for the 
                        acquisition is proper and necessary.
                  (G) Ensuring that grants and financial 
                assistance are provided only to individuals and 
                organizations that are not suspended or 
                debarred.
                  (H) Distributing guidance throughout the 
                Department to ensure that contractors involved 
                in acquisitions, particularly contractors that 
                access the information systems and technologies 
                of the Department, adhere to relevant 
                Department policies related to physical and 
                information security as identified by the Under 
                Secretary for Management.
                  (I) Overseeing the Component Acquisition 
                Executive organizational structure to ensure 
                Component Acquisition Executives have 
                sufficient capabilities and comply with 
                Department acquisition policies.
                  (J) Ensuring acquisition decision memoranda 
                adequately document decisions made at 
                acquisition decision events, including the 
                rationale for decisions made to allow programs 
                to deviate from the requirement to obtain 
                approval by the Department for certain 
                documents at acquisition decision events.
          (3) Delegation of acquisition decision authority.--
                  (A) Level 3 acquisitions.--The Under 
                Secretary for Management may delegate 
                acquisition decision authority in writing to 
                the relevant Component Acquisition Executive 
                for an acquisition program that has a life 
                cycle cost estimate of less than $300,000,000.
                  (B) Level 2 acquisitions.--The Under 
                Secretary for Management may delegate 
                acquisition decision authority in writing to 
                the relevant Component Acquisition Executive 
                for a major acquisition program that has a life 
                cycle cost estimate of not less than 
                $300,000,000 but not more than $1,000,000,000 
                if all of the following requirements are met:
                          (i) The component concerned possesses 
                        working policies, processes, and 
                        procedures that are consistent with 
                        Department-level acquisition policy.
                          (ii) The Component Acquisition 
                        Executive concerned has a well-trained 
                        and experienced workforce, commensurate 
                        with the size of the acquisition 
                        program and related activities 
                        delegated to the Component Acquisition 
                        Executive by the Under Secretary for 
                        Management.
                          (iii) Each major acquisition 
                        concerned has written documentation 
                        showing that the acquisition has a 
                        Department-approved acquisition program 
                        baseline and the acquisition is meeting 
                        agreed-upon cost, schedule, and 
                        performance thresholds.
          (4) Relationship to under secretary for science and 
        technology.--
                  (A) In general.--Nothing in this subsection 
                shall diminish the authority granted to the 
                Under Secretary for Science and Technology 
                under this Act. The Under Secretary for 
                Management and the Under Secretary for Science 
                and Technology shall cooperate in matters 
                related to the coordination of acquisitions 
                across the Department so that investments of 
                the Directorate of Science and Technology are 
                able to support current and future requirements 
                of the components of the Department.
                  (B) Testing and evaluation acquisition 
                support.--The Under Secretary for Science and 
                Technology shall--
                          (i) ensure, in coordination with 
                        relevant component heads, that all 
                        relevant acquisition programs--
                                  (I) complete reviews of 
                                operational requirements to 
                                ensure the requirements are 
                                measurable, testable, and 
                                achievable within the 
                                constraints of cost and 
                                schedule;
                                  (II) integrate applicable 
                                standards into development 
                                specifications;
                                  (III) complete systems 
                                engineering reviews and 
                                technical assessments during 
                                development to inform 
                                production and deployment 
                                decisions;
                                  (IV) complete independent 
                                testing and evaluation of 
                                technologies and systems;
                                  (V) use independent 
                                verification and validation of 
                                operational testing and 
                                evaluation implementation and 
                                results; and
                                  (VI) document whether such 
                                programs meet all performance 
                                requirements included in their 
                                acquisition program baselines;
                          (ii) ensure that such operational 
                        testing and evaluation includes all 
                        system components and incorporates 
                        operators into the testing to ensure 
                        that systems perform as intended in the 
                        appropriate operational setting; and
                          (iii) determine if testing conducted 
                        by other Federal agencies and private 
                        entities is relevant and sufficient in 
                        determining whether systems perform as 
                        intended in the operational setting.
    [(d)](e) * * *
    [(e)](f) * * *
    [(f)](g) * * *

SEC. 702. CHIEF FINANCIAL OFFICER.

    (a) In General.--[The Chief]
          (1) Functions.--The Chief Financial Officer shall 
        perform functions as specified in chapter 9 of title 
        31, United States Code, and, with respect to all such 
        functions and other responsibilities that may be 
        assigned to the Chief Financial Officer from time to 
        time, shall also report to the Under Secretary for 
        Management.
          (2) Acquisition Authorities.--The Chief Financial 
        Officer, in coordination with the Under Secretary for 
        Management, shall oversee the costs of acquisition 
        programs and related activities to ensure that actual 
        and planned costs are in accordance with budget 
        estimates and are affordable, or can be adequately 
        funded, over the life cycle of such programs and 
        activities.
    (b) Responsibilities.--In carrying out the 
responsibilities, authorities, and functions specified in 
section 902 of title 31, United States Code, the Chief 
Financial Officer shall--
          (1) oversee Department budget formulation and 
        execution;
          (2) lead and provide guidance on performance-based 
        budgeting practices for the Department to ensure that 
        the Department and its components are meeting missions 
        and goals;
          (3) lead cost-estimating practices for the 
        Department, including the development of policies on 
        cost estimating and approval of life cycle cost 
        estimates;
          (4) coordinate with the Office of Strategy, Policy, 
        and Plans to ensure that the development of the budget 
        for the Department is compatible with the long-term 
        strategic plans, priorities, and policies of the 
        Secretary;
          (5) develop financial management policy for the 
        Department and oversee the implementation of such 
        policy, including the establishment of effective 
        internal controls over financial reporting systems and 
        processes throughout the Department;
          (6) lead financial system modernization efforts 
        throughout the Department;
          (7) lead the efforts of the Department related to 
        financial oversight, including identifying ways to 
        streamline and standardize business processes;
          (8) oversee the costs of acquisition programs and 
        related activities to ensure that actual and planned 
        costs are in accordance with budget estimates and are 
        affordable, or can be adequately funded, over the 
        lifecycle of such programs and activities;
          (9) fully implement a common accounting structure to 
        be used across the entire Department by fiscal year 
        2020;
          (10) participate in the selection, performance 
        planning, and review of cost estimating positions with 
        the Department;
          (11) track, approve, oversee, and make public 
        information on expenditures by components of the 
        Department for conferences, as appropriate, including 
        by requiring each component to--
                  (A) report to the Inspector General of the 
                Department the expenditures by such component 
                for each conference hosted for which the total 
                expenditures of the Department exceed $100,000, 
                within 15 days after the date of the 
                conference; and
                  (B) with respect to such expenditures, 
                provide to the Inspector General--
                          (i) the information described in 
                        subsections (a), (b), and (c) of 
                        section 739 of title VII of division E 
                        of the Consolidated and Further 
                        Continuing Appropriations Act, 2015 
                        (Public Law 113-235; 128 Stat. 2389); 
                        and
                          (ii) documentation of such 
                        expenditures; and
          (12) track and make public information on 
        expenditures by components of the Department for 
        conferences, as appropriate, including by requiring 
        each component to--
                  (A) report to the Inspector General of the 
                Department the expenditures by such component 
                for each conference hosted or attended by 
                Department employees for which the total 
                expenditures of the Department are more than 
                $20,000 and less than $100,000, not later than 
                30 days after the date of the conference; and
                  (B) with respect to such expenditures, 
                provide to the Inspector General--
                          (i) the information described in 
                        subsections (a), (b), and (c) of 
                        section 739 of title VII of division E 
                        of the Consolidated and Further 
                        Continuing Appropriations Act, 2015 
                        (Public Law 113-235; 128 Stat. 2389); 
                        and
                          (ii) documentation of such 
                        expenditures.
    [(b)](c) Program Analysis and Evaluation Function.--In 
addition to the responsibilities set forth in chapter 14 of 
title 5, United States Code, and other applicable law, the 
Chief Human Capital Officer of the Department shall--Department 
shall--
          (1) Establishment of the Office of Program Analysis 
        and Evaluation.--Not later than 90 days after the date 
        of enactment of this subsection, the Secretary shall 
        establish an Office of Program Analysis and Evaluation 
        within the Department (in this section referred to as 
        the ``Office'').
          (2) * * *
          (3) * * *
          [(4) Reorganization.--
                  [(A) In general.--The Secretary may allocate 
                or reallocate the functions of the Office, or 
                discontinue the Office, in accordance with 
                section 872(a).
                  [(B) Exemption from Limitations.--Section 
                872(b) shall not apply to any action by the 
                Secretary under this paragraph.]\149\
---------------------------------------------------------------------------
    \149\The bill as reported by the Committee retained a provision in 
H.R. 2825 as passed by the House of Representatives that would have 
removed Section 872 of the Homeland Security Act of 2002. Retaining 
this provision of the House bill was a drafting error by the Committee 
that will be corrected before any action is taken by the full Senate on 
the bill on the floor. The Chairman favors DHS retaining its ability to 
reorganize under Section 872.
---------------------------------------------------------------------------
    [(c)](d) * * *

SECTION 703. CHIEF INFORMATION OFFICER.

    (a) In general.--The Chief Information Officer shall report 
to the Secretary[, or to another official of the Department, as 
the Secretary may direct]. In addition to the functions under 
section 3506(a)(2) of title 44, United States Code, and section 
11319 of title 40, United States Code, the Chief Information 
Officer shall--
          (1) serve as the lead technical authority for 
        information technology programs of the Department and 
        components of the Department; and
          (2) advise and assist the Secretary, heads of the 
        components of the Department, and other senior officers 
        in carrying out the responsibilities of the Department 
        for all activities relating to the budgets, programs, 
        security, and operations of the information technology 
        functions of the Department.
    (b) Strategic Plans.--
          (1) In general.--The Chief Information Officer shall, 
        in coordination with the Chief Financial Officer, 
        develop an information technology strategic plan every 
        5 years and report to the Committee on Homeland 
        Security and the Committee on Appropriations of the 
        House of Representatives and the Committee on Homeland 
        Security and Governmental Affairs and the Committee on 
        Appropriations of the Senate on the extent to which--
                  (A) the budget of the Department aligns with 
                priorities specified in the information 
                technology strategic plan;
                  (B) the information technology strategic plan 
                informs the budget process of the Department;
                  (C) the Department has identified and 
                addressed skills gaps needed to implement the 
                information technology strategic plan;
                  (D) unnecessary duplicative information 
                technology within and across the components of 
                the Department has been eliminated;
                  (E) outcome-oriented goals, quantifiable 
                performance measures, and strategies for 
                achieving those goals and measures have 
                succeeded; and
                  (F) internal control weaknesses and how the 
                Department will address those weaknesses.
          (2) Initial Plan.--Not later than 1 year after the 
        date of enactment of this subsection, the Chief 
        Information Officer shall complete the first 
        information technology strategic plan required under 
        paragraph (1).
    [(b)] (c) * * *
    (d) Acquisition Responsibilities.--The acquisition 
responsibilities of the Chief Information Officer shall 
include--
          (1) overseeing the management of the Homeland 
        Security Enterprise Architecture and ensuring that, 
        before each acquisition decision event, approved 
        information technology acquisitions comply with 
        departmental information technology management 
        processes, technical requirements, and the Homeland 
        Security Enterprise Architecture, and in any case in 
        which information technology acquisitions do not comply 
        with the management directives of the Department, 
        making recommendations to the Acquisition Review Board 
        regarding that noncompliance; and
          (2) being responsible for--
                  (A) providing recommendations to the 
                Acquisition Review Board regarding information 
                technology programs; and
                  (B) developing information technology 
                acquisition strategic guidance.

SEC. 704. CHIEF HUMAN CAPITAL OFFICER.

    (a) * * *
    (b) * * *
          (1) develop and implement strategic workforce 
        planning policies that are consistent with Government-
        wide leading principles [and in line], in line with 
        Department strategic human capital goals and 
        priorities, and informed by successful practices within 
        the Federal Government and the private sector taking 
        into account the special requirements of members of the 
        Armed Forces serving in the Coast Guard;
          (2) [develop performance measures to provide a basis 
        for monitoring and evaluating] develop performance 
        measures to monitor and evaluate on an ongoing basis, 
        Department-wide strategic workforce planning efforts;
          (3) assess the need of administrative and mission 
        support staff across the Department, to identify and 
        eliminate the unnecessary use of mission-critical staff 
        for administrative and mission support positions;
          [(3)](4) * * *
          [(4)](5) identify methods for managing and overseeing 
        human capital programs and initiatives, including 
        leader development and employee engagement programs in 
        coordination with the head of each component of the 
        Department;
          [(5)](6) develop a career path framework and create 
        opportunities for leader development in coordination 
        with all components of the Department that is informed 
        by appropriate workforce planning initiatives;
          [(6)](7) * * *
          [(7)](8) * * *
          [(8)](9) * * *
          (10) maintain a catalogue of available employee 
        development opportunities easily accessible to 
        employees of the Department, including departmental 
        leadership development programs, interagency 
        development programs, and rotational programs;
          (11) approve the selection and organizational 
        placement of each senior human capital official of each 
        component of the Department and participate in the 
        periodic performance reviews of each such senior human 
        capital official;
          (12) assess the success of the Department and the 
        components of the Department regarding efforts to 
        recruit and retain employees in rural and remote areas, 
        and make policy recommendations as appropriate to the 
        Secretary and to Congress;
          (13) develop performance measures to monitor and 
        evaluate on an ongoing basis any significant contracts 
        issued by the Department or a component of the 
        Department to a private entity regarding the 
        recruitment, hiring, or retention of employees;
          [(9)](14) * * *
          [(10)](15) * * *

SEC. 705. [ESTABLISHMENT OF OFFICER FOR] CIVIL RIGHTS AND CIVIL 
                    LIBERTIES.

          (a) In general.--The [Officer for Civil Rights and 
        Civil Liberties] Chief Civil Rights and Civil Liberties 
        Officer, who shall report directly to he Secretary, 
        shall--
          (1) * * *
          (2) make public through the Internet, radio, 
        television, or newspaper advertisements information on 
        the responsibilities and functions of, and how to 
        contact, the Chief Officer;

           *       *       *       *       *       *       *

    (b) Office for Civil Rights and Civil Liberties.--There is 
in the Department an Office for Civil Rights and Civil 
Liberties. Under the direction of the Chief Civil Rights and 
Civil Liberties Officer, the Office shall support the Chief 
Civil Rights and Civil Liberties Officer in the following:
          (1) Integrating civil rights and civil liberties into 
        activities of the Department by conducting programs and 
        providing policy advice and other technical assistance.
          (2) Investigating complaints and information 
        indicating possible abuses of civil rights or civil 
        liberties, unless the Inspector General of the 
        Department determines that any such complaint or 
        information should be investigated by the Inspector 
        General.
          (3) Directing the Department's equal employment 
        opportunity and diversity policies and programs, 
        including complaint management and adjudication.
          (4) Communicating with individuals and communities 
        whose civil rights and civil liberties may be affected 
        by Department activities.
          (5) Any other activities as assigned by the Chief 
        Civil Rights and Civil Liberties Officer.
    (c) Component Civil Rights and Civil Liberties Officers.--
          (1) In general.--In consultation with the Chief Civil 
        Rights and Civil Liberties Officer, the head of each 
        component of the Department shall appoint a senior-
        level Federal employee with experience and background 
        in civil rights and civil liberties as the Civil Rights 
        and Civil Liberties Officer for the component.
          (2) Responsibilities.--Each Civil Rights and Civil 
        Liberties Officer appointed under paragraph (1) shall--
                  (A) serve as the main point of contact for 
                the Chief Civil Rights and Civil Liberties 
                Officer; and
                  (B) coordinate with the Chief Civil Rights 
                and Civil Liberties Officer to oversee the 
                integration of civil rights and civil liberties 
                into the activities of the component.
    [(b)] (d) * * *

[SEC. 706. CONSOLIDATION AND CO-LOCATION OF OFFICES.]

[SEC. 707.] SEC. 706. QUADRENNIAL HOMELAND SECURITY REVIEW.

        (a) Requirement.--
        (1) * * *
        (2) * * *
          (3) Consultation.--The Secretary shall conduct each 
        quadrennial homeland security review under this 
        subsection in consultation with--
                  (A) * * *
                  (B) key officials of the Department, 
                including the Under Secretary for Strategy, 
                Policy, and Plans; [and]
                  (C) representatives from appropriate advisory 
                committees established pursuant to section 871, 
                including the Homeland Security Advisory 
                Council and the Homeland Security Science and 
                Technology Advisory Committee, or otherwise 
                established, including the Aviation Security 
                Advisory Committee established pursuant to 
                section 44946 of title 49, United States Code; 
                and
                [(C)] (D) * * *
    (b) Contents of Review.--In each quadrennial homeland 
security review, the Secretary shall--
          (1) delineate and update, as appropriate, the 
        national homeland security strategy, consistent with 
        appropriate national and Department strategies, 
        strategic plans, and Homeland Security Presidential 
        Directives, including the National Strategy for 
        Homeland Security, the [National Response Plan] 
        National Response Framework, and the Department 
        Security Strategic Plan;
          (2) outline and prioritize the full range of the 
        critical homeland security mission areas of the Nation 
        based on the risk assessment required pursuant to 
        subsection (c)(2)(B);
          (3) describe to the extent practicable the 
        interagency cooperation, preparedness of Federal 
        response assets, infrastructure, [budget plan]resources 
        required, and other elements of the homeland security 
        program and policies of the Nation associated with the 
        national homeland security strategy, required to 
        execute successfully the full range of missions called 
        for in the national homeland security strategy 
        described in paragraph (1) and the homeland security 
        mission areas outlined under paragraph (2);
          (4) identify, to the extent practicable, the [budget 
        plan required to provide sufficient resources to 
        successfully]resources required to execute the full 
        range of missions called for in the national homeland 
        security strategy described in paragraph (1) and the 
        homeland security mission areas outlined under 
        paragraph (2)[;], including any resources identified 
        from redundant, wasteful, or unnecessary capabilities 
        and capacities that can be redirected to better support 
        other existing capabilities and capacities, as the case 
        may be; and
          (5) include an assessment of the organizational 
        alignment of the Department with the national homeland 
        security strategy referred to in paragraph (1) and the 
        homeland security mission areas outlined under 
        paragraph (2)[; and].
          [(6) review and assess the effectiveness of the 
        mechanisms of the Department for executing the process 
        of turning the requirements developed in the 
        quadrennial homeland security review into an 
        acquisition strategy and expenditure plan within the 
        Department.]
    (c) Reporting.--
          (1) In general.--Not later than [December 
        31]September 30 of the year in which a quadrennial 
        homeland security review is conducted, the Secretary 
        shall submit to Congress a report regarding that 
        quadrennial homeland security review.
          (2) Contents of report.--Each report submitted under 
        paragraph (1) shall include--
                  (A) * * *
                  (B) a [description of the threats to]risk 
                assessment of the assumed or defined national 
                homeland security interests of the Nation that 
                were examined for the purposes of that review;
                  (C) the national homeland security strategy, 
                including a prioritized list of the critical 
                homeland security missions of the nation, as 
                required under subsection (b)(2);
                  (D) to the extent practicable a description 
                of the interagency cooperation, preparedness of 
                Federal response assets, infrastructure, 
                [budget plan]resources required, and other 
                elements of the homeland security program and 
                policies of the Nation associated with the 
                national homeland security strategy, required 
                to execute successfully the full range of 
                missions called for in the applicable national 
                homeland security strategy referred to in 
                subsection (b)(1) and the homeland security 
                mission areas outlined under subsection (b)(2);
                  (E) * * *
                  (F) to the extent practicable a discussion of 
                [the status of] cooperation among Federal 
                agencies in the effort to promote national 
                homeland security;
                  (G) to the extent practicable a discussion of 
                [the status of] cooperation between the Federal 
                Government and State, local, and tribal 
                governments in preventing terrorist attacks and 
                preparing for emergency response to threats and 
                risks to national homeland security; and
                  [(H) an explanation of any underlying 
                assumptions used in conducting the review; and]
                  [(I)] (H) any other matter the Secretary 
                considers appropriate.
          (3) Documentation.--The Secretary shall retain, from 
        each quadrennial homeland security review, all 
        information regarding the risk assessment, as required 
        under subsection (c)(2)(B), including--
                  (A) the risk model utilized to generate the 
                risk assessment;
                  (B) information, including data used in the 
                risk model, utilized to generate the risk 
                assessment; and
                  (C) sources of information, including other 
                risk assessments, utilized to generate the risk 
                assessment.
          [(3)] (4) Public availability.--The Secretary shall, 
        consistent with the protection of national security and 
        other sensitive matters, make each report submitted 
        under paragraph (1) publicly available on the Internet 
        website of the Department.
    (d) Review.--Not later than 90 days after the submission of 
each report required under subsection (c)(1), the Secretary 
shall provide to the Committee on Homeland Security of the 
House of Representatives and the Committee on Homeland Security 
and Governmental Affairs of the Senate information on the 
degree to which the findings and recommendations developed in 
the quadrennial homeland security review covered by the report 
were integrated into the acquisition strategy and expenditure 
plans for the Department.
    [(d)] (e) Authorization of Appropriations.--There are 
authorized to be appropriated such sums as may be necessary to 
carry out this section.

[SEC. 708] SEC. 707. * * *

[SEC. 709] SEC. 708. OFFICE OF STRATEGY, POLICY, AND PLANS.

    (a) * * *
    (b) * * *
    (c) Functions.--The Under Secretary for Strategy, Policy, 
and Plans shall--
          (1) * * *
          (2) * * *
          (3) develop and coordinate strategic plans and long-
        term goals of the Department with risk-based analysis 
        and planning to improve operational mission 
        effectiveness, including consultation with the 
        Secretary regarding the quadrennial homeland security 
        review under [section 707] section 706;
          (4) * * *
          (5) * * *
          (6) enter into agreements with governments of other 
        countries, in consultation with the Secretary of State 
        or the head of another agency, as appropriate, 
        international organizations, and international 
        nongovernmental organizations in order to achieve the 
        missions of the Department;
          [(6)] (7) review and incorporate, as appropriate, 
        external stakeholder feedback, including feedback from 
        organizations representing the needs of children into 
        Department policy; and
          [(7)] (8) * * *

SEC. 709. CHIEF PROCUREMENT OFFICER.

    (a) In General.--There is in the Department a Chief 
Procurement Officer, who shall serve as a senior business 
advisor to agency officials on procurement-related matters and 
report directly to the Under Secretary for Management. The 
Chief Procurement Officer is the senior procurement executive 
for purposes of subsection (c) of section 1702 of title 41, 
United States Code, and shall perform procurement functions as 
specified in such subsection.
    (b) Responsibilities.--The Chief Procurement Officer 
shall--
          (1) delegate or retain contracting authority, as 
        appropriate;
          (2) issue procurement policies and oversee the heads 
        of contracting activity of the Department to ensure 
        compliance with those policies;
          (3) serve as the main liaison of the Department to 
        industry on procurement-related issues;
          (4) account for the integrity, performance, and 
        oversight of Department procurement and contracting 
        functions;
          (5) ensure that procurement contracting strategies 
        and plans are consistent with the intent and direction 
        of the Acquisition Review Board;
          (6) oversee a centralized acquisition workforce 
        certification and training program using, as 
        appropriate, existing best practices and acquisition 
        training opportunities from the Federal Government, 
        private sector, or universities and colleges to include 
        training on how best to identify actions that warrant 
        referrals for suspension or debarment;
          (7) approve the selection and organizational 
        placement of each head of contracting activity within 
        the Department and participate in the periodic 
        performance reviews of each head of contracting 
        activity of the Department;
          (8) ensure that a fair proportion of the value of 
        Federal contracts and subcontracts are awarded to small 
        business concerns, as defined under section 3 of the 
        Small Business Act (15 U.S.C. 632), (in accordance with 
        the procurement contract goals under section 15(g) of 
        the Small Business Act (15 U.S.C. 644(g)), maximize 
        opportunities for small business participation in such 
        contracts, and ensure, to the extent practicable, small 
        business concerns that achieve qualified vendor status 
        for security-related technologies are provided an 
        opportunity to compete for contracts for such 
        technology; and
          (9) carry out any other procurement duties that the 
        Under Secretary for Management may designate.
    (c) Head of Contracting Activity Defined.--In this section 
the term ``head of contracting activity'' means an official who 
is delegated, by the Chief Procurement Officer and Senior 
Procurement Executive, the responsibility for the creation, 
management, and oversight of a team of procurement 
professionals properly trained, certified, and warranted to 
accomplish the acquisition of products and services on behalf 
of the designated components, offices, and organizations of the 
Department, and as authorized, other government entities.

SEC. 710. CHIEF SECURITY OFFICER.

    (a) In General.--There is in the Department a Chief 
Security Officer, who shall report directly to the Under 
Secretary for Management.
    (b) Responsibilities.--The Chief Security Officer shall--
          (1) develop, implement, and oversee compliance with 
        the security policies, programs, and standards of the 
        Department;
          (2) participate in--
                  (A) the selection and organizational 
                placement of each senior security official of a 
                component, and the deputy for each such 
                official, and any other senior executives 
                responsible for security-related matters; and
                  (B) the periodic performance planning and 
                reviews;
          (3) identify training requirements, standards, and 
        oversight of education to Department personnel on 
        security-related matters;
          (4) develop security programmatic guidelines;
          (5) review contracts and interagency agreements 
        associated with major security investments within the 
        Department; and
          (6) provide support to Department components on 
        security-related matters.

SEC. 711. ANNUAL SUBMITTAL TO CONGRESS OF INFORMATION ON REPROGRAMMING 
                    OR TRANSFERS OF FUNDS TO RESPOND TO OPERATIONAL 
                    SURGES.

    For each fiscal year until fiscal year 2023, the Secretary 
shall provide to the Committee on Homeland Security of the 
House of Representatives and the Committee on Homeland Security 
and Governmental Affairs of the Senate, together with the 
annual budget request for the Department, information on--
          (1) any circumstance during the fiscal year covered 
        by the report in which the Secretary exercised the 
        authority to reprogram or transfer funds to address 
        unforeseen costs, including costs associated with 
        operational surges; and
          (2) any circumstance in which any limitation on the 
        transfer or reprogramming of funds affected the ability 
        of the Secretary to address such unforeseen costs.

SEC. 712. CHIEF FACILITIES AND LOGISTICS OFFICER.

    (a) In General.--There is a Chief Facilities and Logistics 
Officer of the Department who shall report directly to the 
Under Secretary for Management. The Chief Facilities and 
Logistics Officer shall be career reserved for a member of the 
senior executive service.
    (b) Responsibilities.--The Chief Facilities and Logistics 
Officer shall--
          (1) develop policies and procedures and provide 
        program oversight to manage real property, facilities, 
        environmental and energy programs, personal property, 
        mobile assets, equipment, and other material resources 
        of the Department;
          (2) manage and execute, in consultation with the 
        component heads, mission support services within the 
        National Capital Region for real property, facilities, 
        environmental and energy programs, and other common 
        headquarters and field activities for the Department; 
        and
          (3) provide tactical and transactional services for 
        the Department in the National Capital Region, 
        including transportation, facility operations, and 
        maintenance.

SEC. 713. LONG TERM REAL PROPERTY STRATEGIES.

    (a) In General.--
          (1) First strategy.--Not later than 180 days after 
        the date of enactment of this section, the Under 
        Secretary for Management, in consultation with the 
        Administrator of General Services, shall develop an 
        initial 5-year regional real property strategy for the 
        Department that covers the 5-fiscal-year period 
        immediately following such date of enactment. Such 
        strategy shall be geographically organized, as 
        designated by the Under Secretary for Management.
          (2) Second strategy.--Not later than the first day of 
        the fourth fiscal year covered by the first strategy 
        under paragraph (1), the Under Secretary for 
        Management, in consultation with the Administrator of 
        General Services, shall develop a second 5-year real 
        property strategy for the Department that covers the 5 
        fiscal years immediately following the conclusion of 
        the first strategy.
    (b) Requirements.--
          (1) Initial strategy.--The initial 5-year strategy 
        developed in accordance with subsection (a)(1) shall--
                  (A) identify opportunities to consolidate 
                real property, optimize the usage of Federal 
                assets, and decrease the number of commercial 
                leases and square footage within the 
                Department's real property portfolio;
                  (B) provide alternate housing and 
                consolidation plans to increase efficiency 
                through joint use of Department spaces while 
                decreasing the cost of leased space;
                  (C) concentrate on geographical areas with a 
                significant Department presence, as identified 
                by the Under Secretary for Management;
                5  (D) examine the establishment of central 
                Department locations in each such geographical 
                region and the co-location of Department 
                components based on the mission sets and 
                responsibilities of such components;
                  (E) identify opportunities to reduce overhead 
                costs through co-location or consolidation of 
                real property interests or mission support 
                activities, such as shared mail screening and 
                processing, centralized transportation and 
                shuttle services, regional transit benefit 
                programs, common contracting for custodial and 
                other services, and leveraging strategic 
                sourcing contracts and sharing of specialized 
                facilities, such as training facilities and 
                resources;
                  (F) manage the current Department Workspace 
                Standard for Office Space in accordance with 
                the Department office workspace design process 
                to develop the most efficient and effective 
                spaces within the workspace standard usable 
                square foot ranges for all leased for office 
                space entered into on or after the date of the 
                enactment of this section, including the 
                renewal of any leases for office space existing 
                as of such date;
                  (G) define, based on square footage, what 
                constitutes a major real property acquisition;
                  (H) prioritize actions to be taken to improve 
                the operations and management of the 
                Department's real property inventory, based on 
                life-cycle cost estimations, in consultation 
                with component heads;
                  (I) include information on the headquarters 
                consolidation project of the Department, 
                including--
                          (i) an updated list of the components 
                        and offices to be included in the 
                        project;
                          (ii) a comprehensive assessment of 
                        the current and future real property 
                        required by the Department at the site; 
                        and
                          (iii) updated cost and schedule 
                        estimates; and
                  (J) include any additional information 
                determined appropriate or relevant by the Under 
                Secretary for Management.
          (2) Second strategy.--The second 5-year strategy 
        developed in accordance with subsection (a)(2) shall 
        include information required in subparagraphs (A), (B), 
        (C), (E), (F), (G), (H), (I), and (J) of paragraph (1) 
        and information on the effectiveness of implementation 
        efforts pursuant to the Department-wide policy required 
        in accordance with subsection (c), including--
                  (A) the impact of such implementation on 
                departmental operations and costs; and
                  (B) the degree to which the Department 
                established central Department locations and 
                co-located Department components pursuant to 
                the results of the examination required by 
                paragraph (1)(D).
    (c) Implementation Policies.--Not later than 90 days after 
the development of each of the regional real property 
strategies developed in accordance with subsection (a), the 
Under Secretary for Management shall develop or update, as 
applicable, a Department-wide policy implementing such 
strategies.
    (d) Certifications.--Subject to subsection (g)(3), the 
implementation policies developed pursuant to subsection (c) 
shall require component heads to certify to the Under Secretary 
for Management that such heads have complied with the 
requirements specified in subsection (b) before making any 
major real property decision or recommendation, as defined by 
the Under Secretary, including matters related to new leased 
space, renewing any existing leases, or agreeing to extend or 
newly occupy any Federal space or new construction, in 
accordance with the applicable regional real property strategy 
developed in accordance with subsection (a).
    (e) Underutilized Space.--
          (1) In general.--The implementation policies 
        developed pursuant to subsection (c) shall require 
        component heads, acting through regional property 
        managers under subsection (f), to annually report to 
        the Under Secretary for Management on underutilized 
        space and identify space that may be made available for 
        use, as applicable, by other components or Federal 
        agencies.
          (2) Exception.--The Under Secretary for Management 
        may grant an exception to the workspace standard usable 
        square foot ranges described in subsection (b)(1)(F) 
        for specific office locations at which a reduction or 
        elimination of otherwise underutilized space would 
        negatively impact a component's ability to execute its 
        mission based on readiness performance measures or 
        would increase the cost of such space.
          (3) Underutilized space defined.--In this subsection, 
        the term ``underutilized space'' means any space with 
        respect to which utilization is greater than the 
        workplace standard usable square foot ranges described 
        in subsection (b)(1)(F).
    (f) Component Responsibilities.--
          (1) Regional property managers.--Each component head 
        shall identify a senior career employee of each such 
        component for each geographic region included in the 
        regional real property strategies developed in 
        accordance with subsection (a) to serve as each such 
        component's regional property manager. Each such 
        regional property manager shall serve as a single point 
        of contact for Department headquarters and other 
        Department components for all real property matters 
        relating to each such component within the region in 
        which each such component is located, and provide data 
        and any other support necessary for the Department of 
        Homeland Security Regional Mission Support Coordinator 
        strategic asset and portfolio planning and execution.
          (2) Data.--Regional property managers under paragraph 
        (1) shall provide annually to the Under Secretary for 
        Management, via a standardized and centralized system, 
        data on each component's real property holdings, as 
        specified by the Undersecretary for Management, 
        including relating to underutilized space under 
        subsection (e) (as such term is defined in such 
        subsection), total square footage leased, annual cost, 
        and total number of staff, for each geographic region 
        included in the regional real property strategies 
        developed in accordance with subsection (a).
    (g) Ongoing Oversight.--
          (1) In general.--The Under Secretary for Management 
        shall monitor components' adherence to the regional 
        real property strategies developed in accordance with 
        subsection (a) and the implementation policies 
        developed pursuant to subsection (c).
          (2) Annual review.--The Under Secretary for 
        Management shall annually review the data submitted 
        pursuant to subsection (f)(2) to ensure all 
        underutilized space (as such term is defined in 
        subsection (e)) is properly identified.
          (3) Certification review.--The Under Secretary for 
        Management shall review, and if appropriate, approve, 
        component certifications under subsection (d) before 
        such components may make any major real property 
        decision, including matters related to new leased 
        space, renewing any existing leases, or agreeing to 
        extend or newly occupy any Federal space or new 
        construction, in accordance with the applicable 
        regional real property strategy developed in accordance 
        with subsection (a).
          (4) Congressional reporting.--The Under Secretary for 
        Management shall annually provide information to the 
        Committee on Homeland Security and the Committee on 
        Transportation and Infrastructure of the House of 
        Representatives, the Committee on Homeland Security and 
        Governmental Affairs of the Senate, and the Inspector 
        General of the Department on the real property 
        portfolio of the Department, including information 
        relating to the following:
                  (A) A summary of the Department's real 
                property holdings in each region described in 
                the regional strategies developed in accordance 
                with subsection (a), and for each such 
                property, information including the total 
                square footage leased, the total cost, the 
                total number of staff at each such property, 
                and the square foot per person utilization rate 
                for office space (and whether or not such 
                conforms with the workspace standard usable 
                square foot ranges established described in 
                subsection (b)(1)(F)).
                  (B) An accounting of all underutilized space 
                (as such term is defined in subsection (e)).
                (C) An accounting of all instances in which the 
                Department or its components consolidated their 
                real property holdings or co-located with 
                another entity within the Department.
                  (D) A list of all certifications provided 
                pursuant to subsection (d) and all such 
                certifications approved pursuant to paragraph 
                (3) of this subsection.
          (5) Inspector general review.--Not later than 120 
        days after the last day of the fifth fiscal year 
        covered in each of the initial and second regional real 
        property strategies developed in accordance with 
        subsection (a), the Inspector General of the Department 
        shall review the information submitted pursuant to 
        paragraph (4) and issue findings regarding the 
        effectiveness of the implementation of the Department-
        wide policy and oversight efforts of the management of 
        real property facilities, personal property, mobile 
        assets, equipment and the Department's other material 
        resources as required under this section.

SEC. 714. WORKFORCE HEALTH AND MEDICAL SUPPORT.

    (a) In General.--The Under Secretary for Management shall 
be responsible for workforce-focused health and medical 
activities of the Department. The Under Secretary for 
Management may further delegate these responsibilities as 
appropriate.
    (b) Responsibilities.--The Under Secretary for Management, 
in coordination with the Chief Medical Officer, shall--
          (1) provide oversight and coordinate the medical and 
        health activities of the Department for the human and 
        animal personnel of the Department;
          (2) establish medical, health, veterinary, and 
        occupational health exposure policy, guidance, 
        strategies, and initiatives for the human and animal 
        personnel of the Department;
          (3) as deemed appropriate by the Under Secretary, 
        provide medical liaisons to the components of the 
        Department, on a reimbursable basis, to provide subject 
        matter expertise on occupational medical and public 
        health issues;
          (4) serve as the primary representative for the 
        Department on agreements regarding the detail of 
        Department of Health and Human Services Public Health 
        Service Commissioned Corps Officers to the Department, 
        except that components and offices of the Department 
        shall retain authority for funding, determination of 
        specific duties, and supervision of Commissioned Corps 
        officers detailed to a Department component; and
          (5) perform such other duties relating to such 
        responsibilities as the Secretary may require.

SEC. 715. EMPLOYEE ENGAGEMENT AND RETENTION ACTION PLAN.

    (a) In General.--The Secretary shall--
          (1) not later than 180 days after the date of 
        enactment of this section, and not later than September 
        30 of each fiscal year thereafter, issue a Department-
        wide employee engagement and retention action plan to 
        inform and execute strategies for improving employee 
        engagement, employee retention, Department management 
        and leadership, diversity and inclusion efforts, 
        employee morale, training and development 
        opportunities, and communications within the 
        Department, which shall reflect--
                  (A) input from representatives from 
                operational components, headquarters, and field 
                personnel, including supervisory and non-
                supervisory personnel, and employee labor 
                organizations that represent employees of the 
                Department;
                  (B) employee feedback provided through annual 
                employee surveys, questionnaires, and other 
                communications; and
                  (C) performance measures, milestones, and 
                objectives that reflect the priorities and 
                strategies of the action plan to improve 
                employee engagement and retention; and
          (2) require the head of each operational component of 
        the Department to--
                  (A) develop and implement a component-
                specific employee engagement and retention plan 
                to advance the action plan required under 
                paragraph (1) that includes performance 
                measures and objectives, is informed by 
                employee feedback provided through annual 
                employee surveys, questionnaires, and other 
                communications, as appropriate, and sets forth 
                how employees and, if applicable, their labor 
                representatives are to be integrated in 
                developing programs and initiatives;
                  (B) monitor progress on implementation of 
                such action plan; and
                  (C) provide to the Chief Human Capital 
                Officer quarterly reports on actions planned 
                and progress made under this paragraph.
    (b) Rule of Construction.--Nothing in this section shall be 
construed to limit the ability of the departmental or component 
leadership from developing innovative approaches and strategies 
to employee engagement or retention not specifically required 
under this section.
    (c) Repeal.--This section shall be repealed on the date 
that is 5 years after the date of enactment of this section.

SEC. 716. ACQUSITION AUTHORITIES FOR PROGRAM ACCOUNTABILITY AND RISK 
                    MANAGEMENT.

    (a) Establishment of Office.--There is in the Management 
Directorate of the Department an office to be known as 
``Program Accountability and Risk Management'', which shall--
          (1) provide accountability, standardization, and 
        transparency of major acquisition programs of the 
        Department; and
          (2) serve as the central oversight function for all 
        Department acquisition programs.
    (b) Responsibilities of Executive Director.--The Program 
Accountability and Risk Management shall be led by an Executive 
Director to oversee the requirement under subsection (a), who 
shall report directly to the Under Secretary for Management, 
serve as the executive secretary for the Acquisition Review 
Board, and carry out the following responsibilities:
          (1) Monitor the performance of Department acquisition 
        programs between acquisition decision events to 
        identify problems with cost, performance, or schedule 
        that components may need to address to prevent cost 
        overruns, performance issues, or schedule delays.
          (2) Assist the Under Secretary for Management in 
        managing the acquisition programs and related 
        activities of the Department.
          (3) Conduct oversight of individual acquisition 
        programs to implement Department acquisition program 
        policy, procedures, and guidance with a priority on 
        ensuring the data the office collects and maintains 
        from Department components is accurate and reliable.
          (4) Coordinate the acquisition life cycle review 
        process for the Acquisition Review Board.
          (5) Advise the persons having acquisition decision 
        authority in making acquisition decisions consistent 
        with all applicable laws and in establishing lines of 
        authority, accountability, and responsibility for 
        acquisition decision making within the Department.
          (6) Support the Chief Procurement Officer in 
        developing strategies and specific plans for hiring, 
        training, and professional development in order to 
        improve the acquisition workforce of the Department.
          (7) In consultation with Component Acquisition 
        Executives--
                  (A) develop standards for the designation of 
                key acquisition positions with major 
                acquisition program management offices and on 
                the Component Acquisition Executive support 
                staff; and
                  (B) provide requirements and support to the 
                Chief Procurement Officer in the planning, 
                development, and maintenance of the Acquisition 
                Career Management Program of the Department.
          (8) In the event that a certification or action of an 
        acquisition program manager needs review for purposes 
        of promotion or removal, provide input, in consultation 
        with the relevant Component Acquisition Executive, into 
        the performance evaluation of the relevant acquisition 
        program manager and report positive or negative 
        experiences to the relevant certifying authority.
          (9) Provide technical support and assistance to 
        Department acquisition programs and acquisition 
        personnel and coordinate with the Chief Procurement 
        Officer on workforce training and development 
        activities.
    (c) Responsibilities of Components.--Each head of a 
component shall--
          (1) comply with Federal law, the Federal Acquisition 
        Regulation, and Department acquisition management 
        directives established by the Under Secretary for 
        Management; and
          (2) for each major acquisition program--
                  (A) define baseline requirements and document 
                changes to such requirements, as appropriate;
                  (B) develop a life cycle cost estimate that 
                is consistent with best practices identified by 
                the Comptroller General of the United States 
                and establish a complete life cycle cost 
                estimate with supporting documentation, 
                including an acquisition program baseline;
                  (C) verify each life cycle cost estimate 
                against independent cost estimates, and 
                reconcile any differences;
                  (D) complete a cost-benefit analysis with 
                supporting documentation;
                  (E) develop and maintain a schedule that is 
                consistent with scheduling best practices as 
                identified by the Comptroller General of the 
                United States, including, in appropriate cases, 
                an integrated master schedule; and
                  (F) ensure that all acquisition program 
                information provided by the component is 
                complete, accurate, timely, and valid.

SEC. 717. ACQUISITION DOCUMENTATION.

    (a) In General.--For each major acquisition program, the 
Secretary, acting through the Under Secretary for Management, 
shall require the head of a relevant component or office to--
          (1) maintain acquisition documentation that is 
        complete, accurate, timely, and valid, and that 
        includes, at a minimum--
                  (A) operational requirements that are 
                validated consistent with departmental policy 
                and changes to those requirements, as 
                appropriate;
                  (B) a complete life cycle cost estimate with 
                supporting documentation;
                  (C) verification of the life cycle cost 
                estimate against independent cost estimates, 
                and reconciliation of any differences;
                  (D) a cost-benefit analysis with supporting 
                documentation; and
                  (E) a schedule, including, as appropriate, an 
                integrated master schedule;
          (2) prepare cost estimates and schedules for major 
        acquisition programs under subparagraphs (B) and (E) of 
        paragraph (1) in a manner consistent with best 
        practices as identified by the Comptroller General of 
        the United States; and
          (3) submit certain acquisition documentation to the 
        Secretary to produce a semi-annual Acquisition Program 
        Health Assessment of departmental acquisitions for 
        submission to Congress.
    (b) Waiver.--The Secretary may waive the requirement under 
subsection (a)(3) on a case-by-case basis with respect to any 
major acquisition program under this section for a fiscal year 
if--
          (1) the major acquisition program has not--
                  (A) entered the full rate production phase in 
                the acquisition life cycle;
                  (B) had a reasonable cost estimate 
                established; and
                  (C) had a system configuration defined fully; 
                or
          (2) the major acquisition program does not meet the 
        definition of capital asset, as defined by the Director 
        of the Office of Management and Budget.
    (c) Congressional Oversight.--At the same time the budget 
of the President is submitted for a fiscal year under section 
1105(a) of title 31, United States Code, the Secretary shall 
make information available, as applicable, to the congressional 
homeland security committees regarding the requirement 
described in subsection (a) in the prior fiscal year that 
includes, with respect to each major acquisition program for 
which the Secretary has issued a waiver under subsection (b)--
          (1) the grounds for granting a waiver for the 
        program;
          (2) the projected cost of the program;
          (3) the proportion of the annual acquisition budget 
        of each component or office attributed to the program, 
        as available; and
          (4) information on the significance of the program 
        with respect to the operations and the execution of the 
        mission of each component or office described in 
        paragraph (3).

SEC. 718. ACQUISITION INNOVATION.

    The Under Secretary for Management shall--
          (1) encourage each of the officers under the 
        direction of the Under Secretary for Management to 
        promote innovation and shall designate an individual to 
        promote innovation;
          (2) establish an acquisition innovation lab or 
        similar mechanism to improve the acquisition programs, 
        acquisition workforce training, and existing practices 
        of the Department through methods identified in this 
        section;
          (3) test emerging and established acquisition best 
        practices for carrying out acquisitions, consistent 
        with applicable laws, regulations, and Department 
        directives, as appropriate;
          (4) develop and distribute best practices and lessons 
        learned regarding acquisition innovation throughout the 
        Department;
          (5) establish metrics to measure the effectiveness of 
        acquisition innovation efforts with respect to cost, 
        operational efficiency of the acquisition program, 
        including timeframes for executing contracts, and 
        collaboration with the private sector, including small- 
        and medium-sized businesses; and
          (6) determine impacts of acquisition innovation 
        efforts on the private sector by--
                  (A) engaging with the private sector, 
                including small- and medium-sized businesses, 
                to provide information and obtain feedback on 
                procurement practices and acquisition 
                innovation efforts of the Department;
                  (B) obtaining feedback from the private 
                sector on the impact of acquisition innovation 
                efforts of the Department; and
                  (C) incorporating the feedback described in 
                subparagraphs (A) and (B), as appropriate, into 
                future acquisition innovation efforts of the 
                Department.

           *       *       *       *       *       *       *


TITLE VIII--COORDINATION WITH NON-FEDERAL ENTITIES; INSPECTOR GENERAL; 
UNITED STATES SECRET SERVICE; COAST GUARD; GENERAL PROVISIONS

           *       *       *       *       *       *       *


Subtitle B--Inspector General

           *       *       *       *       *       *       *


[SEC. 812.] SEC. 811. LAW ENFORCEMENT POWERS OF INSPECTOR GENERAL 
                    AGENTS.

    [(a)] * * *
    [(b) Promulgation of Initial Guidelines.--
          [(1) Definition.--In this subsection,]
    (a) Definition.--In this section the term ``memoranda of 
understanding'' means the agreements between the Department of 
Justice and the Inspector General offices described under 
section 6(e)(3) of the Inspector General Act of 1978 (5 U.S.C. 
App.) [(as added by subsection (a) of this section)] that--
          [(A)](1) are in effect on the date of enactment of 
        this act; and
          [(B)](2) authorize such offices to exercise authority 
        that is the same or similar to the authority under 
        section 6(e)(1) of such Act.
    [(2)](b) [In General] In General.--Not later than 180 days 
after the date of enactment of this Act, the Attorney General 
shall promulgate guidelines under section 6(e)(4) of the 
Inspector General Act of 1978 (5 U.S.C. App.) [(as added by 
subsection (a) of this section)] applicable to the Inspector 
General offices described under section 6(e)(3) of that Act.
    [(3)](c) [Minimum requirements] Minimum Requirements.--The 
guidelines promulgated under this subsection shall include, at 
a minimum, the operational and training requirements in the 
memoranda of understanding.
    [(4)](d) [No lapse of authority] No Lapse Of Authority.--
The memoranda of understanding in effect on the date of 
enactment of this Act shall remain in effect until the 
guidelines promulgated under this subsection take effect.
    [(c) [5 U.S.C. app. 6 note] Effective Dates.--
          [(1) In general.--Subsection (a) shall take effect 
        180 days after the date of enactment of this Act.
          [(2) Initial guidelines.--Subsection (b) shall take 
        effect on the date of enactment of this Act.]

           *       *       *       *       *       *       *


Subtitle D--Acquisitions

           *       *       *       *       *       *       *


SEC. 831. RESEARCH AND DEVELOPMENT PROJECTS.

    (a) Authority.--Until September 30, [2017] 2022, and 
subject to subsection (d), the Secretary may carry out a pilot 
program under which the Secretary may exercise the following 
authorities:
          (1) * * *
          (2) Prototype projects.--The Secretary may, under the 
        authority of paragraph (1), carry out prototype 
        projects in accordance with the requirements and 
        conditions provided for carrying out prototype projects 
        [under section 845 of the National Defense 
        Authorization Act for Fiscal Year 1994 (Public Law 103-
        160). In applying the authorities of that section 845, 
        subsection (c) of that section shall apply with respect 
        to prototype projects under this paragraph, and the 
        Secretary shall perform the functions of the Secretary 
        of Defense under subsection (d) thereof] under section 
        2371b of title 10, United States Code, and the 
        Secretary shall perform the functions of the Secretary 
        of Defense as prescribed.
    (b) * * *
    (c) Additional Requirements.
          (1) In general.--The authority of the Secretary under 
        this section shall terminate September 30, [2017] 2022, 
        unless before that date the Secretary--
                  (A) * * *
                  (B) * * *
          [(2) Report.--The Secretary shall provide an annual 
        report to the Committees on Appropriations of the 
        Senate and the House of Representatives, the Committee 
        on Homeland Security and Governmental Affairs of the 
        Senate, and the Committee on Homeland Security of the 
        House of Representatives detailing the projects for 
        which the authority granted by subsection (a) was used, 
        the rationale for its use, the funds spent using that 
        authority, the outcome of each project for which that 
        authority was used, and the results of any audits of 
        such projects.]
          (2) Report.--The Secretary shall annually submit to 
        the Committee on Homeland Security and the Committee on 
        Science, Space, and Technology of the House of 
        Representatives and the Committee on Homeland Security 
        and Governmental Affairs of the Senate a report 
        detailing the projects for which the authority granted 
        by subsection (a) was utilized, the rationale for such 
        utilizations, the funds spent utilizing such authority, 
        the extent of cost-sharing for such projects among 
        Federal and non-Federal sources, the extent to which 
        utilization of such authority has addressed a homeland 
        security capability gap or threat to the homeland 
        identified by the Department, the total amount of 
        payments, if any, that were received by the Federal 
        Government as a result of the utilization of such 
        authority during the period covered by each such 
        report, the outcome of each project for which such 
        authority was utilized, and the results of any audits 
        of such projects.
    (d) Definition of Nontraditional Government Contractor.--In 
this section, the term ``nontraditional Government contractor'' 
has the same meaning as the term ``nontraditional defense 
contractor'' [as defined in section 845(e) of the National 
Defense Authorization Act for Fiscal Year 1994 (Public Law 103-
160; 10 U.S.C. 2371 note)] as defined in section 2371b(e) of 
title 10, United States Code.
    (e) Training.--The Secretary shall develop a training 
program for acquisitions staff on the utilization of the 
authority provided under subsection (a) to ensure 
accountability and effective management of projects consistent 
with the Program Management Improvement Accountability Act 
(Public Law 114-264; 130 Stat. 1371) and the amendments made by 
such Act.

           *       *       *       *       *       *       *


SEC. 836. ACQUISITION REVIEW BOARD.

    (a) In General.--The Secretary shall establish an 
Acquisition Review Board (in this section referred to as the 
``Board'') to--
          (1) strengthen accountability and uniformity within 
        the Department acquisition review process;
          (2) review major acquisition programs; and
          (3) review the use of best practices.
    (b) Composition.--
          (1) Chairperson.--The Under Secretary for Management 
        shall serve as chairperson of the board.
          (2) Other members.--The Secretary shall ensure 
        participation by other relevant Department officials.
    (c) Meetings.--
          (1) Regular meetings.--The Board shall meet regularly 
        for purposes of ensuring all acquisition programs 
        proceed in a timely fashion to achieve mission 
        readiness.
          (2) Other meetings.--The Board shall convene--
                  (A) at the discretion of the Secretary; and
                  (B) at any time--
                          (i) a major acquisition program--
                                  (I) requires authorization to 
                                proceed from one acquisition 
                                decision event to another 
                                throughout the acquisition life 
                                cycle;
                                  (II) is in breach of the 
                                approved acquisition program 
                                baseline of the major 
                                acquisition program; or
                                  (III) requires additional 
                                review, as determined by the 
                                Under Secretary for Management; 
                                or
                          (ii) a non-major acquisition program 
                        requires review, as determined by the 
                        Under Secretary for management.
    (d) Responsibilities.--The responsibilities of the Board 
are as follows:
          (1) Determine whether a proposed acquisition program 
        has met the requirements of phases of the acquisition 
        life cycle framework and is able to proceed to the next 
        phase and eventual full production and deployment.
          (2) Oversee whether the business strategy, resources, 
        management, and accountability of a proposed 
        acquisition are executable and are aligned to strategic 
        initiatives.
          (3) Support the person with acquisition decision 
        authority for an acquisition program in determining the 
        appropriate direction for the acquisition at key 
        acquisition decision events.
          (4) Conduct reviews of acquisitions to ensure that 
        the acquisitions are progressing in compliance with the 
        approved documents for their current acquisition 
        phases.
          (5) Review the acquisition program documents of each 
        major acquisition program, including the acquisition 
        program baseline and documentation reflecting 
        consideration of tradeoffs among cost, schedule, and 
        performance objectives, to ensure the reliability of 
        underlying data.
          (6) Ensure that practices are adopted and implemented 
        to require consideration of tradeoffs among cost, 
        schedule, and performance objectives as part of the 
        process for developing requirements for major 
        acquisition programs prior to the initiation of the 
        second acquisition decision event, including, at a 
        minimum, the following practices:
                  (A) Department officials responsible for 
                acquisition, budget, and cost estimating 
                functions are provided with the appropriate 
                opportunity to develop estimates and raise cost 
                and schedule matters before performance 
                objectives are established for capabilities 
                when feasible.
                  (B) Full consideration is given to possible 
                trade-offs among cost, schedule, and 
                performance objectives for each alternative.
    (e) Acquisition Program Baseline Report Requirement.--If 
the person exercising acquisition decision authority over a 
major acquisition program approves the major acquisition 
program to proceed before the major acquisition program has a 
Department-approved acquisition program baseline, as required 
by Department policy--
          (1) the Under Secretary for Management shall create 
        and approve an acquisition program baseline report 
        regarding such approval; and
          (2) the Secretary shall--
                  (A) not later than 7 days after the date on 
                which the acquisition decision memorandum is 
                signed, provide written notice of the decision 
                to the appropriate committees of Congress; and
                  (B) not later than 60 days after the date on 
                which the acquisition decision memorandum is 
                signed, provide the memorandum and a briefing 
                to the appropriate committees of Congress.
    (f) Report.--Not later than 1 year after the date of 
enactment of this section and every year thereafter through 
fiscal year 2022, the Under Secretary for Management shall 
provide information to the appropriate committees of Congress 
on the activities of the Board for the prior fiscal year that 
includes information relating to--
          (1) for each meeting of the Board, any acquisition 
        decision memoranda;
          (2) the results of the systematic reviews conducted 
        under subsection (d)(4);
          (3) the results of acquisition document reviews 
        required under subsection (d)(5); and
          (4) activities to ensure that practices are adopted 
        and implemented throughout the Department under 
        subsection (d)(6).

SEC. 837. CONGRESSIONAL NOTIFICATION AND OTHER REQUIREMENTS FOR MAJOR 
                    ACQUISITION PROGRAM BREACH.

    (a) Definition of Appropriate Committees of Congress.--In 
this section, the term ``appropriate committees of Congress'' 
means.--
          (1) the Committee on Homeland Security and the 
        Committee on Appropriations of the House of 
        Representatives and the Committee on Homeland Security 
        and Governmental Affairs and the Committee on 
        Appropriations of the Senate; and
          (2) in the case of notice or a report relating to the 
        Coast Guard or the Transportation Security 
        Administration, the committees described in paragraph 
        (1) and the Committee on Transportation and 
        Infrastructure of the House of Representatives and the 
        Committee on Commerce, Science, and Transportation of 
        the Senate.
    (b) Requirements Within Department in Event of Breach.--
          (1) Notifications.--
                  (A) Notification of breach.--If a breach 
                occurs in a major acquisition program, the 
                program manager for the program shall notify 
                the Component Acquisition Executive for the 
                program, the head of the component concerned, 
                the Executive Director of the Program 
                Accountability and Risk Management division, 
                the Under Secretary for Management, and the 
                Deputy Secretary not later than 30 calendar 
                days after the date on which the breach is 
                identified.
                  (B) Notification to secretary.--If a breach 
                occurs in a major acquisition program and the 
                breach results in a cost overrun greater than 
                15 percent, a schedule delay greater than 180 
                days, or a failure to meet any of the 
                performance thresholds from the cost, schedule, 
                or performance parameters specified in the most 
                recently approved acquisition program baseline 
                for the program, the Component Acquisition 
                Executive for the program shall notify the 
                Secretary and the Inspector General of the 
                Department not later than 5 business days after 
                the date on which the Component Acquisition 
                Executive for the program, the head of the 
                component concerned, the Executive Director of 
                the Program Accountability and Risk Management 
                Division, the Under Secretary for Management, 
                and the Deputy Secretary are notified of the 
                breach under subparagraph (A).
          (2) Remediation plan and root cause analysis.--
                  (A) In general.--If a breach occurs in a 
                major acquisition program, the program manager 
                for the program shall submit in writing to the 
                head of the component concerned, the Executive 
                Director of the Program Accountability and Risk 
                Management division, and the Under Secretary 
                for Management, at a date established by the 
                Under Secretary for Management, a remediation 
                plan and root cause analysis relating to the 
                breach and program.
                  (B) Remediation plan.--The remediation plan 
                required under subparagraph (A) shall--
                          (i) explain the circumstances of the 
                        breach at issue;
                          (ii) provide prior cost estimating 
                        information;
                          (iii) include a root cause analysis 
                        that determines the underlying cause or 
                        causes of shortcomings in cost, 
                        schedule, or performance of the major 
                        acquisition program with respect to 
                        which the breach has occurred, 
                        including the role, if any, of--
                                  (I) unrealistic performance 
                                expectations;
                                  (II) unrealistic baseline 
                                estimates for cost or schedule 
                                or changes in program 
                                requirements;
                                  (III) immature technologies 
                                or excessive manufacturing or 
                                integration risk;
                                  (IV) unanticipated design, 
                                engineering, manufacturing, or 
                                technology integration issues 
                                arising during program 
                                performance;
                                  (V) changes to the scope of 
                                the program;
                                  (VI) inadequate program 
                                funding or changes in planned 
                                out-year funding from one 5-
                                year funding plan to the next 
                                5-year funding plan as outlined 
                                in the Future Years Homeland 
                                Security Program required under 
                                section 874;
                                  (VII) legislative, legal, or 
                                regulatory changes; or
                                  (VIII) inadequate program 
                                management personnel, including 
                                lack of sufficient number of 
                                staff, training, credentials, 
                                certifications, or use of best 
                                practices;
                          (iv) propose corrective action to 
                        address cost growth, schedule delays, 
                        or performance issues;
                          (v) explain the rationale for why a 
                        proposed corrective action is 
                        recommended; and
                          (vi) in coordination with the 
                        Component Acquisition Executive for the 
                        program, discuss all options 
                        considered, including--
                                  (I) the estimated impact on 
                                cost, schedule, or performance 
                                of the program if no changes 
                                are made to current 
                                requirements;
                                  (II) the estimated cost of 
                                the program if requirements are 
                                modified; and
                                  (III) the extent to which 
                                funding from other programs 
                                will need to be reduced to 
                                cover the cost growth of the 
                                program.
          (3) Review of corrective actions.--
                  (A) In general.--The Under Secretary for 
                Management--
                          (i) shall review each remediation 
                        plan required under paragraph (2); and
                          (ii) not later than 30 days after 
                        submission of a remediation plan under 
                        paragraph (2), may approve the plan or 
                        provide an alternative proposed 
                        corrective action.
                  (B) Submission to congress.--Not later than 
                30 days after the date on which the Under 
                Secretary for Management completes a review of 
                a remediation plan under subparagraph (A), the 
                Under Secretary for Management shall submit to 
                the appropriate committees of Congress a copy 
                of the remediation plan.
    (c) Requirements Relating to Congressional Notification if 
Breach Occurs.--
          (1) Notification to congress.--If a notification to 
        the Secretary is made under subsection (b)(1)(B) 
        relating to a breach in a major acquisition program, 
        the Under Secretary for Management shall notify the 
        appropriate committees of Congress of the breach in the 
        next semi-annual Acquisition Program Health Assessment 
        described in section 717(a)(3) after receipt by the 
        Under Secretary for Management of the notification 
        under subsection (b)(1)(B).
          (2) Significant variances in costs or schedule.--If a 
        likely cost overrun is greater than 20 percent or a 
        likely delay is greater than 12 months from the costs 
        and schedule specified in the acquisition program 
        baseline for a major acquisition program, the Under 
        Secretary for Management shall include in the 
        notification required under paragraph (1) a written 
        certification, with supporting explanation, that--
                  (A) the program is essential to the 
                accomplishment of the mission of the 
                Department;
                  (B) there are no alternatives to the 
                capability or asset provided by the program 
                that will provide equal or greater capability 
                in a more cost-effective and timely manner;
                  (C) the management structure for the program 
                is adequate to manage and control cost, 
                schedule, and performance; and
                  (D) includes the date on which the new 
                acquisition schedule and estimates for total 
                acquisition cost will be completed.

SEC. 838. MULTIYEAR ACQUISITION STRATEGY.

    (a) In General.--Not later than 1 year after the date of 
enactment of this section, the Under Secretary for Management 
shall brief the appropriate congressional committees on a 
multiyear acquisition strategy to--
          (1) guide the overall direction of the acquisitions 
        of the Department while allowing flexibility to deal 
        with ever-changing threats and risks;
          (2) keep pace with changes in technology that could 
        impact deliverables; and
          (3) help industry better understand, plan, and align 
        resources to meet the future acquisition needs of the 
        Department.
    (b) Updates.--The strategy required under subsection (a) 
shall be updated and included in each Future Years Homeland 
Security Program required under section 874.
    (c) Consultation.--In developing the strategy required 
under subsection (a), the Secretary shall, as the Secretary 
determines appropriate, consult with headquarters, components, 
employees in the field, and individuals from industry and the 
academic community.

SEC. 839. ACQUISITION POLICIES AND GUIDANCE.

    (a) Program Accountability Report.--The Under Secretary for 
Management shall prepare and submit to the congressional 
homeland security committees a semi-annual program 
accountability report to meet the mandate of the Department to 
perform program health assessments and improve program 
execution and governance.
    (b) Level 3 Acquisition Programs of Components of the 
Department.--
          (1) Identification.--Not later than 60 days after the 
        date of enactment of this section, component heads of 
        the Department shall identify to the Under Secretary 
        for Management all level 3 acquisition programs of each 
        respective component.
          (2) Certification.--Not later than 30 days after 
        receipt of the information under paragraph (1), the 
        Under Secretary for Management shall certify in writing 
        to the congressional homeland security committees 
        whether the heads of the components of the Department 
        have properly identified the programs described in that 
        paragraph.
          (3) Methodology.--To carry out this subsection, the 
        Under Secretary shall establish a process with a 
        repeatable methodology to continually identify level 3 
        acquisition programs.
    (c) Policies and Guidance.--
          (1) Submission.--Not later than 180 days after the 
        date of enactment of this section, the Component 
        Acquisition Executives shall submit to the Under 
        Secretary for Management the policies and relevant 
        guidance for the level 3 acquisition programs of each 
        component.
          (2) Certification.--Not later than 90 days after 
        receipt of the policies and guidance under subparagraph 
        (A), the Under Secretary shall certify in writing to 
        the congressional homeland security committees that the 
        policies and guidance of each component adhere to 
        Department-wide acquisition policies.

           *       *       *       *       *       *       *


Subtitle E--Human Resource Management

           *       *       *       *       *       *       *


SEC. 843. USE OF COUNTERNARCOTICS ENFORCEMENT ACTIVISTS IN CERTAIN 
                    EMPLOYEE PERFORMANCE APPRAISALS.

    (a) * * *
    (b) Definitions.--For the purposes of this section--
          (1) the term ``National Drug Control Program Agency'' 
        means--
                  (A) * * *
                  (B) any subdivision of the Department that 
                has a significant counternarcotics 
                responsibility, as determined [by--
                          [(i) the counternarcotics officer, 
                        appointed under section 878; or
                          [(ii) if applicable, the 
                        counternarcotics officer's successor in 
                        function (as determined by the 
                        Secretary); and] by the Secretary; and 
          (2) * * *

SEC. 844. HOMELAND SECURITY ROTATION PROGRAM.

    [(a) Establishment.--]
    [(1)](a) In General.--[Not later than 180 days after the 
date of the enactment of this section, the]The Secretary shall 
establish the Homeland Security Rotation Program (in this 
section referred to as the Rotation Program) [for employees of 
the Department] for certain personnel within the Department. 
The Rotation Program shall use applicable best practices, 
including those from the Chief Human Capital Officers Council.
    [(2)](b) Goals.--The Rotation Program established by the 
Secretary shall--
          (1) seek to foster greater departmental integration 
        and unity of effort;
          (2) seek to help enhance the knowledge, skills, and 
        abilities of participating personnel with respect to 
        the programs, policies, and activities of the 
        Department;
          [(A)](3) be established in accordance with the Human 
        Capital Strategic Plan of the Department;
          [(B)](4) provide [middle and senior level] employees 
        in the Department the opportunity to broaden their 
        knowledge through exposure to other components of the 
        Department
          [(C)](5) * * *
          [(D)](6) * * *
          [(E)](7) seek to improve morale and retention 
        throughout the Department and invigorate the workforce 
        with exciting and professionally rewarding 
        opportunities;
          [(F)](8) * * *
          [(G)](9) * * *
    [(3)](c) Administration.--
          [(A)](1) * * *
          [(B)](2) Responsibilities.--The Chief Human Capital 
        Officer shall--
                  [(i)](A) * * *
                  [(ii)](B) establish a framework that supports 
                the goals of the Rotation Program and promotes 
                cross-disciplinary rotational opportunities;
                  [(iii) establish eligibility for employees to 
                participate in the Rotation Program and select 
                participants from employees who apply;]
                  [(iv)](C)
                  [(v)](D)
                  [(vi)](E)
                  [(vii)](F)
                  [(viii)](G)
      (d) Administrative Matters.--In carrying out the Rotation 
Program the Secretary shall--
          (1) before selecting employees for participation in 
        the Rotation Program, disseminate information broadly 
        within the Department about the availability of the 
        Rotation Program, qualifications for participation in 
        the Rotation Program, including full-time employment 
        within the employing component or office not less than 
        1 year, and the general provisions of the Rotation 
        Program;
          (2) require as a condition of participation in the 
        Rotation Program that an employee--
                  (A) is nominated by the head of the component 
                or office employing the employee; and
                  (B) is selected by the Secretary, or the 
                Secretary's designee, solely on the basis of 
                relative ability, knowledge, and skills, after 
                fair and open competition that assures that all 
                candidates receive equal opportunity;
          (3) ensure that each employee participating in the 
        Rotation Program shall be entitled to return, within a 
        reasonable period of time after the end of the period 
        of participation, to the position held by the employee, 
        or a corresponding or higher position, in the component 
        or office that employed the employee prior to the 
        participation of the employee in the Rotation Program;
          (4) require that the rights that would be available 
        to the employee if the employee were detailed from the 
        employing component or office to another Federal agency 
        or office remain available to the employee during the 
        employee participation in the Rotation Program; and
          (5) require that, during the period of participation 
        by an employee in the Rotation Program, performance 
        evaluations for the employee--
                  (A) shall be conducted by officials in the 
                office or component employing the employee with 
                input from the supervisors of the employee at 
                the component or office in which the employee 
                is placed during that period; and
                  (B) shall be provided the same weight with 
                respect to promotions and other rewards as 
                performance evaluations for service in the 
                office or component employing the employee.
    [(4)](e) Allowances, Privileges, and Benefits.--All 
allowances, privileges, rights, seniority, and other benefits 
of employees participating in the Rotation Program shall be 
preserved.
    [(5)](f) Reporting.--Not later than 180 days after the date 
of the establishment of the Rotation Program, the Secretary 
shall submit a report on the status of the Rotation Program, 
including a description of the Rotation Program, the number of 
employees participating, and how the Rotation Program is used 
in succession planning and leadership development to the 
appropriate committees of Congress.
    (g) Intelligence Rotational Assignment Program.--
          (1) Establishment.--The Secretary shall establish an 
        Intelligence Rotational Assignment Program as part of 
        the Rotation Program under subsection (a).
          (2) Administration.--The Chief Human Capital Officer, 
        in conjunction with the Chief Intelligence Officer, 
        shall administer the Intelligence Rotational Assignment 
        Program established pursuant to paragraph (1).
          (3) Eligibility.--The Intelligence Rotational 
        Assignment Program established pursuant to paragraph 
        (1) shall be open to employees serving in existing 
        analyst positions within the Department's intelligence 
        enterprise and other Department employees as determined 
        appropriate by the Chief Human Capital Officer and the 
        Chief Intelligence Officer.
          (4) Coordination.--The responsibilities specified in 
        subsection (c)(2) that apply to the Rotation Program 
        under such subsection shall, as applicable, also apply 
        to the Intelligence Rotational Assignment Program under 
        this subsection.
    (h) Evaluation.--The Chief Human Capital Officer, acting 
through the Under Secretary for Management, shall--
          (1) perform regular evaluations of the Homeland 
        Security Rotation Program; and
          (2) not later than 90 days after the end of each 
        fiscal year, submit to the Secretary a report detailing 
        the findings of the evaluations under paragraph (1) 
        during that fiscal year, which shall include--
                  (A) an analysis of the extent to which the 
                program meets the goals under subsection (b);
                  (B) feedback from participants in the 
                program, including the extent to which 
                rotations have enhanced their performance in 
                their current role and opportunities to improve 
                the program;
                  (C) aggregated information about program 
                participants; and
                  (D) a discussion of how rotations can be 
                aligned with the needs of the Department with 
                respect to employee training and mission needs.

           *       *       *       *       *       *       *


Subtitle F--Federal Emergency Procurement Flexibility

           *       *       *       *       *       *       *


  [SEC. 857. REVIEW AND REPORT BY COMPTROLLER GENERAL.]

[SEC. 858.] SEC. 857. IDENTIFICATION OF NEW ENTRANTS INTO THE FEDERAL 
                    MARKETPLACE.

           *       *       *       *       *       *       *


                  Subtitle H--Miscellaneous Provisions

SEC. 871. ADVISORY COMMITTEES.

           *       *       *       *       *       *       *


[SEC. 872. REORGANIZATION.]\150\
---------------------------------------------------------------------------

    \150\The bill as reported by the Committee retained a provision in 
H.R. 2825 as passed by the House of Representatives that would have 
removed Section 872 of the Homeland Security Act of 2002. Retaining 
this provision of the House bill was a drafting error by the Committee 
that will be corrected before any action is taken by the full Senate on 
the bill on the floor. The Chairman favors DHS retaining its ability to 
reorganize under Section 872.

           *       *       *       *       *       *       *

---------------------------------------------------------------------------

SEC. 874. FUTURE [YEAR] YEARS HOMELAND SECURITY PROGRAM.

    [(a) In General.--Each budget request submitted to Congress 
for the Department under section 1105 of title 32, United 
States Code, shall, at or about the same time, be accompanied 
by a Future Years Homeland Security Program.]
    (a) In General.--Not later than 60 days after the date on 
which the budget of the President is submitted to Congress 
under section 1105(a) of title 31, United States Code, the 
Secretary shall submit to the Committee on Homeland Security 
and Governmental Affairs of the Senate and the Committee on 
Homeland Security of the House of Representatives (referred to 
in this section as the `appropriate committees') a Future Years 
Homeland Security Program that covers the fiscal year for which 
the budget is submitted and the 4 succeeding fiscal years.
    (b) * * *
    [(c) Effective Date.--This section shall take effect with 
respect to the preparation and submission of the fiscal year 
2005 budget request for the Department and for any subsequent 
fiscal year, except that the first Future Years Homeland 
Security Program shall be submitted not later than 90 days 
after the Department's fiscal year 2005 budget request is 
submitted to Congress.]
    (c) Projection of Acquisition Estimates.--On and after 
February 1, 2019 each Future Years Homeland Security Program 
shall project--
          (1) acquisition estimates for the fiscal year for 
        which the budget is submitted and the 4 succeeding 
        fiscal years, with specified estimates for each fiscal 
        year, for all major acquisitions by the Department and 
        each component of the Department; and
          (2) estimated annual deployment schedules for all 
        physical asset major acquisitions over the 5-fiscal-
        year period described in paragraph (1), estimated costs 
        and number of service contracts, and the full operating 
        capability for all information technology major 
        acquisitions.
    (d) Sensitive and Classified Information.--The Secretary 
may include with each Future Years Homeland Security Program a 
classified or other appropriately controlled document 
containing information required to be submitted under this 
section that is restricted from public disclosure in accordance 
with Federal law or Executive order.
    (e) Availability of Information to the Public.--The 
Secretary shall make available to the public in electronic form 
the information required to be submitted to the appropriate 
committees under this section, other than information described 
in subsection (d).

           *       *       *       *       *       *       *


[SEC. 878. COUNTERNARCOTICS OFFICER.]

[SEC. 879. OFFICE OF INTERNATIONAL AFFAIRS.]

           *       *       *       *       *       *       *


[SEC. 881. REVIEW OF PAY AND BENEFIT PLANS]

           *       *       *       *       *       *       *


SEC. 884. FEDERAL LAW ENFORCEMENT TRAINING CENTERS

    (a) * * *

           *       *       *       *       *       *       *

    (d) Training Responsibilities.--
          (1) * * *
          (2) * * *
          (3) * * *
          (4) Strategic Partnerships.--
                  (A) In general.--The Director may--
                          (i) * * *
                          (ii) coordinate with the [Under 
                        Secretary responsible for overseeing 
                        critical infrastructure protection, 
                        cybersecurity, and other related 
                        programs of the Department] Director of 
                        Cybersecurity and Infrastructure 
                        Security and with private sector 
                        stakeholders, including critical 
                        infrastructure owners and operators, to 
                        provide training pertinent to improving 
                        coordination, security, and resiliency 
                        of critical infrastructure

           *       *       *       *       *       *       *


SEC. 890B. DEPARTMENT LEADERSHIP COUNCILS.

    (a) Department Leadership Councils.--
          (1) Establishment.--The Secretary may establish 
        Department leadership councils as the Secretary 
        determines necessary to ensure coordination and improve 
        programs and activities of the Department.
          (2) Function.--A Department leadership council 
        shall--
                  (A) serve as a coordinating forum;
                  (B) advise the Secretary and Deputy Secretary 
                on Department strategy, operations, and 
                guidance;
                  (C) establish policies to reduce duplication 
                in acquisition programs; and
                  (D) consider and report on such other matters 
                as the Secretary or Deputy Secretary may 
                direct.
          (3) Relationship to other forums.--The Secretary or 
        Deputy Secretary may delegate the authority to direct 
        the implementation of any decision or guidance 
        resulting from the action of a Department leadership 
        council to any office, component, coordinator, or other 
        senior official of the Department
    (b) Joint Requirements Council.--
          (1) Definition of joint requirement.--In this 
        subsection, the term ``joint requirement'' means a 
        condition or capability of multiple operating 
        components of the Department that is required to be met 
        or possessed by a system, product, service, result, or 
        component to satisfy a contract, standard, 
        specification, or other formally imposed document.
          (2) Establishment.--The Secretary shall establish 
        within the Department a Joint Requirements Council.
          (3) Mission.--In addition to other matters assigned 
        to the Joint Requirements Council by the Secretary and 
        Deputy Secretary, the Joint Requirements Council 
        shall--
                  (A) identify, assess, and validate joint 
                requirements, including existing systems and 
                associated capability gaps, to meet mission 
                needs of the Department;
                  (B) ensure that appropriate efficiencies are 
                made among life cycle cost, schedule, and 
                performance objectives, and procurement 
                quantity objectives, in the establishment and 
                approval of joint requirements; and
                  (C) make prioritized capability 
                recommendations for the joint requirements 
                validated under subparagraph (A) to the 
                Secretary, the Deputy Secretary, or the 
                chairperson of a Department leadership council 
                designated by the Secretary to review decisions 
                of the Joint Requirements Council.
          (4) Chairperson.--The Secretary shall appoint a 
        chairperson of the Joint Requirements Council, for a 
        term of not more than 2 years, from among senior 
        officials of the Department as designated by the 
        Secretary.
          (5) Composition.--The Joint Requirements Council 
        shall be composed of senior officials representing 
        components of the Department and other senior officials 
        as designated by the Secretary.
          (6) Relationship to future years homeland security 
        program.--The Secretary shall ensure that the Future 
        Years Homeland Security Program required under section 
        874 is consistent with the recommendations of the Joint 
        Requirements Council required under paragraph (3)(C), 
        as affirmed by the Secretary, the Deputy Secretary, or 
        the chairperson of a Department leadership council 
        designated by the Secretary under that paragraph.

           *       *       *       *       *       *       *


Subtitle J--Secure Handling of Ammonium Nitrate

           *       *       *       *       *       *       *


SEC. 899A. DEPARTMENT LEADERSHIP COUNCILS.

    (a) In General.--The Secretary shall regulate the sale and 
transfer of ammonium nitrate by an ammonium nitrate facility in 
accordance with this subtitle to prevent the misappropriation 
or use of ammonium nitrate in an act of terrorism. Such 
regulations shall be carried out by the Cybersecurity and 
Infrastructure Security Agency.
    (b) Ammonium Nitrate Mixtures.--Not later than 90 days 
after the date of the enactment of this subtitle, the 
Secretary, in consultation with the heads of appropriate 
Federal departments and agencies (including the Secretary of 
Agriculture), shall, after notice and an opportunity for 
comment, establish a threshold percentage for ammonium nitrate 
in a substance.

SEC. 899B. REGULATION OF THE SALE AND TRANSFER OF AMMONIUM NITRATE.

    (a) In General.--The Secretary shall regulate the sale and 
transfer of ammonium nitrate by an ammonium nitrate facility in 
accordance with this subtitle to prevent the misappropriation 
or use of ammonium nitrate in an act of terrorism. Such 
regulations shall be carried out by the Cybersecurity and 
Infrastructure Security Agency.

           *       *       *       *       *       *       *


TITLE IX--NATIONAL HOMELAND SECURITY COUNCIL

           *       *       *       *       *       *       *


SEC. 903. MEMBERSHIP.

    (a) [Members--]Members.--The members of the Council shall 
be the following:
          (1) The President.
          (2) The Vice President.
          (3) The Secretary of Homeland Security.
          (4) The Attorney General.
          (5) The Secretary of Defense.
          (6) Such other individuals as may be designated by 
        the President.
    (b) * * *

           *       *       *       *       *       *       *


TITLE XVI--TRANSPORTATION SECURITY

           *       *       *       *       *       *       *


    Subtitle B--Transportation Security Administration Acquisition 
                              Improvements

SEC. 1611. 5-YEAR TECHNOLOGY INVESTMENT PLAN.

    (a) * * *

           *       *       *       *       *       *       *

    (d) Contents of Plan.--The Plan shall include--
          (1) an analysis of transportation security risks and 
        the associated capability gaps that would be best 
        addressed by security-related technology, including 
        consideration of the most recent quadrennial homeland 
        security review under [section 707] section 706;

           *       *       *       *       *       *       *


TITLE XVIII--EMERGENCY COMMUNICATIONS

           *       *       *       *       *       *       *


SEC. 1801. [OFFICE OF EMERGENCY COMMUNICATIONS] EMERGENCY 
                    COMMUNICATIONS DIVISION.

    (a) In General.--There is established in the Department an 
[Office of Emergency Communications] Emergency Communications 
Division. The Division shall be located in the Cybersecurity 
and Infrastructure Security Agency.
    [(b) Director.--The head of the office shall be the 
Director for Emergency Communications. The Director shall 
report to the Assistant Secretary for Cybersecurity and 
Communications.]
    (b) Assistant Director.--The head of the Division shall be 
the Assistant [Director for Emergency Communications]. The 
Assistant Director shall report to the Director of 
Cybersecurity and Infrastructure Security. All decisions of the 
Assistant Director that entail the exercise of significant 
authority shall be subject to the approval of the Director of 
Cybersecurity and Infrastructure Security.
    (c) Responsibilities.--The Assistant Director for Emergency 
Communications shall--
          (1) * * *
          (2) * * *
          [(3) administer the Department's responsibilities and 
        authorities relating to the Integrated Wireless Network 
        program;]
          [(4)](3) * * *
          [(5)](4) * * *
          [(6)](5) * * *
          [(7)](6) * * *
          [(8)](7) * * *
          [(9)](8) * * *
          [(10)](9) * * *
          [(11)](10) * * *
          [(12)](11) review, in consultation with the 
        [Assistant Secretary for Grants and Training] 
        Administrator of the Federal Emergency Management 
        Agency, all interoperable emergency communications 
        plans of Federal, State, local, and tribal governments, 
        including Statewide and tactical interoperability 
        plans, developed pursuant to homeland security 
        assistance administered by the Department, but 
        excluding spectrum allocation and management related to 
        such plans;
          [(13)](12) * * *
          [(14)](13) perform such other duties of the 
        Department necessary to support and promote the ability 
        of emergency response providers and relevant government 
        officials to continue to communicate in the event of 
        natural disasters, acts of terrorism, and other man-
        made disasters; [and]
          (14) administer the Government Emergency 
        Telecommunications Service (GETS) and Wireless Priority 
        Service (WPS) programs, or successor programs;
          (15) assess the impact of emerging technologies on 
        interoperable emergency communications; [and]
          (16) fully participate in the mechanisms required 
        under section 2202(c)(8); and
          [(15)][(16)] (17) perform other duties of the 
        Department necessary to achieve the goal of and 
        maintain and enhance interoperable emergency 
        communications capabilities.
    (d) Performance of Previously Transferred Functions.--The 
Secretary shall transfer to, and administer through, the 
Assistant Director for Emergency Communications the following 
programs and responsibilities:
          (1) * * *
          [(2) The responsibilities of the Chief Information 
        Officer related to the implementation of the Integrated 
        Wireless Network.]
          [(3)](2) The Interoperable Communications Technical 
        Assistance Program.
    (e) Coordination.--The Assistant Director for Emergency 
Communications shall coordinate--
          (1) * * *
          (2) * * *
    [(f) Sufficiency of Resources Plan.--
          [(1) Report.--Not later than 120 days after the date 
        of enactment of this section, the Secretary shall 
        submit to Congress a report on the resources and staff 
        necessary to carry out fully the responsibilities under 
        this title.
          [(2) Comptroller general review.--The Comptroller 
        General shall under paragraph (1). Not later than 60 
        days after the date on which such report is submitted, 
        the Comptroller General shall submit to Congress a 
        report containing the findings of such review.]
    (f) Annual Reporting of Division Activities.--The Assistant 
[Director for Emergency Communications] shall, not later than 1 
year after the date of the enactment of this subsection and 
annually thereafter for each of the next 4 years, report to the 
Committee on Homeland Security and the Committee on Energy and 
Commerce of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs of the Senate on the 
activities and programs of the Emergency Communications 
Division, including specific information on efforts to carry 
out paragraphs (3), (4), and (5) of subsection (c).

SEC. 1802. NATIONAL EMERGENCY COMMUNICATIONS PLAN.

    (a) In General.--The Secretary, acting through the 
[Director for Emergency Communications] Assistant Director for 
Emergency Communications[, and in cooperation with the 
Department of National Communications System (as appropriate),] 
shall, in cooperation with State, local, and tribal 
governments, Federal departments and agencies, emergency 
response providers, and the private sector, develop not later 
than 180 days after the completion of the baseline assessment 
under section 1803, and periodically, but not less than once 
every 5 years, update, a National Emergency Communications Plan 
to provide recommendations regarding how the United States 
should--
          (1) * * *
          (2) * * *
    (b) * * *
    (c) Contents.--The National Emergency Communications Plan 
shall--
          (1) * * *
          (2) * * *
          (3) consider the impact of emerging technologies on 
        the attainment of interoperable emergency 
        communications;
          [(3)](4) * * *
          [(4)](5) * * *
          [(5)](6) * * *
          [(6)](7) * * *
          [(7)](8) * * *
          [(8)](9) * * *
          [(9)](10) * * *
          [(10)](11) * * *

SEC. 1803. ASSESSMENTS AND REPORTS.

    (a) Baseline Assessment.--Not later than 1 year after the 
date of enactment of this section and not less than every 5 
years thereafter, the Secretary, acting through the [Director 
for Emergency Communications] Assistant Director for Emergency 
Communications, shall conduct an assessment of Federal, State, 
local, and tribal governments that--

           *       *       *       *       *       *       *

    (d) Progress Reports.--Not later than one year after the 
date of enactment of this section and biennially thereafter, 
the Secretary, acting through the [Director for Emergency 
Communications] Assistant Director for Emergency 
Communications, shall submit to Congress a report on the 
progress of the Department in achieving the goals of, and 
carrying out its responsibilities its responsibilities under, 
this title, including--

           *       *       *       *       *       *       *


SEC. 1804. COORDINATION OF DEPARTMENT EMERGENCY COMMUNICATIONS GRANT 
                    PROGRAMS.

    (a) Coordination of Grants and Standards Programs.--The 
Secretary, acting through the [Director for Emergency 
Communications] Assistant Director for Emergency 
Communications, shall ensure that grant guidelines for the use 
of homeland security assistance administered by the Department 
relating to interoperable emergency communications are 
coordinated and consistent with the goals and recommendations 
in the National Emergency Communications Plan under section 
1802.
    (b) Denial of Eligibility for Grants.--
          (1) In general.--The Secretary, acting through the 
        [Assistant Secretary for Grants and 
        Planning]Administrator of the Federal Emergency 
        Management Agency, and in consultation with the 
        [[Director for Emergency Communications]] Assistant 
        [Director for Emergency Communications], may prohibit 
        any State, local, or tribal government from using 
        homeland security assistance administered by the 
        Department to achieve, maintain, or enhance emergency 
        communications capabilities, if--

           *       *       *       *       *       *       *


SEC. 1809. INTEROPERABLE EMERGENCY COMMUNICATIONS GRANT PROGRAM.

    (a) * * *
    (b) Policy.--The [Director for Emergency Communications] 
Assistant Director for Emergency Communications shall ensure 
that a grant awarded to a State under this section is 
consistent with the policies established pursuant to the 
responsibilities and authorities of the [Office of Emergency 
Communications] Emergency Communications Division under this 
title, including ensuring that activities funded by the grant--
          (1) * * *
          (2) * * *
    (c) Administration.--
          (1) * * *
          (2) Guidance.--In administering the grant program, 
        the Administrator shall ensure that the use of grants 
        is consistent with guidance established by the 
        [Director of Emergency Communications] Assistant 
        Director for Emergency Communications pursuant to 
        section 7303(a)(1)(H) of the Intelligence Reform and 
        Terrorism Prevention Act of 2004 (6 U.S.C. 
        194(a)(1)(H)).
    (d) * * *
    (e) Approval of Plans.--
          (1) Approval as condition of grant.--Before a State 
        may receive a grant under this section, the [Director 
        of Emergency Communications] Assistant Director for 
        Emergency Communications shall approve the State's 
        Statewide Interoperable Communications Plan required 
        under section 7303(f) of the Intelligence Reform and 
        Terrorism Prevention Act of 2004 (6 U.S.C. 194(f)).
          (2) Plan requirements.--In approving a plan under 
        this subsection, [the Director of Emergency 
        Communications] the Assistant Director of Emergency 
        Communications shall ensure that the plan--(A) is 
        designed to improve interoperability at the city, 
        county, regional, State and interstate level; (B) 
        considers any applicable local or regional plan; and 
        (C) complies, to the maximum extent practicable, with 
        the National Emergency Communications Plan under 
        section 1802.
          (3) Approval of revisions.--The [Director] Assistant 
        Director of Emergency Communications may approve 
        revisions to a State's plan if [the Director] the 
        Assistant Director determines that doing so is likely 
        to further interoperability.

           *       *       *       *       *       *       *

    (m) Reports.--
          (1) Annual reports by state grant recipients.--A 
        State that receives a grant under this section shall 
        annually submit to the [Director] Assistant Director of 
        Emergency Communications a report on the progress of 
        the State in implementing that State's Statewide 
        Interoperable Communications Plans required under 
        section 7303(f) of the Intelligence Reform and 
        Terrorism Prevention Act of 2004 (6 U.S.C. 194(f)) and 
        achieving interoperability at the city, county, 
        regional, State, and interstate levels. [The Director] 
        The Assistant Director shall make the reports publicly 
        available, including by making them available on the 
        Internet website of the [Office of Emergency 
        Communications] Cybersecurity and Infrastructure 
        Security Agency, subject to any redactions that [the 
        Director determines] the Assistant Director determines 
        are necessary to protect classified or other sensitive 
        information.
          (2) Annual reports to congress.--At least once each 
        year, the [Director of Emergency Communications] 
        Assistant Director for Emergency Communications shall 
        submit to Congress a report on the use of grants 
        awarded under this section and any progress in 
        implementing Statewide Interoperable Communications 
        Plans and improving interoperability at the city, 
        county, regional, State, and interstate level, as a 
        result of the award of such grants.

           *       *       *       *       *       *       *


SEC. 1810. BORDER INTEROPERABILITY DEMONSTRATION PROJECT.

    (a) In General.--
          (1) Establishment.--The Secretary acting through the 
        [Director of the Office of Emergency Communications 
        (referred to in this section as the ``Director'')] 
        Assistant Director for Emergency Communications 
        (referred to in this section as the ``Assistant 
        Director''), and in coordination with the Federal 
        Communications Commission and the Secretary of 
        Commerce, shall establish an International Border 
        Community Interoperable Communications Demonstration 
        Project (referred to in this section as the 
        ``demonstration project'').
          (2) Minimum number of communities.--The [Director] 
        Assistant Director shall select no fewer than 6 
        communities to participate in a demonstration project.
          (3) * * *
    (b) Conditions.--[The Director] The Assistant Director, in 
coordination with the Federal Communications Commission and the 
Secretary of Commerce, shall ensure that the project is carried 
out as soon as adequate spectrum is available as a result of 
the 800 megahertz rebanding process in border areas, and shall 
ensure that the border projects do not impair or impede the 
rebanding process, but under no circumstances shall funds be 
distributed under this section unless the Federal 
Communications Commission and the Secretary of Commerce agree 
that these conditions have been met.
    (c) Program Requirements.--Consistent with the 
responsibilities of the [Office of Emergency Communications] 
Emergency Communications Division under section 1801, the 
[Director] Assistant Director shall foster local, tribal, 
State, and Federal interoperable emergency communications, as 
well as interoperable emergency communications with appropriate 
Canadian and Mexican authorities in the communities selected 
for the demonstration project. The [Director] Assistant 
Director shall--
          (1) * * *

           *       *       *       *       *       *       *

          (6) take other actions or provide equipment as the 
        [Director] Assistant Director deems appropriate to 
        foster interoperable emergency communications.
    (d) Distribution of Funds.--
          (1) * * *
          (2) * * *
          (3) Report.--Not later than 90 days after a State 
        receives funds under this subsection the State shall 
        report to the [Director] Director on the status of the 
        distribution of such funds to local and tribal 
        governments.
    (e) Maximum Period of Grants.--The [Director] Assistant 
Director may not fund any participant under the demonstration 
project for more than 3 years.
    (f) Transfer of Information and Knowledge.--The [Director] 
Assistant Director shall establish mechanisms to ensure that 
the information and knowledge gained by participants in the 
demonstration project are transferred among the participants 
and to other interested parties, including other communities 
that submitted applications to the participant in the project.

           *       *       *       *       *       *       *


 TITLE XIX--[DOMESTIC NUCLEAR DETECTION OFFICE] COUNTERING WEAPONS OF 
                        MASS DESTRUCTION OFFICE

SEC. 1900. DEFINITIONS.

    In this title:
          (1) Assistant secretary.--The term ``Assistant 
        Secretary'' means the Assistant Secretary for the 
        Countering Weapons of Mass Destruction Office.
          (2) Office.--The term ``Office'' means the Countering 
        Weapons of Mass Destruction Office established under 
        section 1901(a).
          (3) Weapon of mass destruction.--The term ``weapon of 
        mass destruction'' has the meaning given the term in 
        section 101 of the Foreign Intelligence Surveillance 
        Act of 1978 (50 U.S.C. 1801).

[SEC. 1901. DOMESTIC NUCLEAR DETECTION OFFICE.]

       Subtitle A--Countering Weapons of Mass Destruction Office

SEC. 1901. COUNTERING WEAPONS OF MASS DESTRUCTION OFFICE.

    (a) Establishment.--There is established in the Department 
a Countering Weapons of Mass Destruction Office.
    (b) Assistant Secretary.--The Office shall be headed by an 
Assistant Secretary for the Countering Weapons of Mass 
Destruction Office, who shall be appointed by the President.
    (c) Responsibilities.--The Assistant Secretary shall serve 
as the Secretary's principal advisor on--
          (1) weapons of mass destruction matters and 
        strategies; and
          (2) coordinating the efforts to counter weapons of 
        mass destruction.

[SEC. 1905. RELATIONSHIP TO OTHER DEPARTMENT ENTITIES AND FEDERAL 
                    AGENCIES.]

                   Subtitle B--Mission of the Office

SEC. 1921. MISSION OF THE OFFICE.

    The Office shall be responsible for coordinating with other 
Federal efforts and developing departmental strategy and policy 
to plan, detect, or protect against the importation, 
possession, storage, transportation, development, or use of 
unauthorized chemical, biological, radiological, or nuclear 
materials, devices, or agents, in the United States and to 
protect against an attack using such materials, devices, or 
agents against the people, territory, or interests of the 
United States.

SEC. 1922. RELATIONSHIP TO OTHER DEPARTMENT ENTITIES AND FEDERAL 
                    AGENCIES.

    (a) In General.--The authority of the Assistant Secretary 
under this title shall neither affect nor diminish the 
authority or the responsibility of any officer of the 
Department or of any officer of any other department or agency 
of the United States with respect to the command, control, or 
direction of the functions, personnel, funds, assets, and 
liabilities of any entity within the Department or any Federal 
department or agency.
    (b) Federal Emergency Management Agency.--Nothing in this 
title or any other provision of law may be construed to affect 
or reduce the responsibilities of the Federal Emergency 
Management Agency or the Administrator of the Agency, including 
the diversion of any asset, function, or mission of the Agency 
or the Administrator of the Agency.

[SEC. 1902. MISSION OF OFFICE] SEC. 1923. RESPONSIBILITIES.

    (a) * * *
          (1) * * *

           *       *       *       *       *       *       *

          (10) * * *
          (11) establish, within the [Domestic Nuclear 
        Detection Office] Countering Weapons of Mass 
        Destruction Office, the National Technical Nuclear 
        Forensics Center to provide centralized stewardship, 
        planning, assessment, gap analysis, exercises, 
        improvement, and integration for all Federal nuclear 
        forensics and attribution activities--

           *       *       *       *       *       *       *


[SEC. 1903.] SEC. 1924. HIRING AUTHORITY.

[SEC. 1904.] SEC. 1925. TESTING AUTHORITY.

    (a) In General.--The Director shall coordinate with the 
responsible Federal agency or other entity to facilitate the 
use by the Office, by its contractors, or by other persons or 
entities, of existing Government laboratories, centers, ranges, 
or other testing facilities for the testing of materials, 
equipment, models, computer software, and other items as may be 
related to the missions identified in [section 1902] section 
1923. Any such use of Government facilities shall be carried 
out in accordance with all applicable laws, regulations, and 
contractual provisions, including those governing security, 
safety, and environmental protection, including, when 
applicable, the provisions of section 309. The Office may 
direct that private sector entities utilizing Government 
facilities in accordance with this section pay an appropriate 
fee to the agency that owns or operates those facilities to 
defray additional costs to the Government resulting from such 
use.

           *       *       *       *       *       *       *


[SEC. 1906.] SEC. 1926. CONTRACTING AND GRANT MAKING AUTHORITIES.

    The Secretary, acting through the [Director for Domestic 
Nuclear Detection] Assistant Secretary for the Countering 
Weapons of Mass Destruction Office, in carrying out the 
responsibilities under paragraphs (6) and (7) of section 
[1902(a)] 1923(a) of this title, shall--
          (1) operate extramural and intramural programs and 
        distribute funds through grants, cooperative 
        agreements, and other transactions and contracts;
          (2) ensure that activities under paragraphs (6) and 
        (7) of section [1902(a)] 1923(a) of this title include 
        investigations of radiation detection equipment in 
        configurations suitable for deployment at seaports, 
        which may include underwater or water surface detection 
        equipment and detection equipment that can be mounted 
        on cranes and straddle cars used to move shipping 
        containers; and
          (3) have the authority to establish or contract with 
        1 or more federally funded research and development 
        centers to provide independent analysis of homeland 
        security issues and carry out other responsibilities 
        under this subchapter.

[SEC. 1907.] SEC. 1927. JOINT ANNUAL INTERAGENCY REVIEW OF GLOBAL 
                    NUCLEAR DETECTION ARCHITECTURE.

    (a) Annual Review.--
          (1) * * *
                  (A) * * *
                  (B) * * *
                  (C) the [Director of the Domestic Nuclear 
                Detection Office] Assistant Secretary for the 
                Countering Weapons of Mass Destruction Office 
                and each of the relevant departments that are 
                partners in the National Technical Forensics 
                Center--

           *       *       *       *       *       *       *

    (c) Definition.--In this section, the term global nuclear 
detection architecture means the global nuclear detection 
architecture developed under [section 1902] section 1923 of 
this title.

           *       *       *       *       *       *       *


                   Subtitle C--Chief Medical Officer

SEC. 1931. CHIEF MEDICAL OFFICER.

    (a) In General.--There is in the Department a Chief Medical 
Officer, who shall be appointed by the Secretary. The Chief 
Medical Officer shall report to the Assistant Secretary.
    (b) Qualifications.--The individual appointed as Chief 
Medical Officer shall be a licensed physician possessing a 
demonstrated ability in and knowledge of medicine and public 
health.
    (c) Responsibilities.--The Chief Medical Officer shall have 
the responsibility within the Department for medical issues 
related to natural disasters, acts of terrorism, and other man-
made disasters including--
          (1) serving as the principal advisor to the 
        Secretary, the Assistant Secretary, and other 
        Department officials on medical and public health 
        issues;
          (2) providing operational medical support to all 
        components of the Department;
          (3) as appropriate provide medical liaisons to the 
        components of the Department, on a reimbursable basis, 
        to provide subject matter expertise on operational 
        medical issues;
          (4) coordinating with State, local, and tribal 
        governments, the medical community, and others within 
        and outside the Department, including the Department of 
        Health and Human Services Centers for Disease Control, 
        with respect to medical and public health matters; and
          (5) performing such other duties relating to such 
        responsibilities as the Secretary may require.

           *       *       *       *       *       *       *


                   TITLE XX--HOMELAND SECURITY GRANTS

SEC. 2001. DEFINITIONS.

    In this title, the following definitions shall apply:
          (1) * * *
          (2) * * *
          (3) Core capabilities.--The term ``core 
        capabilities'' means the capabilities for Federal, 
        State, local, and tribal government preparedness for 
        which guidelines are required to be established under 
        section 646(a) of the Post-Katrina Emergency Management 
        Reform Act of 2006 (6 U.S.C. 746(a)).
          [(3)](4) Critical infrastructure sectors.--The term 
        ``critical infrastructure sectors'' means the following 
        sectors, in both urban and rural areas:

           *       *       *       *       *       *       *

          [(4)](5) Directly eligible tribe.--The term 
        ``directly eligible tribe means--
                  (A) any Indian tribe--
                          (i) * * *
                          (ii) * * *
                          (iii) * * *
                                  (I) * * *
                                  (II) that is located within 
                                10 miles of a system or asset 
                                included on the prioritized 
                                critical infrastructure list 
                                established under [section 
                                210E(a)(2)] section 2214(a)(2) 
                                or has such a system or asset 
                                within its territory;
                                  (III) * * *
                                  (IV) * * *
                          (iv) * * *
                  (B) * * *
          [(5)](6) * * *
          [(6)](7) * * *
          [(7)](8) * * *
          [(8)](9) * * *
          [(9)](10) * * *
          [(10)](11) * * *
          [(11)](12) * * *
          [(12)](13) * * *
          [(13) Target capabilities.--The term ``target 
        capabilities'' means the target capabilities for 
        Federal, State, local, and tribal government 
        preparedness for which guidelines are required to be 
        established under section 646(a) of the Post-Katrina 
        Emergency Management Reform Act of 2006 (6 U.S.C. 
        746(a)).]
          (14) Tribal government.--The term ``tribal 
        government'' means the government of an Indian tribe.

           *       *       *       *       *       *       *


         Subtitle A--Grants to State and High-Risk Urban Areas


SEC. 2002. HOMELAND SECURITY GRANT PROGRAMS.

    (a) Grants Authorized.--The Secretary, through the 
Administrator, may award grants under sections [2003 and 2004] 
sections 2003, 2004, and 2010 to State, local, and tribal 
governments.
    (b) * * *
    (c) * * *

SEC. 2003. URBAN AREA SECURITY INITIATIVE.

    (a) * * *
    (b) Assessment and Designation of High-Risk Urban Areas.--
          (1) In general.--The Administrator shall designate 
        high-risk urban areas to receive grants under this 
        section based on procedures under this subsection.
          (2) Initial assessment.--
                  (A) In general.--For each fiscal year, the 
                Administrator shall conduct an initial 
                assessment using the most up-to-date data 
                available of the relative threat, 
                vulnerability, and consequences from acts of 
                terrorism faced by each eligible metropolitan 
                area, including consideration of--

           *       *       *       *       *       *       *

    (d) Distribution of Awards.--
          (1) * * *
          (2) * * *
                  (A) * * *
                  [(B) Funds retained.--A State shall provide 
                each relevant high-risk urban area with an 
                accounting of the items, services, or 
                activities on which any funds retained by the 
                State under subparagraph (A) were expended.]
                  (B) Funds retained.--To ensure transparency 
                and avoid duplication, a State shall provide 
                each relevant high-risk urban area with a 
                detailed accounting of the items, services, or 
                activities on which any funds retained by the 
                State under subparagraph (A) are to be 
                expended. Such accounting shall be provided not 
                later than 90 days after the date on which such 
                funds are retained.
          (3) * * *
          (4) * * *
    [(e) Authorization of Appropriations.--There are authorized 
to be appropriated for grants under this section--
          (1) $850,000,000 for fiscal year 2008;
          (2) $950,000,000 for fiscal year 2009;
          (3) $1,050,000,000 for fiscal year 2010;
          (4) $1,150,000,000 for fiscal year 2011;
          (5) $1,300,000,000 for fiscal year 2012; and
          (6) such sums as are necessary for fiscal year 2013, 
        and each fiscal year thereafter.]
    (e) Threat and Hazard Identification Risk Assessment and 
Capability Assessment.--As a condition of receiving a grant 
under this section, each high-risk urban area shall submit to 
the Administrator a threat and hazard identification and risk 
assessment and capability assessment--
          (1) at such time and in such form as is required by 
        the Administrator; and
          (2) consistent with the Federal Emergency Management 
        Agency's Comprehensive Preparedness Guide 201, Second 
        Edition, or such successor document or guidance as is 
        issued by the Administrator.
    (f) Period of Performance.--The Administrator shall make 
funds provided under this section available for use by a 
recipient of a grant for a period of not less than 36 months.

SEC. 2004. STATE HOMELAND SECURITY GRANT PROGRAM.

    (a) * * *

           *       *       *       *       *       *       *

    [(f) Authorization of Appropriations.--There are authorized 
to be appropriated for grants under this section--
          (1) $950,000,000 for each of fiscal years 2008 
        through 2012; and
          (2) such sums as are necessary for fiscal year 2013, 
        and each fiscal year thereafter.]
    (f) Threat and Hazard Identification and Risk Assessment 
and Capability Assessment.--
          (1) In general.--As a condition of receiving a grant 
        under this section, each State shall submit to the 
        Administrator a threat and hazard identification and 
        risk assessment and capability assessment--
                  (A) at such time and in such form as is 
                required by the Administrator; and
                  (B) consistent with the Federal Emergency 
                Management Agency's Comprehensive Preparedness 
                Guide 201, Second Edition, or such successor 
                document or guidance as is issued by the 
                Administrator.
          (2) Collaboration.--In developing the threat and 
        hazard identification and risk assessment under 
        paragraph (1), a State shall solicit input from local 
        and tribal governments, including first responders, 
        and, as appropriate, nongovernmental and private sector 
        stakeholders.
          (3) First responders defined.--In this subsection, 
        the term ``first responders''--
                  (A) means an emergency response provider; and
                  (B) includes representatives of local 
                governmental and nongovernmental fire, law 
                enforcement, emergency management, and 
                emergency medical personnel.
    (g) Period of Performance.--The Administrator shall make 
funds provided under this section available for use by a 
recipient of a grant for a period of not less than 36 month.

SEC. 2005. GRANTS TO DIRECTLY ELIGIBLE TRIBES.

    (a) * * *

           *       *       *       *       *       *       *

    (h) Period of Performance.--The Secretary shall make funds 
provided under this section available for use by a recipient of 
a grant for a period of not less than 36 months.
    [(h)](i) * * *
    [(i)](j) * * *
    [(j)](k) State Obligations.--
          (1) In general.--States shall be responsible for 
        allocating grant funds received under section 2004 to 
        tribal governments in order to help those tribal 
        communities achieve [target] core capabilities not 
        achieved through grants to directly eligible tribes.
          (2) * * *
          (3) * * *
    [(k)](l) * * *

SEC. 2006. TERRORISM PREVENTION.

    (a) Law Enforcement Terrorism Prevention Program.--
          (1) In general.--The Administrator shall ensure that 
        States and high-risk urban areas expend not less than 
        25 percent of the total combined funds appropriated for 
        grants under sections 2003 and 2004 [is used] for law 
        enforcement terrorism prevention activities.
          (2) * * *
                  (A) * * *

           *       *       *       *       *       *       *

                  [(I) any other activity permitted under the 
                Fiscal Year 2007 Program Guidance of the 
                Department for the Law Enforcement Terrorism 
                Prevention Program; and]
                  (I) activities as determined appropriate by 
                the Administrator, in coordination with the 
                Assistant Secretary for State and Local Law 
                Enforcement within the Office of Partnership 
                and Engagement of the Department, through 
                outreach to relevant stakeholder organizations; 
                and
                  (J) * * *
          (3) * * *
          (4) Annual report.--The Administrator, in 
        coordination with the Assistant Secretary for State and 
        Local Law Enforcement, shall report annually from 
        fiscal year 2018 through fiscal year 2022 on the use of 
        grants under sections 2003 and 2004 for law enforcement 
        terrorism prevention activities authorized under this 
        section, including the percentage and dollar amount of 
        funds used for such activities and the types of 
        projects funded.
    (b) Office for State and Local Law Enforcement.--
          (1) Establishment.--There is established in the 
        [Policy Directorate] Office of Partnership and 
        Engagement of the Department an Office for State and 
        Local Law Enforcement, which shall be headed by an 
        Assistant Secretary for State and Local Law 
        Enforcement.
          (2) * * *
          (3) * * *
          (4) Responsibilities.--The Assistant Secretary for 
        State and Local Law Enforcement shall--
                  (A) * * *
                  (B) serve as a liaison between State, local, 
                and tribal law enforcement agencies and the 
                Department, including through consultation with 
                such agencies regarding Department programs 
                that may impact such agencies;
                  (C) * * *
                  (D) work with the Administrator to [ensure] 
                verify that law enforcement and terrorism-
                focused grants to State, local, and tribal 
                government agencies, including grants under 
                sections 2003 and 2004, the Commercial 
                Equipment Direct Assistance Program, and other 
                grants administered by the Department to 
                support fusion centers and law enforcement-
                oriented programs, are appropriately focused on 
                terrorism prevention activities;
                  (E) coordinate with the Science and 
                Technology Directorate, the Federal Emergency 
                Management Agency, the Department of Justice, 
                the National Institute of Justice, law 
                enforcement organizations, and other 
                appropriate entities to support the 
                development, promulgation, and updating, as 
                necessary, of national voluntary consensus 
                standards for training and personal protective 
                equipment to be used in a tactical environment 
                by law enforcement officers; [and]
                  (F) conduct, jointly with the Administrator, 
                a study to determine the efficacy and 
                feasibility of establishing specialized law 
                enforcement deployment teams to assist State, 
                local, and tribal governments in responding to 
                natural disasters, acts of terrorism, or other 
                man-made disasters and report on the results of 
                that study to the appropriate committees of 
                Congress[.];
                  (G) produce an annual catalog that summarizes 
                opportunities for training, publications, 
                programs, and services available to State, 
                local, tribal, and territorial law enforcement 
                agencies from the Department and from each 
                component and office within the Department and, 
                not later than 30 days after the date of such 
                production, disseminate the catalog, including 
                by--
                          (i) making such catalog available to 
                        State, local, tribal, and territorial 
                        law enforcement agencies, including by 
                        posting the catalog on the website of 
                        the Department and cooperating with 
                        national organizations that represent 
                        such agencies;
                          (ii) making such catalog available 
                        through the Homeland Security 
                        Information Network; and
                          (iii) submitting such catalog to the 
                        Committee on Homeland Security of the 
                        House of Representatives and the 
                        Committee on Homeland Security and 
                        Governmental Affairs of the Senate; and
                  (H) in coordination with appropriate 
                components and offices of the Department and 
                other Federal agencies, develop, maintain, and 
                make available information on Federal resources 
                intended to support fusion center access to 
                Federal information and resources.
          (5) Report.--For each of fiscal years 2019 through 
        2023, the Assistant Secretary for State and Local Law 
        Enforcement shall submit to the Committee on Homeland 
        Security of the House of Representatives and the 
        Committee on Homeland Security and Governmental Affairs 
        of the Senate a report on the activities of the Office 
        for State and Local Law Enforcement. Each such report 
        shall include, for the fiscal year covered by the 
        report, a description of each of the following:
                  (A) Efforts to coordinate and share 
                information regarding Department and component 
                agency programs with State, local, and tribal 
                law enforcement agencies.
                  (B) Efforts to improve information sharing 
                through the Homeland Security Information 
                Network by appropriate component agencies of 
                the Department and by State, local, and tribal 
                law enforcement agencies.
                  (C) The status of performance metrics within 
                the Office for State and Local Law Enforcement 
                to evaluate the effectiveness of efforts to 
                carry out responsibilities set forth within 
                this subsection.
                  (D) Any feedback from State, local, and 
                tribal law enforcement agencies about the 
                Office for State and Local Law Enforcement, 
                including the mechanisms utilized to collect 
                such feedback.
                  (E) Efforts to carry out all other 
                responsibilities of the Office for State and 
                Local Law Enforcement.
          [(5)] (6) Rule of construction.--Nothing in this 
        subsection shall be construed to diminish, supercede, 
        or replace the responsibilities, authorities, or role 
        of the Administrator.

SEC. 2007. PRIORITIZATION.

    (a) In General.--In allocating funds among States and high-
risk urban areas applying for grants under section 2003 or 
2004, the Administrator shall consider, for each State or high-
risk urban area--
          (1) its relative threat, vulnerability, and 
        consequences from acts of terrorism, including 
        consideration of--
                  [(A) its population, including appropriate 
                consideration of military, tourist, and 
                commuter populations;]
                  (A) its population, including consideration 
                of domestic and international tourists, 
                commuters, and military populations, including 
                military populations residing in communities 
                outside military installations;

           *       *       *       *       *       *       *

                  (E) the most current threat assessments 
                available to the Department, including threat 
                information from other relevant Federal 
                agencies and field offices, as appropriate;

           *       *       *       *       *       *       *

                  (I) the extent to which it has unmet [target] 
                core capabilities;
                  (J) * * *
          (2) the anticipated effectiveness of the proposed use 
        of the grant by the State or high-risk urban area in 
        increasing the ability of that State or high-risk urban 
        area to prevent, prepare for, protect against, and 
        respond to acts of terrorism, to meet its [target] core 
        capabilities, and to otherwise reduce the overall risk 
        to the high-risk urban area, the State, or the Nation.
    (b) * * *

SEC. 2008. USE OF FUNDS.

    (a) Permitted Uses.--The Administrator to use grant funds 
to achieve [target] core capabilities related to preventing, 
preparing for, protecting against, and responding to acts of 
terrorism, consistent with a State homeland security plan and 
relevant local, tribal, and regional homeland security plans, 
including by working in conjunction with a National Laboratory 
(as defined in section 2(3) of the Energy Policy Act of 2005 
(42 U.S.C. 15801(3))), through--
          (1) * * *
          (2) * * *
          (3) protecting a system or asset included on the 
        prioritized critical infrastructure list established 
        under [section 210E(a)(2)] section 2214(a)(2);
          (4) * * *
          (5) ensuring operability and achieving 
        interoperability of emergency communications, provided 
        such emergency communications align with the Statewide 
        Communication Interoperability Plan and are coordinated 
        with the Statewide Interoperability Coordinator or 
        Statewide interoperability governance body of the State 
        of the recipient;
          (6) enhancing medical preparedness, medical surge 
        capacity, and mass prophylaxis capabilities, including 
        the development and maintenance of an initial 
        pharmaceutical stockpile, including medical kits and 
        diagnostics sufficient to protect first responders (as 
        defined in section 2004(f)), their families, immediate 
        victims, and vulnerable populations from a chemical or 
        biological event;
          (7) enhancing cybersecurity, including preparing for 
        and responding to cybersecurity risks and incidents (as 
        such terms are defined in section 2209) and developing 
        statewide cyber threat information analysis and 
        dissemination activities;
          [(6)](8) responding to an increase in the threat 
        level under the [Homeland Security Advisory System] 
        National Terrorism Advisory System, or to the needs 
        resulting from a National Special Security Event;
          [(7)](9) * * *
          [(8)](10) * * *
          [(9)](11) * * *
          [(10)](12) * * *
          [(11)](13) * * *
          [(12)](14) paying expenses directly related to 
        administration of the grant, except that such expenses 
        may not exceed [3] 5 percent of the amount of the 
        grant; and
          [(13)](15) any activity permitted under the Fiscal 
        Year 2007 Program Guidance of the Department for the 
        State Homeland Security Grant Program, the Urban Area 
        Security Initiative (including activities permitted 
        under the full-time counterterrorism staffing pilot), 
        or the Law Enforcement Terrorism Prevention Program[; 
        and].
          [(14) any other appropriate activity, as determined 
        by the Administrator.]
    (b) Limitations on Use of Funds.--
          (1) In general.--Funds provided under section 2003 or 
        2004 may not be used--
                  (A) to supplant State or local funds, except 
                that nothing in this paragraph shall prohibit 
                the use of grant funds provided to a State or 
                high-risk urban area for otherwise permissible 
                uses under section (a) on the basis that a 
                State or high-risk urban area has previously 
                used State or local funds to support the same 
                or similar uses; [or]
                  (B) for any State or local government cost-
                sharing contribution[.]; or
                  (C) to support any organization or group 
                which has knowingly or recklessly funded 
                domestic terrorism or international terrorism 
                (as those terms are defined in section 2331 of 
                title 18, United States Code) or organization 
                or group known to engage in or recruit to such 
                activities, as determined by the Secretary in 
                consultation with the Administrator, the Under 
                Secretary for Intelligence and Analysis, and 
                the heads of other appropriate Federal 
                departments and agencies.
          (2) * * *
          (3) Limitations on Discretion.--
                  (A) * * *
                  (B) Analysts.--If amounts awarded to a grant 
                recipient under section 2003 or 2004 are used 
                for paying salary or benefits of a qualified 
                intelligence analyst under subsection [(a)(10)] 
                (a)(12), the Administrator shall make such 
                amounts available without time limitations 
                placed on the period of time that the analyst 
                can serve under the grant.
          (4) Construction.--
                  (A) In general.--A grant awarded under 
                section 2003 or 2004 may not be used to acquire 
                land or to construct buildings or other 
                physical facilities.
                (B) Exceptions.--
                          (i) In general.--Notwithstanding 
                        subparagraph (A), nothing in this 
                        paragraph shall prohibit the use of a 
                        grant awarded under section 2003 or 
                        2004 to achieve [target] core 
                        capabilities related to preventing, 
                        preparing for, protecting against, or 
                        responding to acts of terrorism, 
                        including through the alteration or 
                        remodeling of existing buildings for 
                        the purpose of making such buildings 
                        secure against acts of terrorism.
                          (ii) * *  *
                          (iii) * * *
    (c) Multiple-Purpose Funds.--Nothing in this subtitle shall 
be construed to prohibit State, local, or tribal governments 
from using grant funds under sections 2003 and 2004 in a manner 
that enhances preparedness for disasters unrelated to acts of 
terrorism, if such use assists such governments in achieving 
[target] core capabilities related to preventing, preparing 
for, protecting against, or responding to acts of terrorism.
    (d) * * *
    (e) * * *
    (f) Equipment Standards.--[If an applicant]
          (1) Application requirement.--If an applicant for a 
        grant under section 2003 or 2004 proposes to upgrade or 
        purchase, with assistance provided under that grant, 
        new equipment or systems that do not meet or exceed any 
        applicable national voluntary consensus standards 
        developed under section 647 of the Post-Katrina 
        Emergency Management Reform Act of 2006 (6 U.S.C. 747), 
        the applicant shall include in its application an 
        explanation of why such equipment or systems will serve 
        the needs of the applicant better than equipment or 
        systems that meet or exceed such standards.
          (2) Review process.--The Administrator shall 
        implement a uniform process for reviewing applications 
        that, in accordance with paragraph (1), contain 
        explanations for a proposal to use grants provided 
        under section 2003 or 2004 to purchase equipment or 
        systems that do not meet or exceed any applicable 
        national voluntary consensus standards developed under 
        section 647 of the Post-Katrina Emergency Management 
        Reform Act of 2006 (6 U.S.C. 747).
          (3) Factors.--In carrying out the review process 
        under paragraph (2), the Administrator shall consider 
        the following:
                  (A) Current or past use of proposed equipment 
                or systems by Federal agencies or the Armed 
                Forces.
                  (B) The absence of a national voluntary 
                consensus standard for such equipment or 
                systems.
                  (C) The existence of an international 
                consensus standard for such equipment or 
                systems, and whether such equipment or systems 
                meets such standard.
                  (D) The nature of the capability gap 
                identified by the applicant, and how such 
                equipment or systems will address such gap.
                  (E) The degree to which such equipment or 
                systems will serve the needs of the applicant 
                better than equipment or systems that meet or 
                exceed existing consensus standards.
                  (F) Any other factor determined appropriate 
                by the Administrator.
    (g) Review Process.--The Administrator shall implement a 
uniform process for reviewing applications to use grants 
provided under section 2003 or 2004 to purchase equipment or 
systems not included on the Authorized Equipment List 
maintained by the Administrator.
    (h) Maintenance of Equipment.--Any applicant for a grant 
under section 2003 or 2004 seeking to use funds to purchase 
equipment, including pursuant to paragraphs (3), (4), (5), or 
(12) of subsection (a) of this section, shall by the time of 
the receipt of such grant develop a plan for the maintenance of 
such equipment over its life-cycle that includes information 
identifying which entity is responsible for such maintenance.

SEC. 2009. OPERATION STONEGARDEN.

    (a) Establishment.--There is established in the Department 
a program to be known as `Operation Stonegarden'. Under such 
program, the Secretary, acting through the Administrator, shall 
make grants to eligible law enforcement agencies, through the 
State Administrative Agency, to enhance border security in 
accordance with this section.
    (b) Eligible Recipients.--To be eligible to receive a grant 
under this section, a law enforcement agency shall--
          (1) be located in--
                  (A) a State bordering either Canada or 
                Mexico; or
                  (B) a State or territory with a maritime 
                border; and
          (2) be involved in an active, ongoing U.S. Customs 
        and Border Protection operation coordinated through a 
        sector office.
    (c) Permitted Uses.--The recipient of a grant under this 
section may use such grant for any of the following:
          (1) Equipment, including maintenance and sustainment 
        costs.
          (2) Personnel costs, including overtime and backfill, 
        directly incurred in support of enhanced border law 
        enforcement activities.
          (3) Any activity permitted for Operation Stonegarden 
        under the Department of Homeland Security's Fiscal Year 
        2016 Homeland Security Grant Program Notice of Funding 
        Opportunity.
          (4) Any other appropriate activity, as determined by 
        the Administrator, in consultation with the 
        Commissioner of U.S. Customs and Border Protection.
    (d) Period of Performance.--The Secretary shall make funds 
provided under this section available for use by a recipient of 
a grant for a period of not less than 36 months.
    (e) Collection of Information.--For any fiscal year 
beginning on or after the date that is 30 days after the date 
of enactment of this section for which grants are made under 
Operation Stonegarden, the Administrator shall separately 
collect and maintain financial information with respect to 
grants awarded under Operation Stonegarden, which shall 
include--
          (1) the amount of the awards;
          (2) the amount obligated for the awards;
          (3) the amount of outlays under the awards;
          (4) financial plans with respect to the use of the 
        awards;
          (5) any funding transfers or reallocations; and
          (6) any adjustments to spending plans or 
        reprogramming.
    (f) Oversight by the Administrator.--
          (1) In general.--The Administrator shall establish 
        and implement guidelines--
                  (A) to ensure that amounts made available 
                under Operation Stonegarden are used in 
                accordance with grant guidance and Federal 
                laws;
                  (B) to improve program performance reporting 
                and program performance measurements to 
                facilitate designing, implementing, and 
                enforcing procedures under Operation 
                Stonegarden; and
                  (C) that require the recording of 
                standardized performance data regarding program 
                output.
          (2) Submission.--Not later than 90 days after the 
        date of enactment of this section, the Administrator 
        shall submit to the Committee on Homeland Security and 
        the Committee on Oversight and Government Reform of the 
        House of Representatives and the Committee on Homeland 
        Security and Governmental Affairs of the Senate the 
        guidelines established under paragraph (1).
    (g) Financial Review Guidelines.--
        (1) In general.--The Administrator, in coordination 
        with the Commissioner of U.S. Customs and Border 
        Protection, shall develop and implement guidelines 
        establishing procedures for implementing the auditing 
        and reporting requirements under section 2022 with 
        respect to Operation Stonegarden.
          (2) Submission.--Not later than 90 days after the 
        date of enactment of this section, the Administrator 
        shall submit to the Committee on Homeland Security and 
        the Committee on Oversight and Government Reform of the 
        House of Representatives and the Committee on Homeland 
        Security and Governmental Affairs of the Senate the 
        guidelines established under paragraph (1).
    (h) Report and Briefing.--The Administrator, in 
coordination with the Commissioner of U.S. Customs and Border 
Protection, shall, at least annually during each of fiscal 
years 2018 through 2022, submit to the Committee on Homeland 
Security and the Committee on Oversight and Government Reform 
of the House of Representatives and the Committee on Homeland 
Security and Governmental Affairs of the Senate a report and 
briefing including--
      (1) for the period covered by the report--
                  (A) information on how each recipient of a 
                grant under Operation Stonegarden expended 
                amounts received under the grant;
                  (B) a list of all operations carried out 
                using amounts made available under Operation 
                Stonegarden; and
                  (C) for each operation described in 
                subparagraph (B)--
                          (i) whether the operation is active 
                        or completed;
                          (ii) the targeted purpose of the 
                        operation;
                          (iii) the location of the operation; 
                        and
                          (iv) the total number of hours worked 
                        by employees of the grant recipient and 
                        by employees of U.S. Customs and Border 
                        Protection with respect to the 
                        operation, including the number of 
                        hours for which such employees received 
                        basic pay and the number of hours for 
                        which such employees received premium 
                        pay, by type of premium pay; and
          (2) in the first report submitted under this 
        subsection--
                  (A) an examination of the effects changing 
                the Operation Stonegarden Program to award 
                multi-year grants would have on the mission of 
                the program; and
                  (B) the findings and recommendations of the 
                Administrator regarding what changes could 
                improve the program to better serve the program 
                mission, which may include feedback from grant 
                recipients.

SEC. 2010. NON-PROFIT SECURITY GRANT PROGRAM.

    (a) Establishment.--There is established in the Department 
a program to be known as the `Non-Profit Security Grant 
Program' (in this section referred to as the ``Program''). 
Under the Program, the Secretary, acting through the 
Administrator, shall make grants to eligible nonprofit 
organizations described in subsection (b), through the State in 
which such organizations are located, for target hardening and 
other security enhancements to protect against terrorist 
attacks.
    (b) Eligible Recipients.--Eligible nonprofit organizations 
described in this subsection (a) are organizations that are--
          (1) described in section 501(c)(3) of the Internal 
        Revenue Code of 1986 and exempt from tax under section 
        501(a) of such Code; and
          (2) determined to be at risk of a terrorist attack by 
        the Administrator.
    (c) Permitted Uses.--The recipient of a grant under this 
section may use such grant for any of the following:
          (1) described in section 501(c)(3) of the Internal 
        Revenue Code of 1986 and exempt from tax under section 
        501(a) of such Code; and
          (2) determined to be at risk of a terrorist attack by 
        the Administrator.
    (d) Allocation.--The Administrator shall ensure that not 
less than an amount equal to 30 percent of the total funds 
appropriated for grants under the Program for each fiscal year 
is used for grants to eligible nonprofit organizations 
described in subsection (b) that are located in jurisdictions 
not receiving funding under section 2003.
    (e) Period of Performance.--The Administrator shall make 
funds provided under this section available for use by a 
recipient of a grant for a period of not less than 36 months.

           *       *       *       *       *       *       *


                    Subtitle B--Grant Administration


SEC. 2021. ADMINISTRATION AND COORDINATION.

    (a) * * *
    (b) * * *
    [(c) Interagency Coordination.--
          [(1) In general.--Not later than 12 months after the 
        date of enactment of the Implementing Recommendations 
        of the 9/11 Commission Act of 2007, the Secretary 
        (acting through the Administrator), the Attorney 
        General, the Secretary of Health and Human Services, 
        and the heads of other agencies providing assistance to 
        State, local, and tribal governments for preventing, 
        preparing for, protecting against, and responding to 
        natural disasters, acts of terrorism, and other man-
        made disasters, shall jointly--
                  [(A) compile a comprehensive list of Federal 
                grant programs for State, local, and tribal 
                governments for preventing, preparing for, 
                protecting against, and responding to natural 
                disasters, acts of terrorism, and other manmade 
                disasters;
                  [(B) compile the planning, reporting, 
                application, and other requirements and 
                guidance for the grant programs described in 
                subparagraph (A);
                  [(C) develop recommendations, as appropriate, 
                to--(i) eliminate redundant and duplicative 
                requirements for State, local, and tribal 
                governments, including onerous application and 
                ongoing reporting requirements; (ii) ensure 
                accountability of the programs to the intended 
                purposes of such programs; (iii) coordinate 
                allocation of grant funds to avoid duplicative 
                or inconsistent purchases by the recipients; 
                (iv) make the programs more accessible and user 
                friendly to applicants; and (v) ensure the 
                programs are coordinated to enhance the overall 
                preparedness of the Nation;
                  [(D) submit the information and 
                recommendations under subparagraphs (A), (B), 
                and (C) to the appropriate committees of 
                Congress; and
                  [(E) provide the appropriate committees of 
                Congress, the Comptroller General, and any 
                officer or employee of the Government 
                Accountability Office with full access to any 
                information collected or reviewed in preparing 
                the submission under subparagraph (D).
          [(2) Scope of task.--Nothing in this subsection shall 
        authorize the elimination, or the alteration of the 
        purposes, as delineated by statute, regulation, or 
        guidance, of any grant program that exists on the date 
        of the enactment of the Implementing Recommendations of 
        the 9/11 Commission Act of 2007, nor authorize the 
        review or preparation of proposals on the elimination, 
        or the alteration of such purposes, of any such grant 
        program.]
    [(d)](c) * * *
          (1) * * *
          (2) * * *
          (3) with respect to terrorism-focused grants, it is 
        necessary to ensure both that the [target] core 
        capabilities of the highest risk areas are achieved 
        quickly and that basic levels of preparedness, as 
        measured by the attainment of [target] core 
        capabilities, are achieved nationwide.

           *       *       *       *       *       *       *


SEC. 2022. ACCOUNTABILITY.

    (a) Audits of Grant Programs.--
          (1) Compliance requirements.--
                  (A) * * *
                  (B) Access to information.--[The Department]
                          (i) In general.--The Department and 
                        each recipient of a grant administered 
                        by the Department shall provide the 
                        Comptroller General and any officer or 
                        employee of the Government 
                        Accountability Office with full access 
                        to information regarding the activities 
                        carried out related to any grant 
                        administered by the Department.
                          (ii) Inspector general review.--With 
                        respect to each grant awarded, the 
                        Inspector General of the Department 
                        may--
                                  (I) examine any records of 
                                the contractor or grantee, any 
                                of its subcontractors or 
                                subgrantees, or any State or 
                                local agency or other entity in 
                                receipt of or administering any 
                                grant awarded, that pertain to, 
                                and involve transactions 
                                relating to the contract, 
                                subcontract, grant, or 
                                subgrant; and
                                  (II) interview any officer or 
                                employee of the contractor or 
                                grantee, any of its 
                                subcontractors or subgrantees, 
                                or any State or local agency or 
                                other entity in receipt of or 
                                administering any grant 
                                awarded, regarding transactions 
                                relating to the contract, 
                                subcontract, grant, or 
                                subgrant.
                          (iii) Rule of construction.--Nothing 
                        in clause (ii) may be construed to 
                        limit or restrict the authority of the 
                        Inspector General of the Department.

           *       *       *       *       *       *       *

    (b) Reports by Grant Recipients.--
          (1) Quarterly reports on homeland security 
        spending.--
                  (A) In general.--As a condition of receiving 
                [a grant under section 2003 or 2004] a covered 
                grant, any recipient, including, a State, high-
                risk urban area, or directly eligible tribe, 
                shall, not later than 30 days after the end of 
                each Federal fiscal quarter, submit to the 
                Administrator or the Secretary, as appropriate 
                under the covered grant, a report on activities 
                performed using grant funds during that fiscal 
                quarter.
                  (B) Contents.--Each report submitted under 
                subparagraph (A) shall at a minimum include, 
                for the applicable recipient, including any 
                State, high-risk urban area, or directly 
                eligible tribe, and each subgrantee thereof--
                          (i) the amount obligated to that 
                        recipient under [section 2003 or 2004] 
                        the covered grant in that quarter;
                          (ii) the amount of funds received and 
                        expended under [section 2003 or 2004] 
                        the covered grant by that recipient in 
                        that quarter; [and]
                          (iii) a [summary] detailed 
                        description of expenditures made by 
                        that recipient using [such funds, and 
                        the purposes for which such 
                        expenditures were made.] such funds, 
                        including--
                                  (I) the name of the recipient 
                                and the project or activity;
                                  (II) a detailed description 
                                of the project or activity;
                                  (III) an evaluation of the 
                                completion status of the 
                                project or activity;
                                  (IV) in the case of an 
                                infrastructure investment--
                                          (aa) the purpose, 
                                        total expected cost, 
                                        and rationale for 
                                        funding the 
                                        infrastructure 
                                        investment with funds 
                                        made available; and
                                          (bb) the name of the 
                                        point of contact for 
                                        the recipient if there 
                                        are questions 
                                        concerning the 
                                        infrastructure 
                                        investment; and
                                  (V) detailed information from 
                                each subgrantee, including the 
                                information described in 
                                subparagraphs (I) through (IV), 
                                on any subgrant awarded by the 
                                recipient; and 
                          (iv) the total amount of funds 
                        received to date under each covered 
                        grant.
                  (C) End-of-year report.--The report submitted 
                under subparagraph (A) by any recipient, 
                including any a State, high-risk urban area, or 
                directly eligible tribe, relating to the last 
                quarter of any fiscal year shall include, in 
                addition to the contents required under 
                subparagraph (B)--
                          (i) the amount and date of receipt of 
                        all funds received under the grant 
                        during that fiscal year
                          (ii) the identity of, and total 
                        amount provided to, any subgrantee for 
                        that grant during that fiscal year; and
                          (iii) the amount and the dates of 
                        disbursements of all such funds 
                        expended in compliance with section 
                        2021(a)(1) or under mutual aid 
                        agreements or other sharing 
                        arrangements that [apply within] apply 
                        to or within any recipient, including 
                        the State, high-risk urban area, or 
                        directly eligible tribe, as applicable, 
                        during that fiscal year[; and].
                          [(iv) how the funds were used by each 
                        recipient or subgrantee during that 
                        fiscal year.]
          (2) * * *
          (3) Required reporting for prior awarded grants.--Not 
        later than 180 days after the end of the quarter 
        following the date of enactment of this paragraph, each 
        recipient of a covered grant awarded before the date of 
        enactment of this paragraph shall provide the 
        information required under this subsection and 
        thereafter comply with the requirements of this 
        subsection.
          (4) Assistance in reporting.--The Administrator or 
        the Secretary, as appropriate under the covered grant, 
        in coordination with the Director of the Office of 
        Management and Budget, shall provide for user-friendly 
        means for grant recipients to comply with the reporting 
        requirements of this subsection.
          (5) Subgrantee reporting.--Each grant recipient 
        required to report information under paragraph 
        (1)(B)(iii)(V) shall register with the System for Award 
        Management database or complete other registration 
        requirements as determined necessary by the Director of 
        the Office of Management and Budget.
          (6) Publication of information.--Not later than 7 
        days after the date on which the Administrator or the 
        Secretary, as the case may be, receives the reports 
        required to be submitted under this subsection, the 
        Administrator and the Secretary shall make the 
        information in the reports publicly available, in a 
        searchable database, on the website of the Federal 
        Emergency Management Agency or Department, as 
        appropriate.
          (7) Covered grant defined.--In this subsection, the 
        term ``covered grant'' means a grant awarded under--
                  (A) this Act; or
                  (B) a program described in paragraphs (1) 
                through (6) of section 2002(b) that is 
                administered by the Department.
    (c) * * *
    (d) Sunset and Disposition of Unexpended Grant Amounts.--
          (1) In general.--Except as may be otherwise provided 
        in the authorizing statute of a grant program, 
        effective on the date that is 5 years after the date on 
        which grant funds are distributed by the Administrator 
        or the Secretary, as appropriate, under a covered grant 
        (as defined in subsection (b)(7)), the authority of a 
        covered grant recipient, including any grantee or 
        subgrantee, to obligate, provide, make available, or 
        otherwise expend those funds is terminated.
          (2) Return of unexpended grant amounts.--Upon the 
        termination of authority under paragraph (1), any grant 
        amounts that have not been expended shall be returned 
        to the Administrator or the Secretary, as the case may 
        be. The Administrator or the Secretary, as the case may 
        be, shall deposit any grant amounts returned under this 
        paragraph in the General Fund of the Treasury in 
        accordance with section 3302 of title 31, United States 
        Code.
          (3) Awards to recipients returning grant funds.--On 
        and after the date on which the authority of a covered 
        grant recipient is terminated under paragraph (1) with 
        respect to a grant under a covered grant program, the 
        Administrator or the Secretary, as appropriate, may 
        award a grant under the covered grant program to the 
        covered grant recipient, only pursuant to the 
        submission of a new grant application, in accordance 
        with the requirements of the grant program.
          (4) Applicability.--This subsection shall apply to 
        any grant awarded under a covered grant program on or 
        after the date of enactment of this subsection.

           *       *       *       *       *       *       *


SEC. 2024. MEMORANDA OF UNDERSTANDING WITH DEPARTMENTAL COMPONENTS AND 
                    OFFICES REGARDING THE POLICY AND GUIDANCE.

    The Administrator shall enter into memoranda of 
understanding with the heads of the following departmental 
components and offices delineating the roles and 
responsibilities of such components and offices regarding the 
policy and guidance for grants under section 1406 of the 
Implementing Recommendations of the 9/11 Commission Act of 2007 
(6 U.S.C. 1135), sections 2003 and 2004 of this Act, and 
section 70107 of title 46, United States Code, as appropriate:
          (1) The Commissioner of U.S. Customs and Border 
        Protection.
          (2) The Administrator of the Transportation Security 
        Administration.
          (3) The Commandant of the Coast Guard.
          (4) The Under Secretary for Intelligence and 
        Analysis.
          (5) The Assistant [Director for Emergency 
        Communications].
          (6) The Assistant Secretary for State and Local Law 
        Enforcement.
          (7) The Countering Violent Extremism Coordinator.
          (8) The Officer for Civil Rights and Civil Liberties.
          (9) The Chief Medical Officer.
          (10) The heads of other components or offices of the 
        Department, as determined by the Secretary.

TITLE XXI--CHEMICAL FACILITY ANTI-TERRORISM STANDARDS

           *       *       *       *       *       *       *


SEC. 2102. CHEMICAL FACILITY ANTI-TERRORISM STANDARDS PROGRAM.

    (a) Program Established.--There is in the Department a 
Chemical Facility Anti-Terrorism Standards Program.
          (1) In general.--There is in the Department a 
        Chemical Facility Anti-Terrorism Standards Program, 
        which shall be located in the Cybersecurity and 
        Infrastructure Security Agency.

           *       *       *       *       *       *       *


SEC. 2103. PROTECTION AND SHARING OF INFORMATION.

    (a) * * *
    (b) * * *
    (c) Sharing of Information With First Responders.--
          (1) Requirement.--The Secretary shall provide to 
        State, local, and regional fusion centers (as that term 
        is defined in section [210A(j)(1)] 210A(j)) and State 
        and local government officials, as the Secretary 
        determines appropriate, such information as is 
        necessary to help ensure that first responders are 
        properly prepared and provided with the situational 
        awareness needed to respond to security incidents at 
        covered chemical facilities.

SEC. 2104. CIVIL ENFORCEMENT.

    (a) * * *
    (b) * * *
    (c) Emergency Operations.--
          (1) * * *
          (2) Limitation on delegation.--The Secretary may not 
        delegate the authority under paragraph (1) to any 
        official other than the [Under Secretary responsible 
        for overseeing critical infrastructure protection, 
        cybersecurity, and other related programs of the 
        Department appointed under section 103(a)(1)(H)] 
        Director of Cybersecurity and Infrastructure Security.

           *       *       *       *       *       *       *


TITLE XXII--CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY

           *       *       *       *       *       *       *


         Subtitle A--Cybersecurity and Infrastructure Security

SEC. 2201. DEFINITIONS.

    In this subtitle:
          (1) Critical infrastructure information.--The term 
        ``critical infrastructure information'' has the meaning 
        given the term in section 2222.
          (2) Cybersecurity risk.--The term ``cybersecurity 
        risk'' has the meaning given the term in section 2209.
          (3) Cybersecurity threat.--The term ``cybersecurity 
        threat'' has the meaning given the term in section 
        102(5) of the Cybersecurity Act of 2015 (contained in 
        division N of the Consolidated Appropriations Act, 2016 
        (Public Law 114-113; 6 U.S.C. 1501)).
          (4) National cybersecurity asset response 
        activities.--The term ``national cybersecurity asset 
        response activities'' means--
                  (A) furnishing cybersecurity technical 
                assistance to entities affected by 
                cybersecurity risks to protect assets, mitigate 
                vulnerabilities, and reduce impacts of cyber 
                incidents;
                  (B) identifying other entities that may be at 
                risk of an incident and assessing risk to the 
                same or similar vulnerabilities;
                  (C) assessing potential cybersecurity risks 
                to a sector or region, including potential 
                cascading effects, and developing courses of 
                action to mitigate such risks;
                  (D) facilitating information sharing and 
                operational coordination with threat response; 
                and
                  (E) providing guidance on how best to utilize 
                Federal resources and capabilities in a timely, 
                effective manner to speed recovery from 
                cybersecurity risks.
          (5) Sector-specific agency.--The term ``Sector-
        Specific Agency'' means a Federal department or agency, 
        designated by law or presidential directive, with 
        responsibility for providing institutional knowledge 
        and specialized expertise of a sector, as well as 
        leading, facilitating, or supporting programs and 
        associated activities of its designated critical 
        infrastructure sector in the all hazards environment in 
        coordination with the Department.
          (6) Sharing.--The term ``sharing'' has the meaning 
        given the term in section 2209.

SEC. 2202. CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY.

    (a) Redesignation.--
          (1) In general.--The National Protection and Programs 
        Directorate of the Department shall, on and after the 
        date of the enactment of this subtitle, be known as the 
        ``Cybersecurity and Infrastructure Security Agency'' 
        (in this subtitle referred to as the ``Agency'').
          (2) References.--Any reference to the National 
        Protection and Programs Directorate of the Department 
        in any law, regulation, map, document, record, or other 
        paper of the United States shall be deemed to be a 
        reference to the Cybersecurity and Infrastructure 
        Security Agency of the Department.
    (b) Director.--
          (1) In general.--The Agency shall be headed by a 
        Director of Cybersecurity and Infrastructure Security 
        (in this subtitle referred to as the ``Director''), who 
        shall report to the Secretary.
          (2) Reference.--Any reference to an Under Secretary 
        responsible for overseeing critical infrastructure 
        protection, cybersecurity, and any other related 
        program of the Department as described in section 
        103(a)(1)(H) as in effect on the day before the date of 
        enactment of this subtitle in any law, regulation, map, 
        document, record, or other paper of the United States 
        shall be deemed to be a reference to the Director of 
        Cybersecurity and Infrastructure Security of the 
        Department.
    (c) Responsibilities.--The Director shall--
          (1) lead cybersecurity and critical infrastructure 
        security programs, operations, and associated policy 
        for the Agency, including national cybersecurity asset 
        response activities;
          (2) coordinate with Federal entities, including 
        Sector-Specific Agencies, and non-Federal entities, 
        including international entities, to carry out the 
        cybersecurity and critical infrastructure activities of 
        the Agency, as appropriate;
          (3) carry out the responsibilities of the Secretary 
        to secure Federal information and information systems 
        consistent with law, including subchapter II of chapter 
        35 of title 44, United States Code, and the 
        Cybersecurity Act of 2015 (contained in division N of 
        the Consolidated Appropriations Act, 2016 (Public Law 
        114-113));
          (4) coordinate a national effort to secure and 
        protect against critical infrastructure risks, 
        consistent with subsection (e)(1)(E);
          (5) oversee the EMP and GMD planning and protection 
        and preparedness activities of the Agency;
          (6) upon request, provide analyses, expertise, and 
        other technical assistance to critical infrastructure 
        owners and operators and, where appropriate, provide 
        those analyses, expertise, and other technical 
        assistance in coordination with Sector-Specific 
        Agencies and other Federal departments and agencies;
          (7) develop and utilize mechanisms for active and 
        frequent collaboration between the Agency and Sector-
        Specific Agencies to ensure appropriate coordination, 
        situational awareness, and communications with Sector-
        Specific Agencies;
          (8) maintain and utilize mechanisms for the regular 
        and ongoing consultation and collaboration among the 
        Divisions of the Agency to further operational 
        coordination, integrated situational awareness, and 
        improved integration across the Agency in accordance 
        with this Act;
          (9) develop, coordinate, and implement--
                  (A) comprehensive strategic plans for the 
                activities of the Agency; and
                  (B) risk assessments by and for the Agency;
          (10) carry out emergency communications 
        responsibilities, in accordance with title XVIII;
          (11) carry out cybersecurity, infrastructure 
        security, and emergency communications stakeholder 
        outreach and engagement and coordinate that outreach 
        and engagement with critical infrastructure Sector-
        Specific Agencies, as appropriate;
          (12) oversee an integrated analytical approach to 
        physical and cyber infrastructure analysis; and
          (13) carry out such other duties and powers 
        prescribed by law or delegated by the Secretary.
    (d) Deputy Director.--There shall be in the Agency a Deputy 
Director of Cybersecurity and Infrastructure Security who 
shall--
          (1) assist the Director in the management of the 
        Agency; and
          (2) report to the Director.
    (e) Cybersecurity and Infrastructure Security Authorities 
of the Secretary.--
          (1) In general.--The responsibilities of the 
        Secretary relating to cybersecurity and infrastructure 
        security shall include the following:
                  (A) To access, receive, and analyze law 
                enforcement information, intelligence 
                information, and other information from Federal 
                Government agencies, State, local, tribal, and 
                territorial government agencies, including law 
                enforcement agencies, and private sector 
                entities, and to integrate that information, in 
                support of the mission responsibilities of the 
                Department, in order to--
                          (i) identify and assess the nature 
                        and scope of terrorist threats to the 
                        homeland;
                          (ii) detect and identify threats of 
                        terrorism against the United States; 
                        and
                          (iii) understand those threats in 
                        light of actual and potential 
                        vulnerabilities of the homeland.
                  (B) To carry out comprehensive assessments of 
                the vulnerabilities of the key resources and 
                critical infrastructure of the United States, 
                including the performance of risk assessments 
                to determine the risks posed by particular 
                types of terrorist attacks within the United 
                States, including an assessment of the 
                probability of success of those attacks and the 
                feasibility and potential efficacy of various 
                countermeasures to those attacks. At the 
                discretion of the Secretary, such assessments 
                may be carried out in coordination with Sector-
                Specific Agencies.
                  (C) To integrate relevant information, 
                analysis, and vulnerability assessments, 
                regardless of whether the information, 
                analysis, or assessments are provided or 
                produced by the Department, in order to make 
                recommendations, including prioritization, for 
                protective and support measures by the 
                Department, other Federal Government agencies, 
                State, local, tribal, and territorial 
                government agencies and authorities, the 
                private sector, and other entities regarding 
                terrorist and other threats to homeland 
                security.
                  (D) To ensure, pursuant to section 202, the 
                timely and efficient access by the Department 
                to all information necessary to discharge the 
                responsibilities under this title, including 
                obtaining that information from other Federal 
                Government agencies.
                  (E) To develop, in coordination with the 
                Sector-Specific Agencies with available 
                expertise, a comprehensive national plan for 
                securing the key resources and critical 
                infrastructure of the United States, including 
                power production, generation, and distribution 
                systems, information technology and 
                telecommunications systems (including 
                satellites), electronic financial and property 
                record storage and transmission systems, 
                emergency communications systems, and the 
                physical and technological assets that support 
                those systems.
                  (F) To recommend measures necessary to 
                protect the key resources and critical 
                infrastructure of the United States in 
                coordination with other Federal Government 
                agencies, including Sector-Specific Agencies, 
                and in cooperation with State, local, tribal, 
                and territorial government agencies and 
                authorities, the private sector, and other 
                entities.
                  (G) To review, analyze, and make 
                recommendations for improvements to the 
                policies and procedures governing the sharing 
                of information relating to homeland security 
                within the Federal Government and between 
                Federal Government agencies and State, local, 
                tribal, and territorial government agencies and 
                authorities.
                  (H) To disseminate, as appropriate, 
                information analyzed by the Department within 
                the Department, to other Federal Government 
                agencies with responsibilities relating to 
                homeland security, and to State, local, tribal, 
                and territorial government agencies and private 
                sector entities with those responsibilities in 
                order to assist in the deterrence, prevention, 
                or preemption of, or response to, terrorist 
                attacks against the United States.
                  (I) To consult with State, local, tribal, and 
                territorial government agencies and private 
                sector entities to ensure appropriate exchanges 
                of information, including law enforcement-
                related information, relating to threats of 
                terrorism against the United States.
                  (J) To ensure that any material received 
                pursuant to this Act is protected from 
                unauthorized disclosure and handled and used 
                only for the performance of official duties.
                  (K) To request additional information from 
                other Federal Government agencies, State, 
                local, tribal, and territorial government 
                agencies, and the private sector relating to 
                threats of terrorism in the United States, or 
                relating to other areas of responsibility 
                assigned by the Secretary, including the entry 
                into cooperative agreements through the 
                Secretary to obtain that information.
                  (L) To establish and utilize, in conjunction 
                with the Chief Information Officer of the 
                Department, a secure communications and 
                information technology infrastructure, 
                including data-mining and other advanced 
                analytical tools, in order to access, receive, 
                and analyze data and information in furtherance 
                of the responsibilities under this section, and 
                to disseminate information acquired and 
                analyzed by the Department, as appropriate.
                  (M) To coordinate training and other support 
                to the elements and personnel of the 
                Department, other Federal Government agencies, 
                and State, local, tribal, and territorial 
                government agencies that provide information to 
                the Department, or are consumers of information 
                provided by the Department, in order to 
                facilitate the identification and sharing of 
                information revealed in their ordinary duties 
                and the optimal utilization of information 
                received from the Department.
                  (N) To coordinate with Federal, State, local, 
                tribal, and territorial law enforcement 
                agencies, and the private sector, as 
                appropriate.
                  (O) To exercise the authorities and oversight 
                of the functions, personnel, assets, and 
                liabilities of those components transferred to 
                the Department pursuant to section 201(g).
                  (P) To carry out the functions of the 
                national cybersecurity and communications 
                integration center under section 2209.
                  (Q) To carry out the requirements of the 
                Chemical Facility Anti-Terrorism Standards 
                Program established under title XXI and the 
                secure handling of ammonium nitrate program 
                established under subtitle J of title VIII, or 
                any successor programs.
          (2) Reallocation.--The Secretary may reallocate 
        within the Agency the functions specified in sections 
        2203(b) and 2204(b), consistent with the 
        responsibilities provided in paragraph (1), upon 
        certifying to and briefing the appropriate 
        congressional committees, and making available to the 
        public, not less than 60 days before the reallocation 
        that the reallocation is necessary for carrying out the 
        activities of the Agency.
          (3) Staff.--
                  (A) In general.--The Secretary shall provide 
                the Agency with a staff of analysts having 
                appropriate expertise and experience to assist 
                the Agency in discharging the responsibilities 
                of the Agency under this section.
                  (B) Private sector analysts.--Analysts under 
                this subsection may include analysts from the 
                private sector.
                  (C) Security clearances.--Analysts under this 
                subsection shall possess security clearances 
                appropriate for their work under this section.
          (4) Detail of personnel.--
                  (A) In general.--In order to assist the 
                Agency in discharging the responsibilities of 
                the Agency under this section, personnel of the 
                Federal agencies described in subparagraph (B) 
                may be detailed to the Agency for the 
                performance of analytic functions and related 
                duties.
                  (B) Agencies.--The Federal agencies described 
                in this subparagraph are--
                          (i) the Department of State;
                          (ii) the Central Intelligence Agency;
                          (iii) the Federal Bureau of 
                        Investigation;
                          (iv) the National Security Agency;
                          (v) the National Geospatial-
                        Intelligence Agency;
                          (vi) the Defense Intelligence Agency;
                          (vii) Sector-Specific Agencies; and
                          (viii) any other agency of the 
                        Federal Government that the President 
                        considers appropriate.
                  (C) Interagency agreements.--The Secretary 
                and the head of a Federal agency described in 
                subparagraph (B) may enter into agreements for 
                the purpose of detailing personnel under this 
                paragraph.
                  (D) Basis.--The detail of personnel under 
                this paragraph may be on a reimbursable or non-
                reimbursable basis.
    (f) Composition.--The Agency shall be composed of the 
following divisions:
          (1) The Cybersecurity Division, headed by an 
        Assistant Director.
          (2) The Infrastructure Security Division, headed by 
        an Assistant Director.
          (3) The Emergency Communications Division under title 
        XVIII, headed by an Assistant Director.
    (g) Co-location.--
          (1) In general.--To the maximum extent practicable, 
        the Director shall examine the establishment of central 
        locations in geographical regions with a significant 
        Agency presence.
          (2) Coordination.--When establishing the central 
        locations described in paragraph (1), the Director 
        shall coordinate with component heads and the Under 
        Secretary for Management to co-locate or partner on any 
        new real property leases, renewing any occupancy 
        agreements for existing leases, or agreeing to extend 
        or newly occupy any Federal space or new construction.
    (h) Privacy.--
          (1) In general.--There shall be a Privacy Officer of 
        the Agency with primary responsibility for privacy 
        policy and compliance for the Agency.
          (2) Responsibilities.--The responsibilities of the 
        Privacy Officer of the Agency shall include--
                  (A) ensuring that the use of technologies by 
                the Agency sustain, and do not erode, privacy 
                protections relating to the use, collection, 
                and disclosure of personal information;
                  (B) ensuring that personal information 
                contained in systems of records of the Agency 
                is handled in full compliance as specified in 
                section 552a of title 5, United States Code 
                (commonly known as the ``Privacy Act of 
                1974'');
                  (C) evaluating legislative and regulatory 
                proposals involving collection, use, and 
                disclosure of personal information by the 
                Agency; and
                  (D) conducting a privacy impact assessment of 
                proposed rules of the Agency on the privacy of 
                personal information, including the type of 
                personal information collected and the number 
                of people affected.
    (i) Savings.--Nothing in this title may be construed as 
affecting in any manner the authority, existing on the day 
before the date of enactment of this title, of any other 
component of the Department or any other Federal department or 
agency.

SEC. 2203. CYBERSECURITY DIVISION.

    (a) Establishment.--
          (1) In general.--There is established in the Agency a 
        Cybersecurity Division.
          (2) Assistant director.--The Cybersecurity Division 
        shall be headed by an Assistant Director for 
        Cybersecurity (in this section referred to as the 
        ``Assistant Director''), who shall--
                  (A) be at the level of Assistant Secretary 
                within the Department;
                  (B) be appointed by the President without the 
                advice and consent of the Senate; and
                  (C) report to the Director.
          (3) Reference.--Any reference to the Assistant 
        Secretary for Cybersecurity and Communications in any 
        law, regulation, map, document, record, or other paper 
        of the United States shall be deemed to be a reference 
        to the Assistant Director for Cybersecurity
  (b) Functions.--The Assistant Director shall--
          (1) direct the cybersecurity efforts of the Agency;
          (2) carry out activities, at the direction of the 
        Director, related to the security of Federal 
        information and Federal information systems consistent 
        with law, including subchapter II of chapter 35 of 
        title 44, United States Code, and the Cybersecurity Act 
        of 2015 (contained in division N of the Consolidated 
        Appropriations Act, 2016 (Public Law 114-113));
          (3) fully participate in the mechanisms required 
        under section 2202(c)(7); and
          (4) carry out such other duties and powers as 
        prescribed by the Director.

SEC. 2204. INFRASTRUCTURE SECURITY DIVISION.

    (a) Establishment.--
                  (1) In general.--There is established in the 
                Agency an Infrastructure Security Division.
          (2) Assistant director.--The Infrastructure Security 
        Division shall be headed by an Assistant Director for 
        Infrastructure Security (in this section referred to as 
        the ``Assistant Director''), who shall--
                  (A) be at the level of Assistant Secretary 
                within the Department;
                  (B) be appointed by the President without the 
                advice and consent of the Senate; and
                  (C) report to the Director.
          (3) Reference.--Any reference to the Assistant 
        Secretary for Infrastructure Protection in any law, 
        regulation, map, document, record, or other paper of 
        the United States shall be deemed to be a reference to 
        the Assistant Director for Infrastructure Security.
  (b) Functions.--The Assistant Director shall--
          (1) direct the critical infrastructure security 
        efforts of the Agency;
          (2) carry out, at the direction of the Director, the 
        Chemical Facilities Anti-Terrorism Standards Program 
        established under title XXI and the secure handling of 
        ammonium nitrate program established under subtitle J 
        of title VIII, or any successor programs;
          (3) fully participate in the mechanisms required 
        under section 2202(c)(7); and
          (4) carry out such other duties and powers as 
        prescribed by the Director.

[SEC. 223]SEC. 2205. ENHANCEMENT OF FEDERAL AND NON-FEDERAL 
                    CYBERSECURITY.

    In carrying out the responsibilities under [section 201] 
section 2022, the [Under Secretary appointed under section 
103(a)(1)(H)] Director of Cybersecurity and Infrastructure 
Security shall--
          (1) * * *
                  (A) * * *
                  (B) in coordination with the Under Secretary 
                for Emergency Preparedness and Response, crisis 
                management support in response to threats to, 
                or attacks on, critical information systems; 
                [and]
          (2) * * *
          (3) * * *

[SEC. 224]SEC. 2206. NET GUARD.

    The [Assistant Secretary for Infrastructure Protection] 
Director of Cybersecurity and Infrastructure Security may 
establish a national technology guard, to be known as ``NET 
Guard'', comprised of local teams of volunteers with expertise 
in relevant areas of science and technology, to assist local 
communities to respond and recover from attacks on information 
systems and communications networks.

[SEC. 225]SEC. 2207. CYBER SECURITY ENHANCEMENT ACT OF 2002.

           *       *       *       *       *       *       *


[SEC. 226]SEC. 2208. CYBERSECURITY RECRUITMENT AND RETENTION.

           *       *       *       *       *       *       *


[SEC. 227]SEC. 2209. NATIONAL CYBERSECURITY AND COMMUNICATIONS 
                    INTEGRATION CENTER.

    (a) Definitions.--In this section.--
          (1) * * *
          (2) * * *
          (3) * * *
          (4) the term ``information sharing and analysis 
        organization'' has the meaning given that term in 
        [section 212(5)] section 2222(5);
          (5) * * *
          (6) * * *
    (b) Center.--There is in the Department a national 
cybersecurity and communications integration center (referred 
to in this section as the ``Center'') to carry out certain 
responsibilities of the [Under Secretary appointed under 
section 103(a)(1)(H)] Director. The Center shall be located in 
the Cybersecurity and Infrastructure Security Agency. The head 
of the Center shall report to the Assistant Director for 
Cybersecurity.
    (c) Functions.--The cybersecurity functions of the Center 
shall include--
          (1) * * *

           *       *       *       *       *       *       *

          (5) * * *
                  (A) * * *
                  (B) sharing the analysis conducted under 
                subparagraph (A) with Federal and non-Federal 
                entities, including the National Network of 
                Fusion Centers (as defined in section 210A), as 
                appropriate;
          (6) * * *
          (7) providing [information and recommendations] 
        information, recommendations, and best practices on 
        security and resilience measures to Federal and non-
        Federal entities, including [information and 
        recommendations] information, recommendations, and best 
        practices to--

           *       *       *       *       *       *       *

          (9) sharing cyber threat indicators, defensive 
        measures best practices, and other information related 
        to cybersecurity risks and incidents with Federal and 
        non-Federal entities, including across sectors of 
        critical infrastructure and with State and major urban 
        area fusion centers, as appropriate;
          (10) * * *
          (11) in coordination with the [Office of Emergency 
        Communications] Emergency Communications Division of 
        the Department, assessing and evaluating consequence, 
        vulnerability, and threat information regarding cyber 
        incidents to public safety communications to help 
        facilitate continuous improvements to the security and 
        resiliency of such communications.
  (d) Composition.--
          (1) In general.--The Center shall be composed of--
                  (A) * * *
                  (B) appropriate representatives of non-
                Federal entities, such as--
                          (i) State, local, and tribal 
                        governments;
                          (ii) information sharing and analysis 
                        organizations, including information 
                        sharing and analysis centers and State, 
                        local, and regional fusion centers (as 
                        defined in section 201A), as 
                        appropriate;
                          (iii) owners and operators of 
                        critical information systems; and
                          (iv) private entities;

           *       *       *       *       *       *       *

    (f) No Right or Benefit.--
          (1) In general.--The provision of assistance or 
        information to, and inclusion in the Center of, 
        governmental or private entities under this section 
        shall be at the sole and unreviewable discretion of the 
        [Under Secretary appointed under section 103(a)(1)(H)] 
        Director.
          (2) * * *
    (g) Automated Information Sharing.--
          (1) In general.--The [Under Secretary appointed under 
        section 103(a)(1)(H)] Director, in coordination with 
        industry and other stakeholders, shall develop 
        capabilities making use of existing information 
        technology industry standards and best practices, as 
        appropriate, that support and rapidly advance the 
        development, adoption, and implementation of automated 
        mechanisms for the sharing of cyber threat indicators 
        and defensive measures in accordance with title I of 
        the Cybersecurity Act of 2015.
          (2) Annual report.--The [Under Secretary appointed 
        under section 103(a)(1)(H)] Director shall submit to 
        the Committee on Homeland Security and Governmental 
        Affairs of the Senate and the Committee on Homeland 
        Security of the House of Representatives an annual 
        report on the status and progress of the development of 
        the capabilities described in paragraph (1). Such 
        reports shall be required until such capabilities are 
        fully implemented.
    (h) Voluntary Information Sharing Procedures.--
          (1) Procedures.--
                  (A) In general.--The Center may enter into a 
                voluntary information sharing relationship with 
                any consenting non-Federal entity for the 
                sharing of cyber threat indicators and 
                defensive measures for cybersecurity purposes 
                in accordance with this section. Nothing in 
                this subsection may be construed to require any 
                non-Federal entity to enter into any such 
                information sharing relationship with the 
                Center or any other entity. The Center may 
                terminate a voluntary information sharing 
                relationship under this subsection, at the sole 
                and unreviewable discretion of the Secretary, 
                acting through the [Under Secretary appointed 
                under section 103(a)(1)(H)] Director, for any 
                reason, including if the Center determines that 
                the non-Federal entity with which the Center 
                has entered into such a relationship has 
                violated the terms of this subsection.
                  (B) National security.--The Secretary may 
                decline to enter into a voluntary information 
                sharing relationship under this subsection, at 
                the sole and unreviewable discretion of the 
                Secretary, acting through the [Under Secretary 
                appointed under section 103(a)(1)(H)] Director, 
                for any reason, including if the Secretary 
                determines that such is appropriate for 
                national security.
          (2) * * *
                  (A) * * *
                  (B) Negotiated agreement.--At the request of 
                a non-Federal entity, and if determined 
                appropriate by the Center, at the sole and 
                unreviewable discretion of the Secretary, 
                acting through the [Under Secretary appointed 
                under section 103(a)(1)(H)] Director, the 
                Department shall negotiate a non-standard 
                agreement, consistent with this section.
                  (C) * * *
    (i) * * *
    (j) * * *
    (k) Outreach.--Not later than 60 days after the date of 
enactment of this subsection, the Secretary, acting through the 
[Under Secretary appointed under section 103(a)(1)(H)] 
Director, shall--

           *       *       *       *       *       *       *


[SEC. 228]SEC. 2210. CYBERSECURITY PLANS.

    (a) Definitions.--In this section--
          (1) * * *
          (2) the terms ``cybersecurity risk'' and 
        ``information system'' have the meanings given those 
        terms in [section 227] section 2209;

           *       *       *       *       *       *       *

    (c) Cyber Incident Response Plan.--The [Under Secretary 
appointed under section 103(a)(1)(H)] Director of Cybersecurity 
and Infrastructure Security shall, in coordination with 
appropriate Federal departments and agencies, State and local 
governments, sector coordinating councils, information sharing 
and analysis organizations (as defined in [section 212(5)] 
section 2222(5)), owners and operators of critical 
infrastructure, and other appropriate entities and individuals, 
develop, regularly update, maintain, and exercise adaptable 
cyber incident response plans to address cybersecurity risks 
(as defined in [section 227] section 2209) to critical 
infrastructure.
    (d) * * *

[SEC. 228A.]SEC. 2211. CYBERSECURITY STRATEGY.

    (a) * * *
    (b) Contents.--The strategy required under subsection (a) 
shall include the following:
          (1) * * *
          (2) * * *
                  (A) Cybersecurity functions set forth in [the 
                section 227] section 2209 (relating to the 
                national cybersecurity and communications 
                integration center).
                  (B) * * *
                  (C) * * *
                  (D) * * *
    (c) Considerations.--In developing the strategy required 
under subsection (a), the Secretary shall--
          (1) Consider--
                  (A) * * *
                  (B) * * *
                  (C) the most recent Quadrennial Homeland 
                Security Review issued pursuant to [section 
                707] section 706; and

           *       *       *       *       *       *       *


[SEC. 229.]SEC. 2212. CLEARANCES.

    The Secretary shall make available the process of 
application for security clearances under Executive Order 13549 
(75 Fed. Reg. 162; relating to a classified national security 
information program) or any successor Executive Order to 
appropriate representatives of sector coordinating councils, 
sector information sharing and analysis organizations (as 
defined in [section 212(5)] section 2222(5)), owners and 
operators of critical infrastructure, and any other person that 
the Secretary determines appropriate.

[SEC. 230.]SEC. 2213. FEDERAL INTRUSION DETECTION AND PREVENTION 
                    SYSTEM.

    (a) Definitions.--In this section--
          (1) * * *
          (2) * * *
          (3) the term ``agency information system'' has the 
        meaning given the term in [section 228] section 2210; 
        and
          (4) the terms ``cybersecurity risk'' and 
        ``information system'' have the meanings given those 
        terms in [section 227] section 2209.

           *       *       *       *       *       *       *


[SEC. 210E.] SEC. 2214. NATIONAL ASSET DATABASE.

  (a) * * *

           *       *       *       *       *       *       *

    [(e) Inspector General Study.--By not later than two years 
after the date of enactment of the Implementing Recommendations 
of the 9/11 Commission Act of 2007, the Inspector General of 
the Department shall conduct a study of the implementation of 
this section.]
    [(f)](e) * * *

           *       *       *       *       *       *       *


Subtitle B--Critical Infrastructure Information

           *       *       *       *       *       *       *


[SEC. 211.]SEC. 2221. SHORT TITLE.

           *       *       *       *       *       *       *


[SEC. 212.] SEC. 2222. DEFINITIONS.

    In this subtitle:
          (1) * * *

           *       *       *       *       *       *       *

          (8) Cybersecurity Risk; Incident.--The terms 
        ``cybersecurity risk'' and ``incident'' have the 
        meanings given those terms in [section 227] section 
        2209.

[SEC. 213.] SEC. 2223. DESIGNATION OF CRITICAL INFRASTRUCTURE 
                    PROTECTION PROGRAM.

           *       *       *       *       *       *       *


[SEC. 214.] SEC. 2224. PROTECTION OF VOLUNTARILY SHARED CRITICAL 
                    INFRASTRUCTURE INFORMATION.

    (a) * * *

           *       *       *       *       *       *       *

    (h) Authority to Delegate.--The President may delegate 
authority to a critical infrastructure protection program, 
designated under [section 213] section 2223, to enter into a 
voluntary agreement to promote critical infrastructure 
security, including with any Information Sharing and Analysis 
Organization, or a plan of action as otherwise defined in 
section 708 of the Defense Production Act of 1950 (50 U.S.C. 
App. 2158).

[SEC. 215.] SEC. 2225. NO PRIVATE RIGHT OF ACTION.

           *       *       *       *       *       *       *


CONSOLIDATED APPROPRIATIONS ACT OF 2016

           *       *       *       *       *       *       *


DIVISION N--CYBERSECURITY ACT OF 2015

           *       *       *       *       *       *       *


TITLE II--NATIONAL CYBERSECURITY ADVANCEMENT

           *       *       *       *       *       *       *


   Subtitle A--National Cybersecurity and Communications Integration 
Center

           *       *       *       *       *       *       *


SEC. 202. DEFINITIONS.

    In this subtitle:
          (1) * * *
          (2) Cybersecurity risk; incident.--The terms 
        ``cybersecurity risk'' and ``incident'' have the 
        meanings given those terms in section [227] 2209 of the 
        Homeland Security Act of 2002 (6 U.S.C. 148)[, as so 
        redesignated by section 223(a)(3) of this division].

           *       *       *       *       *       *       *


SEC. 207. ASSESSMENT.

    Not later than 2 years after the date of enactment of this 
Act, the Comptroller General of the United States shall submit 
to the appropriate congressional committees a report that 
includes--
          (1) * * *
          (2) to the extent practicable, findings regarding 
        increases in the sharing of cyber threat indicators, 
        defensive measures, and information relating to 
        cybersecurity risks and incidents at the center 
        established under [section 227] of the Homeland 
        Security Act of 2002[, as redesignated by section 
        223(a) of this division,] and throughout the United 
        States.

SEC. 208. MULTIPLE SIMULTANEOUS CYBER INCIDENTS AT CRITICAL 
                    INFRASTRUCTURE.

    Not later than 1 year after the date of enactment of this 
Act, the [Under Secretary appointed under section 103(a)(1)(H) 
of the Homeland Security Act of 2002 (6 U.S.C. 113(a)(1)(H))] 
Director of Cybersecurity and Infrastructure Security of the 
Department shall provide information to the appropriate 
congressional committees on the feasibility of producing a 
risk-informed plan to address the risk of multiple simultaneous 
cyber incidents affecting critical infrastructure, including 
cyber incidents that may have a cascading effect on other 
critical infrastructure.

           *       *       *       *       *       *       *


Subtitle B--Federal Cybersecurity Enhancement

           *       *       *       *       *       *       *


SEC. 222. DEFINITIONS.

    In this subtitle:
          (1) * * *
          (2) Agency information system.--The term ``agency 
        information system'' has the meaning given the term in 
        [section 228] section 2210 of the Homeland Security Act 
        of 2002[, as added by section 223(a)(4) of this 
        division].
          (3) * * *
          (4) Cybersecurity risk; information system.--The 
        terms ``cybersecurity risk'' and ``information system'' 
        have the meanings given those terms in [section 
        227]section 2209 of the Homeland Security Act of 2002[, 
        as so redesignated by section 223(a)(3) of this 
        division].

           *       *       *       *       *       *       *


SEC. 223. IMPROVED FEDERAL NETWORK SECURITY.

    (a) * * *
    (b) Agency Responsibilities.--
          (1) In general.--Except as provided in paragraph 
        (2)--
                  (A) not later than 1 year after the date of 
                enactment of this Act or 2 months after the 
                date on which the Secretary makes available the 
                intrusion detection and prevention capabilities 
                under [section 230(b)(1) of the Homeland 
                Security Act of 2002, as added by subsection 
                (a)]section 2213(b)(1) of the Homeland Security 
                Act of 2002, whichever is later, the head of 
                each agency shall apply and continue to utilize 
                the capabilities to all information traveling 
                between an agency information system and any 
                information system other than an agency 
                information system; and
                  (B) not later than 6 months after the date on 
                which the Secretary makes available 
                improvements to the intrusion detection and 
                prevention capabilities pursuant to [section 
                230(b)(2) of the Homeland Security Act of 2002 
                (6 U.S.C. 151(b)(2)), as added by subsection 
                (a)] section 2213(b)(2) of the Homeland 
                Security Act of 2002, the head of each agency 
                shall apply and continue to utilize the 
                improved intrusion detection and prevention 
                capabilities.
          (2) * * *
          (3) * * *
          (4) Rule of construction.--Nothing in this subsection 
        shall be construed to limit an agency from applying the 
        intrusion detection and prevention capabilities to an 
        information system other than an agency information 
        system under [section 230(b)(1) of the Homeland 
        Security Act of 2002, as added by subsection 
        (a)]section 2213(b)(1) of the Homeland Security Act of 
        2002, at the discretion of the head of the agency or as 
        provided in relevant policies, directives, and 
        guidelines.

           *       *       *       *       *       *       *


SEC. 226. ASSESSMENT; REPORTS.

    (a) Definitions.--In this section:
          (1) Agency information.--The term ``agency 
        information has the meaning given the term in [section 
        230] section 2213 of the Homeland Security Act of 
        2002[, as added by section 223(a)(6) of this division].
          (2) * * *
          (3) * * *
          (4) Intrusion assessment plan.--The term ``intrusion 
        detection and prevention capabilities means the plan 
        required under [section 228(b)(1)] section 2210(b)(1) 
        of the Homeland Security Act of 2002[, as added by 
        section 223(a)(4) of this division].
          (5) Intrusion detection and prevention 
        capabilities.--The term ``intrusion detection and 
        prevention capabilities' means the capabilities 
        required under [section 230(b)] section 2213(b) of the 
        Homeland Security Act of 2002[, as added by section 
        223(a)(6) of this division].
    (b) * * *
    (c) Reports to Congress.--
          (1) Intrusion detection and prevention 
        capabilities.--
                  (A) Secretary of Homeland Security report. 
                Not later than 6 months after December 18, 
                2015, and annually thereafter, the Secretary 
                shall submit to the appropriate congressional 
                committees a report on the status of 
                implementation of the intrusion detection and 
                prevention capabilities, including--
                          (i) a description of privacy 
                        controls;

           *       *       *       *       *       *       *

                          (vi) a description of the pilot 
                        established under [section 230(c)(5)] 
                        section 2213(c)(5) of the Homeland 
                        Security Act of 2002[, as added by 
                        section 223(a)(6) of this division], 
                        including the number of new 
                        technologies tested and the number of 
                        participating agencies.

           *       *       *       *       *       *       *


SEC. 227. TERMINATION.

    (a) In General.--The authority provided under [section 230] 
section 2213 of the Homeland Security Act of 2002[, as added by 
section 223(a)(6) of this division], and the reporting 
requirements under section 226(c) of this division shall 
terminate on the date that is 7 years after the date of 
enactment of this Act.
    (b) Rule of Construction.--Nothing in subsection (a) shall 
be construed to affect the limitation of liability of a private 
entity for assistance provided to the Secretary under [section 
230(d)(2)]section 2213(d)(2) of the Homeland Security Act of 
2002[, as added by section 223(a)(6) of this division], if such 
assistance was rendered before the termination date under 
subsection (a) or otherwise during a period in which the 
assistance was authorized.

           *       *       *       *       *       *       *


TITLE IV--OTHER CYBER MATTERS

           *       *       *       *       *       *       *


SEC. 404. ENHANCEMENT OF EMERGENCY SERVICES.

    (a) Collection of Data.--Not later than 90 days after the 
date of the enactment of this Act, the Secretary of Homeland 
Security, acting through the center established under [section 
227]section 2209 of the Homeland Security Act of 2002[, as 
redesignated by section 223(a)(3) of this division,] in 
coordination with appropriate Federal entities and the 
[Director for Emergency Communications]Assistant Director for 
Emergency Communications, shall establish a process by which a 
Statewide Interoperability Coordinator may report data on any 
cybersecurity risk or incident involving any information system 
or network used by emergency response providers (as defined in 
section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101)) 
within the State.
    (b) Analysis of Data.--Not later than 1 year after the date 
of the enactment of this Act, the Secretary of Homeland 
Security, acting through the Director of the National 
Cybersecurity and Communications Integration Center, in 
coordination with appropriate entities and the [Director for 
Emergency Communications] Assistant Director for Emergency 
Communications, and in consultation with the Secretary of 
Commerce, acting through the Director of the National Institute 
of Standards and Technology, shall conduct integration and 
analysis of the data reported under subsection (a) to develop 
information and recommendations on security and resilience 
measures for any information system or network used by State 
emergency response providers.

           *       *       *       *       *       *       *


INTEGRATED PUBLIC ALERT AND WARNING SYSTEM MODERNIZATION ACT OF 2015

           *       *       *       *       *       *       *


SEC. 2. INTEGRATED PUBLIC AERT AND WARNING SYSTEM MODERNIZATION.

    (a) * * *
    (b) Integrated Public Alert and Warning System 
Subcommittee.--
          (1) * * *

           *       *       *       *       *       *       *

          (6) Recommendations.--The Subcommittee shall--
                  (A) * * *
                  (B) * * *
                          (i) recommendations for common 
                        alerting and warning protocols, 
                        standards, terminology, and operating 
                        procedures for the public alert and 
                        warning system; [and]
                          (ii) * * *
                                  (I) * * *

           *       *       *       *       *       *       *

                                  (VII) provides redundant 
                                alert mechanisms, if 
                                practicable, to reach the 
                                greatest number of people 
                                regardless of whether they have 
                                access to, or use, any 
                                specified medium of 
                                communication or any particular 
                                device[.];
                          (iii) recommendations for best 
                        practices of State, tribal, and local 
                        governments to follow to maintain the 
                        integrity of the public alert and 
                        warning system, including--
                                  (I) The procedures for State, 
                                tribal, and local government 
                                officials to authenticate civil 
                                emergencies and initiate, 
                                modify, and cancel alerts 
                                transmitted through the public 
                                alert and warning system, 
                                including protocols and 
                                technology capabilities for--
                                          (aa) the initiation, 
                                        or prohibition on the 
                                        initiation, of alerts 
                                        by a single authorized 
                                        or unauthorized 
                                        individual; and
                                          (bb) testing a State, 
                                        tribal, or local 
                                        government incident 
                                        management and warning 
                                        tool without 
                                        accidentally initiating 
                                        an alert through the 
                                        public alert and 
                                        warning system;
                                  (II) the standardization, 
                                functionality, and 
                                interoperability of incident 
                                management and warning tools 
                                used by State, tribal, and 
                                local governments to notify the 
                                public of an emergency through 
                                the public alert and warning 
                                system;
                                  (III) the training and 
                                recertification of emergency 
                                management personnel on best 
                                practices for originating and 
                                transmitting an alert through 
                                the public alert and warning 
                                system; and
                                  (IV) the procedures, 
                                protocols, and guidance 
                                concerning the protective 
                                action plans that State, 
                                tribal, and local governments 
                                should issue to the public 
                                following an alert issued under 
                                the public alert and warning 
                                system.
          (7) Report.--
                  (A) Subcommittee submission.--[Not later 
                than]
                          (i) Initial report.--Not later than 1 
                        year after the date of enactment of 
                        this Act, the Subcommittee shall submit 
                        to the National Advisory Council a 
                        report containing any recommendations 
                        required to be developed under 
                        [paragraph (6)] clauses (i) and (ii) of 
                        paragraphs (6)(B) for approval by the 
                        National Advisory Council.
                                  (ii) Second report.--Not 
                                later than 18 months after the 
                                date of enactment of the 
                                Department of Homeland Security 
                                Authorization Act, the 
                                Subcommittee shall submit to 
                                the National Advisory Council a 
                                report containing any 
                                recommendations required to be 
                                developed under paragraph 
                                (6)(B)(iii) for approval by the 
                                National Advisory Council.
                  (B) Submission by national advisory 
                council.--If the National Advisory Council 
                approves the recommendations contained in the 
                [report] reports submitted under subparagraph 
                (A), the National Advisory Council shall submit 
                the [report] reports to--

           *       *       *       *       *       *       *

          (8) Termination.--The Subcommittee shall terminate 
        not later than [3] 5 years after the date of enactment 
        of this Act.
    (c) Authorization of Appropriations.--There are authorized 
to be appropriated to carry out this Act and the amendments 
made by this Act such sums as may be necessary for each of 
fiscal years 2016, 2017, and [2018] 2018, 2019, 2020, and 2021.

           *       *       *       *       *       *       *


POST-KATRINA EMERGENCY MANAGEMENT REFORM ACT

           *       *       *       *       *       *       *


TITLE VI--NATIONAL EMERGENCY MANAGEMENT

           *       *       *       *       *       *       *


SEC. 602. DEFINITIONS.

    In this title--
          (1) the term ``Administrator'' means the 
        Administrator of the Agency;

           *       *       *       *       *       *       *

          (13) the term ``[National Response Plan] National 
        Response Framework'' means the [National Response Plan] 
        National Response Framework or any successor plan 
        prepared under section [502(a)(6)] 504(a)(6) of the 
        Homeland Security Act of 2002 (as amended by this Act);

           *       *       *       *       *       *       *


Subtitle C--Comprehensive Preparedness System

           *       *       *       *       *       *       *


CHAPTER 1--NATIONAL PREPAREDNESS SYSTEM

           *       *       *       *       *       *       *



SEC. 643. NATIONAL PREPAREDNESS GOAL.

    (a) * * *
    (b) National Incident Management System and [National 
Response Plan] National Response Framework.--The national 
preparedness goal, to the greatest extent practicable, shall be 
consistent with the National Incident Management System and the 
[National Response Plan] National Response Framework.

           *       *       *       *       *       *       *


SEC. 648. TRAINING AND EXERCISES.

    (a) National Training Program.--
          (1) In general.--Beginning not later than 180 days 
        after the date of enactment of this Act, the 
        Administrator, in coordination with the heads of 
        appropriate Federal agencies, the National Council on 
        Disability, and the National Advisory Council, shall 
        carry out a national training program to implement the 
        national preparedness goal, National Incident 
        Management System, [National Response Plan] National 
        Response Framework, and other related plans and 
        strategies.
          (2) * * *
    (b) National Exercise Program.--
          (1) In general.--Beginning not later than 180 days 
        after the date of enactment of this Act, the 
        Administrator, in coordination with the heads of 
        appropriate Federal agencies, the National Council on 
        Disability, and the National Advisory Council, shall 
        carry out a national exercise program to test and 
        evaluate the national preparedness goal, National 
        Incident Management System, [National Response Plan] 
        National Response Framework, and other related plans 
        and strategies.
          (2) Requirements.--The national exercise program--
                  (A) shall be--
                          (i) * * *

           *       *       *       *       *       *       *

                          (v) designed to address the unique 
                        requirements of populations with 
                        special needs; [and]
                          (vi) * * *
                          (vii) designed, to the extent 
                        practicable, to include exercises 
                        addressing emerging terrorist threats, 
                        such as scenarios involving United 
                        States citizens departing the United 
                        States to enlist with or provide 
                        material support or resources to 
                        terrorist organizations abroad or 
                        terrorist infiltration into the United 
                        States, including United States 
                        citizens and foreign nationals; and

           *       *       *       *       *       *       *


SEC. 649. COMPREHENSIVE ASSESSMENT SYSTEM.

    (a) * * *
    (b) Performance Metrics and Measures.--The Administrator 
shall ensure that each component of the national preparedness 
system, National Incident Management System, [National Response 
Plan] National Response Framework, and other related plans and 
strategies, and the reports required under section 652 is 
developed, revised, and updated with clear and quantifiable 
performance metrics, measures, and outcomes.
    (c) Contents.--The assessment system established under 
subsection (a) shall assess--
          (1) compliance with the national preparedness system, 
        National Incident Management System, [National Response 
        Plan] National Response Framework, and other related 
        plans and strategies;

           *       *       *       *       *       *       *


[SEC. 650. REMEDIAL ACTION MANAGEMENT PROGRAM.

    [The Administrator, in coordination with the National 
Council on Disability and the National Advisory Council, shall 
establish a remedial action management program to--
          [(1) analyze training, exercises, and real-world 
        events to identify and disseminate lessons learned and 
        best practices;
          [(2) generate and disseminate, as appropriate, after 
        action reports to participants in exercises and real-
        world events; and
          [(3) conduct remedial action tracking and long-term 
        trend analysis.]

SEC. 650. REMEDIAL ACTION MANAGEMENT PROGRAM.

    (a) In General.--The Administrator, in coordination with 
the National Council on Disability and the National Advisory 
Council, shall establish a remedial action management program 
to--
          (1) analyze training, exercises, and real world 
        events to identify lessons learned, corrective actions, 
        and best practices;
          (2) generate and disseminate, as appropriate, the 
        lessons learned, corrective actions, and best practices 
        described in paragraph (1); and
          (3) conduct remedial action tracking and long-term 
        trend analysis.
    (b) Federal Corrective Actions.--The Administrator, in 
coordination with the heads of appropriate Federal departments 
and agencies, shall--
          (1) utilize the program established under subsection 
        (a) to collect information on corrective actions 
        identified by such Federal departments and agencies 
        during exercises and the response to natural disasters, 
        acts of terrorism, and other man-made disasters; and
          (2) not later than 1 year after the date of the 
        enactment of the FEMA Reauthorization Act of 2018 and 
        annually thereafter for each of the next 4 years, 
        submit to Congress a report on the status of those 
        corrective actions.
    (c) Dissemination of After Action Reports.--The 
Administrator shall provide electronically, to the maximum 
extent practicable, to Congress and Federal, State, local, 
tribal, and private sector officials after-action reports and 
information on lessons learned and best practices from 
responses to acts of terrorism, natural disasters, capstone 
exercises conducted under the national exercise program under 
section 648(b), and other emergencies or exercises.

SEC. 651. FEDERAL RESPONSE CAPABILITY INVENTORY.

    (a) * * *
    (b) * * *
    (c) Department of Defense.--The Administrator, in 
coordination with the Secretary of Defense, shall develop a 
list of organizations and functions within the Department of 
Defense that may be used, pursuant to the authority provided 
under the [National Response Plan] National Response Framework 
and sections 402, 403, and 502 of the Robert T. Stafford 
Disaster Relief and Emergency Assistance Act (42 U.S.C. 5170a, 
5170b, 5192), to provide support to civil authorities during 
natural disasters, acts of terrorism, and other man-made 
disasters.
    (d) * * *

SEC. 652. REPORTING REQUIREMENTS.

    (a) * * *
    (b) Catastrophic Resource Report.--
          (1) * * *
          (2) Contents.--Each estimate under paragraph (1) 
        shall include the resources both necessary for and 
        devoted to--
                  (A) * * *

           *       *       *       *       *       *       *

                  (F) other responsibilities under the 
                catastrophic incident annex and the 
                catastrophic incident supplement of the 
                [National Response Plan] National Response 
                Framework;
                  (G) * * *
                  (H) * * *
    (c) State Preparedness Report.--
          (1) * * *
          (2) Contents.--Each report shall include--
                  (A) an assessment of State compliance with 
                the national preparedness system, National 
                Incident Management System, [National Response 
                Plan] National Response Framework, and other 
                related plans and strategies;
                  (B) * * *
                  (C) * * *

SEC. 653. FEDERAL PREPAREDNESS.

    (a) Agency Responsibility.--In support of the national 
preparedness system, the President shall ensure that each 
Federal agency with coordinating, primary, or supporting 
responsibilities under the [National Response Plan] National 
Response Framework--
          (1) * * *

           *       *       *       *       *       *       *

          (4) develops deliberate operational plans and the 
        corresponding capabilities, including crisis planning, 
        to respond effectively to natural disasters, acts of 
        terrorism, and other man-made disasters in support of 
        the [National Response Plan] National Response 
        Framework to ensure a coordinated Federal response.
    (b) * * *
    (c) Mission Assignments.--To expedite the provision of 
assistance under the [National Response Plan] National Response 
Framework, the President shall ensure that the Administrator, 
in coordination with Federal agencies with responsibilities 
under the [National Response Plan] National Response Framework, 
develops prescripted mission assignments, including logistics, 
communications, mass care, health services, and public safety.
    (d) Coordination.--The President, acting through the 
Administrator, shall develop and provide to Federal departments 
and agencies with coordinating, primary, or supporting 
responsibilities under the National Response Framework 
performance metrics to ensure readiness to execute 
responsibilities under the emergency support functions of the 
National Response Framework.
    [(d)](e) Certification.--The President shall certify on an 
annual basis that each Federal agency with coordinating, 
primary, or supporting responsibilities under the [National 
Response Plan] National Response Framework complies with 
subsections (a) and (b).
    [(e)](f) * * *

SEC. 654. USE OF EXISTING RESOURCES.

    In establishing the national preparedness goal and national 
preparedness system, the Administrator shall use existing 
preparedness documents, planning tools, and guidelines to the 
extent practicable and consistent with this Act.

           *       *       *       *       *       *       *


Subtitle G--Authorization of Appropriations

           *       *       *       *       *       *       *


SEC. 699. AUTHORIZATION OF APPROPRIATIONS.

    There are authorized to be appropriated to carry out this 
title and the amendments made by this title for the 
[administration and operations] management and administration 
of the Agency--
          (1) for fiscal year 2008, an amount equal to the 
        amount appropriated for fiscal year 2007 for 
        [administration and operations] management and 
        administration of the Agency, multiplied by 1.1;
          (2) for fiscal year 2009, an amount equal to the 
        amount described in paragraph (1), multiplied by 1.1; 
        [and]
          (3) for fiscal year 2010, an amount equal to the 
        amount described in paragraph (2), multiplied by 
        1.1[.]; and
          (4) for fiscal year 2018, $1,049,000,000;
          (5) for fiscal year 2019, $1,065,784,000; and
          (6) for fiscal year 2020, $1,082,836,544.

           *       *       *       *       *       *       *


ROBERT T. STAFFORD DISASTER RELIEF AND EMERGENCY ASSISTANCE ACT

           *       *       *       *       *       *       *


TITLE II--DISASTER PREPAREDNESS AND MITIGATION ASSISTANCE

           *       *       *       *       *       *       *


SEC. 203. PREDISASTER HAZARD MITIGATION.

    (a) * * *
    (b) * * *
    (c) Approval by President.--If the President determines 
that a State or local government has identified natural 
disaster hazards in areas under its jurisdiction and has 
demonstrated the ability to form effective public-private 
natural disaster hazard mitigation partnerships, the President, 
using amounts in the National Public Infrastructure Predisaster 
Mitigation Fund established under subsection (i) of this 
section (referred to in this section as the ``Fund''), may 
provide technical and financial assistance to the State or 
local government to be used in accordance with subsection (e) 
of this section.
    (d) * * *
    (e) Uses of Technical and Financial Assistance.--
          (1) In general.--Technical and financial assistance 
        provided under this section--
                  (A) * * *
                  (B) may be used--
                          (i) to support effective public-
                        private natural disaster hazard 
                        mitigation partnerships;
                          (ii) to improve the assessment of a 
                        community's vulnerability to natural 
                        hazards; [or]
                          (iii) to establish hazard mitigation 
                        priorities, and an appropriate hazard 
                        mitigation plan, for a community[.]; or
                          (iv) to establish and carry out 
                        enforcement activities to implement the 
                        latest published editions of relevant 
                        consensus-based codes, specifications, 
                        and standards that incorporate the 
                        latest hazard-resistant designs and 
                        establish minimum acceptable criteria 
                        for the design, construction, and 
                        maintenance of residential structures 
                        and facilities that may be eligible for 
                        assistance under this Act for the 
                        purpose of protecting the health, 
                        safety, and general welfare of the 
                        buildings' users against disasters.
          (2) * * *
    (f) Allocation of Funds.--
          (1) In general--The President shall award financial 
        assistance under this section on a competitive basis 
        for mitigation activities that are cost effective and 
        in accordance with the criteria in subsection (g).
          (2) * * *
          (3) Redistribution of unobligated amounts.--The 
        President may--
                  (A) withdraw amounts of financial assistance 
                made available to a State (including amounts 
                made available to local governments of a State) 
                under this subsection that remain unobligated 
                by the end of the third fiscal year after the 
                fiscal year for which the amounts were 
                allocated; and
                  (B) in the fiscal year following a fiscal 
                year in which amounts were withdrawn under 
                subparagraph (A), add the amounts to any other 
                amounts available to be awarded on a 
                competitive basis pursuant to paragraph (1).
    (g) Criteria for Assistance Awards--In determining whether 
to provide technical and financial assistance to a State or 
local government under this section, the President shall 
provide financial assistance only in States that have received 
a major disaster declaration during the previous 7-year period 
and take into account--

           *       *       *       *       *       *       *

    (h) * * *
    [(i) National Predisaster Mitigation Fund--
          [(1) Establishment.--The President may establish in 
        the Treasury of the United States a fund to be known as 
        the ``National Predisaster Mitigation Fund'', to be 
        used in carrying out this section.
          [(2) Transfers to Fund.--There shall be deposited in 
        the Fund--
                  [(A) amounts appropriated to carry out this 
                section, which shall remain available until 
                expended; and
                  [(B) sums available from gifts, bequests, or 
                donations of services or property received by 
                the President for the purpose of predisaster 
                hazard mitigation.
          [(3) Expenditures from Fund.--Upon request by the 
        President, the Secretary of the Treasury shall transfer 
        from the Fund to the President such amounts as the 
        President determines are necessary to provide technical 
        and financial assistance under this section.
          [(4) Investment of amounts.--
                  [(A) In general.--The Secretary of the 
                Treasury shall invest such portion of the Fund 
                as is not, in the judgment of the Secretary of 
                the Treasury, required to meet current 
                withdrawals. Investments may be made only in 
                interest-bearing obligations of the United 
                States.
                  [(B) Acquisition of obligations.--For the 
                purpose of investments under subparagraph (A), 
                obligations may be acquired--
                          [(i) on original issue at the issue 
                        price; or
                          [(ii) by purchase of outstanding 
                        obligations at the market price.
                  [(C) Sale of obligations.--Any obligation 
                acquired by the Fund may be sold by the 
                Secretary of the Treasury at the market price.
                  [(D) Credits to fund.--The interest on, and 
                the proceeds from the sale or redemption of, 
                any obligations held in the Fund shall be 
                credited to and form a part of the Fund.
                  [(E) Transfers of amounts.--
                          [(i) In general.--The amounts 
                        required to be transferred to the Fund 
                        under this subsection shall be 
                        transferred at least monthly from the 
                        general fund of the Treasury to the 
                        Fund on the basis of estimates made by 
                        the Secretary of the Treasury.
                          [(ii) Adjustments.--Proper adjustment 
                        shall be made in amounts subsequently 
                        transferred to the extent prior 
                        estimates were in excess of or less 
                        than the amounts required to be 
                        transferred.]
    (i) National Public Infrastructure Predisaster Mitigation 
Assistance.--
          (1) In general.--The President may set aside from the 
        Disaster Relief Fund, with respect to each major 
        disaster, an amount equal to 6 percent of the estimated 
        aggregate amount of the grants to be made pursuant to 
        sections 403, 406, 407, 408, 410, and 416 for the major 
        disaster in order to provide technical and financial 
        assistance under this section.
          (2) Estimated aggregate amount.--Not later than 180 
        days after each major disaster declaration pursuant to 
        this Act, the estimated aggregate amount of grants for 
        purposes of paragraph (1) shall be determined by the 
        President and such estimated amount need not be 
        reduced, increased, or changed due to variations in 
        estimates.
          (3) No reduction in amounts.--The amount set aside 
        pursuant to paragraph (1) shall not reduce the amounts 
        otherwise made available for sections 403, 404, 406, 
        407, 408, 410, and 416 under this Act.
    [(j) Limitation on Total Amount of Financial Assistance.--
The President shall not provide financial assistance under this 
section in an amount greater than the amount available in the 
Fund.]
    [(k)](j) * * *
    [(l)](k) * * *
    [(m) Authorization of Appropriations--There are authorized 
to be appropriated to carry out this section--
          [(1) $180,000,000 for fiscal year 2011;
          [(2) $200,000,000 for fiscal year 2012;
          [(3) $200,000,000 for fiscal year 2013.]
    [(n)](l) * * *

           *       *       *       *       *       *       *


TITLE III--MAJOR DISASTER AND EMERGENCY ASSISTANCE ADMINISTRATION

           *       *       *       *       *       *       *


SEC. 306. PERFORMANCE OF SERVICES.

    (a) * * *
    (b) * * *
    (c) The Administrator of the Federal Emergency Management 
Agency may appoint temporary personnel, after serving 
continuously for 3 years, to positions in the Federal Emergency 
Management Agency in the same manner that competitive service 
employees with competitive status are considered for transfer, 
reassignment, or promotion to such positions. An individual 
appointed under this subsection shall become a career-
conditional employee, unless the employee has already completed 
the service requirements for career tenure.

           *       *       *       *       *       *       *


SEC. 324. MANAGEMENT COSTS.

    (a) Definition of Management Cost.--In this section, the 
term ``management cost'' includes any indirect cost, [any 
administrative expense, and any other expense not directly 
chargeable to] direct administrative cost, and any other 
administrative expense associated with a specific project under 
a major disaster, emergency, or disaster preparedness or 
mitigation activity or measure.
    (b) Establishment of Management Cost Rates.--
[Notwithstanding]
          (1) In general.--Notwithstanding any other provision 
        of law (including any administrative rule or guidance), 
        the President shall by regulation [establish] implement 
        management cost rates, for grantees and subgrantees, 
        that shall be used to determine contributions under 
        this Act for management costs.
          (2) Specific management costs.--The Administrator 
        shall provide for management costs, in addition to the 
        eligible project costs, to cover direct and indirect 
        costs of administering the following programs:
                  (A) Hazard mitigation.--A grantee under 
                section 404 may be reimbursed for direct and 
                indirect administrative costs in a total amount 
                of not more than 15 percent of the total amount 
                of the grant award under such section of which 
                not more than 10 percent may be used by the 
                grantee and 5 percent by the subgrantee for 
                such costs.
                  (B) Public assistance.--A grantee under 
                sections 403, 406, 407, and 502 may be 
                reimbursed direct and indirect administrative 
                costs in a total amount of not more than 12 
                percent of the total award amount under such 
                sections, of which not more than 7 percent may 
                be used by the grantee and 5 percent by the 
                subgrantee for such costs.
    (c) Review.--The President shall review the management cost 
rates established under subsection (b) not later than 3 years 
after the date of establishment of the rates and periodically 
thereafter.

           *       *       *       *       *       *       *


TITLE IV--MAJOR DISASTER ASSISTANCE PROGRAMS

           *       *       *       *       *       *       *


SEC. 430. AGENCY ACCOUNTABILITY.

    (a) Public Assistance.--Not later than 5 days after the 
date on which an award of a public assistance grant is made 
under section 406 that is in excess of $1,000,000, the 
Administrator of the Federal Emergency Management Agency 
(referred to in this section as the `Administrator') shall 
publish on the website of the Federal Emergency Management 
Agency (referred to in this section as the `Agency') the 
specifics of each such grant award, including identifying--
          (1) the Federal Emergency Management Agency Region;
          (2) the major disaster or emergency declaration 
        number;
          (3) the State, county, and applicant name;
          (4) if the applicant is a private nonprofit 
        organization;
          (5) the damage category code;
          (6) the amount of the Federal share obligated; and
          (7) the date of the award.
    (b) Mission Assignments.--
          (1) In general.--Not later than 5 days after the date 
        on which a mission assignment or mission assignment 
        task order is issued under section 402(1) or section 
        502(a)(1), the Administrator shall publish on the 
        website of the Agency any mission assignment or mission 
        assignment task order to another Federal department or 
        agency regarding a major disaster in excess of 
        $1,000,000, including--
                  (A) the name of the impacted State or Indian 
                tribe;
                  (B) the major disaster declaration for such 
                State or Indian tribe;
                  (C) the assigned agency;
                  (D) the assistance requested;
                  (E) a description of the major disaster;
                  (F) the total cost estimate;
                  (G) the amount obligated;
                  (H) the State or tribal cost share, if 
                applicable;
                  (I) the authority under which the mission 
                assignment or mission assignment task order was 
                directed; and
                  (J) if applicable, the date on which a State 
                or Indian tribe requested the mission 
                assignment.
          (2) Recording changes.--Not later than 10 days after 
        the last day of each month until a mission assignment 
        or mission assignment task order described in paragraph 
        (1) is completed and closed out, the Administrator 
        shall update any changes to the total cost estimate and 
        the amount obligated.
    (c) Disaster Relief Monthly Report.--Not later than 10 days 
after the first day of each month, the Administrator shall 
publish reports on the website of the Agency, including a 
specific description of the methodology and the source data 
used in developing such reports, including--
          (1) an estimate of the amounts for the fiscal year 
        covered by the President's most recent budget pursuant 
        to section 1105(a) of title 31, United States Code, 
        including--
                  (A) the unobligated balance of funds to be 
                carried over from the prior fiscal year to the 
                budget year;
                  (B) the unobligated balance of funds to be 
                carried over from the budget year to the year 
                after the budget year;
                  (C) the amount of obligations for 
                noncatastrophic events for the budget year;
                  (D) the amount of obligations for the budget 
                year for catastrophic events, as defined under 
                the National Response Framework, delineated by 
                event and by State;
                  (E) the total amount that has been previously 
                obligated or will be required for catastrophic 
                events delineated by event and by State for all 
                prior years, the current fiscal year, the 
                budget year, and each fiscal year thereafter;
                  (F) the amount of previously obligated funds 
                that will be recovered for the budget year;
                  (G) the amount that will be required for 
                obligations for emergencies, major disasters, 
                fire management assistance grants, as described 
                in section 420, surge activities, and disaster 
                readiness and support activities; and
                  (H) the amount required for activities not 
                covered under section 251(b)(2)(D)(iii) of the 
                Balanced Budget and Emergency Deficit Control 
                Act of 1985 (2 U.S.C. 901(b)(2)(D)(iii));
          (2) a summary of the amount for disaster relief of--
                  (A) appropriations made available by source;
                  (B) the transfers executed;
                  (C) the previously allocated funds recovered; 
                and
                  (D) the commitments, allocations, and 
                obligations made;
          (3) a table of disaster relief activity delineated by 
        month, including--
                  (A) the beginning and ending balances;
                  (B) the total obligations to include amounts 
                obligated for fire assistance, emergencies, 
                surge, and disaster support activities;
                  (C) the obligations for catastrophic events 
                delineated by event and by State; and
                  (D) the amount of previously obligated funds 
                that are recovered;
          (4) a summary of allocations, obligations, and 
        expenditures for catastrophic events delineated by 
        event;
          (5) the cost with respect to--
                  (A) public assistance;
                  (B) individual assistance;
                  (C) mitigation;
                  (D) administrative activities;
                  (E) operations; and
                  (F) any other relevant category (including 
                emergency measures and disaster resources) 
                delineated by major disaster; and
          (6) the date on which funds appropriated will be 
        exhausted.
    (d) Contracts.--
          (1) Information.--
                  (A) In general.--Not later than 10 days after 
                the first day of each month, the Administrator 
                shall publish on the website of the Agency the 
                specifics of each contract in excess of 
                $1,000,000 that the Agency enters into during 
                the previous month, including--
                          (i) the name of the party;
                          (ii) the date the contract was 
                        awarded;
                          (iii) the amount and scope of the 
                        contract;
                          (iv) if the contract was awarded 
                        through competitive bidding process;
                          (v) if no competitive bidding process 
                        was used, the reason why competitive 
                        bidding was not used; and
                          (vi) the authority used to bypass the 
                        competitive bidding process.
                  (B) Requirement.--The information required to 
                be published under subparagraph (A) shall be 
                delineated by major disaster, if applicable, 
                and specify the damage category code, if 
                applicable.
          (2) Report.--Not later than 10 days after the last 
        day of the fiscal year, the Administrator shall provide 
        a report to the Committee on Homeland Security and 
        Governmental Affairs of the Senate and the Committee on 
        Transportation and Infrastructure of the House of 
        Representatives summarizing the following information 
        for the preceding fiscal year:
                  (A) The number of contracts awarded without 
                competitive bidding.
                  (B) The reasons why a competitive bidding 
                process was not used.
                  (C) The total amount of contracts awarded 
                with no competitive bidding.
                  (D) The damage category codes, if applicable, 
                for contracts awarded without competitive 
                bidding.

           *       *       *       *       *       *       *


UNITED STATES CODE

           *       *       *       *       *       *       *


TITLE 5--GOVERNMENT ORGANIZATION AND EMPLOYEES

           *       *       *       *       *       *       *


PART III--EMPLOYEES

           *       *       *       *       *       *       *


Subpart C--Employee Performance

           *       *       *       *       *       *       *


CHAPTER 45--INCENTIVE AWARDS

           *       *       *       *       *       *       *


Table of Sections
     * * * * * * *
4512. Agency Awards for cost savings disclosures.
4512A. Department of Homeland Security awards for cost savings 
          disclosures.

           *       *       *       *       *       *       *


Subchapter I--Awards for Superior Accomplishments

           *       *       *       *       *       *       *



SEC. 4509. PROHIBITION OF CASH AWARD TO EXECUTIVE SCHEDULE OFFICERS.

    (a) No officer may receive a cash award under the 
provisions of this subchapter, if such officer--
          (1) * * *
          (2) was appointed to such position by the President, 
        by and with the advice and consent of the Senate.
    (b) The Secretary of Homeland Security may not receive a 
cash award under this subchapter.

           *       *       *       *       *       *       *


SEC. 4512. * * *

SEC. 4512A. DEPARTMENT OF HOMELAND SECURITY AWARDS FOR COST SAVINGS 
                    DISCLOSURES.

    (a) In this section, the term `surplus operations and 
support funds' means amounts made available for the operations 
and support account, or equivalent account, of the Department 
of Homeland Security, or a component thereof--
          (1) that are identified by an employee of the 
        Department of Homeland Security under subsection (b) as 
        unnecessary;
          (2) that the Inspector General of the Department of 
        Homeland Security determines are not required for the 
        purpose for which the amounts were made available;
          (3) that the Chief Financial Officer of the 
        Department of Homeland Security determines are not 
        required for the purpose for which the amounts were 
        made available; and
          (4) the rescission of which would not be detrimental 
        to the full execution of the purposes for which the 
        amounts were made available.
  (b) The Inspector General of the Department of Homeland 
Security may pay a cash award to any employee of the Department 
of Homeland Security whose disclosure of fraud, waste, or 
mismanagement or identification of surplus operations and 
support funds to the Inspector General of the Department of 
Homeland Security has resulted in cost savings for the 
Department of Homeland Security. The amount of an award under 
this section may not exceed the lesser of--
          (1) $10,000; or
          (2) an amount equal to 1 percent of the Department of 
        Homeland Security's cost savings which the Inspector 
        General determines to be the total savings attributable 
        to the employee's disclosure or identification.
For purposes of paragraph (2), the Inspector General may take 
into account Department of Homeland Security cost savings 
projected for subsequent fiscal years which will be 
attributable to such disclosure or identification.
    (c)
          (1) The Inspector General of the Department of 
        Homeland Security shall refer to the Chief Financial 
        Officer of the Department of Homeland Security any 
        potential surplus operations and support funds 
        identified by an employee that the Inspector General 
        determines meets the requirements under paragraphs (2) 
        and (4) of subsection (a), along with any 
        recommendations of the Inspector General.
          (2)
                  (A) If the Chief Financial Officer of the 
                Department of Homeland Security determines that 
                potential surplus operations and support funds 
                referred under paragraph (1) meet the 
                requirements under subsection (a), except as 
                provided in subsection (d), the Secretary of 
                Homeland Security shall transfer the amount of 
                the surplus operations and support funds from 
                the applicable appropriations account to the 
                general fund of the Treasury.
                  (B) Any amounts transferred under 
                subparagraph (A) shall be deposited in the 
                Treasury and used for deficit reduction, except 
                that in the case of a fiscal year for which 
                there is no Federal budget deficit, such 
                amounts shall be used to reduce the Federal 
                debt (in such manner as the Secretary of the 
                Treasury considers appropriate).
          (3) The Inspector General of the Department of 
        Homeland Security and the Chief Financial Officer of 
        the Department of Homeland Security shall issue 
        standards and definitions for purposes of making 
        determinations relating to potential surplus operations 
        and support funds identified by an employee under this 
        subsection.
    (d)
          (1) The Secretary of Homeland Security may retain not 
        more than 10 percent of amounts to be transferred to 
        the general fund of the Treasury under subsection 
        (c)(2).
          (2) Amounts retained by the Secretary of Homeland 
        Security under paragraph (1) may be--
                  (A) used for the purpose of paying a cash 
                award under subsection (b) to one or more 
                employees who identified the surplus operations 
                and support funds; and
                  (B) to the extent amounts remain after paying 
                cash awards under subsection (b), transferred 
                or reprogrammed for use by the Department of 
                Homeland Security, in accordance with any 
                limitation on such a transfer or reprogramming 
                under any other provision of law.
    (e)
          (1) Not later than October 1 of each fiscal year, the 
        Secretary of Homeland Security shall submit to the 
        Secretary of the Treasury a report identifying the 
        total savings achieved during the previous fiscal year 
        through disclosures of possible fraud, waste, or 
        mismanagement and identifications of surplus operations 
        and support funds by an employee.
          (2) Not later than September 30 of each fiscal year, 
        the Secretary of Homeland Security shall submit to the 
        Secretary of the Treasury a report that, for the 
        previous fiscal year--
                  (A) describes each disclosure of possible 
                fraud, waste, or mismanagement or 
                identification of potentially surplus 
                operations and support funds by an employee of 
                the Department of Homeland Security determined 
                by the Department of Homeland Security to have 
                merit; and
                  (B) provides the number and amount of cash 
                awards by the Department of Homeland Security 
                under subsection (b).
          (3) The Secretary of Homeland Security shall include 
        the information described in paragraphs (1) and (2) in 
        each budget request of the Department of Homeland 
        Security submitted to the Office of Management and 
        Budget as part of the preparation of the budget of the 
        President submitted to Congress under section 1105(a) 
        of title 31.
          (4) The Secretary of the Treasury shall submit to the 
        Committee on Appropriations of the Senate, the 
        Committee on Appropriations of the House of 
        Representatives, and the Government Accountability 
        Office an annual report on Federal cost saving and 
        awards based on the reports submitted under paragraphs 
        (1) and (2).
    (f) The Director of the Office of Personnel Management 
shall--
          (1) ensure that the cash award program of the 
        Department of Homeland Security complies with this 
        section; and
          (2) submit to Congress an annual certification 
        indicating whether the cash award program of the 
        Department of Homeland Security complies with this 
        section.
    (g) Not later than 3 years after the date of enactment of 
this section, and every 3 years thereafter, the Comptroller 
General of the United States shall submit to Congress a report 
on the operation of the cost savings and awards program under 
this section, including any recommendations for legislative 
changes.

           *       *       *       *       *       *       *


Subpart D--Pay and Allowances

           *       *       *       *       *       *       *


CHAPTER 53--PAY AND RATES SYSTEM

           *       *       *       *       *       *       *



Subchapter II--Executive Schedule Pay Rates

           *       *       *       *       *       *       *


SEC. 5314. POSITIONS AT LEVEL III.

    Level III of the Executive Schedule applies to the 
following positions, for which the annual rate of basic pay 
shall be the rate determined with respect to such level under 
chapter 11 of title 2, as adjusted by section 5318 of this 
title:

           *       *       *       *       *       *       *

    Under Secretaries, Department of Homeland Security.
    Director, Cybersecurity and Infrastructure Security Agency.

           *       *       *       *       *       *       *


SEC. 5315 POSITIONS AT LEVEL IV.

    Level IV of the Executive Schedule applies to the following 
positions, for which the annual rate of basic pay shall be the 
rate determined with respect to such level under chapter 11 of 
title 2, as adjusted by section 5318 of this title:

           *       *       *       *       *       *       *

    Assistant Secretaries, Department of Homeland Security.
    Assistant Director for Cybersecurity, Cybersecurity and 
Infrastructure Security Agency 
    Assistant Director for Infrastructure Security, 
Cybersecurity and Infrastructure Security Agency.

           *       *       *       *       *       *       *


SEC. 10102. STRATEGIC HUMAN CAPITAL PLAN.

    (a) * * *
    (b) * * *
    (c) Annual Updates.--Not later than May 1, [2007] 2018, and 
May 1st of each of the next 5 succeeding years, the 
Administrator shall submit to the appropriate committees of 
Congress an update on the strategic human capital plan, 
including an assessment by the Administrator, using results-
oriented performance measures, of the progress of the 
Department and the Agency in implementing the strategic human 
capital plan.

           *       *       *       *       *       *       *


TITLE 6--DOMESTIC SECURITY

           *       *       *       *       *       *       *


CHAPTER 4--TRANSPORTATION SECURITY

           *       *       *       *       *       *       *



Subchapter I--Transportation Security Planning and Information Sharing

           *       *       *       *       *       *       *



SEC. 1102. NATIONAL PREPAREDNESS CONSORTIUM.

    (a) * * *
    (b) Members.--Members of the National Domestic Preparedness 
Consortium shall consist of--
          (1) * * *

           *       *       *       *       *       *       *

          (4) the National Emergency Response and [Rescue] 
        Recovery Training Center, Texas A&M; University;

           *       *       *       *       *       *       *

    (c) Duties.--The National Domestic Preparedness Consortium 
shall identify, develop, test, and deliver training to State, 
local, and tribal emergency response providers, provide on-site 
and mobile training at the performance and management and 
planning levels to the extent practicable, provide training in 
settings that simulate eal response environments, such as urban 
areas, and facilitate the delivery of training by the training 
partners of the Department.
    (d) Authorization of Appropriations.--There are authorized 
to be appropriated to the Secretary--
          [(1) for the Center for Domestic Preparedness--
                  [(A) $57,000,000 for fiscal year 2008;
                  [(B) $60,000,000 for fiscal year 2009;
                  [(C) $63,000,000 for fiscal year 2010; and
                  [(D) $66,000,000 for fiscal year 2011; and]
          [(2) for the National Energetic Materials Research 
        and Testing Center, the National Center for Biomedical 
        Research and Training, the National Emergency Response 
        and [Rescue]Recovery Training Center, the National 
        Exercise Test, and Training Center, the Transportation 
        Technology Center, Incorporated, and the National 
        Disaster Preparedness Training Center each--
                  [(A) $22,000,000 for fiscal year 2008;
                  [(B) $23,000,000 for fiscal year 2009;
                  [(C) $24,000,000 for fiscal year 2010; and
                  [(D) $25,000,000 for fiscal year 2011.]
          (1) for the Center for Domestic Preparedness--
                  (A) $63,939,000 for fiscal year 2018;
                  (B) $64,962,024 for fiscal year 2019; and
                  (C) $66,001,416 for fiscal year 2020; and
          (2) for the members of the National Domestic 
        Preparedness Consortium described in paragraphs (2) 
        through (7) of subsection (b)--
                  (A) $101,000,000 for fiscal year 2018;
                  (B) $102,606,000 for fiscal year 2019; and
                  (C) $104,247,856 for fiscal year 2020.
    (e) Savings Provision.--From the amounts appropriated 
pursuant to this section, the Secretary shall ensure that 
future amounts provided to [each of the following entities] 
members of the National Domestic Preparedness Consortium 
enumerated in subsection (b) are not less than the amounts 
provided to each such entity for participation in the 
Consortium in fiscal year [2007--]2005.
          [(1) the Center for Domestic Preparedness;
          (2) the National Energetic Materials Research and 
        Testing Center, New Mexico Institute of Mining and 
        Technology;
          (3) the National Center for Biomedical Research and 
        Training, Louisiana State University;
          (4) the National Emergency Response and [Rescue] 
        Recovery Training Center, Texas A&M; University; and
          (5) the National Exercise, Test, and Training Center, 
        Nevada Test Site.]

           *       *       *       *       *       *       *


Subchapter III--Public Transportation Security

           *       *       *       *       *       *       *



SEC. 1135. PUBLIC TRANSPORTATION SECURITY ASSISTANCE.

    (a) * * *
    (b) Use of Funds.--A recipient of a grant under subsection 
(a) shall use the grant funds for one or more of the following:
          (1) * * *
          (2) Operating uses of funds, including--
                  (A) security training and costs associated 
                with filling the positions of employees 
                receiving training during their absense, 
                including training under section 1137 of this 
                title and training developed by institutions of 
                higher education and by nonprofit employee 
                labor organizations, for public transportation 
                employees, including frontline employees;

           *       *       *       *       *       *       *

    [(m) Authorization of Appropriations.--
          [(1) There are authorized to be appropriated to the 
        Secretary to make grants under this section--
                  [(A) such sums as are necessary for fiscal 
                year 2007;
                  [(B) $650,000,000 for fiscal year 2008, 
                except that not more than 50 percent of such 
                funds may be used for operational costs under 
                subsection (b)(2);
                  [(C) $750,000,000 for fiscal year 2009, 
                except that not more than 30 percent of such 
                funds may be used for operational costs under 
                subsection (b)(2);
                  [(D) $900,000,000 for fiscal year 2010, 
                except that not more than 20 percent of such 
                funds may be used for operational costs under 
                subsection (b)(2); and
                  [(E) $1,100,000,000 for fiscal year 2011, 
                except that not more than 10 percent of such 
                funds may be used for operational costs under 
                subsection (b)(2).
          [(2) Period of availability.--Sums appropriated to 
        carry out this section shall remain available until 
        expended.
          [(3) Waiver.--The Secretary may waive the limitation 
        on operational costs specified in subparagraphs (B) 
        through (E) of paragraph (1) if the Secretary 
        determines that such a waiver is required in the 
        interest of national security, and if the Secretary 
        provides a written justification to the appropriate 
        congressional committees prior to any such action.
          [(4) Effective date.--Funds provided for fiscal year 
        2007 transit security grants under Public Law 110-28 
        shall be allocated based on security assessments that 
        are in existence as of August 3, 2007.]
    (m) Periods of Performance.--Funds provided pursuant to a 
grant awarded under this section for a use specified in 
subsection (b) shall remain available for use by a grant 
recipient for a period of not fewer than 36 months.

           *       *       *       *       *       *       *


TITLE 15--COMMERCE AND TRADE

           *       *       *       *       *       *       *


CHAPTER 14A--AID TO SMALL BUSINESS

           *       *       *       *       *       *       *



SEC. 648. SMALL BUSINESS DEVELOPMENT CENTER PROGRAM AUTHORIZATION.

    (a) * * *
      (1) * * *

           *       *       *       *       *       *       *

          (8) Cybersecurity Assistance.--
                  (A) In general.--The Department of Homeland 
                Security, and any other Federal department or 
                agency in coordination with the Department of 
                Homeland Security, may leverage small business 
                development centers to provide assistance to 
                small business concerns by disseminating 
                information relating to cybersecurity risks and 
                other homeland security matters to help small 
                business concerns in developing or enhancing 
                cybersecurity infrastructure, awareness of 
                cyber threat indicators, and cyber training 
                programs for employees.
                  (B) Definitions.--In this paragraph, the 
                terms ``cybersecurity risk'' and ``cyber threat 
                indicator'' have the meanings given such terms, 
                respectively, under [section 227(a) of the 
                Homeland Security Act of 2002 (6 U.S.C. 
                148(a))] section 2209(a) of the Homeland 
                Security Act of 2002.

           *       *       *       *       *       *       *


TITLE 19--CUSTOMS DUTIES

           *       *       *       *       *       *       *


CHAPTER 4--THE TARIFF ACT OF 1930

           *       *       *       *       *       *       *



Subtitle III--Administrative Provisions

           *       *       *       *       *       *       *


PART II--REPORT, ENTRY, AND UNLOADING OF VESSELS AND VEHICLES

           *       *       *       *       *       *       *



SEC. 1431. MANIFESTS.

    (a) * * *
    (b) * * *
    (c) * * *
          (1) * * *
          [(2) The information listed in paragraph (1) shall 
        not be available for public disclosure if--
                  [(A) the Secretary of the Treasury makes an 
                affirmative finding on a shipment-by-shipment 
                basis that disclosure is likely to pose a 
                threat of personal injury or property damage; 
                or
                  [(B) the information is exempt under the 
                provisions of section 552(b)(1) of title 5.]
          (A) The information listed in paragraph (1) shall not 
        be available for public disclosure if--
                  (i) the Secretary of the Treasury makes an 
                affirmative finding on a shipment-by-shipment 
                basis that disclosure is likely to pose a 
                threat of personal injury or property damage; 
                or
                  (ii) the information is exempt under the 
                provisions of section 552(b)(1) of title 5, 
                United States Code.
          (B) The Commissioner of U.S. Customs and Border 
        Protection shall ensure that any personally 
        identifiable information, including social security 
        numbers, passport numbers, and residential addresses, 
        is removed from any manifest signed, produced, 
        delivered, or transmitted under this section before the 
        manifest is disclosed to the public.

           *       *       *       *       *       *       *


TITLE 42--THE PUBLIC HEALTH AND WELFARE

           *       *       *       *       *       *       *


CHAPTER 6A--PUBLIC HEALTH SERVICE

           *       *       *       *       *       *       *



 Subchapter XXVI--National All-Hazards Preparedness for Public Health 
Emergencies

           *       *       *       *       *       *       *



   PART A--NATIONAL ALL-HAZARDS PREPAREDNESS AND RESPONSE PLANNING, 
COORDINATION, AND REPORTING

           *       *       *       *       *       *       *



SEC. 300HH. PUBLIC HEALTH AND MEDICAL PREPAREDNESS AND RESPONSE 
                    FUNCTIONS.

    (a) In General.--The Secretary of Health and Human Services 
shall lead all Federal public health and medical response to 
public health emergencies and incidents covered by [the 
National Response Plan developed pursuant to section 502(6) of 
the Homeland Security Act of 2002] the National Response 
Framework developed pursuant to section 504(a)(6) of the 
Homeland Security Act of 2002 (2 U.S.C. 314(a)(6)), or any 
successor plan.

           *       *       *       *       *       *       *


TITLE 46--SHIPPING

           *       *       *       *       *       *       *


Subtitle VII--Security and Drug Enforcement

           *       *       *       *       *       *       *


CHAPTER 701--PORT SECURITY

           *       *       *       *       *       *       *



Subchapter I--General

           *       *       *       *       *       *       *



SEC. 70107. GRANTS.

    (a) * * *

           *       *       *       *       *       *       *

    [(l) Authorization of Appropriations.--There are authorized 
to be appropriated $400,000,000 for each of the fiscal years 
2007 through 2013 to carry out this section.]
    [(m)](l) * * *
    (m) Period of Performance.--The Secretary shall make funds 
under this section available for use by a recipient of a grant 
for a period of not less than 36 months.

           *       *       *       *       *       *       *


TITLE 50--WAR AND NATIONAL DEFENSE

           *       *       *       *       *       *       *


CHAPTER 40--DEFENSE AGAINST WEAPONS OF MASS DESTRUCTION ACT OF 1996

           *       *       *       *       *       *       *



Subchapter I--Domestic Preparedness

           *       *       *       *       *       *       *



SEC. 2314. CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR, AND HIGH-YIELD 
                    EXPLOSIVES RESPONSE TEAM.

    (a) * * *
    (b) Addition to Federal Response Plans.--The Secretary of 
Homeland Security shall incorporate into the [National Response 
Plan prepared pursuant to section 502(6)\1\ of the Homeland 
Security Act of 2002 (6 U.S.C. 312(6))] National Response 
Framework prepared pursuant to section 504(a)(6) of the 
Homeland Security Act of 2002 (6 U.S.C. 314(a)(6)), other 
existing Federal emergency response plans, and programs 
prepared under section 5196(b) of title 42 guidance on the use 
and deployment of the rapid response teams established under 
this section to respond to emergencies involving weapons of 
mass destruction. The Secretary of Homeland Security shall 
carry out this subsection in coordination with the Secretary of 
Defense and the heads of other Federal agencies involved with 
the emergency response plans.

           *       *       *       *       *       *       *


                                  [all]