<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><bill xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.10.xsd">
<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>115 HR 6400 ENR: To require the Secretary of Homeland Security to conduct a threat and operational analysis of ports of entry, and for other purposes.</dc:title>
<dc:type>House Bill</dc:type><docNumber>6400</docNumber><citableAs>115 HR 6400 ENR</citableAs>
<citableAs>115hr6400enr</citableAs>
<citableAs>115 H.R. 6400 ENR</citableAs>
<dc:creator>United States House of Representatives</dc:creator><dc:publisher>United States Government Publishing Office</dc:publisher><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights><docStage>ENR</docStage>
<processedBy>GPO Locator to USLM Converter 3.11.8;Stage2.20220127</processedBy><processedDate>2023-01-02</processedDate>
<congress>115</congress><session>2</session><publicPrivate>public</publicPrivate>
</meta>
<preface><dc:type>H. R.</dc:type><docNumber>6400</docNumber>

<congress style="-uslm-lc:I665502" value="115">One Hundred Fifteenth Congress of the United States of America</congress><session style="-uslm-lc:I665503" value="2">A T T  H  E S  E  C  O  N  D S  E  S  S  I  O  N</session>
<enrolledDateline style="-uslm-lc:I665504">Begun and held at the City of Washington on Wednesday, the third day of January, two thousand and eighteen</enrolledDateline>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize18" style="-uslm-lc:I665505">An Act</docTitle>
<officialTitle class="centered fontsize8" style="-uslm-lc:I665511">To require the Secretary of Homeland Security to conduct a threat and operational analysis of ports of entry, and for other purposes.<?GPOvSpace 08?></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I650120">  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</enactingFormula>
<section id="d18728e62" identifier="/us/bill/115/hr/6400/s1" style="-uslm-lc:I650146"><num value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I650120">  This Act may be cited as the “<shortTitle role="act">United States Ports of Entry Threat and Operational Review Act</shortTitle>”.</content></section>
<section id="d18728e72" identifier="/us/bill/115/hr/6400/s2" style="-uslm-lc:I650141"><num value="2">SEC. 2. </num><heading>PORTS OF ENTRY THREAT AND OPERATIONAL ANALYSIS.</heading><subsection class="indentUp0 firstIndent1 fontsize10" id="d18728e76" identifier="/us/bill/115/hr/6400/s2/a" style="-uslm-lc:I650120"><num style="-uslm-lc:emspace2" value="a">(a) </num><heading><inline class="smallCaps">In General</inline>.—</heading><paragraph class="indentUp1 firstIndent1 fontsize10" id="d18728e83" identifier="/us/bill/115/hr/6400/s2/a/1" style="-uslm-lc:I650122"><num style="-uslm-lc:emspace2" value="1">(1) </num><heading><inline class="smallCaps">Requirement</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Secretary of Homeland Security, acting through the Commissioner of U.S. Customs and Border Protection, shall submit to the Committee on Homeland Security and the Committee on Ways and Means of the House of Representatives and the Committee on Homeland Security and Governmental Affairs and the Committee on Finance of the Senate a threat and operational analysis of ports of entry.</content></paragraph><paragraph class="indentUp1 firstIndent1 fontsize10" id="d18728e91" identifier="/us/bill/115/hr/6400/s2/a/2" style="-uslm-lc:I650122"><num style="-uslm-lc:emspace2" value="2">(2) </num><heading><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The threat and operational analysis required under paragraph (1) shall include an assessment of the following:</chapeau><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e99" identifier="/us/bill/115/hr/6400/s2/a/2/A" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>Current and potential threats posed by individuals and organized groups seeking—</chapeau><clause class="indentUp1 firstIndent1 fontsize10" id="d18728e103" identifier="/us/bill/115/hr/6400/s2/a/2/A/i" style="-uslm-lc:I650126"><num style="-uslm-lc:emspace2" value="i">(i) </num><content>to exploit security vulnerabilities at ports of entry; or</content></clause><clause class="indentUp1 firstIndent1 fontsize10" id="d18728e107" identifier="/us/bill/115/hr/6400/s2/a/2/A/ii" style="-uslm-lc:I650126"><num style="-uslm-lc:emspace2" value="ii">(ii) </num><content>to unlawfully enter the United States through such ports of entry.</content></clause></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e111" identifier="/us/bill/115/hr/6400/s2/a/2/B" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="B">(B) </num><content>Methods and pathways used to exploit security vulnerabilities at ports of entry.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e115" identifier="/us/bill/115/hr/6400/s2/a/2/C" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="C">(C) </num><content>Improvements needed at ports of entry to prevent the unlawful movement of people, illicit drugs, and other contraband across the borders of the United States.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e119" identifier="/us/bill/115/hr/6400/s2/a/2/D" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="D">(D) </num><chapeau>Improvements needed to enhance travel and trade facilitation and reduce wait times at ports of entry, including—</chapeau><clause class="indentUp1 firstIndent1 fontsize10" id="d18728e123" identifier="/us/bill/115/hr/6400/s2/a/2/D/i" style="-uslm-lc:I650126"><num style="-uslm-lc:emspace2" value="i">(i) </num><content>security vulnerabilities associated with prolonged wait times;</content></clause><clause class="indentUp1 firstIndent1 fontsize10" id="d18728e127" identifier="/us/bill/115/hr/6400/s2/a/2/D/ii" style="-uslm-lc:I650126"><num style="-uslm-lc:emspace2" value="ii">(ii) </num><content>current technology at ports of entry that can be adapted to handle more volume, increase efficiency, and improve accuracy of detection efforts; and</content></clause><clause class="indentUp1 firstIndent1 fontsize10" id="d18728e131" identifier="/us/bill/115/hr/6400/s2/a/2/D/iii" style="-uslm-lc:I650126"><num style="-uslm-lc:emspace2" value="iii">(iii) </num><content>infrastructure additions and upgrades.</content></clause></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e135" identifier="/us/bill/115/hr/6400/s2/a/2/E" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="E">(E) </num><chapeau>Processes conducted at ports of entry that do not require law enforcement training and could be—</chapeau><clause class="indentUp1 firstIndent1 fontsize10" id="d18728e139" identifier="/us/bill/115/hr/6400/s2/a/2/E/i" style="-uslm-lc:I650126"><num style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>filled with—</chapeau><subclause class="indentUp1 firstIndent1 fontsize10" id="d18728e143" identifier="/us/bill/115/hr/6400/s2/a/2/E/i/I" style="-uslm-lc:I650128"><num style="-uslm-lc:emspace2" value="I">(I) </num><content>non-law enforcement staff; or</content></subclause><subclause class="indentUp1 firstIndent1 fontsize10" id="d18728e147" identifier="/us/bill/115/hr/6400/s2/a/2/E/i/II" style="-uslm-lc:I650128"><num style="-uslm-lc:emspace2" value="II">(II) </num><content>the private sector, for processes or activities determined to not be inherently governmental (as such term is defined in section 5 of the Federal Activities Inventory Reform Act of 1998 (<ref href="/us/pl/105/270">Public Law 105–270</ref>)); or</content></subclause></clause><clause class="indentUp1 firstIndent1 fontsize10" id="d18728e155" identifier="/us/bill/115/hr/6400/s2/a/2/E/ii" style="-uslm-lc:I650126"><num style="-uslm-lc:emspace2" value="ii">(ii) </num><content>automated.</content></clause></subparagraph></paragraph><paragraph class="indentUp1 firstIndent1 fontsize10" id="d18728e159" identifier="/us/bill/115/hr/6400/s2/a/3" style="-uslm-lc:I650122"><num style="-uslm-lc:emspace2" value="3">(3) </num><heading><inline class="smallCaps">Analysis requirements</inline>.—</heading><chapeau>In compiling the threat and operational analysis required under paragraph (1), the Secretary of Homeland Security, acting through the Commissioner of U.S. Customs and Border Protection, shall consider and examine the following:</chapeau><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e167" identifier="/us/bill/115/hr/6400/s2/a/3/A" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="A">(A) </num><content>Personnel needs, including K–9 Units, and estimated costs, at each port of entry, including such needs and challenges associated with recruitment and hiring.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e171" identifier="/us/bill/115/hr/6400/s2/a/3/B" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="B">(B) </num><content>Technology needs, including radiation portal monitors and non-intrusive inspection technology, and estimated costs at each port of entry.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e175" identifier="/us/bill/115/hr/6400/s2/a/3/C" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="C">(C) </num><content>Infrastructure needs and estimated costs at each port of entry.</content></subparagraph></paragraph></subsection><subsection class="indentUp0 firstIndent1 fontsize10" id="d18728e179" identifier="/us/bill/115/hr/6400/s2/b" style="-uslm-lc:I650120"><num style="-uslm-lc:emspace2" value="b">(b) </num><heading><inline class="smallCaps">Ports of Entry Strategy and Implementation Plan</inline>.—</heading><paragraph class="indentUp1 firstIndent1 fontsize10" id="d18728e186" identifier="/us/bill/115/hr/6400/s2/b/1" style="-uslm-lc:I650122"><num style="-uslm-lc:emspace2" value="1">(1) </num><heading><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 270 days after the submission of the threat and operational analysis required under subsection (a) and every 5 years thereafter for 10 years, the Secretary of Homeland Security, acting through the Commissioner of U.S. Customs and Border Protection (CBP), shall provide to the Committee on Homeland Security and the Committee on Ways and Means of the House of Representatives and the Committee on Homeland Security and Governmental Affairs and the Committee on Finance of the Senate a ports of entry strategy and implementation plan.</content></paragraph><paragraph class="indentUp1 firstIndent1 fontsize10" id="d18728e194" identifier="/us/bill/115/hr/6400/s2/b/2" style="-uslm-lc:I650122"><num style="-uslm-lc:emspace2" value="2">(2) </num><heading><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The ports of entry strategy and implementation plan required under paragraph (1) shall include a consideration of the following:</chapeau><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e202" identifier="/us/bill/115/hr/6400/s2/b/2/A" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="A">(A) </num><content>The ports of entry threat and operational analysis required under subsection (a), with an emphasis on efforts to mitigate threats and challenges identified in such analysis.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e206" identifier="/us/bill/115/hr/6400/s2/b/2/B" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="B">(B) </num><content>Efforts to reduce wait times at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e210" identifier="/us/bill/115/hr/6400/s2/b/2/C" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="C">(C) </num><content>Efforts to prevent the unlawful movement of people, illicit drugs, and other contraband across the borders of the United States at the earliest possible point at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e214" identifier="/us/bill/115/hr/6400/s2/b/2/D" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="D">(D) </num><content>Efforts to focus intelligence collection and information analysis to disrupt transnational criminal organizations attempting to exploit vulnerabilities at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e218" identifier="/us/bill/115/hr/6400/s2/b/2/E" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="E">(E) </num><content>Efforts to verify that any new port of entry technology acquisition can be operationally integrated with existing technologies in use by the Department of Homeland Security.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e222" identifier="/us/bill/115/hr/6400/s2/b/2/F" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="F">(F) </num><content>Lessons learned from reports on the business transformation initiative under section 802(i)(1) of the Trade Facilitation and Trade Enforcement Act of 2015 (<ref href="/us/pl/114/125">Public Law 114–125</ref>).</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e230" identifier="/us/bill/115/hr/6400/s2/b/2/G" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="G">(G) </num><content>CBP staffing requirements for all ports of entry.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e234" identifier="/us/bill/115/hr/6400/s2/b/2/H" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="H">(H) </num><content>Efforts to identify and detect fraudulent documents at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph><subparagraph class="indentUp1 firstIndent1 fontsize10" id="d18728e239" identifier="/us/bill/115/hr/6400/s2/b/2/I" style="-uslm-lc:I650124"><num style="-uslm-lc:emspace2" value="I">(I) </num><content>Efforts to prevent, detect, investigate, and mitigate corruption at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph></paragraph></subsection><subsection class="indentUp0 firstIndent1 fontsize10" id="d18728e243" identifier="/us/bill/115/hr/6400/s2/c" role="definitions" style="-uslm-lc:I650120"><num style="-uslm-lc:emspace2" value="c">(c) </num><heading><inline class="smallCaps">Ports of Entry Described</inline>.—</heading><content>In this section, the term “<term>ports of entry</term>” means United States air, land, and sea ports of entry.</content></subsection></section>
</main>
<signatures>
<signature><role style="-uslm-lc:I650114">Speaker of the House of Representatives.</role></signature>
<signature><role style="-uslm-lc:I650114">Vice President of the United States and  President of the Senate.</role></signature>
</signatures>
</bill>