<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 132 STAT. ?>
<?I98 132 STAT. ?>
<?I99 132 STAT. ?>
<?I50 PUBLIC LAW 115–372—DEC. 21, 2018?>
<?I51 PUBLIC LAW 115–372—DEC. 21, 2018?>
<?I52 PUBLIC LAW 115–372—DEC. 21, 2018?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 115–372: To require the Secretary of Homeland Security to conduct a threat and operational analysis of ports of entry, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>372</docNumber>
<citableAs>Public Law 115–372</citableAs><citableAs>132 Stat. 5107</citableAs>
<approvedDate>2018-12-21</approvedDate>
<dc:date>2018-12-21</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>115</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 115–372—DEC. 21, 2018</centerRunningHead>
<page identifier="/us/stat/132/5107">132 STAT. 5107</page>
<dc:type>Public Law</dc:type><docNumber>115–372</docNumber>
<congress value="115">115th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To require the Secretary of Homeland Security to conduct a threat and operational analysis of ports of entry, and for other purposes.<sidenote><p class="centered fontsize8" id="xf91ac213-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2018-12-21">Dec. 21, 2018</approvedDate></p><p class="centered fontsize8" id="xf91ac214-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/115/hr/6400">H.R. 6400</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf91ac215-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">United States Ports of Entry Threat and Operational Review Act.</p><p class="leftAlign firstIndent0 fontsize8" id="xf91ac216-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s211">6 USC 211 note</ref>.</p></sidenote>
<section id="d258273e92" identifier="/us/pl/115/372/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">United States Ports of Entry Threat and Operational Review Act</shortTitle>”.</content></section>
<section id="d258273e102" identifier="/us/pl/115/372/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>PORTS OF ENTRY THREAT AND OPERATIONAL ANALYSIS.</heading><subsection class="firstIndent0 fontsize10" id="yf91bfa97-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><paragraph class="fontsize10" id="yf91bfa98-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf91bfa99-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Requirement</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Secretary of Homeland Security, acting through the Commissioner of U.S. Customs and Border Protection, shall submit to the Committee on Homeland Security and the Committee on Ways and Means of the House of Representatives and the Committee on Homeland Security and Governmental Affairs and the Committee on Finance of the Senate a threat and operational analysis of ports of entry.</content></paragraph>
<paragraph class="fontsize10" id="yf91bfa9a-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf91bfa9b-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The threat and operational analysis required under paragraph (1) shall include an assessment of the following:</chapeau><subparagraph class="fontsize10" id="yf91bfa9c-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>Current and potential threats posed by individuals and organized groups seeking—</chapeau><clause class="fontsize10" id="yf91bfa9d-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>to exploit security vulnerabilities at ports of entry; or</content></clause>
<clause class="fontsize10" id="yf91bfa9e-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>to unlawfully enter the United States through such ports of entry.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yf91bfa9f-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>Methods and pathways used to exploit security vulnerabilities at ports of entry.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfaa0-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>Improvements needed at ports of entry to prevent the unlawful movement of people, illicit drugs, and other contraband across the borders of the United States.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfaa1-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><chapeau>Improvements needed to enhance travel and trade facilitation and reduce wait times at ports of entry, including—</chapeau><clause class="fontsize10" id="yf91bfaa2-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/D/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>security vulnerabilities associated with prolonged wait times;</content></clause>
<clause class="fontsize10" id="yf91bfaa3-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/D/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>current technology at ports of entry that can be adapted to handle more volume, increase efficiency, and improve accuracy of detection efforts; and</content></clause>
<clause class="fontsize10" id="yf91bfaa4-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/D/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>infrastructure additions and upgrades.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yf91bfaa5-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><chapeau>Processes conducted at ports of entry that do not require law enforcement training and could be—<page identifier="/us/stat/132/5108">132 STAT. 5108</page></chapeau><clause class="fontsize10" id="yf91bfaa6-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/E/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>filled with—</chapeau><subclause class="fontsize10" id="yf91bfaa7-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/E/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>non-law enforcement staff; or</content></subclause>
<subclause class="fontsize10" id="yf91bfaa8-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/E/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>the private sector, for processes or activities determined to not be inherently governmental (as such term is defined in section 5 of the Federal Activities Inventory Reform Act of 1998 (<ref href="/us/pl/105/270">Public Law 105–270</ref>)); or</content></subclause>
</clause>
<clause class="fontsize10" id="yf91bfaa9-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/2/E/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>automated.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf91bfaaa-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf91bfaab-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Cost estimates.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Analysis requirements</inline>.—</heading><chapeau>In compiling the threat and operational analysis required under paragraph (1), the Secretary of Homeland Security, acting through the Commissioner of U.S. Customs and Border Protection, shall consider and examine the following:</chapeau><subparagraph class="fontsize10" id="yf91bfaac-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>Personnel needs, including K–9 Units, and estimated costs, at each port of entry, including such needs and challenges associated with recruitment and hiring.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfaad-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>Technology needs, including radiation portal monitors and non-intrusive inspection technology, and estimated costs at each port of entry.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfaae-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/a/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>Infrastructure needs and estimated costs at each port of entry.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf91bfaaf-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Ports of Entry Strategy and Implementation Plan</inline>.—</heading><paragraph class="fontsize10" id="yf91bfab0-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf91bfab1-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadlines.</p><p class="leftAlign firstIndent0 fontsize8" id="xf91bfab2-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time period.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 270 days after the submission of the threat and operational analysis required under subsection (a) and every 5 years thereafter for 10 years, the Secretary of Homeland Security, acting through the Commissioner of U.S. Customs and Border Protection (CBP), shall provide to the Committee on Homeland Security and the Committee on Ways and Means of the House of Representatives and the Committee on Homeland Security and Governmental Affairs and the Committee on Finance of the Senate a ports of entry strategy and implementation plan.</content></paragraph>
<paragraph class="fontsize10" id="yf91bfab3-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The ports of entry strategy and implementation plan required under paragraph (1) shall include a consideration of the following:</chapeau><subparagraph class="fontsize10" id="yf91bfab4-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>The ports of entry threat and operational analysis required under subsection (a), with an emphasis on efforts to mitigate threats and challenges identified in such analysis.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfab5-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>Efforts to reduce wait times at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfab6-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>Efforts to prevent the unlawful movement of people, illicit drugs, and other contraband across the borders of the United States at the earliest possible point at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfab7-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>Efforts to focus intelligence collection and information analysis to disrupt transnational criminal organizations attempting to exploit vulnerabilities at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfab8-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>Efforts to verify that any new port of entry technology acquisition can be operationally integrated with existing technologies in use by the Department of Homeland Security.<page identifier="/us/stat/132/5109">132 STAT. 5109</page></content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfab9-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>Lessons learned from reports on the business transformation initiative under section 802(i)(1) of the Trade Facilitation and Trade Enforcement Act of 2015 (<ref href="/us/pl/114/125">Public Law 114–125</ref>).</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfaba-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><content>CBP staffing requirements for all ports of entry.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfabb-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/H" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">(H) </num><content>Efforts to identify and detect fraudulent documents at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph>
<subparagraph class="fontsize10" id="yf91bfabc-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/b/2/I" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>Efforts to prevent, detect, investigate, and mitigate corruption at ports of entry and standards against which the effectiveness of such efforts may be determined.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf91bfabd-e830-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/372/s2/c" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Ports of Entry Described</inline>.—</heading><content>In this section, the term “<term>ports of entry</term>” means United States air, land, and sea ports of entry.</content></subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2018-12-21">December 21, 2018</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/115/hr/6400">H.R. 6400</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/115/914">115–914</ref>, Pt. 1 (<committee>Comm. on Homeland Security</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 164 (2018):</heading>
<p class="indentUp4 firstIndent-1" id="xf91c21ce-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Sept. 4, considered and passed House.</p><p class="indentUp4 firstIndent-1" id="xf91c21cf-e830-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 19, considered and passed Senate.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>