<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Referred-in-Senate" bill-type="olc" dms-id="H015D6F1510734C94978EDC7B09469389" public-private="public" stage-count="1">
	<form>
		<distribution-code display="yes">IIB</distribution-code>
		<congress>111th CONGRESS</congress>
		<session>2d Session</session>
		<legis-num>H. R. 4842</legis-num>
		<current-chamber display="yes">IN THE SENATE OF THE UNITED
		  STATES</current-chamber>
		<action>
			<action-date date="20100721">July 21, 2010</action-date>
			<action-desc>Received; read twice and referred to the
			 <committee-name committee-id="HHM00"> Committee on Homeland Security and
			 Governmental Affairs</committee-name></action-desc>
		</action>
		<legis-type>AN ACT</legis-type>
		<official-title display="yes">To authorize appropriations for the
		  Directorate of Science and Technology of the Department of Homeland Security
		  for fiscal years 2011 and 2012, and for other purposes.</official-title>
	</form>
	<legis-body id="H1424922C34394D7FBF8D588F6359554A" style="OLC">
		<section id="H22C732F1FFA946158EF23923817A30C9" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the
			 <quote><short-title>Homeland Security Science and
			 Technology Authorization Act of 2010</short-title></quote>.</text>
		</section><section id="H7C4612BB59C54102AEC4CB484F9444EC"><enum>2.</enum><header>Table of
			 contents</header><text display-inline="no-display-inline">The table of contents
			 for this Act is as follows:</text>
			<toc container-level="legis-body-container" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
				<toc-entry idref="H22C732F1FFA946158EF23923817A30C9" level="section">Sec. 1. Short title.</toc-entry>
				<toc-entry idref="H7C4612BB59C54102AEC4CB484F9444EC" level="section">Sec. 2. Table of contents.</toc-entry>
				<toc-entry idref="H9F4962485E8247988689D24705E1141C" level="section">Sec. 3. Definitions.</toc-entry>
				<toc-entry idref="H32196395B94B4A74BA2CAD3BFD9C0C92" level="section">Sec. 4. References.</toc-entry>
				<toc-entry idref="H234C899B0EB5403B876CD640F464D664" level="title">Title I—Authorization of Appropriations</toc-entry>
				<toc-entry idref="HFFA0995C4A8B4F9193A8E303983295ED" level="section">Sec. 101. Authorization of appropriations.</toc-entry>
				<toc-entry idref="HB274A175A0C84DED9A25D7BF7CF007D5" level="title">Title II—Management and Administration</toc-entry>
				<toc-entry idref="H564E9CDF864343449F48B406A51BC816" level="section">Sec. 201. Research prioritization and requirements;
				professional development; milestones and feedback.</toc-entry>
				<toc-entry idref="H74F350CA23054DB1B99067FA040DB025" level="section">Sec. 202. Testing, evaluation, and standards.</toc-entry>
				<toc-entry idref="HFFE08C2F0751469F905AB67389A8EB5A" level="section">Sec. 203. External review.</toc-entry>
				<toc-entry idref="H76CAD5DF0F0140E5B1AC5043FB3D5E01" level="section">Sec. 204. Office of Public-Private Partnerships.</toc-entry>
				<toc-entry idref="H91509F61C752414DBE8C9C5CFF5F9860" level="title">Title III—Reports</toc-entry>
				<toc-entry idref="H8BAB9494FC934D2EB58885FCAEEEE421" level="section">Sec. 301. Directorate of Science and Technology strategic
				plan.</toc-entry>
				<toc-entry idref="HCDAAE80585EB4F6386D137BCFB1E461E" level="section">Sec. 302. Report on technology requirements.</toc-entry>
				<toc-entry idref="HED0F7CA5A3B34387B2EDBCE846884761" level="section">Sec. 303. Report on venture capital organization.</toc-entry>
				<toc-entry idref="H5255630A6FEC49B89C9A9A661B2A72F8" level="title">Title IV—Directorate of Science and Technology
				Programs</toc-entry>
				<toc-entry idref="H63336CF045C146BC8159B95FC2937113" level="section">Sec. 401. Limitations on research.</toc-entry>
				<toc-entry idref="H7B4BB3DEE65B4826912F15AB642B9B2A" level="section">Sec. 402. University-based centers.</toc-entry>
				<toc-entry idref="H3DB981BD308D4C0EB56DAF03E62F7163" level="section">Sec. 403. Review of university-based centers.</toc-entry>
				<toc-entry idref="HC52A897C2E284276AA1EB61521A562C3" level="section">Sec. 404. Cybersecurity research and development.</toc-entry>
				<toc-entry idref="HACEF5C77D54C44FB9F97562835CCA5C9" level="section">Sec. 405. National Research Council study of cybersecurity
				incentives.</toc-entry>
				<toc-entry idref="H10C92F904D8E4CAC9D1837F8188E502E" level="section">Sec. 406. Research on cyber compromise of
				infrastructure.</toc-entry>
				<toc-entry idref="H4BC827EAC48F465385CEC35822DF2C01" level="section">Sec. 407. Dual-use terrorist risks from synthetic
				genomics.</toc-entry>
				<toc-entry idref="H230082A639DA4BF2812A4837556ECF44" level="section">Sec. 408. Underwater tunnel security demonstration
				project.</toc-entry>
				<toc-entry idref="HBFCB6CC60F294DCCAD8B926BCEA901E5" level="section">Sec. 409. Threats research and development.</toc-entry>
				<toc-entry idref="HE63C3036C945439FA329682159E74DDD" level="section">Sec. 410. Maritime domain awareness and maritime security
				technology test, evaluation, and transition capabilities.</toc-entry>
				<toc-entry idref="HA7E3DA9B24ED4D499A2829746360E424" level="section">Sec. 411. Rapid biological threat detection and
				identification.</toc-entry>
				<toc-entry idref="H907A526D991D4990905B09C5219BA4B2" level="section">Sec. 412. Educating the public about radiological
				threats.</toc-entry>
				<toc-entry idref="HE6EE59F8D27A4EFC94D93AA6C873F6A4" level="section">Sec. 413. Rural resilience initiative.</toc-entry>
				<toc-entry idref="H169F9C41635F465CADA655F83E08BB46" level="section">Sec. 414. Sense of Congress regarding the need for
				interoperability standards for Internet protocol video surveillance
				technology.</toc-entry>
				<toc-entry idref="H75DFCBFB8CC2466494ED6A6AC9046B35" level="section">Sec. 415. Homeland Security Science and Technology Fellows
				Program.</toc-entry>
				<toc-entry idref="H08852B8D427C4B0CA07B0AA7E1FD1901" level="section">Sec. 416. Biological threat agent assay
				equivalency.</toc-entry>
				<toc-entry idref="HFDF76F6F0F83436693F99F9330C48FF7" level="section">Sec. 417. Study of feasibility and benefit of expanding or
				establishing program to create a new cybersecurity capacity building track at
				certain institutions of higher education.</toc-entry>
				<toc-entry idref="HB78042EB49E04194A472B60C65358C42" level="section">Sec. 418. Sense of Congress regarding centers of
				excellence.</toc-entry>
				<toc-entry idref="H04A1DCD12A474277B730416242FE4FA7" level="section">Sec. 419. Assessment, research, testing, and evaluation of
				technologies to mitigate the threat of small vessel attack.</toc-entry>
				<toc-entry idref="H27835EBB61BD413A8678E338A3572694" level="section">Sec. 420. Research and development projects.</toc-entry>
				<toc-entry idref="H36658B0D6BD74F73B2FE8FD63D633D09" level="section">Sec. 421. National Urban Security Technology
				Laboratory.</toc-entry>
				<toc-entry idref="H7C7B819557324240B711B6C06F786179" level="section">Sec. 422. Homeland security science and technology advisory
				committee.</toc-entry>
				<toc-entry idref="H5B0150D83C66418DA46BA072053B3E4E" level="title">Title V—Domestic Nuclear Detection Office</toc-entry>
				<toc-entry idref="HBA29559CC9194856ACCFDA295BB3F219" level="section">Sec. 501. Authorization of appropriations.</toc-entry>
				<toc-entry idref="H80A8ED6848804D9FA6A690A3625F991C" level="section">Sec. 502. Domestic Nuclear Detection Office
				oversight.</toc-entry>
				<toc-entry idref="H9BBCAD317A0F4B6499BF434BBD6F7283" level="section">Sec. 503. Strategic plan and funding allocations for global
				nuclear detection architecture.</toc-entry>
				<toc-entry idref="HACACD31FDF5C49B0B9EEA6C3B6F09C31" level="section">Sec. 504. Radiation portal monitor alternatives.</toc-entry>
				<toc-entry idref="HF4030A838BD047C6A72B87BA778343C6" level="section">Sec. 505. Authorization of Securing the Cities
				Initiative.</toc-entry>
				<toc-entry idref="HC803AFCFC2BC411AA6613A506EEF1F9A" level="title">Title VI—Clarifying Amendments</toc-entry>
				<toc-entry idref="HDB6A54CE81374C649EEAC63E6B7AB458" level="section">Sec. 601. Federally funded research and development
				centers.</toc-entry>
				<toc-entry idref="H4C05A5FB34C14D1C843FC6018FA9CD99" level="section">Sec. 602. Elimination of Homeland Security
				Institute.</toc-entry>
				<toc-entry idref="H92E4575F357448B3AA5E9B90B2BEA2C5" level="section">Sec. 603. GAO study of the implementation of the statutory
				relationship between the Department and the Department of Energy national
				laboratories.</toc-entry>
				<toc-entry idref="H7A6240AEAF5B4BAD8378666F8826DF12" level="section">Sec. 604. Technical changes.</toc-entry>
				<toc-entry idref="H0E360E97A14A4DD6BD762438AC591DF0" level="title">Title VII—Commission on the Protection of Critical Electric and
				Electronic Infrastructures</toc-entry>
				<toc-entry idref="HA4F7F4C7AD4946A5B0CD8F3DE6D734EC" level="section">Sec. 701. Commission on the Protection of Critical Electric and
				Electronic Infrastructures.</toc-entry>
				<toc-entry idref="H62563F19C1A3440FB110114E024621AF" level="title">Title VIII—Border Security Technology Innovation</toc-entry>
				<toc-entry idref="H02C5C5410768452C81983723BA33242F" level="section">Sec. 801. Ensuring research activities of the Department of
				Homeland Security include appropriate concepts of operation.</toc-entry>
				<toc-entry idref="H24FE3FD7B608471DAB3F4F433B293BE1" level="section">Sec. 802. Report on basic research needs for border and
				maritime security.</toc-entry>
				<toc-entry idref="H9D7A6407E6974EA6B1514F44C534A6B0" level="section">Sec. 803. Incorporating unmanned aerial vehicles into border
				and maritime airspace.</toc-entry>
				<toc-entry idref="H857D1D1ADDF3487790923F75D5398645" level="section">Sec. 804. Establishing a research program in tunnel
				detection.</toc-entry>
				<toc-entry idref="H62660035466D4A56B598A8B9DB022DF5" level="section">Sec. 805. Research in document security and authentication
				technologies.</toc-entry>
				<toc-entry idref="H24D91D2B6001424782671533C4653668" level="section">Sec. 806. Study on global positioning system
				technologies.</toc-entry>
				<toc-entry idref="H08F949F52A5B4BA7AA25D4EB8B979771" level="section">Sec. 807. Study of mobile biometric technologies at the
				border.</toc-entry>
				<toc-entry idref="H03D95E92CF9D4F20A4C2635DE4B2D919" level="section">Sec. 808. Authorization of appropriations.</toc-entry>
			</toc>
		</section><section id="H9F4962485E8247988689D24705E1141C"><enum>3.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text>
			<paragraph display-inline="no-display-inline" id="H00DB85911219468589FE3C5B2274A1FE"><enum>(1)</enum><header>Appropriate
			 congressional committee</header><text display-inline="yes-display-inline">The
			 term <term>appropriate congressional committee</term> means the Committee on
			 Homeland Security and the Committee on Science and Technology of the House of
			 Representatives and any committee of the House of Representatives or the Senate
			 having legislative jurisdiction under the rules of the House of Representatives
			 or Senate, respectively, over the matter concerned.</text>
			</paragraph><paragraph id="HAFC74D9CEEAF439E8128392F57E6A0B9"><enum>(2)</enum><header>Department</header><text>The
			 term <term>Department</term> means the Department of Homeland Security.</text>
			</paragraph><paragraph id="H5EA4A2D602A242E98BA09A6CF86DD31B"><enum>(3)</enum><header>Directorate</header><text>The
			 term <term>Directorate</term> means the Directorate of Science and Technology
			 of the Department.</text>
			</paragraph><paragraph id="H68D02EB8158444F69A73D762826A7EFE"><enum>(4)</enum><header>Secretary</header><text>The
			 term <term>Secretary</term> means the Secretary of Homeland Security.</text>
			</paragraph><paragraph id="HAC4841C0C9F146A7AF3E643E5FFC0AAE"><enum>(5)</enum><header>Under
			 Secretary</header><text>The term <term>Under Secretary</term> means the Under
			 Secretary for Science and Technology of the Department.</text>
			</paragraph></section><section id="H32196395B94B4A74BA2CAD3BFD9C0C92"><enum>4.</enum><header>References</header><text display-inline="no-display-inline">Except as otherwise specifically provided,
			 whenever in this Act an amendment or repeal is expressed in terms of an
			 amendment to, or repeal of, a provision, the reference shall be considered to
			 be made to a provision of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101 et
			 seq.</external-xref>).</text>
		</section><title id="H234C899B0EB5403B876CD640F464D664"><enum>I</enum><header>Authorization of
			 Appropriations</header>
			<section id="HFFA0995C4A8B4F9193A8E303983295ED"><enum>101.</enum><header>Authorization
			 of appropriations</header><text display-inline="no-display-inline">There are
			 authorized to be appropriated to the Under Secretary $1,121,664,000 for fiscal
			 year 2011 and $1,155,313,920 for fiscal year 2012 for the necessary expenses of
			 the Directorate.</text>
			</section></title><title id="HB274A175A0C84DED9A25D7BF7CF007D5"><enum>II</enum><header>Management and
			 Administration</header>
			<section id="H564E9CDF864343449F48B406A51BC816"><enum>201.</enum><header>Research
			 prioritization and requirements; professional development; milestones and
			 feedback</header>
				<subsection id="HAACCD52C218C450CB6241C31D692735A"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Title III
			 (<external-xref legal-doc="usc" parsable-cite="usc/6/181">6 U.S.C. 181 et
			 seq.</external-xref>) is amended by adding at the end the following new
			 sections:</text>
					<quoted-block display-inline="no-display-inline" id="H0EF8CDF4EDE54DC9B6CEE6B9ABB20FE7" style="OLC">
						<section id="HBC442D9905424EB7B3D3799257D8D79F"><enum>318.</enum><header>Research
				prioritization and requirements</header>
							<subsection id="HB067CE4BEC3947559E0CFD9A23F90E7B"><enum>(a)</enum><header>Requirements</header><text>The
				Secretary shall—</text>
								<paragraph id="H511574B8D2B347C5A2ADA64F93AE6816"><enum>(1)</enum><text display-inline="yes-display-inline">by not later than 180 days after the date
				of enactment of this section, establish requirements for how basic and applied
				homeland security research shall be identified, prioritized, funded, tasked,
				and evaluated by the Directorate of Science and Technology, including the roles
				and responsibilities of the Under Secretary for Science and Technology, the
				Under Secretary for Policy, the Under Secretary for Management, the Director of
				the Office of Risk Management and Analysis, the Director of the Domestic
				Nuclear Detection Office, and the heads of operational components of the
				Department; and</text>
								</paragraph><paragraph id="H95011283CF2544098529B94BEA4D5810"><enum>(2)</enum><text>to the greatest
				extent possible, seek to publicize the requirements for the purpose of
				informing the Federal, State, and local governments, first responders, and the
				private sector.</text>
								</paragraph></subsection><subsection id="H79DD0306D66D4465BA943CBD91712A73"><enum>(b)</enum><header>Contents</header><text>In
				the requirements, the Secretary shall—</text>
								<paragraph id="H6E15D3CAC2664951AB34656BCE9C80D0"><enum>(1)</enum><text display-inline="yes-display-inline">identify the Directorate of Science and
				Technology’s customers within and outside of the Department;</text>
								</paragraph><paragraph id="H9094D02EA25A45F4BA32FB8E45EFC2AF"><enum>(2)</enum><text display-inline="yes-display-inline">describe the risk formula and risk
				assessment tools, including the risk assessment required under subsection
				(e)(1) that the Department considers to identify, prioritize, and fund homeland
				security research projects;</text>
								</paragraph><paragraph id="H608E9A36A25241EA9D9C0EA8BB948C73"><enum>(3)</enum><text>describe the
				considerations to be used by the Directorate to task projects to research
				entities, including the national laboratories, federally funded research and
				development centers, and university-based centers;</text>
								</paragraph><paragraph id="H1E79EC6D345A4EF791B1516E9E87D3A6"><enum>(4)</enum><text display-inline="yes-display-inline">describe the protocols to be used to assess
				off-the-shelf technology to determine if an identified homeland security
				capability gap can be addressed through the acquisition process instead of
				commencing research and development of technology to address that capability
				gap;</text>
								</paragraph><paragraph id="H7A3BF7A49C264DB2A87CADEF5705E9F7"><enum>(5)</enum><text>describe the
				processes to be used by the Directorate to strengthen first responder
				participation in identifying and prioritizing homeland security technological
				gaps, including by—</text>
									<subparagraph id="H8789F3C5924F4FABAEEAB6314AC57CEF"><enum>(A)</enum><text display-inline="yes-display-inline">soliciting feedback from appropriate
				national associations and advisory groups representing the first responder
				community and first responders within the components of the Department;
				and</text>
									</subparagraph><subparagraph id="H76B20AEA1FE2462BBEEAD948B32DC83D"><enum>(B)</enum><text display-inline="yes-display-inline">establishing and promoting a publicly
				accessible portal to allow the first responder community to help the
				Directorate develop homeland security research and development goals;</text>
									</subparagraph></paragraph><paragraph id="HF03D52AEEB39473DB8B121EF9A8FAABB"><enum>(6)</enum><text display-inline="yes-display-inline">describe a mechanism to publicize the
				Department’s funded and unfunded homeland security technology priorities;
				and</text>
								</paragraph><paragraph id="HBF7D11CE30284A78BAB95817DF5B3003"><enum>(7)</enum><text>include such other
				requirements, policies, and practices as the Secretary considers
				necessary.</text>
								</paragraph></subsection><subsection id="HBB500BCC049645B68C02C86D93F27B78"><enum>(c)</enum><header>Activities in
				support of the research prioritization and requirements</header><text>Not later
				than one year after the date of the issuance of the requirements, the Secretary
				shall—</text>
								<paragraph id="HB04856AE80BC410E86D3C74FF6A43404"><enum>(1)</enum><text display-inline="yes-display-inline">carry out the requirements of subsection
				(a);</text>
								</paragraph><paragraph id="H2744F2DFCA2F413FA00C2621B6CCA876"><enum>(2)</enum><text display-inline="yes-display-inline">establish, through the Under Secretary for
				Science and Technology and Under Secretary for Management, a mandatory
				workforce program for the Directorate’s customers in the Department to better
				identify and prioritize homeland security capability gaps that may be addressed
				by a technological solution based on the assessment required under section
				319(a)(2);</text>
								</paragraph><paragraph id="H1ECF6112CE0F45FC9DFF1BEB569FBC05"><enum>(3)</enum><text display-inline="yes-display-inline">establish a system to collect feedback from
				customers of the Directorate on the performance of the Directorate; and</text>
								</paragraph><paragraph id="H74B8A3B00BEC48F5965E36A198895A67"><enum>(4)</enum><text>any other
				activities that the Secretary considers to be necessary to implement the
				requirements.</text>
								</paragraph></subsection><subsection id="H614295D2566A48F09709A2031BFAD4ED"><enum>(d)</enum><header>Biannual updates
				on implementation</header><text>One hundred and eighty days after the date of
				enactment of this section, and on a biannually basis thereafter, the Inspector
				General of the Department shall submit a biannually update to the appropriate
				congressional committees on the status of implementation of the research
				prioritization and requirements and activities in support of such
				requirements.</text>
							</subsection><subsection display-inline="no-display-inline" id="H1A1A4E50AD744F1896F77AA8617C014B"><enum>(e)</enum><header>Risk
				assessment</header><text>The Secretary shall—</text>
								<paragraph id="H4F4A034F20E14AEF87684D794BA67B2C"><enum>(1)</enum><text>submit to the
				appropriate congressional committees by not later than one year after the date
				of enactment of this subsection and annually thereafter—</text>
									<subparagraph id="H5B9E230FB82E486DB075C10B34DAED47"><enum>(A)</enum><text>a national-level
				risk assessment carried out by the Secretary, describing and prioritizing the
				greatest risks to the homeland, that includes vulnerability studies, asset
				values (including asset values for intangible assets), estimated rates of
				occurrence, countermeasures employed, loss expectancy, cost/benefit analyses,
				and other practices generally associated with producing a comprehensive risk
				assessment;</text>
									</subparagraph><subparagraph id="H096DCE4BF669438D8F91452BB4A434CE"><enum>(B)</enum><text>an analysis of the
				Directorate’s approach to mitigating the homeland security risks identified
				under subparagraph (A) through basic and applied research, development,
				demonstration, testing, and evaluation activities, as appropriate;</text>
									</subparagraph><subparagraph id="HD36C3A57C71A4CA0BC04508225DB27A8"><enum>(C)</enum><text>an analysis, based
				on statistics and metrics, of the effectiveness of the Directorate in reducing
				the homeland security risks identified under subparagraph (A) through the
				deployment of homeland security technologies researched or developed by the
				Directorate, as appropriate;</text>
									</subparagraph><subparagraph id="HED4A4ED54181461CB9A5305E590E313B"><enum>(D)</enum><text display-inline="yes-display-inline">a description of how the analysis required
				under subparagraph (A) shall be used to inform, guide, and prioritize the
				Department’s homeland security research and development activities, including
				recommendations for how the Directorate should modify or amend its existing
				research and development activities, including for purposes of reducing the
				risks to the homeland identified under subparagraph (A); and</text>
									</subparagraph><subparagraph id="H5EEDB2B1EE874ADC92545006E64B1EF2"><enum>(E)</enum><text>a description of
				input from other relevant Federal, State, or local agencies and relevant
				private sector entities in conducting the risk assessment required by
				subparagraph (A); and</text>
									</subparagraph></paragraph><paragraph id="H9AED2608D153484F938BDAC11C3E2406"><enum>(2)</enum><text>conduct research
				and development on ways to most effectively communicate information regarding
				the risks identified under paragraph (1)(A) to the media as well as directly to
				the public, both on an ongoing basis and during a terrorist attack or other
				incident.</text>
								</paragraph></subsection><subsection display-inline="no-display-inline" id="HC38335699941441C9C9EDACB06C883A1"><enum>(f)</enum><header>Report on HSARPA
				activities</header>
								<paragraph id="H5BA406CF41E0498A9CA0C0ABEA9BA059"><enum>(1)</enum><header>In
				general</header><text>Consistent with the Federal Acquisition Regulation and
				any other relevant Federal requirements, not later than 60 days after the date
				of enactment of this subsection and annually thereafter, the Secretary shall
				submit a report to the appropriate congressional committees containing the
				research, development, testing, evaluation, prototyping, and deployment
				activities undertaken by the Homeland Security Advanced Research Projects
				Agency during the previous fiscal year, including funds expended for such
				activities in the previous fiscal year.</text>
								</paragraph><paragraph id="H8AD4C8B5578D46C2953384FD0DD3706A"><enum>(2)</enum><header>Contents</header><text>For
				each activity undertaken, the report shall—</text>
									<subparagraph id="HDA318ED6E5E1410FBD4175A0DB0B462F"><enum>(A)</enum><text>describe, as
				appropriate, the corresponding risk identified in subsection (e)(1)(A) that
				supports the decision to undertake that activity; and</text>
									</subparagraph><subparagraph id="H39FCB907C5C2461CBE55AB39985C269E"><enum>(B)</enum><text>describe any
				efforts made to transition that activity into a Federal, State, or local
				acquisition program.</text>
									</subparagraph></paragraph><paragraph id="H19F4B3E1C1F4471DB43A3CFF729621D4"><enum>(3)</enum><header>Additional
				activities</header><text>The Secretary shall include in each report a
				description of each proposal that was reviewed in the period covered by the
				report by the Director of the Homeland Security Advanced Research Projects
				Agency under section 313(d)(3), including a statement of whether the proposal
				received a grant, cooperative agreement, or contract from the Director.</text>
								</paragraph></subsection></section><section id="HF5E5573CE0E4419FAB09650FEBAE4BC3"><enum>319.</enum><header>Professional
				development</header>
							<subsection id="H54C83B725AF247FDBA596524291AD97B"><enum>(a)</enum><header>Reporting
				requirement</header><text>Sixty days before establishing the mandatory
				workforce program as required by section 318(c)(2), the Secretary shall report
				to the appropriate congressional committees on the following:</text>
								<paragraph id="H25926792B3FE45FE87C158C150C6F63D"><enum>(1)</enum><text>A description of
				how homeland security technological requirements are developed by the
				Directorate of Science and Technology’s customers within the Department.</text>
								</paragraph><paragraph id="HAD5AE53BF7EE4777BF23CD108E469F1C"><enum>(2)</enum><text>A description of
				the training that should be provided to the Directorate’s customers in the
				Department under the mandatory workforce program to allow them to identify,
				express, and prioritize homeland security capability gaps.</text>
								</paragraph><paragraph id="HA436D8D8FF0F45BFB24C8B08C61562B9"><enum>(3)</enum><text display-inline="yes-display-inline">A plan for how the Directorate, in
				coordination with the Domestic Nuclear Detection Office and other Department
				components, can enhance and improve technology requirements development and the
				technology acquisition process, to accelerate the delivery of effective,
				suitable technologies that meet performance requirements and appropriately
				address an identified homeland security capability gap.</text>
								</paragraph><paragraph id="H402F812A974243B59D861D6C0366B577"><enum>(4)</enum><text>An assessment of
				whether Congress should authorize, in addition to the program required under
				section 318(c)(2), a training program for Department employees to be trained in
				requirements writing and acquisition, that—</text>
									<subparagraph id="H1881B574DD9245B1B2F455B2509EABB8"><enum>(A)</enum><text>is prepared in
				consultation with the Department of Veterans Affairs Acquisition Academy and
				the Defense Acquisition University; and</text>
									</subparagraph><subparagraph id="HAB323CFDCE354C16B0FC606E6400A8D5"><enum>(B)</enum><text>if the Secretary
				determines that such additional training should be authorized by Congress,
				includes specification about—</text>
										<clause id="H4F8E7C5C738B44B6929C4AFE8AE5675A"><enum>(i)</enum><text>the type, skill
				set, and job series of Department employees who would benefit from such
				training, including an estimate of the number of such employees;</text>
										</clause><clause id="H827FCD520A3E4842B4110A1AAC1B8D7B"><enum>(ii)</enum><text>a
				suggested curriculum for the training;</text>
										</clause><clause id="H37D946D6E9014286A94C6F3D5AF752EF"><enum>(iii)</enum><text>the type and
				skill set of educators who could most effectively teach those skills;</text>
										</clause><clause id="HA97B3BC3708E4BF5939E6A6D74344157"><enum>(iv)</enum><text>the length and
				duration of the training;</text>
										</clause><clause id="H14841BEE67104D29AFF2FEDEC3BA3AB2"><enum>(v)</enum><text>the advantages and
				disadvantages of training employees in a live classroom, or virtual classroom,
				or both;</text>
										</clause><clause id="H82A848AE70DE43F7A0784BBC0079E763"><enum>(vi)</enum><text>cost estimates
				for the training; and</text>
										</clause><clause id="H91475B40137545D79865F48D013B655F"><enum>(vii)</enum><text>the role of the
				Directorate in supporting the training.</text>
										</clause></subparagraph></paragraph></subsection><subsection id="H56FF4AD59C40448699CBBC12DC62C745"><enum>(b)</enum><header>Use of research
				and development center</header><text display-inline="yes-display-inline">The
				Secretary is encouraged to use a federally funded research and development
				center to assist the Secretary in carrying out the requirements of this
				section.</text>
							</subsection></section><section id="H51C92D57A7AC4CBA940660872D85BE0E"><enum>320.</enum><header>Customer
				feedback</header><text display-inline="no-display-inline">In establishing a
				system to collect feedback under section 318(c)(3), the Secretary shall—</text>
							<paragraph id="HB648FD0AF54C407DB9F29CE204378AA7"><enum>(1)</enum><text>create a formal
				process for collecting feedback from customers on the effectiveness of the
				technology or services delivered by Directorate of Science and Technology,
				including through randomized sampling, focus groups, and other methods as
				appropriate;</text>
							</paragraph><paragraph id="HE541CF5BF4F64D3F9408449AE4EA65B4"><enum>(2)</enum><text>develop metrics
				for measuring customer satisfaction and the usefulness of any technology or
				service provided by the Directorate; and</text>
							</paragraph><paragraph id="H896CC6F1CBC642D8A7EE4A96C2D80D1E"><enum>(3)</enum><text display-inline="yes-display-inline">establish standards and performance
				measures to be met by the Directorate in order to provide high-quality customer
				service.</text>
							</paragraph></section><section id="H53396868640241C58C1324FC78460458"><enum>321.</enum><header>Research
				progress</header>
							<subsection id="H9D7E3FB5037B4F318CE19FAF2183C47A"><enum>(a)</enum><header>In
				general</header><text display-inline="yes-display-inline">The Secretary shall
				establish a system to monitor the progress of Directorate for Science and
				Technology research, development, testing, and evaluation activities, including
				the establishment of initial and subsequent research milestones.</text>
							</subsection><subsection id="H0CFE16B911C7487EB27A4498D6A79586"><enum>(b)</enum><header>System</header><text display-inline="yes-display-inline">The system established under subsection (a)
				shall—</text>
								<paragraph id="H0C0F32206EB743CBB548ACC6D7398369"><enum>(1)</enum><text>identify and
				monitor the progress toward research milestones;</text>
								</paragraph><paragraph id="H69CBE87AA14E42DB9EC53478B451860C"><enum>(2)</enum><text>allow the
				Directorate to provide regular reports to its customers regarding the status
				and progress of research efforts of the Directorate;</text>
								</paragraph><paragraph id="H8B8A33673DA840CBA5B650A7C8BAFBA1"><enum>(3)</enum><text display-inline="yes-display-inline">allow the Secretary to evaluate how a
				technology or service produced as a result of the Directorate’s programs has
				affected homeland security capability gaps; and</text>
								</paragraph><paragraph id="HBB9CE4CC4F674A3892A7D81EEEABEAB4"><enum>(4)</enum><text>allow the
				Secretary to report the number of products and services developed by the
				Directorate that have been transitioned into acquisition programs.</text>
								</paragraph></subsection><subsection id="H3DD6F7B718D642CF84668D46AABAC2DA"><enum>(c)</enum><header>Guidance</header><text>The
				Under Secretary for Science and Technology shall publicize and implement
				guidance on setting valid initial and subsequent research milestones for
				homeland security research funded by the Directorate.</text>
							</subsection></section><section id="HF2F3C2BBFEFF4C5D8EBED85C10200E94"><enum>322.</enum><header>Report</header>
							<subsection id="HDD0CDFBA11284C77AC10A10BE11B6126"><enum>(a)</enum><header>In
				general</header><text display-inline="yes-display-inline">The Under Secretary
				shall submit a report to the appropriate congressional committees—</text>
								<paragraph id="H9D43B54ADB6E482DA3B704CBA073C268"><enum>(1)</enum><text>by not later than
				one year after the date of enactment of sections 320 and 321 identifying what
				actions have been taken to carry out the requirements of these sections;
				and</text>
								</paragraph><paragraph id="HEFB5E967454F40FF9E70AFBA13EF64B1"><enum>(2)</enum><text>annually
				thereafter describing—</text>
									<subparagraph id="HAD862C78FCD64A7790FBBB02FD6A4253"><enum>(A)</enum><text>research
				milestones for each large project with a Federal cost share greater than
				$80,000,000 that have been successfully met and missed, including for each
				missed milestone, an explanation of why the milestone was missed; and</text>
									</subparagraph><subparagraph id="H4F176627C2B242F496BE33B80F83439F"><enum>(B)</enum><text display-inline="yes-display-inline">customer feedback collected and the success
				of the Directorate in meeting the customer service performance measures and
				standards, including an evaluation of the effectiveness of the technology or
				services delivered by the
				Directorate.</text>
									</subparagraph></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="H3520F113791249C8B1E6B1F2225F3712"><enum>(b)</enum><header>Clerical
			 amendments</header><text>The table of contents in section 1(b) is amended in
			 the items relating to subtitle D of title II—</text>
					<paragraph id="H834BE9C4AB0545ECBD37714494018A6C"><enum>(1)</enum><text>in the item
			 relating to the heading for the subtitle, by striking <quote>Office
			 of</quote>;</text>
					</paragraph><paragraph id="H99CEF36F455E42E6A963F0347B11C722"><enum>(2)</enum><text>in the item
			 relating to section 231, by striking <quote>office</quote> and inserting
			 <quote>Office of Science and Technology</quote>; and</text>
					</paragraph><paragraph id="HC3278C15E83640B1BABBBE1FE3E60BF9"><enum>(3)</enum><text>by adding at the
			 end the following new items:</text>
						<toc container-level="title-container" idref="HB274A175A0C84DED9A25D7BF7CF007D5" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="yes-quoted-block" regeneration="yes-regeneration"><toc-quoted-entry style="OLC">
								<toc-entry idref="HBC442D9905424EB7B3D3799257D8D79F" level="section">Sec. 318. Research prioritization and requirements.</toc-entry>
								<toc-entry idref="HF5E5573CE0E4419FAB09650FEBAE4BC3" level="section">Sec. 319. Professional development.</toc-entry>
								<toc-entry idref="H51C92D57A7AC4CBA940660872D85BE0E" level="section">Sec. 320. Customer feedback.</toc-entry>
								<toc-entry idref="H53396868640241C58C1324FC78460458" level="section">Sec. 321. Research progress.</toc-entry>
								<toc-entry idref="HF2F3C2BBFEFF4C5D8EBED85C10200E94" level="section">Sec. 322. Report.</toc-entry></toc-quoted-entry>
						</toc>
					</paragraph></subsection></section><section id="H74F350CA23054DB1B99067FA040DB025" section-type="subsequent-section"><enum>202.</enum><header>Testing, evaluation,
			 and standards</header><text display-inline="no-display-inline">Section 308
			 (<external-xref legal-doc="usc" parsable-cite="usc/6/188">6 U.S.C.
			 188</external-xref>) is amended by adding at the end of the following new
			 subsection:</text>
				<quoted-block display-inline="no-display-inline" id="HB7F3E942A7A1407EAC7E7A4616D8D41F" style="OLC">
					<subsection id="H5E91F2732BAA41F79E3B1CA775E0F23A"><enum>(d)</enum><header>Test,
				evaluation, and standards division</header>
						<paragraph id="H3C5E81B274334AE1ADE19643A3E4FD35"><enum>(1)</enum><header>Establishment</header><text>There
				is established in the Directorate of Science and Technology a Test, Evaluation,
				and Standards Division.</text>
						</paragraph><paragraph id="HC1FB7F3491724CA8AA66AF0431C3D9D2"><enum>(2)</enum><header>Director</header><text>The
				Test, Evaluation, and Standards Division shall be headed by a Director of Test,
				Evaluation, and Standards, who shall be appointed by the Secretary and report
				to the Under Secretary for Science and Technology.</text>
						</paragraph><paragraph id="H9B0F85927CEB4FAB8B8FB589BAF69624"><enum>(3)</enum><header>Responsibilities,
				authorities, and functions</header><text>The Director of Test, Evaluation, and
				Standards—</text>
							<subparagraph id="H03FFA9AE4B314DFEA14A79F293F6A96F"><enum>(A)</enum><text>is the principal
				adviser to the Secretary, the Under Secretary of Management, and the Under
				Secretary for Science and Technology on all test and evaluation or standards
				activities in the Department; and</text>
							</subparagraph><subparagraph id="H38A08B7494C24AD58AB08A64F2C5098D"><enum>(B)</enum><text>shall—</text>
								<clause id="H38DA86637A25470DA4A65BC4437019B3"><enum>(i)</enum><text display-inline="yes-display-inline">prescribe test and evaluation policies for
				the Department, which shall include policies to ensure that operational testing
				is done at facilities that already have relevant and appropriate safety and
				material certifications to the extent such facilities are available;</text>
								</clause><clause id="H997B8BC1B59849BFB31FC77E4D5E7CAB"><enum>(ii)</enum><text>oversee and
				ensure that adequate test and evaluation activities are planned and conducted
				by or on behalf of components of the Department in major acquisition programs
				of the Department, as designated by the Secretary, based on risk, acquisition
				level, novelty, complexity, and size of the acquisition program, or as
				otherwise established in statute;</text>
								</clause><clause id="HED4425D0B7574D07BDEF8393CB71C279"><enum>(iii)</enum><text>review major
				acquisition program test reports and test data to assess the adequacy of test
				and evaluation activities conducted by or on behalf of components of the
				Department; and</text>
								</clause><clause id="HF5F2B285C2774CFBB6C55A286236479A"><enum>(iv)</enum><text>review available
				test and evaluation infrastructure to determine whether the Department has
				adequate resources to carry out its testing and evaluation responsibilities, as
				established under this title.</text>
								</clause></subparagraph></paragraph><paragraph id="H1C931EF03F7B438789EB5CE8E34E1398"><enum>(4)</enum><header>Deputy director
				of operational test and evaluation</header><text>Within the Division there
				shall be a Deputy Director of Operational Test and Evaluation, who—</text>
							<subparagraph id="H3F2A790522694EC3A7F8C2458C9DF8CD"><enum>(A)</enum><text>is the principal
				operational test and evaluation official for the Department; and</text>
							</subparagraph><subparagraph id="H7E26A55B437A4195B8AC5EEF85ADB612"><enum>(B)</enum><text>shall—</text>
								<clause id="HF14A4696FF994AED861913D65D66B851"><enum>(i)</enum><text>monitor and review
				the operational testing and evaluation activities conducted by or on behalf of
				components of the Department in major acquisition programs of the Department,
				as designated by the Secretary, based on risk, acquisition level, novelty,
				complexity, and size of the acquisition program, or as otherwise established in
				statute;</text>
								</clause><clause id="H4BB9C5A7C9F04E9DB788BED0F803BDE2"><enum>(ii)</enum><text>provide the
				Department with assessments of the adequacy of testing and evaluation
				activities conducted in support of major acquisitions programs; and</text>
								</clause><clause id="H9999C6E7871948E0B58935879F484B4F"><enum>(iii)</enum><text>have prompt and
				full access to test and evaluation documents, data, and test results of the
				Department that the Deputy Director considers necessary to review in order to
				carry out the duties of the Deputy Director under this section.</text>
								</clause></subparagraph></paragraph><paragraph id="HEF39CF703F3F436CB68431F6ACAD6C82"><enum>(5)</enum><header>Standards
				executive</header><text>Within this Division, there shall be a Standards
				Executive as described in Office of Management and Budget Circular A–119. The
				Standards Executive shall—</text>
							<subparagraph id="H7D36A53989D44AFAB9DAC4718E91A7A8"><enum>(A)</enum><text>implement the
				Department’s standards policy as described in section 102(g); and</text>
							</subparagraph><subparagraph id="H1D2EDDD8E7E742CD9E5A864210B0A20E"><enum>(B)</enum><text>support the
				Department’s use of technical standards that are developed or adopted by
				voluntary consensus standards bodies in accordance with section 12(d) of the
				National Technology Transfer and Advancement Act of 1995 (<external-xref legal-doc="usc" parsable-cite="usc/15/272">15 U.S.C. 272</external-xref>
				note).</text>
							</subparagraph></paragraph><paragraph id="H01DB314C85F545AAAE3307BB0CD74060"><enum>(6)</enum><header>Limitation</header><text>The
				Division is not required to carry out operational testing.</text>
						</paragraph><paragraph id="HB1A590C4894C4A73B05E2601566872F0"><enum>(7)</enum><header>Evaluation of
				Department of Defense technologies</header><text>The Director of Test,
				Evaluation, and Standards may evaluate technologies currently in use or being
				developed by the Department of Defense to assess whether they can be leveraged
				to address homeland security capability
				gaps.</text>
						</paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
			</section><section id="HFFE08C2F0751469F905AB67389A8EB5A"><enum>203.</enum><header>External
			 review</header>
				<subsection id="HB79DDA73CE714D45B165DC1F6E51B7C8"><enum>(a)</enum><header>Responsibilities
			 and authorities of the under secretary</header><text>Section 302
			 (<external-xref legal-doc="usc" parsable-cite="usc/6/183">6 U.S.C.
			 183</external-xref>) is amended by striking <quote>and</quote> after the
			 semicolon at the end of paragraph (13), by striking the period at the end of
			 paragraph (14) and inserting <quote>; and</quote>, and by adding at the end the
			 following new paragraph:</text>
					<quoted-block id="H3000E591CBD3485FAD950952499481D3" style="OLC">
						<paragraph id="H67390A16C3BD4198A93B5DBF36A21E24"><enum>(15)</enum><text>developing and
				overseeing the administration of guidelines for periodic external review of
				research and development programs or activities, including through—</text>
							<subparagraph id="H63CEE774FBAE442288F795990EBAB869"><enum>(A)</enum><text>consultation with
				experts, including scientists and practitioners, about the research and
				development activities conducted by the Directorate of Science and Technology;
				and</text>
							</subparagraph><subparagraph id="HC009F6675F244A3FA9EFDFB479E022B4"><enum>(B)</enum><text>ongoing
				independent, external review—</text>
								<clause id="HDD9425B704A9414099E124836D6CA052"><enum>(i)</enum><text>initially at the
				division level; or</text>
								</clause><clause id="HE5AFDE1D4D4E47FFBF3C40A2757F8240"><enum>(ii)</enum><text>when divisions
				conduct multiple programs focused on significantly different subjects, at the
				program
				level.</text>
								</clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="HEBDA9370B8FB4FE3A366628D16B562EC"><enum>(b)</enum><header>Report</header><text>The
			 Secretary shall report to Congress not later than 60 days after the completion
			 of the first review under section 302(15)(B) of the Homeland Security Act of
			 2002, as amended by subsection (a) of this section on—</text>
					<paragraph id="H05C81EBADC3C4B43A69D6B4632522BCA"><enum>(1)</enum><text>the findings of
			 the review; and</text>
					</paragraph><paragraph id="HB32E9A2D333C4DD7B190225D9F5FF07C"><enum>(2)</enum><text>any future efforts
			 to ensure that the Department’s research programs or activities are subject to
			 external review, as appropriate.</text>
					</paragraph></subsection></section><section id="H76CAD5DF0F0140E5B1AC5043FB3D5E01"><enum>204.</enum><header>Office of
			 Public-Private Partnerships</header>
				<subsection id="HD01402D85D864838B6D9C8315904C52C"><enum>(a)</enum><header>Establishment</header><text>Section
			 313 (<external-xref legal-doc="usc" parsable-cite="usc/6/193">6 U.S.C.
			 193</external-xref>) is amended to read as follows:</text>
					<quoted-block id="HDD77FBDADCBD43888AD3ABB3AF85D6FC" style="OLC">
						<section id="HF92AAE4670A2466B8882B71F122B3039"><enum>313.</enum><header>Office of
				Public-Private Partnerships</header>
							<subsection id="H452F58CAA8A84037A9B45D6506CAE8AE"><enum>(a)</enum><header>Establishment of
				office</header><text>There is established an Office of Public-Private
				Partnerships in the Directorate of Science and Technology.</text>
							</subsection><subsection id="H175257D3071B4528B98814C605E4709D"><enum>(b)</enum><header>Director</header><text>The
				Office shall be headed by a Director, who shall be appointed by the Secretary.
				The Director shall report to the Under Secretary for Science and
				Technology.</text>
							</subsection><subsection id="H77E0648218B546C9A3F39F494C353762"><enum>(c)</enum><header>Responsibilities</header><text>The
				Director, in coordination with the Private Sector Office of the Department,
				shall—</text>
								<paragraph id="HF32B251DE22643129944A1E58D1088C3"><enum>(1)</enum><text display-inline="yes-display-inline">engage and initiate proactive outreach
				efforts and provide guidance on how to pursue proposals to develop or deploy
				homeland security technologies (including regarding Federal funding,
				regulation, or acquisition), including to persons associated with small
				businesses (as that term is defined in the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/631">15 U.S.C. 631 et
				seq.</external-xref>));</text>
								</paragraph><paragraph id="H7434751C5E214D519C2A79C19FAC5E4E"><enum>(2)</enum><text display-inline="yes-display-inline">coordinate with components of the
				Department to issue announcements seeking unique and innovative homeland
				security technologies to address homeland security capability gaps;</text>
								</paragraph><paragraph id="H3A6A5912A5A645C58C3F2CA825AEDF1F"><enum>(3)</enum><text>promote
				interaction between homeland security researchers and private sector companies
				in order to accelerate transition research or a prototype into a commercial
				product and streamline the handling of intellectual property; and</text>
								</paragraph><paragraph id="H9A8108B663904B02B09DBE3E1EC0ED1C"><enum>(4)</enum><text>conduct technology
				research assessment and marketplace analysis for the purpose of identifying,
				leveraging, and integrating best-of-breed technologies and capabilities from
				industry, academia, and other Federal Government agencies, and disseminate
				research and findings to Federal, State, and local governments.</text>
								</paragraph></subsection><subsection id="HD5E350103758421BAECEBB159DBDD428"><enum>(d)</enum><header>Rapid review
				division</header>
								<paragraph id="HE9E764A61DFF433CA79978A7B34EFF51"><enum>(1)</enum><header>Establishment</header><text>There
				is established the Rapid Review Division within the Office of Public-Private
				Partnerships.</text>
								</paragraph><paragraph id="HD43ABA341B5947DC8B424DFD073E0195"><enum>(2)</enum><header>Purpose and
				duties</header>
									<subparagraph id="H18B6196B21844930BF99C13520CB2725"><enum>(A)</enum><header>In
				general</header><text>The Division—</text>
										<clause id="HCBFEE86817714442B7236DBDECCE9B9C"><enum>(i)</enum><text>is
				responsible for maintaining a capability to perform business and technical
				reviews to assist in screening unsolicited homeland security technology
				proposals submitted to the Secretary; and</text>
										</clause><clause id="HCBEB0DF540BF460E8F67BB6F8BCFB5B1"><enum>(ii)</enum><text>shall assess the
				feasibility, scientific and technical merits, and estimated cost of such
				proposals.</text>
										</clause></subparagraph><subparagraph id="H6C5DB9C8D3964E3781AE60B6803A0148"><enum>(B)</enum><header>Specific
				duties</header><text>In carrying out those duties, the Division shall—</text>
										<clause id="H8F711681FFFE43FE9EC72FBF8ECDD26D"><enum>(i)</enum><text display-inline="yes-display-inline">maintain awareness of the technological
				requirements of the Directorate’s customers;</text>
										</clause><clause id="H6A46893A21A8419B9A924485EFBAF962"><enum>(ii)</enum><text display-inline="yes-display-inline">establish and publicize accessible,
				streamlined procedures allowing a participant to have their technology assessed
				by the Division;</text>
										</clause><clause id="H8201A07E93B147FD8771C5DF8F591430"><enum>(iii)</enum><text display-inline="yes-display-inline">make knowledgeable assessments of a
				participant’s technology after receiving a business plan, a technology
				proposal, and a list of corporate officers, directors, and employees with
				technical knowledge of the proposal, within 60 days after such a
				submission;</text>
										</clause><clause id="HD7A65A7CA6B2469C8FAFF98F0CA6DEC1"><enum>(iv)</enum><text>review proposals
				submitted by components of the Department to the Division, subject to
				subsection (e); and</text>
										</clause><clause id="H744D55361CD74C68B62E7B612B7692E9"><enum>(v)</enum><text>in
				reviewing proposals submitted to the Secretary, give priority to any proposal
				submitted by a small business concern as defined under section 3 of the Small
				Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15
				U.S.C. 632</external-xref>).</text>
										</clause></subparagraph></paragraph><paragraph id="H8C34785B04204E2EA3A4DBA361A07B1F"><enum>(3)</enum><header>Coordination</header><text display-inline="yes-display-inline">The Director shall submit for consideration
				promising homeland security technology research, development, testing, and
				evaluation proposals, along with any business and technical reviews, to the
				appropriate subcomponents of the Directorate and the appropriate operational
				components of the Department for consideration for support.</text>
								</paragraph></subsection><subsection id="H9AFD36ADF4C44F838D29032DDABE2E57"><enum>(e)</enum><header>Limitation on
				consideration or evaluation of proposals</header><text display-inline="yes-display-inline">The Office may not consider or evaluate
				homeland security technology proposals submitted in response to a solicitation
				for offers for a pending procurement or for a specific agency
				requirement.</text>
							</subsection><subsection id="H82D3E5471075487888B486C2EE55FCB3"><enum>(f)</enum><header>Satellite
				offices</header><text display-inline="yes-display-inline">The Under Secretary,
				acting through the Director, may establish up to 3 satellite offices across the
				country to enhance the Department’s outreach efforts. The Secretary shall
				notify the appropriate congressional committees in writing within 30 days after
				establishing any satellite office.</text>
							</subsection><subsection id="H4B5DD5585E6B4544BD766DDB2100ED40"><enum>(g)</enum><header>Personnel</header><text display-inline="yes-display-inline">The Secretary shall establish rules to
				prevent the Director or any other employee of the Office from acting on matters
				where a conflict of interest may
				exist.</text>
							</subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="H5303A7957D2E40D18E493E4B74898347"><enum>(b)</enum><header>Clerical
			 amendment</header><text>The table of contents in section 1(b) is amended by
			 striking the item relating to such section and inserting the following:</text>
					<quoted-block display-inline="no-display-inline" id="H3AB9698D90344845A289EACDCB856A63" style="OLC">
						<toc container-level="quoted-block-container" idref="HDD77FBDADCBD43888AD3ABB3AF85D6FC" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
							<toc-entry idref="HF92AAE4670A2466B8882B71F122B3039" level="section">Sec. 313. Office of Public-Private
				Partnerships.</toc-entry>
						</toc>
						<after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="HD51A2D99F3854E17AC06C8916E5B7DD1"><enum>(c)</enum><header>Authorization of
			 Appropriations</header><text>Of the amount authorized by section 101, there is
			 authorized to be appropriated $30,000,000 for the Office of Public-Private
			 Partnerships for each of fiscal years 2011 and 2012.</text>
				</subsection></section></title><title id="H91509F61C752414DBE8C9C5CFF5F9860"><enum>III</enum><header>Reports</header>
			<section id="H8BAB9494FC934D2EB58885FCAEEEE421"><enum>301.</enum><header>Directorate of
			 Science and Technology strategic plan</header>
				<subsection id="H05307D24219748F386E36050C80029A3"><enum>(a)</enum><header>In
			 general</header><text>Title III (<external-xref legal-doc="usc" parsable-cite="usc/6/181">6 U.S.C. 181 et seq.</external-xref>), as amended by
			 section 201, is further amended by adding at the end the following new
			 section:</text>
					<quoted-block display-inline="no-display-inline" id="H76B89873015544D4B782BDE2ACA61C33" style="OLC">
						<section id="H5F6785E86E694F46B657D1BAEE18BAAF"><enum>323.</enum><header>Strategic
				plan</header>
							<subsection id="HD667DF9605EB42A6907CF46094A95898"><enum>(a)</enum><header>Requirement for
				strategic plan</header><text>Not later than 1 year after the date of enactment
				of this section and every other year thereafter, the Under Secretary for
				Science and Technology shall prepare a strategic plan for the activities of the
				Directorate.</text>
							</subsection><subsection id="HA86B1FAAE0CE41BEA56272D1CC34BAD3"><enum>(b)</enum><header>Contents</header><text>The
				strategic plan required by subsection (a) shall be prepared in accordance with
				applicable Federal requirements, and shall include the following
				matters:</text>
								<paragraph id="H2CC65E4239284C22800ECB9F47C58BC1"><enum>(1)</enum><text>The long-term
				strategic goals of the Directorate.</text>
								</paragraph><paragraph id="HCE05FDE29AB24B1FB3C49CE47D500513"><enum>(2)</enum><text>Identification of
				the research programs of the Directorate that support achievement of those
				strategic goals.</text>
								</paragraph><paragraph id="HB4FB7EFDB8A94782BE73F82BB41065CC"><enum>(3)</enum><text display-inline="yes-display-inline">The connection of the activities and
				programs of the Directorate to requirements or homeland security capability
				gaps identified by customers within the Department and outside of the
				Department, including the first responder community.</text>
								</paragraph><paragraph id="HA149C43CADFB482595A277F0751500D6"><enum>(4)</enum><text display-inline="yes-display-inline">The role of the Department's risk analysis
				in the activities and programs of the Directorate.</text>
								</paragraph><paragraph id="HFFF54B3610D3495AB7580FEBA7559299"><enum>(5)</enum><text>A technology
				transition strategy for the programs of the Directorate.</text>
								</paragraph><paragraph id="H54C0D7AD27B046A8A624ACFC1CB50E27"><enum>(6)</enum><text>A description of
				the policies of the Directorate on the management, organization, and personnel
				of the Directorate.</text>
								</paragraph></subsection><subsection id="H2677903A854C46288CA2AA504CF6E92D"><enum>(c)</enum><header>Submission of
				Plan to Congress</header><text>The Secretary shall submit to Congress any
				update to the strategic plan most recently prepared under subsection (a) at the
				same time that the President submits to Congress the budget for each
				even-numbered fiscal
				year.</text>
							</subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="H22B62CD6AEBB492F874A7EB639886CCB"><enum>(b)</enum><header>Clerical
			 amendment</header><text>The table of contents in section 1(b), as amended by
			 section 201, is further amended by adding at the end of the items relating to
			 title III the following new item:</text>
					<quoted-block display-inline="no-display-inline" id="HBF9890FE7A0C42B9B2F67D38A22D50C3" style="OLC">
						<toc container-level="quoted-block-container" idref="H76B89873015544D4B782BDE2ACA61C33" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
							<toc-entry idref="H5F6785E86E694F46B657D1BAEE18BAAF" level="section">Sec. 323. Strategic
				plan.</toc-entry>
						</toc>
						<after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section><section id="HCDAAE80585EB4F6386D137BCFB1E461E"><enum>302.</enum><header>Report on
			 technology requirements</header><text display-inline="no-display-inline">Section 302 (<external-xref legal-doc="usc" parsable-cite="usc/6/182">6 U.S.C. 182</external-xref>) is amended by inserting
			 <quote>(a) <header-in-text level="subsection" style="OLC">In
			 general</header-in-text>.—</quote> before the first sentence, and by adding at
			 the end the following new subsection:</text>
				<quoted-block display-inline="no-display-inline" id="H6DAC7EBA694D48429D734116F1596578" style="OLC">
					<subsection id="H0BF4B43B34A8491D8B93CD2A3B62C113"><enum>(b)</enum><header>Report on
				technology requirements</header>
						<paragraph id="H5E97BE9A0E474C96AA3B0EE0598282F7"><enum>(1)</enum><header>In
				general</header><text display-inline="yes-display-inline">Within 90 days after
				the date of enactment, the Under Secretary shall, for each current project
				conducted by the Directorate and having a Federal cost share greater than
				$80,000,000, and on an ongoing basis thereafter for any new project conducted
				by the Directorate and having a Federal cost share greater than $80,000,000,
				provide to the appropriate congressional committees a description of—</text>
							<subparagraph id="H14072C6C989F408A8F6C42D28B7165D6"><enum>(A)</enum><text>the Department
				components and customers consulted during the development of the operational
				and technical requirements associated with the project; and</text>
							</subparagraph><subparagraph id="HF9BF3B40B82A4930A71ADCAE616F6CF0"><enum>(B)</enum><text>the extent to
				which the requirements incorporate the input of those components or
				customers.</text>
							</subparagraph></paragraph><paragraph id="HAF5E7E50A709414BB7476BEBF3D6A641"><enum>(2)</enum><header>Large
				projects</header><text>Within 90 days after the date of enactment, the
				Secretary shall, for each current project conducted by a component of the
				Department besides the Directorate, and having a life-cycle cost greater than
				$1,000,000,000, and on an ongoing basis thereafter for any new project
				conducted by a component of the Department besides the Directorate, and having
				a life-cycle cost greater than $1,000,000,000, provide to the appropriate
				congressional committees detailed operational and technical requirements that
				are associated with the project.</text>
						</paragraph></subsection><after-quoted-block>.
				</after-quoted-block></quoted-block>
			</section><section id="HED0F7CA5A3B34387B2EDBCE846884761"><enum>303.</enum><header>Report on
			 venture capital organization</header>
				<subsection id="H7D84F0360D2345AA8C231E9323478CB0"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Not later than 1 year
			 after the date of enactment of this Act, the Secretary shall submit a report to
			 the appropriate congressional committees—</text>
					<paragraph id="H86F873ADA10340CD9ED498C24EFE04B1"><enum>(1)</enum><text>assessing the
			 current role of the venture capital community in funding advanced homeland
			 security technologies, including technologies proposed by small business
			 concerns as defined under section 3 of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15 U.S.C. 632</external-xref>);
			 and</text>
					</paragraph><paragraph id="H7FD9920180C44D3A94A6F3DB79AF5869"><enum>(2)</enum><text>providing
			 recommendations about creating a nonprofit organization for the purposes of
			 delivering advanced homeland security technologies to the homeland security
			 community to further its missions.</text>
					</paragraph></subsection><subsection id="H269AF66B6D0C4D9FB4552FC46465E7A9"><enum>(b)</enum><header>Contents</header><text>The
			 report shall include the following:</text>
					<paragraph id="H62FD1C496FD64F25840143A0E4A35955"><enum>(1)</enum><text>An assessment of
			 the current awareness and insight that the Department has regarding advanced
			 private sector homeland security innovation, and the Department’s ability to
			 quickly transition innovative products into acquisitions.</text>
					</paragraph><paragraph id="H86674DDC3C7A41BAA0609EBB47D58648"><enum>(2)</enum><text>A
			 description of how the Department currently finds and works with emerging
			 companies, particularly firms that have never done business with the Federal
			 Government, small business concerns, small business concerns that are owned and
			 operated by women, small business concerns that are owned and operated by
			 veterans, and minority-owned and operated small business concerns.</text>
					</paragraph><paragraph id="H0CBB0653035944269C25A947878B13C7"><enum>(3)</enum><text>An assessment and
			 analysis of the current role that venture capitalists play in the development
			 of homeland security technologies, including an assessment of how the venture
			 capital community could be leveraged to accelerate technology, foster
			 development, and introduce new technologies needed by the homeland security
			 community.</text>
					</paragraph><paragraph id="HEADEB3659E1846D0B5C232691984C350"><enum>(4)</enum><text>An assessment of
			 whether the Department could help nascent commercial technologies mature into
			 commercial-off-the-shelf products the homeland security community could
			 acquire.</text>
					</paragraph><paragraph id="H4A6BC0BC59F64C3EA1ACB903235F91FE"><enum>(5)</enum><text>An analysis of
			 whether the Central Intelligence Agency’s In-Q-Tel organization or the
			 Department of Defense’s OnPoint Technologies organization could serve as a
			 model for the development of homeland security technology at the
			 Department.</text>
					</paragraph><paragraph id="H300551AE3D4A4170829EFA276ACBDD2B"><enum>(6)</enum><text>Recommendations of
			 the Secretary regarding how Congress could authorize the establishment of a
			 private, independent, not-for-profit organization to bridge the gap between the
			 technology needs of the homeland security community and new advances in
			 commercial technology, including specifics on potential funding levels,
			 activities for the organization, including the provision of technical
			 assistance, and whether to establish set-asides for small businesses that are
			 minority-owned and operated or located in socially and economically
			 disadvantaged areas.</text>
					</paragraph></subsection><subsection id="HB01A01CA7AB64FA486BA3DEE00DC72AE"><enum>(c)</enum><header>Use of Research
			 and Development Center</header><text>The Secretary is encouraged to use a
			 federally funded research and development center to produce the report under
			 this section.</text>
				</subsection><subsection id="HA2843705BAAC43848FF6F5E78A9281F0"><enum>(d)</enum><header>Authorization of
			 appropriations</header><text>Of the amount authorized by section 101, there is
			 authorized to be appropriated $500,000 for the report under this
			 section.</text>
				</subsection></section></title><title id="H5255630A6FEC49B89C9A9A661B2A72F8"><enum>IV</enum><header>Directorate of
			 Science and Technology Programs</header>
			<section id="H63336CF045C146BC8159B95FC2937113"><enum>401.</enum><header>Limitations on
			 research</header><text display-inline="no-display-inline">Section 302(a)(4), as
			 designated by section 302, is further amended by inserting after
			 <quote>extramural programs,</quote> the following: <quote>that, to the greatest
			 extent possible, addresses a prioritized risk to the homeland as identified by
			 a risk analysis under section 226(e) of this Act</quote>.</text>
			</section><section display-inline="no-display-inline" id="H7B4BB3DEE65B4826912F15AB642B9B2A"><enum>402.</enum><header>University-based
			 centers</header>
				<subsection id="HB4B64C94960C4BC68FD27AC5BA364AC5"><enum>(a)</enum><header>Authorization of
			 appropriations</header><text display-inline="yes-display-inline">Of the amount
			 authorized by section 101, there is authorized to be appropriated $40,000,000
			 for fiscal year 2011 and $41,200,000 for fiscal year 2012 to the Secretary to
			 carry out the university-based centers program of the Department.</text>
				</subsection><subsection id="HD6701F0AEF87411FAF36619198478BC4"><enum>(b)</enum><header>Criteria for
			 designation</header><text display-inline="yes-display-inline">Section
			 308(b)(2)(B)(iii) (<external-xref legal-doc="usc" parsable-cite="usc/6/188">6
			 U.S.C. 188(b)(2)(B)(iii)</external-xref>) is amended by inserting before the
			 period at the end the following: <quote>, including medical readiness training
			 and research, and community resiliency for public health and healthcare
			 critical infrastructure</quote>.</text>
				</subsection><subsection id="HEAF0A370B37C43EB962256A160DEFBF5"><enum>(c)</enum><header>Explosive
			 countermeasures or detection</header><text>Section 308(b)(2)(B)(iv)
			 (<external-xref legal-doc="usc" parsable-cite="usc/6/188">6 U.S.C.
			 188(b)(2)(B)(iv)</external-xref>) is amended by striking <quote>and
			 nuclear</quote> and inserting <quote>nuclear, and explosive</quote>.</text>
				</subsection></section><section id="H3DB981BD308D4C0EB56DAF03E62F7163"><enum>403.</enum><header>Review of
			 university-based centers</header>
				<subsection id="H3AFC34112DD14ACD94CEA51F3BD5C6F4"><enum>(a)</enum><header>GAO study of
			 university-Based centers</header><text display-inline="yes-display-inline">Not
			 later than 120 days after the date of enactment of this Act, the Comptroller
			 General of the United States shall initiate a study to assess the
			 university-based centers for homeland security program authorized by section
			 308(b)(2) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/188">6 U.S.C. 188(b)(2)</external-xref>), and provide
			 recommendations to the appropriate congressional committees for appropriate
			 improvements.</text>
				</subsection><subsection id="HECB2CC33D11B423998C7A7DE64645C36"><enum>(b)</enum><header>Subject
			 matters</header><text>The study under subsection (a) shall include the
			 following:</text>
					<paragraph id="H169702DD4909426287196406C01D7452"><enum>(1)</enum><text>A
			 review of the Department’s efforts to identify key areas of study needed to
			 support the homeland security mission, and criteria that the Department
			 utilized to determine those key areas for which the Department should maintain,
			 establish, or eliminate university-based centers.</text>
					</paragraph><paragraph id="HFDC791C6ED15450E99D5483358702F18"><enum>(2)</enum><text display-inline="yes-display-inline">A review of the method by which
			 university-based centers, federally funded research and development centers,
			 and Department of Energy national laboratories receive tasking from the
			 Department, including a review of how university-based research is identified,
			 prioritized, and funded.</text>
					</paragraph><paragraph id="H5A4C690227FE43E2A5C5D6B5B2EC7783"><enum>(3)</enum><text>A
			 review of selection criteria for designating university-based centers and a
			 weighting of such criteria.</text>
					</paragraph><paragraph id="HB697F22A513F48ED9A52F1BE86423BAA"><enum>(4)</enum><text>An examination of
			 best practices from other agencies efforts to organize and use university-based
			 research to support their missions.</text>
					</paragraph><paragraph id="HFFA418C2FBD14586B9E7B9DB42D3FA15"><enum>(5)</enum><text display-inline="yes-display-inline">A review of the Department’s criteria and
			 metrics to measure demonstrable progress achieved by university-based centers
			 in fulfilling Department taskings, and mechanisms for delivering and
			 disseminating the research results of designated university-based centers
			 within the Department and to other Federal, State, and local agencies.</text>
					</paragraph><paragraph id="H60593D99CA04466CBEEB3E6621165A07"><enum>(6)</enum><text>An examination of
			 the means by which academic institutions that are not designated or associated
			 with the designated university-based centers can optimally contribute to the
			 research mission of the Directorate.</text>
					</paragraph><paragraph id="H7A8BB7E046BE40A89D18F3B953D7FA8A"><enum>(7)</enum><text>An assessment of
			 the interrelationship between the different university-based centers.</text>
					</paragraph><paragraph id="HEC800646416D47DC978C8B15EDC3D869"><enum>(8)</enum><text>A
			 review of any other essential elements of the programs determined in the
			 conduct of the study.</text>
					</paragraph></subsection><subsection id="H9A8A0FF9CC67403888E3E09BF048C056"><enum>(c)</enum><header>Moratorium on
			 new university-Based centers</header><text>The Secretary may not designate any
			 new university-based centers to research new areas in homeland security prior
			 to the completion of the Comptroller General’s review.</text>
				</subsection></section><section display-inline="no-display-inline" id="HC52A897C2E284276AA1EB61521A562C3" section-type="subsequent-section"><enum>404.</enum><header>Cybersecurity
			 research and development</header>
				<subsection id="H4B1F695349124AEABB30E5797C7CA1D2"><enum>(a)</enum><header>In
			 general</header><text>The Under Secretary shall support research, development,
			 testing, evaluation, and transition of cybersecurity technology, including
			 fundamental, long-term research to improve the ability of the United States to
			 prevent, protect against, detect, respond to, and recover from acts of
			 terrorism and cyber attacks, with an emphasis on research and development
			 relevant to large-scale, high-impact attacks.</text>
				</subsection><subsection id="H27AB17BE0A974561A0B2F57CCFB60388"><enum>(b)</enum><header>Activities</header><text>The
			 research and development supported under subsection (a) shall include work
			 to—</text>
					<paragraph id="H6E802F4CE7C14831A83EB698E0B6F614"><enum>(1)</enum><text>advance the
			 development and accelerate the deployment of more secure versions of
			 fundamental Internet protocols and architectures, including for the domain name
			 system and routing protocols;</text>
					</paragraph><paragraph id="HD5A74FF500B248EE8B4461EAB327E90A"><enum>(2)</enum><text>improve and create
			 technologies for detecting attacks or intrusions, including real-time
			 monitoring and real-time analytic technologies;</text>
					</paragraph><paragraph id="H4AEFAC72D20E4DBE833D0301FB29F0BE"><enum>(3)</enum><text>improve and create
			 mitigation and recovery methodologies, including techniques and policies for
			 real-time containment of attacks, and development of resilient networks and
			 systems that degrade gracefully;</text>
					</paragraph><paragraph id="HDE6B46E21017406CA4C8B94866CD7075"><enum>(4)</enum><text>develop and
			 support infrastructure and tools to support cybersecurity research and
			 development efforts, including modeling, testbeds, and data sets for assessment
			 of new cybersecurity technologies;</text>
					</paragraph><paragraph id="HD64F3D9AE3A140BDBFAC234A697D185B"><enum>(5)</enum><text>assist the
			 development and support of technologies to reduce vulnerabilities in process
			 control systems;</text>
					</paragraph><paragraph id="H6504199E7523476180B840DC3EB937DD"><enum>(6)</enum><text>develop and
			 support cyber forensics and attack attribution; and</text>
					</paragraph><paragraph id="HA703D846A80F47F9B25DB2F7826D1D54"><enum>(7)</enum><text>test, evaluate,
			 and facilitate the transfer of technologies associated with the engineering of
			 less vulnerable software and securing the information technology software
			 development lifecycle.</text>
					</paragraph></subsection><subsection id="H5A9E35CB286040A8A4076381B2C9CC39"><enum>(c)</enum><header>Coordination</header><text>In
			 carrying out this section, the Under Secretary shall coordinate activities
			 with—</text>
					<paragraph id="H5AB2B207A423463194222F0FE5FB814D"><enum>(1)</enum><text>the Under
			 Secretary for National Protection and Programs; and</text>
					</paragraph><paragraph id="HC4BDEBB91B6746E9878E4653133FFE1C"><enum>(2)</enum><text>the heads of other
			 relevant Federal departments and agencies, including the National Science
			 Foundation, the Defense Advanced Research Projects Agency, the Information
			 Assurance Directorate of the National Security Agency, the National Institute
			 of Standards and Technology, the Department of Commerce, and other appropriate
			 working groups established by the President to identify unmet needs and
			 cooperatively support activities, as appropriate.</text>
					</paragraph></subsection><subsection id="H1209CFD0F44C49D192B11A9206025665"><enum>(d)</enum><header>Authorization of
			 Cybersecurity Preparedness Consortium and Training Center</header>
					<paragraph id="H2C5484E3FA0546FB93EA71ADD026A504"><enum>(1)</enum><header>Cybersecurity
			 Preparedness Consortium</header><text display-inline="yes-display-inline">Subtitle C of title II of the Homeland
			 Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/121">6 U.S.C. 121 et seq.</external-xref>) is amended by
			 adding at the end the following new section:</text>
						<quoted-block display-inline="no-display-inline" id="H254B5AEA461F4679B6A5477322484B97" style="OLC">
							<section id="H8E7440250B8D4F6FB09F228101980135"><enum>226.</enum><header>Cybersecurity
				Preparedness Consortium</header>
								<subsection id="HA378226886FB4669AFBB8EE08B321C6E"><enum>(a)</enum><header>In
				General</header><text display-inline="yes-display-inline">To assist the
				Secretary in carrying out the requirements of section 404(a) of the Homeland
				Security Science and Technology Authorization Act of 2010, the Secretary may
				establish a consortium to be known as the <quote>Cybersecurity Preparedness
				Consortium</quote>.</text>
								</subsection><subsection id="H1693F7D6533B4302988CB13D21B22EEA"><enum>(b)</enum><header>Functions</header><text>The
				Consortium shall—</text>
									<paragraph id="HF624E47564D444C28D522B2D23A5062A"><enum>(1)</enum><text>provide training
				to State and local first responders and officials specifically for preparing
				and responding to cybersecurity attacks;</text>
									</paragraph><paragraph id="H88808CE08E5149D2BE77E683DF2B3776"><enum>(2)</enum><text>develop and update
				a curriculum and training model for State and local first responders and
				officials;</text>
									</paragraph><paragraph id="HADB1AD6330064EAEAB752C9BD77016AC"><enum>(3)</enum><text>provide technical
				assistance services to build and sustain capabilities in support of
				cybersecurity preparedness and response;</text>
									</paragraph><paragraph id="HB900C9BF690A45578463AF77ADDD60A2"><enum>(4)</enum><text>conduct
				cybersecurity training and simulation exercises to defend from and respond to
				cyber attacks; and</text>
									</paragraph><paragraph id="HEB93AA117E7D41DCB56745E95C925263"><enum>(5)</enum><text>coordinate all
				cybersecurity preparedness training activities conducted by the
				Department.</text>
									</paragraph></subsection><subsection id="HF9415AC0F5D44C0795FCC5572C00D70E"><enum>(c)</enum><header>Members</header><text>The
				Consortium shall consist of academic, nonprofit, and government partners
				that—</text>
									<paragraph id="H6858EBE110234A1EA87FA63087293DE6"><enum>(1)</enum><text>have demonstrated
				expertise in developing and delivering cybersecurity training in support of
				homeland security;</text>
									</paragraph><paragraph id="H6E55A58E43834ED8B274CFEEC1581071"><enum>(2)</enum><text>have demonstrated
				ability to utilize existing courses and expertise developed by the
				Department;</text>
									</paragraph><paragraph id="H3B611FB5DF8847E7A3E51C9833CE72EB"><enum>(3)</enum><text>have demonstrated
				ability to coordinate with the National Domestic Preparedness Consortium and
				other training programs within the Department; and</text>
									</paragraph><paragraph id="H63C7D16047DF4682A2E0E92647DC9340"><enum>(4)</enum><text>include at least 3
				academic institutions that are any combination of historically Black colleges
				and universities, Hispanic-serving institutions, or tribal colleges and
				universities, that fulfill the criteria of paragraphs (1), (2) and (3) of this
				subsection.</text>
									</paragraph></subsection><subsection id="HDC5F25D51AC041D58739861D7A534C12"><enum>(d)</enum><header>Definitions</header><text>In
				this section:</text>
									<paragraph id="HA202C662BA81437C80E2A54D6D4C33FF"><enum>(1)</enum><header>Historically
				black college or university</header><text>The term <quote>historically Black
				college or university</quote> has the meaning given the term <quote>part B
				institution</quote> in section 322(2) of the Higher Education Act of 1965
				(<external-xref legal-doc="usc" parsable-cite="usc/20/1061">20 U.S.C.
				1061(2)</external-xref>).</text>
									</paragraph><paragraph id="H23DCCD0B8A6C410D93D696AFCECFEA75"><enum>(2)</enum><header>Hispanic-serving
				institution</header><text>The term <quote>Hispanic-serving institution</quote>
				has the meaning given that term in section 502 of the Higher Education Act of
				1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1101">20 U.S.C.
				1101(a)</external-xref>).</text>
									</paragraph><paragraph id="H09BCE76065A94568A7812F0E7640DE02"><enum>(3)</enum><header>Tribal college
				or university</header><text>The term <quote>tribal college or
				university</quote> has the meaning given that term in section 316(b) of the
				Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1059c">20 U.S.C.
				1059c(b)</external-xref>).</text>
									</paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph><paragraph id="H5775B5309EBD4C56B4984C73ECF4A762"><enum>(2)</enum><header>Clerical
			 Amendment</header><text>Section 1(b) of such Act is further amended by adding
			 at the end of the items relating to such subtitle the following new
			 item:</text>
						<quoted-block display-inline="no-display-inline" id="H5FD309CBBF7A4270A278802864394337" style="OLC">
							<toc container-level="quoted-block-container" idref="H254B5AEA461F4679B6A5477322484B97" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
								<toc-entry idref="H8E7440250B8D4F6FB09F228101980135" level="section">Sec. 226. Cybersecurity Preparedness
				Consortium.</toc-entry>
							</toc>
							<after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph><paragraph id="HFF99A6FC06614B9D8C7E5DBF7FAB5A73"><enum>(3)</enum><header>Cybersecurity
			 Training Center</header><text>Subtitle C of title II of the Homeland Security
			 Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/121">6 U.S.C.
			 121 et seq.</external-xref>) is further amended by adding at the end the
			 following new section:</text>
						<quoted-block display-inline="no-display-inline" id="HE7859E61757848639854BF27D6B73D37" style="OLC">
							<section id="H876F8DB649624173AAAC51C3A6BDB322"><enum>227.</enum><header>Cybersecurity
				Training Center</header><text display-inline="no-display-inline">The Secretary
				may establish where appropriate a Cybersecurity Training Center to provide
				training courses and other resources for State and local first responders and
				officials to improve preparedness and response
				capabilities.</text>
							</section><after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph><paragraph id="H1983C201AAD741E29DA5F8A8722E080A"><enum>(4)</enum><header>Clerical
			 Amendment</header><text>Section 1(b) of such Act is further amended by adding
			 at the end of the items relating to such subtitle the following new
			 item:</text>
						<quoted-block display-inline="no-display-inline" id="HA93EACF7353C421EBC3F246F18EFC4D2" style="OLC">
							<toc regeneration="no-regeneration">
								<toc-entry level="section">Sec. 227. Cybersecurity Training Center.
				</toc-entry>
							</toc>
							<after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph></subsection><subsection id="HCD442709D3744BF088D70BF8AA948FD5"><enum>(e)</enum><header>Authorization of
			 appropriations</header><text>Of the amount authorized by section 101, there is
			 authorized to be appropriated $75,000,000 to the Department for each of fiscal
			 years 2011 and 2012 for the cybersecurity research and development activities
			 of the Directorate to prevent, detect, and respond to acts of terrorism and
			 other large-scale disruptions to information infrastructure.</text>
				</subsection></section><section id="HACEF5C77D54C44FB9F97562835CCA5C9"><enum>405.</enum><header>National
			 Research Council study of cybersecurity incentives</header>
				<subsection id="H496F00DA73084ED4A0C6BD3F31531EB9"><enum>(a)</enum><header>Study</header><text display-inline="yes-display-inline">Not later than 90 days after the date of
			 enactment of this Act, the Under Secretary and the Under Secretary for National
			 Protection and Programs of the Department shall seek to enter into an agreement
			 with the National Research Council of the National Academy of Sciences to
			 conduct a study to assess methods that might be used to promote market
			 mechanisms that further cybersecurity and make recommendations for appropriate
			 improvements thereto.</text>
				</subsection><subsection id="H5964178393CF4C29A24346FFB8BB1FE2"><enum>(b)</enum><header>Subject
			 matters</header><text>The study required under subsection (a) shall include the
			 following:</text>
					<paragraph id="HFDEDBF8C3698481D8E08A5AD92387358"><enum>(1)</enum><text display-inline="yes-display-inline">Liability that subjects software and system
			 vendors and system operators to potential damages for system breaches.</text>
					</paragraph><paragraph id="HFBAD85753A52466C85C2B1A0AED03809"><enum>(2)</enum><text display-inline="yes-display-inline">Mandated reporting of security breaches
			 that could threaten critical functions, including provision of electricity and
			 resiliency of the financial sector.</text>
					</paragraph><paragraph id="H6F247580CDFB4C468957C7190BEE2757"><enum>(3)</enum><text>Regulation that
			 under threat of civil penalty, imposes best practices on system operators of
			 critical infrastructure.</text>
					</paragraph><paragraph id="H9336994C59664EEEB17D21A070FBB248"><enum>(4)</enum><text>Certification from
			 standards bodies about conformance to relevant cybersecurity standards that can
			 be used as a marketplace differentiation.</text>
					</paragraph><paragraph id="HFE4744040C744400AE2A63BFE890B396"><enum>(5)</enum><text>Accounting
			 practices that require companies to report their cybersecurity practices and
			 postures and the results of independently conducted red team simulated attacks
			 or exercises.</text>
					</paragraph><paragraph id="HCD9AD352DD5B4C988A7267ADE8B8EEE5"><enum>(6)</enum><text>Cybersecurity risk
			 insurance, including analysis of the current marketplace and recommendations to
			 promote cybersecurity insurance.</text>
					</paragraph></subsection><subsection id="H7B53DCDB64E5478A8A0A6586DD4FB743"><enum>(c)</enum><header>Submission to
			 Congress</header><text display-inline="yes-display-inline">Not later than two
			 years after the date of enactment of this Act, the Secretary shall submit to
			 the appropriate congressional committees the results of the study required
			 under subsection (a), together with any recommendations of the Secretary
			 related thereto.</text>
				</subsection><subsection id="H7807BA11EA3C4892A32E4619AE4215BB"><enum>(d)</enum><header>Authorization of
			 appropriations</header><text>Of the amount authorized by section 101, there is
			 authorized to be appropriated $500,000 to the Department for fiscal year 2011
			 to carry out this section.</text>
				</subsection></section><section display-inline="no-display-inline" id="H10C92F904D8E4CAC9D1837F8188E502E"><enum>406.</enum><header>Research on
			 cyber compromise of infrastructure</header>
				<subsection id="H1BA15452C06746529AB4FB3B2F6A3A64"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Pursuant to section
			 201 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/121">6 U.S.C. 121</external-xref>) and in furtherance of
			 domestic preparedness for and collective response to a cyber attack by a
			 terrorist or other person, the Secretary, working with the heads of other
			 national security and intelligence agencies, shall periodically conduct
			 research to determine if the security of federally owned programmable
			 electronic devices and communication networks, including hardware, software,
			 and data, essential to the reliable operation of critical electric
			 infrastructure has been compromised.</text>
				</subsection><subsection id="HF0B09295D374418F9008A1DF54C1585B"><enum>(b)</enum><header>Scope of
			 research</header><text display-inline="yes-display-inline">The scope of the
			 research required under subsection (a) shall include the following:</text>
					<paragraph id="H5CE9FD2A9EEE46298B01614A5E28C0F2"><enum>(1)</enum><text>The extent of any
			 compromise.</text>
					</paragraph><paragraph id="HDE771DF3B1C442C9A811CA3AF26D71E3"><enum>(2)</enum><text>An identification
			 of any attackers, including any affiliations with terrorists, terrorist
			 organizations, state entities, and non-state entities.</text>
					</paragraph><paragraph id="H81B6A8C6D54D4AEE855EB0C3B6063A1A"><enum>(3)</enum><text>The method of
			 penetration.</text>
					</paragraph><paragraph id="H0B21E3BD76F741D58111771B87F64EB4"><enum>(4)</enum><text>Ramifications of
			 any such compromise on future operations of critical electric
			 infrastructure.</text>
					</paragraph><paragraph id="HAA262D75F406420A86BA93A0D0656A25"><enum>(5)</enum><text>Secondary
			 ramifications of any such compromise on other critical infrastructure sectors
			 and the functioning of civil society.</text>
					</paragraph><paragraph id="HD51DF11B26714985B1C2223FE3141377"><enum>(6)</enum><text>Ramifications of
			 any such compromise on national security, including war fighting
			 capability.</text>
					</paragraph><paragraph id="HCD5E6A476F7D45DB97BF3323B2C3CA26"><enum>(7)</enum><text>Recommended
			 mitigation activities.</text>
					</paragraph></subsection><subsection id="H5033F34E9D62464CAE15B790C12ABA37"><enum>(c)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 30 days after the date a
			 determination has been made under subsection (a), the Secretary shall submit to
			 the appropriate congressional committees a report on the findings of such
			 determination. The report may contain a classified annex if the Secretary
			 determines it to be appropriate.</text>
				</subsection></section><section id="H4BC827EAC48F465385CEC35822DF2C01"><enum>407.</enum><header>Dual-use
			 terrorist risks from synthetic genomics</header>
				<subsection id="H6B042F4CD76A429E80AFDBBEF6D9A609"><enum>(a)</enum><header>Sense of
			 congress</header><text display-inline="yes-display-inline">It is the sense of
			 Congress that the field of synthetic genomics has the potential to facilitate
			 enormous gains in fundamental discovery and biotechnological applications, but
			 it also has inherent dual-use homeland security risks that must be
			 managed.</text>
				</subsection><subsection id="HA209BF8EB7EC445D87095C5BD08C9601"><enum>(b)</enum><header>Requirement</header><text>The
			 Under Secretary shall examine and report to the appropriate congressional
			 committees by not later than one year after the date of enactment of this Act
			 on the homeland security implications of the dual-use nature of synthetic
			 genomics and, if the Under Secretary determines that such research is
			 appropriate, may conduct research in that area, including—</text>
					<paragraph id="H101CF7ECD7C34EEE84C8563D33148F77"><enum>(1)</enum><text display-inline="yes-display-inline">determining the current capability of
			 synthetic nucleic acid providers to effectively differentiate a legitimate
			 customer from a potential terrorist or other malicious actor;</text>
					</paragraph><paragraph id="HC24EAA6377134005A440F0F13B78560B"><enum>(2)</enum><text display-inline="yes-display-inline">determining the current capability of
			 synthetic nucleic acid providers to effectively screen orders for sequences of
			 homeland security concern; and</text>
					</paragraph><paragraph id="H8E27520556B74FB5AAA8F08BFD581D1D"><enum>(3)</enum><text>making
			 recommendations regarding screening software, protocols, and other remaining
			 capability gaps uncovered by the study.</text>
					</paragraph></subsection></section><section id="H230082A639DA4BF2812A4837556ECF44"><enum>408.</enum><header>Underwater
			 tunnel security demonstration project</header>
				<subsection id="HDF4A348AFFE24060B8A12068E2271CC2"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">The Under Secretary,
			 in consultation with the Assistant Secretary of the Transportation Security
			 Administration, shall conduct a demonstration project to test and assess the
			 feasibility and effectiveness of certain technologies to enhance the security
			 of underwater public transportation tunnels against terrorist attacks involving
			 the use of improvised explosive devices.</text>
				</subsection><subsection id="H8A241B5B430E4348B5645C9EDD0AA889"><enum>(b)</enum><header>Inflatable
			 plugs</header><text display-inline="yes-display-inline">At least one of the
			 technologies tested under subsection (a) shall be inflatable plugs that may be
			 rapidly deployed to prevent flooding of an underwater public transportation
			 tunnel.</text>
				</subsection><subsection id="H425AC29C4EBA47B08CC88216C3FEA161"><enum>(c)</enum><header>Report</header><text>Not
			 later than 180 days after the completion of the demonstration project under
			 subsection (a), the Under Secretary shall submit to the appropriate
			 congressional committees a report on the results of the demonstration
			 project.</text>
				</subsection></section><section id="HBFCB6CC60F294DCCAD8B926BCEA901E5"><enum>409.</enum><header>Threats
			 research and development</header>
				<subsection id="HF510F9D2293944BEA4AC6090A302BB10"><enum>(a)</enum><header>In
			 general</header><text>The Under Secretary, in carrying out responsibilities
			 under section 302 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/182">6 U.S.C. 182</external-xref>), may
			 support research, development, testing, evaluation, and transition of
			 technology that increases the Nation’s preparedness against chemical and
			 biological threats and strengthens the Nation’s preparedness and collective
			 response against those threats through improved threat awareness and advanced
			 surveillance, detection, and protective countermeasures, and to enhance the
			 development of border security technology.</text>
				</subsection><subsection id="HB36DDA82E5F24F0496DDD134CD21E462"><enum>(b)</enum><header>Biological
			 security</header><text>To carry out subsection (a), the Under Secretary may
			 conduct research to develop understanding, technologies, and systems needed to
			 protect against biological attacks on the Nation’s population or
			 infrastructure, including—</text>
					<paragraph id="H27372D98742A400FB128F9FC18438470"><enum>(1)</enum><text>providing advanced
			 planning tools, concepts of operations (including alarm resolution protocols),
			 and training exercises for responding to and recovering from biological
			 attacks;</text>
					</paragraph><paragraph id="HC16F1A40A59A481B9DC6B77428BB07A8"><enum>(2)</enum><text>developing
			 biological assays and improved detection technology that will operate with
			 faster detection times, lower costs, and the potential for increased
			 geographical coverage to the Nation when compared to existing homeland security
			 technologies;</text>
					</paragraph><paragraph id="H5023B37522964F4F83F2E72296E59979"><enum>(3)</enum><text display-inline="yes-display-inline">characterizing threats posed by biological
			 weapons, anticipating future threats, conducting comprehensive threat and risk
			 assessments to guide prioritization of the Nation’s biodefense investments, and
			 developing population threat assessments that inform the issuance of material
			 threat determinations;</text>
					</paragraph><paragraph id="HC97B41519EAB476A86BC81B827FE26A4"><enum>(4)</enum><text display-inline="yes-display-inline">conducting bioforensics research in support
			 of criminal investigations to aid attribution, apprehension, and prosecution of
			 a terrorist or other perpetrator of a biological attack, and providing tools
			 and facilities that Federal law enforcement investigators need to analyze
			 biological threat evidence recovered, including operation of the National
			 Bioforensic Analysis Center; and</text>
					</paragraph><paragraph id="H5F5CC8A6C9B849698E2C14E96494EC88"><enum>(5)</enum><text display-inline="yes-display-inline">conducting appropriate research and studies
			 that will increase our understanding of and uncertainties associated with risk
			 and threats posed by biological agents through the Biological Threat
			 Characterization Center and other means as determined by the Secretary.</text>
					</paragraph></subsection><subsection id="H53A8BA0A9DB442F5BDE8B94B8BE9E76A"><enum>(c)</enum><header>Agricultural
			 security</header><text display-inline="yes-display-inline">The Under Secretary
			 may conduct research and development to enhance the protection of the Nation’s
			 agriculture and food system against terrorist attacks, and other emergency
			 events through enhancement of current agricultural countermeasures, development
			 of new agricultural countermeasures, and provision of safe, secure,
			 state-of-the-art biocontainment laboratories for researching foreign animal and
			 zoonotic diseases, including—</text>
					<paragraph id="HB11CCA1411B54F7892BA8EB5DE3306A8"><enum>(1)</enum><text>developing
			 technologies to defend the Nation against the natural and intentional
			 introduction of selected foreign animal diseases, developing next-generation
			 vaccines and diagnostics in coordination with the Department of Agriculture,
			 and modeling the spread of foreign animal diseases and their economic impact to
			 evaluate strategies for controlling outbreaks; and</text>
					</paragraph><paragraph id="H6EF732C1356C439E8BA0486F4D398207"><enum>(2)</enum><text display-inline="yes-display-inline">leading the Department effort to enhance
			 interagency coordination of research and development of agricultural disease
			 countermeasures.</text>
					</paragraph></subsection><subsection id="H53EDB299E0A94D988724B731EF669F09"><enum>(d)</enum><header>Chemical
			 security</header><text>The Under Secretary may develop technology to reduce the
			 Nation’s vulnerability to chemical warfare agents and commonly used toxic
			 industrial chemicals, including—</text>
					<paragraph id="HC0852140FC774A718F8299BEA4274773"><enum>(1)</enum><text>developing a
			 robust and enduring analytical capability in support of chemical
			 countermeasures development, including developing and validating forensic
			 methodologies and analytical tools, conducting risk and vulnerability
			 assessments based on chemical threat properties, and maintaining infrastructure
			 including the Chemical Security Analysis Center;</text>
					</paragraph><paragraph id="H76BC0A4C1F344BDDA0578E79EA88252B"><enum>(2)</enum><text>developing
			 technology to detect a chemical threat release; and</text>
					</paragraph><paragraph id="H25D5209A97E845EE8F7CC314915D5716"><enum>(3)</enum><text>developing
			 technologies and guidance documents to foster a coordinated approach to
			 returning a chemically contaminated area to a normal condition, and to foster
			 analysis of contaminated areas both before and after the restoration
			 process.</text>
					</paragraph></subsection><subsection display-inline="no-display-inline" id="HDE85C1E8FDF640F8A8E8D2B573261E24"><enum>(e)</enum><header>Risk
			 assessments</header>
					<paragraph id="H4D42EECA71314228981F23B75586220E"><enum>(1)</enum><header>In
			 general</header><text display-inline="yes-display-inline">The Under Secretary
			 shall produce risk assessments for biological and chemical threats, and shall
			 coordinate with the Director of the Domestic Nuclear Detection Office of the
			 Department, the Assistant Secretary of the Office of Health Affairs of the
			 Department, and the Assistant Secretary of Infrastructure Protection of the
			 Department on an integrated risk assessment, including regarding chemical,
			 biological, radiological, nuclear, and explosive threats.</text>
					</paragraph><paragraph id="H81669EFCC5E34A7FAF5F931B75F27302"><enum>(2)</enum><header>Usage</header><text display-inline="yes-display-inline">The assessments required under paragraph
			 (1) shall be used to inform and guide the threat assessments and determinations
			 by the Secretary regarding agents and toxins pursuant to section 302(9) of the
			 Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/182">6 U.S.C. 182(9)</external-xref>), and to guide
			 prioritization of other homeland defense activities, as appropriate.</text>
					</paragraph><paragraph id="HB187AD29A96940E2B79B5B4A3EEB4452"><enum>(3)</enum><header>Task
			 force</header><text display-inline="yes-display-inline">The Under Secretary for
			 Science and Technology shall convene an interagency task force of relevant
			 subject matter experts to assess the proposed methodology to be used for each
			 assessment required under paragraph (1), and to provide recommendations to the
			 Under Secretary as to the adequacy of such methodology.</text>
					</paragraph></subsection><subsection id="HFE6A90E91A6B4A5597663FDA2EB2F9E5"><enum>(f)</enum><header>Border
			 security</header><text>The Under Secretary may develop technology, in
			 coordination with the Commissioner of Customs and Border Protection, to gain
			 effective control of the international land borders of the United States within
			 5 years after the date of enactment of this Act. In carrying out such
			 development activities, the Under Secretary shall ensure coordination and
			 integration between new technologies developed and those already utilized by
			 U.S. Customs and Border Protection.</text>
				</subsection></section><section id="HE63C3036C945439FA329682159E74DDD"><enum>410.</enum><header>Maritime domain
			 awareness and maritime security technology test, evaluation, and transition
			 capabilities</header>
				<subsection id="HE34AC1A1573C4348BE0170522434BB28"><enum>(a)</enum><header>Global maritime
			 domain awareness and maritime security technology test, evaluation, and
			 transition capabilities</header>
					<paragraph id="HD9455990C8044D5F9BBC40A74F5EBEE0"><enum>(1)</enum><header>Establishment</header><text>The
			 Secretary shall establish capabilities for conducting global maritime domain
			 awareness and maritime security technology test, evaluation, and transition, as
			 provided in this subsection.</text>
					</paragraph><paragraph id="H23E30A9ABD364D84ABB32FA0BDD959DB"><enum>(2)</enum><header>Purpose</header><text display-inline="yes-display-inline">The purpose of such capabilities shall be
			 to—</text>
						<subparagraph id="H7DB6C525F2744F708334BF278D513E84"><enum>(A)</enum><text>direct technology
			 test, evaluation, and transition activities in furtherance of border and
			 maritime security; and</text>
						</subparagraph><subparagraph id="HF3983533C3C148828F42854BAA73DAB5"><enum>(B)</enum><text>evaluate such
			 technology in diverse environments including coastal, seaport, and offshore
			 locations.</text>
						</subparagraph></paragraph></subsection><subsection id="H70425D0D65C04683BE9EE4134456D486"><enum>(b)</enum><header>Coordination</header><text>The
			 Secretary, acting through the Under Secretary, shall ensure that—</text>
					<paragraph id="HEA279ECEF75340EF9A415733DD862651"><enum>(1)</enum><text>technology test,
			 evaluation, and transition efforts funded by the Department in furtherance of
			 border and maritime security avoid duplication of efforts, reduce unnecessary
			 redundancies, streamline processes, increase efficiencies, and otherwise
			 complement existing Department and other efforts in border and maritime
			 security; and</text>
					</paragraph><paragraph id="HE6ADEAD67A6A4FBF928F4035EEE7D3F5"><enum>(2)</enum><text>the results of
			 such efforts are shared with the appropriate congressional committees and
			 others as determined appropriate by the Secretary.</text>
					</paragraph></subsection></section><section id="HA7E3DA9B24ED4D499A2829746360E424"><enum>411.</enum><header>Rapid
			 biological threat detection and identification</header>
				<subsection id="H4275001CA89E4606AD4FCAC08422F312"><enum>(a)</enum><header>In
			 general</header><text>Notwithstanding section 302(4) of the Homeland Security
			 Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/182">6 U.S.C.
			 182(4)</external-xref>), the Secretary shall require the Under Secretary, in
			 consultation with other relevant operational components of the Department, to
			 assess whether the development of screening capabilities for pandemic influenza
			 and other infectious diseases should be undertaken by the Directorate to
			 support entry and exit screening at ports of entry and for other
			 purposes.</text>
				</subsection><subsection id="H35A33CDE165F49A98F1F29D17B5038CE"><enum>(b)</enum><header>Development of
			 methods</header><text>If the Under Secretary determines that the development of
			 such screening capabilities should be undertaken, the Secretary shall, to the
			 extent possible, initiate development of safe and effective methods to rapidly
			 screen incoming travelers at ports of entry for pandemic influenza and other
			 infectious diseases.</text>
				</subsection><subsection id="H35A90DCDD7DD4654B10D8C95642A8E2A"><enum>(c)</enum><header>Collaboration</header><text>In
			 developing methods under subsection (b), the Secretary may collaborate with
			 other Federal agencies, as appropriate.</text>
				</subsection></section><section id="H907A526D991D4990905B09C5219BA4B2"><enum>412.</enum><header>Educating the
			 public about radiological threats</header>
				<subsection id="H1FDE8F60390348E48D311990554E99A6"><enum>(a)</enum><header>Public awareness
			 campaign</header><text display-inline="yes-display-inline">The Secretary shall
			 develop a public awareness campaign to enhance preparedness and collective
			 response to a radiological attack, including the following:</text>
					<paragraph id="HC0EE25777F7D44ACBF296AC9E5C21295"><enum>(1)</enum><text display-inline="yes-display-inline">A clear explanation of the dangers
			 associated with radioactive materials.</text>
					</paragraph><paragraph id="HF29FA5AAA99244368A3C4631B59C38E9"><enum>(2)</enum><text>Possible effects
			 of different levels of radiation exposure, including a clear description of the
			 how radiation exposure occurs and the amount of exposure necessary to be of
			 concern.</text>
					</paragraph><paragraph id="HFBED4AEAA06B4D56ABDC8B64A72C37DA"><enum>(3)</enum><text>Actions that
			 members of the public should take regarding evacuation, personal
			 decontamination, and medical treatment.</text>
					</paragraph></subsection><subsection id="H0828E15CBE7F4696B5A1DAA1963BCB97"><enum>(b)</enum><header>Recovery</header><text>The
			 Secretary shall develop a plan for postevent recovery from a radiological
			 attack. Such plan shall include the following:</text>
					<paragraph id="H51BE1295CC994953B3ABDB2BAF11D118"><enum>(1)</enum><text display-inline="yes-display-inline">A definition of the demarcation between
			 response and recovery from a radiological attack.</text>
					</paragraph><paragraph id="H4D9D3B319347482780F1CA43E969E398"><enum>(2)</enum><text>Consideration of
			 multiple attack scenarios, including a worst-case scenario.</text>
					</paragraph><paragraph id="HA668F2E941774C258AD07D202FD56163"><enum>(3)</enum><text>Consideration of
			 multiple recovery strategies, including decontamination, demolition and
			 removal, and relocation.</text>
					</paragraph><paragraph id="H4197D8A8099B4C7894F6DAD8FD583678"><enum>(4)</enum><text>Consideration of
			 economic, health, and psychological effects.</text>
					</paragraph></subsection></section><section id="HE6EE59F8D27A4EFC94D93AA6C873F6A4"><enum>413.</enum><header>Rural
			 resilience initiative</header>
				<subsection id="H2D0E5778E9494DFF92D1FA1554299E75"><enum>(a)</enum><header>In
			 general</header><text>The Under Secretary shall conduct research intended to
			 assist State, local, and tribal leaders and the private sector in developing
			 the tools and methods to enhance preparation for, and response and resilience
			 to, terrorist events and other incidents.</text>
				</subsection><subsection id="HF10BDA955B944CCDB11B453D0A435C79"><enum>(b)</enum><header>Included
			 activities</header><text>Activities under this section may include—</text>
					<paragraph id="HB0C437FDADDF44CC933AB5A3F23414B6"><enum>(1)</enum><text>research and
			 implementation through outreach activities with rural communities;</text>
					</paragraph><paragraph id="H44234F11C64841219528F030059C7309"><enum>(2)</enum><text>an examination of
			 how communities employ resilience capabilities and response assets;</text>
					</paragraph><paragraph id="H06C428D37BD34CEA956C7D69ED994737"><enum>(3)</enum><text>a
			 community resilience baseline template for determining the resilience capacity
			 of a rural community;</text>
					</paragraph><paragraph id="H3A2E5D13E837482AB3BE431DD7C461B7"><enum>(4)</enum><text>a
			 plan to address community needs for resilience;</text>
					</paragraph><paragraph commented="no" id="H532ACDD8E4D9405CB18B5AD4D84A3EE2"><enum>(5)</enum><text>an education
			 program for community leaders and first responders about their resilience
			 capacity and mechanisms for mitigation, including via distance learning;
			 and</text>
					</paragraph><paragraph id="H7D0FEC4AF3B14A9CAC643A52873160D9"><enum>(6)</enum><text>a
			 mechanism by which this research can serve as a model for adoption by
			 communities across the Nation.</text>
					</paragraph></subsection></section><section id="H169F9C41635F465CADA655F83E08BB46"><enum>414.</enum><header>Sense of
			 Congress regarding the need for interoperability standards for Internet
			 protocol video surveillance technology</header><text display-inline="no-display-inline">It is the sense of Congress that—</text>
				<paragraph id="H3ED8E75DD25248C7AD6754C835BC3012"><enum>(1)</enum><text>video surveillance
			 systems that operate over the Internet are an emerging homeland security
			 technology that has the potential of significantly improving homeland security
			 forensic and analytical capability;</text>
				</paragraph><paragraph id="H7BD22BA8387146A0AAB82273CEDAD4E9"><enum>(2)</enum><text>to realize the
			 full security benefits of such emerging homeland security technology, there
			 should be interoperability standards for such technology;</text>
				</paragraph><paragraph id="H35846719CA494DDEAE18E84C3C1A2FE6"><enum>(3)</enum><text>the Directorate,
			 working with the National Institute of Standards and Technology and any other
			 appropriate Federal agencies, should encourage the private sector to develop
			 interoperability standards for such emerging homeland security technology;
			 and</text>
				</paragraph><paragraph id="HAAA8D78C42CC4A66ADBC0149F15E5D53"><enum>(4)</enum><text>such efforts will
			 help the Federal Government, which is one of the largest users of surveillance
			 technology, in detecting, deterring, preventing, and responding to terrorist
			 attacks.</text>
				</paragraph></section><section display-inline="no-display-inline" id="H75DFCBFB8CC2466494ED6A6AC9046B35" section-type="subsequent-section"><enum>415.</enum><header>Homeland Security
			 Science and Technology Fellows Program</header>
				<subsection id="H128E0B321A5D469CB3B4D7102A159A0C"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Title III of the
			 Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/181">6 U.S.C. 181 et seq.</external-xref>) is further
			 amended by adding at the end the following new section:</text>
					<quoted-block display-inline="no-display-inline" id="HCCC3FD5FCC5844F796B4EF876532A8DC" style="OLC">
						<section id="H352DCA9ADD5A49959786400086F0DF2D"><enum>324.</enum><header>Homeland
				Security Science and Technology Fellows Program</header>
							<subsection id="HF7633D5515B94ABEA31208CB666E90BE"><enum>(a)</enum><header>Establishment</header><text>The
				Secretary, acting through the Under Secretary for Science and Technology, shall
				establish a fellows program, to be known as the Homeland Security Science and
				Technology Fellows Program, under which the Under Secretary shall facilitate
				the temporary placement of scientists in relevant scientific or technological
				fields for up to two years in components of the Department with a need for
				scientific and technological expertise.</text>
							</subsection><subsection id="H319183DA1A6C46D6BB8192AFB1F1810F"><enum>(b)</enum><header>Utilization of
				fellows</header>
								<paragraph id="H687159FD53334ACAB1DEAD6751CC6D3E"><enum>(1)</enum><header>In
				general</header><text>Under the Program, the Under Secretary may employ
				fellows—</text>
									<subparagraph id="HD21EB7FAE41C47E0879217B0B2F139A4"><enum>(A)</enum><text display-inline="yes-display-inline">for the use of the Directorate of Science
				and Technology; or</text>
									</subparagraph><subparagraph id="HAA3A4B6BB9EC495993C40B0188D037C9"><enum>(B)</enum><text>for the use of
				Department components outside the Directorate, under an agreement with the head
				of such a component under which the component will reimburse the Directorate
				for the costs of such employment.</text>
									</subparagraph></paragraph><paragraph id="H4BDE5624F0044C9E97EB6E46897A15E6"><enum>(2)</enum><header>Responsibilities</header><text>Under
				such an agreement—</text>
									<subparagraph id="H9CF5B462F7AB42AFA1F1D3D43D9DC065"><enum>(A)</enum><text>the Under
				Secretary shall—</text>
										<clause id="H7BCFA89A82A84793BD744C1E478775A6"><enum>(i)</enum><text>solicit and accept
				applications from individuals who are currently enrolled in graduate programs,
				or have received a graduate degree within 3 years prior to the time of
				application in scientific and engineering fields related to the promotion of
				securing the homeland, including—</text>
											<subclause id="HA54FCFDA63C34429AA3CCB8A4157B23E"><enum>(I)</enum><text>biological,
				chemical, physical, behavioral, social, health, medical, and computational
				sciences;</text>
											</subclause><subclause id="H0C44174F2F4B47BCBAA06C8D308CBA10"><enum>(II)</enum><text>geosciences;</text>
											</subclause><subclause id="H6FBA8EDAEAC54B63ACEB94DB229535DC"><enum>(III)</enum><text>all fields of
				engineering; and</text>
											</subclause><subclause id="H15413C1B419841AD808D397297EE0761"><enum>(IV)</enum><text>such other
				disciplines as are determined relevant by the Secretary;</text>
											</subclause></clause><clause id="H38D15AB62924457DB57C6F2F1D3BE1A4"><enum>(ii)</enum><text>screen applicant
				candidates and interview them as appropriate to ensure that they possess the
				appropriate level of scientific and engineering expertise and
				qualifications;</text>
										</clause><clause id="H9D827481258A4D4FB84C38CC6B53B479"><enum>(iii)</enum><text>provide a list
				of qualified applicants to the heads of Department components seeking to
				utilize qualified fellows;</text>
										</clause><clause id="H7D3688431B464D71B753F192F2FE8C8B"><enum>(iv)</enum><text>pay financial
				compensation to such fellows;</text>
										</clause><clause id="HD4AB9CAE5A7E482A981F7DA7759CF0D8"><enum>(v)</enum><text display-inline="yes-display-inline">coordinate with the Chief Security Officer
				to facilitate and expedite provision of security clearances to fellows, as
				appropriate; and</text>
										</clause><clause id="H0830E9B694FC41C79D7B4EC413088F61"><enum>(vi)</enum><text>otherwise
				administer all aspects of the fellows’ employment with the Department;
				and</text>
										</clause></subparagraph><subparagraph id="H850F537E4EEE4649AA00B0E1E7DDCF41"><enum>(B)</enum><text>the head of the
				component utilizing the fellow shall—</text>
										<clause id="HA651D5E8417649758A5A2AB4271A879A"><enum>(i)</enum><text>select a fellow
				from the list of qualified applicants provided by the Under Secretary;</text>
										</clause><clause id="H119BC756EDF84E1E9C04864DF2C29041"><enum>(ii)</enum><text>reimburse the
				Under Secretary for the costs of employing the fellow selected; and</text>
										</clause><clause id="H328103819C12451A90EFA45F2C593066"><enum>(iii)</enum><text>be responsible
				for the day-to-day management of the fellow.</text>
										</clause></subparagraph></paragraph></subsection><subsection id="HB05E2CFB1DB24FCD878CBA39CFC2CC57"><enum>(c)</enum><header>Applications
				from associations</header><text display-inline="yes-display-inline">The Under
				Secretary may accept applications under subsection (b)(2)(A) that are submitted
				by science or policy associations on behalf of individuals whom such an
				association has determined may be qualified applicants under the
				program.</text>
							</subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="H99429B816FEE491FB493AB069AA5814C"><enum>(b)</enum><header>Clerical
			 amendment</header><text>The table of contents in section 1(b) of such Act is
			 further amended by adding at the end of the items relating to title III the
			 following new item:</text>
					<quoted-block display-inline="no-display-inline" id="H7A9C7F705784480DB0A01C5B87B21D84" style="OLC">
						<toc regeneration="no-regeneration">
							<toc-entry level="section">Sec. 324. Homeland Security Science and
				Technology Fellows
				Program.</toc-entry>
						</toc>
						<after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section><section display-inline="no-display-inline" id="H08852B8D427C4B0CA07B0AA7E1FD1901" section-type="subsequent-section"><enum>416.</enum><header>Biological threat
			 agent assay equivalency</header>
				<subsection id="HA1E79C2E6418474C9E615140E44732CB"><enum>(a)</enum><header>In
			 general</header><text>Title III (<external-xref legal-doc="usc" parsable-cite="usc/6/181">6 U.S.C. 181 et seq.</external-xref>) is further
			 amended by adding at the end the following new section:</text>
					<quoted-block id="HB15313BC1C61472E9BE36D4AA0370124" style="OLC">
						<section id="H7A8191D302FA40498B1A86F49F3E5C0A"><enum>325.</enum><header>Biological
				threat agent assay equivalency program</header>
							<subsection id="HD75CBF4A257143328838D506FF73CE69"><enum>(a)</enum><header>In
				general</header><text display-inline="yes-display-inline">To facilitate
				equivalent biological threat agent identification among federally operated
				biomonitoring programs, the Under Secretary, in consultation with other
				relevant Federal agencies, may implement an assay equivalency program for
				biological threat assays.</text>
							</subsection><subsection id="HD1F658A0F1FA4E90A387C3A72BAD820F"><enum>(b)</enum><header>Features</header><text>In
				order to establish assay performance equivalency to support homeland security
				and public health security decisions, the program may—</text>
								<paragraph id="H1A6EA44B943649CFABAFAC7C10B22670"><enum>(1)</enum><text>evaluate
				biological threat detection assays, their protocols for use, and their
				associated response algorithms for confirmation of biological threat agents,
				taking performance measures and concepts of operation into consideration;
				and</text>
								</paragraph><paragraph id="H00C07F301874415ABEAA3104BFF783B7"><enum>(2)</enum><text>develop assay
				equivalency standards based on the findings of the evaluation under paragraph
				(1).</text>
								</paragraph></subsection><subsection id="H7D112E534A4D4C91B86D79D5B2DDD2BE"><enum>(c)</enum><header>Update</header><text>The
				Under Secretary shall update the program as necessary.</text>
							</subsection><subsection id="H9E98A97C86B647689D427FF546DCEDC0"><enum>(d)</enum><header>Implementation</header><text>The
				Secretary shall—</text>
								<paragraph id="HA508854D01D148018F49031456247EA1"><enum>(1)</enum><text display-inline="yes-display-inline">require implementation of the standards
				developed under subsection (b)(2) for all Department biomonitoring programs;
				and</text>
								</paragraph><paragraph id="H51FDD93F4E1644469417260F0EC41DDD"><enum>(2)</enum><text>make such
				standards available to support all other Federal biomonitoring programs.</text>
								</paragraph></subsection><subsection id="HCE1D23573CF54AA59460B33E041BA6BF"><enum>(e)</enum><header>Assay
				defined</header><text display-inline="yes-display-inline">In this section the
				term <quote>assay</quote> means any scientific test that is—</text>
								<paragraph id="HB6D761AEF7A7464A93AD0E2ACCB8FD93"><enum>(1)</enum><text>designed to detect
				the presence of a biological threat agent; and</text>
								</paragraph><paragraph id="HC3C31F31E6894861895538482FE176BB"><enum>(2)</enum><text>of a type selected
				under criteria established by the
				Secretary.</text>
								</paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="HB84B085B36DF42C29752FA8478FC677F"><enum>(b)</enum><header>Clerical
			 amendment</header><text>The table of contents in section 1(b) is further
			 amended by adding at the end of the items relating to title III the following
			 new item:</text>
					<quoted-block display-inline="no-display-inline" id="HEB8794EC7DB74937BE551A5DB28B3CB2" style="OLC">
						<toc regeneration="no-regeneration">
							<toc-entry level="section">Sec. 325. Biological threat agent assay
				equivalency
				program.</toc-entry>
						</toc>
						<after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section><section display-inline="no-display-inline" id="HFDF76F6F0F83436693F99F9330C48FF7" section-type="subsequent-section"><enum>417.</enum><header>Study of feasibility
			 and benefit of expanding or establishing program to create a new cybersecurity
			 capacity building track at certain institutions of higher education</header>
				<subsection id="H038B0F9288944B5D8739BE11B3B30660"><enum>(a)</enum><header>In
			 general</header><text>Within 90 days of enactment, the Secretary, in
			 coordination with the National Science Foundation, shall commission a study by
			 a nonprofit research institution to determine the feasibility and potential
			 benefit of expanding the Federal Cyber Service Scholarship for Service Program,
			 or establishing a parallel program, as methods to create a new cybersecurity or
			 information assurance capacity building track at institutions of higher
			 education that are not currently designated as a National Center of Academic
			 Excellence in Information Assurance Education or a National Center of Academic
			 Excellence in Research.</text>
				</subsection><subsection id="H4C267EEF2E1E4C21AE561B012F1A2121"><enum>(b)</enum><header>Subject
			 matters</header><text>The study under subsection (a) shall include examinations
			 of the following:</text>
					<paragraph id="HE43B5A24C630426197D364046C95E72C"><enum>(1)</enum><text>The feasibility
			 and potential benefit of allowing the following types of institutions into the
			 existing Federal Cyber Service program:</text>
						<subparagraph id="H79D0639C16D04CB3838A5833FF57FB6D"><enum>(A)</enum><text>Community
			 colleges.</text>
						</subparagraph><subparagraph id="H00AEE1BE84574034A514DE9614044C17"><enum>(B)</enum><text>Institutions
			 offering an undergraduate degree, graduate degree, or post-graduate degree, but
			 do not qualify under the existing program.</text>
						</subparagraph><subparagraph id="H5E823F3AAB224E1EB5193166E85FE675"><enum>(C)</enum><text>Institutions
			 offering a certificate or industry-recognized credential.</text>
						</subparagraph></paragraph><paragraph id="H805F2387C4E64CF9A1CD8C0C29F443F8"><enum>(2)</enum><text display-inline="yes-display-inline">The feasibility and potential benefit of
			 establishing a new program modeled after the Federal Cyber Service program to
			 build capacity at—</text>
						<subparagraph id="H90DD2ACE922146D3B859CDB3917C72E2"><enum>(A)</enum><text>community
			 colleges;</text>
						</subparagraph><subparagraph id="H0D090282B96B474EBD3692868DAAD824"><enum>(B)</enum><text>institutions
			 offering an undergraduate degree, graduate degree, or post-graduate degree, but
			 do not qualify under the existing program; or</text>
						</subparagraph><subparagraph id="H80E1492B933646B7B2D6AE709344A536"><enum>(C)</enum><text>institutions
			 offering a certificate or industry-recognized credential.</text>
						</subparagraph></paragraph><paragraph id="HEAFB84A1B3BC423E8FD02846AD5BBBD4"><enum>(3)</enum><text>The projected
			 extent to which an expansion of the existing Federal Cyber Service program as
			 described in paragraph (1) would—</text>
						<subparagraph id="H8D3B0D2E400841C880DE0CD4E2A8F782"><enum>(A)</enum><text>expand the
			 availability of qualified individuals to work in information assurance and
			 cybersecurity within the Department and other Federal, State, local, and tribal
			 agencies, and the private sector;</text>
						</subparagraph><subparagraph id="HD533FA503FB74E6B971C92365DB48851"><enum>(B)</enum><text>encourage
			 institutions of higher education to develop a new information assurance or
			 cybersecurity education undergraduate degree programs, graduate degree
			 programs, or programs conferring a certificate or industry-recognized
			 credential;</text>
						</subparagraph><subparagraph id="HFA5837CAAF35486CAA71CCC8D50CF81B"><enum>(C)</enum><text>increase the
			 number of students graduating annually from existing information assurance or
			 cybersecurity education undergraduate degree programs, graduate degree
			 programs, or programs conferring a certificate or industry-recognized
			 credential; or</text>
						</subparagraph><subparagraph id="H12AFF6B3FC474B6293877B93C3AF8195"><enum>(D)</enum><text>improve existing
			 information assurance or cybersecurity education undergraduate degree programs,
			 graduate degree programs, or programs conferring a certificate or
			 industry-recognized credential.</text>
						</subparagraph></paragraph><paragraph id="HB0ABE1CF635E42E2AB30866D4F5C31EC"><enum>(4)</enum><text display-inline="yes-display-inline">The projected extent to which the
			 establishment of a new program modeled after the Federal Cyber Service program
			 as described in paragraph (2) would—</text>
						<subparagraph id="HE59EB8A946AF4B21A1E96AF265A80338"><enum>(A)</enum><text display-inline="yes-display-inline">expand the availability of qualified
			 individuals to work in information assurance and cybersecurity within the
			 Department and other Federal, State, local, and tribal agencies, and the
			 private sector;</text>
						</subparagraph><subparagraph id="H417A2C205CD3467C94166BCFEDDD2CD4"><enum>(B)</enum><text>encourage
			 institutions of higher education to develop a new information assurance or
			 cybersecurity education undergraduate degree programs, graduate degree
			 programs, or programs conferring a certificate or industry-recognized
			 credential;</text>
						</subparagraph><subparagraph id="H217EF19B4BF8437688F83F2D291BD1DC"><enum>(C)</enum><text>increase the
			 number of students graduating annually from existing information assurance or
			 cybersecurity education undergraduate degree programs, graduate degree
			 programs, or programs conferring a certificate or industry-recognized
			 credential; or</text>
						</subparagraph><subparagraph id="H4E52C145154344BBBFF0BFFB91308C58"><enum>(D)</enum><text>improve existing
			 information assurance or cybersecurity education undergraduate degree programs,
			 graduate degree programs, or programs conferring a certificate or
			 industry-recognized credential.</text>
						</subparagraph></paragraph></subsection><subsection id="HCE2A7F5D72F64B879BA7B7BDDF7404CF"><enum>(c)</enum><header>Report</header><text>Not
			 later than 30 days after receiving the findings of the study, the Secretary
			 shall transmit the findings, together with any comments thereon by the
			 Secretary, to the appropriate congressional committees.</text>
				</subsection></section><section display-inline="no-display-inline" id="HB78042EB49E04194A472B60C65358C42" section-type="subsequent-section"><enum>418.</enum><header>Sense of Congress
			 regarding centers of excellence</header><text display-inline="no-display-inline">It is the sense of Congress that centers of
			 excellence have the potential—</text>
				<paragraph id="HFD62A211CBC2444988E6199B23A77FD7"><enum>(1)</enum><text>to be a very
			 useful tool in developing defensive countermeasures to secure critical
			 infrastructure and prevent terrorism; and</text>
				</paragraph><paragraph id="H6379B2696CB54FFBA1BF0A235D3D5E56"><enum>(2)</enum><text>to play a key role
			 in the Department’s efforts to research and develop new technologies to secure
			 the homeland.</text>
				</paragraph></section><section display-inline="no-display-inline" id="H04A1DCD12A474277B730416242FE4FA7" section-type="subsequent-section"><enum>419.</enum><header>Assessment,
			 research, testing, and evaluation of technologies to mitigate the threat of
			 small vessel attack</header><text display-inline="no-display-inline">The Under
			 Secretary may—</text>
				<paragraph id="HB2444F6227934251872F9CD87F55C0F6"><enum>(1)</enum><text>assess what
			 technologies are available to mitigate the threat of small vessel attack in
			 secure zones of ports, including the use of transponders or radio frequency
			 identification devices to track small vessels; and</text>
				</paragraph><paragraph id="H0B635FDB3CAD4061BBAA389168F7CD2D"><enum>(2)</enum><text>conduct research,
			 testing, and evaluation of new technologies that might be capable of tracking
			 small vessels.</text>
				</paragraph></section><section display-inline="no-display-inline" id="H27835EBB61BD413A8678E338A3572694" section-type="subsequent-section"><enum>420.</enum><header>Research and
			 development projects</header><text display-inline="no-display-inline">Section
			 831 (<external-xref legal-doc="usc" parsable-cite="usc/6/391">6 U.S.C.
			 391</external-xref>) is amended—</text>
				<paragraph id="H01F19D371AFC4D0AA9CA2D531A25199D"><enum>(1)</enum><text>in subsection (a),
			 by striking <quote>2010,</quote> and inserting <quote>2012,</quote>;</text>
				</paragraph><paragraph id="HC6B832C929414C4898DA49676AF03354"><enum>(2)</enum><text>in subsection (a),
			 by adding at the end the following new paragraph:</text>
					<quoted-block id="H6D7F1B9679C74D5EBD06310A837D5627" style="OLC">
						<paragraph id="H27DBD46BC69144E29682A78C1ACE06AC"><enum>(3)</enum><header>Prior
				approval</header><text>In any case in which the Under Secretary for Science and
				Technology intends to exercise other transaction authority, the Under Secretary
				must receive prior approval from the Secretary after submitting to the
				Secretary a proposal that includes the rationale for why a grant or contract
				issued in accordance with the Federal Acquisition Regulation is not feasible or
				appropriate and the amount to be expended for such project. In such a case, the
				authority for evaluating the proposal may not be delegated by the Secretary to
				anyone other than the Under Secretary for
				Management.</text>
						</paragraph><after-quoted-block>;
				and</after-quoted-block></quoted-block>
				</paragraph><paragraph id="H3248B5297C364133B2FB60438D4E61E1"><enum>(3)</enum><text>by redesignating
			 subsection (e) as subsection (i), and by inserting after subsection (d) the
			 following new subsections:</text>
					<quoted-block id="HA26B452B02404B6786A9D887665F775D" style="OLC">
						<subsection id="HC6808FA58C7945A48111979C63A6DAA8"><enum>(e)</enum><header>Annual report on
				exercise of other transaction authority</header>
							<paragraph id="H7159A934440E4615AD181493C3895E5B"><enum>(1)</enum><header>In
				general</header><text>The Secretary shall submit to the appropriate
				congressional committees an annual report on the exercise of other transaction
				authority.</text>
							</paragraph><paragraph id="H693603DFB81A44A6B4332B8313F2C021"><enum>(2)</enum><header>Content</header><text>The
				report shall include the following:</text>
								<subparagraph id="HEFDF7202AA484D6896C8C94FEAA9410B"><enum>(A)</enum><text>The subject areas
				in which research projects were conducted using other transaction
				authority.</text>
								</subparagraph><subparagraph id="H10709AF481624F0EA7283803138631CC"><enum>(B)</enum><text>The extent of
				cost-sharing for such projects among Federal and non-Federal sources.</text>
								</subparagraph><subparagraph id="H6D062588DAFC43BB93C16CCEF0C3742E"><enum>(C)</enum><text>The extent to
				which use of other transaction authority has addressed a homeland security
				capability gap identified by the Department.</text>
								</subparagraph><subparagraph id="HFFD1C99411334C4ABAA2DBF412A8F000"><enum>(D)</enum><text>The total amount
				of payments, if any, that were received by the Federal Government as a result
				of such exercise of other transaction authority during the period covered by
				the report.</text>
								</subparagraph><subparagraph id="HAE612B45B500480399457D2F028856D6"><enum>(E)</enum><text>The rationale for
				using other transaction authority, including why grants or contracts issued in
				accordance with the Federal Acquisition Regulation were not feasible or
				appropriate.</text>
								</subparagraph><subparagraph id="H9831F14F0B9F4364973C73B66E9EE663"><enum>(F)</enum><text>the amount
				expended for each such project.</text>
								</subparagraph></paragraph></subsection><subsection id="HE49CC2EB6EE2412BA330C1E6CB5A7788"><enum>(f)</enum><header>Training</header><text>The
				Secretary shall develop a training program for acquisitions staff in the use of
				other transaction authority to help ensure the appropriate use of such
				authority.</text>
						</subsection><subsection id="H7877A1DDA58F441990AD44025045E61A"><enum>(g)</enum><header>Review
				authority</header><text>The exercise of other transaction authority shall be
				subject to review by the Comptroller General of the United States to ensure
				that an agency is not attempting to avoid the requirements of procurement
				statutes and regulations.</text>
						</subsection><subsection id="H07F725E12188462EB090FCBA57957990"><enum>(h)</enum><header>Other
				transaction authority defined</header><text>In this section the term
				<quote>other transaction authority</quote> means authority under subsection
				(a).</text>
						</subsection><after-quoted-block>.</after-quoted-block></quoted-block>
				</paragraph></section><section id="H36658B0D6BD74F73B2FE8FD63D633D09"><enum>421.</enum><header>National Urban
			 Security Technology Laboratory</header>
				<subsection id="H64C35004A6694DB4967E69BD9A02B57B"><enum>(a)</enum><header>In
			 general</header><text>The National Urban Security Technology Laboratory
			 (formerly the Environmental Measurements Laboratory) is authorized within the
			 Directorate for fiscal years 2011 and 2012.</text>
				</subsection><subsection id="HD27E023E08BF437B9F1308572D83D7F1"><enum>(b)</enum><header>Responsibilities</header><text>The
			 Under Secretary shall utilize the National Urban Security Technology Laboratory
			 to test, evaluate, and analyze homeland security capabilities and serve as a
			 technical authority to first responders and State and local entities, including
			 by—</text>
					<paragraph id="H5D035F1A447445B4BEEE368E6D268A58"><enum>(1)</enum><text>conducting test
			 programs, pilots projects, demonstrations, and other forms of evaluations of
			 homeland security technologies both in the field and in the laboratory;</text>
					</paragraph><paragraph id="HCEE03A0C26CB49748C85EDB4691E0AB5"><enum>(2)</enum><text>applying knowledge
			 of operational end-user environments and support for operational integration to
			 technology development, including—</text>
						<subparagraph id="H1BDD30A6A93847A48B2CA95EF321BEEA"><enum>(A)</enum><text>training;</text>
						</subparagraph><subparagraph id="H21C086F65652437A9484D9508D3540FD"><enum>(B)</enum><text>exercises;</text>
						</subparagraph><subparagraph id="HCCDEF4F34EEC4E9D9E27450F16AB03CE"><enum>(C)</enum><text>equipment;</text>
						</subparagraph><subparagraph id="HE27EE00A43F74049A47A442B2A3DD1AB"><enum>(D)</enum><text>tactics;</text>
						</subparagraph><subparagraph id="H35670EA2B48C41888678D94F17A8884C"><enum>(E)</enum><text>techniques;
			 and</text>
						</subparagraph><subparagraph id="HEEE555A4567848B985123A9A696CF3A3"><enum>(F)</enum><text>procedures;</text>
						</subparagraph></paragraph><paragraph id="H14CBA551E8C14828A924DCE86B25C2E5"><enum>(3)</enum><text>representing
			 interests and requirements between technology developers and operational
			 end-users; and</text>
					</paragraph><paragraph id="H99913D8F340841D3AE53BF413095A398"><enum>(4)</enum><text>supporting
			 development and use of homeland security equipment and operational
			 standards.</text>
					</paragraph></subsection></section><section id="H7C7B819557324240B711B6C06F786179"><enum>422.</enum><header>Homeland
			 security science and technology advisory committee</header><text display-inline="no-display-inline">Section
			 301 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/191">6 U.S.C. 191</external-xref>) is amended—</text>
				<paragraph id="HAEDBA63EB7074EA0A1081423064BC033"><enum>(1)</enum><text>by striking
			 subsection (a) and inserting the following new subsection:</text>
					<quoted-block display-inline="no-display-inline" id="H02CE1A6D884E4B86B7E48993C8BE3934" style="OLC">
						<subsection id="H6EEC4901FB8D4271B86146CCC3316FFD"><enum>(a)</enum><text display-inline="yes-display-inline">There is established within the Department
				a science and technology advisory committee (in this section referred to as the
				<quote>advisory committee</quote>). The advisory committee shall make
				recommendations with respect to the activities of the under secretary for
				science and technology, including—</text>
							<paragraph id="H7C5E2F980FC941948E39F532E7FB8207"><enum>(1)</enum><text>identifying
				research areas of potential importance to the security of the Nation;
				and</text>
							</paragraph><paragraph id="H7C37834865104B82B57D48922CD84389"><enum>(2)</enum><text>providing advice
				in developing and updating the strategic plan required under section
				318.</text>
							</paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
				</paragraph><paragraph id="HCDEF70E0A7CD4D43AF136E5E461D9C64"><enum>(2)</enum><text>by striking
			 subsection (j).</text>
				</paragraph></section></title><title id="H5B0150D83C66418DA46BA072053B3E4E"><enum>V</enum><header>Domestic Nuclear
			 Detection Office</header>
			<section commented="no" id="HBA29559CC9194856ACCFDA295BB3F219"><enum>501.</enum><header>Authorization
			 of appropriations</header><text display-inline="no-display-inline">There is
			 authorized to be appropriated for the Domestic Nuclear Detection Office of the
			 Department—</text>
				<paragraph commented="no" id="H19D6B57D87484F5E83F0D39178B8F75C"><enum>(1)</enum><text>$305,840,000 for
			 fiscal year 2011; and</text>
				</paragraph><paragraph commented="no" id="H1752DF24D4654EEE8734740B45D5481B"><enum>(2)</enum><text>$315,005,000 for
			 fiscal year 2012.</text>
				</paragraph></section><section id="H80A8ED6848804D9FA6A690A3625F991C"><enum>502.</enum><header>Domestic
			 Nuclear Detection Office oversight</header>
				<subsection id="H4EA40A61D7C544FB979C3E1257D9B27D"><enum>(a)</enum><header>Sense of
			 Congress</header><text display-inline="yes-display-inline">It is the sense of
			 Congress that the Directorate should conduct basic and innovative research and
			 nondevelopmental testing on behalf of the Domestic Nuclear Detection Office (in
			 this section referred to as <quote>DNDO</quote>), in order to advance next
			 generation nuclear detection technologies.</text>
				</subsection><subsection id="H92F0C29512424B92B71168866B16F90D"><enum>(b)</enum><header>Internal review
			 of project selection and evaluation methodology</header><text display-inline="yes-display-inline">Not later than 90 days after the date of
			 enactment of this Act, the Director of the DNDO, the Under Secretary, and the
			 heads of all operational components of the Department that own, operate, or
			 maintain nuclear or radiological detection equipment shall begin an internal
			 review of the methodology by which research, development, testing, and
			 evaluation is identified, prioritized, and funded within the Department.</text>
				</subsection><subsection id="H1F5DDEE7F70F423D8444B05E128D0D21"><enum>(c)</enum><header>Contents of
			 review</header><text>In carrying out the review under subsection (b), the
			 Director of the DNDO shall—</text>
					<paragraph id="H3452A41B9DD74BCF8D0F9AF9E1ECDC7A"><enum>(1)</enum><text display-inline="yes-display-inline">identify the process by which basic and
			 applied research and operational testing that should be conducted in concert
			 and under agreement with the Directorate;</text>
					</paragraph><paragraph id="H51E65E013BE44FDFB7A2FBDBFE81EDC4"><enum>(2)</enum><text>describe the
			 roles, responsibilities, common definitions, standard operating procedures, and
			 decision process for research, development, testing, and evaluation
			 activities;</text>
					</paragraph><paragraph id="H8A337E7383054FA38F6378DDE343213E"><enum>(3)</enum><text display-inline="yes-display-inline">describe and implement a transparent system
			 for tracking research, development, testing, and evaluation
			 requirements;</text>
					</paragraph><paragraph id="H60C60174A18A4CDFB6D2D1A26C0B40A1"><enum>(4)</enum><text>describe and
			 implement a mechanism to provide regular updates to components of the
			 Department on the progress of such research;</text>
					</paragraph><paragraph id="H9014484CFDDA4E2695B2875DEE8A113C"><enum>(5)</enum><text>evaluate the
			 degree to which needs of the operational components of the Department and State
			 and local first responders are being adequately addressed by the existing
			 project selection process, and if not, how such process can be improved;</text>
					</paragraph><paragraph id="HCEEBD62BDAA24FEFA37358DE69E4D543"><enum>(6)</enum><text>establish a method
			 to collect and evaluate Department component feedback;</text>
					</paragraph><paragraph id="H0344F96B7C694782886E525F205EB114"><enum>(7)</enum><text>utilize
			 departmental matrices and systems to determine if technologies produced by the
			 Directorate have enhanced the ability of Department components to perform their
			 missions;</text>
					</paragraph><paragraph id="H9B679C41A070426AADC82DC81240FDDF"><enum>(8)</enum><text>identify
			 appropriate five-year levels of investment in basic and applied research and
			 development, in particular among the Department laboratories, federally funded
			 research and development centers, university-based centers, Department of
			 Energy national laboratories, and other Federal laboratories;</text>
					</paragraph><paragraph id="H498C2A6E8D1A4A4CB6C3398A5EDB9801"><enum>(9)</enum><text>project balance of
			 use of the entities referred to in paragraph (8) among the Directorate and
			 other Department components; and</text>
					</paragraph><paragraph id="H933CEA86893C4B9B8AE3B8B6E1A0C84B"><enum>(10)</enum><text>establish a
			 formal merit review process, with external peer review where
			 appropriate.</text>
					</paragraph></subsection><subsection id="H06C03350323340F1B9D47AF13E8C0854"><enum>(d)</enum><header>Report</header><text>Not
			 later than one year after the completion of the review required by subsection
			 (b), the Director of the DNDO shall submit to the Secretary and the appropriate
			 congressional committees a report containing the findings of such review,
			 together with information on the systems, methods, and mechanisms established,
			 and recommendations for additional improvements.</text>
				</subsection><subsection id="H9E873040B3C345F49474E214B8460D33"><enum>(e)</enum><header>Updates on
			 implementation</header><text>One hundred and twenty days after the date of
			 enactment of this Act, and annually thereafter, the Inspector General of the
			 Department shall submit to the appropriate congressional committees an update
			 on the status of implementation of this section and activities in support of
			 such implementation.</text>
				</subsection></section><section id="H9BBCAD317A0F4B6499BF434BBD6F7283"><enum>503.</enum><header>Strategic plan
			 and funding allocations for global nuclear detection architecture</header><text display-inline="no-display-inline">Not later than 180 days after the date of
			 enactment of this Act, the Secretary shall submit to the appropriate
			 congressional committees a report containing the following:</text>
				<paragraph id="HBD07F6AFA5EB43398B38913FBAA0C4F3"><enum>(1)</enum><text display-inline="yes-display-inline">A strategic plan for the global nuclear
			 detection architecture to deter and detect the transport of nuclear or
			 radioactive materials by all means possible, with specific focus on
			 establishing the goals, objectives, and cost projections for the next five
			 years, including a discussion of—</text>
					<subparagraph id="H78BAB2AAA8FD4F42A27E3A87873865FD"><enum>(A)</enum><text>technological and
			 nontechnological methods to increase detection capabilities;</text>
					</subparagraph><subparagraph id="HE87386E4112C4D4F8B19E95D172348CC"><enum>(B)</enum><text>the preventive
			 nature of the global nuclear detection architecture, including projected impact
			 on would-be terrorists;</text>
					</subparagraph><subparagraph id="H0D8F83C4FAC74B74BF286BFF2A38D18D"><enum>(C)</enum><text>detection
			 capability enhancements for the various transportation modes, at ports of entry
			 and between ports of entry;</text>
					</subparagraph><subparagraph id="HF08295222941417EA8DABC73484BAA52"><enum>(D)</enum><text>balanced
			 risk-based deployment of detection assets across all border and other pathways;
			 and</text>
					</subparagraph><subparagraph id="H0F69323EF5794A79A6D6A971209C1DAD"><enum>(E)</enum><text>any emerging
			 threat vectors identified by the Director of the Domestic Nuclear Detection
			 Office.</text>
					</subparagraph></paragraph><paragraph id="H4FC4E9AC2A53478193C8EA4EBB3EB5A6"><enum>(2)</enum><text display-inline="yes-display-inline">In consultation with the Secretary of
			 Defense, the Secretary of Energy, the Secretary of State, the Nuclear
			 Regulatory Commission, the Intelligence Community, and the Attorney General, an
			 analysis of overall budget allocations that determines whether Government wide
			 nuclear detection resources clearly align with identified priorities to
			 maximize results and minimize duplication of efforts.</text>
				</paragraph></section><section id="HACACD31FDF5C49B0B9EEA6C3B6F09C31"><enum>504.</enum><header>Radiation
			 portal monitor alternatives</header>
				<subsection id="H82075EB163604FFC8A406AA5FFD3A74E"><enum>(a)</enum><header>Sense of
			 Congress</header><text display-inline="yes-display-inline">It is the sense of
			 Congress that in view of the Secretary’s decision not to certify advanced
			 spectroscopic portal monitors for primary screening applications because they
			 do not offer a significant increase in operational effectiveness over existing
			 technology, the Director must attempt to identify viable alternatives.</text>
				</subsection><subsection id="HCE86386CAB374580A9317F581718A40F"><enum>(b)</enum><header>Analysis and
			 report</header><text>The Director of the Domestic Nuclear Detection Office
			 shall analyze and report to the appropriate congressional committees by not
			 later than 90 days after the date of enactment of this Act on both existing and
			 developmental alternatives to existing radiation portal monitors and advanced
			 spectroscopic portal monitors that would provide the Department with a
			 significant increase in operational effectiveness for primary screening for
			 radioactive materials.</text>
				</subsection></section><section display-inline="no-display-inline" id="HF4030A838BD047C6A72B87BA778343C6" section-type="subsequent-section"><enum>505.</enum><header>Authorization of
			 Securing the Cities Initiative</header>
				<subsection id="HB89406F4566443B0A35A2407DF2979EA"><enum>(a)</enum><header>Findings</header><text>Congress
			 finds the following:</text>
					<paragraph id="H3BAB37F586EF48119609A251EF733E3A"><enum>(1)</enum><text>The Securing the
			 Cities Initiative of the Department uses next generation radiation detection
			 technology to detect the transport of nuclear and radiological material in
			 urban areas by terrorists or other unauthorized individuals.</text>
					</paragraph><paragraph id="H60A8F947E6EA42A492A17E92D52E0F9B"><enum>(2)</enum><text>The technology
			 used by partners in the Securing the Cities Initiative leverages radiation
			 detection technology used at ports of entry.</text>
					</paragraph><paragraph id="HA5C5289243554882988F2E76571C3D0F"><enum>(3)</enum><text>The Securing the
			 Cities Initiative has fostered unprecedented collaboration and coordination
			 among its Federal, State, and local partners.</text>
					</paragraph><paragraph id="HC6708C7854AD472BB9597ECEE2BB5BAB"><enum>(4)</enum><text>The Securing the
			 Cities Initiative is a critical national capability to detect the dangerous
			 introduction of nuclear and radiological material.</text>
					</paragraph></subsection><subsection id="H76FE92C3B3D244BB86BB41EEAF39F17C"><enum>(b)</enum><header>Authorization of
			 Appropriations</header><text display-inline="yes-display-inline">Of amounts
			 authorized by section 501, there is authorized to be appropriated to the
			 Director of the Domestic Nuclear Detection Office of the Department for the
			 Securing the Cities Initiative such sums as may be necessary for each of fiscal
			 years 2011 and 2012, including—</text>
					<paragraph id="HD045E2EFD9C84250A7907076A733ED9F"><enum>(1)</enum><text display-inline="yes-display-inline">for each city in which it has been
			 implemented by fiscal year 2009—</text>
						<subparagraph id="H7C4E76144881430E93730386DAC9F745"><enum>(A)</enum><text>$20,000,000 for
			 fiscal year 2011; and</text>
						</subparagraph><subparagraph id="H53D485525C0F4EED8D71FEA263F1E11B"><enum>(B)</enum><text>$10,000,000 for
			 fiscal year 2012; and</text>
						</subparagraph></paragraph><paragraph id="H7C69CA08193C4DE2ABDD6843720B3FE8"><enum>(2)</enum><text>for additional
			 Securing the Cities initiatives to be implemented in not fewer than 2 sites
			 participating in the Urban Area Security Initiative, such sums as may be
			 necessary each fiscal year to implement and sustain each additional
			 initiative.</text>
					</paragraph></subsection></section></title><title id="HC803AFCFC2BC411AA6613A506EEF1F9A"><enum>VI</enum><header>Clarifying
			 Amendments</header>
			<section id="HDB6A54CE81374C649EEAC63E6B7AB458"><enum>601.</enum><header>Federally
			 funded research and development centers</header><text display-inline="no-display-inline">Section 305 (<external-xref legal-doc="usc" parsable-cite="usc/6/184">6 U.S.C. 184</external-xref>) is amended—</text>
				<paragraph id="H562805E4BA2048BF903C89582E604F61"><enum>(1)</enum><text>by inserting
			 <quote>(a) <header-in-text level="subsection" style="OLC">Establishment.—</header-in-text></quote> before the first sentence;
			 and</text>
				</paragraph><paragraph id="H32FDA7D0EB4945C79A3B773BE5F1DCED"><enum>(2)</enum><text>by adding at the
			 end the following new subsections:</text>
					<quoted-block id="H6F5869B368D24E288A3989F78024D5C7" style="OLC">
						<subsection id="H19BB9BDA495941DAAEBB63120690CEED"><enum>(b)</enum><header>Congressional
				tasking</header><text>Upon a request of the chairman and the ranking minority
				member of an appropriate congressional committee, a federally funded research
				and development center established under this section may perform independent
				analysis of homeland security issues and report its findings to the appropriate
				congressional committees and the Secretary.</text>
						</subsection><subsection id="HB49F539C2A0245AFA5006488DA1172CB"><enum>(c)</enum><header>Congressional
				oversight</header><text display-inline="yes-display-inline">Federally funded
				research and development centers established under this section are encouraged,
				upon request of the chairman and the ranking minority member of an appropriate
				congressional committee, to provide to the committee a copy of any report it
				produces for the Department or any of its components.</text>
						</subsection><subsection id="H7D5203542C354C1DAE1895CCB7323E9C"><enum>(d)</enum><header>Conflicts of
				interest</header><text>The Secretary shall review and revise, as appropriate,
				the policies of the Department relating to personnel conflicts of interest to
				ensure that such policies specifically address employees of federally funded
				research and development centers established under this section who are in a
				position to make or materially influence research findings or agency
				decisionmaking.</text>
						</subsection><subsection id="H1C62191AE9824A81BC55F6811725BBDA"><enum>(e)</enum><header>Annual
				reports</header><text display-inline="yes-display-inline">Each federally funded
				research and development center established under this section shall transmit
				to the Secretary and appropriate congressional committees an annual report on
				the activities of the
				center.</text>
						</subsection><after-quoted-block>.</after-quoted-block></quoted-block>
				</paragraph></section><section id="H4C05A5FB34C14D1C843FC6018FA9CD99"><enum>602.</enum><header>Elimination of
			 Homeland Security Institute</header>
				<subsection id="H2462B0FAE6EE4AADB54FC05A9327C2E7"><enum>(a)</enum><header>Repeal</header><text>Section
			 312 (<external-xref legal-doc="usc" parsable-cite="usc/6/192">6 U.S.C.
			 192</external-xref>) is repealed.</text>
				</subsection><subsection id="H2C0B05C35BD7408B8051578FCBA9B5E3"><enum>(b)</enum><header>Clerical
			 amendment</header><text>The table of contents in section 1(b) is amended by
			 striking the item relating to such section.</text>
				</subsection></section><section id="H92E4575F357448B3AA5E9B90B2BEA2C5"><enum>603.</enum><header>GAO study of
			 the implementation of the statutory relationship between the Department and the
			 Department of Energy national laboratories</header>
				<subsection id="H66988441CEA2402B904CF6382E881689"><enum>(a)</enum><header>In
			 general</header><text>Not later than one year after the date of the enactment
			 of this Act, the Comptroller General of the United States shall—</text>
					<paragraph id="HBC05A9F979964A3A896AE6AE39FC9633"><enum>(1)</enum><text>conduct a study to
			 assess the implementation of the statutory relationship between the Department
			 and the Department of Energy national laboratories, as established by section
			 309(a)(2) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/189">6 U.S.C. 189(a)(2)</external-xref>); and</text>
					</paragraph><paragraph id="H896D7B989F4E4A578514C37388885B49"><enum>(2)</enum><text>submit
			 recommendations to the appropriate congressional committees for appropriate
			 improvements to such relationship.</text>
					</paragraph></subsection><subsection id="H0915339C22A144F8AC9758BE4ADC6A62"><enum>(b)</enum><header>Study
			 subjects</header><text>The study shall include the following:</text>
					<paragraph id="HAAB236D3462446AE98E71456DB1EEEAF"><enum>(1)</enum><text>Review of how the
			 Department and the Department of Energy national laboratories—</text>
						<subparagraph id="HBEBAA725FC074988AF4794DE43E052EC"><enum>(A)</enum><text>communicate needs
			 and capabilities; and</text>
						</subparagraph><subparagraph id="H701CE64F21274AEA913259EA7C7A373F"><enum>(B)</enum><text>select projects to
			 be performed by the Department of Energy national laboratories under such
			 statutory relationship.</text>
						</subparagraph></paragraph><paragraph id="H10FC76A3467E45F29D4B36D568DBC676"><enum>(2)</enum><text>Review of
			 contracting mechanisms that the Department and the Department of Energy
			 national laboratories use to initiate and track work under such statutory
			 relationship.</text>
					</paragraph><paragraph id="H8E00260E9710413E9D49DF8DC676F3A5"><enum>(3)</enum><text>Review of the
			 fraction of Department of Energy national laboratory work performed for the
			 Department under such statutory relationship, compared to other Department of
			 Energy national laboratory work performed for the Department on a <quote>work
			 for others</quote> basis.</text>
					</paragraph><paragraph id="H9A6EF089020D4D3DAB4F66EDABEFEB31"><enum>(4)</enum><text>Review the cost
			 savings identified by the Department and the Department of Energy achieved
			 through use of such statutory relationship, compared to other Department of
			 Energy national laboratory work performed for the Department on a <quote>work
			 for others</quote> basis.</text>
					</paragraph></subsection></section><section commented="no" id="H7A6240AEAF5B4BAD8378666F8826DF12"><enum>604.</enum><header>Technical
			 changes</header><text display-inline="no-display-inline">Section 1902 of the
			 Homeland Security Act (<external-xref legal-doc="usc" parsable-cite="usc/6/592">6 U.S.C. 592</external-xref>) is amended by—</text>
				<paragraph commented="no" id="HF49DD9CEC39C4FA182CB29C3454790B1"><enum>(1)</enum><text>striking paragraph
			 (6); and</text>
				</paragraph><paragraph commented="no" id="HDC900DDD07834F538EDECECE113E8F3C"><enum>(2)</enum><text>redesignating
			 paragraphs (7) through (14) as paragraphs (6) through (13),
			 respectively.</text>
				</paragraph></section></title><title id="H0E360E97A14A4DD6BD762438AC591DF0"><enum>VII</enum><header>Commission on
			 the Protection of Critical Electric and Electronic Infrastructures</header>
			<section id="HA4F7F4C7AD4946A5B0CD8F3DE6D734EC"><enum>701.</enum><header>Commission on
			 the Protection of Critical Electric and Electronic Infrastructures</header>
				<subsection id="HC99B8AD70C8A404798B527C3DA8672FB"><enum>(a)</enum><header>Establishment</header><text>There
			 is established the Commission on the Protection of Critical Electric and
			 Electronic Infrastructures (in this section referred to as the
			 <quote>Commission</quote>).</text>
				</subsection><subsection id="H8143499577F647D587F5E200DBAC2AB6"><enum>(b)</enum><header>Purposes</header>
					<paragraph id="HE42AC07053F54F0D8FDF575870A8216B"><enum>(1)</enum><header>In
			 general</header><text>The purposes of the Commission are to—</text>
						<subparagraph id="HADC55216636C47CF9601E115C2485725"><enum>(A)</enum><text>assess
			 vulnerabilities of electric and electronic infrastructures, including—</text>
							<clause id="HBFCF976BFCD646B98D255996052415C0"><enum>(i)</enum><text>all
			 components of the United States electric grid, including electricity
			 generation, transmission, distribution and metering; and</text>
							</clause><clause id="H6A2E54779CD847A8B93785F7711DDAEE"><enum>(ii)</enum><text display-inline="yes-display-inline">all computerized control systems used in
			 all United States critical infrastructure sectors;</text>
							</clause></subparagraph><subparagraph id="HAF000874443B4E7AAFF755F6C886A1ED"><enum>(B)</enum><text>provide a clear
			 and comprehensive strategy and specific recommendations for protecting these
			 critical electric and electronic infrastructures; and</text>
						</subparagraph><subparagraph id="HDA08BC61700B4DE6A819D3F33A2F8AFE"><enum>(C)</enum><text>test, evaluate,
			 and report on specific mitigation protection and recovery devices or
			 methods.</text>
						</subparagraph></paragraph><paragraph id="H72DE4F02775945EB96C42E912F39B1AA"><enum>(2)</enum><header>In
			 particular</header><text>The Commission shall give particular attention to
			 threats that can disrupt or damage critical electric and electronic
			 infrastructures, including—</text>
						<subparagraph id="H34CBB34A20F9409DBE657C92432A6636"><enum>(A)</enum><text>cyber attacks or
			 unintentional cyber disruption;</text>
						</subparagraph><subparagraph id="H7DB29C2D79DB49C1A37DE09598AADB2B"><enum>(B)</enum><text>electromagnetic
			 phenomena such as geomagnetically induced currents, intentional electromagnetic
			 interference, and electromagnetic pulses caused by nuclear weapons; and</text>
						</subparagraph><subparagraph id="H9034E057B92D48188B91A7B359173F9B"><enum>(C)</enum><text>other physical
			 attack, act of nature, or accident.</text>
						</subparagraph></paragraph></subsection><subsection id="H2128DBF148AA4AB1943B95447EA19130"><enum>(c)</enum><header>Composition of
			 Commission</header>
					<paragraph id="H641A3D4F3F334202925B139D8D72C790"><enum>(1)</enum><header>Members</header><text>The
			 Commission shall be composed of 9 members, of whom—</text>
						<subparagraph id="HBF20F854F97C4409BA8A4EF69329A20A"><enum>(A)</enum><text>1 member shall be
			 appointed by the Chairman of the House of Representatives Committee on Homeland
			 Security;</text>
						</subparagraph><subparagraph id="HFE68998FC0564B3486DB98525D5959FF"><enum>(B)</enum><text>1 member shall be
			 appointed by the ranking minority member of the House of Representatives
			 Committee on Homeland Security;</text>
						</subparagraph><subparagraph id="H5E04512CF05E41E9A44461C00CD14D24"><enum>(C)</enum><text>1 member shall be
			 appointed by the Chairman of the House of Representatives Committee on Energy
			 and Commerce;</text>
						</subparagraph><subparagraph id="HE4943B5C924441EC8DD9923DA8D8CE4A"><enum>(D)</enum><text>1 member shall be
			 appointed by the ranking minority member of the House of Representatives
			 Committee on Energy and Commerce;</text>
						</subparagraph><subparagraph id="HFA988B6ABFA54C12AD389633843B6FDC"><enum>(E)</enum><text>1 member shall be
			 appointed by the Chairman of the Senate Committee on Homeland Security and
			 Governmental Affairs;</text>
						</subparagraph><subparagraph id="HDA0F5A5FB6A143469B73C074021FDA66"><enum>(F)</enum><text>1 member shall be
			 appointed by the ranking minority member of the Senate Committee on Homeland
			 Security and Governmental Affairs;</text>
						</subparagraph><subparagraph id="H55FC7AA1A8B94BB29503E3E8ED44D490"><enum>(G)</enum><text>1 member shall be
			 appointed by the Chairman of the Senate Committee on Energy and Natural
			 Resources;</text>
						</subparagraph><subparagraph id="H71F12519B42D4A6D90C8BA6F85DA87BD"><enum>(H)</enum><text>1 member shall be
			 appointed by the ranking minority member of the Senate Committee on Energy and
			 Natural Resources; and</text>
						</subparagraph><subparagraph id="H15757DA47D464A469C26DC0CF6E6C0B7"><enum>(I)</enum><text>1 member who shall
			 serve as the Chairman of the Commission, and who shall be appointed by the
			 Speaker of the House of Representatives with the concurrence of the President
			 Pro Tempore of the Senate.</text>
						</subparagraph></paragraph><paragraph id="H2CAF7370717045248DE075FDAE5ECC7E"><enum>(2)</enum><header>Qualifications</header><text>It
			 is the sense of Congress that individuals appointed to the Commission should
			 have significant depth of experience in electric and electronic
			 infrastructures, their function, and their protection, as well as the threats
			 to these infrastructures as identified in subsection (b)(2).</text>
					</paragraph><paragraph id="H8F9D7AA8E4CA4806B47733243F76E0D0"><enum>(3)</enum><header>Deadline for
			 appointment</header><text>All members of the Commission shall be appointed
			 within 30 days after the date of enactment of this Act.</text>
					</paragraph><paragraph id="HC3FF31DA755F49BEA9280228B9C7BFB4"><enum>(4)</enum><header>Initial
			 meeting</header><text>The Commission shall meet and begin the operations of the
			 Commission as soon as practicable.</text>
					</paragraph><paragraph id="H2A8B8D15F2C54C7889AB2B8C819FF917"><enum>(5)</enum><header>Quorum;
			 vacancies</header><text>After its initial meeting, the Commission shall meet
			 upon the call of the Chairman or a majority of its members. Six members of the
			 Commission shall constitute a quorum. Any vacancy in the Commission shall not
			 affect its powers, but shall be filled in the same manner in which the original
			 appointment was made.</text>
					</paragraph></subsection><subsection id="H8B1E8D8A4EC4455B8C7AFD4466B13B5D"><enum>(d)</enum><header>Responsibilities
			 of Commission</header><text>The Commission shall address—</text>
					<paragraph id="H634DD43779E84517BA738DCDD6581CFA"><enum>(1)</enum><text>the quantification
			 of the threats identified in subsection (b)(2) to the United States electric
			 and electronic infrastructure, and a cost-benefit analysis of possible
			 protection and recovery strategies;</text>
					</paragraph><paragraph id="HE5DEE68E50B8475E8D083103F7387286"><enum>(2)</enum><text>the roles,
			 missions, and structure of all relevant Federal, State, and local government
			 departments and agencies with responsibilities for ensuring protection and
			 reliability for electric and electronic infrastructures;</text>
					</paragraph><paragraph id="H2C99687B31D941B09348FAF4E6AEE100"><enum>(3)</enum><text>the roles,
			 missions, and structure of all relevant private sector entities with
			 responsibilities for ensuring protection and reliability for electric and
			 electronic infrastructures;</text>
					</paragraph><paragraph id="H01A8DDFC86174FC68F327BD6047B00A5"><enum>(4)</enum><text>inter-agency
			 coordination between and among the entities identified in paragraphs (2) and
			 (3); and</text>
					</paragraph><paragraph id="H951DBC11F0D34130A97DE87247C08D96"><enum>(5)</enum><text>recommendations
			 for protections and recovery devices and measures.</text>
					</paragraph></subsection><subsection id="HDC0B5BAC409E48E7A77E6EFC936B3CB9"><enum>(e)</enum><header>Powers of
			 Commission</header>
					<paragraph id="HAF9DDA9D0F704DC3ACAAEC87D3C73DCA"><enum>(1)</enum><header>Hearings and
			 evidence</header><text>The Commission or, on the authority of the Commission,
			 any subcommittee or member thereof, may, for the purpose of carrying out this
			 section, hold such hearings and sit and act at such times and places, take such
			 testimony, receive such evidence, and administer such oaths as the Commission
			 or such designated subcommittee or designated member may determine
			 advisable.</text>
					</paragraph><paragraph id="H62BA92644E854DA9B250A989B67A1B83"><enum>(2)</enum><header>Contracting</header><text>The
			 Commission may, to such extent and in such amounts as are provided in
			 appropriations Acts, enter into contracts to enable the Commission to discharge
			 its duties under this subtitle.</text>
					</paragraph><paragraph id="HB1A51FE9051B4627AEA71BF43B923D4B"><enum>(3)</enum><header>Staff of
			 commission</header>
						<subparagraph id="H471D5A8E2F844466866B120263D4DC49"><enum>(A)</enum><header>Appointment and
			 compensation</header><text>The Chairman of the Commission, in accordance with
			 rules agreed upon by the Commission, may appoint and fix the compensation of a
			 staff director and such other personnel as may be necessary to enable the
			 Commission to carry out its functions, without regard to the provisions of
			 title 5, United States Code, governing appointments in the competitive service,
			 and without regard to the provisions of chapter 51 and subchapter III of
			 chapter 53 of such title relating to classification and General Schedule pay
			 rates, except that no rate of pay fixed under this subsection may exceed the
			 equivalent of that payable for a position at level I of the Executive Schedule
			 under <external-xref legal-doc="usc" parsable-cite="usc/5/5316">section
			 5316</external-xref> of title 5, United States Code.</text>
						</subparagraph><subparagraph id="H88F9930FD3C04A55A91BCC43084AEF0C"><enum>(B)</enum><header>Personnel as
			 Federal employees</header>
							<clause id="HD33F18C656BE4938B6075A12413D253D"><enum>(i)</enum><header>In
			 general</header><text>The executive director and any employees of the
			 Commission shall be employees under
			 <external-xref legal-doc="usc" parsable-cite="usc/5/2105">section
			 2105</external-xref> of title 5, United States Code, for purposes of chapters
			 63, 81, 83, 84, 85, 87, 89, and 90 of that title.</text>
							</clause><clause id="H7E4EE4E9C4DC4F0D93CA5662E4AC65C6"><enum>(ii)</enum><header>Members of
			 Commission</header><text>Subparagraph (A) shall not be construed to apply to
			 members of the Commission.</text>
							</clause></subparagraph><subparagraph id="H5D61D41ED20F4944AE85D25C424BED80"><enum>(C)</enum><header>Detailees</header><text>Any
			 Federal Government employee may be detailed to the Commission without
			 reimbursement from the Commission, and such detailee shall retain the rights,
			 status, and privileges of his or her regular employment without
			 interruption.</text>
						</subparagraph><subparagraph id="H8B348BB0AAA644498A8CA9A87CF3ACB9"><enum>(D)</enum><header>Consultant
			 services</header><text>The Commission may procure the services of experts and
			 consultants in accordance with
			 <external-xref legal-doc="usc" parsable-cite="usc/5/3109">section
			 3109</external-xref> of title 5, United States Code, but at rates not to exceed
			 the daily rate paid a person occupying a position at level I of the Executive
			 Schedule under <external-xref legal-doc="usc" parsable-cite="usc/5/5315">section 5315</external-xref> of title 5, United
			 States Code.</text>
						</subparagraph><subparagraph id="H95075D3CF3A942E0B522097B2CAB8E8B"><enum>(E)</enum><header>Security
			 clearances</header><text>The Chairman shall place an emphasis on hiring and
			 retaining employees, contractors, and detailees with active security
			 clearances. For employees who do not have security clearances but are
			 determined by the Chairman to need them, the Central Intelligence Agency,
			 Department of Energy, Department of Defense, and any other relevant agency
			 shall expedite the necessary clearance processes.</text>
						</subparagraph><subparagraph id="H6250FD695BE047F7B186598D1A16CE2C"><enum>(F)</enum><header>Former EMP
			 Commission staff and resources</header><text display-inline="yes-display-inline">The Chairman may make use of any existing
			 and viable staff and resources previously employed by the Commission to Assess
			 the Threat to the United States from Electromagnetic Pulse Attack established
			 by section 1401 of
			 <external-xref legal-doc="public-law" parsable-cite="pl/106/398">Public Law
			 106–398</external-xref> (114 Stat. 1654A–345).</text>
						</subparagraph></paragraph><paragraph id="H564C9AF6CC5E43D2A04BE545FDE7A3AA"><enum>(4)</enum><header>Information from
			 Federal agencies</header>
						<subparagraph id="H2F595268FA94484E9116AEC351C91A64"><enum>(A)</enum><header>In
			 general</header><text>The Commission may secure directly from any executive
			 department, bureau, agency, board, commission, office, independent
			 establishment, or instrumentality of the Government, information, suggestions,
			 estimates, and statistics for the purposes of this section. Each department,
			 bureau, agency, board, commission, office, independent establishment, or
			 instrumentality shall, to the extent authorized by law, furnish such
			 information, suggestions, estimates, and statistics directly to the Commission,
			 upon request made by the Chairman, the chairman of any subcommittee created by
			 a majority of the Commission, or any member designated by a majority of the
			 Commission.</text>
						</subparagraph><subparagraph id="H01BA40298B0042DB8FAEAF7F60CC2A37"><enum>(B)</enum><header>Receipt,
			 handling, storage, and dissemination</header><text>Information shall only be
			 received, handled, stored, and disseminated by members of the Commission and
			 its staff consistent with all applicable statutes, regulations, and Executive
			 orders.</text>
						</subparagraph></paragraph><paragraph id="H8711F6112EC4438E9EC11DB1C27771B6"><enum>(5)</enum><header>Assistance From
			 Federal Agencies</header>
						<subparagraph id="H04330B1C255740EBB4A09D093B444D93"><enum>(A)</enum><header>General Services
			 Administration</header><text>The Administrator of General Services shall
			 provide to the Commission on a reimbursable basis and as necessary,
			 administrative support and other services for the performance of the
			 Commission’s functions.</text>
						</subparagraph><subparagraph id="HAAEBC1AFDAF04338BDF0F1EF6929196D"><enum>(B)</enum><header>Other
			 departments and agencies</header><text>In addition to the assistance prescribed
			 in paragraph (1), departments and agencies of the United States may provide to
			 the Commission such services, funds, facilities, staff, and other support
			 services as they may determine advisable and as may be authorized by
			 law.</text>
						</subparagraph></paragraph><paragraph id="H76B1F0FF12D244C4AF85AC843B405C56"><enum>(6)</enum><header>Gifts</header><text>The
			 Commission may accept, use, and dispose of gifts or donations of services or
			 property.</text>
					</paragraph><paragraph id="HDD5D7FD757944C97A17DDA7E799D102B"><enum>(7)</enum><header>Postal
			 services</header><text>The Commission may use the United States mails in the
			 same manner and under the same conditions as departments and agencies of the
			 United States.</text>
					</paragraph></subsection><subsection id="H39FE9F320CDA4AED8CEAA71DF5165483"><enum>(f)</enum><header>Public meetings
			 and release of public versions of reports</header><text>The Commission
			 shall—</text>
					<paragraph id="HC48181988EFD475EBD8E638EE1E7D5C6"><enum>(1)</enum><text>hold public
			 hearings and meetings to the extent appropriate;</text>
					</paragraph><paragraph id="H51BC4BE2138F4637A73FB37AE6B41B72"><enum>(2)</enum><text>release public
			 versions of the report required under subsection (g); and</text>
					</paragraph><paragraph id="HB74A57E3D1B94B33939EF688AAFA2A75"><enum>(3)</enum><text>conduct any public
			 hearing in a manner consistent with the protection of sensitive or classified
			 information provided to or developed for or by the Commission as required by
			 any applicable statute, regulation, or Executive order.</text>
					</paragraph></subsection><subsection id="H5B8A2A142784493CB6D96253F3A89C99"><enum>(g)</enum><header>Report</header><text>Not
			 later than 180 days after the appointment of the Commission, and annually
			 thereafter, the Commission shall submit to the President and Congress a report
			 containing such findings, conclusions, and recommendations for protection and
			 recovery measures for electric and electronic infrastructures as have been
			 agreed to by a majority of Commission members.</text>
				</subsection><subsection id="H4991592D11D54FD1A67C6DC090D31ED4"><enum>(h)</enum><header>Funding</header><text display-inline="yes-display-inline">Of the amounts authorized by section 101,
			 there is authorized to be appropriated for the activities of the Commission
			 under this section—</text>
					<paragraph id="HFE526AF179AF4858A596ED52E91D76A2"><enum>(1)</enum><text>$4,000,000 for
			 fiscal year 2011; and</text>
					</paragraph><paragraph id="H5A684CDC3F4946609ABFEB627FD8C9B8"><enum>(2)</enum><text>$4,000,000 for
			 fiscal year 2012.</text>
					</paragraph></subsection></section></title><title id="H62563F19C1A3440FB110114E024621AF"><enum>VIII</enum><header>Border Security
			 Technology Innovation</header>
			<section id="H02C5C5410768452C81983723BA33242F"><enum>801.</enum><header>Ensuring
			 research activities of the Department of Homeland Security include appropriate
			 concepts of operation</header><text display-inline="no-display-inline">The
			 Under Secretary shall ensure that any Federal Government interagency or
			 intra-agency agreement entered into by the Under Secretary to develop and
			 transition new technology explicitly characterizes the requirements, expected
			 use, and concept of operations for that technology, including—</text>
				<paragraph id="H11CCC68E62D14C47A15659EE43EC1AD8"><enum>(1)</enum><text>the manpower
			 needed to effectively operate the technology;</text>
				</paragraph><paragraph id="HF86751D2C967472C849F9BAB0410481C"><enum>(2)</enum><text>the expected
			 training requirements; and</text>
				</paragraph><paragraph id="H7DB11C4AE385464E81AE24832DC99417"><enum>(3)</enum><text>the expected
			 operations and maintenance costs.</text>
				</paragraph></section><section id="H24FE3FD7B608471DAB3F4F433B293BE1"><enum>802.</enum><header>Report on basic
			 research needs for border and maritime security</header><text display-inline="no-display-inline">Not later than 6 months after the date of
			 enactment of this Act, the Under Secretary shall enter into an arrangement with
			 the National Research Council for a one-year assessment of the basic science
			 research needs in the border and maritime security domain. The assessment shall
			 include consideration of—</text>
				<paragraph id="H60D33D5E90694E7D9096B358343743DD"><enum>(1)</enum><text>detection,
			 tracking, and identification technologies for cargo and people;</text>
				</paragraph><paragraph id="HE14D1D4737AB4588A350FDEA3C863D3D"><enum>(2)</enum><text>personal
			 protective equipment;</text>
				</paragraph><paragraph id="H2ADF21A3AEB647AA8EF727FA76EE1796"><enum>(3)</enum><text>document security
			 and authentication technologies;</text>
				</paragraph><paragraph id="HC8BCB858244643B8B0FF729F3E1FFDFC"><enum>(4)</enum><text>nonradiological
			 advanced screening technologies at ports of entry; and</text>
				</paragraph><paragraph id="H0F2F94F4661743A0B62A3FE761823F0F"><enum>(5)</enum><text>technologies for
			 real time tactical scene awareness.</text>
				</paragraph></section><section id="H9D7A6407E6974EA6B1514F44C534A6B0"><enum>803.</enum><header>Incorporating
			 unmanned aerial vehicles into border and maritime airspace</header>
				<subsection id="H9FF9019CE7654173B217BB2093CB7611"><enum>(a)</enum><header>Research and
			 development</header><text>The Secretary and the Director of the Joint Planning
			 and Development Office shall research and develop technologies to permit
			 routine operation of unmanned aerial vehicles, including autonomously piloted
			 drones, within the national airspace for border and maritime security missions
			 without any degradation of existing levels of safety for all national airspace
			 system users.</text>
				</subsection><subsection id="HBEE3D4BC81394A71ACF4397A9B82DC93"><enum>(b)</enum><header>Pilot
			 projects</header><text display-inline="yes-display-inline">The Secretary shall
			 coordinate with the Administrator of the Federal Aviation Administration and
			 the Director of the Joint Planning Office to enter into pilot projects in
			 sparsely populated, low-density Class G air traffic airspace to conduct
			 experiments and collect data in order to accelerate the safe integration of
			 unmanned aircraft systems into the national airspace system as part of research
			 activities of the Joint Planning and Development Office.</text>
				</subsection></section><section id="H857D1D1ADDF3487790923F75D5398645"><enum>804.</enum><header>Establishing a
			 research program in tunnel detection</header>
				<subsection id="HFFFDAD57346A44C1B7DD46E655478290"><enum>(a)</enum><header>Research and
			 development</header><text>The Under Secretary shall research and develop
			 technologies to permit detection of near surface voids, such as tunnels, with
			 an emphasis on technologies with real time capability.</text>
				</subsection><subsection id="HD0A7E2180B0B4D5E93BDE06400DE30D0"><enum>(b)</enum><header>Coordination</header><text>The
			 Secretary shall coordinate with other appropriate Federal agencies, including
			 the Department of Defense and the United States Geological Survey, and ensure
			 the integration of activities under subsection (a) with relevant efforts of
			 such other agencies and the Department’s Centers of Excellence Program.</text>
				</subsection></section><section id="H62660035466D4A56B598A8B9DB022DF5"><enum>805.</enum><header>Research in
			 document security and authentication technologies</header>
				<subsection id="H7146266B0ADB4F5AA48759675F858CB5"><enum>(a)</enum><header>Establishment of
			 program</header><text>The Under Secretary, in coordination with the Director of
			 the National Institute of Standards and Technology, shall conduct a research
			 and development program on document security, validation, and authentication
			 technologies and standards. The program may include assessment or development
			 of imitation-resistant and tamper-resistant documentation, imitation-resistant
			 or tamper-resistant devices, document validation and authentication
			 technologies, and document identification standards.</text>
				</subsection><subsection id="H11182679C6C24FE3AE761DDB0AACC5B1"><enum>(b)</enum><header>Coordination</header><text>In
			 carrying out the program in subsection (a), the Under Secretary shall
			 coordinate with other Federal agencies engaged in similar activities, including
			 Immigration and Customs Enforcement, the Department of State, the Department of
			 Defense, the United States Coast Guard, and the Department of Justice.</text>
				</subsection><subsection id="HD6C4062516944781973CF99D46810ECF"><enum>(c)</enum><header>Report to
			 Congress</header><text>Not later than 12 months after the date of enactment of
			 this Act, the Under Secretary and the Director of the National Institute of
			 Standards and Technology shall provide to the Committee on Homeland Security
			 and the Committee on Science and Technology of the House of Representatives,
			 and the Committee on Homeland Security and Government Affairs of the Senate, a
			 report detailing the actions taken by the Under Secretary and the Director
			 under this section.</text>
				</subsection></section><section id="H24D91D2B6001424782671533C4653668"><enum>806.</enum><header>Study on global
			 positioning system technologies</header>
				<subsection id="H9DAFACAE7CDC4BB8A6C656A8F569DBCB"><enum>(a)</enum><header>In
			 general</header><text>The Under Secretary shall conduct a study of the need for
			 next generation global positioning system technology as it relates to border
			 security, including—</text>
					<paragraph id="HC67FBC34E9774FD2AFB77FBD1E34FF67"><enum>(1)</enum><text>conducting an
			 analysis of the frequency of unintended border crossings and the capability of
			 global positioning system technologies to address unintended border crossings
			 by government personnel;</text>
					</paragraph><paragraph id="HCDDB0DD1F6D240968E5E494DE4239060"><enum>(2)</enum><text>undertaking an
			 examination of the potential end user requirements for global positioning
			 system technologies, including cost limitations, accessibility, and
			 reliability; and</text>
					</paragraph><paragraph id="H3621DF7B99BF4426B92947D9D4C7EE69"><enum>(3)</enum><text>developing
			 recommendations for potential near-term and long-term research, development,
			 testing, and evaluation of border security-focused global positioning
			 technologies.</text>
					</paragraph></subsection><subsection id="H84C2F30C40324F928477D82448FFBD35"><enum>(b)</enum><header>Consultation</header><text>In
			 conducting the study under subsection (a), the Under Secretary shall consult
			 with U.S. Customs and Border Protection, the National Institute of Standards
			 and Technology and appropriate Federal, State, and local law enforcement
			 officials.</text>
				</subsection><subsection id="H29EA686D500145C1A224094A497E0ABC"><enum>(c)</enum><header>Report</header><text>Not
			 later than 1 year after the date of enactment of this Act, the Under Secretary
			 shall report to Congress the findings of the study conducted under this
			 section.</text>
				</subsection></section><section id="H08F949F52A5B4BA7AA25D4EB8B979771"><enum>807.</enum><header>Study of mobile
			 biometric technologies at the border</header>
				<subsection id="HD3F0C7CE6AFC46F3B9D86719F4C0E8E0"><enum>(a)</enum><header>In
			 general</header><text>The Under Secretary, in coordination with the
			 Commissioner of United States Customs and Border Protection, shall establish a
			 research program on the use of mobile biometric technology at the Nation’s
			 borders between the ports of entry, including—</text>
					<paragraph id="HD45C90F8760641F8BC7C46A7C265C823"><enum>(1)</enum><text>conducting an
			 analysis of existing mobile biometric technologies and the extent to which they
			 can be deployed in Border Patrol agents’ vehicles and used at the border, in
			 terms of operability, reliability, cost, and overall benefit to border
			 operations;</text>
					</paragraph><paragraph id="HB86551392643425A8AE1921DC5AE03E7"><enum>(2)</enum><text>undertaking an
			 examination of the potential end-user requirements of mobile biometric
			 technology by the Border Patrol and other relevant end-users;</text>
					</paragraph><paragraph id="HC41E2D394D3140DC9A00ECB78F0C0FD0"><enum>(3)</enum><text>developing
			 recommendations for addressing capability gaps in mobile biometric
			 technologies; and</text>
					</paragraph><paragraph id="HE29DBE80F5984C128034A867730199FF"><enum>(4)</enum><text>examining the
			 feasibility of implementing a pilot program for use of mobile biometric
			 technologies at the border.</text>
					</paragraph></subsection><subsection id="H882F0A2F2ED4451B997499D0A5EC1BE9"><enum>(b)</enum><header>Consultation</header><text>In
			 conducting the research program under subsection (a), the Under Secretary shall
			 consult the National Institute of Standards and Technology, other appropriate
			 Federal agencies, and appropriate Federal, State, and local law enforcement
			 officials.</text>
				</subsection><subsection id="H92D0CE7960FD4664B0566D00DF76C8CB"><enum>(c)</enum><header>Coordination</header><text>The
			 Secretary shall ensure that the research program is coordinated with other
			 biometric identification programs within the Department.</text>
				</subsection><subsection id="HBC6B5B01401943F7B7F12FD13965D66E"><enum>(d)</enum><header>Report</header><text>Not
			 later than 6 months after the date of enactment of this Act, the Under
			 Secretary shall transmit to Congress a report on the findings of the research
			 program conducted under this section.</text>
				</subsection></section><section id="H03D95E92CF9D4F20A4C2635DE4B2D919"><enum>808.</enum><header>Authorization
			 of appropriations</header><text display-inline="no-display-inline">Of the
			 amount authorized by section 101 of this Act, such sums as may be necessary are
			 authorized to be appropriated to carry out this title.</text>
			</section></title></legis-body>
	<attestation>
		<attestation-group>
			<attestation-date chamber="House" date="20100720">Passed the House of
			 Representatives July 20, 2010.</attestation-date>
			<attestor display="yes">Lorraine C. Miller,</attestor>
			<role>Clerk.</role>
		</attestation-group>
	</attestation>
	<endorsement display="no">
	</endorsement>
</bill>
