<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H87BD307AF91C4F29B6859FB9F96AD9EF" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>107 HR 9668 IH: Strategic Homeland Intelligence and Enforcement Legislation to Defend against the CCP Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2024-09-18</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">118th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">H. R. 9668</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20240918">September 18, 2024</action-date><action-desc><sponsor name-id="S001220">Mr. Strong</sponsor> (for himself and <cosponsor name-id="S001201">Mr. Suozzi</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HHM00">Committee on Homeland Security</committee-name>, and in addition to the Committees on <committee-name committee-id="HWM00">Ways and Means</committee-name>, <committee-name committee-id="HBA00">Financial Services</committee-name>, <committee-name committee-id="HJU00">the Judiciary</committee-name>, and <committee-name committee-id="HFA00">Foreign Affairs</committee-name>, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned</action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To establish in the Department of Homeland Security a working group relating to countering terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party, and for other purposes.</official-title></form><legis-body id="HFDA541ED1FCE4FA691F02FBF59E336FA" style="OLC"><section id="H5B36C4C5B7184C0189492249D1A4CFB2" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Strategic Homeland Intelligence and Enforcement Legislation to Defend against the CCP Act</short-title></quote> or the <quote><short-title>SHIELD Against CCP Act</short-title></quote>.</text></section><section id="HFC3B1FC6C5A4495CB74F395BA3224E01"><enum>2.</enum><header>Working Group to counter certain threats posed to the United States by the Chinese Communist Party</header><subsection id="H91B57F8C261045DDBEAA9556876A8823"><enum>(a)</enum><header>Establishment</header><paragraph id="H65AF6648B08E4C91BB2730C966ECB3A8" commented="no"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Secretary of Homeland Security shall establish in the Department of Homeland Security a working group (in this section referred to as the <quote>Working Group</quote>), which shall carry out the duties specified in subsection (b) relating to countering terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party.</text></paragraph><paragraph id="HE1A845C533C546B3B5C5D7C11669C066"><enum>(2)</enum><header>Director</header><subparagraph id="H0CEF9FDF1A044E179382C17CE2DE1FF5"><enum>(A)</enum><header>Appointment</header><text>The head of the Working Group shall be a Director (in this section referred to as the <quote>Director</quote>), who shall be appointed by the Secretary of Homeland Security.</text></subparagraph><subparagraph id="H31C094E59BC749D087E0E18BDCC68315"><enum>(B)</enum><header>Reporting</header><text>The Director shall report to the Secretary of Homeland Security regarding all administrative, operational, and security matters of the Working Group.</text></subparagraph></paragraph><paragraph id="H15A146837F5C495C894E9BD9F3976A08"><enum>(3)</enum><header>Staffing</header><text>The Secretary of Homeland Security shall ensure the Working Group is provided with the following:</text><subparagraph id="HCF413234C49E45A3BD8F0FC2526655B4"><enum>(A)</enum><text>A sufficient number of employees to perform required duties.</text></subparagraph><subparagraph id="H8F07EB228D2F4ECEADDE53BEB8BDB315"><enum>(B)</enum><text>Not fewer than one employee dedicated to ensuring compliance with privacy laws and regulations.</text></subparagraph></paragraph><paragraph id="HF5699CA602274B9DAE4E4D032EE1C977" commented="no"><enum>(4)</enum><header>Detailees</header><text display-inline="yes-display-inline">The Working Group may accept and employ detailees with expertise in countering terrorist, cybersecurity, border and port security, and transportation security threats posed by the Chinese Communist Party to the United States, or in related fields, from any element of the intelligence community or any other Federal agency the Director determines appropriate, with or without reimbursement, consistent with applicable laws and regulations regarding such employees.</text></paragraph></subsection><subsection id="H9F6F3950D5454B8F931391AF512C1C54"><enum>(b)</enum><header>Duties</header><text>The Working Group shall carry out the following:</text><paragraph id="HED3666B5D6BA43CD8FBC4160B91C04B3"><enum>(1)</enum><text display-inline="yes-display-inline">Examine, assess, and report upon efforts by the Department of Homeland Security to counter terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party, including efforts to counter the Chinese Communist Party’s—</text><subparagraph id="H7D6E63E86DF44F1E9E2450E9FB790ACC"><enum>(A)</enum><text>nontraditional tactics and exploitation of the United States immigration system through—</text><clause id="HC38F8C5DA2964C84BB37B4641062E86B"><enum>(i)</enum><text>identity theft;</text></clause><clause id="HC3EB5375C16240E79EFD556DD0E90EA6"><enum>(ii)</enum><text>the immigrant and nonimmigrant visa processes;</text></clause><clause id="H92F1CEC1698C4BEC9DCA7319788C907D"><enum>(iii)</enum><text>unlawful border crossings;</text></clause><clause id="H94E5EEEDA0234792B31379A953904905"><enum>(iv)</enum><text>human smuggling; and</text></clause><clause id="HBCDBF331D00843C4BC814327442E36A3"><enum>(v)</enum><text>human trafficking;</text></clause></subparagraph><subparagraph id="H3FD181E38729405299AE0F5590272934"><enum>(B)</enum><text>predatory economic and trade practices, including the trafficking of counterfeit and pirated goods, the use of forced labor, labor exploitation for financial gain, customs fraud, money laundering practices, theft of intellectual property and technology, and risks to the critical infrastructure supply chain;</text></subparagraph><subparagraph id="H756BDEE76E0640AA87054C04F5B82B02"><enum>(C)</enum><text>malign influence operations and transnational repression targeting United States persons;</text></subparagraph><subparagraph id="H318934C658B14478B2184936A981AFAB"><enum>(D)</enum><text>threats to critical infrastructure;</text></subparagraph><subparagraph id="HF52ABE3DAA904731B203E7DA9175BE01" commented="no"><enum>(E)</enum><text>direct or indirect support for transnational criminal organizations trafficking in fentanyl, illicit drug precursors, or other controlled substances through—</text><clause id="HC016335B0E854908BC2ECA1FCC86756E" commented="no"><enum>(i)</enum><text>the United States border;</text></clause><clause id="H31CA2FD1A8E64FCD9CEDF1C8CA937147" commented="no"><enum>(ii)</enum><text>international mail shipments; or</text></clause><clause id="HBD542EF35D704F41B5AAD1B1CCE0B75B" commented="no"><enum>(iii)</enum><text>express consignment operations;</text></clause></subparagraph><subparagraph id="H6048CC2C3A5E4A5590E1229E6CAE23EE"><enum>(F)</enum><text>the movement of cross-border funds through traditional money laundering practices, third party facilitators, or emerging money laundering techniques, including cryptocurrency; and</text></subparagraph><subparagraph id="HCFB06CD681E2476CB916A05990E1F565"><enum>(G)</enum><text>exploitation of vulnerabilities in the United States export control regime, including the export in violation of law of controlled technologies from the United States.</text></subparagraph></paragraph><paragraph id="HF4384494A52A411DAEA9CF95FCAD72AC"><enum>(2)</enum><text display-inline="yes-display-inline">Account for the resources of the Department that are dedicated to programs aimed at countering terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party, and any supporting information as to the efficacy of each such program.</text></paragraph><paragraph id="H1F03FFA8023740D99ED1653F654DCBA7"><enum>(3)</enum><text display-inline="yes-display-inline">Build upon existing or ongoing evaluations and avoid unnecessary duplication by reviewing the findings, conclusions, and recommendations of other appropriate working groups, committees, commissions, or entities established by the Department related to efforts to counter terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party.</text></paragraph><paragraph id="H92CAF6A46A944AA0BBCBDFCAE9D16B4E"><enum>(4)</enum><text display-inline="yes-display-inline">Identify gaps in policies, processes, and activities of the Department to respond to terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party.</text></paragraph><paragraph id="H3386FF706263492E8712F50751E00BB4"><enum>(5)</enum><text display-inline="yes-display-inline">Facilitate cooperation and coordination among offices and components of the Department on a holistic response to countering terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party.</text></paragraph></subsection><subsection id="H04146D98AC1A4B6B81D79CA9B5FD621B"><enum>(c)</enum><header>Additional duty relating to information sharing</header><text display-inline="yes-display-inline">The Working Group, in accordance with applicable constitutional, privacy, civil rights, and civil liberties protections, shall review, in coordination with the Office of Intelligence and Analysis of the Department of Homeland Security, information relating to terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party that is gathered by Federal, State, local, Tribal, and territorial partners, and the National Network of Fusion Centers, and incorporate such information, as appropriate, into the Working Group’s own information relating to such threats. The Working Group, in coordination with the Office of Intelligence and Analysis, shall also ensure the dissemination to Federal, State, local, Tribal, and territorial partners, and the National Network of Fusion Centers, of information related to such threats.</text></subsection><subsection id="H1615A0C88C734E18A96EB0287B82ED83"><enum>(d)</enum><header>Annual assessments</header><paragraph id="H85CF1E0166E24EC08A8D40510FE1AC03"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this section and annually thereafter for five years, the Secretary of Homeland Security, in coordination with the Under Secretary for Intelligence and Analysis of the Department of Homeland Security, the Director of the Federal Bureau of Investigation, and the Director of National Intelligence, shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report that assesses terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party during the immediately preceding 12 months.</text></paragraph><paragraph id="H3E0E2141C96E4C31AA2E5EB645BED8B9"><enum>(2)</enum><header>Contents</header><text>Each assessment under paragraph (1) shall also include the following:</text><subparagraph id="H176DCF9BA021461D8127806CEB305477"><enum>(A)</enum><text>A description of the activities and operations of the Working Group undertaken pursuant to subsection (b).</text></subparagraph><subparagraph id="HC363AABD4F1F4703A50970FB6ED0E130"><enum>(B)</enum><text>Any other matters the Secretary of Homeland Security determines relevant.</text></subparagraph></paragraph><paragraph id="H610BB91535F64E1BBC25D37F5977E111"><enum>(3)</enum><header>Form</header><text>Each assessment under paragraph (1) shall be submitted in unclassified form, but may include a classified annex. The Secretary of Homeland Security shall post on a publicly available website of the Department of Homeland Security the unclassified portion of each assessment.</text></paragraph><paragraph id="H53F3E5B9D29A4153B614D772CF3E8DE8"><enum>(4)</enum><header>Briefing</header><text>Not later than 30 days after the submission of each assessment under paragraph (1), the Secretary of Homeland Security shall provide to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a briefing on such assessment and the progress and challenges of the Working Group.</text></paragraph></subsection><subsection id="HEEDC9D6E854244DA8EC0131B207623B8"><enum>(e)</enum><header>Comptroller General review</header><text>Not later than one year after the date of the enactment of this Act, the Comptroller General of the United States shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate, a report on the implementation of this section.</text></subsection><subsection id="H3022B78FF3DB4C38B5DF4834E180CBE5" commented="no"><enum>(f)</enum><header>Research and development</header><text>Not later than one year after the date of the enactment of this Act, the Secretary of Homeland Security, in coordination with the Director and the Under Secretary for Science and Technology of the Department of Homeland Security, shall, to the extent practicable, carry out research and development, including operational testing, of technologies and techniques for enhancing the Department’s security and situational awareness relating to countering terrorist, cybersecurity, border and port security, and transportation security threats posed to the United States by the Chinese Communist Party, in accordance with applicable constitutional, privacy, civil rights, and civil liberties protections.</text></subsection><subsection id="H53015280982B4673A597A577BAAC3885"><enum>(g)</enum><header>Sunset</header><text>The Working Group shall terminate on the date that is seven years after the establishment of the Working Group under subsection (a)(1).</text></subsection><subsection id="H20EC91BEC38E42E0A0368F5467FB4757"><enum>(h)</enum><header>Definitions</header><text>In this section:</text><paragraph id="H7BE5DE2FC8FD41CDA8388E181C8C7B90"><enum>(1)</enum><header>Critical infrastructure</header><text>The term <quote>critical infrastructure</quote> has the meaning given such term in section 1016(e) of <external-xref legal-doc="public-law" parsable-cite="pl/107/56">Public Law 107–56</external-xref> (<external-xref legal-doc="usc" parsable-cite="usc/42/5195c">42 U.S.C. 5195c(e)</external-xref>).</text></paragraph><paragraph id="H8C082E6919DE4D43958CE2CBE1569F4A"><enum>(2)</enum><header>Fusion center</header><text>The term <quote>fusion center</quote> has the meaning given such term in subsection (k) of section 210A of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/124h">6 U.S.C. 124h</external-xref>).</text></paragraph><paragraph id="HEC02D1C894DD4B31BEF6264D9C497F96"><enum>(3)</enum><header>Intelligence community</header><text>The term <quote>intelligence community</quote> has the meaning given such tern in section 3(4) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003(4)</external-xref>).</text></paragraph><paragraph id="H3702653F958D44B6B91342F9F8C817AF"><enum>(4)</enum><header>National Network of Fusion Centers</header><text>The term <quote>National Network of Fusion Centers</quote> means a decentralized arrangement of fusion centers intended to enhance individual State and urban area fusion centers’ ability to leverage the capabilities and expertise of all such fusion centers for the purpose of enhancing analysis and homeland security information sharing nationally.</text></paragraph><paragraph id="HF9380B5BE2CA4096BADDD82A2C1685E0"><enum>(5)</enum><header>United States persons</header><text>The term <quote>United States person</quote> has the meaning given such term in section 1637(d)(10) of the Carl Levin and Howard P. <quote>Buck</quote> McKeon National Defense Authorization Act for Fiscal year 2015 (<external-xref legal-doc="usc" parsable-cite="usc/50/1708">50 U.S.C. 1708(d)(10)</external-xref>).</text></paragraph></subsection></section></legis-body></bill> 

