[House Report 115-198]
[From the U.S. Government Publishing Office]


115th Congress   }                                       {      Report
                        HOUSE OF REPRESENTATIVES
 1st Session     }                                       {     115-198

======================================================================



 
       DEPARTMENT OF HOMELAND SECURITY AUTHORIZATION ACT OF 2017

                                _______
                                

 June 28, 2017.--Committed to the Committee of the Whole House on the 
              State of the Union and ordered to be printed

                                _______
                                

  Mr. McCaul, from the Committee on Homeland Security, submitted the 
                               following

                              R E P O R T

                        [To accompany H.R. 2825]

    The Committee on Homeland Security, to whom was referred 
the bill (H.R. 2825) to amend the Homeland Security Act of 2002 
to make certain improvements in the laws administered by the 
Secretary of Homeland Security, and for other purposes, having 
considered the same, report favorably thereon with an amendment 
and recommend that the bill as amended do pass.

                                CONTENTS

                                                                   Page
      Purpose and Summary...........................................113
      Background and Need for Legislation...........................114
      Hearings......................................................115
      Committee Consideration.......................................121
      Committee Votes...............................................128
      Committee Oversight Findings..................................132
      New Budget Authority, Entitlement Authority, and Tax Expenditu132
      Congressional Budget Office Estimate..........................132
      Statement of General Performance Goals and Objectives.........132
      Duplicative Federal Programs..................................132
      Congressional Earmarks, Limited Tax Benefits, and Limited Tariff 
      Benefits......................................................132
      Federal Mandates Statement....................................133
      Preemption Clarification......................................133
      Disclosure of Directed Rule Makings...........................133
      Advisory Committee Statement..................................133
      Applicability to Legislative Branch...........................133
      Section-by-Section Analysis of the Legislation................133
      Changes in Existing Law Made by the Bill, as Reported.........200

    The amendment is as follows:
  Strike all after the enacting clause and insert the 
following:

SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

  (a) Short Title.--This Act may be cited as the ``Department of 
Homeland Security Authorization Act of 2017'' or the ``DHS 
Authorization Act of 2017''.
  (b) Table of Contents.--The table of contents for this Act is as 
follows:

Sec. 1. Short title; Table of contents.

         TITLE I--DEPARTMENT OF HOMELAND SECURITY HEADQUARTERS

                  Subtitle A--Headquarters Operations

Sec. 101. Homeland security enterprise defined.
Sec. 102. Functions and components of Headquarters of Department of 
Homeland Security.
Sec. 103. Repeal of Director of Shared Services and Office of 
Counternarcotics Enforcement of Department of Homeland Security.
Sec. 104. Responsibilities and functions of Chief Privacy Officer.
Sec. 105. Responsibilities of Chief Financial Officer.
Sec. 106. Chief Information Officer.
Sec. 107. Quadrennial Homeland Security review.
Sec. 108. Office of Strategy, Policy, and Plans.
Sec. 109. Chief Procurement Officer.
Sec. 110. Chief Security Officer.
Sec. 111. Office of Inspector General.
Sec. 112. Office for Civil Rights and Civil Liberties.
Sec. 113. Department of Homeland Security Rotation Program.
Sec. 114. Future Years Homeland Security Program.
Sec. 115. Field efficiencies plan.
Sec. 116. Submission to Congress of information regarding reprogramming 
or transfer of Department of Homeland Security resources to respond to 
operational surges.
Sec. 117. Report to Congress on cost savings and efficiency.
Sec. 118. Research and development and CBRNE organizational review.
Sec. 119. Activities related to children.

             Subtitle B--Human Resources and Other Matters

Sec. 121. Chief Human Capital Officer responsibilities.
Sec. 122. Employee engagement steering committee and action plan.
Sec. 123. Annual employee award program.
Sec. 124. Independent investigation and implementation plan.
Sec. 125. Center for faith-based and neighborhood partnerships.
Sec. 126. Timely guidance to DHS personnel regarding Executive Orders.
Sec. 127. Secretary's responsibilities regarding election 
infrastructure.

 TITLE II--DEPARTMENT OF HOMELAND SECURITY ACQUISITION ACCOUNTABILITY 
                             AND EFFICIENCY

Sec. 201. Definitions.

                  Subtitle A--Acquisition Authorities

Sec. 211. Acquisition authorities for Under Secretary for Management of 
the Department of Homeland Security.
Sec. 212. Acquisition authorities for Chief Financial Officer of the 
Department of Homeland Security.
Sec. 213. Acquisition authorities for Chief Information Officer of the 
Department of Homeland Security.
Sec. 214. Acquisition authorities for Program Accountability and Risk 
Management.
Sec. 215. Acquisition innovation.

         Subtitle B--Acquisition Program Management Discipline

Sec. 221. Acquisition Review Board.
Sec. 222. Requirements to reduce duplication in acquisition programs.
Sec. 223. Department leadership council.
Sec. 224. Government Accountability Office review of Board and of 
requirements to reduce duplication in acquisition programs.
Sec. 225. Excluded party list system waivers.
Sec. 226. Inspector General oversight of suspension and debarment.

     Subtitle C--Acquisition Program Management Accountability and 
                              Transparency

Sec. 231. Congressional notification for major acquisition programs.
Sec. 232. Multiyear Acquisition Strategy.
Sec. 233. Acquisition reports.

            TITLE III--INTELLIGENCE AND INFORMATION SHARING

  Subtitle A--Department of Homeland Security Intelligence Enterprise

Sec. 301. Homeland intelligence doctrine.
Sec. 302. Analysts for the Chief Intelligence Officer.
Sec. 303. Annual homeland terrorist threat assessments.
Sec. 304. Department of Homeland Security data framework.
Sec. 305. Establishment of Insider Threat Program.
Sec. 306. Threat assessment on terrorist use of virtual currency.
Sec. 307. Department of Homeland Security counterterrorism advisory 
board.
Sec. 308. Border and gang threat assessment.
Sec. 309. Security clearance management and administration.

              Subtitle B--Stakeholder Information Sharing

Sec. 311. Department of Homeland Security Fusion Center Partnership 
Initiative.
Sec. 312. Fusion center personnel needs assessment.
Sec. 313. Program for State and local analyst clearances.
Sec. 314. Information technology assessment.
Sec. 315. Department of Homeland Security classified facility inventory 
and dissemination.
Sec. 316. Terror inmate information sharing.
Sec. 317. Annual report on Office for State and Local Law Enforcement.
Sec. 318. Annual catalog on Department of Homeland Security training, 
publications, programs, and services for State, local, and tribal law 
enforcement agencies.

                      TITLE IV--MARITIME SECURITY

Sec. 401. Strategic plan to enhance the security of the international 
supply chain.
Sec. 402. Container Security Initiative.
Sec. 403. Cyber at ports.
Sec. 404. Facility inspection intervals.
Sec. 405. Updates of maritime operations coordination plan.
Sec. 406. Evaluation of Coast Guard Deployable Specialized Forces.
Sec. 407. Cost benefit analysis of co-locating DHS assets.
Sec. 408. Repeal of interagency operational centers for port security 
and secure systems of transportation.
Sec. 409. Maritime security capabilities assessments.
Sec. 410. Conforming and clerical amendments.

            TITLE V--TRANSPORTATION SECURITY ADMINISTRATION

                       Subtitle A--Administration

Sec. 501. Amendments to the Homeland Security Act of 2002 and title 5, 
United States Code.
Sec. 502. Amendments to title 49, United States Code.
Sec. 503. Amendments to the Aviation and Transportation Security Act.
Sec. 504. Information required to be submitted to Congress under the 
strategic 5-year technology investment plan of the Transportation 
Security Administration.
Sec. 505. Maintenance of security-related technology.
Sec. 506. Transportation Security Administration efficiency.
Sec. 507. Transportation senior executive service accountability.

              Subtitle B--Passenger Security and Screening

Sec. 511. Department of Homeland Security trusted traveler program 
collaboration.
Sec. 512. PreCheck Biometric pilot project.
Sec. 513. Identity and travel document verification.
Sec. 514. Computed tomography pilot project.
Sec. 515. Explosives detection canine teams for aviation.
Sec. 516. Standard operating procedures at airport checkpoints.
Sec. 517. Traveler redress improvement.
Sec. 518. Screening in areas other than passenger terminals.
Sec. 519. Federal Air Marshal Service agreements.
Sec. 520. Federal Air Marshal mission scheduling automation.
Sec. 521. Canine detection research and development.
Sec. 522. International Civil Aviation Organization.
Sec. 523. Passenger security fee.
Sec. 524. Last point of departure airport certification.
Sec. 525. Security standards at foreign airports.
Sec. 526. Security incident response at airports and surface 
transportation hubs.
Sec. 527. Airport security screening opt-out program.
Sec. 528. Personnel management system review.
Sec. 529. Innovation task force.
Sec. 530. Airport law enforcement reimbursement.

 Subtitle C--Transportation Security Screening Personnel Training and 
                             Accountability

Sec. 531. Transportation security training programs.
Sec. 532. Alternate new security screening personnel training program 
cost and feasibility study.
Sec. 533. Prohibition of advance notice of covert testing to security 
screeners.

       Subtitle D--Airport Access Controls and Perimeter Security

Sec. 541. Reformation of certain programs of the Transportation 
Security Administration.
Sec. 542. Airport perimeter and access control security.
Sec. 543. Exit lane security.
Sec. 544. Reimbursement for deployment of armed law enforcement 
personnel at airports.

                     Subtitle E--Air Cargo Security

Sec. 551. Air cargo advance screening program.
Sec. 552. Explosives detection canine teams for air cargo security.

           Subtitle F--Information Sharing and Cybersecurity

Sec. 561. Information sharing and cybersecurity.

              Subtitle G--Surface Transportation Security

Sec. 571. Definitions.
Sec. 572. Surface transportation security assessment and implementation 
of risk-based strategy.
Sec. 573. Risk-based budgeting and resource allocation.
Sec. 574. Surface transportation security management and interagency 
coordination review.
Sec. 575. Transparency.
Sec. 576. TSA counterterrorism asset deployment.
Sec. 577. Surface transportation security advisory committee.
Sec. 578. Review of the explosives detection canine team program.
Sec. 579. Expansion of national explosives detection canine team 
program.
Sec. 580. Explosive detection technology.
Sec. 581. Study on security standards and best practices for United 
States and foreign passenger transportation systems.
Sec. 582. Amtrak security upgrades.
Sec. 583. Study on surface transportation inspectors.
Sec. 584. Security awareness program.
Sec. 585. Voluntary use of credentialing.
Sec. 586. Background records checks for issuance of hazmat licenses.
Sec. 587. Recurrent vetting for surface transportation credential-
holders.
Sec. 588. Pipeline security study.
Sec. 589. Repeal of limitation relating to motor carrier security-
sensitive material tracking technology.

  Subtitle H--Security Enhancements in Public Areas of Transportation 
                               Facilities

Sec. 591. Working group.
Sec. 592. Technical assistance; Vulnerability assessment tools.
Sec. 593. Operations centers.
Sec. 594. Review of regulations.
Sec. 595. Definition.

     TITLE VI--EMERGENCY PREPAREDNESS, RESPONSE, AND COMMUNICATIONS

       Subtitle A--Grants, Training, Exercises, and Coordination

Sec. 601. Urban Area Security Initiative.
Sec. 602. State Homeland Security Grant Program.
Sec. 603. Grants to directly eligible tribes.
Sec. 604. Law enforcement terrorism prevention.
Sec. 605. Prioritization.
Sec. 606. Allowable uses.
Sec. 607. Approval of certain equipment.
Sec. 608. Memoranda of understanding.
Sec. 609. Grants metrics.
Sec. 610. Grant management best practices.
Sec. 611. Prohibition on consolidation.
Sec. 612. Maintenance of grant investments.
Sec. 613. Transit security grant program.
Sec. 614. Port security grant program.
Sec. 615. National Domestic Preparedness Consortium.
Sec. 616. Rural Domestic Preparedness Consortium.
Sec. 617. Emergency support functions.
Sec. 618. Review of National Incident Management System.
Sec. 619. Remedial action management program.
Sec. 620. Cyber preparedness.
Sec. 621. Major metropolitan area counterterrorism training and 
exercise grant program.
Sec. 622. Center for Domestic Preparedness.
Sec. 623. Operation Stonegarden.
Sec. 624. Non-Profit Security Grant Program.
Sec. 625. FEMA Senior Law Enforcement Advisor.
Sec. 626. Study of the use of grant funds for cybersecurity.
Sec. 627. Technical expert authorized.

                       Subtitle B--Communications

Sec. 631. Office of Emergency Communications.
Sec. 632. Responsibilities of Office of Emergency Communications 
Director.
Sec. 633. Annual reporting on activities of the Office of Emergency 
Communications.
Sec. 634. National Emergency Communications Plan.
Sec. 635. Technical edit.
Sec. 636. Public Safety Broadband Network.
Sec. 637. Communications training.

                    Subtitle C--Medical Preparedness

Sec. 641. Chief Medical Officer.
Sec. 642. Medical Countermeasures Program.

                         Subtitle D--Management

Sec. 651. Mission support.
Sec. 652. Systems modernization.
Sec. 653. Strategic human capital plan.
Sec. 654. Office of Disability Integration and Coordination of 
Department of Homeland Security.

                        TITLE VII--OTHER MATTERS

Sec. 701. Decision regarding certain executive memoranda.
Sec. 702. Permanent authorization for Asia-Pacific Economic Cooperation 
Business Travel Card Program.
Sec. 703. Authorization of appropriations for Office of Inspector 
General.
Sec. 704. Canine teams.
Sec. 705. Technical amendments to the Homeland Security Act of 2002.

         TITLE I--DEPARTMENT OF HOMELAND SECURITY HEADQUARTERS

                  Subtitle A--Headquarters Operations

SEC. 101. HOMELAND SECURITY ENTERPRISE DEFINED.

  Section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101) is 
amended--
          (1) by redesignating paragraphs (9) through (20) as 
        paragraphs (10) through (21), respectively; and
          (2) by inserting after paragraph (8) the following new 
        paragraph (9):
          ``(9) The term `homeland security enterprise' means any 
        relevant governmental or nongovernmental entity involved in 
        homeland security, including a Federal, State, or local 
        government official, private sector representative, academic, 
        or other policy expert.''.

SEC. 102. FUNCTIONS AND COMPONENTS OF HEADQUARTERS OF DEPARTMENT OF 
                    HOMELAND SECURITY.

  Section 102 of the Homeland Security Act of 2002 (6 U.S.C. 112) is 
amended--
          (1) in subsection (c)--
                  (A) in the matter preceding paragraph (1), by 
                striking ``through the Office of State and Local 
                Coordination (established under section 801)'' and 
                inserting ``through the Office of Partnership and 
                Engagement'';
                  (B) in paragraph (2), by striking ``and'' after the 
                semicolon at the end;
                  (C) in paragraph (3), by striking the period and 
                inserting ``; and''; and
                  (D) by adding at the end the following:
          ``(4) entering into agreements with governments of other 
        countries, in consultation with the Secretary of State, and 
        international nongovernmental organizations in order to achieve 
        the missions of the Department.''; and
          (2) by adding at the end the following new subsection:
  ``(h) Headquarters.--
          ``(1) Components.--There is in the Department a Headquarters. 
        The Department Headquarters shall include each of the 
        following:
                  ``(A) The Office of the Secretary.
                  ``(B) The Office of the Deputy Secretary.
                  ``(C) The Executive Secretary.
                  ``(D) The Management Directorate, including the 
                Office of the Chief Financial Officer.
                  ``(E) The Office of Strategy, Policy, and Plans.
                  ``(F) The Office of the General Counsel.
                  ``(G) The Office of the Chief Privacy Officer.
                  ``(H) The Office for Civil Rights and Civil 
                Liberties.
                  ``(I) The Office of Operations Coordination.
                  ``(J) The Office of Intelligence and Analysis.
                  ``(K) The Office of Legislative Affairs.
                  ``(L) The Office of Public Affairs.
                  ``(M) The Office of the Inspector General.
                  ``(N) The Office of the Citizenship and Immigration 
                Services Ombudsman.
          ``(2) Functions.--The Secretary, acting through the 
        appropriate official of the Headquarters, shall--
                  ``(A) establish an overall strategy to successfully 
                further the mission of the Department;
                  ``(B) establish initiatives that improve Department-
                wide operational performance;
                  ``(C) establish mechanisms to--
                          ``(i) ensure that components of the 
                        Department comply with Department policies and 
                        fully implement the strategies and initiatives 
                        of the Secretary; and
                          ``(ii) require the head of each component of 
                        the Department and component chief officers to 
                        comply with such policies and implement such 
                        strategies and initiatives;
                  ``(D) establish annual operational and management 
                objectives to evaluate the performance of the 
                Department;
                  ``(E) ensure that the Department successfully meets 
                operational and management performance objectives 
                through conducting oversight of component agencies;
                  ``(F) ensure that the strategies, priorities, 
                investments, and workforce of Department components 
                align with Department objectives;
                  ``(G) establish and implement policies related to 
                Department ethics and compliance standards;
                  ``(H) establish and implement, in consultation with 
                the Office of Civil Rights and Civil Liberties, 
                policies which preserve individual liberty, fairness, 
                and equality under the law;
                  ``(I) manage and encourage shared services across 
                Department components;
                  ``(J) lead and coordinate interaction with Congress 
                and other external organizations; and
                  ``(K) carry out other such functions as the Secretary 
                determines are appropriate.''.

SEC. 103. REPEAL OF DIRECTOR OF SHARED SERVICES AND OFFICE OF 
                    COUNTERNARCOTICS ENFORCEMENT OF DEPARTMENT OF 
                    HOMELAND SECURITY.

  (a) Abolishment of Director of Shared Services.--
          (1) Abolishment.--The position of Director of Shared Services 
        of the Department of Homeland Security is abolished.
          (2) Conforming amendment.--The Homeland Security Act of 2002 
        is amended by striking section 475 (6 U.S.C. 295).
          (3) Clerical amendment.--The table of contents in section 
        1(b) of such Act is amended by striking the item relating to 
        section 475.
  (b) Abolishment of the Office of Counternarcotics Enforcement.--
          (1) Abolishment.--The Office of Counternarcotics Enforcement 
        is abolished.
          (2) Conforming amendments.--The Homeland Security Act of 2002 
        is amended--
                  (A) in subparagraph (B) of section 843(b)(1) (6 
                U.S.C. 413(b)(1)), by striking ``by--'' and all that 
                follows through the end of that subparagraph and 
                inserting ``by the Secretary; and''; and
                  (B) by striking section 878 (6 U.S.C. 112).
          (3) Clerical amendment.--The table of contents in section 
        1(b) of such Act is amended by striking the item relating to 
        section 878.

SEC. 104. RESPONSIBILITIES AND FUNCTIONS OF CHIEF PRIVACY OFFICER.

  (a) In General.--Section 222 of the Homeland Security Act of 2002 (6 
U.S.C. 142) is amended--
          (1) in subsection (a)--
                  (A) in the matter preceding paragraph (1)--
                          (i) by inserting ``to be the Chief Privacy 
                        Officer of the Department,'' after ``in the 
                        Department,''; and
                          (ii) by striking ``to the Secretary, to 
                        assume'' and inserting ``to the Secretary. Such 
                        official shall have'';
                  (B) in paragraph (5), by striking ``and'' at the end;
                  (C) by striking paragraph (6); and
                  (D) by inserting after paragraph (5) the following 
                new paragraphs:
          ``(6) developing guidance to assist components of the 
        Department in developing privacy policies and practices;
          ``(7) establishing a mechanism to ensure such components are 
        in compliance with Federal, regulatory, statutory, and 
        Department privacy requirements, mandates, directives, and 
        policies;
          ``(8) working with the Chief Information Officer of the 
        Department to identify methods for managing and overseeing the 
        records, management policies, and procedures of the Department;
          ``(9) working with components and offices of the Department 
        to ensure that information sharing activities incorporate 
        privacy protections;
          ``(10) serving as the Chief FOIA Officer of the Department 
        for purposes of subsection (j) of section 552 of title 5, 
        United States Code (popularly known as the Freedom of 
        Information Act), to manage and process requests related to 
        such section;
          ``(11) developing guidance on procedures to be followed by 
        individuals making requests for information under section 552 
        of title 5, United States Code;
          ``(12) overseeing the management and processing of requests 
        for information under section 552 of title 5, United States 
        Code, within Department Headquarters and relevant Department 
        component offices;
          ``(13) identifying and eliminating unnecessary and 
        duplicative actions taken by the Department in the course of 
        processing requests for information under section 552 of title 
        5, United States Code;
          ``(14) preparing an annual report to Congress that includes--
                  ``(A) a description of the activities of the 
                Department that affect privacy during the fiscal year 
                covered by the report, including complaints of privacy 
                violations, implementation of section 552a of title 5, 
                United States Code (popularly known as the Privacy Act 
                of 1974), internal controls, and other matters; and
                  ``(B) the number of new technology programs 
                implemented in the Department during the fiscal year 
                covered by the report, the number of such programs that 
                the Chief Privacy Officer has evaluated to ensure that 
                privacy protections are considered and implemented, the 
                number of such programs that effectively implemented 
                privacy protections into new technology programs, and 
                an explanation of why any new programs did not 
                effectively implement privacy protections; and
          ``(15) carrying out such other responsibilities as the 
        Secretary determines are appropriate, consistent with this 
        section.''; and
          (2) by adding at the end the following new subsection:
  ``(f) Reassignment of Functions.--Notwithstanding subsection (a)(10), 
the Secretary may reassign the functions related to managing and 
processing requests for information under section 552 of title 5, 
United States Code, to another officer within the Department, 
consistent with requirements of that section.''.

SEC. 105. RESPONSIBILITIES OF CHIEF FINANCIAL OFFICER.

  Section 702 of the Homeland Security Act of 2002 (6 U.S.C. 342) is 
amended--
          (1) by redesignating subsections (b) and (c) as subsections 
        (c) and (d), respectively; and
          (2) by inserting after subsection (a) the following new 
        subsection (b):
  ``(b) Responsibilities.--The Chief Financial Officer, in consultation 
with the Under Secretary for Management and the Under Secretary for 
Intelligence and Analysis, as appropriate, shall--
          ``(1) oversee Department budget formulation and execution;
          ``(2) lead and provide guidance on performance-based 
        budgeting practices for the Department to ensure that the 
        Department and its components are meeting missions and goals;
          ``(3) lead cost-estimating practices for the Department, 
        including the development of policies on cost estimating and 
        approval of life cycle cost estimates;
          ``(4) coordinate with the Office of Strategy, Policy, and 
        Plans to ensure that the development of the budget for the 
        Department is compatible with the long-term strategic plans, 
        priorities, and policies of the Secretary;
          ``(5) develop financial management policy for the Department 
        and oversee the implementation of such policy, including the 
        establishment of effective internal controls over financial 
        reporting systems and processes throughout the Department;
          ``(6) provide guidance for and over financial system 
        modernization efforts throughout the Department;
          ``(7) lead the efforts of the Department related to financial 
        oversight, including identifying ways to streamline and 
        standardize business processes;
          ``(8) oversee the costs of acquisition programs and related 
        activities to ensure that actual and planned costs are in 
        accordance with budget estimates and are affordable, or can be 
        adequately funded, over the lifecycle of such programs and 
        activities;
          ``(9) fully implement a common accounting structure to be 
        used across the entire Department by fiscal year 2020; and
          ``(10) track, approve, oversee, and make public information 
        on expenditures by components of the Department for 
        conferences, as appropriate, including by requiring each 
        component to--
                  ``(A) report to the Inspector General of the 
                Department the expenditures by such component for each 
                conference hosted or attended by Department employees 
                for which the total expenditures of the Department 
                exceed $20,000, within 15 days after the date of the 
                conference; and
                  ``(B) with respect to such expenditures, provide to 
                the Inspector General--
                          ``(i) the information described in 
                        subsections (a), (b), and (c) of section 739 of 
                        title VII of division E of the Consolidated and 
                        Further Continuing Appropriations Act, 2015 
                        (Public Law 113-235); and
                          ``(ii) documentation of such expenditures.''.

SEC. 106. CHIEF INFORMATION OFFICER.

  (a) In General.--Section 703 of the Homeland Security Act of 2002 (6 
U.S.C. 343) is amended--
          (1) in subsection (a), by adding at the end the following new 
        sentence: ``In addition to the functions under section 
        3506(a)(2) of title 44, United States Code, the Chief 
        Information Officer shall perform the functions set forth in 
        this section and such other functions as may be assigned by the 
        Secretary.'';
          (2) by redesignating subsection (b) as subsection (d); and
          (3) by inserting after subsection (a) the following new 
        subsections:
  ``(b) Responsibilities.--In addition to performing the functions 
under section 3506 of title 44, United States Code, the Chief 
Information Officer shall serve as the lead technical authority for 
information technology programs of the Department and Department 
components and, in consultation with the Under Secretary for 
Management, shall--
          ``(1) advise and assist the Secretary, heads of the 
        components of the Department, and other senior officers in 
        carrying out the responsibilities of the Department for all 
        activities relating to the budgets, programs, security, and 
        operations of the information technology functions of the 
        Department;
          ``(2) to the extent delegated by the Secretary, exercise 
        leadership and authority over Department information technology 
        management and establish the information technology priorities, 
        policies, processes, standards, guidelines, and procedures of 
        the Department to ensure interoperability and standardization 
        of information technology;
          ``(3) maintain a consolidated inventory of the mission 
        critical and mission essential information systems of the 
        Department, and develop and maintain contingency plans for 
        responding to a disruption in the operation of any of those 
        information systems;
          ``(4) maintain the security, visibility, reliability, 
        integrity, and availability of data and information technology 
        of the Department;
          ``(5) establish and implement policies and procedures to 
        effectively monitor and manage vulnerabilities in the supply 
        chain for purchases of information technology, in consultation 
        with the Chief Procurement Officer of the Department;
          ``(6) review contracts and interagency agreements associated 
        with major information technology investments and information 
        technology investments that have had cost, schedule, or 
        performance challenges in the past;
          ``(7) assess the risk of all major information technology 
        investments and publically report the risk rating to the Office 
        of Management and Budget; and
          ``(8) carry out any other responsibilities delegated by the 
        Secretary consistent with an effective information system 
        management function.
  ``(c) Strategic Plans.--In coordination with the Chief Financial 
Officer, the Chief Information Officer shall develop an information 
technology strategic plan every five years and report to the Committee 
on Homeland Security and the Committee on Appropriations of the House 
of Representatives and the Committee on Homeland Security and 
Governmental Affairs and the Committee on Appropriations of the Senate 
on the extent to which--
          ``(1) the budget of the Department aligns with priorities 
        specified in the information technology strategic plan;
          ``(2) the information technology strategic plan informs the 
        budget process of the Department;
          ``(3) information technology priorities were or were not 
        funded and the reasons for not funding all priorities in a 
        given fiscal year;
          ``(4) the Department has identified and addressed skills gaps 
        needed to implement the information technology strategic plan; 
        and
          ``(5) unnecessary duplicate information technology within and 
        across the components of the Department has been eliminated.''.
  (b) Software Licensing.--
          (1) Software inventory.--Not later than 180 days after the 
        date of the enactment of this Act and every two years 
        thereafter until 2022, the Chief Information Officer of the 
        Department of Homeland Security, in consultation with 
        Department component chief information officers, shall--
                  (A) conduct a Department-wide inventory of all 
                existing software licenses held by the Department, 
                including utilized and unutilized licenses;
                  (B) assess the needs of the Department and the 
                components of the Department for software licenses for 
                the subsequent two fiscal years;
                  (C) examine how the Department can achieve the 
                greatest possible economies of scale and cost savings 
                in the procurement of software licenses;
                  (D) determine how the use of shared cloud-computing 
                services will impact the needs for software licenses 
                for the subsequent two fiscal years;
                  (E) establish plans and estimated costs for 
                eliminating unutilized software licenses for the 
                subsequent two fiscal years; and
                  (F) submit a copy of each inventory conducted under 
                subparagraph (A) to the Committee on Homeland Security 
                of the House of Representatives and the Committee on 
                Homeland Security and Governmental Affairs of the 
                Senate.
          (2) Plan to reduce software licenses.--If the Chief 
        Information Officer determines through the inventory conducted 
        under paragraph (1) that the number of software licenses held 
        by the Department and the components of the Department exceed 
        the needs of the Department, not later than 90 days after the 
        date on which the inventory is completed, the Secretary of 
        Homeland Security shall establish a plan for reducing the 
        number of such software licenses to meet needs of the 
        Department.
          (3) Prohibition on procurement of new software licenses.--
                  (A) In general.--Except as provided in subparagraph 
                (B), upon completion of a plan under paragraph (2), no 
                additional resources may be obligated for the 
                procurement of new software licenses for the Department 
                until such time as the need of the Department exceeds 
                the number of used and unused licenses held by the 
                Department.
                  (B) Exception.--The Chief Information Officer may 
                authorize the purchase of additional licenses and amend 
                the number of needed licenses as necessary.
  (c) Comptroller General Review.--Not later than fiscal year 2019, the 
Comptroller General of the United States shall review the extent to 
which the Chief Information Officer fulfilled all requirements 
established in this section and the amendment made by this section.
  (d) Completion of First Definition of Capabilities.--Not later than 
one year after the date of the enactment of this Act, the Chief 
Information Officer shall complete the first information technology 
strategic plan required under subsection (c) of section 701 of the 
Homeland Security Act of 2002, as added by subsection (a) of this 
section.

SEC. 107. QUADRENNIAL HOMELAND SECURITY REVIEW.

  (a) In General.--Section 707 of the Homeland Security Act of 2002 (6 
U.S.C. 347) is amended--
          (1) in subsection (a)(3)--
                  (A) in subparagraph (B), by striking ``and'' at the 
                end;
                  (B) by redesignating subparagraph (C) as subparagraph 
                (D); and
                  (C) by inserting after subparagraph (B) the following 
                new subparagraph (C):
                  ``(C) representatives from appropriate advisory 
                committees established pursuant to section 871, 
                including the Homeland Security Advisory Council and 
                the Homeland Security Science and Technology Advisory 
                Committee, or otherwise established, including the 
                Aviation Security Advisory Committee established 
                pursuant to section 44946 of title 49, United States 
                Code; and'';
          (2) in subsection (b)--
                  (A) in paragraph (2), by inserting before the 
                semicolon at the end the following: ``based on the risk 
                assessment required pursuant to subsection (c)(2)(B)'';
                  (B) in paragraph (3)--
                          (i) by inserting ``, to the extent 
                        practicable,'' after ``describe''; and
                          (ii) by striking ``budget plan'' and 
                        inserting ``resources required'';
                  (C) in paragraph (4)--
                          (i) by inserting ``, to the extent 
                        practicable,'' after ``identify'';
                          (ii) by striking ``budget plan required to 
                        provide sufficient resources to successfully'' 
                        and inserting ``resources required to''; and
                          (iii) by striking the semicolon at the end 
                        and inserting ``, including any resources 
                        identified from redundant, wasteful, or 
                        unnecessary capabilities and capacities that 
                        can be redirected to better support other 
                        existing capabilities and capacities, as the 
                        case may be; and'';
                  (D) in paragraph (5), by striking ``; and'' and 
                inserting a period; and
                  (E) by striking paragraph (6);
          (3) in subsection (c)--
                  (A) in paragraph (1), by striking ``December 31 of 
                the year'' and inserting ``60 days after the date of 
                the submittal of the President's budget for the fiscal 
                year after the fiscal year'';
                  (B) in paragraph (2)--
                          (i) in subparagraph (B), by striking 
                        ``description of the threats to'' and inserting 
                        ``risk assessment of'';
                          (ii) in subparagraph (C), by inserting ``, as 
                        required under subsection (b)(2)'' before the 
                        semicolon at the end;
                          (iii) in subparagraph (D)--
                                  (I) by inserting ``to the extent 
                                practicable,'' before ``a 
                                description''; and
                                  (II) by striking ``budget plan'' and 
                                inserting ``resources required'';
                          (iv) in subparagraph (F)--
                                  (I) by inserting ``to the extent 
                                practicable,'' before ``a discussion''; 
                                and
                                  (II) by striking ``the status of'';
                          (v) in subparagraph (G)--
                                  (I) by inserting ``to the extent 
                                practicable,'' before ``a discussion'';
                                  (II) by striking ``the status of'';
                                  (III) by inserting ``and risks'' 
                                before ``to national homeland''; and
                                  (IV) by inserting ``and'' after the 
                                semicolon at the end;
                          (vi) by striking subparagraph (H); and
                          (vii) by redesignating subparagraph (I) as 
                        subparagraph (H);
                  (C) by redesignating paragraph (3) as paragraph (4); 
                and
                  (D) by inserting after paragraph (2) the following 
                new paragraph (3):
          ``(3) Documentation.--The Secretary shall retain and, upon 
        request, provide to Congress the following documentation 
        regarding the quadrennial homeland security review:
                  ``(A) Records regarding the consultation carried out 
                the pursuant to subsection (a)(3), including--
                          ``(i) all written communications, including 
                        communications sent out by the Secretary and 
                        feedback submitted to the Secretary through 
                        technology, online communications tools, in-
                        person discussions, and the interagency 
                        process; and
                          ``(ii) information on how feedback received 
                        by the Secretary informed the quadrennial 
                        homeland security review.
                  ``(B) Information regarding the risk assessment, as 
                required under subsection (c)(2)(B), including--
                          ``(i) the risk model utilized to generate the 
                        risk assessment;
                          ``(ii) information, including data used in 
                        the risk model, utilized to generate the risk 
                        assessment;
                          ``(iii) sources of information, including 
                        other risk assessments, utilized to generate 
                        the risk assessment; and
                          ``(iv) information on assumptions, weighing 
                        factors, and subjective judgments utilized to 
                        generate the risk assessment, together with 
                        information on the rationale or basis 
                        thereof.''; and
          (4) by redesignating subsection (d) as subsection (e); and
          (5) by inserting after subsection (c) the following new 
        subsection (d):
  ``(d) Review.--Not later than 90 days after the submission of each 
report required under subsection (c)(1), the Secretary shall provide to 
the Committee on Homeland Security of the House of Representatives and 
the Committee on Homeland Security and Governmental Affairs of the 
Senate information on the degree to which the findings and 
recommendations developed in the quadrennial homeland security review 
covered by the report were integrated into the acquisition strategy and 
expenditure plans for the Department.''.
  (b) Effective Date.--The amendments made by this section shall apply 
with respect to a quadrennial homeland security review conducted after 
December 31, 2017.

SEC. 108. OFFICE OF STRATEGY, POLICY, AND PLANS.

  (a) In General.--Section 709 of the Homeland Security Act of 2002 (6 
U.S.C. 349) is amended--
          (1) in subsection (a), by adding at the end the following: 
        ``The Office of Strategy, Policy, and Plans shall include the 
        following components:
          ``(1) The Office of Partnership and Engagement.
          ``(2) The Office of International Affairs.
          ``(3) The Office of Cyber, Infrastructure, and Resilience 
        Policy.
          ``(4) The Office of Strategy, Planning, Analysis, and Risk.
          ``(5) The Office of Threat Prevention and Security Policy.
          ``(6) The Office of Border, Immigration, and Trade Policy.'';
          (2) by redesignating subsections (e) through (g) as 
        subsections (f) through (h), respectively; and
          (3) by inserting after subsection (d) the following new 
        subsection (e):
  ``(e) Assistant Secretaries and Directors.--
          ``(1) Assistant secretary for partnership and engagement.--
        The Office of Partnership and Engagement shall be led by an 
        Assistant Secretary for Partnership and Engagement appointed by 
        the Secretary. The Assistant Secretary shall--
                  ``(A) lead the efforts of the Department to 
                incorporate external feedback from stakeholders into 
                policy and strategic planning efforts, as appropriate, 
                in consultation with the Office for Civil Rights and 
                Civil Liberties;
                  ``(B) conduct the activities specified in section 
                2006(b);
                  ``(C) advise the Secretary on the effects of the 
                policies, regulations, processes, and actions of the 
                Department on the private sector and create and foster 
                strategic communications with the private sector to 
                enhance the primary mission of the Department to 
                protect the homeland;
                  ``(D) coordinate the activities of the Department 
                relating to State and local government;
                  ``(E) provide State and local governments with 
                regular information, research, and technical support to 
                assist local efforts at securing the homeland; and
                  ``(F) perform such other functions as are established 
                by law or delegated by the Under Secretary for Policy.
          ``(2) Assistant secretary for international affairs.--The 
        Office of International Affairs shall be led by an Assistant 
        Secretary for International Affairs appointed by the Secretary. 
        The Assistant Secretary shall--
                  ``(A) coordinate international activities within the 
                Department, including activities carried out by the 
                components of the Department, in consultation with 
                other Federal officials with responsibility for 
                counterterrorism and homeland security matters;
                  ``(B) advise, inform, and assist the Secretary with 
                respect to the development and implementation of the 
                policy priorities of the Department, including 
                strategic priorities for the deployment of assets, 
                including personnel, outside the United States;
                  ``(C) develop, in consultation with the Under 
                Secretary for Management, guidance for selecting, 
                assigning, training, and monitoring overseas 
                deployments of Department personnel, including minimum 
                standards for pre-deployment training;
                  ``(D) maintain awareness regarding the international 
                travel of senior officers of the Department and their 
                intent to pursue negotiations with foreign government 
                officials, and review resulting draft agreements; and
                  ``(E) perform such other functions as are established 
                by law or delegated by the Under Secretary for 
                Policy.''.
  (b) Abolishment of Office of International Affairs.--
          (1) In general.--The Office of International Affairs within 
        the Office of the Secretary of Homeland Security is abolished.
          (2) Transfer of assets and personnel.--The functions 
        authorized to be performed by such office as of the day before 
        the date of the enactment of this Act, and the assets and 
        personnel associated with such functions, are transferred to 
        the head of the Office of International Affairs provided for by 
        section 709 of the Homeland Security Act of 2002, as amended by 
        this section.
          (3) Conforming amendment.--The Homeland Security Act of 2002 
        is amended by striking section 879 (6 U.S.C. 459).
          (4) Clerical amendment.--The table of contents in section 
        1(b) of such Act is amended by striking the item relating to 
        section 879.
  (c) Transfer of Functions, Assets, and Personnel of Office for State 
and Local Law Enforcement.--The functions authorized to be performed by 
the Office for State and Local Law Enforcement of the Department of 
Homeland Security as of the day before the date of the enactment of 
this Act, and the assets and personnel associated with such functions, 
are transferred to the head of the Office of Partnership and Engagement 
provided for by section 709 of the Homeland Security Act of 2002, as 
amended by this section.
  (d) Abolishment of Office for State and Local Government 
Coordination.--
          (1) In general.--The Office for State and Local Government 
        Coordination of the Department of Homeland Security is 
        abolished.
          (2) Transfer of functions and assets.--The functions 
        authorized to be performed by such office immediately before 
        the enactment of this Act, and the assets and personnel 
        associated with such functions, are transferred to the head of 
        Office of Partnership and Engagement provided for by section 
        709 of the Homeland Security Act of 2002, as amended by this 
        section.
          (3) Conforming amendment.--The Homeland Security Act of 2002 
        is amended by striking section 801 (6 U.S.C. 631).
          (4) Clerical amendment.--The table of contents in section 
        1(b) of such Act is amended by striking the item relating to 
        section 801.
  (e) Abolishment of Special Assistant to Secretary of Homeland 
Security.--
          (1) In general.--The Special Assistant to the Secretary 
        authorized by section 102(f) of the Homeland Security Act of 
        2002 (6 U.S.C. 112(f)), as in effect immediately before the 
        enactment of this Act, is abolished.
          (2) Transfer of functions and assets.--The functions 
        authorized to be performed by such Special Assistant to the 
        Secretary immediately before the enactment of this Act, and the 
        assets and personnel associated with such functions, are 
        transferred to the head of the Office of Partnership and 
        Engagement provided for by section 709 of the Homeland Security 
        Act of 2002, as amended by this section.
          (3) Conforming amendment.--Section 102 of the Homeland 
        Security Act of 2002 (6 U.S.C. 112) is amended by striking 
        subsection (f).
  (f) Conforming Amendments Relating to Assistant Secretaries.--
Subsection (a) of section 103 of the Homeland Security Act of 2002 (6 
U.S.C. 113) is amended--
          (1) in the subsection heading, by inserting ``; Assistant 
        Secretaries'' after ``Under Secretaries'';
          (2) in paragraph (1), by striking subparagraph (I) and 
        redesignating subparagraphs (J) and (K) as subparagraphs (I) 
        and (J), respectively; and
          (3) by amending paragraph (2) to read as follows:
          ``(2) Assistant secretaries and other officials.--
                  ``(A) Advice and consent appointments.--The 
                Department shall have the following officials appointed 
                by the President, by and with the advice and consent of 
                the Senate:
                          ``(i) The Assistant Secretary, U.S. 
                        Immigration and Customs Enforcement.
                          ``(ii) The Administrator, Transportation 
                        Security Administration.
                  ``(B) Other presidential appointments.--The 
                Department shall have the following Assistant 
                Secretaries appointed by the President:
                          ``(i) The Assistant Secretary, Infrastructure 
                        Protection.
                          ``(ii) The Assistant Secretary, Office of 
                        Public Affairs.
                          ``(iii) The Assistant Secretary, Office of 
                        Legislative Affairs.
                  ``(C) Secretarial appointments.--The Department shall 
                have the following Assistant Secretaries appointed by 
                the Secretary:
                          ``(i) The Assistant Secretary, Office of 
                        Cybersecurity and Communications.
                          ``(ii) The Assistant Secretary for 
                        International Affairs.
                          ``(iii) The Assistant Secretary for 
                        Partnership and Engagement.
                          ``(iv) The Assistant Secretary for Threat 
                        Prevention and Security Policy.
                          ``(v) The Assistant Secretary for Border, 
                        Immigration, and Trade Policy.
                          ``(vi) The Assistant Secretary for Cyber, 
                        Infrastructure, and Resilience Policy.
                          ``(vii) The Assistant Secretary for Strategy, 
                        Planning, Analysis, and Risk.
                          ``(viii) The Assistant Secretary for State 
                        and Local Law Enforcement.''; and
          (4) by adding at the end the following new paragraphs:
          ``(3) Assistant secretary, legislative affairs.--The 
        Assistant Secretary, Legislative Affairs shall oversee one 
        internal reporting structure for engaging with authorizing and 
        appropriating congressional committees.
          ``(4) Limitation on creation of positions.--No Assistant 
        Secretary position may be created in addition to the positions 
        provided for by this section unless such position is authorized 
        by a statute enacted after the date of the enactment of the 
        Department of Homeland Security Authorization Act of 2017.''.
  (g) Homeland Security Advisory Council.--Subsection (b) of section 
102 of the Homeland Security Act of 2002 (6 U.S.C. 112) is amended--
          (1) in paragraph (2), by striking ``and'' at the end;
          (2) in paragraph (3), by striking the period at the end and 
        inserting ``; and''; and
          (3) by adding at the end the following new paragraph:
          ``(4) shall establish a Homeland Security Advisory Council to 
        provide advice and recommendations on homeland security-related 
        matters, including advice with respect to the preparation of 
        the Quadrennial Homeland Security Review.''.
  (h) Prohibition on New Offices.--No new office may be created to 
perform functions transferred by this section, other than as provided 
in section 709 of the Homeland Security Act of 2002, as amended by this 
Act.
  (i) Definitions.--In this section each of the terms ``functions'', 
``assets'', and ``personnel'' has the meaning given each such term 
under section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101).
  (j) Duplication Review.--
          (1) Review required.--Not later than one year after the date 
        of the enactment of this Act, the Secretary of Homeland 
        Security shall complete a review of the functions and 
        responsibilities of each Department of Homeland Security 
        component responsible for international affairs to identify and 
        eliminate areas of unnecessary duplication.
          (2) Submittal to congress.--Not later than 30 days after the 
        completion of the review required under paragraph (1), the 
        Secretary shall provide the results of the review to the 
        Committee on Homeland Security of the House of Representatives 
        and the Committee on Homeland Security and Governmental Affairs 
        of the Senate.
          (3) Action plan.--Not later than one year after the date of 
        the enactment of this Act, the Secretary shall submit to the 
        congressional homeland security committees an action plan, 
        including corrective steps and an estimated date of completion, 
        to address areas of duplication, fragmentation, and overlap and 
        opportunities for cost savings and revenue enhancement, as 
        identified by the Government Accountability Office based on the 
        annual report of the Government Accountability Office entitled 
        ``Additional Opportunities to Reduce Fragmentation, Overlap, 
        and Duplication and Achieve Other Financial Benefits''.

SEC. 109. CHIEF PROCUREMENT OFFICER.

  (a) In General.--Title VII of the Homeland Security Act of 2002 (6 
U.S.C. 341 et seq.) is amended by adding at the end the following new 
section:

``SEC. 710. CHIEF PROCUREMENT OFFICER.

  ``(a) In General.--There is in the Department a Chief Procurement 
Officer, who shall serve as a senior business advisor to agency 
officials on procurement-related matters and report directly to the 
Under Secretary for Management. The Chief Procurement Officer is the 
senior procurement executive for purposes of subsection (c) of section 
1702 of title 41, United States Code, and shall perform procurement 
functions as specified in such subsection.
  ``(b) Responsibilities.--The Chief Procurement Officer shall--
          ``(1) delegate or retain contracting authority, as 
        appropriate;
          ``(2) issue procurement policies and oversee the heads of 
        contracting activity of the Department to ensure compliance 
        with those policies;
          ``(3) serve as the main liaison of the Department to industry 
        on procurement-related issues;
          ``(4) account for the integrity, performance, and oversight 
        of Department procurement and contracting functions;
          ``(5) ensure that procurement contracting strategies and 
        plans are consistent with the intent and direction of the 
        Acquisition Review Board;
          ``(6) oversee a centralized acquisition workforce 
        certification and training program using, as appropriate, 
        existing best practices and acquisition training opportunities 
        from the Federal Government, private sector, or universities 
        and colleges to include training on how best to identify 
        actions that warrant referrals for suspension or debarment;
          ``(7) provide input on the periodic performance reviews of 
        each head of contracting activity of the Department;
          ``(8) collect baseline data and use such data to establish 
        performance measures on the impact of strategic sourcing 
        initiatives on the private sector, including small businesses;
          ``(9) establish and implement policies and procedures to 
        effectively monitor and manage vulnerabilities in the supply 
        chain for all Department purchases;
          ``(10) ensure that a fair proportion of the value of Federal 
        contracts and subcontracts are awarded to small businesses (in 
        accordance with the procurement contract goals under section 
        15(g) of the Small Business Act (15 U.S.C. 644(g)), maximize 
        opportunities for small business participation in such 
        contracts, and ensure, to the extent practicable, small 
        businesses that achieve qualified vendor status for security-
        related technologies are provided an opportunity to compete for 
        contracts for such technology;
          ``(11) conduct oversight of implementation of administrative 
        agreements to resolve suspension or debarment proceedings and, 
        upon request, provide information to the Committee on Homeland 
        Security of the House of Representatives and the Committee on 
        Homeland Security and Governmental Affairs of the Senate about 
        the effectiveness of such agreements at improving contractor 
        responsibility; and
          ``(12) carry out any other procurement duties that the Under 
        Secretary for Management may designate.
  ``(c) Head of Contracting Activity Defined.--In this section the term 
`head of contracting activity' means an official responsible for the 
creation, management, and oversight of a team of procurement 
professionals properly trained, certified, and warranted to accomplish 
the acquisition of products and services on behalf of the designated 
components, offices, and organizations of the Department, and as 
authorized, other government entities.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is amended by inserting after the item relating to section 709 
the following new item:

``Sec. 710. Chief Procurement Officer.''.

SEC. 110. CHIEF SECURITY OFFICER.

  (a) In General.--Title VII of the Homeland Security Act of 2002 (6 
U.S.C. 341 et seq.) is further amended by inserting after the item 
relating to section 710, as added by this Act, the following new 
section:

``SEC. 711. CHIEF SECURITY OFFICER.

  ``(a) In General.--There is in the Department a Chief Security 
Officer, who shall report directly to the Under Secretary for 
Management.
  ``(b) Responsibilities.--The Chief Security Officer shall--
          ``(1) develop and implement the security policies, programs, 
        and standards of the Department;
          ``(2) identify training and provide education to Department 
        personnel on security-related matters; and
          ``(3) provide support to Department components on security-
        related matters.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is further amended by inserting after the item relating to 
section 710, as added by this Act, the following new item:

``Sec. 711. Chief Security Officer.''.

SEC. 111. OFFICE OF INSPECTOR GENERAL.

  (a) Sense of Congress.--
          (1) Findings.--Congress finds the following:
                  (A) The Inspector General Act of 1978 mandates that 
                Inspectors General are to conduct audits and 
                investigations relating to the programs and operations 
                of Federal departments to promote economy, efficiency, 
                and effectiveness in the administration of programs and 
                operations, and to prevent and detect fraud and abuse 
                in such programs and operations.
                  (B) The Inspector General Act of 1978 mandates that 
                Inspectors General are to provide a means for keeping 
                Federal departments and the Congress fully and 
                currently informed about problems and deficiencies 
                relating to the administration of such programs and 
                operations and the necessity for and progress of 
                corrective action.
                  (C) The Office of the Inspector General of the 
                Department of Homeland Security detects, investigates, 
                and prevents instances of waste, fraud, abuse, and 
                mismanagement within the Department, and offers 
                solutions for response.
                  (D) The Office of the Inspector General of the 
                Department of Homeland Security consistently produces 
                high-value, high-impact work that enhances the security 
                and safety of the homeland.
                  (E) The Inspector General of the Department of 
                Homeland Security provides the leadership and 
                accountability within the Office of the Inspector 
                General to oversee a cabinet-level agency.
                  (F) The Inspector General of the Department of 
                Homeland Security stands as a leader within the 
                Inspector General community through consistent 
                exemplary service.
                  (G) The Office of Inspector General of the Department 
                of Homeland Security offers the Federal Government and 
                American taxpayers an impressive return on investment, 
                measured in dollars spent versus dollars saved.
                  (H) The Office of the Inspector General of the 
                Department of Homeland Security enhances the 
                Department's ability to effectively and efficiently 
                administer laws.
          (2) Sense of congress.--It is the sense of Congress that the 
        Inspector General of the Department of Homeland Security plays 
        a vital role in fulfilling the Department's daily missions.
  (b) Notification.--The heads of offices and components of the 
Department of Homeland Security shall promptly advise the Inspector 
General of the Department of all allegations of misconduct with respect 
to which the Inspector General has investigative authority under the 
Inspector General Act of 1978. The Inspector General may waive the 
notification requirement under this subsection with respect to any 
category or subset of allegations of misconduct.
  (c) Rule of Construction.--Nothing in this section may be construed 
as affecting the authority of the Secretary of Homeland Security under 
subsection (a) of section 8I of the Inspector General Act of 1978 (5 
U.S.C. App. 8I).

SEC. 112. OFFICE FOR CIVIL RIGHTS AND CIVIL LIBERTIES.

  (a) In General.--Section 705 of the Homeland Security Act of 2002 (6 
U.S.C. 345) is amended--
          (1) in the section heading, by striking ``establishment of 
        officer for'';
          (2) by redesignating subsection (b) as subsection (c); and
          (3) by inserting after subsection (a) the following new 
        subsection:
  ``(b) Office for Civil Rights and Civil Liberties.--There is in the 
Department an Office for Civil Rights and Civil Liberties. Under the 
direction of the Officer for Civil Rights and Civil Liberties, the 
Office shall support the Officer in the following:
          ``(1) Integrating civil rights and civil liberties into 
        activities of the Department by conducting programs and 
        providing policy advice and other technical assistance.
          ``(2) Investigating allegations of violations of civil rights 
        and civil liberties from the public.
          ``(3) Carrying out the Department's equal employment 
        opportunity and diversity policies and programs, including 
        complaint management and adjudication.
          ``(4) Communicating with individuals and communities whose 
        civil rights and civil liberties may be affected by Department 
        activities.
          ``(5) Any other activities as assigned by the Officer.''.
  (b) Authorization of Appropriations.--There is authorized to be 
appropriated $22,571,000 for each of fiscal years 2018 and 2019 to 
carry out section 705 of the Homeland Security Act of 2002, as amended 
by subsection (a) of this section.

SEC. 113. DEPARTMENT OF HOMELAND SECURITY ROTATION PROGRAM.

  (a) Enhancements to the Rotation Program.--Section 844 of the 
Homeland Security Act of 2002 (6) U.S.C. 414) is amended--
          (1) by striking ``(a) Establishment.--'';
          (2) by redesignating paragraphs (1) through (5) as 
        subsections (a) through (e), respectively, and adjusting the 
        margins accordingly;
          (3) in subsection (a), as so redesignated--
                  (A) by striking ``Not later than 180 days after the 
                date of enactment of this section, the'' and inserting 
                ``The''; and
                  (B) by striking ``for employees of the Department'' 
                and inserting ``for certain personnel within the 
                Department'';
          (4) in subsection (b), as so redesignated--
                  (A) by redesignating subparagraphs (A) through (G) as 
                paragraphs (3) through (9), respectively, and adjusting 
                the margins accordingly;
                  (B) by inserting before paragraph (3), as so 
                redesignated, the following new paragraphs:
          ``(1) seek to foster greater departmental integration and 
        unity of effort;
          ``(2) seek to help enhance the knowledge, skills, and 
        abilities of participating personnel with respect to the 
        programs, policies, and activities of the Department;'';
                  (C) in paragraph (4), as so redesignated, by striking 
                ``middle and senior level''; and
                  (D) in paragraph (7), as so redesignated, by 
                inserting before ``invigorate'' the following: ``seek 
                to improve morale and retention throughout the 
                Department and'';
          (5) in subsection (c), as redesignated by paragraph (2)--
                  (A) by redesignating subparagraphs (A) and (B) as 
                paragraphs (1) and (2), respectively, and adjusting the 
                margins accordingly; and
                  (B) in paragraph (2), as so redesignated--
                          (i) by striking clause (iii); and
                          (ii) by redesignating clauses (i), (ii), and 
                        (iv) through (viii) as subparagraphs (A) 
                        through (G), respectively, and adjusting the 
                        margins accordingly;
          (6) by redesignating subsections (d) and (e), as redesignated 
        by paragraph (2), as subsections (e) and (f), respectively;
          (7) by inserting after subsection (c) the following new 
        subsection:
  ``(d) Administrative Matters.--In carrying out the Rotation Program 
the Secretary shall--
          ``(1) before selecting employees for participation in the 
        Rotation Program, disseminate information broadly within the 
        Department about the availability of the Rotation Program, 
        qualifications for participation in the Rotation Program, 
        including full-time employment within the employing component 
        or office not less than one year, and the general provisions of 
        the Rotation Program;
          ``(2) require as a condition of participation in the Rotation 
        Program that an employee--
                  ``(A) is nominated by the head of the component or 
                office employing the employee; and
                  ``(B) is selected by the Secretary, or the 
                Secretary's designee, solely on the basis of relative 
                ability, knowledge, and skills, after fair and open 
                competition that assures that all candidates receive 
                equal opportunity;
          ``(3) ensure that each employee participating in the Rotation 
        Program shall be entitled to return, within a reasonable period 
        of time after the end of the period of participation, to the 
        position held by the employee, or a corresponding or higher 
        position, in the component or office that employed the employee 
        prior to the participation of the employee in the Rotation 
        Program;
          ``(4) require that the rights that would be available to the 
        employee if the employee were detailed from the employing 
        component or office to another Federal agency or office remain 
        available to the employee during the employee participation in 
        the Rotation Program; and
          ``(5) require that, during the period of participation by an 
        employee in the Rotation Program, performance evaluations for 
        the employee--
                  ``(A) shall be conducted by officials in the office 
                or component employing the employee with input from the 
                supervisors of the employee at the component or office 
                in which the employee is placed during that period; and
                  ``(B) shall be provided the same weight with respect 
                to promotions and other rewards as performance 
                evaluations for service in the office or component 
                employing the employee.''; and
          (8) by adding at the end the following new subsection:
  ``(g) Intelligence Rotational Assignment Program.--
          ``(1) Establishment.--The Secretary shall establish an 
        Intelligence Rotational Assignment Program as part of the 
        Rotation Program under subsection (a).
          ``(2) Administration.--The Chief Human Capital Officer, in 
        conjunction with the Chief Intelligence Officer, shall 
        administer the Intelligence Rotational Assignment Program 
        established pursuant to paragraph (1).
          ``(3) Eligiblity.--The Intelligence Rotational Assignment 
        Program established pursuant to paragraph (1) shall be open to 
        employees serving in existing analyst positions within the 
        Department's Intelligence Enterprise and other Department 
        employees as determined appropriate by the Chief Human Capital 
        Officer and the Chief Intelligence Officer.
          ``(4) Coordination.--The responsibilities specified in 
        subsection (c)(2) that apply to the Rotation Program under such 
        subsection shall, as applicable, also apply to the Intelligence 
        Rotational Assignment Program under this subsection.''.
  (b) Congressional Notification and Oversight.--Not later than 120 
days after the date of the enactment of this Act, the Secretary of 
Homeland Security shall provide to the Committee on Homeland Security 
of the House of Representatives and the Committee on Homeland Security 
and Governmental Affairs of the Senate information about the status of 
the Homeland Security Rotation Program authorized by section 844 of the 
Homeland Security Act of 2002, as amended by subsection (a) of this 
section.

SEC. 114. FUTURE YEARS HOMELAND SECURITY PROGRAM.

  (a) In General.--Section 874 of the Homeland Security Act of 2002 (6 
U.S.C. 454) is amended--
          (1) in the section heading, by striking ``year'' and 
        inserting ``years'';
          (2) by striking subsection (a) and inserting the following:
  ``(a) In General.--Not later than 60 days after the date on which the 
budget of the President is submitted to Congress under section 1105(a) 
of title 31, United States Code, the Secretary shall submit to the 
Committee on Homeland Security and Governmental Affairs of the Senate 
and the Committee on Homeland Security of the House of Representatives 
(referred to in this section as the `appropriate committees') a Future 
Years Homeland Security Program that covers the fiscal year for which 
the budget is submitted and the 4 succeeding fiscal years.''; and
          (3) by striking subsection (c) and inserting the following 
        new subsections:
  ``(c) Projection of Acquisition Estimates.--On and after February 1, 
2018, each Future Years Homeland Security Program shall project--
          ``(1) acquisition estimates for the fiscal year for which the 
        budget is submitted and the four succeeding fiscal years, with 
        specified estimates for each fiscal year, for all major 
        acquisitions by the Department and each component of the 
        Department; and
          ``(2) estimated annual deployment schedules for all physical 
        asset major acquisitions over the five-fiscal-year period 
        described in paragraph (1) and the full operating capability 
        for all information technology major acquisitions.
  ``(d) Sensitive and Classified Information.--The Secretary may 
include with each Future Years Homeland Security Program a classified 
or other appropriately controlled document containing any information 
required to be submitted under this section that is restricted from 
public disclosure in accordance with Federal law or any Executive 
Order.
  ``(e) Availability of Information to the Public.--The Secretary shall 
make available to the public in electronic form the information 
required to be submitted to the appropriate committees under this 
section, other than information described in subsection (d).''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is further amended by striking the item relating to section 
874 and inserting the following new item:

``874. Future Years Homeland Security Program.''.

SEC. 115. FIELD EFFICIENCIES PLAN.

          (1) In general.--Not later than 270 days after the date of 
        the enactment of this Act, the Secretary of Homeland Security 
        shall submit to the Committee on Homeland Security and the 
        Committee on Transportation and Infrastructure of the House of 
        Representatives and Committee on Homeland Security and 
        Governmental Affairs of the Senate a field efficiencies plan 
        that--
                  (A) examines the facilities and administrative and 
                logistics functions of components of the Department of 
                Homeland Security located within designated geographic 
                areas; and
                  (B) provides specific recommendations and an 
                associated cost-benefit analysis for the consolidation 
                of the facilities and administrative and logistics 
                functions of components of the Department within each 
                designated geographic area.
          (2) Contents.--The field efficiencies plan submitted under 
        paragraph (1) shall include the following:
                  (A) An accounting of leases held by the Department or 
                its components that have expired in the current fiscal 
                year or will be expiring in the next fiscal year, that 
                have begun or been renewed in the current fiscal year, 
                or that the Department or its components plan to sign 
                or renew in the next fiscal year.
                  (B) For each designated geographic area--
                          (i) An evaluation of specific facilities at 
                        which components, or operational entities of 
                        components, of the Department may be closed or 
                        consolidated, including consideration of when 
                        leases expire or facilities owned by the 
                        government become available.
                          (ii) An evaluation of potential consolidation 
                        with facilities of other Federal, State, or 
                        local entities, including--
                                  (I) offices;
                                  (II) warehouses;
                                  (III) training centers;
                                  (IV) housing;
                                  (V) ports, shore facilities, and 
                                airfields;
                                  (VI) laboratories; and
                                  (VII) other assets as determined by 
                                the Secretary.
                          (iii) An evaluation of the potential for the 
                        consolidation of administrative and logistics 
                        functions, including--
                                  (I) facility maintenance;
                                  (II) fleet vehicle services;
                                  (III) mail handling and shipping and 
                                receiving;
                                  (IV) facility security;
                                  (V) procurement of goods and 
                                services;
                                  (VI) information technology and 
                                telecommunications services and 
                                support; and
                                  (VII) additional ways to improve 
                                unity of effort and cost savings for 
                                field operations and related support 
                                activities as determined by the 
                                Secretary.
                  (C) An implementation plan, including--
                          (i) near-term actions that can co-locate, 
                        consolidate, or dispose of property within 24 
                        months;
                          (ii) identifying long-term occupancy 
                        agreements or leases that cannot be changed 
                        without a significant cost to the Government; 
                        and
                          (iii) how the Department can ensure it has 
                        the capacity, in both personnel and funds, 
                        needed to cover up-front costs to achieve 
                        consolidation and efficiencies.
                  (D) An accounting of any consolidation of the real 
                estate footprint of the Department or any component of 
                the Department, including the co-location of personnel 
                from different components, offices, and agencies within 
                the Department.

SEC. 116. SUBMISSION TO CONGRESS OF INFORMATION REGARDING REPROGRAMMING 
                    OR TRANSFER OF DEPARTMENT OF HOMELAND SECURITY 
                    RESOURCES TO RESPOND TO OPERATIONAL SURGES.

  (a) In General.--Title VII of the Homeland Security Act of 2002 is 
further amended by adding at the end the following new section:

``SEC. 712. ANNUAL SUBMITTAL TO CONGRESS OF INFORMATION ON 
                    REPROGRAMMING OR TRANSFERS OF FUNDS TO RESPOND TO 
                    OPERATIONAL SURGES.

  ``For each fiscal year until fiscal year 2023, the Secretary of 
Homeland Security shall provide to the Committee on Homeland Security 
of the House of Representatives and the Committee on Homeland Security 
and Governmental Affairs of the Senate, together with the annual budget 
request for the Department, information on--
          ``(1) any circumstance during the year covered by the report 
        in which the Secretary exercised the authority to reprogram or 
        transfer funds to address unforeseen costs, including costs 
        associated with operational surges; and
          ``(2) any circumstance in which any limitation on the 
        transfer or reprogramming of funds affected the ability of the 
        Secretary to address such unforeseen costs.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is further amended by inserting after the item relating to 
section 711, as added by this Act, the following new item:

``712. Annual submittal to Congress of information on reprogramming or 
transfers of funds to respond to operational surges.''.

SEC. 117. REPORT TO CONGRESS ON COST SAVINGS AND EFFICIENCY.

  (a) In General.--Not later than two years after the date of the 
enactment of this Act, the Secretary of Homeland Security, acting 
through the Under Secretary of Homeland Security for Management, shall 
submit to the congressional homeland security committees a report that 
includes each of the following:
          (1) A detailed accounting of the management and 
        administrative expenditures and activities of each component of 
        the Department of Homeland Security and identifies potential 
        cost savings, avoidances, and efficiencies for those 
        expenditures and activities.
          (2) An examination of major physical assets of the 
        Department, as defined by the Secretary;
          (3) A review of the size, experience level, and geographic 
        distribution of the operational personnel of the Department.
          (4) Recommendations for adjustments in the management and 
        administration of the Department that would reduce deficiencies 
        in the capabilities of the Department, reduce costs, and 
        enhance efficiencies.
  (b) Form of Report.--The report required under subsection (a) shall 
be submitted in unclassified form but may include a classified annex.

SEC. 118. RESEARCH AND DEVELOPMENT AND CBRNE ORGANIZATIONAL REVIEW.

  (a) Department of Homeland Security Research and Development 
Activities.--
          (1) In general.--The Secretary of Homeland Security shall 
        assess the organization and management of the Department of 
        Homeland Security's research and development activities, and 
        shall develop and submit to the Committee on Homeland Security 
        and the Committee on Science, Space, and Technology of the 
        House of Representatives and the Committee on Homeland Security 
        and Governmental Affairs of the Senate, not later than six 
        months after the date of the enactment of this Act, a proposed 
        organizational structure for the management of such research 
        and development activities.
          (2) Organizational justification.--The proposed 
        organizational structure for the management of the Department 
        of Homeland Security's research and development activities 
        included in the assessment required under paragraph (1) shall 
        include the following:
                  (A) A discussion of the methodology for determining 
                such proposed organizational structure.
                  (B) A comprehensive inventory of research and 
                development activities of the Department, and the 
                proposed location of each activity under such proposed 
                organizational structure.
                  (C) Information relating to how such proposed 
                organizational structure will facilitate and promote 
                enhanced coordination and better collaboration between 
                the Under Secretary for Science and Technology of the 
                Department and the offices and components of the 
                Department, including a specific description of 
                operational challenges resulting from the current 
                organizational structure and a detailed explanation of 
                how the proposed organizational structure will address 
                such challenges.
                  (D) Information relating to how such proposed 
                organizational structure will support the development 
                of research and development priorities and capabilities 
                across the Department.
                  (E) A discussion of any resulting cost savings and 
                efficiencies from such proposed organizational 
                structure.
                  (F) Recommendations for any necessary statutory 
                changes, an explanation of why no statutory or 
                organizational changes are necessary, or a request for 
                additional time to complete the organizational 
                justification.
  (b) Department of Homeland Security Chemical, Biological, 
Radiological, Nuclear, and Explosives Activities.--
          (1) In general.--The Secretary of Homeland Security shall 
        assess the organization and management of the Department of 
        Homeland Security's chemical, biological, radiological, 
        nuclear, and explosives activities, and shall develop and 
        submit to the Committee on Homeland Security of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs of the Senate, not later than six months 
        after the date of the enactment of this Act, a proposed 
        organizational structure to ensure enhanced coordination and 
        provide strengthened chemical, biological, radiological, 
        nuclear, and explosives capabilities in support of homeland 
        security.
          (2) Organizational justification.--The proposed 
        organizational structure for the management of the Department 
        of Homeland Security's chemical, biological, radiological, 
        nuclear, and explosives activities included in the assessment 
        required under paragraph (1) shall include the following:
                  (A) A discussion of the methodology for determining 
                such proposed organizational structure.
                  (B) A comprehensive inventory of chemical, 
                biological, radiological, nuclear, and explosives 
                activities of the Department, and the proposed location 
                of each activity under such proposed organizational 
                structure.
                  (C) Information relating to how such proposed 
                organizational structure will enhance the development 
                of chemical, biological, radiological, nuclear, and 
                explosives priorities and capabilities across the 
                Department, including a specific description of 
                operational challenges resulting from the current 
                organizational structure and a detailed explanation of 
                how the proposed organizational structure will address 
                such challenges.
                  (D) A discussion of any resulting cost savings and 
                efficiencies from such proposed organizational 
                structure.
                  (E) Recommendations for any necessary statutory 
                changes, an explanation of why no statutory or 
                organizational changes are necessary, or a request for 
                additional time to complete the organizational 
                justification.
  (c) Review Required.--Not later than three months after the 
submission of the proposed organizational justifications required under 
subsections (a)(1) and (b)(1), the Comptroller General of the United 
States shall submit to the Committee on Homeland Security and the 
Committee on Science, Space, and Technology of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs of the Senate a review of the organizational justifications. 
The review shall consider how the proposed organizational realignment, 
or lack thereof, of research and development activities and chemical, 
biological, radiological, nuclear, and explosives activities will 
improve or impede the Department's ongoing efforts is such mission 
areas, including an assessment of--
          (1) any potential cost savings or additional costs incurred 
        as a result of any proposed organizational realignment;
          (2) an assessment of the comparison of benefits and costs of 
        the proposed organizational structure;
          (3) the extent to which the organizational justification 
        submitted pursuant to subsections (a)(1) and (b)(1) fully 
        assesses, documents, and addresses any potential problems that 
        could result from any proposed organizational realignment;
          (4) the extent to which the organizational justification 
        identifies specific deficiencies in operations resulting from 
        the existing organizational structure of the Department and an 
        explanation of how any proposed realignment will address such 
        deficiencies;
          (5) the extent to which the Department solicited and 
        incorporated the feedback of its workforce in the proposed 
        organizational structure; and
          (6) the extent to which the Department conducted and 
        incorporated stakeholder outreach in developing the proposed 
        organizational structure.

SEC. 119. ACTIVITIES RELATED TO CHILDREN.

  Paragraph (6) of subsection (c) of section 708 of the Homeland 
Security Act of 2002 (6 U.S.C. 349(c)), as redesignated by section 410 
of this Act, is amended by inserting ``, including feedback from 
organizations representing the needs of children,'' after ``stakeholder 
feedback''.

             Subtitle B--Human Resources and Other Matters

SEC. 121. CHIEF HUMAN CAPITAL OFFICER RESPONSIBILITIES.

  Section 704 of the Homeland Security Act of 2002 (6 U.S.C. 344) is 
amended--
          (1) in subsection (b)--
                  (A) in paragraph (1)--
                          (i) by inserting ``, including with respect 
                        to leader development and employee 
                        engagement,'' after ``policies'';
                          (ii) by striking ``and in line'' and 
                        inserting ``, in line''; and
                          (iii) by inserting ``and informed by best 
                        practices within the Federal government and the 
                        private sector,'' after ``priorities,'';
                  (B) in paragraph (2), by striking ``develop 
                performance measures to provide a basis for monitoring 
                and evaluating'' and inserting ``evaluate, on an 
                ongoing basis,'';
                  (C) in paragraph (3), by inserting ``that, to the 
                extent practicable, are informed by employee 
                feedback,'' after ``policies'';
                  (D) in paragraph (4), by inserting ``including leader 
                development and employee engagement programs,'' before 
                ``in coordination'';
                  (E) in paragraph (5), by inserting before the 
                semicolon at the end the following: ``that is informed 
                by an assessment, carried out by the Chief Human 
                Capital Officer, of the learning and developmental 
                needs of employees in supervisory and non-supervisory 
                roles across the Department and appropriate workforce 
                planning initiatives'';
                  (F) by redesignating paragraphs (9) and (10) as 
                paragraphs (11) and (12), respectively; and
                  (G) by inserting after paragraph (8) the following 
                new paragraphs:
          ``(9) maintain a catalogue of available employee development 
        opportunities, including the Homeland Security Rotation Program 
        pursuant to section 844, departmental leadership development 
        programs, interagency development programs, and other 
        rotational programs;
          ``(10) ensure that employee discipline and adverse action 
        programs comply with the requirements of all pertinent laws, 
        rules, regulations, and Federal guidance, and ensure due 
        process for employees;'';
          (2) by redesignating subsections (d) and (e) as subsections 
        (e) and (f), respectively;
          (3) by inserting after subsection (c) the following new 
        subsection:
  ``(d) Chief Learning and Engagement Officer.--The Chief Human Capital 
Officer may designate an employee of the Department to serve as a Chief 
Learning and Engagement Officer to assist the Chief Human Capital 
Officer in carrying out this section.''; and
          (4) in subsection (e), as so redesignated--
                  (A) by redesignating paragraphs (2), (3), and (4) as 
                paragraphs (5), (6), and (7), respectively; and
                  (B) by inserting after paragraph (1) the following 
                new paragraphs:
          ``(2) information on employee development opportunities 
        catalogued pursuant to paragraph (9) of subsection (b) and any 
        available data on participation rates, attrition rates, and 
        impacts on retention and employee satisfaction;
          ``(3) information on the progress of Department-wide 
        strategic workforce planning efforts as determined under 
        paragraph (2) of subsection (b);
          ``(4) information on the activities of the steering committee 
        established pursuant to section 710(a), including the number of 
        meeting, types of materials developed and distributed, and 
        recommendations made to the Secretary;''.

SEC. 122. EMPLOYEE ENGAGEMENT STEERING COMMITTEE AND ACTION PLAN.

  (a) In General.--Title VII of the Homeland Security Act of 2002 (6 
U.S.C. 341 et seq.) is amended by adding at the end the following new 
section:

``SEC. 714. EMPLOYEE ENGAGEMENT.

  ``(a) Steering Committee.--Not later than 120 days after the date of 
the enactment of this section, the Secretary shall establish an 
employee engagement steering committee, including representatives from 
operational components, headquarters, and field personnel, including 
supervisory and non-supervisory personnel, and employee labor 
organizations that represent Department employees, and chaired by the 
Under Secretary for Management, to carry out the following activities:
          ``(1) Identify factors that have a negative impact on 
        employee engagement, morale, and communications within the 
        Department, such as perceptions about limitations on career 
        progression, mobility, or development opportunities, collected 
        through employee feedback platforms, including through annual 
        employee surveys, questionnaires, and other communications, as 
        appropriate.
          ``(2) Identify, develop, and distribute initiatives and best 
        practices to improve employee engagement, morale, and 
        communications within the Department, including through annual 
        employee surveys, questionnaires, and other communications, as 
        appropriate.
          ``(3) Monitor efforts of each component to address employee 
        engagement, morale, and communications based on employee 
        feedback provided through annual employee surveys, 
        questionnaires, and other communications, as appropriate.
          ``(4) Advise the Secretary on efforts to improve employee 
        engagement, morale, and communications within specific 
        components and across the Department.
          ``(5) Conduct regular meetings and report, not less than once 
        per quarter, to the Under Secretary for Management, the head of 
        each component, and the Secretary on Department-wide efforts to 
        improve employee engagement, morale, and communications.
  ``(b) Action Plan; Reporting.--The Secretary, acting through the 
Chief Human Capital Officer, shall--
          ``(1) not later than 120 days after the date of the 
        establishment of the steering committee under subsection (a), 
        issue a Department-wide employee engagement action plan, 
        reflecting input from the employee engagement steering 
        committee established pursuant to subsection (a) and employee 
        feedback provided through annual employee surveys, 
        questionnaires, and other communications in accordance with 
        paragraph (1) of such subsection, to execute strategies to 
        improve employee engagement, morale, and communications within 
        the Department; and
          ``(2) require the head of each component to--
                  ``(A) develop and implement a component-specific 
                employee engagement plan to advance the action plan 
                required under paragraph (1) that includes performance 
                measures and objectives, is informed by employee 
                feedback provided through annual employee surveys, 
                questionnaires, and other communications, as 
                appropriate, and sets forth how employees and, where 
                applicable, their labor representatives are to be 
                integrated in developing programs and initiatives;
                  ``(B) monitor progress on implementation of such 
                action plan; and
                  ``(C) provide to the Chief Human Capital Officer and 
                the steering committee quarterly reports on actions 
                planned and progress made under this paragraph.
  ``(c) Termination.--This section shall terminate on the date that is 
five years after the date of the enactment of this section.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
related to section 713, as added by this Act, the following new item:

``Sec. 714. Employee engagement.''.

  (c) Submissions to Congress.--
          (1) Department-wide employee engagement action plan.--The 
        Secretary of Homeland Security, acting through the Chief Human 
        Capital Officer of the Department of Homeland Security, shall 
        submit to the Committee on Homeland Security of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs of the Senate the Department-wide employee 
        engagement action plan required under subsection (b)(1) of 
        section 714 of the Homeland Security Act of 2002 (as added by 
        subsection (a) of this section) not later than 30 days after 
        the issuance of such plan under such subsection (b)(1).
          (2) Component-specific employee engagement plans.--Each head 
        of a component of the Department of Homeland Security shall 
        submit to the Committee on Homeland Security of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs of the Senate the component-specific 
        employee engagement plan of each such component required under 
        subsection (b)(2) of section 714 of the Homeland Security Act 
        of 2002 (as added by subsection (a) of this section) not later 
        than 30 days after the issuance of each such plan under such 
        subsection (b)(2).

SEC. 123. ANNUAL EMPLOYEE AWARD PROGRAM.

  (a) In General.--Title VII of the Homeland Security Act of 2002 (6 
U.S.C. 341 et seq.), as amended by section 122 of this Act, is further 
amended by adding at the end the following new section:

``SEC. 715. ANNUAL EMPLOYEE AWARD PROGRAM.

  ``(a) In General.--The Secretary may establish an annual employee 
award program to recognize Department employees or groups of employees 
for significant contributions to the achievement of the Department's 
goals and missions. If such a program is established, the Secretary 
shall--
          ``(1) establish within such program categories of awards, 
        each with specific criteria, that emphasizes honoring employees 
        who are at the non-supervisory level;
          ``(2) publicize within the Department how any employee or 
        group of employees may be nominated for an award;
          ``(3) establish an internal review board comprised of 
        representatives from Department components, headquarters, and 
        field personnel to submit to the Secretary award 
        recommendations regarding specific employees or groups of 
        employees;
          ``(4) select recipients from the pool of nominees submitted 
        by the internal review board under paragraph (3) and convene a 
        ceremony at which employees or groups of employees receive such 
        awards from the Secretary; and
          ``(5) publicize such program within the Department.
  ``(b) Internal Review Board.--The internal review board described in 
subsection (a)(3) shall, when carrying out its function under such 
subsection, consult with representatives from operational components 
and headquarters, including supervisory and non-supervisory personnel, 
and employee labor organizations that represent Department employees.
  ``(c) Rule of Construction.--Nothing in this section may be construed 
to authorize additional funds to carry out the requirements of this 
section or to require the Secretary to provide monetary bonuses to 
recipients of an award under this section.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002, as amended this Act, is further amended 
by inserting after the item relating to section 714 the following new 
item:

``Sec. 715. Annual employee award program.''.

SEC. 124. INDEPENDENT INVESTIGATION AND IMPLEMENTATION PLAN.

  (a) In General.--Not later than 120 days after the date of the 
enactment of this Act or the issuance of a report by the Inspector 
General of the Department of Homeland Security on the extent to which 
the Department has an equitable and consistent disciplinary process, 
whichever is later, but in no case later than one year after such date 
of enactment, the Comptroller General of the United States shall 
utilize, if available, such report and investigate whether the 
application of discipline and adverse actions are administered in an 
equitable and consistent manner that results in the same or 
substantially similar disciplinary outcomes across the Department for 
misconduct by a non-supervisory or supervisor employee who engaged in 
the same or substantially similar misconduct.
  (b) Consultation.--In carrying out the investigation described in 
subsection (a), the Comptroller General of the United States shall 
consult with the employee engagement steering committee established 
pursuant to subsection (b)(1) of section 714 of the Homeland Security 
Act of 2002 (as added by section 122(a) of this Act).
  (c) Action by Under Secretary for Management.--Upon completion of the 
investigation described in subsection (a), the Under Secretary for 
Management of the Department of Homeland Security shall review the 
findings and recommendations of such investigation and implement a 
plan, in consultation with the employee engagement steering committee 
established pursuant to subsection (b)(1) of section 714 of the 
Homeland Security Act of 2002, to correct any relevant deficiencies 
identified by the Comptroller General of the United States. The Under 
Secretary for Management shall direct the employee engagement steering 
committee to review such plan to inform committee activities and action 
plans authorized under such section 714.

SEC. 125. CENTER FOR FAITH-BASED AND NEIGHBORHOOD PARTNERSHIPS.

  (a) In General.--Title V of the Homeland Security Act of 2002 (6 
U.S.C. 311 et seq.), is amended by adding at the end the following:

``SEC. 528. CENTER FOR FAITH-BASED AND NEIGHBORHOOD PARTNERSHIPS.

  ``(a) In General.--There is established in the Department a Center 
for Faith-Based and Neighborhood Partnerships, headed by a Director.
  ``(b) Mission.--The mission of the Center shall be to develop and 
coordinate Departmental outreach efforts with faith-based and community 
organizations and serve as a liaison between such organizations and 
components of the Department for activities related to securing 
facilities, emergency preparedness and response, and combating human 
trafficking.
  ``(c) Responsibilities.--In support of the mission of the Center for 
Faith-Based and Neighborhood Partnerships, the Director shall--
          ``(1) develop, in collaboration with the Administrator of the 
        Federal Emergency Management Agency, exercises that engage 
        faith-based and community organizations to test capabilities 
        for all hazards, including active shooter incidents;
          ``(2) coordinate the delivery of guidance and training to 
        faith-based and community organizations related to securing 
        their facilities against natural disasters, acts of terrorism, 
        and other man-made disasters;
          ``(3) conduct outreach to faith-based and community 
        organizations regarding guidance, training, and exercises and 
        Departmental capabilities available to assist faith-based and 
        community organizations secure their facilities against natural 
        disasters, acts of terrorism, and other man-made disasters;
          ``(4) facilitate engagement and coordination among the 
        emergency management community and faith-based and community 
        organizations;
          ``(5) deliver training and technical assistance to faith-
        based and community-based organizations and provide subject-
        matter expertise related to anti-human trafficking efforts to 
        help communities successfully partner with other Blue Campaign 
        components; and
          ``(6) perform any other duties as assigned by the 
        Secretary.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is further amended by inserting after the item relating to 
section 527 the following:

``Sec. 528. Center For Faith-Based And Neighborhood Partnerships.''.

SEC. 126. TIMELY GUIDANCE TO DHS PERSONNEL REGARDING EXECUTIVE ORDERS.

  (a) In General.--Title VII of the Homeland Security Act of 2002 is 
further amended by adding at the end the following new section:

``SEC. 716. TIMELY GUIDANCE TO PERSONNEL REGARDING EXECUTIVE ORDERS.

  ``To the maximum extent practicable, before any Executive Order 
affecting Department functions, programs, or operations takes effect, 
the Secretary, in coordination with the heads of relevant Department 
components and offices, shall make every effort to, as expeditiously as 
possible, provide to relevant Department personnel written guidance 
regarding how such Executive Order is to be implemented.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is further amended by inserting after the item relating to 
section 715, as added by this Act, the following new item:

``Sec. 716. Timely guidance to personnel regarding Executive Orders.''.

SEC. 127. SECRETARY'S RESPONSIBILITIES REGARDING ELECTION 
                    INFRASTRUCTURE.

  The Secretary of Homeland Security shall continue to prioritize the 
provision of assistance, on a voluntary basis, to State and local 
election officials in recognition of the importance of election 
infrastructure to the United States and that its incapacity or 
destruction would have a debilitating impact on national security, and 
that state and non-state adversaries should not compromise election 
infrastructure.

 TITLE II--DEPARTMENT OF HOMELAND SECURITY ACQUISITION ACCOUNTABILITY 
                             AND EFFICIENCY

SEC. 201. DEFINITIONS.

  (a) In General.--Subtitle D of title VIII of the Homeland Security 
Act of 2002 is amended by inserting before section 831 the following 
new section:

``SEC. 830. DEFINITIONS.

  ``In this subtitle:
          ``(1) The term `acquisition' has the meaning given such term 
        in section 131 of title 41, United States Code.
          ``(2) The term `acquisition decision authority' means the 
        authority, held by the Secretary acting through the Deputy 
        Secretary or Under Secretary for Management to--
                  ``(A) ensure compliance with Federal law, the Federal 
                Acquisition Regulation, and Department acquisition 
                management directives;
                  ``(B) review (including approving, pausing, 
                modifying, or canceling) an acquisition program through 
                the life cycle of such program;
                  ``(C) ensure that acquisition program managers have 
                the resources necessary to successfully execute an 
                approved acquisition program;
                  ``(D) ensure good acquisition program management of 
                cost, schedule, risk, and system performance of the 
                acquisition program at issue, including assessing 
                acquisition program baseline breaches and directing any 
                corrective action for such breaches; and
                  ``(E) ensure that acquisition program managers, on an 
                ongoing basis, monitor cost, schedule, and performance 
                against established baselines and use tools to assess 
                risks to an acquisition program at all phases of the 
                life cycle of such program to avoid and mitigate 
                acquisition program baseline breaches.
          ``(3) The term `acquisition decision event' means, with 
        respect to an acquisition program, a predetermined point within 
        each of the acquisition phases at which the acquisition 
        decision authority determines whether such acquisition program 
        shall proceed to the next acquisition phase.
          ``(4) The term `acquisition decision memorandum' means, with 
        respect to an acquisition, the official acquisition decision 
        event record that includes a documented record of decisions, 
        exit criteria, and assigned actions for such acquisition, as 
        determined by the person exercising acquisition decision 
        authority for such acquisition.
          ``(5) The term `acquisition program' means the process by 
        which the Department acquires, with any appropriated amounts, 
        by contract for purchase or lease, property or services 
        (including construction) that support the missions and goals of 
        the Department.
          ``(6) The term `acquisition program baseline', with respect 
        to an acquisition program, means a summary of the cost, 
        schedule, and performance parameters, expressed in standard, 
        measurable, quantitative terms, which must be met in order to 
        accomplish the goals of such program.
          ``(7) The term `best practices', with respect to acquisition, 
        means a knowledge-based approach to capability development that 
        includes--
                  ``(A) identifying and validating needs;
                  ``(B) assessing alternatives to select the most 
                appropriate solution;
                  ``(C) clearly establishing well-defined requirements;
                  ``(D) developing realistic cost assessments and 
                schedules;
                  ``(E) securing stable funding that matches resources 
                to requirements;
                  ``(F) demonstrating technology, design, and 
                manufacturing maturity;
                  ``(G) using milestones and exit criteria or specific 
                accomplishments that demonstrate progress;
                  ``(H) adopting and executing standardized processes 
                with known success across programs;
                  ``(I) establishing an adequate workforce that is 
                qualified and sufficient to perform necessary 
                functions; and
                  ``(J) integrating the capabilities described in 
                subparagraphs (A) through (I) into the Department's 
                mission and business operations.
          ``(8) The term `breach', with respect to a major acquisition 
        program, means a failure to meet any cost, schedule, or 
        performance threshold specified in the most recently approved 
        acquisition program baseline.
          ``(9) The term `congressional homeland security committees' 
        means--
                  ``(A) the Committee on Homeland Security of the House 
                of Representatives and the Committee on Homeland 
                Security and Governmental Affairs of the Senate; and
                  ``(B) the Committee on Appropriations of the House of 
                Representatives and of the Senate.
          ``(10) The term `Component Acquisition Executive' means the 
        senior acquisition official within a component who is 
        designated in writing by the Under Secretary for Management, in 
        consultation with the component head, with authority and 
        responsibility for leading a process and staff to provide 
        acquisition and program management oversight, policy, and 
        guidance to ensure that statutory, regulatory, and higher level 
        policy requirements are fulfilled, including compliance with 
        Federal law, the Federal Acquisition Regulation, and Department 
        acquisition management directives established by the Under 
        Secretary for Management.
          ``(11) The term `life cycle cost' means the total ownership 
        cost of an acquisition, including all relevant costs related to 
        acquiring, owning, operating, maintaining, and disposing of the 
        system, project, or product over a specified period of time.
          ``(12) The term `major acquisition program' means a 
        Department acquisition program that is estimated by the 
        Secretary to require an eventual total expenditure of at least 
        $300,000,000 (based on fiscal year 2017 constant dollars) over 
        its life cycle cost.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is further amended by inserting before the item relating to 
section 831 the following new item:

``830. Definitions.''.

                  Subtitle A--Acquisition Authorities

SEC. 211. ACQUISITION AUTHORITIES FOR UNDER SECRETARY FOR MANAGEMENT OF 
                    THE DEPARTMENT OF HOMELAND SECURITY.

  Section 701 of the Homeland Security Act of 2002 (6 U.S.C. 341) is 
amended--
          (1) in subsection (a)(2), by inserting ``and acquisition 
        management'' after ``procurement'';
          (2) by redesignating subsections (d) and (e) as subsections 
        (e) and (f), respectively; and
          (3) by inserting after subsection (c) the following new 
        subsection:
  ``(d) Acquisition and Related Responsibilities.--
          ``(1) In general.--Notwithstanding subsection (a) of section 
        1702 of title 41, United States Code, the Under Secretary for 
        Management is the Chief Acquisition Officer of the Department. 
        As Chief Acquisition Officer, the Under Secretary shall have 
        the authorities and perform the functions specified in 
        subsection (b) of such section and shall perform all other 
        functions and responsibilities delegated by the Secretary or 
        described in this subsection.
          ``(2) Functions and responsibilities.--In addition to the 
        authorities and functions specified in section 1702(b) of title 
        41, United States Code, the functions and responsibilities of 
        the Under Secretary for Management related to acquisition 
        include the following:
                  ``(A) Advising the Secretary regarding acquisition 
                management activities, taking into account risks of 
                failure to achieve cost, schedule, or performance 
                parameters, to ensure that the Department achieves its 
                mission through the adoption of widely accepted program 
                management best practices and standards and, where 
                appropriate, acquisition innovation best practices.
                  ``(B) Leading the acquisition oversight body of the 
                Department, the Acquisition Review Board, and 
                exercising the acquisition decision authority to 
                approve, pause, modify (including the rescission of 
                approvals of program milestones), or cancel major 
                acquisition programs, unless the Under Secretary 
                delegates such authority to a Component Acquisition 
                Executive pursuant to paragraph (3).
                  ``(C) Establishing policies for acquisition that 
                implement an approach that takes into account risks of 
                failure to achieve cost, schedule, or performance 
                parameters that all components of the Department shall 
                comply with, including outlining relevant authorities 
                for program managers to effectively manage acquisition 
                programs.
                  ``(D) Ensuring that each major acquisition program 
                has a Department-approved acquisition program baseline, 
                pursuant to the Department's acquisition management 
                policy.
                  ``(E) Ensuring that the heads of components and 
                Component Acquisition Executives comply with Federal 
                law, the Federal Acquisition Regulation, and Department 
                acquisition management directives.
                  ``(F) Providing additional scrutiny and oversight for 
                an acquisition that is not a major acquisition if--
                          ``(i) the acquisition is for a program that 
                        is important to departmental strategic and 
                        performance plans;
                          ``(ii) the acquisition is for a program with 
                        significant program or policy implications; and
                          ``(iii) the Secretary determines that such 
                        scrutiny and oversight for the acquisition is 
                        proper and necessary.
                  ``(G) Ensuring that grants and financial assistance 
                are provided only to individuals and organizations that 
                are not suspended or debarred.
                  ``(H) Distributing guidance throughout the Department 
                to ensure that contractors involved in acquisitions, 
                particularly contractors that access the Department's 
                information systems and technologies, adhere to 
                relevant Department policies related to physical and 
                information security as identified by the Under 
                Secretary for Management.
                  ``(I) Overseeing the Component Acquisition Executive 
                organizational structure to ensure Component 
                Acquisition Executives have sufficient capabilities and 
                comply with Department acquisition policies.
                  ``(J) Ensuring acquisition decision memoranda 
                adequately document decisions made at acquisition 
                decision events, including any affirmative 
                determination of contractor responsibility at the down 
                selection phase and any other significant procurement 
                decisions related to the acquisition at issue.
          ``(3) Delegation of acquisition decision authority.--
                  ``(A) Level 3 acquisitions.--The Under Secretary for 
                Management may delegate acquisition decision authority 
                in writing to the relevant Component Acquisition 
                Executive for an acquisition program that has a life 
                cycle cost estimate of less than $300,000,000.
                  ``(B) Level 2 acquisitions.--The Under Secretary for 
                Management may delegate acquisition decision authority 
                in writing to the relevant Component Acquisition 
                Executive for a major acquisition program that has a 
                life cycle cost estimate of at least $300,000,000 but 
                not more than $1,000,000,000 if all of the following 
                requirements are met:
                          ``(i) The component concerned possesses 
                        working policies, processes, and procedures 
                        that are consistent with Department-level 
                        acquisition policy.
                          ``(ii) The Component Acquisition Executive 
                        concerned has adequate, experienced, and 
                        dedicated professional employees with program 
                        management training, as applicable, 
                        commensurate with the size of the acquisition 
                        programs and related activities delegated to 
                        such Component Acquisition Executive by the 
                        Under Secretary for Management.
                          ``(iii) Each major acquisition program 
                        concerned has written documentation showing 
                        that it has a Department-approved acquisition 
                        program baseline and it is meeting agreed-upon 
                        cost, schedule, and performance thresholds.
          ``(4) Relationship to under secretary for science and 
        technology.--
                  ``(A) In general.--Nothing in this subsection shall 
                diminish the authority granted to the Under Secretary 
                for Science and Technology under this Act. The Under 
                Secretary for Management and the Under Secretary for 
                Science and Technology shall cooperate in matters 
                related to the coordination of acquisitions across the 
                Department so that investments of the Directorate of 
                Science and Technology are able to support current and 
                future requirements of the components of the 
                Department.
                  ``(B) Operational testing and evaluation.--The Under 
                Secretary for Science and Technology shall--
                          ``(i) ensure, in coordination with relevant 
                        component heads, that major acquisition 
                        programs--
                                  ``(I) complete operational testing 
                                and evaluation of technologies and 
                                systems;
                                  ``(II) use independent verification 
                                and validation of operational test and 
                                evaluation implementation and results; 
                                and
                                  ``(III) document whether such 
                                programs meet all performance 
                                requirements included in their 
                                acquisition program baselines;
                          ``(ii) ensure that such operational testing 
                        and evaluation includes all system components 
                        and incorporates operators into the testing to 
                        ensure that systems perform as intended in the 
                        appropriate operational setting; and
                          ``(iii) determine if testing conducted by 
                        other Federal agencies and private entities is 
                        relevant and sufficient in determining whether 
                        systems perform as intended in the operational 
                        setting.
          ``(5) Definitions.--In this subsection, the terms 
        `acquisition', `best practices', `acquisition decision 
        authority', `major acquisition program', `acquisition program 
        baseline', and `Component Acquisition Executive' have the 
        meanings given such terms in section 830.''.

SEC. 212. ACQUISITION AUTHORITIES FOR CHIEF FINANCIAL OFFICER OF THE 
                    DEPARTMENT OF HOMELAND SECURITY.

  Paragraph (2) of section 702(b) of the Homeland Security Act of 2002 
(6 U.S.C. 342(b)) is amended by adding at the end the following new 
subparagraph:
                  ``(J) Oversee the costs of acquisition programs and 
                related activities to ensure that actual and planned 
                costs are in accordance with budget estimates and are 
                affordable, or can be adequately funded, over the life 
                cycle of such programs and activities.''.

SEC. 213. ACQUISITION AUTHORITIES FOR CHIEF INFORMATION OFFICER OF THE 
                    DEPARTMENT OF HOMELAND SECURITY.

  Section 703 of the Homeland Security Act of 2002 (6 U.S.C. 343) is 
amended--
          (1) by redesignating subsection (b) as subsection (c); and
          (2) by inserting after subsection (a) the following new 
        subsection:
  ``(b) Acquisition Responsibilities.--Notwithstanding section 11315 of 
title 40, United States Code, the acquisition responsibilities of the 
Chief Information Officer, in consultation with the Under Secretary for 
Management, shall include the following:
          ``(1) Oversee the management of the Homeland Security 
        Enterprise Architecture and ensure that, before each 
        acquisition decision event (as such term is defined in section 
        830), approved information technology acquisitions comply with 
        departmental information technology management processes, 
        technical requirements, and the Homeland Security Enterprise 
        Architecture, and in any case in which information technology 
        acquisitions do not comply with the Department's management 
        directives, make recommendations to the Acquisition Review 
        Board regarding such noncompliance.
          ``(2) Be responsible for providing recommendations to the 
        Acquisition Review Board regarding information technology 
        programs, and be responsible for developing information 
        technology acquisition strategic guidance.''.

SEC. 214. ACQUISITION AUTHORITIES FOR PROGRAM ACCOUNTABILITY AND RISK 
                    MANAGEMENT.

  (a) In General.--Title VII of the Homeland Security Act of 2002 (6 
U.S.C. 341 et seq.) is further amended by adding at the end the 
following:

``SEC. 717. ACQUISITION AUTHORITIES FOR PROGRAM ACCOUNTABILITY AND RISK 
                    MANAGEMENT.

  ``(a) Establishment of Office.--There is in the Management 
Directorate of the Department an office to be known as `Program 
Accountability and Risk Management'. The purpose of the office is to--
          ``(1) provide consistent accountability, standardization, and 
        transparency of major acquisition programs of the Department; 
        and
          ``(2) serve as the central oversight function for all 
        Department acquisition programs.
  ``(b) Responsibilities of Executive Director.--The Program 
Accountability and Risk Management shall be led by an Executive 
Director to oversee the requirement under subsection (a). The Executive 
Director shall report directly to the Under Secretary for Management, 
and shall carry out the following responsibilities:
          ``(1) Monitor regularly the performance of Department 
        acquisition programs between acquisition decision events to 
        identify problems with cost, performance, or schedule that 
        components may need to address to prevent cost overruns, 
        performance issues, or schedule delays.
          ``(2) Assist the Under Secretary for Management in managing 
        the acquisition programs and related activities of the 
        Department.
          ``(3) Conduct oversight of individual acquisition programs to 
        implement Department acquisition program policy, procedures, 
        and guidance with a priority on ensuring the data the office 
        collects and maintains from Department components is accurate 
        and reliable.
          ``(4) Serve as the focal point and coordinator for the 
        acquisition life cycle review process and as the executive 
        secretariat for the Acquisition Review Board.
          ``(5) Advise the persons having acquisition decision 
        authority in making acquisition decisions consistent with all 
        applicable laws and in establishing clear lines of authority, 
        accountability, and responsibility for acquisition decision 
        making within the Department.
          ``(6) Engage in the strategic planning and performance 
        evaluation process required under section 306 of title 5, 
        United States Code, and sections 1105(a)(28), 1115, 1116, and 
        9703 of title 31, United States Code, by supporting the Chief 
        Procurement Officer in developing strategies and specific plans 
        for hiring, training, and professional development in order to 
        rectify any deficiency within the Department's acquisition 
        workforce.
          ``(7) Develop standardized certification standards in 
        consultation with the Component Acquisition Executives for all 
        acquisition program managers.
          ``(8) In the event that a certification or action of an 
        acquisition program manager needs review for purposes of 
        promotion or removal, provide input, in consultation with the 
        relevant Component Acquisition Executive, into the performance 
        evaluation of the relevant acquisition program manager and 
        report positive or negative experiences to the relevant 
        certifying authority.
          ``(9) Provide technical support and assistance to Department 
        acquisitions and acquisition personnel in conjunction with the 
        Chief Procurement Officer.
          ``(10) Prepare the Comprehensive Acquisition Status Report 
        for the Department, as required by title I of division D of the 
        Consolidated Appropriations Act, 2016 (Public Law 114-113), and 
        make such report available to the congressional homeland 
        security committees.
  ``(c) Responsibilities of Components.--Each head of a component shall 
comply with Federal law, the Federal Acquisition Regulation, and 
Department acquisition management directives established by the Under 
Secretary for Management. For each major acquisition program, each head 
of a component shall--
          ``(1) define baseline requirements and document changes to 
        such requirements, as appropriate;
          ``(2) establish a complete life cycle cost estimate with 
        supporting documentation, including an acquisition program 
        baseline;
          ``(3) verify each life cycle cost estimate against 
        independent cost estimates, and reconcile any differences;
          ``(4) complete a cost-benefit analysis with supporting 
        documentation;
          ``(5) develop and maintain a schedule that is consistent with 
        scheduling best practices as identified by the Comptroller 
        General of the United States, including, in appropriate cases, 
        an integrated master schedule; and
          ``(6) ensure that all acquisition program information 
        provided by the component is complete, accurate, timely, and 
        valid.
  ``(d) Congressional Homeland Security Committees Defined.--In this 
section, the term `congressional homeland security committees' means--
          ``(1) the Committee on Homeland Security of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs of the Senate; and
          ``(2) the Committee on Appropriations of the House of 
        Representatives and the Committee on Appropriations of the 
        Senate.

``SEC. 718. ACQUISITION DOCUMENTATION.

  ``(a) In General.--For each major acquisition program, the Executive 
Director responsible for the preparation of the Comprehensive 
Acquisition Status Report, pursuant to paragraph (11) of section 
710(b), shall require certain acquisition documentation to be submitted 
by Department components or offices.
  ``(b) Waiver.--The Secretary may waive the requirement for submission 
under subsection (a) for a program for a fiscal year if either--
          ``(1) the program has not--
                  ``(A) entered the full rate production phase in the 
                acquisition life cycle;
                  ``(B) had a reasonable cost estimate established; and
                  ``(C) had a system configuration defined fully; or
          ``(2) the program does not meet the definition of `capital 
        asset', as defined by the Director of the Office of Management 
        and Budget.
  ``(c) Congressional Oversight.--At the same time the President's 
budget is submitted for a fiscal year under section 1105(a) of title 
31, United States Code, the Secretary shall submit to the Committee on 
Homeland Security of the House of Representatives and Committee on 
Homeland Security and Governmental Affairs of the Senate information on 
the exercise of authority under subsection (b) in the prior fiscal year 
that includes the following specific information regarding each program 
for which a waiver is issued under subsection (b):
          ``(1) The grounds for granting a waiver for that program.
          ``(2) The projected cost of that program.
          ``(3) The proportion of a component's annual acquisition 
        budget attributed to that program, as available.
          ``(4) Information on the significance of the program with 
        respect to the component's operations and execution of its 
        mission.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is further amended by inserting after the 
item relating to section 716, as added by this Act, the following new 
items:

``Sec. 717. Acquisition authorities for Program Accountability and Risk 
Management.
``Sec. 718. Acquisition documentation.''.

SEC. 215. ACQUISITION INNOVATION.

  (a) In General.--Title VII of the Homeland Security Act of 2002 (6 
U.S.C. 341 et seq.) as amended by this Act, is further amended by 
adding at the end the following new section:

``SEC. 719. ACQUISITION INNOVATION.

  ``The Under Secretary for Management may--
          ``(1) designate an individual within the Department to manage 
        acquisition innovation efforts of the Department;
          ``(2) test emerging acquisition best practices to carrying 
        out acquisitions, consistent with the Federal Acquisition 
        Regulation and Department acquisition management directives, as 
        appropriate;
          ``(3) develop and distribute best practices and lessons 
        learned regarding acquisition innovation throughout the 
        Department;
          ``(4) establish metrics to measure the effectiveness of 
        acquisition innovation efforts with respect to cost, 
        operational efficiency of the acquisition program (including 
        timeframes for executing contracts), and collaboration with the 
        private sector, including small businesses; and
          ``(5) determine impacts of acquisition innovation efforts on 
        the private sector by--
                  ``(A) engaging with the private sector, including 
                small businesses, to provide information and obtain 
                feedback on procurement practices and acquisition 
                innovation efforts of the Department;
                  ``(B) obtaining feedback from the private sector on 
                the impact of acquisition innovation efforts of the 
                Department; and
                  ``(C) incorporating such feedback, as appropriate, 
                into future acquisition innovation efforts of the 
                Department.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 718, as added by this Act, the following new item:

``Sec. 719. Acquisition innovation.''.

  (c) Information.--Not later than 90 days after the date on which the 
Secretary of Homeland Security submits the annual budget justification 
for the Department of Homeland Security for each of fiscal years 2019 
through 2023, the Secretary shall, if appropriate, provide information 
to the Committee on Homeland Security of the House of Representatives 
and the Committee on Homeland Security and Governmental Affairs of the 
Senate on the activities undertaken in the previous fiscal year in 
furtherance of section 719 of the Homeland Security Act of 2002, as 
added by subsection (a) of this Act, on the following:
          (1) Emerging acquisition best practices that were tested 
        within the Department during such fiscal year.
          (2) Efforts to distribute best practices and lessons learned 
        within the Department, including through web-based seminars, 
        training, and forums, during such fiscal year.
          (3) Utilization by components throughout the Department of 
        best practices distributed by the Under Secretary of Management 
        pursuant to paragraph (3) of such section 719.
          (4) Performance as measured by the metrics established under 
        paragraph (4) of such section 719.
          (5) Outcomes of efforts to distribute best practices and 
        lessons learned within the Department, including through web-
        based seminars, training, and forums.
          (6) Any impacts of the utilization of innovative acquisition 
        mechanisms by the Department on the private sector, including 
        small businesses.
          (7) The criteria used to identify specific acquisition 
        programs or activities to be included in acquisition innovation 
        efforts and the outcomes of such programs or activities.
          (8) Recommendations, as necessary, to enhance acquisition 
        innovation in the Department.

         Subtitle B--Acquisition Program Management Discipline

SEC. 221. ACQUISITION REVIEW BOARD.

  (a) In General.--Subtitle D of title VIII of the Homeland Security 
Act of 2002 (6 U.S.C. 391 et seq.) is amended by adding at the end the 
following new section:

``SEC. 836. ACQUISITION REVIEW BOARD.

  ``(a) In General.--The Secretary shall establish an Acquisition 
Review Board (in this section referred to as the `Board') to--
          ``(1) strengthen accountability and uniformity within the 
        Department acquisition review process;
          ``(2) review major acquisition programs; and
          ``(3) review the use of best practices.
  ``(b) Composition.--The Under Secretary for Management shall serve as 
chair of the Board. The Secretary shall also ensure participation by 
other relevant Department officials, including at least two component 
heads or their designees, as permanent members of the Board.
  ``(c) Meetings.--The Board shall meet regularly for purposes of 
ensuring all acquisitions processes proceed in a timely fashion to 
achieve mission readiness. The Board shall convene at the discretion of 
the Secretary and at any time--
          ``(1) a major acquisition program--
                  ``(A) requires authorization to proceed from one 
                acquisition decision event to another throughout the 
                acquisition life cycle;
                  ``(B) is in breach of its approved requirements; or
                  ``(C) requires additional review, as determined by 
                the Under Secretary for Management; or
          ``(2) a non-major acquisition program requires review, as 
        determined by the Under Secretary for Management.
  ``(d) Responsibilities.--The responsibilities of the Board are as 
follows:
          ``(1) Determine whether a proposed acquisition has met the 
        requirements of key phases of the acquisition life cycle 
        framework and is able to proceed to the next phase and eventual 
        full production and deployment.
          ``(2) Oversee whether a proposed acquisition's business 
        strategy, resources, management, and accountability is 
        executable and is aligned to strategic initiatives.
          ``(3) Support the person with acquisition decision authority 
        for an acquisition in determining the appropriate direction for 
        such acquisition at key acquisition decision events.
          ``(4) Conduct systematic reviews of acquisitions to ensure 
        that such acquisitions are progressing in compliance with the 
        approved documents for their current acquisition phases.
          ``(5) Review the acquisition documents of each major 
        acquisition program, including the acquisition program baseline 
        and documentation reflecting consideration of tradeoffs among 
        cost, schedule, and performance objectives, to ensure the 
        reliability of underlying data.
          ``(6) Ensure that practices are adopted and implemented to 
        require consideration of trade-offs among cost, schedule, and 
        performance objectives as part of the process for developing 
        requirements for major acquisition programs prior to the 
        initiation of the second acquisition decision event, including, 
        at a minimum, the following practices:
                  ``(A) Department officials responsible for 
                acquisition, budget, and cost estimating functions are 
                provided with the appropriate opportunity to develop 
                estimates and raise cost and schedule matters before 
                performance objectives are established for capabilities 
                when feasible.
                  ``(B) Full consideration is given to possible trade-
                offs among cost, schedule, and performance objectives 
                for each alternative.
  ``(e) Acquisition Program Baseline Report Requirement.--If the person 
exercising acquisition decision authority over a major acquisition 
program approves such program to proceed into the planning phase before 
such program has a Department-approved acquisition program baseline, 
the Under Secretary for Management shall create and approve an 
acquisition program baseline report regarding such approval, and the 
Secretary shall--
          ``(1) within seven days after an acquisition decision 
        memorandum is signed, notify in writing the Committee on 
        Homeland Security of the House of Representatives and the 
        Committee on Homeland Security and Governmental Affairs of the 
        Senate of such decision; and
          ``(2) within 60 days after the acquisition decision 
        memorandum is signed, submit to such committees a report 
        stating the rationale for such decision and a plan of action to 
        require an acquisition program baseline for such program.
  ``(f) Report.--The Under Secretary for Management shall provide 
information to the Committee on Homeland Security of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs of the Senate on an annual basis through fiscal year 2022 on 
the activities of the Board for the prior fiscal year that includes 
information relating to the following:
          ``(1) For each meeting of the Board, any acquisition decision 
        memoranda.
          ``(2) Results of the systematic reviews conducted pursuant to 
        paragraph (4) of subsection (d).
          ``(3) Results of acquisition document reviews required 
        pursuant to paragraph (5) of subsection (d).
          ``(4) Activities to ensure that practices are adopted and 
        implemented throughout the Department pursuant to paragraph (6) 
        of subsection (d).''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 (6 U.S.C. 101 et seq.) is further amended 
by adding after the item relating to section 835 the following new 
item:

``Sec. 836. Acquisition Review Board.''.

SEC. 222. REQUIREMENTS TO REDUCE DUPLICATION IN ACQUISITION PROGRAMS.

  (a) In General.--Subtitle D of title VIII of the Homeland Security 
Act of 2002 (6 U.S.C. 391 et seq.) is further amended by adding at the 
end the following new section:

``SEC. 837. REQUIREMENTS TO REDUCE DUPLICATION IN ACQUISITION PROGRAMS.

  ``(a) Requirement to Establish Policies.--In an effort to reduce 
unnecessary duplication and inefficiency for all Department 
investments, including major acquisition programs, the Deputy 
Secretary, in consultation with the Under Secretary for Management, 
shall establish Department-wide policies to integrate all phases of the 
investment life cycle and help the Department identify, validate, and 
prioritize common component requirements for major acquisition programs 
in order to increase opportunities for effectiveness and efficiencies. 
The policies shall also include strategic alternatives for developing 
and facilitating a Department component-driven requirements process 
that includes oversight of a development test and evaluation 
capability; identification of priority gaps and overlaps in Department 
capability needs; and provision of feasible technical alternatives, 
including innovative commercially available alternatives, to meet 
capability needs.
  ``(b) Mechanisms to Carry Out Requirement.--The Under Secretary for 
Management shall coordinate the actions necessary to carry out 
subsection (a), using such mechanisms as considered necessary by the 
Secretary to help the Department reduce unnecessary duplication and 
inefficiency for all Department investments, including major 
acquisition programs.
  ``(c) Coordination.--In coordinating the actions necessary to carry 
out subsection (a), the Deputy Secretary shall consult with the Under 
Secretary for Management, Component Acquisition Executives, and any 
other Department officials, including the Under Secretary for Science 
and Technology or his designee, with specific knowledge of Department 
or component acquisition capabilities to prevent unnecessary 
duplication of requirements.
  ``(d) Advisors.--The Deputy Secretary, in consultation with the Under 
Secretary for Management, shall seek and consider input within legal 
and ethical boundaries from members of Federal, State, local, and 
tribal governments, nonprofit organizations, and the private sector, as 
appropriate, on matters within their authority and expertise in 
carrying out the Department's mission.
  ``(e) Meetings.--The Deputy Secretary, in consultation with the Under 
Secretary for Management, shall meet at least quarterly and communicate 
with components often to ensure that components do not overlap or 
duplicate spending or activities on major investments and acquisition 
programs within their areas of responsibility.
  ``(f) Responsibilities.--In carrying out this section, the 
responsibilities of the Deputy Secretary, in consultation with the 
Under Secretary for Management, are as follows:
          ``(1) To review and validate the requirements documents of 
        major investments and acquisition programs prior to acquisition 
        decision events of the investments or programs.
          ``(2) To ensure the requirements and scope of a major 
        investment or acquisition program are stable, measurable, 
        achievable, at an acceptable risk level, and match the 
        resources planned to be available.
          ``(3) Before any entity of the Department issues a 
        solicitation for a new contract, coordinate with other 
        Department entities as appropriate to prevent unnecessary 
        duplication and inefficiency and--
                  ``(A) to implement portfolio reviews to identify 
                common mission requirements and crosscutting 
                opportunities among components to harmonize investments 
                and requirements and prevent unnecessary overlap and 
                duplication among components; and
                  ``(B) to the extent practicable, to standardize 
                equipment purchases, streamline the acquisition 
                process, improve efficiencies, and conduct best 
                practices for strategic sourcing.
          ``(4) To ensure program managers of major investments and 
        acquisition programs conduct analyses, giving particular 
        attention to factors such as cost, schedule, risk, performance, 
        and operational efficiency in order to determine that programs 
        work as intended within cost and budget expectations.
          ``(5) To propose schedules for delivery of the operational 
        capability needed to meet each Department investment and major 
        acquisition program.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 (6 U.S.C. 101 et seq.) is further amended 
by adding after the item relating to section 836, as added by this Act, 
the following new item:

``Sec. 837. Requirements to reduce duplication in acquisition 
programs.''.

SEC. 223. DEPARTMENT LEADERSHIP COUNCIL.

  (a) In General.--Subtitle H of title VIII of the Homeland Security 
Act of 2002 is amended by adding at the end the following new section:

``SEC. 890B. DEPARTMENT LEADERSHIP COUNCIL.

  ``(a) Department Leadership Council.--
          ``(1) Establishment.--The Secretary may establish a 
        Department leadership council as the Secretary determines 
        necessary to ensure coordination and improve programs and 
        activities of the Department.
          ``(2) Function.--A Department leadership council shall--
                  ``(A) serve as coordinating forums;
                  ``(B) advise the Secretary and Deputy Secretary on 
                Department strategy, operations, and guidance; and
                  ``(C) consider and report on such other matters as 
                the Secretary or Deputy Secretary may direct.
          ``(3) Relationship to other forums.--The Secretary or Deputy 
        Secretary may delegate the authority to direct the 
        implementation of any decision or guidance resulting from the 
        action of a Department leadership council to any office, 
        component, coordinator, or other senior official of the 
        Department.
          ``(4) Mission.--In addition to other matters assigned to it 
        by the Secretary and Deputy Secretary, a leadership council 
        shall--
                  ``(A) identify, assess, and validate joint 
                requirements (including existing systems and associated 
                capability gaps) to meet mission needs of the 
                Department;
                  ``(B) ensure that appropriate efficiencies are made 
                among life-cycle cost, schedule, and performance 
                objectives, and procurement quantity objectives, in the 
                establishment and approval of joint requirements; and
                  ``(C) make prioritized capability recommendations for 
                the joint requirements validated under subparagraph (A) 
                to the Secretary, the Deputy Secretary, or the 
                chairperson of a Department leadership council 
                designated by the Secretary to review decisions of the 
                leadership council.
          ``(5) Chairperson.--The Secretary shall appoint a chairperson 
        of a leadership council, for a term of not more than 2 years, 
        from among senior officials from components of the Department 
        or other senior officials as designated by the Secretary.
          ``(6) Composition.--A leadership council shall be composed of 
        senior officials representing components of the Department and 
        other senior officials as designated by the Secretary.
          ``(7) Relationship to future years homeland security 
        program.--The Secretary shall ensure that the Future Years 
        Homeland Security Program required under section 874 is 
        consistent with any recommendations of a leadership council 
        required under paragraph (2)(C), as affirmed by the Secretary, 
        the Deputy Secretary, or the chairperson of a Department 
        leadership council designated by the Secretary under that 
        paragraph.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is amended by inserting after the item relating to section 
890A the following new item:

``Sec. 890B. Department leadership council.''.

SEC. 224. GOVERNMENT ACCOUNTABILITY OFFICE REVIEW OF BOARD AND OF 
                    REQUIREMENTS TO REDUCE DUPLICATION IN ACQUISITION 
                    PROGRAMS.

  (a) Review Required.--The Comptroller General of the United States 
shall conduct a review of the effectiveness of the Acquisition Review 
Board established under section 836 of the Homeland Security Act of 
2002 (as added by section 221) and the requirements to reduce 
unnecessary duplication in acquisition programs established under 
section 837 of such Act (as added by section 222) in improving the 
Department's acquisition management process.
  (b) Scope of Report.--The review shall include the following:
          (1) An assessment of the effectiveness of the Board in 
        increasing program management oversight, best practices and 
        standards, and discipline among the components of the 
        Department, including in working together and in preventing 
        overlap and unnecessary duplication.
          (2) An assessment of the effectiveness of the Board in 
        instilling program management discipline.
          (3) A statement of how regularly each major acquisition 
        program is reviewed by the Board, how often the Board stops 
        major acquisition programs from moving forward in the phases of 
        the acquisition life cycle process, and the number of major 
        acquisition programs that have been halted because of problems 
        with operational effectiveness, schedule delays, or cost 
        overruns.
          (4) An assessment of the effectiveness of the Board in 
        impacting acquisition decisionmaking within the Department, 
        including the degree to which the Board impacts decision making 
        within other headquarters mechanisms and bodies involved in the 
        administration of acquisition activities.
  (c) Report Required.--Not later than one year after the date of the 
enactment of this Act, the Comptroller General shall submit to the 
congressional homeland security committees a report on the review 
required by this section. The report shall be submitted in unclassified 
form but may include a classified annex.

SEC. 225. EXCLUDED PARTY LIST SYSTEM WAIVERS.

  Not later than five days after the issuance of a waiver by the 
Secretary of Homeland Security of Federal requirements that an agency 
not engage in business with a contractor in the Excluded Party List 
System (or successor system) as maintained by the General Services 
Administration, the Secretary shall submit to Congress notice of such 
waiver and an explanation for a finding by the Secretary that a 
compelling reason exists for issuing such waiver.

SEC. 226. INSPECTOR GENERAL OVERSIGHT OF SUSPENSION AND DEBARMENT.

  The Inspector General of the Department of Homeland Security--
          (1) may audit decisions about grant and procurement awards to 
        identify instances where a contract or grant was improperly 
        awarded to a suspended or debarred entity and whether 
        corrective actions were taken to prevent recurrence; and
          (2) shall review the suspension and debarment program 
        throughout the Department of Homeland Security to assess 
        whether suspension and debarment criteria are consistently 
        applied throughout the Department and whether disparities exist 
        in the application of such criteria, particularly with respect 
        to business size and categories.

     Subtitle C--Acquisition Program Management Accountability and 
                              Transparency

SEC. 231. CONGRESSIONAL NOTIFICATION FOR MAJOR ACQUISITION PROGRAMS.

  (a) In General.--Subtitle D of title VIII of the Homeland Security 
Act of 2002 (6 U.S.C. 391 et seq.) is further amended by adding at the 
end the following new section:

``SEC. 838. CONGRESSIONAL NOTIFICATION AND OTHER REQUIREMENTS FOR MAJOR 
                    ACQUISITION PROGRAM BREACH.

  ``(a) Requirements Within Department in Event of Breach.--
          ``(1) Notifications.--
                  ``(A) Notification of breach.--If a breach occurs in 
                a major acquisition program, the program manager for 
                such program shall notify the Component Acquisition 
                Executive for such program, the head of the component 
                concerned, the Executive Director of the Program 
                Accountability and Risk Management division, the Under 
                Secretary for Management, and the Deputy Secretary not 
                later than 30 calendar days after such breach is 
                identified.
                  ``(B) Notification to secretary.--If a breach occurs 
                in a major acquisition program and such breach results 
                in a cost overrun greater than 15 percent, a schedule 
                delay greater than 180 days, or a failure to meet any 
                of the performance thresholds from the cost, schedule, 
                or performance parameters specified in the most 
                recently approved acquisition program baseline for such 
                program, the Component Acquisition Executive for such 
                program shall notify the Secretary and the Inspector 
                General of the Department not later than five business 
                days after the Component Acquisition Executive for such 
                program, the head of the component concerned, the 
                Executive Director of the Program Accountability and 
                Risk Management Division, the Under Secretary for 
                Management, and the Deputy Secretary are notified of 
                the breach pursuant to subparagraph (A).
          ``(2) Remediation plan and root cause analysis.--
                  ``(A) In general.--If a breach occurs in a major 
                acquisition program, the program manager for such 
                program shall submit to the head of the component 
                concerned, the Executive Director of the Program 
                Accountability and Risk Management division, and the 
                Under Secretary for Management in writing a remediation 
                plan and root cause analysis relating to such breach 
                and program. Such plan and analysis shall be submitted 
                at a date established at the discretion of the Under 
                Secretary for Management.
                  ``(B) Remediation plan.--The remediation plan 
                required under this subparagraph (A) shall--
                          ``(i) explain the circumstances of the breach 
                        at issue;
                          ``(ii) provide prior cost estimating 
                        information;
                          ``(iii) include a root cause analysis that 
                        determines the underlying cause or causes of 
                        shortcomings in cost, schedule, or performance 
                        of the major acquisition program with respect 
                        to which such breach has occurred, including 
                        the role, if any, of--
                                  ``(I) unrealistic performance 
                                expectations;
                                  ``(II) unrealistic baseline estimates 
                                for cost or schedule or changes in 
                                program requirements;
                                  ``(III) immature technologies or 
                                excessive manufacturing or integration 
                                risk;
                                  ``(IV) unanticipated design, 
                                engineering, manufacturing, or 
                                technology integration issues arising 
                                during program performance;
                                  ``(V) changes to the scope of such 
                                program;
                                  ``(VI) inadequate program funding or 
                                changes in planned out-year funding 
                                from one 5-year funding plan to the 
                                next 5-year funding plan as outlined in 
                                the Future Years Homeland Security 
                                Program required under section 874;
                                  ``(VII) legislative, legal, or 
                                regulatory changes; or
                                  ``(VIII) inadequate program 
                                management personnel, including lack of 
                                sufficient number of staff, training, 
                                credentials, certifications, or use of 
                                best practices;
                          ``(iv) propose corrective action to address 
                        cost growth, schedule delays, or performance 
                        issues;
                          ``(v) explain the rationale for why a 
                        proposed corrective action is recommended; and
                          ``(vi) in coordination with the Component 
                        Acquisition Executive for such program, discuss 
                        all options considered, including the estimated 
                        impact on cost, schedule, or performance of 
                        such program if no changes are made to current 
                        requirements, the estimated cost of such 
                        program if requirements are modified, and the 
                        extent to which funding from other programs 
                        will need to be reduced to cover the cost 
                        growth of such program.
          ``(3) Review of corrective actions.--
                  ``(A) In general.--The Under Secretary for Management 
                shall review the remediation plan required under 
                paragraph (2). The Under Secretary may approve such 
                plan or provide an alternative proposed corrective 
                action within 30 days of the submission of such plan 
                under such paragraph.
                  ``(B) Submission to congress.--Not later than 30 days 
                after the review required under subparagraph (A) is 
                completed, the Under Secretary for Management shall 
                submit to the congressional homeland security 
                committees the following:
                          ``(i) A copy of the remediation plan and the 
                        root cause analysis required under paragraph 
                        (2).
                          ``(ii) A statement describing the corrective 
                        action or actions that have occurred pursuant 
                        to paragraph (2)(b)(iv) for the major 
                        acquisition program at issue, with a 
                        justification for such action or actions.
  ``(b) Requirements Relating to Congressional Notification if Breach 
Occurs.--
          ``(1) Notification to congress.--If a notification to the 
        Secretary is made under subsection (a)(1)(B) relating to a 
        breach in a major acquisition program, the Under Secretary for 
        Management shall notify the congressional homeland security 
        committees of such breach in the next quarterly Comprehensive 
        Acquisition Status Report, as required by title I of division D 
        of the Consolidated Appropriations Act, 2016, (Public Law 114-
        113) following receipt by the Under Secretary of notification 
        under such subsection.
          ``(2) Significant variances in costs or schedule.--If a 
        likely cost overrun is greater than 20 percent or a likely 
        delay is greater than 12 months from the costs and schedule 
        specified in the acquisition program baseline for a major 
        acquisition program, the Under Secretary for Management shall 
        include in the notification required in paragraph (1) a written 
        certification, with supporting explanation, that--
                  ``(A) such program is essential to the accomplishment 
                of the Department's mission;
                  ``(B) there are no alternatives to the capability or 
                asset provided by such program that will provide equal 
                or greater capability in both a more cost-effective and 
                timely manner;
                  ``(C) the new acquisition schedule and estimates for 
                total acquisition cost are reasonable; and
                  ``(D) the management structure for such program is 
                adequate to manage and control cost, schedule, and 
                performance.
  ``(c) Congressional Homeland Security Committees Defined.--In this 
section, the term `congressional homeland security committees' means--
          ``(1) the Committee on Homeland Security of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs of the Senate; and
          ``(2) the Committee on Appropriations of the House of 
        Representatives and the Committee on Appropriations of the 
        Senate.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 837, as added by this Act, the following new item:

``Sec. 838. Congressional notification and other requirements for major 
acquisition program breach.''.

SEC. 232. MULTIYEAR ACQUISITION STRATEGY.

  (a) In General.--Subtitle D of title VIII of the Homeland Security 
Act of 2002 (6 U.S.C. 391 et seq.) is further amended by adding at the 
end the following new section:

``SEC. 839. MULTIYEAR ACQUISITION STRATEGY.

  ``(a) Multiyear Acquisition Strategy Required.--
          ``(1) In general.--Not later than one year after the date of 
        the enactment of this section, the Secretary shall submit to 
        the appropriate congressional committees and the Comptroller 
        General of the United States a multiyear acquisition strategy 
        to guide the overall direction of the acquisitions of the 
        Department while allowing flexibility to deal with ever-
        changing threats and risks, to keep pace with changes in 
        technology that could impact deliverables, and to help industry 
        better understand, plan, and align resources to meet the future 
        acquisition needs of the Department. Such strategy shall be 
        updated and included in each Future Years Homeland Security 
        Program required under section 874.
          ``(2) Form.--The strategy required under paragraph (1) shall 
        be submitted in unclassified form but may include a classified 
        annex for any sensitive or classified information if necessary. 
        The Secretary shall publish such strategy in an unclassified 
        format that is publicly available.
  ``(b) Consultation.--In developing the strategy required under 
subsection (a), the Secretary shall, as the Secretary determines 
appropriate, consult with headquarters, components, employees in the 
field, and individuals from industry and the academic community.
  ``(c) Contents of Strategy.--The strategy shall include the 
following:
          ``(1) Prioritized list.--A systematic and integrated 
        prioritized list developed by the Under Secretary for 
        Management in coordination with all of the Component 
        Acquisition Executives of Department major acquisition programs 
        that Department and component acquisition investments seek to 
        address, including the expected security and economic benefit 
        of the program or system that is the subject of acquisition and 
        an analysis of how the security and economic benefit derived 
        from such program or system will be measured.
          ``(2) Inventory.--A plan to develop a reliable Department-
        wide inventory of investments and real property assets to help 
        the Department--
                  ``(A) plan, budget, schedule, and acquire upgrades of 
                its systems and equipment; and
                  ``(B) plan for the acquisition and management of 
                future systems and equipment.
          ``(3) Funding gaps.--A plan to address funding gaps between 
        funding requirements for major acquisition programs and known 
        available resources, including, to the maximum extent 
        practicable, ways of leveraging best practices to identify and 
        eliminate overpayment for items to--
                  ``(A) prevent wasteful purchasing;
                  ``(B) achieve the greatest level of efficiency and 
                cost savings by rationalizing purchases;
                  ``(C) align pricing for similar items; and
                  ``(D) utilize purchase timing and economies of scale.
          ``(4) Identification of capabilities.--An identification of 
        test, evaluation, modeling, and simulation capabilities that 
        will be required to--
                  ``(A) support the acquisition of technologies to meet 
                the needs of such strategy;
                  ``(B) leverage to the greatest extent possible 
                emerging technological trends and research and 
                development trends within the public and private 
                sectors; and
                  ``(C) identify ways to ensure that appropriate 
                technology is acquired and integrated into the 
                Department's operating doctrine to improve mission 
                performance.
          ``(5) Focus on flexible solutions.--An assessment of ways the 
        Department can improve its ability to test and acquire 
        innovative solutions to allow needed incentives and protections 
        for appropriate risk-taking in order to meet its acquisition 
        needs with resiliency, agility, and responsiveness to assure 
        homeland security and facilitate trade.
          ``(6) Focus on incentives to save taxpayer dollars.--An 
        assessment of ways the Department can develop incentives for 
        program managers and senior Department acquisition officials 
        to--
                  ``(A) prevent cost overruns;
                  ``(B) avoid schedule delays; and
                  ``(C) achieve cost savings in major acquisition 
                programs.
          ``(7) Focus on addressing delays and bid protests.--An 
        assessment of ways the Department can improve the acquisition 
        process to minimize cost overruns in--
                  ``(A) requirements development;
                  ``(B) procurement announcements;
                  ``(C) requests for proposals;
                  ``(D) evaluation of proposals;
                  ``(E) protests of decisions and awards; and
                  ``(F) the use of best practices.
          ``(8) Focus on improving outreach.--An identification and 
        assessment of ways to increase opportunities for communication 
        and collaboration with industry, small and disadvantaged 
        businesses, intra-government entities, university centers of 
        excellence, accredited certification and standards development 
        organizations, and national laboratories to ensure that the 
        Department understands the market for technologies, products, 
        and innovation that is available to meet its mission needs and 
        to inform the Department's requirements-setting process before 
        engaging in an acquisition, including--
                  ``(A) methods designed especially to engage small and 
                disadvantaged businesses, a cost-benefit analysis of 
                the tradeoffs that small and disadvantaged businesses 
                provide, information relating to barriers to entry for 
                small and disadvantaged businesses, and information 
                relating to unique requirements for small and 
                disadvantaged businesses; and
                  ``(B) within the Department Vendor Communication Plan 
                and Market Research Guide, instructions for interaction 
                by acquisition program managers with such entities to--
                          ``(i) prevent misinterpretation of 
                        acquisition regulations; and
                          ``(ii) permit, within legal and ethical 
                        boundaries, interacting with such entities with 
                        transparency.
          ``(9) Competition.--A plan regarding competition under 
        subsection (d).
          ``(10) Acquisition workforce.--A plan regarding the 
        Department acquisition workforce under subsection (e).
  ``(d) Competition Plan.--The strategy required under subsection (a) 
shall also include a plan to address actions to ensure competition, or 
the option of competition, for major acquisition programs. Such plan 
may include assessments of the following measures in appropriate cases 
if such measures are cost effective:
          ``(1) Competitive prototyping.
          ``(2) Dual-sourcing.
          ``(3) Unbundling of contracts.
          ``(4) Funding of next-generation prototype systems or 
        subsystems.
          ``(5) Use of modular, open architectures to enable 
        competition for upgrades.
          ``(6) Acquisition of complete technical data packages.
          ``(7) Periodic competitions for subsystem upgrades.
          ``(8) Licensing of additional suppliers, including small 
        businesses.
          ``(9) Periodic system or program reviews to address long-term 
        competitive effects of program decisions.
  ``(e) Acquisition Workforce Plan.--
          ``(1) Acquisition workforce.--The strategy required under 
        subsection (a) shall also include a plan to address Department 
        acquisition workforce accountability and talent management that 
        identifies the acquisition workforce needs of each component 
        performing acquisition functions and develops options for 
        filling such needs with qualified individuals, including a 
        cost-benefit analysis of contracting for acquisition 
        assistance.
          ``(2) Additional matters covered.--The acquisition workforce 
        plan under this subsection shall address ways to--
                  ``(A) improve the recruitment, hiring, training, and 
                retention of Department acquisition workforce 
                personnel, including contracting officer's 
                representatives, in order to retain highly qualified 
                individuals who have experience in the acquisition life 
                cycle, complex procurements, and management of large 
                programs;
                  ``(B) empower program managers to have the authority 
                to manage their programs in an accountable and 
                transparent manner as such managers work with the 
                acquisition workforce;
                  ``(C) prevent duplication within Department 
                acquisition workforce training and certification 
                requirements through leveraging already-existing 
                training within the Federal Government, academic 
                community, or private industry;
                  ``(D) achieve integration and consistency with 
                Government-wide training and accreditation standards, 
                acquisition training tools, and training facilities;
                  ``(E) designate the acquisition positions that will 
                be necessary to support the Department acquisition 
                requirements, including in the fields of--
                          ``(i) program management;
                          ``(ii) systems engineering;
                          ``(iii) procurement, including contracting;
                          ``(iv) test and evaluation;
                          ``(v) life cycle logistics;
                          ``(vi) cost estimating and program financial 
                        management; and
                          ``(vii) additional disciplines appropriate to 
                        Department mission needs;
                  ``(F) strengthen the performance of contracting 
                officers' representatives (as defined in subpart 1.602-
                2 and subpart 2.101 of the Federal Acquisition 
                Regulation), including by--
                          ``(i) assessing the extent to which such 
                        representatives are certified and receive 
                        training that is appropriate;
                          ``(ii) assessing what training is most 
                        effective with respect to the type and 
                        complexity of assignment; and
                          ``(iii) implementing actions to improve 
                        training based on such assessments; and
                  ``(G) identify ways to increase training for relevant 
                investigators and auditors of the Department to examine 
                fraud in major acquisition programs, including 
                identifying opportunities to leverage existing 
                Government and private sector resources in coordination 
                with the Inspector General of the Department.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 838, as added by this Act, the following new item:

``Sec. 839. Multiyear acquisition strategy.''.

  (c) Government Accountability Office Review of Multi-year Acquisition 
Strategy.--
          (1) Review.--After submission of the first multiyear 
        acquisition strategy in accordance with section 839 of the 
        Homeland Security Act of 2002, as added by subsection (a), 
        after the date of the enactment of this Act, the Comptroller 
        General of the United States shall conduct a review of such 
        plan within 180 days to analyze the viability of such plan's 
        effectiveness in the following:
                  (A) Complying with the requirements of such section 
                839.
                  (B) Establishing clear connections between Department 
                of Homeland Security objectives and acquisition 
                priorities.
                  (C) Demonstrating that Department acquisition policy 
                reflects program management best practices and 
                standards.
                  (D) Ensuring competition or the option of competition 
                for major acquisition programs.
                  (E) Considering potential cost savings through using 
                already-existing technologies when developing 
                acquisition program requirements.
                  (F) Preventing duplication within Department 
                acquisition workforce training requirements through 
                leveraging already-existing training within the Federal 
                Government, academic community, or private industry.
                  (G) Providing incentives for acquisition program 
                managers to reduce acquisition and procurement costs 
                through the use of best practices and disciplined 
                program management.
          (2) Definitions.--The terms ``acquisition'', ``best 
        practices'', and ``major acquisition programs'' have the 
        meaning given such terms in section 830 of the Homeland 
        Security Act of 2002, as added by section 201.
          (3) Report.--Not later than 180 days after the completion of 
        the review required by subsection (a), the Comptroller General 
        of the United States shall submit to the Committee on Homeland 
        Security and the Committee on Appropriations of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs and the Committee on Appropriations of the 
        Senate a report on the review. Such report shall be submitted 
        in unclassified form but may include a classified annex.

SEC. 233. ACQUISITION REPORTS.

  (a) In General.--Subtitle D of title VIII of the Homeland Security 
Act of 2002 (6 U.S.C. 391 et seq.) is further amended by adding at the 
end the following new section:

``SEC. 840. ACQUISITION REPORTS.

  ``(a) Comprehensive Acquisition Status Report.--
          ``(1) In general.--At the same time as the President's budget 
        is submitted for a fiscal year under section 1105(a) of title 
        31, United States Code, the Under Secretary for Management 
        shall submit to the congressional homeland security committees 
        an annual comprehensive acquisition status report. The report 
        shall include the following:
                  ``(A) The information required under the heading 
                `Office of the Under Secretary for Management' under 
                title I of division D of the Consolidated 
                Appropriations Act, 2012 (Public Law 112-74) (as 
                required under the Department of Homeland Security 
                Appropriations Act, 2013 (Public Law 113-6)).
                  ``(B) A listing of programs that have been cancelled, 
                modified, paused, or referred to the Under Secretary 
                for Management or Deputy Secretary for additional 
                oversight or action by the Board, Department Office of 
                Inspector General, or the Comptroller General.
                  ``(C) A listing of established Executive Steering 
                Committees, which provide governance of a program or 
                related set of programs and lower-tiered oversight, and 
                support between acquisition decision events and 
                component reviews, including the mission and membership 
                for each.
          ``(2) Information for major acquisition programs.--For each 
        major acquisition program, the report shall include the 
        following:
                  ``(A) A narrative description, including current gaps 
                and shortfalls, the capabilities to be fielded, and the 
                number of planned increments or units.
                  ``(B) Acquisition Review Board (or other board 
                designated to review the acquisition) status of each 
                acquisition, including the current acquisition phase, 
                the date of the last review, and a listing of the 
                required documents that have been reviewed with the 
                dates reviewed or approved.
                  ``(C) The most current, approved acquisition program 
                baseline (including project schedules and events).
                  ``(D) A comparison of the original acquisition 
                program baseline, the current acquisition program 
                baseline, and the current estimate.
                  ``(E) Whether or not an independent verification and 
                validation has been implemented, with an explanation 
                for the decision and a summary of any findings.
                  ``(F) A rating of cost risk, schedule risk, and 
                technical risk associated with the program (including 
                narrative descriptions and mitigation actions).
                  ``(G) Contract status (including earned value 
                management data as applicable).
                  ``(H) A lifecycle cost of the acquisition, and time 
                basis for the estimate.
          ``(3) Updates.--The Under Secretary shall submit quarterly 
        updates to such report not later than 45 days after the 
        completion of each quarter.
  ``(b) Quarterly Program Accountability Report.--The Under Secretary 
for Management shall prepare a quarterly program accountability report 
to meet the mandate of the Department to perform program health 
assessments and improve program execution and governance. The report 
shall be submitted to the congressional homeland security committees.
  ``(c) Congressional Homeland Security Committees Defined.--In this 
section, the term `congressional homeland security committees' means--
          ``(1) the Committee on Homeland Security of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs of the Senate; and
          ``(2) the Committee on Appropriations of the House of 
        Representatives and the Committee on Appropriations of the 
        Senate.''.
  (b) Level 3 Acquisition Programs of Components of the Department.--
          (1) In general.--Not later than 60 days after the date of the 
        enactment of this Act, component heads of the Department of 
        Homeland Security shall identify to the Under Secretary for 
        Management of the Department all level 3 acquisition programs 
        of each respective component. Not later than 30 days after 
        receipt of such information, the Under Secretary shall certify 
        in writing to the congressional homeland security committees 
        whether such component heads have properly identified such 
        programs. To carry out this paragraph, the Under Secretary 
        shall establish a process with a repeatable methodology to 
        continually identify level 3 acquisition programs.
          (2) Policies and guidance.--Not later than 180 days after the 
        date of the enactment of this Act, component heads of the 
        Department of Homeland Security shall submit to the Under 
        Secretary for Management of the Department their respective 
        policies and relevant guidance for level 3 acquisition programs 
        of each respective component. Not later than 90 days after 
        receipt of such policies and guidance, the Under Secretary for 
        Management shall certify to the congressional homeland security 
        committees that each component's respective policies and 
        guidance adhere to Department-wide acquisition policies.
  (c) Clerical Amendment.--The table of contents in section 1(b) of 
such Act is further amended by inserting after the item relating to 
section 839 the following new item:

``840. Acquisition reports.''.

            TITLE III--INTELLIGENCE AND INFORMATION SHARING

  Subtitle A--Department of Homeland Security Intelligence Enterprise

SEC. 301. HOMELAND INTELLIGENCE DOCTRINE.

  (a) In General.--Subtitle A of title II of the Homeland Security Act 
of 2002 (6 U.S.C. 121 et seq.) is amended by adding at the end the 
following new section:

``SEC. 210G. HOMELAND INTELLIGENCE DOCTRINE.

  ``(a) In General.--Not later than 180 days after the date of the 
enactment of this section, the Secretary, acting through the Chief 
Intelligence Officer of the Department, in coordination with 
intelligence components of the Department, the Office of the General 
Counsel, the Privacy Office, and the Office for Civil Rights and Civil 
Liberties, shall develop and disseminate written Department-wide 
guidance for the processing, analysis, production, and dissemination of 
homeland security information (as such term is defined in section 892) 
and terrorism information (as such term is defined in section 1016 of 
the Intelligence Reform and Terrorism Prevention Act of 2004 (6 U.S.C. 
485)).
  ``(b) Contents.--The guidance required under subsection (a) shall, at 
a minimum, include the following:
          ``(1) A description of guiding principles and purposes of the 
        Department's intelligence enterprise.
          ``(2) A summary of the roles and responsibilities of each 
        intelligence component of the Department and programs of the 
        intelligence components of the Department in the processing, 
        analysis, production, or dissemination of homeland security 
        information and terrorism information, including relevant 
        authorities and restrictions applicable to each intelligence 
        component of the Department and programs of each such 
        intelligence components.
          ``(3) Guidance for the processing, analysis, and production 
        of such information.
          ``(4) Guidance for the dissemination of such information, 
        including within the Department, among and between Federal 
        departments and agencies, among and between State, local, 
        tribal, and territorial governments, including law enforcement, 
        and with foreign partners and the private sector.
          ``(5) An assessment and description of how the dissemination 
        to the intelligence community (as such term is defined in 
        section 3(4) of the National Security Act of 1947 (50 U.S.C. 
        3003(4))) and Federal law enforcement of homeland security 
        information and terrorism information assists such entities in 
        carrying out their respective missions.
  ``(c) Form.--The guidance required under subsection (a) shall be 
submitted in unclassified form, but may include a classified annex.
  ``(d) Annual Review.--For each of the five fiscal years beginning 
with the fiscal year that begins after the date of the enactment of 
this section, the Secretary shall conduct a review of the guidance 
required under subsection (a) and, as appropriate, revise such 
guidance.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 210F the following new item:

``Sec. 210G. Homeland intelligence doctrine.''.

SEC. 302. ANALYSTS FOR THE CHIEF INTELLIGENCE OFFICER.

  Paragraph (1) of section 201(e) of the Homeland Security Act of 2002 
(6 U.S.C. 121(e)) is amended by adding at the end the following new 
sentence: ``The Secretary shall also provide the Chief Intelligence 
Officer with a staff having appropriate expertise and experience to 
assist the Chief Intelligence Officer.''.

SEC. 303. ANNUAL HOMELAND TERRORIST THREAT ASSESSMENTS.

  (a) In General.--Subtitle A of title II of the Homeland Security Act 
of 2002 (6 U.S.C. 121 et seq.), as amended by section 301 of this Act, 
is further amended by adding at the end the following new section:

``SEC. 210H. HOMELAND TERRORIST THREAT ASSESSMENTS.

  ``(a) In General.--Not later than 180 days after the date of the 
enactment of this section and for each of the next five fiscal years 
(beginning in the fiscal year that begins after the date of the 
enactment of this section) the Secretary, acting through the Under 
Secretary for Intelligence and Analysis, and using departmental 
information, including component information, and information provided 
through State and major urban area fusion centers, shall conduct an 
assessment of the terrorist threat to the homeland.
  ``(b) Contents.--Each assessment under subsection (a) shall include 
the following:
          ``(1) Empirical data assessing terrorist activities and 
        incidents over time in the United States, including terrorist 
        activities and incidents planned or supported by persons 
        outside of the United States targeting the homeland.
          ``(2) An evaluation of current terrorist tactics, as well as 
        ongoing and possible future changes in terrorist tactics.
          ``(3) An assessment of criminal activity encountered or 
        observed by officers or employees of components in the field 
        which is suspected of financing terrorist activity.
          ``(4) Detailed information on all individuals denied entry to 
        or removed from the United States as a result of material 
        support provided to a foreign terrorist organization (as such 
        term is used in section 219 of the Immigration and Nationality 
        Act (8 U.S.C. 1189)).
          ``(5) The efficacy and spread of foreign terrorist 
        organization propaganda, messaging, or recruitment.
          ``(6) An assessment of threats, including cyber threats, to 
        the homeland, including to critical infrastructure and Federal 
        civilian networks.
          ``(7) An assessment of current and potential terrorism and 
        criminal threats posed by individuals and organized groups 
        seeking to unlawfully enter the United States.
          ``(8) An assessment of threats to the transportation sector, 
        including surface and aviation transportation systems.
  ``(c) Additional Information.--The assessments required under 
subsection (a)--
          ``(1) shall, to the extent practicable, utilize existing 
        component data collected from the field; and
          ``(2) may incorporate relevant information and analysis from 
        other agencies of the Federal Government, agencies of State and 
        local governments (including law enforcement agencies), as well 
        as the private sector, disseminated in accordance with standard 
        information sharing procedures and policies.
  ``(d) Form.--The assessments required under subsection (a) shall be 
shared with the appropriate congressional committees and submitted in 
classified form, but--
          ``(1) shall include unclassified summaries; and
          ``(2) may include unclassified annexes, if appropriate.''.
  (b) Conforming Amendment.--Subsection (d) of section 201 of the 
Homeland Security Act of 2002 (6 U.S.C. 121) is amended by adding at 
the end the following new paragraph:
          ``(27) To carry out section 210H (relating to homeland 
        terrorist threat assessments).''.
  (c) Clerical Amendment.--The table of contents of the Homeland 
Security Act of 2002 is amended by inserting after the item relating to 
section 210G, as added by this Act, the following new item:

``Sec. 210H. Homeland terrorist threat assessments.''.

SEC. 304. DEPARTMENT OF HOMELAND SECURITY DATA FRAMEWORK.

  (a) In General.--The Secretary of Homeland Security shall develop a 
data framework to integrate existing Department of Homeland Security 
datasets and systems, as appropriate, for access by authorized 
personnel in a manner consistent with relevant legal authorities and 
privacy, civil rights, and civil liberties policies and protections. In 
developing such framework, the Secretary shall ensure, in accordance 
with all applicable statutory and regulatory requirements, the 
following information is included:
          (1) All information acquired, held, or obtained by an office 
        or component of the Department that falls within the scope of 
        the information sharing environment, including homeland 
        security information, terrorism information, weapons of mass 
        destruction information, and national intelligence.
          (2) Any information or intelligence relevant to priority 
        mission needs and capability requirements of the homeland 
        security enterprise, as determined appropriate by the 
        Secretary.
  (b) Data Framework Access.--
          (1) In general.--The Secretary of Homeland Security shall 
        ensure that the data framework required under this section is 
        accessible to employees of the Department of Homeland Security 
        who the Secretary determines--
                  (A) have an appropriate security clearance;
                  (B) are assigned to perform a function that requires 
                access to information in such framework; and
                  (C) are trained in applicable standards for 
                safeguarding and using such information.
          (2) Guidance.--The Secretary of Homeland Security shall--
                  (A) issue guidance for Department of Homeland 
                Security employees authorized to access and contribute 
                to the data framework pursuant to paragraph (1); and
                  (B) ensure that such guidance enforces a duty to 
                share between offices and components of the Department 
                when accessing or contributing to such framework for 
                mission needs.
          (3) Efficiency.--The Secretary of Homeland Security shall 
        promulgate data standards and instruct components of the 
        Department of Homeland Security to make available information 
        through the data framework under this section in a machine-
        readable standard format, to the greatest extent practicable.
  (c) Exclusion of Information.--The Secretary of Homeland Security may 
exclude from the data framework information that the Secretary 
determines access to or the confirmation of the existence of could--
          (1) jeopardize the protection of sources, methods, or 
        activities;
          (2) compromise a criminal or national security investigation;
          (3) be inconsistent with the other Federal laws or 
        regulations; or
          (4) be duplicative or not serve an operational purpose if 
        included in such framework.
  (d) Safeguards.--The Secretary of Homeland Security shall incorporate 
into the date framework systems capabilities for auditing and ensuring 
the security of information included in such framework. Such 
capabilities shall include the following:
          (1) Mechanisms for identifying insider threats.
          (2) Mechanisms for identifying security risks.
          (3) Safeguards for privacy, civil rights, and civil 
        liberties.
  (e) Deadline for Implementation.--Not later than two years after the 
date of the enactment of this Act, the Secretary of Homeland Security 
shall ensure the data framework required under this section has the 
ability to include appropriate information in existence within the 
Department of Homeland Security to meet its critical mission 
operations.
  (f) Notice to Congress.--
          (1) Operational notification.--Not later than 60 days after 
        the date on which the data framework required under this 
        section is fully operational, the Secretary of Homeland 
        Security shall provide notice to the appropriate congressional 
        committees of such.
          (2) Regular status.--The Secretary shall submit to the 
        appropriate congressional committees regular updates on the 
        status of the data framework required under this section, 
        including, when applicable, the use of such data framework to 
        support classified operations.
  (g) Definitions.--In this section:
          (1) National intelligence.--The term ``national 
        intelligence'' has the meaning given such term in section 3(5) 
        of the National Security Act of 1947 (50 U.S.C. 3003(5)).
          (2) Appropriate congressional committee.--The term 
        ``appropriate congressional committee'' has the meaning given 
        such term in section 2(2) of the Homeland Security Act of 2002 
        (6 U.S.C. 101(11)).

SEC. 305. ESTABLISHMENT OF INSIDER THREAT PROGRAM.

  (a) In General.--Title I of the Homeland Security Act of 2002 (6 
U.S.C. 111 et seq.) is amended by adding at the end the following new 
section:

``SEC. 104. INSIDER THREAT PROGRAM.

  ``(a) Establishment.--The Secretary shall establish an Insider Threat 
Program within the Department. Such Program shall--
          ``(1) provide training and education for Department personnel 
        to identify, prevent, mitigate, and respond to insider threat 
        risks to the Department's critical assets;
          ``(2) provide investigative support regarding potential 
        insider threats that may pose a risk to the Department's 
        critical assets; and
          ``(3) conduct risk mitigation activities for insider threats.
  ``(b) Steering Committee.--
          ``(1) In general.--The Secretary shall establish a Steering 
        Committee within the Department. The Under Secretary for 
        Intelligence and Analysis shall serve as the Chair of the 
        Steering Committee. The Chief Security Officer shall serve as 
        the Vice Chair. The Steering Committee shall be comprised of 
        representatives of the Office of Intelligence and Analysis, the 
        Office of the Chief Information Officer, the Office of the 
        General Counsel, the Office for Civil Rights and Civil 
        Liberties, the Privacy Office, the Office of the Chief Human 
        Capital Officer, the Office of the Chief Financial Officer, the 
        Federal Protective Service, the Office of the Chief Procurement 
        Officer, the Science and Technology Directorate, and other 
        components or offices of the Department as appropriate. Such 
        representatives shall meet on a regular basis to discuss cases 
        and issues related to insider threats to the Department's 
        critical assets, in accordance with subsection (a).
          ``(2) Responsibilities.--Not later than one year after the 
        date of the enactment of this section, the Under Secretary for 
        Intelligence and Analysis and the Chief Security Officer, in 
        coordination with the Steering Committee established pursuant 
        to paragraph (1), shall--
                  ``(A) develop a holistic strategy for Department-wide 
                efforts to identify, prevent, mitigate, and respond to 
                insider threats to the Department's critical assets;
                  ``(B) develop a plan to implement the insider threat 
                measures identified in the strategy developed under 
                subparagraph (A) across the components and offices of 
                the Department;
                  ``(C) document insider threat policies and controls;
                  ``(D) conduct a baseline risk assessment of insider 
                threats posed to the Department's critical assets;
                  ``(E) examine existing programmatic and technology 
                best practices adopted by the Federal Government, 
                industry, and research institutions to implement 
                solutions that are validated and cost-effective;
                  ``(F) develop a timeline for deploying workplace 
                monitoring technologies, employee awareness campaigns, 
                and education and training programs related to 
                identifying, preventing, mitigating, and responding to 
                potential insider threats to the Department's critical 
                assets;
                  ``(G) require the Chair and Vice Chair of the 
                Steering Committee to consult with the Under Secretary 
                for Science and Technology and other appropriate 
                stakeholders to ensure the Insider Threat Program is 
                informed, on an ongoing basis, by current information 
                regarding threats, beset practices, and available 
                technology; and
                  ``(H) develop, collect, and report metrics on the 
                effectiveness of the Department's insider threat 
                mitigation efforts.
  ``(c) Definitions.--In this section:
          ``(1) Critical assets.--The term `critical assets' means the 
        people, facilities, information, and technology required for 
        the Department to fulfill its mission.
          ``(2) Insider.--The term `insider' means--
                  ``(A) any person who has access to classified 
                national security information and is employed by, 
                detailed to, or assigned to the Department, including 
                members of the Armed Forces, experts or consultants to 
                the Department, industrial or commercial contractors, 
                licensees, certificate holders, or grantees of the 
                Department, including all subcontractors, personal 
                services contractors, or any other category of person 
                who acts for or on behalf of the Department, as 
                determined by the Secretary; or
                  ``(B) State, local, tribal, territorial, and private 
                sector personnel who possess security clearances 
                granted by the Department.
          ``(3) Insider threat.--The term `insider threat' means the 
        threat that an insider will use his or her authorized access, 
        wittingly or unwittingly, to do harm to the security of the 
        United States, including damage to the United States through 
        espionage, terrorism, the unauthorized disclosure of classified 
        national security information, or through the loss or 
        degradation of departmental resources or capabilities.''.
  (b) Reporting.--
          (1) In general.--Not later than two years after the date of 
        the enactment of section 104 of the Homeland Security Act of 
        2002 (as added by subsection (a) of this section) and the 
        biennially thereafter for the next four years, the Secretary of 
        Homeland Security shall submit to the Committee on Homeland 
        Security and the Permanent Select Committee on Intelligence of 
        the House of Representatives and the Committee on Homeland 
        Security and Governmental Affairs and the Select Committee on 
        Intelligence of the Senate a report on how the Department of 
        Homeland Security and its components and offices have 
        implemented the strategy developed pursuant to subsection 
        (b)(2)(A) of such section 104, the status of the Department's 
        risk assessment of critical assets, the types of insider threat 
        training conducted, the number of Department employees who have 
        received such training, and information on the effectiveness of 
        the Insider Threat Program (established pursuant to subsection 
        (a) of such section 104), based on metrics developed, 
        collected, and reported pursuant to subsection (b)(2)(H) of 
        such section 104.
          (2) Definitions.--In this subsection, the terms ``critical 
        assets'', ``insider'', and ``insider threat'' have the meanings 
        given such terms in section 104 of the Homeland Security Act of 
        2002 (as added by subsection (a) of this section).
  (c) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 103 the following new item:

``Sec. 104. Insider Threat Program.''.

SEC. 306. THREAT ASSESSMENT ON TERRORIST USE OF VIRTUAL CURRENCY.

  (a) In General.--Not later than 120 days after the date of the 
enactment of this Act, the Under Secretary of Homeland Security for 
Intelligence and Analysis, as authorized by section 201(b)(1) of the 
Homeland Security Act of 2002 (6 U.S.C. 121), shall, in coordination 
with appropriate Federal partners, develop and disseminate a threat 
assessment regarding the actual and potential threat posed by 
individuals using virtual currency to carry out activities in 
furtherance of an act of terrorism, including the provision of material 
support or resources to a foreign terrorist organization. Consistent 
with the protection of classified and confidential unclassified 
information, the Under Secretary shall share the threat assessment 
developed under this section with State, local, and tribal law 
enforcement officials, including officials that operate within State, 
local, and regional fusion centers through the Department of Homeland 
Security State, Local, and Regional Fusion Center Initiative 
established in section 210A of the Homeland Security Act of 2002 (6 
U.S.C. 124h).
  (b) Definitions.--In this section:
          (1) Foreign terrorist organization.--The term ``foreign 
        terrorist organization'' means an organization designated as a 
        foreign terrorist organization under section 219 of the 
        Immigration and Nationality Act (8 U.S.C. 1189).
          (2) Virtual currency.--The term ``virtual currency'' means a 
        digital representation of value that functions as a medium of 
        exchange, a unit of account, or a store of value.

SEC. 307. DEPARTMENT OF HOMELAND SECURITY COUNTERTERRORISM ADVISORY 
                    BOARD.

  (a) In General.--Subtitle A of title II of the Homeland Security Act 
of 2002 (6 U.S.C. 121 et seq.), as amended by sections 301 and 303 of 
this Act, is further amended by adding at the end the following new 
section:

``SEC. 210I. DEPARTMENTAL COORDINATION ON COUNTERTERRORISM.

  ``(a) Establishment.--There is in the Department a board to be 
composed of senior representatives of departmental operational 
components and headquarters elements. The purpose of the board shall be 
to coordinate and integrate departmental intelligence, activities, and 
policy related to the counterterrorism mission and functions of the 
Department.
  ``(b) Charter.--There shall be a charter to govern the structure and 
mission of the board. Such charter shall direct the board to focus on 
the current threat environment and the importance of aligning 
departmental counterterrorism activities under the Secretary's 
guidance. The charter shall be reviewed and updated every four years, 
as appropriate.
  ``(c) Members.--
          ``(1) Chair.--The Secretary shall appoint a Coordinator for 
        Counterterrorism within the Department who will serve as the 
        chair of the board.
          ``(2) Additional members.--The Secretary shall appoint 
        additional members of the board from among the following:
                  ``(A) The Transportation Security Administration.
                  ``(B) U.S. Customs and Border Protection.
                  ``(C) U.S. Immigration and Customs Enforcement.
                  ``(D) The Federal Emergency Management Agency.
                  ``(E) The Coast Guard.
                  ``(F) United States Citizenship and Immigration 
                Services.
                  ``(G) The United States Secret Service.
                  ``(H) The National Protection and Programs 
                Directorate.
                  ``(I) The Office of Operations Coordination.
                  ``(J) The Office of the General Counsel.
                  ``(K) The Office of Intelligence and Analysis.
                  ``(L) The Office of Policy.
                  ``(M) The Science and Technology Directorate.
                  ``(N) Other departmental offices and programs as 
                determined appropriate by the Secretary.
  ``(d) Meetings.--The board shall meet on a regular basis to discuss 
intelligence and coordinate ongoing threat mitigation efforts and 
departmental activities, including coordination with other Federal, 
State, local, tribal, territorial, and private sector partners, and 
shall make recommendations to the Secretary.
  ``(e) Terrorism Alerts.--The board shall advise the Secretary on the 
issuance of terrorism alerts pursuant to section 203 of this Act.
  ``(f) Prohibition on Additional Funds.--No additional funds are 
authorized to carry out this section.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 210H, as added by this Act, the following new item:

``Sec. 210I. Departmental coordination on counterterrorism.''.

  (c) Report.--Not later than 90 days after the date of the enactment 
of this Act, the Secretary of Homeland Security, acting through the 
Coordinator for Counterterrorism, shall submit to the Committee on 
Homeland Security of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs of the Senate a report on 
the status and activities of the board established under section 210I 
of the Homeland Security Act of 2002, as added by subsection (a) of 
this section.

SEC. 308. BORDER AND GANG THREAT ASSESSMENT.

  (a) In General.--Not later than 90 days after the date of the 
enactment of this Act, the Secretary of Homeland Security shall conduct 
a threat assessment on whether human smuggling organizations and 
transnational gangs are exploiting vulnerabilities in border security 
screening programs to gain access to the United States and threaten the 
United States or border security.
  (b) Recommendations.--Upon completion of the threat assessment 
required under subsection (a), the Secretary of Homeland Security shall 
make a determination if any changes are required to address security 
vulnerabilities identified in such assessment.

SEC. 309. SECURITY CLEARANCE MANAGEMENT AND ADMINISTRATION.

  (a) In General.--Title VII of the Homeland Security Act of 2002 is 
amended--
          (1) by inserting before section 701 (6 U.S.C. 341) the 
        following:

                ``Subtitle A--Headquarters Activities'';

        and
          (2) by adding at the end the following new subtitle:

                   ``Subtitle B--Security Clearances

``SEC. 731. DESIGNATION OF NATIONAL SECURITY SENSITIVE AND PUBLIC TRUST 
                    POSITIONS.

  ``(a) In General.--The Secretary shall require the designation of the 
sensitivity level of national security positions (pursuant to part 1400 
of title 5, Code of Federal Regulations, or similar successor 
regulation) be conducted in a consistent manner with respect to all 
components and offices of the Department, and consistent with Federal 
guidelines.
  ``(b) Implementation.--In carrying out subsection (a), the Secretary 
shall require the utilization of uniform designation tools throughout 
the Department and provide training to appropriate staff of the 
Department on such utilization. Such training shall include guidance on 
factors for determining eligibility for access to classified 
information and eligibility to hold a national security position.

``SEC. 732. REVIEW OF POSITION DESIGNATIONS.

  ``(a) In General.--Not later than one year after the date of the 
enactment of this subtitle, and every five years thereafter, the 
Secretary shall review all sensitivity level designations of national 
security positions (pursuant to part 1400 of title 5, Code of Federal 
Regulations, or similar successor regulation) at the Department.
  ``(b) Determination.--If during the course of a review required under 
subsection (a), the Secretary determines that a change in the 
sensitivity level of a position that affects the need for an individual 
to obtain access to classified information is warranted, such access 
shall be administratively adjusted and an appropriate level periodic 
reinvestigation completed, as necessary.
  ``(c) Congressional Reporting.--Upon completion of each review 
required under subsection (a), the Secretary shall report to the 
Committee on Homeland Security of the House of Representatives and the 
Committee on Homeland Security and Governmental Affairs of the Senate 
on the findings of each such review, including the number of positions 
by classification level and by component and office of the Department 
in which the Secretary made a determination in accordance with 
subsection (b) to--
          ``(1) require access to classified information;
          ``(2) no longer require access to classified information; or
          ``(3) otherwise require a different level of access to 
        classified information.

``SEC. 733. AUDITS.

  ``Beginning not later than 180 days after the date of the enactment 
of this section, the Inspector General of the Department shall conduct 
regular audits of compliance of the Department with part 1400 of title 
5, Code of Federal Regulations, or similar successor regulation.

``SEC. 734. REPORTING.

  ``(a) In General.--The Secretary shall annually through fiscal year 
2022 submit to the Committee on Homeland Security and the Committee on 
Oversight and Government Reform of the House of Representatives and the 
Committee on Homeland Security and Governmental Affairs of the Senate a 
report on the following:
          ``(1) The number of denials, suspensions, revocations, and 
        appeals of the eligibility for access to classified information 
        of an individual throughout the Department.
          ``(2) The date and status or disposition of each reported 
        action under paragraph (1).
          ``(3) The identification of the sponsoring entity, whether by 
        a component, office, or headquarters of the Department, of each 
        action under paragraph (1), and description of the grounds for 
        each such action.
          ``(4) Demographic data, including data relating to race, sex, 
        national origin, and disability, of each individual for whom 
        eligibility for access to classified information was denied, 
        suspended, revoked, or appealed, and the number of years that 
        each such individual was eligible for access to such 
        information.
          ``(5) In the case of a suspension in excess of 180 days, an 
        explanation for such duration.
  ``(b) Form.--The report required under subsection (a) shall be 
submitted in unclassified form and be made publicly available, but may 
include a classified annex for any sensitive or classified information 
if necessary.

``SEC. 735. UNIFORM ADJUDICATION, SUSPENSION, DENIAL, AND REVOCATION.

  ``Not later than one year after the date of the enactment of this 
section, the Secretary, in consultation with the Homeland Security 
Advisory Committee, shall develop a plan to achieve greater uniformity 
within the Department with respect to the adjudication of eligibility 
of an individual for access to classified information that are 
consistent with the Adjudicative Guidelines for Determining Access to 
Classified Information published on December 29, 2005, or similar 
successor regulation. The Secretary shall submit to the Committee on 
Homeland Security of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs of the Senate the plan. The 
plan shall consider the following:
          ``(1) Mechanisms to foster greater compliance with the 
        uniform Department adjudication, suspension, denial, and 
        revocation standards by the head of each component and office 
        of the Department with the authority to adjudicate access to 
        classified information.
          ``(2) The establishment of an internal appeals panel 
        responsible for final national security clearance denial and 
        revocation determinations that is comprised of designees who 
        are career, supervisory employees from components and offices 
        of the Department with the authority to adjudicate access to 
        classified information and headquarters, as appropriate.

``SEC. 736. DATA PROTECTION.

  ``The Secretary shall ensure that all information received for the 
adjudication of eligibility of an individual for access to classified 
information is consistent with the Adjudicative Guidelines for 
Determining Access to Classified Information published on December 29, 
2005, or similar successor regulation, and is protected against 
misappropriation.

``SEC. 737. REFERENCE.

  ``Except as otherwise provided, for purposes of this subtitle, any 
reference to the `Department' includes all components and offices of 
the Department.''.
  (b) Clerical Amendment.--The table of contents of the Homeland 
Security Act of 2002 is amended--
          (1) by inserting before the item relating to section 701 the 
        following new item:

                ``Subtitle A--Headquarters Activities'';

        and
          (2) by inserting after the final item relating to title VII 
        the following new items:

                   ``Subtitle B--Security Clearances

``Sec. 731. Designation of national security sensitive and public trust 
positions.
``Sec. 732. Review of position designations.
``Sec. 733. Audits.
``Sec. 734. Reporting.
``Sec. 735. Uniform adjudication, suspension, denial, and revocation.
``Sec. 736. Data protection.
``Sec. 737. Reference.''.

              Subtitle B--Stakeholder Information Sharing

SEC. 311. DEPARTMENT OF HOMELAND SECURITY FUSION CENTER PARTNERSHIP 
                    INITIATIVE.

  (a) In General.--Section 210A of the Homeland Security Act of 2002 (6 
U.S.C. 124h) is amended--
          (1) by amending the section heading to read as follows:

``SEC. 210A. DEPARTMENT OF HOMELAND SECURITY FUSION CENTER PARTNERSHIP 
                    INITIATIVE.'';

          (2) in subsection (a), by adding at the end the following new 
        sentence: ``Beginning on the date of the enactment of the 
        Department of Homeland Security Authorization Act of 2017, such 
        Initiative shall be known as the `Department of Homeland 
        Security Fusion Center Partnership Initiative'.'';
          (3) by amending subsection (b) to read as follows:
  ``(b) Interagency Support and Coordination.--Through the Department 
of Homeland Security Fusion Center Partnership Initiative, in 
coordination with principal officials of fusion centers in the National 
Network of Fusion Centers and the officers designated as the Homeland 
Security Advisors of the States, the Secretary shall--
          ``(1) coordinate with the heads of other Federal departments 
        and agencies to provide operational and intelligence advice and 
        assistance to the National Network of Fusion Centers;
          ``(2)(A) support the integration of fusion centers into the 
        information sharing environment;
          ``(B) conduct outreach to such fusion centers to identify any 
        gaps in information sharing; and
          ``(C) consult with other Federal agencies to develop methods 
        to address any such gaps, as appropriate;
          ``(3)(A) identify Federal databases and datasets, including 
        databases and datasets used, operated, or managed by Department 
        components, the Federal Bureau of Investigation, and the 
        Department of the Treasury, that are appropriate, in accordance 
        with Federal laws and policies, to address any gaps identified 
        pursuant to paragraph (2), for inclusion in the information 
        sharing environment; and
          ``(B) coordinate with the appropriate Federal agency to 
        deploy or access such databases and datasets;
          ``(4) support the maturation and sustainment of the National 
        Network of Fusion Centers;
          ``(5) reduce inefficiencies and maximize the effectiveness of 
        Federal resource support to the National Network of Fusion 
        Centers;
          ``(6) provide analytic and reporting advice and assistance to 
        the National Network of Fusion Centers;
          ``(7) review information within the scope of the information 
        sharing environment, including homeland security information, 
        terrorism information, and weapons of mass destruction 
        information, that is gathered by the National Network of Fusion 
        Centers and incorporate such information, as appropriate, into 
        the Department's own such information;
          ``(8) provide for the effective dissemination of information 
        within the scope of the information sharing environment to the 
        National Network of Fusion Centers;
          ``(9) facilitate close communication and coordination between 
        the National Network of Fusion Centers and the Department and 
        other Federal departments and agencies;
          ``(10) provide the National Network of Fusion Centers with 
        expertise on Department resources and operations;
          ``(11) coordinate the provision of training and technical 
        assistance to the National Network of Fusion Centers and 
        encourage participating fusion centers to take part in 
        terrorism threat-related exercises conducted by the Department;
          ``(12) ensure, to the greatest extent practicable, that 
        support for the National Network of Fusion Centers is included 
        as a national priority in applicable homeland security grant 
        guidance;
          ``(13) ensure that each fusion center in the National Network 
        of Fusion Centers has a privacy policy approved by the Chief 
        Privacy Officer of the Department and a civil rights and civil 
        liberties policy approved by the Officer for Civil Rights and 
        Civil Liberties of the Department;
          ``(14) coordinate the nationwide suspicious activity report 
        initiative to ensure information gathered by the National 
        Network of Fusion Centers is incorporated as appropriate;
          ``(15) promote and facilitate, to the greatest extent 
        practicable, nationwide suspicious activity report training of 
        fire, emergency medical services, emergency management, and 
        public heath personnel;
          ``(16) lead Department efforts to ensure fusion centers in 
        the National Network of Fusion Centers are the primary focal 
        points for the sharing of homeland security information, 
        terrorism information, and weapons of mass destruction 
        information with State, local, tribal, and territorial entities 
        to the greatest extent practicable;
          ``(17) develop and disseminate best practices on the 
        appropriate levels for staffing at fusion centers in the 
        National Network of Fusion Centers of qualified representatives 
        from State, local, tribal, and territorial law enforcement, 
        fire, emergency medical, and emergency management services, and 
        public health disciplines, as well as the private sector; and
          ``(18) carry out such other duties as the Secretary 
        determines appropriate.'';
          (4) in subsection (c)--
                  (A) by striking so much as precedes paragraph (3)(B) 
                and inserting the following:
  ``(c) Resource Allocation.--
          ``(1) Information sharing and personnel assignment.--
                  ``(A) Information sharing.--The Under Secretary for 
                Intelligence and Analysis shall ensure that, as 
                appropriate--
                          ``(i) fusion centers in the National Network 
                        of Fusion Centers have access to homeland 
                        security information sharing systems; and
                          ``(ii) Department personnel are deployed to 
                        support fusion centers in the National Network 
                        of Fusion Centers in a manner consistent with 
                        the Department's mission and existing statutory 
                        limits.
                  ``(B) Personnel assignment.--Department personnel 
                referred to in subparagraph (A)(ii) may include the 
                following:
                          ``(i) Intelligence officers.
                          ``(ii) Intelligence analysts.
                          ``(iii) Other liaisons from components and 
                        offices of the Department, as appropriate.
                  ``(C) Memoranda of understanding.--The Under 
                Secretary for Intelligence and Analysis shall negotiate 
                memoranda of understanding between the Department and a 
                State or local government, in coordination with the 
                appropriate representatives from fusion centers in the 
                National Network of Fusion Centers, regarding the 
                exchange of information between the Department and such 
                fusion centers. Such memoranda shall include the 
                following:
                          ``(i) The categories of information to be 
                        provided by each entity to the other entity 
                        that are parties to any such memoranda.
                          ``(ii) The contemplated uses of the exchanged 
                        information that is the subject of any such 
                        memoranda.
                          ``(iii) The procedures for developing joint 
                        products.
                          ``(iv) The information sharing dispute 
                        resolution processes.
                          ``(v) Any protections necessary to ensure the 
                        exchange of information accords with applicable 
                        law and policies.
          ``(2) Sources of support.--
                  ``(A) In general.--Information shared and personnel 
                assigned pursuant to paragraph (1) may be shared or 
                provided, as the case may be, by the following 
                Department components and offices, in coordination with 
                the respective component or office head and in 
                consultation with the principal officials of fusion 
                centers in the National Network of Fusion Centers:
                          ``(i) The Office of Intelligence and 
                        Analysis.
                          ``(ii) The Office of Infrastructure 
                        Protection.
                          ``(iii) The Transportation Security 
                        Administration.
                          ``(iv) U.S. Customs and Border Protection.
                          ``(v) U.S. Immigration and Customs 
                        Enforcement.
                          ``(vi) The Coast Guard.
                          ``(vii) The national cybersecurity and 
                        communications integration center under section 
                        227.
                          ``(viii) Other components or offices of the 
                        Department, as determined by the Secretary.
                  ``(B) Coordination with other federal agencies.--The 
                Under Secretary for Intelligence and Analysis shall 
                coordinate with appropriate officials throughout the 
                Federal Government to ensure the deployment to fusion 
                centers in the National Network of Fusion Centers of 
                representatives with relevant expertise of other 
                Federal departments and agencies.
          ``(3) Resource allocation criteria.--
                  ``(A) In general.--The Secretary shall make available 
                criteria for sharing information and deploying 
                personnel to support a fusion center in the National 
                Network of Fusion Centers in a manner consistent with 
                the Department's mission and existing statutory 
                limits.''; and
                  (B) in paragraph (4)(B), in the matter preceding 
                clause (i), by inserting ``in which such fusion center 
                is located'' after ``region'';
          (5) in subsection (d)--
                  (A) in paragraph (3), by striking ``and'' at the end;
                  (B) in paragraph (4)--
                          (i) by striking ``government'' and inserting 
                        ``governments''; and
                          (ii) by striking the period at the end and 
                        inserting ``; and''; and
                  (C) by adding at the end the following new paragraph:
          ``(5) utilize Department information, including information 
        held by components and offices, to develop analysis focused on 
        the mission of the Department under section 101(b).'';
          (6) in subsection (e)--
                  (A) by amending paragraph (1) to read as follows:
          ``(1) In general.--To the greatest extent practicable, the 
        Secretary shall make it a priority to allocate resources, 
        including deployed personnel, under this section from U.S. 
        Customs and Border Protection, U.S. Immigration and Customs 
        Enforcement, and the Coast Guard to support fusion centers in 
        the National Network of Fusion Centers located in jurisdictions 
        along land or maritime borders of the United States in order to 
        enhance the integrity of and security at such borders by 
        helping Federal, State, local, tribal, and territorial law 
        enforcement authorities to identify, investigate, and otherwise 
        interdict persons, weapons, and related contraband that pose a 
        threat to homeland security.''; and
                  (B) in paragraph (2), in the matter preceding 
                subparagraph (A), by striking ``participating State, 
                local, and regional fusion centers'' and inserting 
                ``fusion centers in the National Network of Fusion 
                Centers'';
          (7) in subsection (j)--
                  (A) in paragraph (4), by striking ``and'' at the end;
                  (B) by redesignating paragraph (5) as paragraph (6); 
                and
                  (C) by inserting after paragraph (4) the following 
                new paragraph:
          ``(5) the term `National Network of Fusion Centers' means a 
        decentralized arrangement of fusion centers intended to enhance 
        individual State and urban area fusion centers' ability to 
        leverage the capabilities and expertise of all fusion centers 
        for the purpose of enhancing analysis and homeland security 
        information sharing nationally; and''; and
          (8) by striking subsection (k).
  (b) Accountability Report.--Not later than one year after the date of 
the enactment of this Act and annually thereafter through 2024, the 
Under Secretary for Intelligence and Analysis of the Department of 
Homeland Security shall report to the Committee on Homeland Security 
and the Permanent Select Committee on Intelligence of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs and the Select Committee on Intelligence of the Senate on the 
efforts of the Office of Intelligence and Analysis of the Department 
and other relevant components and offices of the Department to enhance 
support provided to fusion centers in the National Network of Fusion 
Centers, including meeting the requirements specified in section 210A 
of the Homeland Security Act of 2002 (6 U.S.C. 124h), as amended by 
subsection (a) of this section.
  (c) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by striking the item relating 
to section 210A and inserting the following new item:

``Sec. 210A. Department of Homeland Security Fusion Center Partnership 
Initiative.''.

  (d) Reference.--Any reference in any law, rule, or regulation to the 
``Department of Homeland Security State, Local, and Regional Fusion 
Center Initiative'' shall be deemed to be a reference to the 
``Department of Homeland Security Fusion Center Partnership 
Initiative''.

SEC. 312. FUSION CENTER PERSONNEL NEEDS ASSESSMENT.

  (a) In General.--Not later than 120 days after the date of the 
enactment of this Act, the Comptroller General of the United States 
shall conduct an assessment of Department of Homeland Security 
personnel assigned to fusion centers pursuant to subsection (c) of 
section 210A of the Homeland Security Act of 2002 (6 U.S.C. 124h), as 
amended by section 311 of this Act, including an assessment of whether 
deploying additional Department personnel to such fusion centers would 
enhance the Department's mission under section 101(b) of such Act and 
the National Network of Fusion Centers. The assessment required under 
this subsection shall include the following:
          (1) Information on the current deployment of the Department's 
        personnel to each fusion center.
          (2) Information on the roles and responsibilities of the 
        Department's Office of Intelligence and Analysis intelligence 
        officers, intelligence analysts, senior reports officers, 
        reports officers, and regional directors deployed to fusion 
        centers.
          (3) Information on Federal resources, in addition to 
        personnel, provided to each fusion center.
          (4) An analysis of the optimal number of personnel the Office 
        of Intelligence and Analysis should deploy to fusion centers, 
        including a cost-benefit analysis comparing deployed personnel 
        with technological solutions to support information sharing.
          (5) An assessment of fusion centers located in jurisdictions 
        along land and maritime borders of the United States, and the 
        degree to which deploying personnel, as appropriate, from U.S. 
        Customs and Border Protection, U.S. Immigration and Customs 
        Enforcement, and the Coast Guard to such fusion centers would 
        enhance the integrity and security at such borders by helping 
        Federal, State, local, tribal, and territorial law enforcement 
        authorities to identify, investigate, and interdict persons, 
        weapons, and related contraband that pose a threat to homeland 
        security.
          (6) An assessment of fusion centers located in jurisdictions 
        with large and medium hub airports, and the degree to which 
        deploying, as appropriate, personnel from the Transportation 
        Security Administration to such fusion centers would enhance 
        the integrity and security of aviation security.
  (b) Definitions.--In this section:
          (1) Fusion center.--The term ``fusion center'' has the 
        meaning given such term in subsection (j) of section 210A of 
        the Homeland Security Act of 2002 (6 U.S.C. 124h).
          (2) National network of fusion centers.--The term ``National 
        Network of Fusion Centers'' has the meaning given such term in 
        subsection (j) of section 210A of the Homeland Security Act of 
        2002 (6 U.S.C. 124h), as amended by section 311 of this Act.

SEC. 313. PROGRAM FOR STATE AND LOCAL ANALYST CLEARANCES.

  (a) Sense of Congress.--It is the sense of Congress that any program 
established by the Under Secretary for Intelligence and Analysis of the 
Department of Homeland Security to provide eligibility for access to 
information classified as Top Secret for State, local, tribal, and 
territorial analysts located in fusion centers shall be consistent with 
the need to know requirements pursuant to Executive Order No. 13526 (50 
U.S.C. 3161 note).
  (b) Report.--Not later than two years after the date of the enactment 
of this Act, the Under Secretary of Intelligence and Analysis of the 
Department of Homeland Security, in consultation with the Director of 
National Intelligence, shall submit to the Committee on Homeland 
Security and the Permanent Select Committee on Intelligence of the 
House of Representatives and the Committee on Homeland Security and 
Governmental Affairs and the Select Committee on Intelligence of the 
Senate a report on the following:
          (1) The process by which the Under Secretary of Intelligence 
        and Analysis determines a need to know pursuant to Executive 
        Order No. 13526 to sponsor Top Secret clearances for 
        appropriate State, local, tribal, and territorial analysts 
        located in fusion centers.
          (2) The effects of such Top Secret clearances on enhancing 
        information sharing with State, local, tribal, and territorial 
        partners.
          (3) The cost for providing such Top Secret clearances for 
        State, local, tribal, and territorial analysts located in 
        fusion centers, including training and background 
        investigations.
          (4) The operational security protocols, training, management, 
        and risks associated with providing such Top Secret clearances 
        for State, local, tribal, and territorial analysts located in 
        fusion centers.
  (c) Definition.--In this section, the term ``fusion center'' has the 
meaning given such term in subsection (j) of section 210A of the 
Homeland Security Act of 2002 (6 U.S.C. 124h).

SEC. 314. INFORMATION TECHNOLOGY ASSESSMENT.

  (a) In General.--The Under Secretary of Intelligence and Analysis of 
the Department of Homeland Security, in collaboration with the Chief 
Information Officer of the Department and representatives from the 
National Network of Fusion Centers, shall conduct an assessment of 
information systems (as such term is defined in section 3502 of title 
44, United States Code) used to share homeland security information 
between the Department and fusion centers in the National Network of 
Fusion Centers and make upgrades to such systems, as appropriate. Such 
assessment shall include the following:
          (1) An evaluation of the accessibility and ease of use of 
        such systems by fusion centers in the National Network of 
        Fusion Centers.
          (2) A review to determine how to establish improved 
        interoperability of departmental information systems with 
        existing information systems used by fusion centers in the 
        National Network of Fusion Centers.
          (3) An evaluation of participation levels of departmental 
        components and offices of information systems used to share 
        homeland security information with fusion centers in the 
        National Network of Fusion Centers.
  (b) Definitions.--In this section:
          (1) Fusion center.--The term ``fusion center'' has the 
        meaning given such term in subsection (j) of section 210A of 
        the Homeland Security Act of 2002 (6 U.S.C. 124h).
          (2) National network of fusion centers.--The term ``National 
        Network of Fusion Centers'' has the meaning given such term in 
        subsection (j) of section 210A of the Homeland Security Act of 
        2002 (6 U.S.C. 124h), as amended by section 311 of this Act.

SEC. 315. DEPARTMENT OF HOMELAND SECURITY CLASSIFIED FACILITY INVENTORY 
                    AND DISSEMINATION.

  (a) In General.--The Secretary of Homeland Security shall, to the 
extent practicable--
          (1) maintain an inventory of those Department of Homeland 
        Security facilities that the Department certifies to house 
        classified infrastructure or systems at the secret level and 
        above;
          (2) update such inventory on a regular basis; and
          (3) share part or all of such inventory with--
                  (A) Department personnel who have been granted the 
                appropriate security clearance;
                  (B) non-Federal governmental personnel who have been 
                granted a Top Secret security clearance; and
                  (C) other personnel as determined appropriate by the 
                Secretary.
  (b) Inventory.--The inventory of facilities described in subsection 
(a) may include--
          (1) the location of such facilities;
          (2) the attributes of such facilities (including the square 
        footage of, the total capacity of, the number of workstations 
        in, and the number of conference rooms in, such facilities);
          (3) the entities that operate such facilities; and
          (4) the date of establishment of such facilities.

SEC. 316. TERROR INMATE INFORMATION SHARING.

  (a) In General.--The Secretary of Homeland Security, in coordination 
with the Attorney General and in consultation with other appropriate 
Federal officials, shall, as appropriate, share with State, local, and 
regional fusion centers through the Department of Homeland Security 
Fusion Center Partnership Initiative under section 210A of the Homeland 
Security Act of 2002 (6 U.S.C. 124h), as amended by section 311 of this 
Act, as well as other relevant law enforcement entities, release 
information from a Federal correctional facility, including the name, 
charging date, and expected place and date of release, of certain 
individuals who may pose a terrorist threat.
  (b) Scope.--The information shared pursuant to subsection (a) shall 
be--
          (1) for homeland security purposes; and
          (2) regarding individuals convicted of a Federal crime of 
        terrorism (as such term is defined in section 2332b of title 
        18, United States Code).
  (c) Periodic Threat Assessments.--Consistent with the protection of 
classified information and controlled unclassified information, the 
Secretary of Homeland Security shall coordinate with appropriate 
Federal officials to provide State, local, and regional fusion centers 
described in subsection (a) with periodic assessments regarding the 
overall threat from known or suspected terrorists currently 
incarcerated in a Federal correctional facility, including the assessed 
risks of such populations engaging in terrorist activity upon release.
  (d) Privacy Protections.--Prior to affecting the information sharing 
described in subsection (a), the Secretary shall receive input and 
advice from the Officer for Civil Rights and Civil Liberties, the 
Officer for Privacy and the Chief Intelligence Officer of the 
Department.
  (e) Rule of Construction.--Nothing in this section may be construed 
as requiring the establishment of a list or registry of individuals 
convicted of terrorism.

SEC. 317. ANNUAL REPORT ON OFFICE FOR STATE AND LOCAL LAW ENFORCEMENT.

  Subsection (b) of section 2006 of the Homeland Security Act of 2002 
(6 U.S.C. 607) is amended--
          (1) by redesignating paragraph (5) as paragraph (6); and
          (2) by inserting after paragraph (4) the following new 
        paragraph:
          ``(5) Annual report.--For each of fiscal years 2018 through 
        2022, the Assistant Secretary for State and Local Law 
        Enforcement shall submit to the Committee on Homeland Security 
        of the House of Representatives and the Committee on Homeland 
        Security and Governmental Affairs of the Senate a report on the 
        activities of the Office for State and Local Law Enforcement. 
        Each such report shall include, for the fiscal year covered by 
        the report, a description of each of the following:
                  ``(A) Efforts to coordinate and share information 
                regarding Department and component agency programs with 
                State, local, and tribal law enforcement agencies.
                  ``(B) Efforts to improve information sharing through 
                the Homeland Security Information Network by 
                appropriate component agencies of the Department and by 
                State, local, and tribal law enforcement agencies.
                  ``(C) The status of performance metrics within the 
                Office of State and Local Law Enforcement to evaluate 
                the effectiveness of efforts to carry out 
                responsibilities set forth within the subsection.
                  ``(D) Any feedback from State, local, and tribal law 
                enforcement agencies about the Office, including the 
                mechanisms utilized to collect such feedback.
                  ``(E) Efforts to carry out all other responsibilities 
                of the Office of State and Local Law Enforcement.''.

SEC. 318. ANNUAL CATALOG ON DEPARTMENT OF HOMELAND SECURITY TRAINING, 
                    PUBLICATIONS, PROGRAMS, AND SERVICES FOR STATE, 
                    LOCAL, AND TRIBAL LAW ENFORCEMENT AGENCIES.

  Paragraph (4) of section 2006(b) of the Homeland Security Act of 2002 
(6 U.S.C. 607(b)) is amended--
          (1) in subparagraph (E), by striking ``and'' at the end;
          (2) in subparagraph (F), by striking the period and inserting 
        a semicolon; and
          (3) by adding at the end the following new subparagraphs:
                  ``(G) produce an annual catalog that summarizes 
                opportunities for training, publications, programs, and 
                services available to State, local, and tribal law 
                enforcement agencies from the Department and from each 
                component and office within the Department and, not 
                later than 30 days after the date of such production, 
                disseminate the catalog, including by--
                          ``(i) making such catalog available to State, 
                        local, and tribal law enforcement agencies, 
                        including by posting the catalog on the website 
                        of the Department and cooperating with national 
                        organizations that represent such agencies;
                          ``(ii) making such catalog available through 
                        the Homeland Security Information Network; and
                          ``(iii) submitting such catalog to the 
                        Committee on Homeland Security of the House of 
                        Representatives and the Committee on Homeland 
                        Security and Governmental Affairs of the 
                        Senate; and
                  ``(H) in coordination with appropriate components and 
                offices of the Department and other Federal agencies, 
                develop, maintain, and make available information on 
                Federal resources intended to support fusion center 
                access to Federal information and resources.''.

                      TITLE IV--MARITIME SECURITY

SEC. 401. STRATEGIC PLAN TO ENHANCE THE SECURITY OF THE INTERNATIONAL 
                    SUPPLY CHAIN.

  Paragraph (2) of section 201(g) of the Security and Accountability 
for Every Port Act of 2006 (6 U.S.C. 941(g)) is amended to read as 
follows:
          ``(2) Updates.--Not later than 270 days after the date of the 
        enactment of this paragraph and every three years thereafter, 
        the Secretary shall submit to the appropriate congressional 
        committees a report that contains an update of the strategic 
        plan required by subsection (a).''.

SEC. 402. CONTAINER SECURITY INITIATIVE.

  Subsection (l) of section 205 of the Security and Accountability for 
Every Port Act of 2006 (6 U.S.C. 945) is amended--
          (1) by striking ``(1) in general.--Not later than September 
        30, 2007,'' and inserting ``Not later than 270 days after the 
        date of the enactment of the Border and Maritime Security 
        Coordination Improvement Act,'';
          (2) by redesignating subparagraphs (A) through (H) as 
        paragraphs (1) through (8), respectively, and by moving the 
        margins of such paragraphs (as so redesignated) two ems to the 
        left; and
          (3) by striking paragraph (2).

SEC. 403. CYBER AT PORTS.

  (a) Cybersecurity Enhancements to Maritime Security Activities.--
Subparagraph (B) of section 70112(a)(2) of title 46, United States 
Code, is amended--
          (1) by redesignating clauses (i) through (iii) as clauses 
        (ii) and (iv), respectively; and
          (2) by inserting before clause (ii) the following new clause:
          ``(i) shall facilitate the sharing of information relating to 
        cybersecurity risks and incidents (as such terms are defined in 
        section 227 of the Homeland Security Act of 2002 (6 U.S.C. 
        148)) to address port-specific cybersecurity risks and 
        incidents, which may include the establishment of a working 
        group of members of such committees to address such port-
        specific cybersecurity risks and incidents;''.
  (b) Vulnerability Assessments and Security Plans.--Title 46, United 
States Code, is amended--
          (1) in subparagraph (C) of section 70102(b)(1), by inserting 
        ``cybersecurity,'' after ``physical security,''; and
          (2) in subparagraph (C) of section 70103(c)(3)--
                  (A) in clause (i), by inserting ``cybersecurity,'' 
                after ``physical security,'';
                  (B) in clause (iv), by striking ``and'' after the 
                semicolon at the end;
                  (C) by redesignating clause (v) as clause (vi); and
                  (D) by inserting after clause (iv) the following new 
                clause:
  ``(v) prevention, management, and response to cybersecurity risks and 
incidents (as such terms are defined in section 227 of the Homeland 
Security Act of 2002 (6 U.S.C. 148)); and''.

SEC. 404. FACILITY INSPECTION INTERVALS.

  Subparagraph (D) of section 70103(c)(4) of title 46, United States 
Code, is amended to read as follows:
                  ``(D) subject to the availability of appropriations, 
                verify the effectiveness of each such facility security 
                plan periodically, but not less than one time per year 
                without notice, and more frequently as determined 
                necessary, in a risk based manner, with or without 
                notice to the facility.''.

SEC. 405. UPDATES OF MARITIME OPERATIONS COORDINATION PLAN.

  (a) In General.--Subtitle C of title IV of the Homeland Security Act 
of 2002 (6 U.S.C. 231 et seq.) is amended by adding at the end the 
following new section:

``SEC. 434. UPDATES OF MARITIME OPERATIONS COORDINATION PLAN.

  ``Not later than 180 days after the date of the enactment of this 
section and biennially thereafter, the Secretary shall submit to the 
Committee on Homeland Security and the Committee on Transportation and 
Infrastructure of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs of the Senate a maritime 
operations coordination plan for the coordination and cooperation of 
maritime operations undertaken by components and offices of the 
Department with responsibility for maritime security missions. Such 
plan shall update the maritime operations coordination plan released by 
the Department in July 2011, and shall address the following:
          ``(1) Coordination of planning, integration of maritime 
        operations, and development of joint maritime domain awareness 
        efforts of any component or office of the Department with 
        responsibility for maritime homeland security missions.
          ``(2) Maintaining effective information sharing and, as 
        appropriate, intelligence integration, with Federal, State, and 
        local officials and the private sector, regarding threats to 
        maritime security.
          ``(3) Cooperation and coordination with other departments and 
        agencies of the Federal Government, and State and local 
        agencies, in the maritime environment, in support of maritime 
        homeland security missions.
          ``(4) Work conducted within the context of other national and 
        Department maritime security strategic guidance.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by adding after the item 
relating to section 433 the following new item:

``Sec. 434. Updates of maritime operations coordination plan.''.

SEC. 406. EVALUATION OF COAST GUARD DEPLOYABLE SPECIALIZED FORCES.

  (a) In General.--Not later than one year after the date of the 
enactment of this Act, the Comptroller General of the United States 
shall submit to the Committee on Homeland Security and the Committee on 
Transportation and Infrastructure of the House of Representatives and 
the Committee on Homeland Security and Governmental Affairs and the 
Committee on Commerce, Science, and Transportation of the Senate a 
report that describes and assesses the state of the Coast Guard's 
Deployable Specialized Forces (in this section referred to as the 
``DSF''). Such report shall include, at a minimum, the following 
elements:
          (1) For each of the past three fiscal years, and for each 
        type of DSF, the following:
                  (A) A cost analysis, including training, operating, 
                and travel costs.
                  (B) The number of personnel assigned.
                  (C) The total number of units.
                  (D) The total number of operations conducted.
                  (E) The number of operations requested by each of the 
                following:
                          (i) The Coast Guard.
                          (ii) Other components or offices of the 
                        Department of Homeland Security.
                          (iii) Other Federal departments or agencies.
                          (iv) State agencies.
                          (v) Local agencies.
                  (F) The number of operations fulfilled by the 
                entities specified in subparagraph (E).
          (2) An examination of alternative distributions of DSFs, 
        including the feasibility, cost (including cost savings), and 
        impact on mission capability of such distributions, including 
        at a minimum the following:
                  (A) Combining DSFs, primarily focused on counterdrug 
                operations, under one centralized command.
                  (B) Distributing counter-terrorism and anti-terrorism 
                capabilities to DSFs in each major United States port.
  (b) Deployable Specialized Force Defined.--In this section, the term 
``Deployable Specialized Force'' means a unit of the Coast Guard that 
serves as a quick reaction force designed to be deployed to handle 
counter-drug, counter-terrorism, and anti-terrorism operations or other 
maritime threats to the United States.

SEC. 407. COST BENEFIT ANALYSIS OF CO-LOCATING DHS ASSETS.

  (a) In General.--For any location in which U.S. Customs and Border 
Protection's Office of Air and Marine Operations is based within 45 
miles of locations where any other Department of Homeland Security 
agency also operates air and marine assets, the Secretary of Homeland 
Security shall conduct a cost-benefit analysis to consider the 
potential cost of and savings derived from co-locating aviation and 
maritime operational assets of the Office of Air and Marine Operations 
at facilities where other agencies of the Department operate such 
assets. In analyzing such potential cost savings achieved by sharing 
aviation and maritime facilities, such analysis shall consider, at a 
minimum, the following factors:
          (1) Potential enhanced cooperation derived from Department 
        personnel being co-located.
          (2) Potential costs of, and savings derived through, shared 
        maintenance and logistics facilities and activities.
          (3) Joint use of base and facility infrastructure, such as 
        runways, hangars, control towers, operations centers, piers and 
        docks, boathouses, and fuel depots.
          (4) Potential operational costs of co-locating aviation and 
        maritime assets and personnel.
          (5) Short term moving costs required in order to co-locate 
        facilities.
          (6) Acquisition and infrastructure costs for enlarging 
        current facilities, as needed.
  (b) Report.--Not later than one year after the date of the enactment 
of this Act, the Secretary of Homeland Security shall submit to the 
Committee on Homeland Security and the Committee on Transportation and 
Infrastructure of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs of the Senate a report 
summarizing the results of the cost-benefit analysis required under 
subsection (a) and any planned actions based upon such results.

SEC. 408. REPEAL OF INTERAGENCY OPERATIONAL CENTERS FOR PORT SECURITY 
                    AND SECURE SYSTEMS OF TRANSPORTATION.

  Sections 70107A and 70116 of title 46, United States Code, are 
repealed.

SEC. 409. MARITIME SECURITY CAPABILITIES ASSESSMENTS.

  (a) In General.--Subtitle C of title IV of the Homeland Security Act 
of 2002 (6 U.S.C. 231 et seq.), as amended by section 405 of this Act, 
is further amended by adding at the end the following new section:

``SEC. 435. MARITIME SECURITY CAPABILITIES ASSESSMENTS.

  ``Not later than 180 days after the date of the enactment of this 
section and annually thereafter, the Secretary shall submit to the 
Committee on Homeland Security of the House of Representatives and the 
Committee on Homeland Security and Governmental Affairs of the Senate 
an assessment of the number and type of maritime assets and the number 
of personnel required to increase the Department's maritime response 
rate pursuant to section 1092 of the National Defense Authorization Act 
for Fiscal Year 2017 (6 U.S.C. 223; Public Law 114-328).''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002, as amended by section 405 of this Act, 
is further amended by inserting after the item relating to section 434 
the following new item:

``Sec. 435. Maritime security capabilities assessments.''.

SEC. 410. CONFORMING AND CLERICAL AMENDMENTS.

  (a) Sections.--The following provisions of the Security and 
Accountability for Every Port Act of 2006 (Public Law 109-347) are 
amended as follows:
          (1) By striking section 105.
          (2) By redesignating sections 106 and 107 as sections 105 and 
        106, respectively.
          (3) By striking section 108.
          (4) By redesignating sections 109 and 110 as sections 107 and 
        108, respectively.
          (5) In section 121 (6 U.S.C. 921)--
                  (A) by striking subsections (c), (d), and (e); and
                  (B) redesignating subsections (f), (g), (h), and (i) 
                as subsections (c), (d), (e), and (f), respectively.
          (6) By striking sections 122 and 127 (6 U.S.C. 922 and ).
          (7) By redesignating sections 123, 124, 125, 126, and 128 as 
        sections 122, 123, 124, 125, and 126, respectively.
          (8) In section 233 (6 U.S.C. 983), by striking subsection 
        (c).
          (9) By striking section 235 (6 U.S.C. 984).
          (10) By redesignating section 236 as section 235.
          (11) By striking sections 701 and 708 (and the item relating 
        to such section in the table of contents of such Act).
          (12) By redesignating sections 702, 703, 704, 705, 706, 707, 
        and 709 as sections 701, 702, 703, 704, 705, 706, and 707, 
        respectively.
  (b) Table of Contents.--
          (1) Security and accountability for every port act of 2006.--
        The table of contents of the Security and Accountability for 
        Every Port Act of 2006 (Public Law 109-347) is amended as 
        follows:
                  (A) In the list of items relating to subtitle A of 
                title I, by striking the items relating to sections 105 
                through 110 and inserting the following new items:

``Sec. 105. Prohibition of issuance of transportation security cards to 
persons convicted of certain felonies.
``Sec. 106. Long-range vessel tracking.
``Sec. 107. Notice of arrival for foreign vessels on the Outer 
Continental Shelf.
``Sec. 108. Enhanced crewmember identification.''.

                  (B) In the list of items relating to subtitle C of 
                title I, by striking the items relating to sections 122 
                through 128 and inserting the following new items:

``Sec. 122. Random searches of containers.
``Sec. 123. Work stoppages and employee-employer disputes.
``Sec. 124. Threat assessment screening of port truck drivers.
``Sec. 125. Border Patrol unit for United States Virgin Islands.
``Sec. 126. Center of Excellence for Maritime Domain Awareness.''.

                  (C) In the list of items relating to subtitle C of 
                title II, by striking the items relating to sections 
                235 and 236 and inserting the following new item:

``Sec. 235. Information sharing relating to supply chain security 
cooperation.''.

                  (D) In the list of items relating to title VII, by 
                striking the items relating to sections 701 through 709 
                and inserting the following new items:

``Sec. 701. Disclosures regarding homeland security grants.
``Sec. 702. Trucking security.
``Sec. 703. Air and Marine Operations of the Northern Border Air Wing.
``Sec. 704. Phaseout of vessels supporting oil and gas development.
``Sec. 705. Coast Guard property in Portland, Maine.
``Sec. 706. Methamphetamine and methamphetamine precursor chemicals.
``Sec. 707. Protection of health and safety during disasters.''.

          (2) Title 46.--In the list of items relating to the analysis 
        for chapter 701 of title 46, United States Code, by striking 
        the items relating to sections 70107A and 70116.

            TITLE V--TRANSPORTATION SECURITY ADMINISTRATION

                       Subtitle A--Administration

SEC. 501. AMENDMENTS TO THE HOMELAND SECURITY ACT OF 2002 AND TITLE 5, 
                    UNITED STATES CODE.

  (a) Homeland Security Act of 2002.--Paragraph (1) of section 103(a) 
of the Homeland Security Act of 2002, as amended by this Act, is 
further amended by adding at the end the following new subparagraph:
                  ``(K) An Administrator of the Transportation Security 
                Administration, in accordance with section 114 of title 
                49, United States Code.''.
  (b) Inclusion in Executive Schedule.--Section 5315 of title 5, United 
States Code, is amended by adding at the end the following:
  ``Administrator of the Transportation Security Administration, 
Department of Homeland Security.''.

SEC. 502. AMENDMENTS TO TITLE 49, UNITED STATES CODE.

  (a) Amendments.--Section 114 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Department of 
        Transportation'' and inserting ``Department of Homeland 
        Security'';
          (2) in subsection (b)(1), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration'';
          (3) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator'';
          (4) in subsection (b), in the heading, by striking ``Under 
        Secretary'' and inserting ``Administrator'';
          (5) in subsection (e)(4), by striking ``Secretary of 
        Transportation'' and inserting ``Secretary of Homeland 
        Security'';
          (6) in subsection (f)--
                  (A) in paragraph (6), by striking ``Managers'' and 
                inserting ``Directors''; and
                  (B) in paragraph (14), by inserting ``air carriers 
                or'' before ``foreign air carriers'';
          (7) in subsection (g)--
                  (A) by striking ``the Secretary'' each place it 
                appears and inserting ``the Secretary of Homeland 
                Security''; and
                  (B) in paragraph (3), by striking ``The Secretary'' 
                and inserting ``The Secretary of Homeland Security'';
          (8) in subsection (j)(1)(D), by striking ``the Secretary'' 
        and inserting ``the Secretary of Homeland Security'';
          (9) in subsection (l)--
                  (A) in paragraph (2)(A), by striking ``the 
                Secretary'' and inserting ``the Secretary of Homeland 
                Security''; and
                  (B) in paragraph (4)(B), by striking ``the 
                Administrator under subparagraph (A)'' and inserting 
                ``the Administrator of the Federal Aviation 
                Administration under subparagraph (A)'';
          (10) in subsection (m)--
                  (A) in the heading, by striking ``Under Secretary'' 
                and inserting ``Administrator''; and
                  (B) in paragraph (1), in the heading, by striking 
                ``Under secretary'' and inserting ``Administrator'';
          (11) in subsection (n), by striking ``Department of 
        Transportation'' and inserting ``Department of Homeland 
        Security'';
          (12) in subsection (o), by striking ``Department of 
        Transportation'' and inserting ``Department of Homeland 
        Security'';
          (13) in subsection (p)(4), by striking ``Secretary of 
        Transportation'' and inserting ``Secretary of Homeland 
        Security'';
          (14) by redesignating subsections (u), (v), and (w) as 
        subsections (t), (cc), and (dd), respectively; and
          (15) by inserting after subsection (t), as so redesignated, 
        the following new subsections:
  ``(u) Deputy Administrator.--There is established in the 
Transportation Security Administration a Deputy Administrator, who 
shall assist the Administrator in the management of the Transportation 
Security Administration.
  ``(v) Office of Public Affairs.--
          ``(1) Establishment.--There is established in the 
        Transportation Security Administration an Office of Public 
        Affairs (in this subsection referred to as the `Office').
          ``(2) Assistant administrator.--The head of the Office shall 
        be the Assistant Administrator for Public Affairs, who shall 
        report to the Administrator of the Transportation Security 
        Administration or the Administrator's designee.
          ``(3) Functions.--The Office shall be responsible for 
        facilitating understanding of the Transportation Security 
        Administration's mission by communicating with internal and 
        external audiences in a timely, accurate, and transparent 
        manner.
  ``(w) Office of Civil Rights and Liberties, Ombudsman, and Traveler 
Engagement.--
          ``(1) Establishment.--There is established in the 
        Transportation Security Administration an Office of Civil 
        Rights and Liberties, Ombudsman, and Traveler Engagement (in 
        this subsection referred to as the `Office').
          ``(2) Assistant administrator.--The head of the Office shall 
        be the Assistant Administrator for Civil Rights and Liberties, 
        Ombudsman, and Traveler Engagement, who shall report to the 
        Administrator of the Transportation Security Administration or 
        the Administrator's designee.
          ``(3) Functions.--The Office shall be responsible for 
        managing allegations of violations of civil rights and civil 
        liberties from the public, carrying out the Administration's 
        equal employment opportunity and diversity policies and 
        programs, including complaint management and adjudication, and 
        helping to ensure that employees and the traveling public are 
        treated in a fair and lawful manner.
  ``(x) Office of Legislative Affairs.--
          ``(1) Establishment.--There is established in the 
        Transportation Security Administration an Office of Legislative 
        Affairs (in this subsection referred to as the `Office').
          ``(2) Assistant administrator.--The head of the Office shall 
        be the Assistant Administrator for Legislative Affairs, who 
        shall report to the Administrator of the Transportation 
        Security Administration or the Administrator's designee.
          ``(3) Functions.--The Office shall be responsible for 
        developing and implementing strategies within the 
        Transportation Security Administration to achieve congressional 
        approval or authorization of the Administration's programs and 
        policies.
  ``(y) Office of Finance and Administration.--
          ``(1) Establishment.--There is established in the 
        Transportation Security Administration an Office of Finance and 
        Administration (in this subsection referred to as the 
        `Office').
          ``(2) Chief financial officer.--The head of the Office shall 
        be the Chief Financial Officer, who shall report to the 
        Administrator of the Transportation Security Administration or 
        the Administrator's designee.
          ``(3) Functions.--The Office shall be responsible for 
        financial, budgetary, and administrative activities that 
        support the mission of the Transportation Security 
        Administration.
  ``(z) Office of the Chief of Operations.--
          ``(1) Establishment.--There is established in the 
        Transportation Security Administration an Office of the Chief 
        of Operations (in this subsection referred to as the `Office').
          ``(2) Chief of operations.--The head of the Office shall be 
        the Chief of Operations, who shall report to the Administrator 
        of the Transportation Security Administration or the 
        Administrator's designee.
          ``(3) Functions.--The Office shall be responsible for the 
        following:
                  ``(A) Conducting protection, response, detection, 
                assessment, and investigation activities in airports 
                and other transportation facilities and deploying 
                Federal Air Marshals on United States aircraft 
                traveling domestically and internationally.
                  ``(B) Identifying, analyzing, and mitigating risk by 
                assessing vulnerabilities at international locations to 
                determine risk, evaluating risk impacts to determine 
                mitigation activities, and executing mitigation 
                activities to reduce risk to the United States.
                  ``(C) Providing security and intelligence 
                professionals with timely information in order to 
                prevent a terrorist attack against the transportation 
                systems of the United States.
                  ``(D) Developing security policies and plans that 
                reduce the risk of catastrophic terrorist attacks.
                  ``(E) Providing risk-based, adaptive security that 
                includes airport checkpoint and baggage screening 
                operations, regulatory compliance, cargo inspections, 
                and other specialized programs designed to secure 
                transportation.
                  ``(F) Safeguarding the transportation systems of the 
                United States through the qualification and delivery of 
                innovative security capabilities.
  ``(aa) Office of the Chief of Mission Support.--
          ``(1) Establishment.--There is established in the 
        Transportation Security Administration an Office of the Chief 
        of Mission Support (in this subsection referred to as the 
        `Office').
          ``(2) Chief of mission support.--The head of the Office shall 
        be the Chief of Mission Support, who shall report to the 
        Administrator of the Transportation Security Administration or 
        the Administrator's designee.
          ``(3) Functions.--The Office shall be responsible for the 
        following:
                  ``(A) Negotiating and awarding contracts and other 
                procurement vehicles that improve the Transportation 
                Security Administration's capabilities.
                  ``(B) Providing strategic, sustainable, and 
                comprehensive programs and services that attract, 
                build, and inspire a talented workforce.
                  ``(C) Overseeing the development, delivery, and 
                evaluation of training programs for Transportation 
                Security Administration employees.
                  ``(D) Providing information technologies and services 
                that enable global transportation security.
                  ``(E) Ensuring the integrity, efficiency, and 
                effectiveness of the Transportation Security 
                Administration's workforce, operations, and programs 
                through objective audits, covert testing, inspections, 
                and criminal investigations.
                  ``(F) Ensuring consistency in misconduct penalty 
                determinations and an expeditious and fair adjudication 
                process.
                  ``(G) Building the Transportation Security 
                Administration's capabilities by managing the 
                acquisition, testing, deployment, and sustainment of 
                security technology and other acquisition programs.
  ``(bb) Office of the Chief Counsel.--
          ``(1) Establishment.--There is established in the 
        Transportation Security Administration an Office of the Chief 
        Counsel (in this subsection referred to as the `Office').
          ``(2) Chief counsel.--The head of the Office shall be the 
        Chief Counsel for the Transportation Security Administration, 
        who shall report to the General Counsel of the Department of 
        Homeland Security.
          ``(3) Functions.--The Office shall be responsible for 
        providing legal advice and services across the Transportation 
        Security Administration.''.
  (b) Section 115.--Subsection (c) of section 115 of title 49, United 
States Code, is amended--
          (1) in paragraph (1), by striking ``Under Secretary of 
        Transportation for security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (2) in paragraph (6), by striking ``Under Secretary'' and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (c) Section 40119.--Section 40119 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration'';
          (2) in subsection (b)(4)--
                  (A) by inserting ``of the Federal Aviation 
                Administration'' after ``Administrator''; and
                  (B) by inserting ``Federal Aviation'' before 
                ``Administration''; and
          (3) in subsection (c), by striking ``Under Secretary'' and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (d) Section 44901.--Section 44901 of title 49, United States Code, is 
amended--
          (1) by striking ``Under Secretary of Transportation for 
        Security'' each place it appears and inserting ``Administrator 
        of the Transportation Security Administration'';
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration'';
          (3) by striking ``Assistant Secretary (Transportation 
        Security Administration)'' each place it appears and inserting 
        ``Administrator of the Transportation Security 
        Administration'';
          (4) by striking ``Assistant Secretary'' each place it appears 
        and inserting ``Administrator of the Transportation Security 
        Administration''; and
          (5) in subsection (d), by striking ``Senate Committee on 
        Commerce, Science, and Transportation and the House of 
        Representatives Committee on Transportation'' each place it 
        appears and inserting ``the Committee on Commerce, Science, and 
        Transportation and the Committee on Homeland Security and 
        Governmental Affairs of the Senate and the Committee on 
        Transportation and Infrastructure and the Committee on Homeland 
        Security of the House of Representatives''.
  (e) Section 44902.--Section 44902 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (2) in subsection (b), by striking ``Under Secretary'' and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (f) Section 44903.--Section 44903 of title 49, United States Code, is 
amended--
          (1) in subsection (b)(1), by striking ``Secretary of 
        Transportation'' and inserting ``Secretary of Homeland 
        Security'';
          (2) in subsection (c)(2)(C), by striking ``Secretary of 
        Transportation'' and inserting ``Secretary of Homeland 
        Security'';
          (3) in subsection (d), in the matter preceding paragraph (1), 
        by striking ``Secretary of Transportation'' and inserting 
        ``Secretary of Homeland Security'';
          (4) in subsection (g)--
                  (A) in paragraph (1)(A), in the heading, by striking 
                ``Under secretary'' and inserting ``Administrator''; 
                and
                  (B) in paragraph (2), by striking ``Under 
                Secretary's'' each place it appears and inserting 
                ``Transportation Security Administration 
                Administrator's'';
          (5) in subsection (h)--
                  (A) in paragraph (3), by inserting ``of Homeland 
                Security'' after ``Secretary'';
                  (B) in paragraph (6)(C), in the matter preceding 
                clause (i), by inserting ``of Homeland Security'' after 
                ``Secretary'';
          (6) in subsection (i)(l), by striking ``, after receiving the 
        recommendations of the National Institute of Justice,'';
          (7) in subsection (j)--
                  (A) in paragraph (1)--
                          (i) in the matter preceding subparagraph (A), 
                        by striking ``Under Secretary for 
                        Transportation Security'' and inserting 
                        ``Administrator of the Transportation Security 
                        Administration''; and
                          (ii) in the matter following subparagraph 
                        (E), by striking ``Secretary of 
                        Transportation'' and inserting ``Secretary of 
                        Homeland Security''; and
                  (B) in paragraph (2), by striking ``Secretary of 
                Transportation'' each place it appears and inserting 
                ``Secretary of Homeland Security'';
          (8) in subsection (l)(1), by striking ``Under Secretary for 
        Border and Transportation Security of the Department of 
        Homeland Security'' and inserting ``Administrator of the 
        Transportation Security Administration'';
          (9) by striking ``Under Secretary of Transportation for 
        Security'' each place it appears and inserting ``Administrator 
        of the Transportation Security Administration'';
          (10) by striking ``Under Secretary'' each place it appears 
        and inserting ``Administrator of the Transportation Security 
        Administration'';
          (11) by striking ``Assistant Secretary of Homeland Security 
        (Transportation Security Administration)'' each place it 
        appears and inserting ``Administrator of the Transportation 
        Security Administration''; and
          (12) by striking ``Assistant Secretary'' each place it 
        appears and inserting ``Administrator of the Transportation 
        Security Administration''.
  (g) Section 44904.--Section 44904 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration'';
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''; and
          (3) in subsection (d) by striking ``Assistant Secretary of 
        Homeland Security (Transportation Security Administration)'' 
        and inserting ``Administrator of the Transportation Security 
        Administration''.
  (h) Section 44905.--Section 44905 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Secretary of 
        Transportation'' and inserting ``Secretary of Homeland 
        Security'';
          (2) in subsection (b), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (3) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (i) Section 44906.--Section 44906 of title 49, United States Code, is 
amended--
          (1) by striking ``Under Secretary of Transportation for 
        Security'' and inserting ``Administrator of the Transportation 
        Security Administration''; and
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator''.
  (j) Section 44908.--Section 44908 of title 49, United States Code, is 
amended by striking ``Secretary of Transportation'' each place it 
appears and inserting ``Secretary of Homeland Security''.
  (k) Section 44909.--Section 44909 of title 49, United States Code, is 
amended--
          (1) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''; and
          (2) by striking ``the Customs Service'' each place it appears 
        and inserting ``U.S. Customs and Border Protection''.
  (l) Section 44911.--Section 44911 of title 49, United States Code, is 
amended--
          (1) in subsection (a)--
                  (A) in paragraphs (1) through (10), by striking 
                ``the'' each place it appears and inserting ``The''; 
                and
                  (B) by inserting the following at the end the 
                following new paragraphs:
          ``(11) The Coast Guard.
          ``(12) The Department of Homeland Security.
          ``(13) The National Geospatial-Intelligence Agency.
          ``(14) The National Reconnaissance Office.'';
          (2) in subsection (b)--
                  (A) by striking ``Secretary of Transportation'' and 
                inserting ``Secretary of Homeland Security''; and
                  (B) by striking ``Under Secretary of Transportation 
                for Security'' and inserting ``Administrator of the 
                Transportation Security Administration'';
          (3) in subsection (d), by striking ``the Secretary'' and 
        inserting ``the Secretary of Homeland Security''; and
          (4) in subsection (e)--
                  (A) by striking ``the Secretary'' and inserting ``the 
                Secretary of Homeland Security''; and
                  (B) by striking ``Under Secretary'' each place it 
                appears and inserting ``Administrator of the 
                Transportation Security Administration''.
  (m) Section 44912.--Section 44912 of title 49, United States Code, is 
amended--
          (1) in subsection (a)--
                  (A) in paragraph (1), by striking ``Under Secretary 
                of Transportation for Security'' and inserting 
                ``Administrator of the Transportation Security 
                Administration''; and
                  (B) in paragraph (3), by striking ``Secretary of 
                Transportation'' and inserting ``Secretary of Homeland 
                Security'';
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (n) Section 44913.--Section 44913 of title 49, United States Code, is 
amended--
          (1) in subsection (a)--
                  (A) in paragraph (1), by striking ``Under Secretary 
                of Transportation for Security'' and inserting 
                ``Administrator of the Transportation Security 
                Administration''; and
                  (B) in paragraph (2), by striking ``the Committee on 
                Transportation and Infrastructure'' and inserting ``the 
                Committee on Homeland Security'';
          (2) in subsection (b), by striking ``Secretary of 
        Transportation'' and inserting ``Secretary of Homeland 
        Security''; and
          (3) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (o) Section 44914.--Section 44914 of title 49, United States Code, is 
amended--
          (1) by striking ``Under Secretary of Transportation for 
        Security'' and inserting ``Administrator of the Transportation 
        Security Administration''; and
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (p) Section 44915.--Section 44915 of title 49, United States Code, is 
amended by striking ``Under Secretary of Transportation for Security'' 
and inserting ``Administrator of the Transportation Security 
Administration''.
  (q) Section 44916.--Section 44916 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (2) in subsection (b), by striking ``Under Secretary'' and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (r) Section 44917.--Section 44917 of title 49, United States Code, is 
amended--
          (1) in subsection (a)--
                  (A) in the matter preceding paragraph (1), by 
                striking ``Under Secretary of Transportation for 
                Security'' and inserting ``Administrator of the 
                Transportation Security Administration''; and
                  (B) in paragraph (2), by inserting ``of Homeland 
                Security, utilizing a risk-based security 
                methodology,'' after ``Secretary'';
          (2) by striking subsections (b) and (c);
          (3) redesignating subsection (d) as subsection (b); and
          (4) in subsection (b), as so redesignated--
                  (A) in paragraph (1), by striking ``Assistant 
                Secretary for Immigration and Customs Enforcement'' and 
                inserting ``Administrator of the Transportation 
                Security Administration''; and
                  (B) in paragraph (3), by striking ``Assistant 
                Secretary'' each place it appears and inserting 
                ``Administrator''.
  (s) Section 44918.--Section 44918 of title 49, United States Code, is 
amended--
          (1) in subsection (a)--
                  (A) in paragraph (2)(E), by striking ``the Under 
                Secretary for Border and Transportation Security of the 
                Department of Homeland Security'' and inserting ``the 
                Administrator of the Transportation Security 
                Administration''; and
                  (B) in paragraphs (5), (6), and (7), by striking 
                ``the Administrator'' each place it appears and 
                inserting ``the Administrator of the Federal Aviation 
                Administration''; and
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (t) Section 44919.--Section 44919 of title 49, United States Code, is 
amended by striking ``Under Secretary'' each place it appears and 
inserting ``Administrator of the Transportation Security 
Administration''.
  (u) Section 44920.--Section 44920 of title 49, United States Code, is 
amended by striking ``Under Secretary'' each place it appears and 
inserting ``Administrator of the Transportation Security 
Administration''.
  (v) Section 44921.--Section 44921 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (2) in subsection (b)(6)--
                  (A) by inserting ``the Committee on Homeland Security 
                and'' before ``the Committee on Transportation and 
                Infrastructure''; and
                  (B) by inserting ``the Committee on Homeland Security 
                and Governmental Affairs'' before ``the Committee on 
                Commerce, Science, and Transportation'';
          (3) in subsection (d)(4), by striking ``may,'' and inserting 
        ``may'';
          (4) in subsection (i)(2), by striking ``the Under Secretary'' 
        before ``may'';
          (5) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''; and
          (6) by striking ``Under Secretary's'' each place it appears 
        and inserting ``Transportation Security Administration 
        Administrator's''.
  (w) Section 44922.--Section 44922 of title 49, United States Code, is 
amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (x) Section 44923.--Section 44923 of title 49, United States Code, is 
amended--
          (1) in subsection (a), in the matter preceding paragraph (1), 
        by striking ``the Under Secretary for Border and Transportation 
        Security of the Department of Homeland Security'' and inserting 
        ``the Administrator of the Transportation Security 
        Administration'';
          (2) in subsection (c), by striking ``Secretary of 
        Transportation'' and inserting ``Secretary of Homeland 
        Security''; and
          (3) in subsection (d)--
                  (A) in paragraph (3), in the heading, by striking 
                ``Under secretary'' and inserting ``Administrator''; 
                and
                  (B) in paragraph (4), by inserting ``, Homeland 
                Security,'' before ``and Transportation and 
                Infrastructure''; and
          (4) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (y) Section 44924.--Section 44924 of title 49, United States Code, is 
amended--
          (1) in subsection (a)--
                  (A) by striking ``Under Secretary for Border and 
                Transportation for Security of the Department of 
                Homeland Security'' and inserting ``Administrator of 
                the Transportation Security Administration''; and
                  (B) by striking ``Administrator under'' and inserting 
                ``Administrator of the Federal Aviation Administration 
                under'';
          (2) in each of subsections (b) through (f), by inserting ``of 
        the Federal Aviation Administration'' after ``Administrator'' 
        each place it appears;
          (3) in subsection (g), by inserting ``the Committee on 
        Homeland Security and'' before ``the Committee on 
        Transportation and Infrastructure''; and
          (4) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (z) Section 44925.--Section 44925 of title 49, United States Code, is 
amended--
          (1) in subsection (b)--
                  (A) in paragraph (1), by striking ``Assistant 
                Security of Homeland Security (Transportation Security 
                Administration)'' and inserting ``Administrator of the 
                Transportation Security Administration''; and
                  (B) in paragraph (3), by inserting ``of Homeland 
                Security'' after ``Secretary''; and
          (2) in subsection (d), by striking ``Assistant Secretary'' 
        each place it appears and inserting ``Administrator of the 
        Transportation Security Administration''.
  (aa) Section 44926.--Section 44926 of title 49, United States Code, 
is amended--
          (1) in subsection (a), by striking ``United States'' and 
        inserting ``U.S.''; and
          (2) in subsection (b)(3)--
                  (A) in the matter preceding subparagraph (A), by 
                striking ``an'' and inserting ``a''; and
                  (B) in subparagraph (B), by striking ``United 
                States'' and inserting ``U.S.''.
  (bb) Section 44927.--Section 44927 of title 49, United States Code, 
is amended--
          (1) in subsection (a), in the first sentence, by striking 
        ``Veteran'' and inserting ``Veterans''; and
          (2) by striking ``Assistant Secretary'' each place it appears 
        and inserting ``Administrator of the Transportation Security 
        Administration''.
  (cc) Section 44933.--Section 44933 of title 49, United States Code, 
is amended--
          (1) in the heading, by striking ``managers'' and inserting 
        ``directors'';
          (2) in subsection (a)--
                  (A) in the first sentence--
                          (i) by striking ``Under Secretary of 
                        Transportation for Security'' and inserting 
                        ``Administrator of the Transportation Security 
                        Administration''; and
                          (ii) by striking ``Manager'' and inserting 
                        ``Director'';
                  (B) in the second sentence--
                          (i) by striking ``Under Secretary'' and 
                        inserting ``Administrator of the Transportation 
                        Security Administration''; and
                          (ii) by striking the term ``Managers'' each 
                        place it appears and inserting ``Directors''; 
                        and
          (3) in subsection (b)--
                  (A) in the matter preceding paragraph (1), by 
                striking ``Manager'' and inserting ``Director''; and
                  (B) in paragraph (2), by striking ``Under Secretary'' 
                and inserting ``the Administrator of the Transportation 
                Security Administration''.
  (dd) Section 44934.--Section 44934 of title 49, United States Code, 
is amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (ee) Section 44935.--Section 44935 of title 49, United States Code, 
is amended--
          (1) by striking ``Under Secretary of Transportation for 
        Security'' each place it appears and inserting ``Administrator 
        of the Transportation Security Administration'';
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration'';
          (3) in subsection (e)(2)(A)(ii), by striking ``section 
        1101(a)(22) of the Immigration and Nationality Act'' and 
        inserting ``section 101(a)(22) of the Immigration and 
        Nationality Act''; and
          (4) by redesignating the second subsection (i) (relating to 
        accessibility of computer-based training facilities) as 
        subsection (k).
  (ff) Section 44936.--Section 44936 of title 49, United States Code, 
is amended--
          (1) in subsection (a)(1)--
                  (A) in subparagraph (A)--
                          (i) by striking ``Under Secretary of 
                        Transportation for Security'' and inserting 
                        ``Administrator of the Transportation Security 
                        Administration''; and
                          (ii) by striking ``Under Secretary of 
                        Transportation for Transportation Security,,'' 
                        and inserting ``Administrator of the 
                        Transportation Security Administration,''; and
                  (B) in subparagraphs (B) and (C), by striking ``Under 
                Secretary of Transportation for Transportation 
                Security'' each place it appears and inserting 
                ``Administrator of the Transportation Security 
                Administration'';
          (2) in subsection (c)(1), by striking ``Under Secretary's'' 
        and inserting ``Transportation Security Administration 
        Administrator's''; and
          (3) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (gg) Section 44937.--Section 44937 of title 49, United States Code, 
is amended by striking ``Under Secretary of Transportation for 
Security'' and inserting ``Administrator of the Transportation Security 
Administration''.
  (hh) Section 44938.--Section 44938 of title 49, United States Code, 
is amended--
          (1) in subsection (a), in the matter preceding paragraph 
        (1)--
                  (A) by striking ``Secretary of Transportation'' and 
                inserting ``Secretary of Homeland Security'';
                  (B) by striking ``the Secretary considers'' and 
                inserting ``the Secretary of Homeland Security 
                considers'';
                  (C) by striking ``The Secretary'' and inserting ``The 
                Secretary of Homeland Security''; and
                  (D) by striking ``Under Secretary of Transportation 
                Security'' and inserting ``Administrator of the 
                Transportation Security Administration''; and
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (ii) Section 44940.--Section 44940 of title 49, United States Code, 
is amended--
          (1) in subsection (a)(1)--
                  (A) in the matter preceding paragraph (1), by 
                striking ``Under Secretary of Transportation for 
                Security'' and inserting ``Administrator of the 
                Transportation Security Administration''; and
                  (B) in subparagraph (F) by striking `` Managers'' and 
                inserting ``Directors'';
          (2) in subsection (e)(1), in the heading, by striking ``Under 
        secretary'' and inserting ``Administrator''; and
          (3) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (jj) Section 44941.--Section 44941 of title 49, United States Code, 
is amended by inserting ``the Department of Homeland Security,'' before 
``the Department of Transportation''.
  (kk) Section 44942.--Section 44942 of title 49, United States Code, 
is amended--
          (1) in subsection (b)--
                  (A) in paragraph (1)--
                          (i) by redesignating paragraph (1) as 
                        subsection (c) and moving such subsection, as 
                        so redesignated, two ems to the left; and
                          (ii) by redesignating subparagraphs (A) and 
                        (B) as subsections (d) and (e), respectively, 
                        and moving such subsections, as so 
                        redesignated, four ems to the left;
          (2) by striking subsections (a) and (b);
          (3) by striking subsection (c), as so redesignated;
          (4) by redesignating subsections (d) and (e), as so 
        redesignated, as subsections (a) and (b), respectively;
          (5) by striking the term ``the Secretary'' each place it 
        appears and inserting ``the Secretary of Homeland Security'';
          (6) by striking ``Under Secretary for Transportation 
        Security'' each place it appears and inserting ``Administrator 
        of the Transportation Security Administration''; and
          (7) by striking ``Congress'' and inserting ``the Committee on 
        Homeland Security of the House of Representatives and the 
        Committee on Commerce, Science, and Transportation of the 
        Senate''.
  (ll) Section 44943.--Section 44943 of title 49, United States Code, 
is amended--
          (1) in subsection (a), by striking ``The Under Secretary for 
        Transportation Security'' and inserting ``The Administrator of 
        the Transportation Security Administration'';
          (2) in subsection (b)--
                  (A) in paragraph (1)--
                          (i) by striking ``the Secretary'' and 
                        inserting ``the Secretary of Homeland 
                        Security''; and
                          (ii) by striking ``Under Secretary of 
                        Transportation for Security'' and inserting 
                        ``Administrator of the Transportation Security 
                        Administration''; and
                  (B) by striking ``the Under Secretary'' each place it 
                appears and inserting ``the Administrator of the 
                Transportation Security Administration''; and
          (3) in subsection (c), by striking ``the Under Secretary for 
        Transportation Security'' and inserting ``the Administrator of 
        the Transportation Security Administration''.
  (mm) Section 44944.--Section 44944 of title 49, United States Code, 
is amended--
          (1) in subsection (a)(1), by striking ``Under Secretary of 
        Transportation for Transportation Security'' and inserting 
        ``Administrator of the Transportation Security 
        Administration''; and
          (2) by striking ``Under Secretary'' each place it appears and 
        inserting ``Administrator of the Transportation Security 
        Administration''.
  (nn) Section 44945.--Section 44945 of title 49, United States Code, 
is amended by striking ``Assistant Secretary'' each place it appears 
and inserting ``Administrator of the Transportation Security 
Administration''.
  (oo) Section 44946.--Section 44946 of title 49, United States Code, 
is amended--
          (1) in subsection (c)(2)(A), by striking ``, but a member may 
        continue to serve until a successor is appointed'' and 
        inserting ``but may continue until such time as a successor 
        member begins serving on the Advisory Committee'';
          (2) in subsection (g)--
                  (A) by striking paragraph (2); and
                  (B) redesignating paragraph (3) as paragraph (2); and
          (3) by striking ``Assistant Secretary'' each place it appears 
        and inserting ``Administrator of the Transportation Security 
        Administration''.
  (pp) Section 45107.--Section 45107 of title 49, United States Code, 
is amended--
          (1) in subsection (a), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''; and
          (2) in subsection (b), by striking the second sentence.
  (qq) Clerical Amendments.--The analysis for chapter 449 of title 49, 
United States Code, is amended by striking the item relating to section 
44933 and inserting the following new item:

``44933. Federal Security Directors.''.

SEC. 503. AMENDMENTS TO THE AVIATION AND TRANSPORTATION SECURITY ACT.

  (a) Section 101.--Section 101 of the Aviation and Transportation 
Security Act (Public Law 107-71) is amended--
          (1) in subsection (c) (5 U.S.C. 5313 note)--
                  (A) by striking paragraph (1);
                  (B) by redesignating paragraphs (2) and (3) as 
                paragraph (1) and (2), respectively; and
                  (C) in paragraph (1), as so redesignated--
                          (i) by striking ``Under Secretary'' and 
                        inserting ``Administrator of the Transportation 
                        Security Administration'';
                          (ii) by striking ``30 percent'' and inserting 
                        ``15 percent'';
                          (iii) by striking ``the Secretary's'' and 
                        inserting ``the Secretary of Homeland 
                        Security's''; and
                          (iv) by striking ``Under Secretary's'' and 
                        inserting ``Transportation Security 
                        Administration Administrator's''; and
          (2) by striking subsection (g) (49 U.S.C. 44901 note).
  (b) Section 106.--Section 106 of the Aviation and Transportation 
Security Act (49 U.S.C. 44903 note) is amended--
          (1) in subsection (b)--
                  (A) in paragraph (1), in the matter preceding 
                subparagraph (A), by striking ``Under Secretary of 
                Transportation for Security'' and inserting 
                ``Administrator of the Transportation Security 
                Administration'';
                  (B) in paragraph (2)(A), by striking ``Under 
                Secretary'' each place it appears and inserting 
                ``Administrator''; and
                  (C) in paragraph (2)(B), in the matter preceding 
                clause (i), by striking ``Secretary'' and inserting 
                ``Secretary of Homeland Security''; and
          (2) in subsection (e), by striking ``Under Secretary of 
        Transportation for Security'' and inserting ``Administrator of 
        the Transportation Security Administration''.
  (c) Section 109.--Section 109 of the Aviation and Transportation 
Security Act (49 U.S.C. 114 note) is amended--
          (1) in subsection (a)--
                  (A) by striking ``(a) In General.--The Under 
                Secretary of Transportation for Security'' and 
                inserting ``The Administrator of the Transportation 
                Security Administration'';
                  (B) in paragraph (4), by--
                          (i) striking ``medical product'' and 
                        inserting ``liquid or gel medical product or 
                        nourishment and nutrition for infants and 
                        toddlers, including formula, breast milk, and 
                        juice,''; and
                          (ii) by striking ``the product'' and 
                        inserting ``such product or nourishment or 
                        nutrition''; and
                  (C) in paragraph (7), by striking ``voice stress 
                analysis, biometric,'' and inserting ``biometric''; and
          (2) by striking subsection (b).
  (d) Section 110.--Section 110 of the Aviation and Transportation 
Security Act is amended by striking subsections (c) and (d).
  (e) Section 111.--Section 111 of the Aviation and Transportation 
Security Act (49 U.S.C. 44935 note) is amended--
          (1) in subsection (c)--
                  (A) by striking ``Under Secretary of Transportation 
                for Security'' and inserting ``Administrator of the 
                Transportation Security Administration''; and
                  (B) by striking ``Under Secretary'' each place it 
                appears and inserting ``Administrator of the 
                Transportation Security Administration'';
          (2) in subsection (d)--
                  (A) in paragraph (1)--
                          (i) by striking ``Under Secretary of 
                        Transportation for Security'' and inserting 
                        ``Administrator of the Transportation Security 
                        Administration''; and
                          (ii) by striking ``Under Secretary'' each 
                        place it appears and inserting 
                        ``Administrator''; and
                  (B) in paragraph (2), by striking ``Under Secretary'' 
                and inserting ``Administrator of the Transportation 
                Security Administration''.
  (f) Section 117.--Section 117 of the Aviation and Transportation 
Security Act (49 U.S.C. 44903 note) is amended by striking ``Secretary 
of Transportation'' and inserting ``Secretary of Homeland Security''.
  (g) Section 132.--Section 132 of the Aviation and Transportation 
Security Act is repealed.
  (h) Section 135.--Section 135 of the Aviation and Transportation 
Security Act is repealed.
  (i) Section 137.--Section 137 of the Aviation and Transportation 
Security Act (49 U.S.C. 44912 note) is repealed.
  (j) Redesignations.--Sections 133, 134, 136, 138, 139, 140, 141, 142, 
143, 144, 145, 146, and 147 of the Aviation and Transportation Security 
Act are amended by redesignating such sections as sections 132, 133, 
134, 135, 136, 137, 138, 139, 140, 141, 142, 143, and 144, 
respectively.

SEC. 504. INFORMATION REQUIRED TO BE SUBMITTED TO CONGRESS UNDER THE 
                    STRATEGIC 5-YEAR TECHNOLOGY INVESTMENT PLAN OF THE 
                    TRANSPORTATION SECURITY ADMINISTRATION.

  (a) Additional Information Required.--Section 1611 of the Homeland 
Security Act of 2002 (6 U.S.C. 563) is amended--
          (1) in subsection (g)--
                  (A) in the matter preceding paragraph (1), by 
                striking ``biennially'' and inserting ``annually'';
                  (B) in paragraph (1), by striking ``and'';
                  (C) in paragraph (2), by striking the period and 
                inserting ``; and'';
                  (D) by adding at the end the following new paragraph:
          ``(3) information about acquisitions completed during the 
        fiscal year preceding the fiscal year during which the report 
        is submitted.''; and
          (2) by adding at the end the following new subsections:
  ``(h) Notice of Covered Changes to Plan.--
          ``(1) Notice required.--The Administrator shall submit to the 
        Committee on Commerce, Science, and Transportation of the 
        Senate and the Committee on Homeland Security of the House of 
        Representatives notice of any covered change to the Plan by not 
        later than 90 days after the date on which the change is made.
          ``(2) Definition of change.--In this subsection, the term 
        `covered change' means an increase or decrease in the dollar 
        amount allocated to the procurement of a technology or an 
        increase or decrease in the number of a technology.''.
  (b) Report on Equipment in Operation Post-life-cycle.--Not later than 
90 days after the date of the enactment of this Act, the Administrator 
of the Transportation Security Administration shall submit to the 
Committee on Commerce, Science, and Transportation of the Senate and 
the Committee on Homeland Security of the House of Representatives a 
report describing any equipment of the Transportation Security 
Administration that is in operation after--
          (1) the end of the life-cycle of the equipment specified by 
        the manufacturer of the equipment; or
          (2) the end of the useful life projection for the equipment 
        under the strategic 5-year technology investment plan of the 
        Transportation Security Administration, as required by section 
        1611 of the Homeland Security Act of 2002 (6 U.S.C. 563).
  (c) Notice to Airports and Airlines.--Upon the enactment of this Act, 
the Administrator of the Transportation Security Administration shall 
notify airports and airlines of any changes to the 5-year technology 
investment plan of the Transportation Security Administration.

SEC. 505. MAINTENANCE OF SECURITY-RELATED TECHNOLOGY.

  (a) In General.--Title XVI of the Homeland Security Act of 2002 (6 
U.S.C. 561 et seq.) is amended by adding at the end the following new 
subtitle:

        ``Subtitle C--Maintenance of Security-Related Technology

``SEC. 1621. MAINTENANCE VALIDATION AND OVERSIGHT.

  ``(a) In General.--Not later than 180 days after the date of the 
enactment of this subtitle, the Administrator shall develop and 
implement a preventive maintenance validation process for security-
related technology deployed to airports.
  ``(b) Maintenance by Administration Personnel at Airports.--For 
maintenance to be carried out by Administration personnel at airports, 
the process referred to in subsection (a) shall include the following:
          ``(1) Guidance to Administration personnel at airports 
        specifying how to conduct and document preventive maintenance 
        actions.
          ``(2) Mechanisms for the Administrator to verify compliance 
        with the guidance issued pursuant to paragraph (1).
  ``(c) Maintenance by Contractors at Airports.--For maintenance to be 
carried by a contractor at airports, the process referred to in 
subsection (a) shall require the following:
          ``(1) Provision of monthly preventative maintenance schedules 
        to appropriate Administration personnel at each airport that 
        includes information on each action to be completed by 
        contractor.
          ``(2) Notification to appropriate Administration personnel at 
        each airport when maintenance action is completed by a 
        contractor.
          ``(3) A process for independent validation by a third party 
        of contractor maintenance.
  ``(d) Penalties for Noncompliance.--The Administrator shall require 
maintenance contracts for security-related technology deployed to 
airports to include penalties for noncompliance when it is determined 
that either preventive or corrective maintenance has not been completed 
according to contractual requirements and manufacturers' 
specifications.''.
  (b) Clerical Amendment.--The table of contents of the Homeland 
Security Act of 2002 is amended by inserting after the item relating to 
section 1616 the following:

        ``Subtitle C--Maintenance of Security-Related Technology

``Sec. 1621. Maintenance validation and oversight.''.

SEC. 506. TRANSPORTATION SECURITY ADMINISTRATION EFFICIENCY.

  (a) Efficiency Review.--Not later than 270 days after the date of the 
enactment of this Act, the Administrator of the Transportation Security 
Administration shall conduct and complete a comprehensive, agency-wide 
efficiency review of the Administration to identify and effectuate 
spending reductions and administrative savings through the streamlining 
or restructuring of Administration divisions to make the Administration 
more efficient. In carrying out the review under this section, the 
Administrator shall consider each of the following:
          (1) The elimination of any unnecessarily duplicative or 
        overlapping programs and initiatives that can be streamlined.
          (2) The elimination of any unnecessary or obsolete rules, 
        regulations, directives, or procedures.
          (3) The reduction in overall operating expenses of the 
        Administration, including costs associated with the number of 
        personnel, as a direct result of efficiencies gained through 
        the implementation of risk-based screening or through any other 
        means as determined by the Administrator.
          (4) Any other matters the Administrator determines are 
        appropriate.
  (b) Report to Congress.--Not later than 30 days after the completion 
of the efficiency review required under subsection (a), the 
Administrator of the Transportation Security Administration shall 
report to the Committee on Homeland Security of the House of 
Representatives and the Committee on Commerce, Science, and 
Transportation of the Senate on the results and cost savings expected 
to be achieved through such efficiency review.

SEC. 507. TRANSPORTATION SENIOR EXECUTIVE SERVICE ACCOUNTABILITY.

  (a) Reduction Plan.--Not later than 270 days after the date of the 
enactment of this Act, the Secretary of Homeland Security, acting 
through the Administrator of the Transportation Security 
Administration, shall develop a strategic plan, including a timeline, 
to reduce by 20 percent by June 30, 2019, the number of positions at 
the Senior Executive Service level at the Administration.
  (b) Congressional Review.--Not later than 30 days after the 
completion of the Senior Executive Service reduction plan required 
under subsection (a), the Administrator of the Transportation Security 
Administration shall submit to the Committee on Homeland Security of 
the House of Representatives and the Committee on Commerce, Science, 
and Transportation of the Senate a copy of such plan.

              Subtitle B--Passenger Security and Screening

SEC. 511. DEPARTMENT OF HOMELAND SECURITY TRUSTED TRAVELER PROGRAM 
                    COLLABORATION.

  The Secretary of Homeland Security shall continue the review of all 
trusted traveler vetting programs carried out by the Department of 
Homeland Security using representatives from such programs to make 
recommendations on possible efficiencies that could be gained by 
integrating requirements and operations and increasing information and 
data sharing across programs.

SEC. 512. PRECHECK BIOMETRIC PILOT PROJECT.

  Not later than one year after the date of the enactment of this Act, 
the Administrator of the Transportation Security Administration (TSA) 
shall conduct a pilot project to test a secure, automated, and 
biometric-based system at airports to verify the identity of 
individuals who are members of TSA PreCheck or another Department of 
Homeland Security trusted traveler program that affords TSA expedited 
screening. Such system shall be designed to--
          (1) improve security while also reducing the need for 
        security screening personnel to perform identity and travel 
        document verification for such individuals;
          (2) reduce the average wait time of such individuals;
          (3) reduce overall operating expenses of the Administration;
          (4) be integrated with the Department's watch list and 
        trusted traveler matching programs; and
          (5) be integrated with other technologies to further 
        facilitate risk-based passenger screening at checkpoints, to 
        the extent practicable and consistent with security standards.

SEC. 513. IDENTITY AND TRAVEL DOCUMENT VERIFICATION.

  Section 44901 of title 49, United States Code, is amended by adding 
at the end the following new subsection:
  ``(m) Establishment of Screening System for Certain Persons.--Not 
later than December 31, 2018, the Administrator of the Transportation 
Security Administration shall, subject to the availability of 
appropriations, implement an identity and travel document verification 
system designed to establish a secure, automated system at all airports 
for verifying identity and travel documents of persons seeking entry 
into the sterile area of an airport. Such system shall--
          ``(1) assess the need for security screening personnel to 
        perform identity and travel document verification for such 
        passengers, thereby assessing the overall number of such 
        screening personnel;
          ``(2) reduce the average wait time of such passengers;
          ``(3) reduce overall operating expenses of the 
        Administration;
          ``(4) be integrated with the Administration's watch list 
        matching program; and
          ``(5) be integrated with other technologies to further 
        facilitate risk-based passenger screening at checkpoints, to 
        the extent practicable and consistent with security 
        standards.''.

SEC. 514. COMPUTED TOMOGRAPHY PILOT PROJECT.

  Not later than 90 days after the date of the enactment of this Act, 
the Administrator of the Transportation Security Administration shall 
conduct a pilot project to test the use of screening equipment using 
computed tomography technology to screen baggage at passenger 
checkpoints.

SEC. 515. EXPLOSIVES DETECTION CANINE TEAMS FOR AVIATION.

  (a) Passenger Screening Teams.--The Administrator of the 
Transportation Security Administration shall ensure that by December 
31, 2018, at least 300 explosives detection canine teams are dedicated 
to passenger screening purposes at airports in the United States at 
which the Administration performs, or oversees the implementation and 
performance of, security measures, including screening 
responsibilities.
  (b) Use of Canines to Detect Screening Anomalies.--At airports in the 
United States at which--
          (1) canine teams trained to screen passengers are available, 
        and
          (2) the Transportation Security Administration has passenger 
        screening responsibilities,
the Administrator of the Transportation Security Administration may use 
such teams to detect screening anomalies.

SEC. 516. STANDARD OPERATING PROCEDURES AT AIRPORT CHECKPOINTS.

  (a) Standardization.--The Administrator of the Transportation 
Security Administration shall require, to the extent practicable, that 
standard operating procedures at airport checkpoints for passengers and 
carry-on baggage are carried out in a uniform manner among similarly 
situated airports.
  (b) Report to Congress.--Not later than 270 days after the date of 
the enactment of this Act, the Administrator of the Transportation 
Security Administration shall submit to the Committee on Homeland 
Security of the House of Representatives and the Committee on Commerce, 
Science, and Transportation of the Senate a report on how standard 
operating procedures were made uniform in accordance with subsection 
(a).
  (c) Audits.--Beginning one year after the date of the enactment of 
this Act, the Inspector General of the Department of Homeland Security 
shall conduct periodic audits of adherence to the standard operating 
procedures, as established by the Administrator of the Transportation 
Security Administration, under this section of screening personnel at 
large, medium, and small airports in diverse geographical areas.

SEC. 517. TRAVELER REDRESS IMPROVEMENT.

  (a) Redress Process.--
          (1) In general.--Not later than 30 days after the date of the 
        enactment of this Act, the Administrator of the Transportation 
        Security Administration shall, using existing resources, 
        systems, and processes, ensure the availability of the 
        Department of Homeland Security Traveler Redress Inquiry 
        Program (DHS TRIP) redress process to adjudicate inquiries for 
        individuals who--
                  (A) are citizens of the United States or aliens 
                lawfully admitted for permanent residence;
                  (B) have filed an inquiry with DHS TRIP after 
                receiving enhanced screening at an airport passenger 
                security checkpoint more than three times in any 60-day 
                period; and
                  (C) believe they have been wrongly identified as 
                being a threat to aviation security.
          (2) Report.--Not later than 180 days after the date of the 
        enactment of this Act, the Administrator of the Transportation 
        Security Administration shall submit to the Committee on 
        Homeland Security of the House of Representatives and the 
        Committee on Commerce, Science, and Transportation of the 
        Senate a report on the implementation of the redress process 
        required under paragraph (1).
  (b) Privacy Impact Review and Update.--
          (1) In general.--Not later than 180 days after the date of 
        the enactment of this Act, the Administrator of the 
        Transportation Security Administration shall review and update 
        the Privacy Impact Assessment for the Secure Flight programs to 
        ensure such Assessment accurately reflects the operation of 
        such programs.
          (2) Public dissemination; form.--The Secure Flight Privacy 
        Impact Assessment review and update required under paragraph 
        (1) shall be published on a publically-accessible internet 
        webpage of the Transportation Security Administration and 
        submitted to the Committee on Homeland Security of the House of 
        Representatives and the Committee on Commerce, Science, and 
        Transportation of the Senate.
  (c) Transportation Security Administration Rule Review and 
Notification Process.--
          (1) Rule review.--Not later than 60 days after the date of 
        the enactment of this Act and every 120 days thereafter, the 
        Assistant Administrator of the Office of Intelligence and 
        Analysis of the Transportation Security Administration, in 
        coordination with the entities specified in paragraph (2), 
        shall conduct a comprehensive review of the Transportation 
        Security Administration's intelligence-based screening rules.
          (2) Notification process.--Not later than 48 hours after 
        changing, updating, implementing, or suspending a 
        Transportation Security Administration intelligence-based 
        screening rule, the Assistant Administrator of the Office of 
        Intelligence and Analysis of the Transportation Security 
        Administration shall notify the following entities of any such 
        change, update, implementation, or suspension, as the case may 
        be:
                  (A) The Office of Civil Rights and Liberties, 
                Ombudsman, and Traveler Engagement of the 
                Transportation Security Administration.
                  (B) The Office of Civil Rights and Liberties of the 
                Department of Homeland Security.
                  (C) The Office of Chief Counsel of the 
                Administration.
                  (D) The Office of General Counsel of the Department.
                  (E) The Privacy Office of the Administration.
                  (F) The Privacy Office of the Department.
                  (G) The Federal Air Marshal Service.
                  (H) The Traveler Redress Inquiry Program of the 
                Department.
  (d) Federal Air Marshal Service Coordination.--
          (1) In general.--The Administrator of the Transportation 
        Security Administration shall ensure that the Transportation 
        Security Administration's intelligence-based screening rules 
        are taken into account for Federal Air Marshal mission 
        scheduling.
          (2) Report.--Not later than 180 days after the date of the 
        enactment of this Act, the Administrator of the Transportation 
        Security Administration shall submit to the Committee on 
        Homeland Security of the House of Representatives and the 
        Committee on Commerce, Science, and Transportation of the 
        Senate a report on how the Transportation Security 
        Administration's intelligence-based screening rules are 
        incorporated in the risk analysis conducted during the Federal 
        Air Marshal mission scheduling process.
  (e) GAO Report.--Not later than one year after the date of the 
enactment of this Act, the Comptroller General of the United States 
shall submit to the Committee on Homeland Security of the House of 
Representatives and the Committee on Commerce, Science, and 
Transportation of the Senate a study on the Transportation Security 
Administration's intelligence-based screening rules and the 
effectiveness of such rules in identifying and mitigating potential 
threats to aviation security. Such study shall also examine 
coordination between the Transportation Security Administration, the 
Department of Homeland Security, and other relevant partners relating 
to changing, updating, implementing, or suspending such rules as 
necessary.

SEC. 518. SCREENING IN AREAS OTHER THAN PASSENGER TERMINALS.

  The Administrator of the Transportation Security Administration is 
authorized to provide screening services to a commercial charter air 
carrier in areas other than primary passenger terminals upon the 
request of such carrier. A commercial charter air carrier shall direct 
any such request to the Federal Security Director for the airport where 
such services are requested. A Federal Security Director may elect to 
provide screening services if such services are available. The 
Administrator shall enter into an agreement with a commercial charter 
air carrier for compensation from such carrier requesting the use of 
screening services for all reasonable costs in addition to overtime 
costs that are incurred in the provision of screening services under 
this section.

SEC. 519. FEDERAL AIR MARSHAL SERVICE AGREEMENTS.

  (a) Standardization.--Not later than 60 days after the date of the 
enactment of the Act, the Administrator of the Transportation Security 
Administration shall develop a standard working document that shall be 
the basis of all negotiations and agreements that begin after the date 
of the enactment of this Act between the United States and foreign 
governments or partners regarding Federal Air Marshal coverage of 
flights to and from the United States.
  (b) Written Agreements.--All agreements between the United States and 
foreign governments or partners regarding the presence of Federal Air 
Marshals on flights to and from the United States must be written and 
signed by the Secretary of Homeland Security or the Secretary's 
designee.
  (c) Congressional Notification.--The Secretary of Homeland Security 
shall transmit to the relevant Congressional committees any agreements 
described in subsection (b) within 30 days of such agreement being 
signed.

SEC. 520. FEDERAL AIR MARSHAL MISSION SCHEDULING AUTOMATION.

  The Administrator of the Transportation Security Administration shall 
seek to acquire an automated software capability for the scheduling of 
Federal Air Marshal Service missions based on current risk modeling.

SEC. 521. CANINE DETECTION RESEARCH AND DEVELOPMENT.

  (a) In General.--The Secretary of Homeland Security shall conduct an 
audit of all canine training programs of the Department of Homeland 
Security and convene a working group of representatives from all such 
programs to make recommendations on possible efficiencies that could be 
gained by integrating training standards and facilities.
  (b) Canine Staffing Allocation Model.--The Administrator of the 
Transportation Security Administration shall develop a staffing 
allocation model for canines to determine the optimal number of 
passenger screening canines at airports in the United States.
  (c) Report to Congress.--Not later than 180 days after the date of 
the enactment of this Act, the Secretary of Homeland Security shall 
submit to the Committee on Homeland Security of the House of 
Representatives and the Committee on Commerce, Science, and 
Transportation of the Senate a report on the recommendations required 
by subsection (a).
  (d) Briefing to Congress.--
          (1) In general.--Not later than 180 days after the date of 
        the enactment of this Act, the Administrator of the 
        Transportation Security Administration shall brief the 
        Committee on Homeland Security of the House of Representatives 
        and the Committee on Homeland Security and Governmental Affairs 
        and the Committee on Commerce, Science, and Transportation of 
        the Senate on the state of explosives detection canine 
        production and training in the United States.
          (2) Contents.--The briefing required under paragraph (1) 
        shall include the following:
                  (A) An analysis of the steps the Transportation 
                Security Administration may take to foster additional 
                production of explosives detection canines in the 
                United States by the private sector.
                  (B) Perspectives from current explosives detection 
                canine industry stakeholders regarding the impact of 
                the Administration's procurement model on business 
                considerations.
                  (C) An analysis regarding whether the Administration 
                effectively communicates canine training guidelines and 
                testing methodology to the private sector.
                  (D) The extent to which physical capacity limitations 
                at current Administration-operated sites hinder the 
                operations of either the Administration or industry.

SEC. 522. INTERNATIONAL CIVIL AVIATION ORGANIZATION.

  (a) In General.--Not later than 90 days after the date of the 
enactment of this Act, the United States Ambassador or the Charge 
d'Affaires to the United States Mission to the International Civil 
Aviation Organization shall pursue improvements to airport security, 
including if practicable, introducing a resolution to raise minimum 
standards for airport security.
  (b) Report to Congress.--Not later than 180 days after the date of 
the enactment of this Act, the United States Ambassador or the Charge 
d'Affaires to the United States Mission to the International Civil 
Aviation Organization shall report to the Committee on Homeland 
Security and the Committee on Foreign Affairs of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs, the Committee on Foreign Relations, and the Committee on 
Commerce, Science, and Transportation of the Senate on the 
implementation of subsection (a).

SEC. 523. PASSENGER SECURITY FEE.

  The Secretary of Homeland Security is prohibited from incorporating 
an increase in the passenger security fee under section 44940 of title 
49, United States Code, beyond what is authorized at the time the 
annual budget proposal for the Department of Homeland Security is 
transmitted to Congress.

SEC. 524. LAST POINT OF DEPARTURE AIRPORT CERTIFICATION.

  Subparagraph (B) of section 44907(a)(2) of title 49, United States 
Code, is amended by inserting ``, including the screening and vetting 
of airport workers'' before the semicolon at the end.

SEC. 525. SECURITY STANDARDS AT FOREIGN AIRPORTS.

  Section 44907 of title 49, United States Code, is amended--
          (1) in subsections (a) through (d), by striking ``Secretary 
        of Transportation'' each place it appears and inserting 
        ``Secretary of Homeland Security''; and
          (2) in subsection (e), in the matter preceding paragraph 
        (1)--
                  (A) by striking ``and 40106(b) of this title, the 
                Secretary of Transportation, with the approval of the 
                Secretary of State and without notice or a hearing, 
                shall'' and inserting ``40106(b), and 41307 of this 
                title, at the request of the Secretary of Homeland 
                Security and with the approval of the Secretary of 
                State and without notice or a hearing, the Secretary of 
                Transportation shall''; and
                  (B) by striking ``when the Secretary of 
                Transportation decides'' and inserting ``when the 
                Secretary of Homeland Security decides''.

SEC. 526. SECURITY INCIDENT RESPONSE AT AIRPORTS AND SURFACE 
                    TRANSPORTATION HUBS.

  The Gerardo Hernandez Airport Security Act of 2015 (Public Law 114-
50; 49 U.S.C. 44903 note) is amended--
          (1) in section 3--
                  (A) in subsection (b), in the matter preceding 
                paragraph (1), by striking ``may'' each place it 
                appears and inserting ``shall'';
                  (B) by redesignating subsection (c) as subsection 
                (d); and
                  (C) by inserting after subsection (b) the following 
                new subsection:
  ``(c) Review.--The Administrator of the Transportation Security 
Administration shall review the active shooter response guidelines 
specified for Department of Homeland Security personnel under this 
section and make a recommendation to the Secretary of Homeland Security 
to modify such guidelines for personnel who are certified Federal law 
enforcement officials and for personnel who are uniformed but unarmed 
security officials.''; and
          (2) in section 7--
                  (A) in subsection (b), in the matter preceding 
                paragraph (1), by striking ``may'' each place it 
                appears and inserting ``shall'';
                  (B) by redesignating subsections (c) and (d) as 
                subsections (d) and (e), respectively; and
                  (C) by inserting after subsection (b) the following 
                new subsection:
  ``(c) Review.--The Administrator of the Transportation Security 
Administration shall review the active shooter response guidelines 
specified for Department of Homeland Security personnel under this 
section and make a recommendation to the Secretary of Homeland Security 
to modify such guidelines for personnel who are certified Federal law 
enforcement officials and for personnel who are uniformed but unarmed 
security officials.''.

SEC. 527. AIRPORT SECURITY SCREENING OPT-OUT PROGRAM.

  Section 44920 of title 49, United States Code, is amended--
          (1) in subsection (b)--
                  (A) in paragraph (1), by striking ``120'' and 
                inserting ``90'';
                  (B) by redesignating paragraph (3) as paragraph (4);
                  (C) by inserting after paragraph (2) the following 
                new paragraph:
                  ``(3) Entrance into contract.--The Administrator of 
                the Transportation Security Administration shall make 
                best efforts to enter into a contract with a private 
                screening company to provide screening services at an 
                airport not later than 180 days after the date of 
                approval of an application submitted by the operator of 
                such airport under subsection (a).''; and
                  (D) in subparagraph (A) of paragraph (4), as so 
                redesignated, in the matter preceding clause (i), by 
                striking ``not later than 60 days following the date of 
                the denial'' and inserting ``immediately upon issuing 
                the denial''; and
          (2) by striking subsection (h) and inserting the following 
        new subsections:
  ``(h) Evaluation of Screening Company Proposals for Award.--
Notwithstanding any other provision of law, including title 48 of the 
Code of Federal Regulations and the Federal Advisory Committee Act (5 
U.S.C. App.), an airport operator that has applied and been approved to 
have security screening services carried out by a qualified private 
screening company under contract with the Administrator of the 
Transportation Security Administration may nominate to the head of the 
contracting activity an individual to participate in the evaluation of 
proposals for the award of such contract. Any such participation on a 
proposal evaluation committee shall be conducted in accordance with the 
provisions and restrictions of chapter 21 of title 41, United States 
Code.
  ``(i) Innovative Screening Approaches and Technologies.--The operator 
of an airport at which screening services are provided under this 
section is encouraged to recommend to the Administrator of the 
Transportation Security Administration innovative screening approaches 
and technologies. Upon receipt of any such recommendations, the 
Administrator, shall review and, if appropriate, test, conduct a pilot 
project, and, if appropriate, deploy such approaches and 
technologies.''.

SEC. 528. PERSONNEL MANAGEMENT SYSTEM REVIEW.

  (a) In General.--Notwithstanding subsection (d) of section 111 of the 
Aviation and Transportation Security Act (49 U.S.C. 44935 note), not 
later than 30 days after the date of the enactment of this Act, the 
Administrator of the Transportation Security Administration shall 
convene a working group consisting of representatives of the 
Administration and representatives of the labor organization 
representing security screening personnel to negotiate reforms to the 
Administration's personnel management system, including appeals to the 
Merit Systems Protection Board and grievance procedures.
  (b) Report.--Not later than one year after the date of the enactment 
of this Act, the working group convened under subsection (a) shall 
submit to the Administrator of the Transportation Security 
Administration and the Committee on Homeland Security of the House of 
Representatives and the Committee on Commerce, Science, and 
Transportation of the Senate a report containing agreed-upon reforms to 
the Administration's personnel management system. The Administrator may 
implement associated recommendations mutually agreed to by the parties 
to such working group before the end of such one year period.

SEC. 529. INNOVATION TASK FORCE.

  (a) In General.--The Administrator of the Transportation Security 
Administration may establish a task force to collaborate with air 
carriers, airport operators, and other aviation security stakeholders 
to foster the pursuit of innovations in aviation security prior to the 
acquisition process.
  (b) Activities.--The task force authorized under subsection (a) may 
conduct activities designed to identify and develop an innovative 
technology or capability with the potential of enhancing aviation 
security, including--
          (1) conducting a field demonstration of such a technology or 
        capability in the airport environment;
          (2) gathering performance data from such a demonstration to 
        inform the acquisition process; and
          (3) providing funding and promoting efforts to enable 
        participation in a demonstration by a small business that has 
        an innovative technology but does not have adequate resources 
        to participate.
  (c) Composition.--The task force authorized under subsection (a) 
shall be--
          (1) chaired by the Administrator of the Transportation 
        Security Administration's designee; and
          (2) comprised of representatives appointed by the 
        Administrator, in consultation with the Chairperson of the 
        Aviation Security Advisory Committee (established pursuant to 
        section 44936 of title 49, United States Code), from 
        appropriate stakeholders from--
                  (A) within the Administration;
                  (B) air carriers;
                  (C) airport operators;
                  (D) other aviation security stakeholders; and
                  (E) as appropriate, the Science and Technology 
                Directorate of the Department of Homeland Security and 
                any other appropriate component of the Department.
  (d) Rule of Construction.--Nothing in this section shall require the 
Administrator of the Transportation Security Administration to acquire 
an innovative technology or emerging security capability.
  (e) Non-applicability of FACA.--The Federal Advisory Committee Act (5 
U.S.C. App.) shall not apply to the task force authorized under 
subsection (a).

SEC. 530. AIRPORT LAW ENFORCEMENT REIMBURSEMENT.

  Not later than 120 days after the date of the enactment of this Act, 
the Administrator of the Transportation Security Administration shall 
submit to the Committee on Homeland Security of the House of 
Representatives and the Committee on Commerce, Science, and 
Transportation of the Senate a report on the Transportation Security 
Administration's law enforcement officer reimbursement program, which 
shall include information relating to the following:
          (1) The current structure of the program, including how 
        funding disbursement decisions are made.
          (2) An assessment of threats requiring law enforcement 
        officer response at airports.
          (3) The scope of current law enforcement activities covered 
        under the program, and an assessment of whether such covered 
        activities should be expanded to reflect emerging threats.
          (4) The annual costs to airport authorities for providing law 
        enforcement for such covered activities at security 
        checkpoints.
          (5) Proposed methodology for funding allocations.

 Subtitle C--Transportation Security Screening Personnel Training and 
                             Accountability

SEC. 531. TRANSPORTATION SECURITY TRAINING PROGRAMS.

  (a) In General.--Section 44935 of title 49, United States Code, as 
amended by this Act, is further amended by adding at the end the 
following new subsection:
  ``(l) Initial and Recurring Training.--
          ``(1) In general.--The Administrator of the Transportation 
        Security Administration shall establish a training program for 
        new security screening personnel located at the Federal Law 
        Enforcement Training Center in Glynco, Georgia.
          ``(2) Recurring training.--Not later than 180 days after the 
        date of the enactment of this subsection, the Administrator of 
        the Transportation Security Administration shall establish 
        recurring training of security screening personnel regarding 
        updates to screening procedures and technologies, including 
        methods to identify the verification of false or fraudulent 
        travel documents, as well as training on emerging threats, in 
        response to weaknesses identified in covert tests at airports. 
        The training shall include--
                  ``(A) internal controls for monitoring and 
                documenting compliance of transportation security 
                officers with such training requirements; and
                  ``(B) such other matters as identified by the 
                Administrator with regard to such training.''.
  (b) GAO Study.--Not later than one year after the date of the 
enactment of this Act, the Comptroller General of the United States 
shall report to Congress on the effectiveness of the new security 
screening personnel training at Glynco, Georgia, required under 
subsection (l) of section 44935 of title 49, United States Code, as 
amended by this section.

SEC. 532. ALTERNATE NEW SECURITY SCREENING PERSONNEL TRAINING PROGRAM 
                    COST AND FEASIBILITY STUDY.

  Not later than 180 days after the date of the enactment of this Act, 
the Administrator of the Transportation Security Administration shall 
conduct a cost and feasibility study of developing a training program 
for security screening personnel that will provide such personnel with 
an equal level of training as is provided in the training program for 
new security screening personnel located at the Federal Law Enforcement 
Training Center in Glynco, Georgia, that could be conducted at or 
within 50 miles of such security screening personnel's duty station. 
Such study should examine the use of online seminar and training 
platforms for portions of the training curriculum that are conducive to 
such an outcome.

SEC. 533. PROHIBITION OF ADVANCE NOTICE OF COVERT TESTING TO SECURITY 
                    SCREENERS.

  Section 44935 of title 49, United States Code, as amended by this 
Act, is further amended by adding at the end the following new 
subsection:
  ``(m) Prohibition of Advance Notice to Security Screeners of Covert 
Testing and Evaluation.--
          ``(1) In general.--The Administrator of the Transportation 
        Security Administration shall ensure, to the greatest extent 
        practicable, that information concerning a covert test of a 
        transportation security system to be conducted by a covert 
        testing office, the Inspector General of the Department of 
        Homeland Security, or the Government Accountability Office is 
        not provided to any individual involved in such test prior to 
        the completion of such test.
          ``(2) Exceptions.--Notwithstanding paragraph (1)--
                  ``(A) an authorized individual involved in a covert 
                test of a transportation security system may provide 
                information concerning such covert test to--
                          ``(i) employees, officers, and contractors of 
                        the Federal Government (including military 
                        personnel);
                          ``(ii) employees and officers of State and 
                        local governments; and
                          ``(iii) law enforcement officials who are 
                        authorized to receive or directed to be 
                        provided such information by the Administrator 
                        of the Transportation Security Administration, 
                        the Inspector General of the Department of 
                        Homeland Security, or the Comptroller General 
                        of the United States, as the case may be; and
                  ``(B) for the purpose of ensuring the security of any 
                individual in the vicinity of a site at which a covert 
                test of a transportation security system is being 
                conducted, an individual conducting such test may 
                disclose his or her status as an individual conducting 
                such test to any appropriate individual if a security 
                screener or other individual who is not a covered 
                employee identifies the individual conducting such test 
                as a potential threat.
          ``(3) Special rules for tsa.--
                  ``(A) Monitoring and security of testing personnel.--
                The head of each covert testing office shall ensure 
                that a person or group of persons conducting a covert 
                test of a transportation security system for a covert 
                testing office is accompanied at the site of such test 
                by a cover team composed of one or more employees of 
                such covert testing office for the purpose of 
                monitoring such test and confirming the identity of 
                personnel involved in such test under subparagraph (B).
                  ``(B) Responsibility of cover team.--Under this 
                paragraph, a cover team for a covert test of a 
                transportation security system shall--
                          ``(i) monitor such test; and
                          ``(ii) for the purpose of ensuring the 
                        security of any individual in the vicinity of a 
                        site at which such test is being conducted, 
                        confirm, notwithstanding paragraph (1), the 
                        identity of any individual conducting such test 
                        to any appropriate individual if a security 
                        screener or other individual who is not a 
                        covered employee identifies the individual 
                        conducting such test as a potential threat.
                  ``(C) Aviation screening.--Notwithstanding 
                subparagraph (A), the Transportation Security 
                Administration is not required to have a cover team 
                present during a test of the screening of persons, 
                carry-on items, or checked baggage at an aviation 
                security checkpoint at or serving an airport if such 
                test--
                          ``(i) is approved, in coordination with the 
                        designated security official for the airport 
                        operator by the Federal Security Director for 
                        such airport; and
                          ``(ii) is carried out under an aviation 
                        screening assessment program of the Department 
                        of Homeland Security.
                  ``(D) Use of other personnel.--The Transportation 
                Security Administration may use employees, officers, 
                and contractors of the Federal Government (including 
                military personnel) and employees and officers of State 
                and local governments or any personnel authorized by 
                the Federal Security Director to conduct covert tests.
          ``(4) Definitions.--In this subsection, the following 
        definitions apply:
                  ``(A) Appropriate individual.--The term `appropriate 
                individual', as used with respect to--
                          ``(i) a covert test under paragraph (2)(B) of 
                        a transportation security system, means any 
                        individual who the individual conducting such 
                        test determines needs to know his or her status 
                        as an individual conducting such test; or
                          ``(ii) a covert test under paragraph 
                        (3)(B)(i), means any individual who the cover 
                        team monitoring such test determines needs to 
                        know the identity of such cover team.
                  ``(B) Covered employee.--The term `covered employee' 
                means any individual who receives notice of a covert 
                test before the completion of a test under paragraph 
                (2)(B).
                  ``(C) Covert test.--
                          ``(i) In general.--The term `covert test' 
                        means an exercise or activity conducted by a 
                        covert testing office, the Inspector General of 
                        the Department of Homeland Security, or the 
                        Government Accountability Office to 
                        intentionally test, compromise, or circumvent 
                        transportation security systems to identify 
                        vulnerabilities in such systems.
                          ``(ii) Limitation.--Notwithstanding clause 
                        (i), the term `covert test' does not mean an 
                        exercise or activity by an employee or 
                        contractor of the Transportation Security 
                        Administration to test or assess compliance 
                        with relevant regulations.
                  ``(D) Covert testing office.--The term `covert 
                testing office' means any office of the Transportation 
                Security Administration designated by the Administrator 
                of the Transportation Security Administration to 
                conduct covert tests of transportation security 
                systems.
                  ``(E) Employee of a covert testing office.--The term 
                `employee of a covert testing office' means an 
                individual who is an employee of a covert testing 
                office or a contractor or an employee of a contractor 
                of a covert testing office.''.

       Subtitle D--Airport Access Controls and Perimeter Security

SEC. 541. REFORMATION OF CERTAIN PROGRAMS OF THE TRANSPORTATION 
                    SECURITY ADMINISTRATION.

  (a) Definitions.--In this subtitle:
          (1) Air carrier.--The term ``air carrier'' has the meaning 
        given such term in section 40102 of title 49, United States 
        Code.
          (2) Appropriate congressional committees.--The term 
        ``appropriate congressional committees'' means the Committee on 
        Homeland Security of the House of Representatives and the 
        Committee on Homeland Security and Governmental Affairs and the 
        Committee on Commerce, Science, and Transportation of the 
        Senate.
          (3) Foreign air carrier.--The term ``foreign air carrier'' 
        has the meaning given such term in section 40102 of title 49, 
        United States Code.
          (4) Intelligence community.--The term ``intelligence 
        community'' has the meaning given such term in section 3(4) of 
        the National Security Act of 1947 (50 U.S.C. 3003(4)).
          (5) Secured area.--The term ``secured area'' has the meaning 
        given such term in section 1540.5 of title 49, Code of Federal 
        Regulations.
          (6) Security identification display area.--The term 
        ``Security Identification Display Area'' has the meaning given 
        such term in section 1540.5 of title 49, Code of Federal 
        Regulations.
          (7) Sterile area.--The term ``sterile area'' has the meaning 
        given such term in section 1540.5 of title 49, Code of Federal 
        Regulations.
  (b) Cost and Feasibility Study.--
          (1) In general.--Not later than 180 days after the date of 
        the enactment of this Act, the Administrator of the 
        Transportation Security Administration, in consultation with 
        the Aviation Security Advisory Committee (established under 
        section 44946 of title 49, United States Code), shall submit to 
        the appropriate congressional committees and the Comptroller 
        General of the United States a cost and feasibility study of a 
        statistically significant number of Category I, II, III, IV, 
        and X airports assessing the impact if all employee access 
        points from non-secured areas to secured areas of such airports 
        are comprised of the following:
                  (A) A secure door utilizing card and pin entry or 
                biometric technology.
                  (B) Surveillance video recording, capable of storing 
                video data for at least 30 days.
                  (C) Advanced screening technologies, including at 
                least one of the following:
                          (i) Magnetometer (walk-through or hand-held).
                          (ii) Explosives detection canines.
                          (iii) Explosives trace detection.
                          (iv) Advanced imaging technology.
                          (v) X-ray bag screening technology.
          (2) Contents.--The study required under paragraph (1) shall 
        include information related to the employee screening costs of 
        those category I, II, III, IV, and X airports which have 
        already implemented practices of screening 100 percent of 
        employees accessing secured areas of airports, including the 
        following:
                  (A) Costs associated with establishing an operational 
                minimum number of employee entry and exit points.
                  (B) A comparison of estimated costs and effectiveness 
                associated with implementing the security features 
                specified in paragraph (1) to--
                          (i) the Federal Government; and
                          (ii) airports and the aviation community.
          (3) Comptroller general assessment.--
                  (A) In general.--Upon completion of the study 
                required under paragraph (1), the Comptroller General 
                of the United States shall review such study to assess 
                the quality and reliability of such study.
                  (B) Assessment.--Not later than 90 days after the 
                receipt of the study required under paragraph (1), the 
                Comptroller General of the United States shall report 
                to the appropriate congressional committees on the 
                results of the review required under subparagraph (A).
  (c) Airport Worker Education and Security Awareness.--
          (1) Cooperative efforts to enhance airport security 
        awareness.--Not later than 180 days after the date of the 
        enactment of this Act, the Administrator of the Transportation 
        Security Administration shall work with air carriers, foreign 
        air carriers, airport operators, labor unions representing 
        credentialed employees, and the Aviation Security Advisory 
        Committee to enhance security awareness of credentialed airport 
        populations regarding insider threats to aviation security and 
        recognized practices related to airport access controls.
          (2) Credentialing standards.--
                  (A) In general.--Not later than 180 days after the 
                date of the enactment of this Act, the Administrator of 
                the Transportation Security Administration shall, in 
                consultation with air carriers, foreign air carriers, 
                airport operators, labor unions representing 
                credentialed employees, and the Aviation Security 
                Advisory Committee, assess credentialing standards, 
                policies, and practices to ensure that insider threats 
                to aviation security are adequately addressed.
                  (B) Report.--Not later than 30 days after completion 
                of the assessment required under subparagraph (A), the 
                Administrator of the Transportation Security 
                Administration shall report to the appropriate 
                congressional committees on the results of such 
                assessment.
          (3) SIDA, sterile area, and aoa applications.--
                  (A) Social security numbers required.--Not later than 
                60 days after the date of the enactment of this Act, 
                the Administrator of the Transportation Security 
                Administration shall require the submission of a social 
                security number for each individual applying for a 
                Security Identification Display Area, Sterile Area, or 
                Air Operations Area airport credential to strengthen 
                security vetting effectiveness. An applicant who does 
                not provide such applicant's social security number may 
                be denied such a credential.
                  (B) Screening notice.--The Administrator of the 
                Transportation Security Administration shall issue 
                requirements for airport operators to include in 
                applications for access to a Security Identification 
                Display Area, Sterile Area, or Air Operations Area a 
                notice informing applicants that an employee holding a 
                credential granting access to such an area may be 
                screened at any time while gaining access to, working 
                in, or leaving such an area.
  (d) Securing Airport Worker Access.--
          (1) In general.--The Administrator of the Transportation 
        Security Administration shall work with airport operators and 
        the Aviation Security Advisory Committee to identify advanced 
        technologies, including biometric identification technologies, 
        for securing employee access to the secured areas and sterile 
        areas of airports.
          (2) Rap back vetting.--Not later than 180 days after the date 
        of the enactment of this Act, the Administrator of the 
        Transportation Security Administration shall ensure that all 
        credentialed aviation worker populations currently requiring a 
        fingerprint-based criminal record history check are 
        continuously vetted through the Federal Bureau of 
        Investigation's Rap Back Service, in order to more rapidly 
        detect and mitigate insider threats to aviation security.
          (3) Insider threat education and mitigation.--Not later than 
        180 days after the date of the enactment of this Act, the 
        Administrator of the Transportation Security Administration 
        shall identify means of enhancing the Transportation Security 
        Administration's ability to leverage the resources of the 
        Department of Homeland Security and the intelligence community 
        to educate Administration personnel on insider threats to 
        aviation security and how the Administration can better 
        mitigate such insider threats.
          (4) Playbook operations.--The Administrator of the 
        Transportation Security Administration shall ensure that 
        Transportation Security Administration-led employee physical 
        inspection efforts of aviation workers, known as Playbook 
        operations, are targeted, strategic, and focused on providing 
        the greatest level of security effectiveness.
          (5) Covert testing.--
                  (A) In general.--The Administrator shall conduct 
                covert testing of Transportation Security 
                Administration-led employee inspection operations at 
                airports and measure existing levels of security 
                effectiveness. The Administrator of the Transportation 
                Security Administration shall provide--
                          (i) the results of such testing to the 
                        airport operator for the airport that is the 
                        subject of any such testing, and, as 
                        appropriate, to air carriers and foreign air 
                        carriers that operate at the airport that is 
                        the subject of such testing; and
                          (ii) recommendations and technical assistance 
                        for air carriers, foreign air carriers, and 
                        airport operators to conduct their own employee 
                        inspections, as needed.
                  (B) Annual reporting.--The Administrator of the 
                Transportation Security Administration shall annually, 
                for each of fiscal years 2018 through 2022, submit to 
                the appropriate congressional committees report on the 
                frequency, methodology, strategy, and effectiveness of 
                employee inspection operations at airports.
          (6) Centralized database.--Not later than 180 days after the 
        date of the enactment of this Act, the Administrator of the 
        Transportation Security Administration, in consultation with 
        the Aviation Security Advisory Committee, shall--
                  (A) establish a national database of individuals who 
                have had either their airport or airport operator-
                issued badge revoked for failure to comply with 
                aviation security requirements;
                  (B) determine the appropriate reporting mechanisms 
                for air carriers, foreign air carriers, and airport 
                operators to--
                          (i) submit to the Administrator data 
                        regarding individuals described in subparagraph 
                        (A); and
                          (ii) access the database established pursuant 
                        to such subparagraph; and
                  (C) establish a process to allow individuals whose 
                names were mistakenly entered into such database to 
                correct the record and have their names removed from 
                such database.
  (e) Insider Threat Coordination Efforts.--The Department of Homeland 
Security is the lead interagency coordinator pertaining to insider 
threat investigations and mitigation efforts at airports. The 
Department shall make every practicable effort to coordinate with other 
relevant Government entities, as well as the security representatives 
of air carriers, foreign air carriers, and airport operators, as 
appropriate, when undertaking such investigations and efforts.
  (f) Airport Task Forces.--The Secretary of Homeland Security is 
authorized, through the Director of U.S. Immigration and Customs 
Enforcement, to form airport task forces using Homeland Security 
Investigations personnel and any other Department of Homeland Security 
personnel the Secretary determines necessary. Such airport task forces 
shall investigate and mitigate insider threats to aviation security, in 
coordination with Federal, State, local, tribal, and territorial law 
enforcement partners, as appropriate.
  (g) Information Technology Security.--Not later than 90 days after 
the date of the enactment of this Act, the Administrator of the 
Transportation Security Administration shall submit to the appropriate 
congressional committees a plan to conduct recurring reviews of the 
operational, technical, and management security controls for 
Administration information technology systems at airports.

SEC. 542. AIRPORT PERIMETER AND ACCESS CONTROL SECURITY.

  (a) Risk Assessments of Airport Security.--
          (1) In general.--The Administrator of the Transportation 
        Security Administration shall--
                  (A) not later than 120 days after the date of the 
                enactment of this Act, update the Transportation Sector 
                Security Risk Assessment (TSSRA) for the aviation 
                sector; and
                  (B) not later than 180 days after such date--
                          (i) update with the latest and most currently 
                        available intelligence information the 
                        Comprehensive Risk Assessment of Perimeter and 
                        Access Control Security (in this section 
                        referred to as the ``Risk Assessment of Airport 
                        Security'') and determine a regular timeframe 
                        and schedule for further updates to such Risk 
                        Assessment of Airport Security; and
                          (ii) conduct a system-wide assessment of 
                        airport access control points and airport 
                        perimeter security, including cargo facilities.
          (2) Contents.--The security risk assessments required under 
        paragraph (1)(B) shall
                  (A) include updates reflected in the TSSRA and Joint 
                Vulnerability Assessment (JVA) findings;
                  (B) reflect changes to the risk environment relating 
                to airport access control points and airport 
                perimeters;
                  (C) use security breach data for specific analysis of 
                system-wide trends related to airport access control 
                points and airport perimeter security to better inform 
                risk management decisions; and
                  (D) take into consideration the unique geography of 
                and current recognized practices used by airports to 
                mitigate potential vulnerabilities.
          (3) Report.--The Administrator of the Transportation Security 
        Administration shall report to the appropriate congressional 
        committees, relevant Federal departments and agencies, and 
        airport operators on the results of the security risk 
        assessments required under paragraph (1).
  (b) Airport Security Strategy Development.--
          (1) In general.--Not later than 180 days after the date of 
        the enactment of this Act, the Administrator of the 
        Transportation Security Administration shall update the 2012 
        National Strategy for Airport Perimeter and Access Control 
        Security (in this section referred to as the ``National 
        Strategy'').
          (2) Contents.--The update to the National Strategy required 
        under paragraph (1) shall include
                  (A) information from the Risk Assessment of Airport 
                Security; and
                  (B) information on--
                          (i) airport security-related activities;
                          (ii) the status of efforts by the 
                        Transportation Security Administration to 
                        address the goals and objectives referred to in 
                        subsection (a);
                          (iii) finalized outcome-based performance 
                        measures and performance levels for each 
                        relevant activity and goal and objective under 
                        subparagraphs (A) and (B); and
                          (iv) input from airport operators.
          (3) Updates.--Not later than 90 days after the update is 
        completed under paragraph (1), the Administrator of the 
        Transportation Security Administration shall implement a 
        process for determining when additional updates to the strategy 
        referred to in such subsection are needed.

SEC. 543. EXIT LANE SECURITY.

  There is authorized $77,000,000 for each of fiscal years 2018 and 
2019 to carry out subsection (n)(1) of section 44903 of title 49, 
United States Code.

SEC. 544. REIMBURSEMENT FOR DEPLOYMENT OF ARMED LAW ENFORCEMENT 
                    PERSONNEL AT AIRPORTS.

  There is authorized $45,000,000 for each of fiscal years 2018 and 
2019 to carry out subsection (h) of section 44901 of title 49, United 
States Code.

                     Subtitle E--Air Cargo Security

SEC. 551. AIR CARGO ADVANCE SCREENING PROGRAM.

  (a) In General.--Subtitle B of title IV of the Homeland Security Act 
of 2002 (6 U.S.C. 211 et seq.) is amended by adding at the end the 
following new section:

``SEC. 420. AIR CARGO ADVANCE SCREENING PROGRAM.

  ``(a) In General.--The Secretary, consistent with the requirements of 
the Trade Act of 2002 (Public Law 107-210) shall--
          ``(1) establish an air cargo advance screening program (in 
        this section referred to as the `ACAS Program') for the 
        collection by U.S. Customs and Border Protection of advance 
        electronic information from air carriers and other persons and 
        governments within the supply chain regarding cargo being 
        transported to the United States by air;
          ``(2) under such program, require that such information be 
        transmitted by such air carriers and other persons and 
        governments at the earliest point practicable prior to loading 
        of such cargo onto an aircraft destined to or transiting 
        through the United States;
          ``(3) establish appropriate communications systems with 
        freight forwarders, shippers, and air carriers;
          ``(4) establish a system that will allow freight forwarders, 
        shippers, and air carriers to provide shipment level data for 
        air cargo, departing from any location that is inbound to the 
        United States; and
          ``(5) coordinate with the Administrator of the Transportation 
        Security Administration to identify opportunities in which the 
        information furnished in compliance with the ACAS Program could 
        be used by the Administrator.
  ``(b) Inspection of High-risk Cargo.--Under the ACAS Program, the 
Secretary shall ensure that all cargo that has been identified as high-
risk is inspected prior to loading of such cargo onto aircraft at the 
last point of departure before departing for the United States.
  ``(c) Consultation.--In carrying out the ACAS Program, the Secretary 
shall consult with relevant stakeholders, as appropriate, to ensure 
that an operationally feasible and practical approach to the collection 
of advance information with respect to cargo on aircraft departing for 
the United States recognizes the significant differences among air 
cargo business models and modes of transportation.
  ``(d) Analysis.--The Secretary may analyze the information referred 
to in subsection (a) in the Department's automated targeting system and 
integrate such information with other intelligence to enhance the 
accuracy of the risk assessment process under the ACAS Program.
  ``(e) No Duplication.--The Secretary shall carry out this section in 
a manner that, after the ACAS Program is fully in effect, does not 
duplicate other programs or requirements relating to the submission of 
air cargo data.
  ``(f) Consideration of Industry.--In carrying out the ACAS Program, 
the Secretary shall--
          ``(1) take into consideration that the content and timeliness 
        of the available data may vary among entities in the air cargo 
        industry and among countries, and shall explore procedures to 
        accommodate such variations while maximizing the contribution 
        of such data to the risk assessment process under the ACAS 
        Program;
          ``(2) test the business processes, technologies, and 
        operational procedures required to provide advance information 
        with respect to cargo on aircraft departing for the United 
        States, while ensuring delays and other negative impacts on 
        vital supply chains are minimized; and
          ``(3) consider the cost, benefit, and feasibility before 
        establishing any set time period for submission of certain 
        elements of the data for air cargo under this section in line 
        with the regulatory guidelines specified in Executive Order 
        13563, and any successor Executive Order or regulation.
  ``(g) Guidance.--The Secretary shall provide guidance for 
participants in the ACAS Program regarding the requirements for 
participation, including requirements for transmitting shipment level 
data.
  ``(h) Use of Data.--The Secretary shall use the data provided under 
the ACAS Program for targeting shipments for screening and law 
enforcement purposes only.''.
  (b) Final Rule.--Not later than 180 days after the date of the 
enactment of this Act, the Secretary of Homeland Security shall issue a 
final regulation to implement the ACAS Program under section 420 of the 
Homeland Security Act of 2002 (as added by subsection (a) of this 
section) to include the electronic transmission to the Department of 
Homeland Security of data elements for targeting cargo, including 
appropriate security elements of shipment level data, as determined by 
the Secretary.
  (c) Report.--Not later than 180 days after the date of the 
commencement of the ACAS Program under section 420 of the Homeland 
Security Act of 2002 (as added by subsection (a) of this section), the 
Secretary of Homeland Security shall submit to the Committee on 
Homeland Security of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs and the Committee on 
Commerce, Science, and Transportation of the Senate a report detailing 
the operational implementation of providing advance information under 
the ACAS Program and the value of such information in targeting cargo.
  (d) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 419 the following new item:

``Sec. 420. Air cargo advance screening program.''.

SEC. 552. EXPLOSIVES DETECTION CANINE TEAMS FOR AIR CARGO SECURITY.

  Section 1307 of the Implementing Recommendations of the 9/11 
Commission Act of 2007 (6 U.S.C. 1116) is amended by adding at the end 
the following new subsection:
  ``(h) Explosives Detection Canine Teams for Air Cargo Security.--
          ``(1) In general.--In order to enhance the screening of air 
        cargo and ensure that third-party explosives detection canine 
        assets are leveraged for such purpose, the Administrator shall, 
        not later than 180 days after the date of the enactment of this 
        subsection--
                  ``(A) develop and issue standards for the use of such 
                third-party explosives detection canine assets for the 
                primary screening of air cargo;
                  ``(B) develop a process to identify qualified non-
                Federal entities that will certify canine assets that 
                meet the standards established by the Administrator 
                pursuant to subparagraph (A);
                  ``(C) ensure that entities qualified to certify 
                canine assets shall be independent from entities that 
                will train and provide canines to end users of such 
                canine assets;
                  ``(D) establish a system of Transportation Security 
                Administration audits of the process developed pursuant 
                to subparagraph (B); and
                  ``(E) provide that canines certified for the primary 
                screening of air cargo can be used by air carriers, 
                foreign air carriers, freight forwarders, and shippers.
          ``(2) Implementation.--Upon completion of the development of 
        the process under subsection (a), the Administrator shall--
                  ``(A) facilitate the deployment of such assets that 
                meet the certification standards of the Administration, 
                as determined by the Administrator;
                  ``(B) make such standards available to vendors 
                seeking to train and deploy third-party explosives 
                detection canine assets; and
                  ``(C) ensure that all costs for the training and 
                certification of canines, and for the use of supplied 
                canines, are borne by private industry and not the 
                Federal Government.
          ``(3) Definitions.--In this subsection:
                  ``(A) Air carrier.--The term `air carrier' has the 
                meaning given such term in section 40102 of title 49, 
                United States Code.
                  ``(B) Foreign air carrier.--The term `foreign air 
                carrier' has the meaning given such term in section 
                40102 of title 49, United States Code.
                  ``(C) Third-party explosives detection canine 
                assets.--The term `third-party explosives detection 
                canine assets' means any explosives detection canine or 
                handler not owned or employed, respectively, by the 
                Administration.''.

           Subtitle F--Information Sharing and Cybersecurity

SEC. 561. INFORMATION SHARING AND CYBERSECURITY.

  (a) Federal Security Directors.--Section 44933 of title 49, United 
States Code, is amended by adding at the end the following new 
subsection:
  ``(c) Information Sharing.--Not later than one year after the date of 
the enactment of this subsection, the Administrator shall--
          ``(1) require each Federal Security Director of an airport to 
        meet at least quarterly with the airport director, airport 
        security coordinator, and law enforcement agencies serving each 
        such airport to discuss incident management protocols, 
        including the resolution of screening anomalies at passenger 
        screening checkpoints; and
          ``(2) require each Federal Security Director at an airport to 
        inform, consult, and coordinate, as appropriate, with the 
        respective airport security coordinator in a timely manner on 
        security matters impacting airport operations and to establish 
        and maintain operational protocols with such airport operators 
        to ensure coordinated responses to security matters.''.
  (b) Plan to Improve Information Sharing.--
          (1) In general.--Not later than 180 days after the date of 
        the enactment of this Act, the Secretary of Homeland Security, 
        acting through the Administrator of the Transportation Security 
        Administration, shall develop a plan to improve intelligence 
        information sharing with State and local transportation 
        entities that includes best practices to ensure that the 
        information shared is actionable, useful, and not redundant.
          (2) Contents.--The plan required under subsection (a) shall 
        include the following:
                  (A) The incorporation of best practices for 
                information sharing.
                  (B) The identification of areas of overlap and 
                redundancy.
                  (C) An evaluation and incorporation of stakeholder 
                input in the development of such plan.
                  (D) The integration of recommendations of the 
                Comptroller General of the United States on information 
                sharing.
          (3) Solicitation.--The Administrator shall solicit on an 
        annual basis input from appropriate stakeholders, including 
        State and local transportation entities, on the quality and 
        quantity of intelligence received by such stakeholders relating 
        to information sharing.
  (c) Best Practices Sharing.--
          (1) In general.--Not later than 180 days after the date of 
        the enactment of this Act, the Secretary of Homeland Security, 
        acting through the Administrator of the Transportation Security 
        Administration, shall establish a mechanism to share with State 
        and local transportation entities best practices from across 
        the law enforcement spectrum, including Federal, State, local, 
        and tribal entities, that relate to employee training, employee 
        professional development, technology development and 
        deployment, hardening tactics, and passenger and employee 
        awareness programs.
          (2) Consultation.--The Administrator of the Transportation 
        Security Administration shall solicit and incorporate 
        stakeholder input--
                  (A) in developing the mechanism for sharing best 
                practices as required under paragraph (1); and
                  (B) not less frequently than once each year on the 
                quality and quantity of information such stakeholders 
                receive through the mechanism established under such 
                subsection.
  (d) Cybersecurity.--
          (1) In general.--The Secretary of Homeland Security shall--
                  (A) not later than 120 days after the date of the 
                enactment of this Act, develop and implement a 
                cybersecurity risk assessment model for aviation 
                security, consistent with the National Institute of 
                Standards and Technology Framework for Improvement 
                Critical Infrastructure Cybersecurity and any update to 
                such Framework pursuant to section 2 of the National 
                Institute of Standards and Technology Act (15 U.S.C. 
                272), to evaluate current and future cybersecurity 
                risks;
                  (B) evaluate, on a periodic basis, but not less often 
                than once every two years, the effectiveness of the 
                cybersecurity risk assessment model under subparagraph 
                (A);
                  (C) seek to ensure participation of at least one 
                information sharing and analysis organization (as such 
                term is defined in section 212 of the Homeland Security 
                Act of 2002 (6 U.S.C. 131)) representing the aviation 
                community in the national cybersecurity and 
                communications integration center, pursuant to 
                subsection (d)(1)(B) of section 227 of the Homeland 
                Security Act of 2002 (6 U.S.C. 148);
                  (D) establish guidelines for voluntary reporting of 
                aviation-related cybersecurity risks and incidents to 
                the national cybersecurity and communications 
                integration center under section 227 of the Homeland 
                Security Act of 2002, and other appropriate Federal 
                agencies; and
                  (E) request the Aviation Security Advisory Committee 
                established pursuant to section 44946 of title 49, 
                United States Code, to report and make recommendations 
                to the Secretary on enhancing the sharing of 
                information related to aviation-related cybersecurity 
                risks and incidents between relevant Federal, state, 
                local, tribal, and territorial entities and the 
                aviation stakeholder community.
          (2) Cybersecurity enhancements to aviation security 
        activities.--The Secretary of Homeland Security, in 
        consultation with the Secretary of Transportation, shall--
                  (A) direct the sharing of information concerning 
                cybersecurity risks and incidents to address aviation-
                specific risks; and
                  (B) upon request, conduct cybersecurity vulnerability 
                assessments for airports and air carriers.
          (3) TSA database cyber assessment.--
                  (A) Assessment required.--Not later than 120 days 
                after the date of the enactment of this Act, the 
                Secretary of Homeland Security shall evaluate the 
                cybersecurity of the Transportation Security 
                Administration databases for trusted traveler and 
                credentialing programs that contain personal 
                information of specific individuals or information that 
                identifies specific individuals, including the 
                Transportation Worker Identification Credential and 
                Pre-Check trusted traveler programs, and the means for 
                transmission of data to and from such databases and 
                develop information on any identified cybersecurity 
                vulnerabilities and remediation plans to address such 
                vulnerabilities;
                  (B) Submission to congress.--Not later than 30 days 
                after the completion of the evaluation required under 
                subparagraph (A), the Secretary shall submit to the 
                Committee on Homeland Security of the House of 
                Representatives and the Committee on Commerce, Science, 
                and Transportation of the Senate information relating 
                to such evaluation. Such submission shall be provided 
                in a classified form.
                  (C) Submission of supplementary information.--Not 
                later than 90 days after the completion of such 
                evaluation, the Secretary shall submit to the Committee 
                on Homeland Security of the House of Representatives 
                and the Committee on Commerce, Science, and 
                Transportation of the Senate supplementary information 
                relating to such evaluation, including information 
                relating to any identified cybersecurity 
                vulnerabilities and remediation plans to address such 
                vulnerabilities. Such submission shall be provided in a 
                classified form.
          (4) Definitions.--In this subsection, the terms 
        ``cybersecurity risk'' and ``incident'' have the meanings given 
        such terms in section 227 of the Homeland Security Act of 2002.

              Subtitle G--Surface Transportation Security

SEC. 571. DEFINITIONS.

  In this subtitle:
          (1) Appropriate congressional committees.--The term 
        ``appropriate congressional committees'' means the Committee on 
        Homeland Security and the Committee on Transportation and 
        Infrastructure of the House of Representatives and the 
        Committee on Commerce, Science, and Transportation of the 
        Senate.
          (2) Explosives detection canine team.--The term ``explosives 
        detection canine team'' means a canine and a canine handler 
        trained to detect explosives and other threats as determined by 
        the Secretary.
          (3) Risk.--The term ``risk'' means the potential for an 
        unwanted outcome resulting from an accident, event, or 
        occurrence, as determined by its likelihood and the associated 
        consequences.
          (4) Threat.--The term ``threat'' means an individual, entity, 
        action, or natural or manmade occurrence that has or indicates 
        the potential to harm life, information, operations, the 
        environment, or property.
          (5) Vulnerability.--The term ``vulnerability'' means a 
        physical feature or operational attribute that renders an 
        entity open to exploitation or susceptible to a given hazard.

SEC. 572. SURFACE TRANSPORTATION SECURITY ASSESSMENT AND IMPLEMENTATION 
                    OF RISK-BASED STRATEGY.

  (a) Security Assessment.--
          (1) In general.--Not later than one year after the date of 
        the enactment of this Act, the Secretary of Homeland Security 
        shall complete an assessment of the vulnerabilities of and 
        risks to surface transportation systems, including findings 
        from similar vulnerability analyses completed within three 
        years of the date of the enactment of this Act.
          (2) Considerations.--In conducting the security assessment 
        under paragraph (1), the Secretary of Homeland Security shall, 
        at a minimum--
                  (A) consider appropriate intelligence;
                  (B) consider security breaches and attacks at 
                domestic and international transportation facilities;
                  (C) consider the vulnerabilities and risks associated 
                with specific modes of surface transportation systems;
                  (D) evaluate the vetting and security training of--
                          (i) employees in surface transportation 
                        systems; and
                          (ii) other individuals with access to 
                        sensitive or secure areas of transportation 
                        systems; and
                  (E) consider input from--
                          (i) representatives of different modes of 
                        surface transportation systems;
                          (ii) subject to paragraph (3)--
                                  (I) critical infrastructure entities; 
                                and
                                  (II) the Transportation Systems 
                                Sector Coordinating Council; and
                          (iii) the heads of other relevant Federal 
                        departments or agencies.
  (b) Risk-based Security Strategy.--
          (1) In general.--Not later than 180 days after the date the 
        security assessment under subsection (a) is complete, the 
        Secretary of Homeland Security shall use the results of such 
        assessment--
                  (A) to develop and implement a cross-cutting, risk-
                based security strategy that includes--
                          (i) all surface transportation systems;
                          (ii) a mitigating strategy that aligns with 
                        each vulnerability and risk identified in 
                        subsection (a);
                          (iii) a planning process to inform resource 
                        allocation;
                          (iv) priorities, milestones, and performance 
                        metrics to measure the effectiveness of such 
                        risk-based security strategy; and
                          (v) processes for sharing relevant and timely 
                        intelligence threat information with 
                        appropriate stakeholders;
                  (B) to develop a management oversight strategy that--
                          (i) identifies the parties responsible for 
                        the implementation, management, and oversight 
                        of the risk-based security strategy under 
                        subparagraph (A); and
                          (ii) includes a plan for implementing such 
                        risk-based security strategy; and
                  (C) to modify the risk-based budget and resource 
                allocations, in accordance with section 573(c), for the 
                Transportation Security Administration.
          (2) Coordinated approach.--In developing and implementing the 
        risk-based security strategy under paragraph (1)(A), the 
        Secretary of Homeland Security shall coordinate with the heads 
        of other relevant Federal departments or agencies, and 
        stakeholders, as appropriate--
                  (A) to evaluate existing surface transportation 
                security programs, policies, and initiatives, including 
                the explosives detection canine teams, for consistency 
                with the risk-based security strategy and, to the 
                extent practicable, avoid any unnecessary duplication 
                of effort;
                  (B) to determine the extent to which stakeholder 
                security programs, policies, and initiatives address 
                the vulnerabilities and risks to surface transportation 
                systems identified in subsection (a); and
                  (C) subject to subparagraph (B), to mitigate each 
                such vulnerability and risk.
  (c) Report.--
          (1) In general.--Not later than one year after the date the 
        security assessment under subsection (a) is complete, the 
        Secretary of Homeland Security shall submit to the appropriate 
        congressional committees and the Inspector General of the 
        Department of Homeland Security a report that--
                  (A) describes the process used to complete such 
                security assessment;
                  (B) describes the process used to develop the risk-
                based security strategy under subsection (b)(1)(A);
                  (C) describes such risk-based security strategy;
                  (D) includes the management oversight strategy under 
                subsection (b)(1)(B);
                  (E) includes--
                          (i) the findings of such security assessment;
                          (ii) a description of the actions recommended 
                        or taken by the Department or another Federal 
                        department or agency to mitigate the 
                        vulnerabilities and risks identified in 
                        subsection (a);
                          (iii) any recommendations for improving the 
                        coordinated approach to mitigating 
                        vulnerabilities and risks to surface 
                        transportation systems; and
                          (iv) any recommended changes to the National 
                        Infrastructure Protection Plan developed 
                        pursuant to Homeland Security Presidential 
                        Directive-7, the modal annexes to such plan, or 
                        relevant surface transportation security 
                        programs, policies, or initiatives; and
                  (F) may contain a classified annex.
          (2) Protections.--In preparing the report required under 
        paragraph (1), the Secretary of Homeland Security shall take 
        appropriate actions to safeguard information described by 
        section 552(b) of title 5, United States Code, or protected 
        from disclosure by any other law of the United States.
  (d) Updates.--Not less frequently than semiannually, the Secretary of 
Homeland Security shall report to or brief the appropriate 
congressional committees on the vulnerabilities of and risks to surface 
transportation systems and how such vulnerabilities and risks affect 
the risk-based security strategy under subsection (b)(1)(A).

SEC. 573. RISK-BASED BUDGETING AND RESOURCE ALLOCATION.

  (a) Report.--In conjunction with the submission of the Department's 
annual budget request to the Office of Management and Budget, the 
Administrator of the Transportation Security Administration shall 
submit to the appropriate congressional committees a report that 
describes a risk-based budget and resource allocation plan for surface 
transportation sectors, within and across modes, that--
          (1) reflects the risk-based security strategy under section 
        572(b)(1)(A); and
          (2) is organized by appropriations account, program, project, 
        and initiative.
  (b) Budget Transparency.--Subsection (a) of section 1105 of title 31, 
United States Code, is amended by adding at the end the following new 
paragraph:
          ``(40) a separate statement clearly distinguishing the 
        resources requested for surface transportation security from 
        the resources requested for aviation security.''.
  (c) Resource Reallocation.--
          (1) In general.--Not later than 15 days after the date on 
        which the Transportation Security Administration allocates any 
        resources or personnel, including personnel sharing, detailing, 
        or assignment, or the use of facilities, technology systems, or 
        vetting resources, for a non-transportation security purpose or 
        National Special Security Event (as defined in section 2001 of 
        Homeland Security Act of 2002 (6 U.S.C. 601)), the Secretary of 
        Homeland Security shall provide to the appropriate 
        congressional committees the notification described in 
        paragraph (2).
          (2) Notification.--A notification described in this paragraph 
        shall include--
                  (A) the reason for and a justification of the 
                resource or personnel allocation at issue;
                  (B) the expected end date of such resource or 
                personnel allocation; and
                  (C) the projected cost to the Transportation Security 
                Administration of such personnel or resource 
                allocation.

SEC. 574. SURFACE TRANSPORTATION SECURITY MANAGEMENT AND INTERAGENCY 
                    COORDINATION REVIEW.

  (a) Review.--Not later than one year after the date of the enactment 
of this Act, the Comptroller General of the United States shall--
          (1) review the staffing, budget, resource, and personnel 
        allocation, and management oversight strategy of the 
        Transportation Security Administration's surface transportation 
        security programs;
          (2) review the coordination between relevant entities of 
        leadership, planning, policy, inspections, and implementation 
        of security programs relating to surface transportation to 
        reduce redundancy and regulatory burden; and
          (3) submit to the appropriate congressional committees a 
        report on the findings of the reviews under paragraphs (1) and 
        (2), including any recommendations for improving coordination 
        between relevant entities and reducing redundancy and 
        regulatory burden.
  (b) Relevant Entities Defined.--In this section, the term ``relevant 
entities'' means--
          (1) the Transportation Security Administration;
          (2) other Federal, State, or local departments or agencies 
        with jurisdiction over a mode of surface transportation;
          (3) critical infrastructure entities;
          (4) the Transportation Systems Sector Coordinating Council; 
        and
          (5) relevant stakeholders.

SEC. 575. TRANSPARENCY.

  (a) Regulations.--Not later than 180 days after the date of the 
enactment of this Act and every 180 days thereafter, the Administrator 
of the Transportation Security Administration shall make available 
through a public website information regarding the status of each 
regulation relating to surface transportation security that is directed 
by law to be issued but that has not been issued if more than two years 
have passed since the date of enactment of each such law.
  (b) Inspector General Review.--Not later than 180 days after the date 
of the enactment of this Act and every two years thereafter until all 
of the requirements under titles XIII, XIV, and XV of the Implementing 
Recommendations of the 9/11 Commission Act of 2007 (6 U.S.C. 1111 et 
seq.) and under this Act have been fully implemented, the Inspector 
General of the Department of Homeland Security shall submit to the 
appropriate congressional committees a report that--
          (1) identifies the requirements under such titles of such Act 
        and under this Act that have not been fully implemented;
          (2) describes what, if any, additional action is necessary; 
        and
          (3) includes recommendations regarding whether any of such 
        requirements should be amended or repealed.

SEC. 576. TSA COUNTERTERRORISM ASSET DEPLOYMENT.

  (a) In General.--The Administrator of the Transportation Security 
Administration is authorized to maintain 30 Visible Intermodal 
Prevention and Response (VIPR) teams for deployment, at the request of 
and in collaboration with Federal, State, and local transportation 
stakeholders, to prevent and deter acts of terrorism against United 
States transportation systems and for other counterterrorism purposes. 
Starting in January 2019 and for five years thereafter, the 
Administrator shall annually assess whether the number of VIPR teams is 
adequate to respond to requests for collaboration from Federal, State, 
and local transportation stakeholders and to carry out counterterrorism 
activities with respect to United States transportation systems.
  (b) Congressional Notification.--If the Administrator of the 
Transportation Security Administration determines that the number of 
VIPR teams should be reduced below 30, the Administrator shall notify 
the Committee on Homeland Security of the House of Representatives and 
the Committee on Commerce, Science, and Transportation of the Senate 
not later than 90 days prior to such a determination.
  (c) Report to Congress.--Not later than 60 days after the development 
and implementation of the performance measures and objectives required 
under subsection (f), the Administrator of the Transportation Security 
Administration shall report to the Committee on Homeland Security of 
the House of Representatives and the Committee on Commerce, Science, 
and Transportation of the Senate on the appropriate number of VIPR 
teams needed by the Administration.
  (d) Stakeholder Notification.--If the Transportation Security 
Administration deploys any counterterrorism personnel or resource, such 
as explosive detection assets, property inspections, or patrols by VIPR 
teams, to enhance security at a surface transportation system or 
surface transportation facility for a period of not less than 180 
consecutive days, the Administrator shall provide sufficient 
notification to the system or facility operator, as applicable, not 
less than 14 days prior to terminating the deployment.
  (e) Exception.--Subsection (d) shall not apply if the Administrator 
of the Transportation Security Administration--
          (1) determines there is an urgent security need for the 
        personnel or resource described in such subsection; and
          (2) notifies the Committee on Homeland Security of the House 
        of Representatives and the Committee on Commerce, Science, and 
        Transportation of the Senate.
  (f) VIPR Teams.--Section 1303 of the Implementing Recommendations of 
the 9/11 Commission Act of 2007 (6 U.S.C. 1112) is amended--
          (1) in subsection (a)(4), by striking ``team,'' and inserting 
        ``team as to specific locations and times within the facilities 
        of such entities at which VIPR teams are to be deployed to 
        maximize the effectiveness of such deployment,''; and
          (2) by striking subsection (b) and inserting the following 
        new subsections:
  ``(b) Performance Measures.--Not later than one year after the date 
of the enactment of this subsection, the Administrator shall develop 
and implement a system of qualitative performance measures and 
objectives by which to assess the roles, activities, and effectiveness 
of VIPR team operations on an ongoing basis, including a mechanism 
through which the transportation entities referred to in subsection 
(a)(4) may submit feedback on VIPR team operations involving their 
systems or facilities.
  ``(c) Plan.--Not later than one year after the date of the enactment 
of this section, the Administrator shall develop and implement a plan 
for ensuring the interoperability of communications among VIPR team 
participants and between VIPR teams and any transportation entities 
with systems or facilities that are involved in VIPR team operations. 
Such plan shall include an analysis of the costs and resources required 
to carry out such plan.''.

SEC. 577. SURFACE TRANSPORTATION SECURITY ADVISORY COMMITTEE.

  (a) In General.--Subchapter II of chapter 449 of title 49, United 
States Code, is amended by adding at the end the following new section:

``Sec. 44947. Surface Transportation Security Advisory Committee

  ``(a) Establishment.--The Administrator of the Transportation 
Security Administration (referred to in this section as the 
`Administrator') shall establish within the Transportation Security 
Administration the Surface Transportation Security Advisory Committee 
(referred to in this section as the `Advisory Committee').
  ``(b) Duties.--
          ``(1) In general.--The Advisory Committee may advise, consult 
        with, report to, and make recommendations to the Administrator 
        on surface transportation security matters, including the 
        development, refinement, and implementation of policies, 
        programs, initiatives, rulemakings, and security directives 
        pertaining to surface transportation security.
          ``(2) Risk-based security.--The Advisory Committee shall 
        consider risk-based security approaches in the performance of 
        its duties.
  ``(c) Membership.--
          ``(1) Composition.--The Advisory Committee shall be composed 
        of--
                  ``(A) voting members appointed by the Administrator 
                under paragraph (2); and
                  ``(B) nonvoting members, serving in an advisory 
                capacity, who shall be designated by--
                          ``(i) the Transportation Security 
                        Administration;
                          ``(ii) the Department of Transportation; and
                          ``(iii) such other Federal department or 
                        agency as the Administrator considers 
                        appropriate.
          ``(2) Appointment.--The Administrator shall appoint voting 
        members from among stakeholders representing each mode of 
        surface transportation, such as passenger rail, freight rail, 
        mass transit, pipelines, highways, over-the-road bus, and 
        trucking, including representatives from--
                  ``(A) associations representing such modes of surface 
                transportation;
                  ``(B) labor organizations representing such modes of 
                surface transportation;
                  ``(C) groups representing the users of such modes of 
                surface transportation, including asset manufacturers, 
                as appropriate;
                  ``(D) relevant law enforcement, first responders, and 
                security experts; and
                  ``(E) such other groups as the Administrator 
                considers appropriate.
          ``(3) Chairperson.--The Advisory Committee shall select a 
        chairperson from among its voting members.
          ``(4) Term of office.--
                  ``(A) Terms.--
                          ``(i) In general.--The term of each voting 
                        member of the Advisory Committee shall be two 
                        years, but a voting member may continue to 
                        serve until the Administrator appoints a 
                        successor.
                          ``(ii) Reappointment.--A voting member of the 
                        Advisory Committee may be reappointed.
                  ``(B) Removal.--
                          ``(i) In general.--The Administrator may 
                        review the participation of a member of the 
                        Advisory Committee and remove such member for 
                        cause at any time.
                          ``(ii) Access to certain information.--The 
                        Administrator may remove any member of the 
                        Advisory Committee who the Administrator 
                        determines should be restricted from reviewing, 
                        discussing, or possessing classified 
                        information or sensitive security information.
          ``(5) Prohibition on compensation.--The members of the 
        Advisory Committee may not receive any compensation from the 
        Government by reason of their service on the Advisory 
        Committee.
          ``(6) Meetings.--
                  ``(A) In general.--The Advisory Committee shall meet 
                at least semiannually in person or through web 
                conferencing, and may convene additional meetings as 
                necessary.
                  ``(B) Public meetings.--At least one of the meetings 
                of the Advisory Committee each year shall be--
                          ``(i) announced in the Federal Register;
                          ``(ii) announced on a public website; and
                          ``(iii) open to the public.
                  ``(C) Attendance.--The Advisory Committee shall 
                maintain a record of the persons present at each 
                meeting.
                  ``(D) Minutes.--
                          ``(i) In general.--Unless otherwise 
                        prohibited by Federal law, minutes of the 
                        meetings of the Advisory Committee shall be 
                        published on the public website under 
                        subsection (e)(5).
                          ``(ii) Protection of classified and sensitive 
                        information.--The Advisory Committee may redact 
                        or summarize, as necessary, minutes of the 
                        meetings to protect classified information or 
                        sensitive security information in accordance 
                        with law.
          ``(7) Voting member access to classified information and 
        sensitive security information.--
                  ``(A) Determinations.--Not later than 60 days after 
                the date on which a voting member is appointed to the 
                Advisory Committee but before such voting member may be 
                granted any access to classified information or 
                sensitive security information, the Administrator shall 
                determine if such voting member should be restricted 
                from reviewing, discussing, or possessing classified 
                information or sensitive security information.
                  ``(B) Access.--
                          ``(i) Sensitive security information.--If a 
                        voting member is not restricted from reviewing, 
                        discussing, or possessing sensitive security 
                        information under subparagraph (A) and 
                        voluntarily signs a nondisclosure agreement, 
                        such voting member may be granted access to 
                        sensitive security information that is relevant 
                        to such voting member's service on the Advisory 
                        Committee.
                          ``(ii) Classified information.--Access to 
                        classified materials shall be managed in 
                        accordance with Executive Order 13526 of 
                        December 29, 2009 (75 Fed. Reg. 707), or any 
                        subsequent corresponding Executive order.
                  ``(C) Protections.--
                          ``(i) Sensitive security information.--Voting 
                        members shall protect sensitive security 
                        information in accordance with part 1520 of 
                        title 49, Code of Federal Regulations.
                          ``(ii) Classified information.--Voting 
                        members shall protect classified information in 
                        accordance with the applicable requirements for 
                        the particular level of classification of such 
                        information.
          ``(8) Joint committee meetings.--The Advisory Committee may 
        meet with one or more of the following advisory committees to 
        discuss multimodal security issues and other security-related 
        issues of common concern:
                  ``(A) Aviation Security Advisory Committee, 
                established under section 44946 of title 49, United 
                States Code.
                  ``(B) Maritime Security Advisory Committee, 
                established under section 70112 of title 46, United 
                States Code.
                  ``(C) Railroad Safety Advisory Committee, established 
                by the Federal Railroad Administration.
          ``(9) Subject matter experts.--The Advisory Committee may 
        request the assistance of subject matter experts with expertise 
        related to the jurisdiction of the Advisory Committee.
  ``(d) Reports.--
          ``(1) Periodic reports.--The Advisory Committee shall 
        periodically submit to the Administrator reports on matters 
        requested by the Administrator or by a majority of the members 
        of the Advisory Committee.
          ``(2) Annual report.--
                  ``(A) Submission.--The Advisory Committee shall 
                submit to the Administrator and the Committee on 
                Homeland Security and the Committee on Transportation 
                and Infrastructure of the House of Representatives and 
                the Committee on Homeland Security and Governmental 
                Affairs and the Committee on Commerce, Science, and 
                Transportation of the Senate an annual report that 
                provides information on the activities, findings, and 
                recommendations of the Advisory Committee during the 
                preceding year.
                  ``(B) Publication.--Not later than six months after 
                the date that the Administrator receives an annual 
                report under subparagraph (A), the Administrator shall 
                publish a public version of such report, in accordance 
                with section 552a(b) of title 5, United States Code.
  ``(e) Administration Response.--
          ``(1) Consideration.--The Administrator shall consider the 
        information, advice, and recommendations of the Advisory 
        Committee in formulating policies, programs, initiatives, 
        rulemakings, and security directives pertaining to surface 
        transportation security efforts.
          ``(2) Feedback.--Not later than 90 days after the date that 
        the Administrator receives a recommendation from the Advisory 
        Committee under subsection (d)(2), the Administrator shall 
        submit to the Advisory Committee written feedback on such 
        recommendation, including--
                  ``(A) if the Administrator agrees with such 
                recommendation, a plan describing the actions that the 
                Administrator has taken, will take, or recommends that 
                the head of another Federal department or agency take 
                to implement such recommendation; or
                  ``(B) if the Administrator disagrees with such 
                recommendation, a justification for such disagreement.
          ``(3) Notices.--Not later than 30 days after the date the 
        Administrator submits feedback under paragraph (2), the 
        Administrator shall--
                  ``(A) notify the Committee on Homeland Security and 
                the Committee on Transportation and Infrastructure of 
                the House of Representatives and the Committee on 
                Homeland Security and Governmental Affairs and the 
                Committee on Commerce, Science, and Transportation of 
                the Senate of such feedback, including the agreement or 
                disagreement under subparagraph (A) or subparagraph (B) 
                of such paragraph, as applicable; and
                  ``(B) provide the committees specified in 
                subparagraph (A) with a briefing upon request.
          ``(4) Updates.--Not later than 90 days after the date the 
        Administrator receives a recommendation from the Advisory 
        Committee under subsection (d)(2) that the Administrator agrees 
        with, and quarterly thereafter until such recommendation is 
        fully implemented, the Administrator shall submit to the 
        Committee on Homeland Security and the Committee on 
        Transportation and Infrastructure of the House of 
        Representatives and the Committee on Homeland Security and 
        Governmental Affairs and the Committee on Commerce, Science, 
        and Transportation of the Senate a report or post on the public 
        website under paragraph (5) an update on the status of such 
        recommendation.
          ``(5) Website.--The Administrator shall maintain a public 
        website that--
                  ``(A) lists the members of the Advisory Committee;
                  ``(B) provides the contact information for the 
                Advisory Committee; and
                  ``(C) information relating to meetings, minutes, 
                annual reports, and the implementation of 
                recommendations under this section.
  ``(f) Nonapplicability of FACA.--The Federal Advisory Committee Act 
(5 U.S.C. App.) shall not apply to the Advisory Committee or any 
subcommittee established under this section.''.
  (b) Advisory Committee Members.--
          (1) Voting members.--Not later than 180 days after the date 
        of the enactment of this Act, the Administrator of the 
        Transportation Security Administration shall appoint the voting 
        members of the Surface Transportation Security Advisory 
        Committee established under section 44947 of title 49, United 
        States Code, as added by subsection (a) of this section.
          (2) Nonvoting members.--Not later than 90 days after the date 
        of the enactment of this Act, each Federal Government 
        department and agency with regulatory authority over a mode of 
        surface transportation, as the Administrator of the 
        Transportation Security Administration considers appropriate, 
        shall designate an appropriate representative to serve as a 
        nonvoting member of the Surface Transportation Security 
        Advisory Committee.
  (c) Clerical Amendment.--The analysis for chapter 449 of title 49, 
United States Code, is amended by inserting after the item relating to 
section 44946 the following new item:

``44947. Surface Transportation Security Advisory Committee.''.

SEC. 578. REVIEW OF THE EXPLOSIVES DETECTION CANINE TEAM PROGRAM.

  (a) In General.--Not later than 90 days after the date that the 
Inspector General of the Department of Homeland Security receives the 
report under section 572(c), the Inspector General shall--
          (1) review the explosives detection canine team program of 
        the Department, including--
                  (A) the development by the Transportation Security 
                Administration of a deployment strategy for explosives 
                detection canine teams;
                  (B) the national explosives detection canine team 
                training program, including canine training, handler 
                training, refresher training, and updates to such 
                training; and
                  (C) the use of the canine assets during an urgent 
                security need, including the reallocation of such 
                program resources outside the transportation systems 
                sector during an urgent security need; and
          (2) submit to the appropriate congressional committees a 
        report on such review, including any recommendations.
  (b) Considerations.--In conducting the review of the deployment 
strategy under subsection (a)(1)(A), the Inspector General of the 
Department of Homeland Security shall consider whether the 
Transportation Security Administration's method to analyze the risk to 
transportation facilities and transportation systems is appropriate.

SEC. 579. EXPANSION OF NATIONAL EXPLOSIVES DETECTION CANINE TEAM 
                    PROGRAM.

  (a) In General.--The Secretary of Homeland Security, where 
appropriate, shall encourage State, local, and tribal governments and 
private owners of high-risk transportation facilities to strengthen 
security through the use of explosives detection canine teams.
  (b) Increased Capacity.--
          (1) In general.--Before the date the Inspector General of the 
        Department of Homeland Security submits the report under 
        section 578, the Administrator of the Transportation Security 
        Administration may increase the number of State and local 
        surface and maritime transportation explosives detection canine 
        teams by not more than 70 such teams.
          (2) Additional teams.--Beginning on the date the Inspector 
        General of the Department of Homeland Security submits the 
        report under section 578, the Secretary of Homeland Security 
        may increase the State and local surface and maritime 
        transportation explosives detection canine teams by not more 
        than 200 such teams unless more of such teams are needed as 
        identified in the risk-based security strategy under section 
        572(b)(1)(A), consistent with section 573 or with the 
        President's most recent budget submitted under section 1105 of 
        title 31, United States Code.
          (3) Recommendations.--Before initiating any increase in the 
        number of explosives detection teams under paragraph (2), the 
        Secretary of Homeland Security shall consider any 
        recommendations in the report under section 578 on the efficacy 
        and management of the explosives detection canine program of 
        the Department of Homeland Security.
  (c) Deployment.--The Secretary of Homeland Security shall--
          (1) use any additional explosives detection canine teams, as 
        described in subsection (b)(1), as part of the Department of 
        Homeland Security's efforts to strengthen security across the 
        Nation's surface and maritime transportation systems;
          (2) make available explosives detection canine teams to all 
        modes of transportation, subject to the requirements under 
        section 576, to address specific vulnerabilities or risks, on 
        an as-needed basis and as otherwise determined appropriate by 
        the Secretary; and
          (3) consider specific needs and training requirements for 
        explosives detection canine teams to be deployed across the 
        Nation's surface and maritime transportation systems, including 
        in venues of multiple modes of transportation, as the Secretary 
        considers appropriate.

SEC. 580. EXPLOSIVE DETECTION TECHNOLOGY.

  The Secretary of Homeland Security shall prioritize the research and 
facilitation of next generation technologies to detect explosives in 
the Nation's surface transportation systems.

SEC. 581. STUDY ON SECURITY STANDARDS AND BEST PRACTICES FOR UNITED 
                    STATES AND FOREIGN PASSENGER TRANSPORTATION 
                    SYSTEMS.

  (a) In General.--The Comptroller General of the United States shall 
conduct a study of how the Transportation Security Administration--
          (1) identifies and compares--
                  (A) United States and foreign passenger 
                transportation system security standards; and
                  (B) best practices for protecting passenger 
                transportation systems, including shared terminal 
                facilities, and cyber systems; and
          (2) disseminates to stakeholders the findings under paragraph 
        (1).
  (b) Report.--Not later than 18 months after the date of the enactment 
of this Act, the Comptroller General of the United States shall issue a 
report that contains--
          (1) the findings of the study conducted under subsection (a); 
        and
          (2) any recommendations for improving relevant processes or 
        procedures.

SEC. 582. AMTRAK SECURITY UPGRADES.

  (a) Railroad Security Assistance.--Subsection (b) of section 1513 of 
the Implementing Recommendations of the 9/11 Commission Act of 2007 (6 
U.S.C. 1163) is amended--
          (1) in paragraph (1), by inserting before the period at the 
        end the following: ``, including communications 
        interoperability where appropriate with relevant outside 
        agencies and entities'';
          (2) in paragraph (5), by striking ``security of'' and 
        inserting ``security and preparedness of'';
          (3) in paragraph (7), by striking ``security threats'' and 
        inserting ``security threats and preparedness, including 
        connectivity to the National Terrorist Screening Center''; and
          (4) in paragraph (9), by striking ``and security officers'' 
        and inserting ``, security, and preparedness officers''.
  (b) Specific Projects.--Subsection (a)(3) of section 1514 of the 
Implementing Recommendations of the 9/11 Commission Act of 2007 (6 
U.S.C. 1164) is amended--
          (1) in subparagraph (D) by inserting before the semicolon at 
        the end the following: ``, or to connect to the National 
        Terrorism Screening Center watchlist'';
          (2) in subparagraph (G), by striking ``and'' after the 
        semicolon;
          (3) in subparagraph (H) by striking the period at the end and 
        inserting a semicolon; and
          (4) by adding at the end the following new subparagraphs:
                  ``(I) for improvements to passenger verification 
                systems;
                  ``(J) for improvements to employee and contractor 
                verification systems, including identity verification 
                technology; or
                  ``(K) for improvements to the security of Amtrak 
                computer systems, including cybersecurity assessments 
                and programs.''.

SEC. 583. STUDY ON SURFACE TRANSPORTATION INSPECTORS.

  Not later than 180 days after the date of the enactment of this Act, 
the Comptroller General of the United States shall submit to the 
appropriate congressional committees a report that--
          (1) identifies any duplication or redundancy between the 
        Transportation Security Administration and the Department of 
        Transportation relating to surface transportation security 
        inspections or oversight; and
          (2) provides recommendations, if any, relating to--
                  (A) improvements to the surface transportation 
                security inspectors program, including--
                          (i) changes in organizational and supervisory 
                        structures;
                          (ii) coordination procedures to enhance 
                        consistency; and
                          (iii) effectiveness in inspection and 
                        compliance activities; and
                  (B) whether each transportation mode needs inspectors 
                trained and qualified for each such specific mode.

SEC. 584. SECURITY AWARENESS PROGRAM.

  (a) Establishment.--The Administrator of the Transportation Security 
Administration shall establish a program to promote surface 
transportation security through the training of surface transportation 
operators and frontline employees on each of the skills identified in 
subsection (c).
  (b) Application.--The program established under subsection (a) shall 
apply to all modes of surface transportation, including public 
transportation, rail, highway, motor carrier, and pipeline.
  (c) Training.--The program established under subsection (a) shall 
cover, at a minimum, the skills necessary to observe, assess, and 
respond to suspicious items or actions that could indicate a threat to 
transportation.
  (d) Assessment.--
          (1) In general.--The Administrator of the Transportation 
        Security Administration shall conduct an assessment of current 
        training programs for surface transportation operators and 
        frontline employees.
          (2) Contents.--The assessment under paragraph (1) shall 
        identify--
                  (A) whether other training is being provided, either 
                voluntarily or in response to other Federal 
                requirements; and
                  (B) whether there are any gaps in existing training.
  (e) Updates.--The Administrator of the Transportation Security 
Administration shall ensure the program established under subsection 
(a) is updated as necessary to address changes in risk and terrorist 
methods and to close any gaps identified in the assessment under 
subsection (d).
  (f) Suspicious Activity Reporting.--
          (1) In general.--The Secretary of Homeland Security shall 
        ensure there exists a national mechanism for an individual to 
        use to report to the Department of Homeland Security suspicious 
        activity in transportation systems.
          (2) Procedures.--The Secretary of Homeland Security shall 
        establish procedures for the Department of Homeland Security--
                  (A) to review and follow-up, as necessary, on each 
                report received under paragraph (1); and
                  (B) to share, as necessary and in accordance with 
                law, such reports with appropriate Federal, State, 
                local, and tribal entities.
          (3) Rule of construction.--Nothing in this section may be 
        construed to--
                  (A) replace or affect in any way the use of 9-1-1 
                services in an emergency; or
                  (B) replace or affect in any way the security 
                training program requirements specified in sections 
                1408, 1517, and 1534 of the Implementing 
                Recommendations of the 9/11 Commission Act of 2007 (6 
                U.S.C. 1137, 1167, and 1184; Public Law 110-53).
  (g) Frontline Employee Defined.--In this section, the term 
``frontline employee'' includes--
          (1) an employee of a public transportation agency who is a 
        transit vehicle driver or operator, dispatcher, maintenance and 
        maintenance support employee, station attendant, customer 
        service employee, security employee, or transit police, or any 
        other employee who has direct contact with riders on a regular 
        basis, and any other employee of a public transportation agency 
        that the Administrator of the Transportation Security 
        Administration determines should receive security training 
        under this section or who is receiving security training under 
        other law;
          (2) over-the-road bus drivers, security personnel, 
        dispatchers, maintenance and maintenance support personnel, 
        ticket agents, other terminal employees, and other employees of 
        an over-the-road bus operator or terminal owner or operator who 
        the Administrator determines should receive security training 
        under this section or who is receiving security training under 
        other law; or
          (3) security personnel, dispatchers, locomotive engineers, 
        conductors, trainmen, other onboard employees, maintenance and 
        maintenance support personnel, bridge tenders, and any other 
        employees of railroad carriers who the Administrator determines 
        should receive security training under this section or who is 
        receiving security training under other law.

SEC. 585. VOLUNTARY USE OF CREDENTIALING.

  (a) In General.--An individual who is subject to credentialing or a 
background investigation under section 5103a of title 49, United States 
Code, may satisfy such requirement by obtaining a valid transportation 
security card issued under section 70105 of title 46, United States 
Code.
  (b) Fees.--The Secretary of Homeland Security may charge reasonable 
fees, in accordance with section 520(a) of the Department of Homeland 
Security Appropriations Act, 2004 (6 U.S.C. 469(a)), for providing the 
necessary credentialing and background investigation under this 
section.
  (c) Definitions.--In this section:
          (1) Individual who is subject to credentialing or a 
        background investigation.--The term ``individual who is subject 
        to credentialing or a background investigation'' means an 
        individual who--
                  (A) because of employment is regulated by the 
                Transportation Security Administration, Department of 
                Transportation, or Coast Guard and is required to have 
                a background records check to obtain a hazardous 
                materials endorsement on a commercial driver's license 
                issued by a State under section 5103a of title 49, 
                United States Code; or
                  (B) is required to have a credential and background 
                records check under section 2102(d)(2) of the Homeland 
                Security Act of 2002 (6 U.S.C. 622(d)(2)) at a facility 
                with activities that are regulated by the 
                Transportation Security Administration, Department of 
                Transportation, or Coast Guard.
          (2) Valid transportation security card issued under section 
        70105 of title 46, united states code.--The term ``valid 
        transportation security card issued under section 70105 of 
        title 46, United States Code'' means a transportation security 
        card issued under section 70105 of title 46, United States 
        Code, that is--
                  (A) not expired;
                  (B) shows no signs of tampering; and
                  (C) bears a photograph of the individual representing 
                such card.

SEC. 586. BACKGROUND RECORDS CHECKS FOR ISSUANCE OF HAZMAT LICENSES.

  (a) Issuance of Licenses.--Paragraph (1) of section 5103a(a) of title 
49, United States Code, is amended--
          (1) by striking ``unless'' and inserting ``unless--'';
          (2) by striking ``the Secretary of Homeland Security'' and 
        inserting the following:
                  ``(A) the Secretary of Homeland Security'';
          (3) in subparagraph (A), as designated pursuant to paragraph 
        (2) of this subsection, by striking the period at the end and 
        inserting ``; or''; and
          (4) by adding at the end the following new subparagraph:
                  ``(B) the individual holds a valid transportation 
                security card issued under section 70105 of title 
                46.''.
  (b) Transportation Security Card.--Paragraph (1) of section 5103a(d) 
of title 49, United States Code, is amended, in the matter preceding 
subparagraph (A), by striking ``described in subsection (a)(1)'' and 
inserting ``under subsection (a)(1)(A)''.

SEC. 587. RECURRENT VETTING FOR SURFACE TRANSPORTATION CREDENTIAL-
                    HOLDERS.

  Section 70105 of title 46, United States Code, is amended by adding 
at the end the following new subsection:
  ``(r) Recurrent Vetting.--
          ``(1) In general.--Not later than 180 days after the date of 
        the enactment of this subsection, the Secretary shall develop 
        and implement a plan to utilize the Federal Bureau of 
        Investigation's Rap Back Service in order to establish 
        recurrent vetting capabilities for individuals holding valid 
        transportation security cards under this section.
          ``(2) Exemption.--Individuals holding valid transportation 
        security cards under this section who are subject to recurrent 
        vetting under the plan to utilize the Rap Back Service referred 
        to in paragraph (1) shall be exempt from any recurrent 
        determinations or background checks under this section to which 
        such individuals would otherwise be subject every five years in 
        the absence of such utilization.''.

SEC. 588. PIPELINE SECURITY STUDY.

  (a) Study.--The Comptroller General of the United States shall 
conduct a study regarding the roles and responsibilities of the 
Department of Homeland Security and the Department of Transportation 
with respect to pipeline security. Such study shall address whether--
          (1) the Annex to the Memorandum of Understanding executed on 
        August 9, 2006, between the Department of Homeland Security and 
        the Department of Transportation adequately delineates 
        strategic and operational responsibilities for pipeline 
        security, including whether it is clear which department is 
        responsible for--
                  (A) protecting against intentional pipeline breaches 
                and cyber attacks;
                  (B) responding to intentional pipeline breaches and 
                cyber attacks; and
                  (C) planning to recover from the impact of 
                intentional pipeline breaches and cyber attacks;
          (2) the respective roles and responsibilities of each 
        department are adequately conveyed to relevant stakeholders and 
        to the public; and
          (3) the processes and procedures for determining whether a 
        particular pipeline breach is a terrorist incident are clear 
        and effective.
  (b) Report on Study.--Not later than 180 days after the date of the 
enactment of this section, the Comptroller General of the United States 
shall submit to the Secretary of Homeland Security and the Committee on 
Homeland Security and the Committee on Transportation and 
Infrastructure of the House of Representatives and the Committee on 
Commerce, Science, and Transportation of the Senate a report containing 
the findings of the study conducted under subsection (a).
  (c) Report to Congress.--Not later than 90 days after the submission 
of the report under subsection (b), the Secretary of Homeland Security 
shall review and analyze the study and submit to the Committee on 
Homeland Security and the Committee on Transportation and 
Infrastructure of the House of Representatives and the Committee on 
Commerce, Science, and Transportation of the Senate a report on such 
review and analysis, including any recommendations for--
          (1) changes to the Annex to the Memorandum of Understanding 
        referred to in subsection (a)(1); and
          (2) other improvements to pipeline security activities at the 
        Department.

SEC. 589. REPEAL OF LIMITATION RELATING TO MOTOR CARRIER SECURITY-
                    SENSITIVE MATERIAL TRACKING TECHNOLOGY.

  Section 1554 of the Implementing Recommendations of the 9/11 
Commission Act of 2007 (6 U.S.C. 1204) is amended by striking 
subsection (d).

  Subtitle H--Security Enhancements in Public Areas of Transportation 
                               Facilities

SEC. 591. WORKING GROUP.

  (a) In General.--The Secretary of Homeland Security may establish a 
working group to promote collaborative engagement between the 
Department of Homeland Security and public and private stakeholders to 
develop non-binding recommendations for enhancing the security in 
public areas of transportation facilities.
  (b) Annual Report.--If the Secretary of Homeland Security establishes 
a working group pursuant to subsection (a), not later than one year 
after such establishment and annually thereafter for five years, the 
Secretary shall report on the working group's organization, 
participation, activities, findings, and non-binding recommendations 
for the immediately preceding 12 month period. The Secretary may 
publish a public version describing the working group's activities and 
such related matters as would be informative to the public, consistent 
with section 552(b) of title 5, United States Code.
  (c) Inapplicability of the Federal Advisory Committee Act.--The 
Federal Advisory Committee Act (5 U.S.C. App.) shall not apply to the 
working group or any subsidiary thereof.

SEC. 592. TECHNICAL ASSISTANCE; VULNERABILITY ASSESSMENT TOOLS.

  (a) In General.--The Secretary of Homeland Security shall--
          (1) inform public and private sector stakeholders regarding 
        the availability of Department of Homeland Security technical 
        assistance, including vulnerability assessment tools, to help 
        enhance the security in public areas of transportation 
        facilities; and
          (2) subject to availability of appropriations, provide such 
        technical assistance, upon request, to such a stakeholder.
  (b) Best Practices.--Not later than one year after the date of the 
enactment of this Act, the Secretary of Homeland Security shall publish 
and widely disseminate best practices for protecting and enhancing the 
resilience of public areas of transportation facilities, including 
associated frameworks or templates for implementation. As appropriate, 
such best practices shall be updated periodically.

SEC. 593. OPERATIONS CENTERS.

  Not later than 120 days after the date of the enactment of this Act, 
the Administrator of the Transportation Security Administration, in 
consultation with the heads of other appropriate offices or components 
of the Department of Homeland Security, shall make available to public 
and private stakeholders a framework for establishing an operations 
center within a transportation facility to promote interagency response 
and coordination.

SEC. 594. REVIEW OF REGULATIONS.

  (a) Review.--Not later than one year after the date of the enactment 
of this Act, the Administrator of the Transportation Security 
Administration shall submit to the Committee on Homeland Security of 
the House and the Committee on Commerce, Science, and Transportation of 
the Senate a report that includes a review of regulations, directives, 
policies, and procedures issued by the Administrator regarding the 
transportation of a firearm and ammunition by an aircraft passenger, 
and, as appropriate, information on plans to modify any such 
regulation, directive, policy, or procedure based on such review.
  (b) Consultation.--In preparing the report required under subsection 
(a), the Administrator of the Transportation Security Administration 
shall consult with the Aviation Security Advisory Committee 
(established pursuant to section 44946 of title 49, United States Code) 
and appropriate public and private sector stakeholders.

SEC. 595. DEFINITION.

  In this subtitle, the term ``public and private sector stakeholders'' 
has the meaning given such term in section 114(u)(1)(C) of title 49, 
United States Code.

     TITLE VI--EMERGENCY PREPAREDNESS, RESPONSE, AND COMMUNICATIONS

       Subtitle A--Grants, Training, Exercises, and Coordination

SEC. 601. URBAN AREA SECURITY INITIATIVE.

  Section 2003 of the Homeland Security Act of 2002 (6 U.S.C. 604) is 
amended--
          (1) in subsection (b)(2)(A), in the matter preceding clause 
        (i), by inserting ``, using the most up-to-date data 
        available,'' after ``assessment'';
          (2) in subsection (d)(2), by amending subparagraph (B) to 
        read as follows:
                  ``(B) Funds retained.--To ensure transparency and 
                avoid duplication, a State shall provide each relevant 
                high-risk urban area with a detailed accounting of the 
                items, services, or activities on which any funds 
                retained by the State under subparagraph (A) are to be 
                expended. Such accounting shall be provided not later 
                than 90 days after the date of which such funds are 
                retained.''; and
          (3) by striking subsection (e) and inserting the following 
        new subsections:
  ``(e) Threat and Hazard Identification Risk Assessment and Capability 
Assessment.--As a condition of receiving a grant under this section, 
each high-risk urban area shall submit to the Administrator a threat 
and hazard identification and risk assessment and capability 
assessment--
          ``(1) at such time and in such form as is required by the 
        Administrator; and
          ``(2) consistent with the Federal Emergency Management 
        Agency's Comprehensive Preparedness Guide 201, Second Edition, 
        or such successor document or guidance as is issued by the 
        Administrator.
  ``(f) Period of Performance.--The Administrator shall make funds 
provided under this section available for use by a recipient of a grant 
for a period of not less than 36 months.
  ``(g) Authorization of Appropriations.--There is authorized to be 
appropriated for grants under this section $800,000,000 for each of 
fiscal years 2018 through 2022.''.

SEC. 602. STATE HOMELAND SECURITY GRANT PROGRAM.

  Section 2004 of the Homeland Security Act of 2002 (6 U.S.C. 605) is 
amended by striking subsection (f) and inserting the following new 
subsections:
  ``(f) Threat and Hazard Identification and Risk Assessment and 
Capability Assessment.--
          ``(1) In general.--As a condition of receiving a grant under 
        this section, each State shall submit to the Administrator a 
        threat and hazard identification and risk assessment and 
        capability assessment--
                  ``(A) at such time and in such form as is required by 
                the Administrator; and
                  ``(B) consistent with the Federal Emergency 
                Management Agency's Comprehensive Preparedness Guide 
                201, Second Edition, or such successor document or 
                guidance as is issued by the Administrator.
          ``(2) Collaboration.--In developing the threat and hazard 
        identification and risk assessment under paragraph (1), a State 
        shall solicit input from local and tribal governments, 
        including first responders, and, as appropriate, non-
        governmental and private sector stakeholders.
          ``(3) First responders defined.--In this subsection, the term 
        `first responders' includes representatives of local 
        governmental and nongovernmental fire, law enforcement, 
        emergency management, and emergency medical personnel.
  ``(g) Period of Performance.--The Administrator shall make funds 
provided under this section available for use by a recipient of a grant 
for a period of not less than 36 months.
  ``(h) Authorization of Appropriations.--There is authorized to be 
appropriated for grants under this section $600,000,000 for each of 
fiscal years 2018 through 2022.''.

SEC. 603. GRANTS TO DIRECTLY ELIGIBLE TRIBES.

  Section 2005 of the Homeland Security Act of 2002 (6 U.S.C. 606) is 
amended by--
          (1) redesignating subsections (h) through (k) as subsections 
        (i) through (l), respectively; and
          (2) inserting after subsection (g) the following new 
        subsection:
  ``(h) Period of Performance.--The Secretary shall make funds provided 
under this section available for use by a recipient of a grant for a 
period of not less than 36 months.''.

SEC. 604. LAW ENFORCEMENT TERRORISM PREVENTION.

  (a) Law Enforcement Terrorism Prevention Program.--Subsection (a) of 
section 2006 of the Homeland Security Act of 2002 (6 U.S.C. 607) is 
amended--
          (1) in paragraph (1)--
                  (A) by inserting ``States and high-risk urban areas 
                expend'' after ``that''; and
                  (B) by striking ``is used'';
          (2) in paragraph (2), by amending subparagraph (I) to read as 
        follows:
                  ``(I) activities as determined appropriate by the 
                Administrator, in coordination with the Assistant 
                Secretary for State and Local Law Enforcement within 
                the Office of Partnership and Engagement of the 
                Department, through outreach to relevant stakeholder 
                organizations; and''; and
          (3) by adding at the end the following new paragraph:
          ``(4) Annual report.--The Administrator, in coordination with 
        the Assistant Secretary for State and Local Law Enforcement, 
        shall report annually from fiscal year 2018 through fiscal year 
        2022 on the use of grants under sections 2003 and 2004 for law 
        enforcement terrorism prevention activities authorized under 
        this section, including the percentage and dollar amount of 
        funds used for such activities and the types of projects 
        funded.''.
  (b) Office for State and Local Law Enforcement.--Subsection (b) 
section 2006 of the Homeland Security Act of 2002 (6 U.S.C. 607) is 
amended--
          (1) in paragraph (1), by striking ``Policy Directorate'' and 
        inserting ``Office of Partnership and Engagement''
          (2) in paragraph (4)--
                  (A) in subparagraph (B), by inserting ``, including 
                through consultation with such agencies regarding 
                Department programs that may impact such agencies'' 
                before the semicolon at the end; and
                  (B) in subparagraph (D), by striking ``ensure'' and 
                inserting ``certify''.

SEC. 605. PRIORITIZATION.

  (a) In General.--Subsection (a) of section 2007 of the Homeland 
Security Act of 2002 (6 U.S.C. 608) is amended--
          (1) in paragraph (1)--
                  (A) by amending subparagraph (A) to read as follows:
                  ``(A) its population, including consideration of 
                domestic and international tourists, commuters, and 
                military populations, including military populations 
                residing in communities outside military 
                installations;'';
                  (B) in subparagraph (E), by inserting ``, including 
                threat information from other relevant Federal agencies 
                and field offices, as appropriate'' before the 
                semicolon at the end; and
                  (C) in subparagraph (I), by striking ``target'' and 
                inserting ``core''; and
          (2) in paragraph (2), by striking ``target'' and inserting 
        ``core''.
  (b) Review.--Not later than 90 days after the date of the enactment 
of this Act, the Secretary of Homeland Security, through the 
Administrator of the Federal Emergency Management Agency, shall review 
and report to the Committee on Homeland Security and the Committee on 
Appropriations of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs and the Committee on 
Appropriations of the Senate on the risk formula and methodology used 
to award grants under sections 2003 and 2004 of the Homeland Security 
Act of 2002 (6 U.S.C. 604 and 605), including a discussion of any 
necessary changes to such formula to ensure grant awards are 
appropriately based on risk.
  (c) Comptroller General Review.--Not later than 180 days after the 
date of enactment of this Act, the Comptroller General of the United 
States shall review and assess the risk formula and methodology used to 
award grants under sections 2003 and 2004 of the Homeland Security Act 
of 2002, including--
          (1) the process utilized by the Department of Homeland 
        Security to gather threat information for each potential State 
        and high-risk urban area;
          (2) the extent to which such risk formula and methodology 
        considers the factors specified in section 2007 of the Homeland 
        Security Act of 2002 (6 U.S.C. 608), in particular--
                  (A) the extent to which the jurisdiction has unmet 
                core capabilities due to resource constraints;
                  (B) the degree to which a jurisdiction has been able 
                to address capability gaps with previous grant awards; 
                and
                  (C) in the case of a high-risk urban area, the extent 
                to which such high-risk urban area includes--
                          (i) incorporated municipalities, counties, 
                        parishes, and Indian tribes within the relevant 
                        eligible metropolitan area the inclusion of 
                        which will enhance regional efforts to prevent, 
                        prepare for, protect against, and respond to 
                        acts of terrorism; and
                          (ii) other local and tribal governments in 
                        the surrounding area that are likely to be 
                        called upon to respond to acts of terrorism 
                        within the high-risk urban area; and
          (3) how grant award amounts are determined.

SEC. 606. ALLOWABLE USES.

  Section 2008 of the Homeland Security Act of 2002 (6 U.S.C. 609) is 
amended--
          (1) in subsection (a)--
                  (A) in the matter preceding paragraph (1), by 
                striking ``target'' and inserting ``core'';
                  (B) by redesignating paragraphs (6) through (14) as 
                paragraphs (8) through (16), respectively;
                  (C) in paragraph (5), by inserting before the 
                semicolon at the end the following: ``, provided such 
                purchases align with the Statewide Communication 
                Interoperability Plan and are coordinated with the 
                Statewide Interoperability Coordinator or Statewide 
                interoperability governance body of the State of the 
                recipient''; and
                  (D) by inserting after paragraph (5) the following 
                new paragraphs:
          ``(6) enhancing medical preparedness, medical surge capacity, 
        and mass prophylaxis capabilities, including the development 
        and maintenance of an initial pharmaceutical stockpile, 
        including medical kits and diagnostics sufficient to protect 
        first responders, their families, immediate victims, and 
        vulnerable populations from a chemical or biological event;
          ``(7) enhancing cybersecurity, including preparing for and 
        responding to cybersecurity risks and incidents (as such terms 
        are defined in section 227) and developing statewide cyber 
        threat information analysis and dissemination activities;'';
                  (E) in paragraph (8), as so redesignated, by striking 
                ``Homeland Security Advisory System'' and inserting 
                ``National Terrorism Advisory System''; and
                  (F) in paragraph (14), as so redesignated, by 
                striking ``3'' and inserting ``5'';
          (2) in subsection (b)--
                  (A) in paragraph (3)(B), by striking ``(a)(10)'' and 
                inserting ``(a)(12)''; and
                  (B) in paragraph (4)(B)(i), by striking ``target'' 
                and inserting ``core''; and
          (3) in subsection (c), by striking ``target'' and ``core''.

SEC. 607. APPROVAL OF CERTAIN EQUIPMENT.

  (a) In General.--Section 2008 of the Homeland Security Act of 2002 (6 
U.S.C. 609), as amended by this Act, is further amended--
          (1) in subsection (f)--
                  (A) by striking ``If an applicant'' and inserting the 
                following:
          ``(1) Application requirement.--If an applicant''; and
                  (B) by adding at the end the following new 
                paragraphs:
          ``(2) Review process.--The Administrator shall implement a 
        uniform process for reviewing applications that, in accordance 
        with paragraph (1), contain explanations to use grants provided 
        under section 2003 or 2004 to purchase equipment or systems 
        that do not meet or exceed any applicable national voluntary 
        consensus standards developed under section 647 of the Post-
        Katrina Emergency Management Reform Act of 2006 (6 U.S.C. 747).
          ``(3) Factors.--In carrying out the review process under 
        paragraph (2), the Administrator shall consider the following:
                  ``(A) Current or past use of proposed equipment or 
                systems by Federal agencies or the Armed Forces.
                  ``(B) The absence of a national voluntary consensus 
                standard for such equipment or systems.
                  ``(C) The existence of an international consensus 
                standard for such equipment or systems, and whether 
                such equipment or systems meets such standard.
                  ``(D) The nature of the capability gap identified by 
                the applicant, and how such equipment or systems will 
                address such gap.
                  ``(E) The degree to which such equipment or systems 
                will serve the needs of the applicant better than 
                equipment or systems that meet or exceed existing 
                consensus standards.
                  ``(F) Any other factor determined appropriate by the 
                Administrator.''; and
          (2) by adding at the end the following new subsection:
  ``(g) Review Process.--The Administrator shall implement a uniform 
process for reviewing applications to use grants provided under section 
2003 or 2004 to purchase equipment or systems not included on the 
Authorized Equipment List maintained by the Administrator.''.
  (b) Inspector General Report.--Not later than three years after the 
date of the enactment of this Act, the Inspector General of the 
Department of Homeland Security shall submit to the Committee on 
Homeland Security of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs of the Senate a report 
assessing the implementation of the review process established under 
paragraph (2) of subsection (f) of section 2008 of the Homeland 
Security Act of 2002 (as added by subsection (a) of this section), 
including information on the following:
          (1) The number of requests to purchase equipment or systems 
        that do not meet or exceed any applicable consensus standard 
        evaluated under such review process.
          (2) The capability gaps identified by applicants and the 
        number of such requests granted or denied.
          (3) The processing time for the review of such requests.

SEC. 608. MEMORANDA OF UNDERSTANDING.

  (a) In General.--Subtitle B of title XX of the Homeland Security Act 
of 2002 (6 U.S.C. 611 et seq.) is amended by adding at the end the 
following new section:

``SEC. 2024. MEMORANDA OF UNDERSTANDING WITH DEPARTMENTAL COMPONENTS 
                    AND OFFICES.

  ``The Administrator shall enter into memoranda of understanding with 
the heads of the following departmental components and offices 
delineating the roles and responsibilities of such components and 
offices regarding the policy and guidance for grants under section 1406 
of the Implementing Recommendations of the 9/11 Commission Act of 2007 
(6 U.S.C. 1135), sections 2003 and 2004 of this Act, and section 70107 
of title 46, United States Code, as appropriate:
          ``(1) The Commissioner of U.S. Customs and Border Protection.
          ``(2) The Administrator of the Transportation Security 
        Administration.
          ``(3) The Commandant of the Coast Guard.
          ``(4) The Under Secretary for Intelligence and Analysis.
          ``(5) The Director of the Office of Emergency Communications.
          ``(6) The Assistant Secretary for State and Local Law 
        Enforcement.
          ``(7) The Countering Violent Extremism Coordinator.
          ``(8) The Officer for Civil Rights and Civil Liberties.
          ``(9) The Chief Medical Officer.
          ``(10) The heads of other components or offices of the 
        Department, as determined by the Secretary.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 2023 the following new item:

``Sec. 2024. Memoranda of understanding with departmental components 
and offices.''.

SEC. 609. GRANTS METRICS.

  (a) In General.--To determine the extent to which grants under 
sections 2003 and 2004 of the Homeland Security Act of 2002 (6 U.S.C. 
603 and 604) have closed capability gaps identified in State 
Preparedness Reports required under subsection (c) of section 652 of 
the Post-Katrina Emergency Management Reform Act of 2006 (6 U.S.C. 752; 
title VI of the Department of Homeland Security Appropriations Act, 
2007; Public Law 109-295) and Threat and Hazard Identification and Risk 
Assessments required under subsections (e) and (f) of such sections 
2003 and 2004, respectively, as added by this Act, from each State and 
high-risk urban area, the Administrator of the Federal Emergency 
Management Agency shall conduct and submit to the Committee on Homeland 
Security and the Committee on Transportation and Infrastructure of the 
House of Representatives and the Committee on Homeland Security and 
Governmental Affairs of the Senate an assessment of information 
provided in such Reports and Assessments.
  (b) Assessment Requirements.--The assessment required under 
subsection (a) shall include a comparison of successive State 
Preparedness Reports and Threat and Hazard Identification and Risk 
Assessments that aggregates results across the States and high-risk 
urban areas.

SEC. 610. GRANT MANAGEMENT BEST PRACTICES.

  The Administrator of the Federal Emergency Management Agency shall 
include in the annual Notice of Funding Opportunity relating to grants 
under sections 2003 and 2004 of the Homeland Security Act of 2002 (6 
U.S.C. 604 and 605) an appendix that includes the following:
          (1) A summary of findings identified by the Office of the 
        Inspector General of the Department of Homeland Security in 
        audits of such grants and methods to address areas identified 
        for improvement, including opportunities for technical 
        assistance.
          (2) Innovative projects and best practices instituted by 
        grant recipients.

SEC. 611. PROHIBITION ON CONSOLIDATION.

  The Secretary of Homeland Security may not implement the National 
Preparedness Grant Program or any successor consolidated grant program 
unless the Secretary receives prior authorization from Congress 
permitting such implementation.

SEC. 612. MAINTENANCE OF GRANT INVESTMENTS.

  Section 2008 of the Homeland Security Act of 2002 (6 U.S.C. 609), as 
amended by this Act, is further amended by adding at the end the 
following new subsection:
  ``(h) Maintenance of Equipment.--Any applicant for a grant under 
section 2003 or 2004 seeking to use funds to purchase equipment, 
including pursuant to paragraphs (3), (4), (5), or (12) of subsection 
(a) of this section, shall by the time of the receipt of such grant 
develop a plan for the maintenance of such equipment over its life-
cycle that includes information identifying which entity is responsible 
for such maintenance.''.

SEC. 613. TRANSIT SECURITY GRANT PROGRAM.

  Section 1406 of the Implementing Recommendations of the 9/11 
Commission Act of 2007 (6 U.S.C. 1135) is amended--
          (1) in subsection (b)(2)(A), by inserting ``and associated 
        backfill'' after ``security training''; and
          (2) by striking subsection (m) and inserting the following 
        new subsections:
  ``(m) Periods of Performance.--
          ``(1) In general.--Except as provided in paragraph (2), funds 
        provided pursuant to a grant awarded under this section for a 
        use specified in subsection (b) shall remain available for use 
        by a grant recipient for a period of not fewer than 36 months.
          ``(2) Exception.--Funds provided pursuant to a grant awarded 
        under this section for a use specified in subparagraph (M) or 
        (N) of subsection (b)(1) shall remain available for use by a 
        grant recipient for a period of not fewer than 55 months.
  ``(n) Authorization of Appropriations.--There is authorized to be 
appropriated for grants under this section $200,000,000 for each of 
fiscal years 2018 through 2022.''.

SEC. 614. PORT SECURITY GRANT PROGRAM.

  Section 70107 of title 46, United States Code, is amended by--
          (1) striking subsection (l);
          (2) redesignating subsection (m) as subsection (l); and
          (3) by adding at the end the following new subsections:
  ``(n) Period of Performance.--The Secretary shall make funds provided 
under this section available for use by a recipient of a grant for a 
period of not less than 36 months.
  ``(o) Authorization of Appropriations.--There is authorized to be 
appropriated for grants under this section $200,000,000 for each of the 
fiscal years 2018 through 2022.''.

SEC. 615. NATIONAL DOMESTIC PREPAREDNESS CONSORTIUM.

  Section 1204 of the Implementing Recommendations of the 9/11 
Commission Act (6 U.S.C. 1102) is amended--
          (1) in subsection (c), by inserting ``to the extent 
        practicable, provide training in settings that stimulate real 
        response environments, such as urban areas,'' after 
        ``levels,''.;
          (2) in subsection (d), by amending paragraphs (1) and (2) to 
        read as follows:
          ``(1) for the Center for Domestic Preparedness, $63,939,000 
        for each of fiscal years 2018 and 2019; and
          ``(2) for the remaining Members of the National Domestic 
        Preparedness Consortium, $101,000,000 for each of fiscal years 
        2018 and 2019.''; and
          (3) in subsection (e), in the matter preceding paragraph (1), 
        by striking ``2007'' and inserting ``2017''.

SEC. 616. RURAL DOMESTIC PREPAREDNESS CONSORTIUM.

  (a) In General.--The Secretary of Homeland Security is authorized to 
establish a Rural Domestic Preparedness Consortium within the 
Department of Homeland Security consisting of universities and 
nonprofit organizations qualified to provide training to emergency 
response providers from rural communities.
  (b) Duties.--The Rural Domestic Preparedness Consortium authorized 
under subsection (a) shall identify, develop, test, and deliver 
training to State, local, and tribal emergency response providers from 
rural communities, provide on-site and mobile training, and facilitate 
the delivery of training by the training partners of the Department of 
Homeland Security.
  (c) Authorization of Appropriations.--Of amounts appropriated for 
Continuing Training Grants of the Department of Homeland Security, 
$5,000,000 is authorized to be used for the Rural Domestic Preparedness 
Consortium authorized under subsection (a).

SEC. 617. EMERGENCY SUPPORT FUNCTIONS.

  (a) Update.--Paragraph (13) of section 504(a) of the Homeland 
Security Act of 2002 (6 U.S.C. 314(a)) is amended by inserting ``, 
periodically updating (but not less often than once every five 
years),'' after ``administering''.
  (b) Emergency Support Functions.--Section 653 of the Post-Katrina 
Emergency Management Reform Act of 2006 (6 U.S.C. 753; title VI of the 
Department of Homeland Security Appropriations Act, 2007; Public Law 
109-295) is amended--
          (1) by redesignating subsections (d) and (e) as subsections 
        (e) and (f), respectively; and
          (2) by inserting after subsection (c) the following new 
        subsection:
  ``(d) Coordination.--The President, acting through the Administrator, 
shall develop and provide to Federal departments and agencies with 
coordinating, primary, or supporting responsibilities under the 
National Response Framework performance metrics to ensure readiness to 
execute responsibilities under the emergency support functions of such 
Framework.''.

SEC. 618. REVIEW OF NATIONAL INCIDENT MANAGEMENT SYSTEM.

  Paragraph (2) of section 509(b) of the Homeland Security Act of 2002 
(6 U.S.C. 319(b)) is amended, in the matter preceding subparagraph (A), 
by inserting ``, but not less often than once every five years,'' after 
``periodically''.

SEC. 619. REMEDIAL ACTION MANAGEMENT PROGRAM.

  Section 650 of the Post-Katrina Emergency Management Reform Act of 
2006 (6 U.S.C. 750; title VI of the Department of Homeland Security 
Appropriations Act, 2007; Public Law 109-295) is amended to read as 
follows:

``SEC. 650. REMEDIAL ACTION MANAGEMENT PROGRAM.

  ``(a) In General.--The Administrator, in coordination with the 
National Council on Disability and the National Advisory Council, shall 
establish a remedial action management program to--
          ``(1) analyze training, exercises, and real world events to 
        identify lessons learned, corrective actions, and best 
        practices;
          ``(2) generate and disseminate, as appropriate, the lessons 
        learned, corrective actions, and best practices referred to in 
        paragraph (1); and
          ``(3) conduct remedial action tracking and long term trend 
        analysis.
  ``(b) Federal Corrective Actions.--The Administrator, in coordination 
with the heads of appropriate Federal departments and agencies, shall 
utilize the program established pursuant to subsection (a) to collect 
information on corrective actions identified by such Federal 
departments and agencies during exercises and the response to natural 
disasters, acts of terrorism, and other man-made disasters, and shall, 
not later than one year after the date of the enactment of this section 
and annually thereafter for each of the next four years, submit to 
Congress a report on the status of such corrective actions.
  ``(c) Dissemination of After Action Reports.--The Administrator shall 
provide electronically, to the maximum extent practicable, to Congress 
and Federal, State, local, tribal, and private sector officials after-
action reports and information on lessons learned and best practices 
from responses to acts of terrorism, natural disasters, capstone 
exercises conducted under the national exercise program under section 
648(b), and other emergencies or exercises.''.

SEC. 620. CYBER PREPAREDNESS.

  (a) Information Sharing.--Title II of the Homeland Security Act of 
2002 is amended--
          (1) in section 210A (6 U.S.C. 124h)--
                  (A) in subsection (b)--
                          (i) in paragraph (10), by inserting before 
                        the semicolon at the end the following: ``, 
                        including, in coordination with the national 
                        cybersecurity and communications integration 
                        center under section 227, access to timely 
                        technical assistance, risk management support, 
                        and incident response capabilities with respect 
                        to cyber threat indicators, defensive measures, 
                        cybersecurity risks, and incidents (as such 
                        terms are defined in such section), which may 
                        include attribution, mitigation, and 
                        remediation, and the provision of information 
                        and recommendations on security and resilience, 
                        including implications of cybersecurity risks 
                        to equipment and technology related to the 
                        electoral process'';
                          (ii) in paragraph (11), by striking ``and'' 
                        after the semicolon;
                          (iii) by redesignating paragraph (12) as 
                        paragraph (14); and
                          (iv) by inserting after paragraph (11) the 
                        following new paragraphs:
          ``(12) review information relating to cybersecurity risks 
        that is gathered by State, local, and regional fusion centers, 
        and incorporate such information, as appropriate, into the 
        Department's own information relating to cybersecurity risks;
          ``(13) ensure the dissemination to State, local, and regional 
        fusion centers of the information described in paragraph (12); 
        and'';
                  (B) in subsection (c)(2)--
                          (i) by redesignating subparagraphs (C) 
                        through (G) as subparagraphs (D) through (H), 
                        respectively; and
                          (ii) by inserting after subparagraph (B) the 
                        following new subparagraph:
                  ``(C) The national cybersecurity and communications 
                integration center under section 227.'';
                  (C) in subsection (d)--
                          (i) in paragraph (3), by striking ``and'' 
                        after the semicolon;
                          (ii) by redesignating paragraph (4) as 
                        paragraph (5); and
                          (iii) by inserting after paragraph (3) the 
                        following new paragraph:
          ``(4) assist, in coordination with the national cybersecurity 
        and communications integration center under section 227, fusion 
        centers in using information relating to cybersecurity risks to 
        develop a comprehensive and accurate threat picture; and''; and
                  (D) in subsection (j)--
                          (i) by redesignating paragraphs (1) through 
                        (5) as paragraphs (2) through (6), 
                        respectively; and
                          (ii) by inserting before paragraph (2), as so 
                        redesignated, the following new paragraph:
          ``(1) the term `cybersecurity risk' has the meaning given 
        such term in section 227;''; and
          (2) in section 227 (6 U.S.C. 148)--
                  (A) in subsection (c)--
                          (i) in paragraph (5)(B), by inserting ``, 
                        including State, local, and regional fusion 
                        centers, as appropriate'' before the semicolon 
                        at the end;
                          (ii) in paragraph (7), in the matter 
                        preceding subparagraph (A), by striking 
                        ``information and recommendations'' each place 
                        it appears and inserting ``information, 
                        recommendations, and best practices''; and
                          (iii) in paragraph (9), by inserting ``best 
                        practices,'' after ``defensive measures,''; and
                  (B) in subsection (d)(1)(B)(ii), by inserting ``and 
                State, local, and regional fusion centers, as 
                appropriate'' before the semicolon at the end.
  (b) Sense of Congress.--It is the sense of Congress that to 
facilitate the timely dissemination to appropriate State, local, and 
private sector stakeholders of homeland security information related to 
cyber threats, the Secretary of Homeland Security should, to the 
greatest extent practicable, work to share actionable information in an 
unclassified form related to such threats.

SEC. 621. MAJOR METROPOLITAN AREA COUNTERTERRORISM TRAINING AND 
                    EXERCISE GRANT PROGRAM.

  (a) In General.--Subtitle A of title XX of the Homeland Security Act 
of 2002 (6 U.S.C. 603 et seq.) is amended by adding at the end the 
following new section:

``SEC. 2009. MAJOR METROPOLITAN AREA COUNTERTERRORISM TRAINING AND 
                    EXERCISE GRANT PROGRAM.

  ``(a) Establishment.--
          ``(1) In general.--The Secretary, acting through the 
        Administrator and the heads of other relevant components of the 
        Department, shall carry out a program to make grants to 
        emergency response providers to prevent, prepare for, and 
        respond to emerging terrorist attack scenarios, including 
        complex, coordinated terrorist attacks and active shooters, as 
        determined by the Secretary, against major metropolitan areas.
          ``(2) Information.--In establishing the program pursuant to 
        paragraph (1), the Secretary shall provide to eligible 
        applicants--
                  ``(A) information, in an unclassified format, on 
                emerging terrorist attack scenarios, including complex, 
                coordinated terrorist attacks and active shooters, 
                which grants under such program are intended to 
                address; and
                  ``(B) information on training and exercises best 
                practices.
  ``(b) Eligible Applicants.--
          ``(1) In general.--Jurisdictions that receive, or that 
        previously received, funding under section 2003 may apply for a 
        grant under the program established pursuant to subsection (a).
          ``(2) Additional jurisdictions.--Eligible applicants 
        receiving funding under the program established pursuant to 
        subsection (a) may include in activities funded by such program 
        neighboring jurisdictions that would be likely to provide 
        mutual aid in response to emerging terrorist attack scenarios, 
        including complex, coordinated terrorist attacks and active 
        shooters.
  ``(c) Permitted Uses.--The recipient of a grant under the program 
established pursuant to subsection (a) may use such grant to--
          ``(1) identify capability gaps related to preparing for, 
        preventing, and responding to emerging terrorist attack 
        scenarios, including complex, coordinated terrorist attacks and 
        active shooters;
          ``(2) develop or update plans, annexes, and processes to 
        address any capability gaps identified pursuant to paragraph 
        (1);
          ``(3) conduct training to address such identified capability 
        gaps;
          ``(4) conduct exercises, including at locations such as mass 
        gathering venues, places of worship, or educational 
        institutions, as appropriate, to validate capabilities; and
          ``(5) pay for backfill associated with personnel 
        participating in training and exercises under paragraphs (3) 
        and (4).
  ``(d) Period of Performance.--The Administrator shall make funds 
provided under this section available for use by a recipient of a grant 
for a period of not fewer than 36 months.
  ``(e) Information Sharing.--The Administrator shall, to the extent 
practicable, aggregate, analyze, and share with relevant emergency 
response providers information on best practices and lessons learned 
from--
          ``(1) the planning, training, and exercises conducted using 
        grants authorized under the program established pursuant to 
        subsection (a); and
          ``(2) responses to actual terrorist attacks around the world.
  ``(f) Authorization of Appropriations.--There are authorized to be 
appropriated for grants under this section $39,000,000 for each of 
fiscal years 2018 through 2022.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 2008 the following new item:

``Sec. 2009. Major metropolitan area counterterrorism training and 
exercise grant program.''.

SEC. 622. CENTER FOR DOMESTIC PREPAREDNESS.

  (a) Implementation Plan.--The Administrator of the Federal Emergency 
Management Agency shall develop an implementation plan, including 
benchmarks and milestones, to address the findings and recommendations 
of the 2017 Management Review Team that issued a report on May 8, 2017, 
regarding live agent training at the Chemical, Ordnance, Biological and 
Radiological Training Facility and provide to the Committee on Homeland 
Security and the Committee on Transportation and Infrastructure of the 
House of Representatives and the Committee on Homeland Security and 
Governmental Affairs of the Senate updates and information on efforts 
to implement recommendations related to the management review of the 
Chemical, Ordnance, Biological, and Radiological Training Facility of 
the Center for Domestic Preparedness of the Federal Emergency 
Management Agency, including, as necessary, information on additional 
resources or authority needed to implement such recommendations.
  (b) Comptroller General Review.--Not later than one-year after the 
date of the enactment of this section, the Comptroller General of the 
United States shall review and report to Congress on the status of the 
implementation plan required by subsection (a) and the governance 
structure at the Chemical, Ordnance, Biological and Radiological 
Training Facility of the Center for Domestic Preparedness of the 
Federal Emergency Management Agency.

SEC. 623. OPERATION STONEGARDEN.

  (a) In General.--Subtitle A of title XX of the Homeland Security Act 
of 2002 (6 U.S.C. 601 et seq.), as amended by this Act, is further 
amended by adding at the end the following new section:

``SEC. 2010. OPERATION STONEGARDEN.

  ``(a) Establishment.--There is established in the Department a 
program to be known as `Operation Stonegarden'. Under such program, the 
Secretary, acting through the Administrator, shall make grants to 
eligible law enforcement agencies, through the State Administrative 
Agency, to enhance border security in accordance with this section.
  ``(b) Eligible Recipients.--To be eligible to receive a grant under 
this section, a law enforcement agency shall--
          ``(1) be located in--
                  ``(A) a State bordering either Canada or Mexico; or
                  ``(B) a State or territory with a maritime border; 
                and
          ``(2) be involved in an active, ongoing U.S. Customs and 
        Border Protection operation coordinated through a sector 
        office.
  ``(c) Permitted Uses.--The recipient of a grant under this section 
may use such grant for any of the following:
          ``(1) Equipment, including maintenance and sustainment costs.
          ``(2) Personnel, including overtime and backfill, in support 
        of enhanced border law enforcement activities.
          ``(3) Any activity permitted for Operation Stonegarden under 
        the Department of Homeland Security's Fiscal Year 2016 Homeland 
        Security Grant Program Notice of Funding Opportunity.
          ``(4) Any other appropriate activity, as determined by the 
        Administrator, in consultation with the Commissioner of U.S. 
        Customs and Border Protection.
  ``(d) Period of Performance.--The Secretary shall make funds provided 
under this section available for use by a recipient of a grant for a 
period of not less than 36 months.
  ``(d) Authorization of Appropriations.--There is authorized to be 
appropriated $110,000,000 for each of fiscal years 2018 through 2022 
for grants under this section.
  ``(e) Report.--The Administrator shall annually for each of the 
fiscal years specified in subsection (d) submit to the Committee on 
Homeland Security of the House of Representatives and the Committee on 
Homeland Security and Governmental Affairs of the Senate a report 
containing information on the expenditure of grants made under this 
section by each grant recipient.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002, as amended by this Act, is further 
amended by inserting after the item relating to section 2009 the 
following new item:

``Sec. 2010. Operation Stonegarden.''.

SEC. 624. NON-PROFIT SECURITY GRANT PROGRAM.

  (a) In General.--Subtitle A of title XX of the Homeland Security Act 
of 2002 (6 U.S.C. 601 et seq.), as amended by this Act, is further 
amended by adding at the end the following new section:

``SEC. 2011. NON-PROFIT SECURITY GRANT PROGRAM.

  ``(a) Establishment.--There is established in the Department a 
program to be known as the `Non-Profit Security Grant Program' (in this 
section referred to as the `Program'). Under the Program, the 
Secretary, acting through the Administrator, shall make grants to 
eligible nonprofit organizations described in subsection (b), through 
the State in which such organizations are located, for target hardening 
and other security enhancements to protect against terrorist attacks.
  ``(b) Eligible Recipients.--Eligible nonprofit organizations 
described in this subsection (a) are organizations that are--
          ``(1) described in section 501(c)(3) of the Internal Revenue 
        Code of 1986 and exempt from tax under section 501(a) of such 
        Code; and
          ``(2) determined to be at risk of a terrorist attack by the 
        Administrator.
  ``(c) Permitted Uses.--The recipient of a grant under this section 
may use such grant for any of the following uses:
          ``(1) Target hardening activities, including physical 
        security enhancement equipment and inspection and screening 
        systems.
          ``(2) Fees for security training relating to physical 
        security and cybersecurity, target hardening, terrorism 
        awareness, and employee awareness.
          ``(3) Any other appropriate activity, as determined by the 
        Administrator.
  ``(d) Period of Performance.--The Administrator shall make funds 
provided under this section available for use by a recipient of a grant 
for a period of not less than 36 months.
  ``(e) Report.--The Administrator shall annually for each of fiscal 
years 2018 through 2022 submit to the Committee on Homeland Security of 
the House of Representatives and the Committee on Homeland Security and 
Governmental Affairs of the Senate a report containing information on 
the expenditure by each grant recipient of grant funds made under this 
section.
  ``(f) Authorization of Appropriations.--
          ``(1) In general.--There is authorized to be appropriated 
        $50,000,000 for each of fiscal years 2018 through 2022 to carry 
        out this section.
          ``(2) Specification.--Of the amounts authorized to be 
        appropriated pursuant to paragraph (1)--
                  ``(A) $35,000,000 is authorized for eligible 
                recipients located in jurisdictions that receive 
                funding under section 2003; and
                  ``(B) $15,000,000 is authorized for eligible 
                recipients in jurisdictions not receiving funding under 
                section 2003.''.
  (b) Conforming Amendment.--Subsection (a) of section 2002 of the 
Homeland Security Act of 2002 (6 U.S.C. 603) is amended by striking 
``sections 2003 and 2004'' and inserting ``sections 2003, 2004, and 
2011''.
  (c) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 is amended by inserting after the item 
relating to section 2008 the following new item:

``Sec. 2011. Non-Profit Security Grant Program.''.

SEC. 625. FEMA SENIOR LAW ENFORCEMENT ADVISOR.

  (a) In General.--Title V of the Homeland Security Act of 2002 (6 
U.S.C. 311 et seq.), as amended by this Act, is further amended by 
adding at the end the following new section:

``SEC. 529. SENIOR LAW ENFORCEMENT ADVISOR.

  ``(a) Establishment.--There is established in the Agency a Senior Law 
Enforcement Advisor to serve as a qualified expert to the Administrator 
for the purpose of strengthening the Agency's coordination among State, 
local, and tribal law enforcement.
  ``(b) Qualifications.--The Senior Law Enforcement Advisor shall have 
an appropriate background with experience in law enforcement, 
intelligence, information sharing, and other emergency response 
functions.
  ``(c) Responsibilities.--The Senior Law Enforcement Advisor shall--
          ``(1) coordinate on behalf of the Administrator with the 
        Office for State and Local Law Enforcement under section 2006 
        for the purpose of ensuring State, local, and tribal law 
        enforcement receive consistent and appropriate consideration in 
        policies, guidance, training, and exercises related to 
        preventing, preparing for, protecting against, and responding 
        to natural disasters, acts of terrorism, and other man-made 
        disasters within the United States;
          ``(2) work with the Administrator and the Office for State 
        and Local Law Enforcement under section 2006 to ensure grants 
        to State, local, and tribal government agencies, including 
        programs under sections 2003, 2004, and 2006(a) appropriately 
        focus on terrorism prevention activities; and
          ``(3) serve other appropriate functions as determined by the 
        Administrator.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002, as amended by this Act, is further 
amended by inserting after the item relating to section 528 the 
following new item:

``Sec. 529. Senior Law Enforcement Advisor.''.

SEC. 626. STUDY OF THE USE OF GRANT FUNDS FOR CYBERSECURITY.

  Not later than 120 days after the enactment of this section, the 
Administrator, in consultation with relevant components of the 
Department, shall conduct a study on the use of grant funds awarded 
pursuant to section 2003 and section 2004 of the Homeland Security Act 
of 2002 (6 U.S.C. 604 and 605), including information on the following:
          (1) The amount of grant funds invested or obligated annually 
        during fiscal years 2006 through 2016 to support efforts to 
        prepare for and respond to cybersecurity risks and incidents 
        (as such terms are defined in section 227 of such Act (6 U.S.C. 
        148).
          (2) The degree to which grantees identify cybersecurity as a 
        capability gap in the Threat and Hazard Identification and Risk 
        Assessment carried out pursuant to the amendment made by 
        sections 601 and 602 of this title.
          (3) Obstacles and challenges related to using grant funds to 
        improve cybersecurity.
          (4) Plans for future efforts to encourage grantees to use 
        grant funds to improve cybersecurity capabilities.

SEC. 627. TECHNICAL EXPERT AUTHORIZED.

  Paragraph (2) of section 503(b) of the Homeland Security Act of 2002 
(6 U.S.C. 313(b)) is amended--
          (1) in subparagraph (G), by striking ``and'' at the end;
          (2) in subparagraph (H), by striking the period at the end 
        and inserting ``; and''; and
          (3) by adding at the end the following new subparagraph:
                  ``(I) identify and integrate the needs of children 
                into activities to prepare for, protect against, 
                respond to, recover from, and mitigate against natural 
                disasters, acts of terrorism, and other man-made 
                disasters, including catastrophic incidents, including 
                by appointing a technical expert, who may consult with 
                relevant outside organizations and experts, as 
                necessary, to coordinate such activities, as 
                necessary.''.

                       Subtitle B--Communications

SEC. 631. OFFICE OF EMERGENCY COMMUNICATIONS.

  The Secretary of Homeland Security may not change the location or 
reporting structure of the Office of Emergency Communications of the 
Department of Homeland Security unless the Secretary receives prior 
authorization from the Committee on Homeland Security of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs of the Senate permitting such change.

SEC. 632. RESPONSIBILITIES OF OFFICE OF EMERGENCY COMMUNICATIONS 
                    DIRECTOR.

  (a) In General.--Subsection (c) of section 1801 of the Homeland 
Security Act of 2002 (6 U.S.C. 571) is amended--
          (1) by striking paragraph (3);
          (2) by redesignating paragraphs (4) through (15) as 
        paragraphs (3) through (14), respectively;
          (3) in paragraph (8), as so redesignated, by striking ``, in 
        cooperation with the National Communications System,'';
          (4) in paragraph (12) by striking ``Assistant Secretary for 
        Grants and Training'' and inserting ``Administrator of the 
        Federal Emergency Management Agency'';
          (5) in paragraph (13), as so redesignated, by striking 
        ``and'' at the end;
          (6) in paragraph (14), as so redesignated, by striking the 
        period at the end and inserting a semicolon; and
          (7) by adding at the end the following new paragraphs:
          ``(15) administer the Government Emergency Telecommunications 
        Service (GETS) and Wireless Priority Service (WPS) programs, or 
        successor programs; and
          ``(16) assess the impact of emerging technologies on 
        interoperable emergency communications.''.
  (b) Performance of Previously Transferred Functions.--Subsection (d) 
of section 1801 of the Homeland Security Act of 2002 is amended by--
          (1) striking paragraph (2); and
          (2) redesignating paragraph (3) as paragraph (2).

SEC. 633. ANNUAL REPORTING ON ACTIVITIES OF THE OFFICE OF EMERGENCY 
                    COMMUNICATIONS.

  Subsection (f) of section 1801 of the Homeland Security Act of 2002 
(6 U.S.C. 571) is amended to read as follows:
  ``(f) Annual Reporting of Office Activities.--The Director of the 
Office of Emergency Communications shall, not later than one year after 
the date of the enactment of this subsection and annually thereafter 
for each of the next four years, report to the Committee on Homeland 
Security and the Committee on Energy and Commerce of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs of the Senate on the activities and programs of the Office, 
including specific information on efforts to carry out paragraphs (4), 
(5), and (6) of subsection (c).''.

SEC. 634. NATIONAL EMERGENCY COMMUNICATIONS PLAN.

  Section 1802 of the Homeland Security Act of 2002 (6 U.S.C. 572) is 
amended--
          (1) in subsection (a), in the matter preceding paragraph 
        (1)--
                  (A) by striking ``, and in cooperation with the 
                Department of National Communications System (as 
                appropriate),''; and
                  (B) by inserting ``, but not less than once every 
                five years,'' after ``periodically''; and
          (2) in subsection (c)--
                  (A) by redesignating paragraphs (3) through (10) as 
                paragraphs (4) through (11), respectively; and
                  (B) by inserting after paragraph (2) the following 
                new paragraph:
          ``(3) consider the impact of emerging technologies on the 
        attainment of interoperable emergency communications;''.

SEC. 635. TECHNICAL EDIT.

  Paragraph (1) of section 1804(b) of the Homeland Security Act of 2002 
(6 U.S.C. 574(b)), in the matter preceding subparagraph (A), by 
striking ``Assistant Secretary for Grants and Planning'' and inserting 
``Administrator of the Federal Emergency Management Agency''.

SEC. 636. PUBLIC SAFETY BROADBAND NETWORK.

  The Undersecretary of the National Protection and Programs 
Directorate of the Department of Homeland Security shall provide to the 
Committee on Homeland Security and the Committee on Energy and Commerce 
of the House of Representatives and the Committee on Homeland Security 
and Governmental Affairs of the Senate information on the Department of 
Homeland Security's responsibilities related to the development of the 
nationwide Public Safety Broadband Network authorized in section 6202 
of the Middle Class Tax Relief and Job Creation Act of 2012 (47 U.S.C. 
1422; Public Law 112-96), including information on efforts by the 
Department to work with the First Responder Network Authority of the 
Department of Commerce to identify and address cyber risks that could 
impact the near term or long term availability and operations of such 
network and recommendations to mitigate such risks.

SEC. 637. COMMUNICATIONS TRAINING.

  The Under Secretary for Management of the Department of Homeland 
Security, in coordination with the appropriate component heads, shall 
develop a mechanism, consistent with the strategy required pursuant to 
section 4 of the Department of Homeland Security Interoperable 
Communications Act (Public Law 114-29; 6 U.S.C. 194 note), to verify 
that radio users within the Department receive initial and ongoing 
training on the use of the radio systems of such components, including 
interagency radio use protocols.

                    Subtitle C--Medical Preparedness

SEC. 641. CHIEF MEDICAL OFFICER.

  Section 516 of the Homeland Security Act of 2002 (6 U.S.C. 321e) is 
amended--
          (1) in subsection (c)--
                  (A) in the matter preceding paragraph (1), by 
                inserting ``and shall establish medical and human, 
                animal, and occupational health exposure policy, 
                guidance, strategies, and initiatives,'' before 
                ``including--'';
                  (B) in paragraph (1), by inserting before the 
                semicolon at the end the following: ``, including 
                advice on how to prepare for, protect against, respond 
                to, recover from, and mitigate against the medical 
                effects of terrorist attacks or other high consequence 
                events utilizing chemical, biological, radiological, or 
                nuclear agents or explosives'';
                  (C) in paragraph (2), by inserting before the 
                semicolon at the end the following: ``, including 
                coordinating the Department's policy, strategy and 
                preparedness for pandemics and emerging infectious 
                diseases'';
                  (D) in paragraph (5), by inserting ``emergency 
                medical services and medical first responder 
                stakeholders,'' after ``the medical community,'';
                  (E) in paragraph (6), by striking ``and'' at the end;
                  (F) in paragraph (7), by striking the period and 
                inserting a semicolon; and
                  (G) by adding at the end the following new 
                paragraphs:
          ``(8) ensuring that the workforce of the Department has 
        evidence-based policy, standards, requirements, and metrics for 
        occupational health and operational medicine programs;
          ``(9) directing and maintaining a coordinated system for 
        medical support for the Department's operational activities;
          ``(10) providing oversight of the Department's medical 
        programs and providers, including--
                  ``(A) reviewing and maintaining verification of the 
                accreditation of the Department's health provider 
                workforce;
                  ``(B) developing quality assurance and clinical 
                policy, requirements, standards, and metrics for all 
                medical and health activities of the Department;
                  ``(C) providing oversight of medical records systems 
                for employees and individuals in the Department's care 
                and custody; and
                  ``(D) providing medical direction for emergency 
                medical services activities of the Department; and
          ``(11) as established under section 530, maintaining a 
        medical countermeasures stockpile and dispensing system, as 
        necessary, to facilitate personnel readiness, and protection 
        for the Department's employees and working animals and 
        individuals in the Department's care and custody in the event 
        of a chemical, biological, radiological, nuclear, or explosives 
        attack, naturally occurring disease outbreak, or pandemic.''; 
        and
          (2) by adding at the end the following new subsection:
  ``(d) Medical Liaisons.--The Chief Medical Officer may provide 
medical liaisons to the components of the Department to provide subject 
matter expertise on medical and public health issues and a direct link 
to the Chief Medical Officer. Such expertise may include the following:
          ``(1) Providing guidance on health and medical aspects of 
        policy, planning, operations, and workforce health protection.
          ``(2) Identifying and resolving component medical issues.
          ``(3) Supporting the development and alignment of medical and 
        health systems.
          ``(4) Identifying common gaps in medical and health 
        standards, policy, and guidance, and enterprise solutions to 
        bridge such gaps.''.

SEC. 642. MEDICAL COUNTERMEASURES PROGRAM.

  (a) In General.--Title V of the Homeland Security Act of 2002 (6 
U.S.C. 311 et seq.), as amended by this Act, is further amended by 
adding at the end the following new section:

``SEC. 530. MEDICAL COUNTERMEASURES.

  ``(a) In General.--The Secretary shall establish a medical 
countermeasures program to facilitate personnel readiness, and 
protection for the Department's employees and working animals and 
individuals in the Department's care and custody, in the event of a 
chemical, biological, radiological, nuclear, or explosives attack, 
naturally occurring disease outbreak, or pandemic, and to support 
Department mission continuity.
  ``(b) Oversight.--The Chief Medical Officer of the Department shall 
provide programmatic oversight of the medical countermeasures program 
established pursuant to subsection (a), and shall--
          ``(1) develop Department-wide standards for medical 
        countermeasure storage, security, dispensing, and 
        documentation;
          ``(2) maintain a stockpile of medical countermeasures, 
        including antibiotics, antivirals, and radiological 
        countermeasures, as appropriate;
          ``(3) preposition appropriate medical countermeasures in 
        strategic locations nationwide, based on threat and employee 
        density, in accordance with applicable Federal statutes and 
        regulations;
          ``(4) provide oversight and guidance on dispensing of 
        stockpiled medical countermeasures;
          ``(5) ensure rapid deployment and dispensing of medical 
        countermeasures in a chemical, biological, radiological, 
        nuclear, or explosives attack, naturally occurring disease 
        outbreak, or pandemic;
          ``(6) provide training to Department employees on medical 
        countermeasure dispensing; and
          ``(7) support dispensing exercises.
  ``(c) Medical Countermeasures Working Group.--The Chief Medical 
Officer shall establish a medical countermeasures working group 
comprised of representatives from appropriate components and offices of 
the Department to ensure that medical countermeasures standards are 
maintained and guidance is consistent.
  ``(d) Medical Countermeasures Management.--Not later than 180 days 
after the date of the enactment of this section, the Chief Medical 
Officer shall develop and submit to the Secretary an integrated 
logistics support plan for medical countermeasures, including--
          ``(1) a methodology for determining the ideal types and 
        quantities of medical countermeasures to stockpile and how 
        frequently such methodology shall be reevaluated;
          ``(2) a replenishment plan; and
          ``(3) inventory tracking, reporting, and reconciliation 
        procedures for existing stockpiles and new medical 
        countermeasure purchases.
  ``(e) Stockpile Elements.--In determining the types and quantities of 
medical countermeasures to stockpile under subsection (d), the Chief 
Medical Officer shall utilize, if available--
          ``(1) Department chemical, biological, radiological, and 
        nuclear risk assessments; and
          ``(2) Centers for Disease Control and Prevention guidance on 
        medical countermeasures.
  ``(f) Report.--Not later than 180 days after the date of the 
enactment of this section, the Chief Medical Officer shall report to 
the Committee on Homeland Security of the House of Representatives and 
the Committee on Homeland Security and Governmental Affairs of the 
Senate on progress in achieving the requirements of this section.''.
  (b) Clerical Amendment.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002, as amended by this Act, is further 
amended by inserting after the item relating to section 529 the 
following new item:

``Sec. 530. Medical countermeasures.''.

                         Subtitle D--Management

SEC. 651. MISSION SUPPORT.

  (a) Establishment.--The Administrator of the Federal Emergency 
Management Agency shall designate an individual to serve as the chief 
management official and principal advisor to the Administrator on 
matters related to the management of the Federal Emergency Management 
Agency, including management integration in support of emergency 
management operations and programs.
  (b) Mission and Responsibilities.--The Administrator of the Federal 
Emergency Management Agency, acting through the official designated 
pursuant to subsection (a), shall be responsible for the management and 
administration of the Federal Emergency Management Agency, including 
with respect to the following:
          (1) Procurement.
          (2) Human resources and personnel.
          (3) Information technology and communications systems.
          (4) Real property investment and planning, facilities, 
        accountable personal property (including fleet and other 
        material resources), records and disclosure, privacy, safety 
        and health, and sustainability and environmental management.
          (5) Security for personnel, information technology and 
        communications systems, facilities, property, equipment, and 
        other material resources.
          (6) Any other management duties that the Administrator may 
        designate.
  (c) Mount Weather Emergency Operations and Associated Facilities.--
Nothing in this section shall be construed as limiting or otherwise 
affecting the role or responsibility of the Assistant Administrator for 
National Continuity Programs with respect to the matters described in 
subsection (b) as such matters relate to the Mount Weather Emergency 
Operations Center and associated facilities. The management and 
administration of the Mount Weather Emergency Operations Center and 
associated facilities remains the responsibility of the Assistant 
Administrator for National Continuity Programs.
  (d) Report.--Not later than 270 days after the date of the enactment 
of this Act, the Administrator of the Federal Emergency Management 
Agency shall submit to the Committee on Homeland Security and the 
Committee on Transportation and Infrastructure of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs of the Senate a report that includes--
          (1) a review of financial, human capital, information 
        technology, real property planning, and acquisition management 
        of headquarters and all regional offices of the Federal 
        Emergency Management Agency; and
          (2) a strategy for capturing financial, human capital, 
        information technology, real property planning, and acquisition 
        data.

SEC. 652. SYSTEMS MODERNIZATION.

  Not later than 180 days after the date of the enactment of this Act, 
the Administrator of the Federal Emergency Management Agency shall 
submit to the Committee on Homeland Security and the Committee on 
Transportation and Infrastructure of the House of Representatives and 
the Committee on Homeland Security and Governmental Affairs of the 
Senate a report on the Federal Emergency Management Agency's efforts to 
modernize its grants and financial information technology systems, 
including the following:
          (1) A summary of all previous efforts to modernize such 
        systems.
          (2) An assessment of long term cost savings and efficiencies 
        gained through such modernization effort.
          (3) A capability needs assessment.
          (4) Estimated quarterly costs.
          (5) Estimated acquisition life cycle dates, including 
        acquisition decision events.

SEC. 653. STRATEGIC HUMAN CAPITAL PLAN.

  Subsection (c) of section 10102 of title 5, United States Code, is 
amended by striking ``2007'' and inserting ``2018''.

SEC. 654. OFFICE OF DISABILITY INTEGRATION AND COORDINATION OF 
                    DEPARTMENT OF HOMELAND SECURITY.

  (a) Office of Disability Integration and Coordination.--
          (1) In general.--Section 513 of the Homeland Security Act of 
        2002 (6 U.S.C. 321b) is amended to read as follows:

``SEC. 513. OFFICE OF DISABILITY INTEGRATION AND COORDINATION.

  ``(a) In General.--There is established within the Federal Emergency 
Management Agency an Office of Disability Integration and Coordination, 
which shall be headed by a Director.
  ``(b) Mission.--The mission of the Office is to ensure that 
individuals with disabilities and other access and functional needs are 
included in emergency management activities throughout the Agency by 
providing guidance, tools, methods, and strategies for the purpose of 
equal physical program and effective communication access.
  ``(c) Responsibilities.--In support of the mission of the Office, the 
Director shall--
          ``(1) provide guidance and coordination on matters related to 
        individuals with disabilities in emergency planning 
        requirements and relief efforts in the event of a natural 
        disaster, act of terrorism, or other man-made disaster;
          ``(2) oversee Office staff and personnel responsible for 
        disability integration in each regional office with respect to 
        carrying out the mission of the Office;
          ``(3) liaise with the staff of the Agency including non-
        permanent employees, organizations representing individuals 
        with disabilities, other agencies of the Federal Government, 
        and State, local, and tribal government authorities regarding 
        the needs of individuals with disabilities in emergency 
        planning requirements and relief efforts in the event of a 
        natural disaster, act of terrorism, or other man-made disaster;
          ``(4) coordinate with the technical expert on the needs of 
        children within the Agency to provide guidance and coordination 
        on matters related to children with disabilities in emergency 
        planning requirements and relief efforts in the event of a 
        natural disaster, act of terrorism, or other man-made disaster;
          ``(5) consult with organizations representing individuals 
        with disabilities about access and functional needs in 
        emergency planning requirements and relief efforts in the event 
        of a natural disaster, act of terrorism, or other man-made 
        disaster;
          ``(6) ensure the coordination and dissemination of best 
        practices and model evacuation plans for individuals with 
        disabilities;
          ``(7) collaborate with Agency leadership responsible for 
        training to ensure that qualified experts develop easily 
        accessible training materials and a curriculum for the training 
        of emergency response providers, State, local, and tribal 
        government officials, and others on the needs of individuals 
        with disabilities;
          ``(8) coordinate with the Emergency Management Institute, 
        Center for Domestic Preparedness, the Center for Homeland 
        Defense and Security, U.S. Fire Administration, National 
        Exercise Program, and National Domestic Preparedness Consortium 
        to ensure that content related to persons with disabilities, 
        access and functional needs, and children are integrated into 
        existing and future emergency management trainings;
          ``(9) promote the accessibility of telephone hotlines and 
        websites regarding emergency preparedness, evacuations, and 
        disaster relief;
          ``(10) work to ensure that video programming distributors, 
        including broadcasters, cable operators, and satellite 
        television services, make emergency information accessible to 
        individuals with hearing and vision disabilities;
          ``(11) ensure the availability of accessible transportation 
        options for individuals with disabilities in the event of an 
        evacuation;
          ``(12) provide guidance and implement policies to ensure that 
        the rights and feedback of individuals with disabilities 
        regarding post-evacuation residency and relocation are 
        respected;
          ``(13) ensure that meeting the needs of individuals with 
        disabilities are included in the components of the national 
        preparedness system established under section 644 of the Post-
        Katrina Emergency Management Reform Act of 2006 (Public Law 
        109-295; 120 Stat. 1425; 6 U.S.C. 744); and
          ``(14) any other duties as assigned by the Administrator.
  ``(d) Director.--After consultation with organizations representing 
individuals with disabilities, the Administrator shall appoint a 
Director. The Director shall report directly to the Administrator, in 
order to ensure that the needs of individuals with disabilities are 
being properly addressed in emergency preparedness and disaster relief.
  ``(e) Organizations Representing Individuals With Disabilities 
Defined.--For purposes of this section, `organizations representing 
individuals with disabilities' shall mean the National Council on 
Disabilities and the Interagency Coordination Council on Preparedness 
and Individuals with Disabilities, among other appropriate disability 
organizations.''.
          (2) Clerical amendment.--The table of contents in section 
        1(b) of such Act is amended by striking the item relating to 
        section 513 and inserting the following new item:

``513. Office of Disability Integration and Coordination.''.

  (b) Reporting.--
          (1) Report to congress.--Not later than 120 days after the 
        date of the enactment of this section, the Administrator shall 
        submit to Congress a report on the funding and staffing needs 
        of the Office of Disability Integration and Coordination under 
        section 513 of the Homeland Security Act of 2002, as amended by 
        subsection (a).
          (2) Comptroller general review.--Not later than 120 days 
        after the date of the submittal of the report under paragraph 
        (1), the Comptroller General of the United States shall review 
        the report to evaluate whether the funding and staffing needs 
        described in the report are sufficient to support the 
        activities of the Office of Disability Integration and 
        Coordination.

                        TITLE VII--OTHER MATTERS

SEC. 701. DECISION REGARDING CERTAIN EXECUTIVE MEMORANDA.

  Not later than 120 days after the date of the enactment of this Act, 
the Secretary of Homeland Security shall review existing Department of 
Homeland Security policy memoranda, including memoranda approved by 
prior Secretaries that remain in effect, to determine whether such 
memoranda should remain in effect and, if so, whether any of such 
memoranda should be modified.

SEC. 702. PERMANENT AUTHORIZATION FOR ASIA-PACIFIC ECONOMIC COOPERATION 
                    BUSINESS TRAVEL CARD PROGRAM.

  Section 2(a) of the Asia-Pacific Economic Cooperation Business Travel 
Cards Act of 2011 (Public Law 112-54; 8 U.S.C. 1185 note) is amended by 
striking ``During the 7-year period ending on September 30, 2018, the 
Secretary'' and inserting ``The Secretary''.

SEC. 703. AUTHORIZATION OF APPROPRIATIONS FOR OFFICE OF INSPECTOR 
                    GENERAL.

  There is authorized to be appropriated for the Office of the 
Inspector General of the Department of Homeland Security $175,000,000 
for each of fiscal years 2018 and 2019.

SEC. 704. CANINE TEAMS.

  The Commissioner of U.S. Customs and Border Protection may request 
additional canine teams when there is a justified and documented 
shortage and such additional canine teams would be effective for drug 
detection at the border.

SEC. 705. TECHNICAL AMENDMENTS TO THE HOMELAND SECURITY ACT OF 2002.

  (a) Title I.--Section 103 of the Homeland Security Act of 2002 (6 
U.S.C. 113), as amended by this Act, is further amended as follows:
          (1) In subsection (a)(1)--
                  (A) in subparagraph (E), by striking ``the Bureau 
                of'' and inserting ``U.S.''; and
                  (B) by adding at the end the following new 
                subparagraph:
                  ``(L) An Administrator of the Transportation Security 
                Administration.''.
          (2) In subsection (d)(5), by striking ``section 708'' and 
        inserting ``section 707''.
  (b) Title II.--Title II of the Homeland Security Act of 2002 (6 
U.S.C. 121 et seq.) is amended as follows:
          (1) In section 202 (6 U.S.C. 122)--
                  (A) in subsection (c), in the matter preceding 
                paragraph (1), by striking ``Director of Central 
                Intelligence'' and inserting ``Director of National 
                Intelligence''; and
                  (B) in subsection (d)(2), by striking ``Director of 
                Central Intelligence'' and inserting ``Director of 
                National Intelligence''.
          (2) In section 210E (6 U.S.C. 124l)--
                  (A) by striking subsection (e); and
                  (B) by redesignating subsection (f) as subsection 
                (e).
          (3) In section 223(1)(B) (6 U.S.C. 143(1)(B)), by striking 
        ``and'' after the semicolon at the end.
          (4) In section 225 (6 U.S.C. 145), by striking subsections 
        (c) and (d).
          (5) In section 228A(c)(1)(C), by striking ``section 707'' and 
        inserting ``section 706''.
  (c) Title III.--Title III of the Homeland Security Act of 2002 (6 
U.S.C. 181 et seq.) is amended as follows:
          (1) In section 302 (6 U.S.C. 182), by striking 
        ``biological,,'' each places it appears and inserting 
        ``biological,''.
          (2) By redesignating the second section 319 (relating to EMP 
        and GMD mitigation research and development) as section 320.
  (d) Title IV.--Title IV of the Homeland Security Act of 2002 (6 
U.S.C. 201 et seq.) is amended as follows:
          (1) By redesignating section 402 (6 U.S.C. 202) as section 
        401.
          (2) In section 401(4), as so redesignated, by striking 
        ``section 428'' and inserting ``section 426''.
          (3) By redesignating section 417 as section 416.
          (4) By redesignating section 427 (6 U.S.C. 235) as section 
        425.
          (5) In section 425, as so redesignated, by striking 
        subsection (c).
          (6) By redesignating section 428 (6 U.S.C. 236) as section 
        426.
          (7) In section 426, as so redesignated, in--
                  (A) in subsection (e), by striking paragraphs (7) and 
                (8);
                  (B) by striking subsections (g) and (h); and
                  (C) by redesignating subsection (i) as subsection 
                (g).
          (8) By redesignating section 429 (6 U.S.C. 237) as section 
        427.
          (9) By redesignating section 430 (6 U.S.C. 238) as section 
        428.
          (10) By striking section 431 (6 U.S.C. 239).
          (11) By redesignating section 432 (6 U.S.C. 240) as section 
        429.
          (12) By redesignating section 433 (6 U.S.C. 241) as section 
        430.
          (13) By amending the subtitle D heading to read as follows: 
        ``U.S. Immigration and Customs Enforcement''.
          (14) In section 442 (6 U.S.C. 252)--
                  (A) in the section heading, by striking ``bureau of 
                border security'' and inserting ``u.s. immigration and 
                customs enforcement'';
                  (B) by striking ``the Bureau of Border Security'' 
                each place it appears and inserting ``U.S. Immigration 
                and Customs Enforcement'';
                  (C) by striking ``Under Secretary for Border and 
                Transportation Security'' each place it appears and 
                inserting ``Secretary'';
                  (D) by striking ``Assistant Secretary'' each place it 
                appears and inserting ``Director'';
                  (E) by striking ``the Bureau of Citizenship and 
                Immigration Services'' both places it appears and 
                inserting ``United States Citizenship and Immigration 
                Services'';
                  (F) in subsection (a)--
                          (i) in the subsection heading, by striking 
                        ``of Bureau'';
                          (ii) in paragraph (1) by striking ``a bureau 
                        to be known as the `Bureau of Border 
                        Security''' and inserting ``U.S. Immigration 
                        and Customs Enforcement''; and
                          (iii) by amending paragraph (5) to read as 
                        follows:
          ``(5) Managerial rotation program.--The Director of U.S. 
        Immigration and Customs Enforcement shall implement a 
        managerial rotation program under which employees of U.S. 
        Immigration and Customs Enforcement holding positions involving 
        supervisory or managerial responsibility and classified, in 
        accordance with chapter 51 of title 5, United States Code, as a 
        GS-14 or above, shall--
                  ``(A) gain experience in all the major functions 
                performed by U.S. Immigration and Customs Enforcement; 
                and
                  ``(B) work in at least one local office of U.S. 
                Immigration and Customs Enforcement.''.
          (15) By striking section 445 (6 U.S.C. 255).
          (16) By striking section 446 (6 U.S.C. 256).
          (17) In the subtitle E heading, by inserting ``United 
        States'' before ``Citizenship and Immigration Services''.
          (18) In section 451 (6 U.S.C. 271)--
                  (A) in the section heading, by striking ``bureau of'' 
                and inserting ``united states'';
                  (B) by striking ``the Bureau of Citizenship and 
                Immigration Services'' each place it appears and 
                inserting ``United States Citizenship and Immigration 
                Services'';
                  (C) by striking ``the Bureau of Border Security'' 
                each place it appears and inserting ``U.S. Immigration 
                and Customs Enforcement'';
                  (D) in subsection (a)--
                          (i) in the subsection heading, by striking 
                        ``of Bureau'';
                          (ii) in paragraph (1), by striking ``a bureau 
                        to be known as the `Bureau of Citizenship and 
                        Immigration Services''' and inserting ``the 
                        United States Citizenship and Immigration 
                        Services''; and
                          (iii) in paragraph (2)(C), by striking 
                        ``Assistant Secretary'' and inserting 
                        ``Director''; and
                          (iv) by amending paragraph (4) to read as 
                        follows:
          ``(4) Managerial rotation program.--The Director of United 
        States Citizenship and Immigration Services shall implement a 
        managerial rotation program under which employees of United 
        States Citizenship and Immigration Services holding positions 
        involving supervisory or managerial responsibility and 
        classified, in accordance with chapter 51 of title 5, United 
        States Code, as a GS-14 or above, shall--
                  ``(A) gain experience in all the major functions 
                performed by United States Citizenship and Immigration 
                Services; and
                  ``(B) work in at least one field office and one 
                service center of United States Citizenship and 
                Immigration Services.''; and
                  (E) in subsection (c)(2), in the matter preceding 
                subparagraph (A), by striking ``Bureau of Citizenship 
                and Immigration Services'' and inserting ``United 
                States Citizenship and Immigration Services''.
          (19) In section 452 (6 U.S.C. 272)--
                  (A) by striking ``the Bureau of'' each place it 
                appears and inserting ``United States''; and
                  (B) in subsection (f), in the subsection heading, by 
                striking ``Bureau of'' and inserting ``United States''.
          (20) In section 453 (6 U.S.C. 273)--
                  (A) by striking ``the Bureau of'' each place it 
                appears and inserting ``United States''; and
                  (B) in subsection (a)(2), by striking ``such bureau'' 
                and inserting ``United States Citizenship and 
                Immigration Services''.
          (21) In section 454 (6 U.S.C. 274)--
                  (A) by striking ``the Bureau of'' each place it 
                appears and inserting ``United States''; and
                  (B) by striking ``pursuant to policies and procedures 
                applicable to employees of the Federal Bureau of 
                Investigation,''.
          (22) By striking section 455 (6 U.S.C. 271 note).
          (23) By striking section 456 (6 U.S.C. 275).
          (24) By striking section 459 (6 U.S.C. 276).
          (25) By striking section 460 (6 U.S.C. 277).
          (26) By striking section 461 (6 U.S.C. 278).
          (27) By redesignating section 462 (6 U.S.C. 279) as section 
        455.
          (28) In section 455, as so redesignated, in subsection 
        (b)(2)(A), in the matter preceding clause (i)--
                  (A) by striking ``the Bureau of Citizenship and 
                Immigration Services'' and inserting ``United States 
                Citizenship and Immigration Services''; and
                  (B) by striking ``Assistant Secretary of the Bureau 
                of Border Security'' and inserting ``Director of U.S. 
                Immigration and Customs Enforcement''.
          (29) In section 471 (6 U.S.C. 291)--
                  (A) by striking the section heading and inserting 
                ``reorganization and prohibition'';
                  (B) by striking subsection (a);
                  (C) by striking ``(b) Prohibition.--'';
                  (D) by striking ``Bureau of Border Security or the 
                Bureau of'' and inserting ``U.S. Immigration and 
                Customs Enforcement and United States''; and
                  (E) by striking ``two bureaus'' each place it appears 
                and inserting ``two components''.
          (30) By striking section 472 (6 U.S.C. 292).
          (31) By striking section 473 (6 U.S.C. 293).
          (32) By striking section 474 (6 U.S.C. 294).
          (33) By redesignating section 476 (6 U.S.C. 296) as section 
        472.
          (34) In section 472, as so redesignated--
                  (A) by striking ``the Bureau of Citizenship and 
                Immigration Services'' each place it appears and 
                inserting ``United States Citizenship and Immigration 
                Services''; and
                  (B) by striking ``the Bureau of Border Security'' 
                each place it appears and inserting ``U.S. Immigration 
                and Customs Enforcement''.
          (35) By striking section 477 (6 U.S.C. 297).
          (36) By redesignating section 478 (6 U.S.C. 298) as section 
        473.
          (37) In section 473, as so redesignated--
                  (A) in the section heading, by inserting ``annual 
                report on'' before ``immigration'';
                  (B) by striking subsection (b); and
                  (C) in subsection (a)--
                          (i) by striking ``Report.--'' and all that 
                        follows through ``One year'' and inserting 
                        ``Report.--One year'';
                          (ii) by redesignating paragraph (2) as 
                        subsection (b) and moving such subsection two 
                        ems to left; and
                          (iii) in subsection (b), as so redesignated--
                                  (I) in the heading, by striking 
                                ``included'' and inserting 
                                ``Included''; and
                                  (II) by redesignating subparagraphs 
                                (A) through (H) as paragraphs (1) 
                                through (8), respectively, and moving 
                                such paragraphs two ems to the left.
  (e) Title V.--Title V of the Homeland Security Act of 2002 (6 U.S.C. 
311 et seq.) is amended as follows:
          (1) In section 501 (6 U.S.C. 311)--
                  (A) in paragraph (8), by striking ``section 
                502(a)(6)'' and inserting ``section 504(a)(6)'';
                  (B) by redesignating paragraphs (9) through (14) as 
                paragraphs (10) through (15), respectively; and
                  (C) by inserting after paragraph (8) the following 
                new paragraph:
          ``(9) the term `Nuclear Incident Response Team' means a 
        resource that includes--
                  ``(A) those entities of the Department of Energy that 
                perform nuclear or radiological emergency support 
                functions (including accident response, search 
                response, advisory, and technical operations 
                functions), radiation exposure functions at the medical 
                assistance facility known as the Radiation Emergency 
                Assistance Center/Training Site (REAC/TS), radiological 
                assistance functions, and related functions; and
                  ``(B) those entities of the Environmental Protection 
                Agency that perform such support functions (including 
                radiological emergency response functions) and related 
                functions.''.
          (2) By striking section 502 (6 U.S.C. 312).
          (3) In section 504(a)(3)(B) (6 U.S.C. 314(a)(3)(B)), by 
        striking ``, the National Disaster Medical System,''.
          (4) In section 506(c) (6 U.S.C. 316(c)), by striking 
        ``section 708'' each place it appears and inserting ``section 
        707''.
          (5) In section 509(c)(2) (6 U.S.C. 319(c)(2)), in the matter 
        preceding subparagraph (A), by striking ``section 708'' and 
        inserting ``section 707''.
          (6) By striking section 524 (6 U.S.C. 321m).
  (f) Title VI.--Section 601 of the Homeland Security Act of 2002 (6 
U.S.C. 331) is amended by striking ``Director of Central Intelligence'' 
each place it appears and inserting ``Director of National 
Intelligence''.
  (g) Title VII.--Title VII of the Homeland Security Act of 2002 (6 
U.S.C. 341 et seq.) is amended as follows:
          (1) By striking section 706 (6 U.S.C. 346).
          (2) By redesignating section 707 (6 U.S.C. 347) as section 
        706.
          (3) By redesignating section 708 as section 707.
          (4) By redesignating section 709 as section 708.
          (5) In section 708, as so redesignated, in subsection (c)(3), 
        by striking ``section 707'' and inserting ``section 706''.
  (h) Title VIII.--Title VIII of the Homeland Security Act of 2002 (6 
U.S.C. 361 et seq.) is amended as follows:
          (1) By redesignating section 812 as section 811.
          (2) In section 811, as so redesignated--
                  (A) by striking subsections (a) and (c); and
                  (B) in subsection (b)--
                          (i) by striking ``(as added by subsection (a) 
                        of this section)'' each place it appears;
                          (ii) by redesignating paragraphs (2) through 
                        (4) as subsections (b) through (d), 
                        respectively, and by moving such subsections, 
                        as so redesignated, two ems to the left;
                          (iii) in paragraph (1), by redesignating 
                        subparagraphs (A) and (B) as paragraphs (1) and 
                        (2), respectively, and by moving such 
                        paragraphs, as so redesignated, two ems to the 
                        left; and
                          (iv) by striking ``(b) Promulgation of 
                        Initial Guidelines.--'' and all that follows 
                        through ``In this subsection'' and inserting 
                        the following:
  ``(a) Definition.--In this section'';
                  (C) in subsection (b), as so redesignated, by 
                striking ``In general'' and inserting ``In General'';
                  (D) in subsection (c), as so redesignated, by 
                striking ``Minimum requirements'' and inserting 
                ``Minimum Requirements''; and
                  (E) in subsection (d), as so redesignated, by 
                striking ``No lapse of authority'' and inserting ``No 
                Lapse of Authority''.
          (3) In section 843(b)(1)(B) (6 U.S.C. 413(b)(1)(B)), by 
        striking ``as determined by'' and all that follows through ``; 
        and'' and inserting ``as determined by the Secretary; and''.
          (4) By striking section 857 (6 U.S.C. 427).
          (5) By redesignating section 858 (6 U.S.C. 428) as section 
        857.
          (6) By striking section 872 (6 U.S.C. 452).
          (7) By striking section 881 (6 U.S.C. 461).
          (8) In section 892 (6 U.S.C. 482)--
                  (A) in subsection (b)(7), by striking ``Director of 
                Central Intelligence'' and inserting ``Director of 
                National Intelligence''; and
                  (B) in subsection (c)(3)(D), by striking ``Director 
                of Central Intelligence'' and inserting ``Director of 
                National Intelligence''.
          (9) By striking section 893 (6 U.S.C. 483).
          (10) By redesignating section 894 (6 U.S.C. 484) as section 
        893.
  (i) Title IX.--Section 903(a) of the Homeland Security Act of 2002 (6 
U.S.C. 493(a)) is amended in the subsection heading by striking 
``Members--'' and inserting ``Members.--''.
  (j) Title X.--Section 1001(c)(1) of the Homeland Security Act of 2002 
(6 U.S.C. 511(c)(1)) is amended by striking ``Director of Central 
Intelligence'' and inserting ``Director of National Intelligence''.
  (k) Title XV.--Title XV of the Homeland Security Act of 2002 (6 
U.S.C. 541 et seq.) is amended as follows:
          (1) By striking section 1502 (6 U.S.C. 542).
          (2) By redesignating section 1503 (6 U.S.C. 543) as section 
        1502.
  (l) Title XVI.--Section 1611(d)(1) of the Homeland Security Act of 
2002 (6 U.S.C. 563(d)(1)) is amended by striking ``section 707'' and 
inserting ``section 706''.
  (m) Title XIX.--Section 1902(b)(3) of the Homeland Security Act of 
2002 (6 U.S.C. 592(b)(3)) is amended--
          (1) in the paragraph heading, by striking ``Hawaiian native-
        serving'' and inserting ``Native hawaiian-serving''; and
          (2) by striking ``Hawaiian native-serving'' and inserting 
        ``Native Hawaiian-serving''.
  (n) Title XX.--Section 2021 of the Homeland Security Act of 2002 (6 
U.S.C. 611) is amended--
          (1) by striking subsection (c); and
          (2) by redesignating subsection (d) as subsection (c).
  (o) Table of Contents.--The table of contents in section 1(b) of the 
Homeland Security Act of 2002 (6 U.S.C. 101 note) is amended as 
follows:
          (1) By striking the items relating to sections 317, 319, 318, 
        and 319 and inserting the following new items:

``Sec. 317. Promoting antiterrorism through international cooperation 
program.
``Sec. 318. Social media working group.
``Sec. 319. Transparency in research and development.
``Sec. 320. EMP and GMD mitigation research and development.''.

          (2) By striking the items relating to sections 401 and 402 
        and inserting the following new item:

``Sec. 401. Border, maritime, and transportation responsibilities.''.

          (3) By striking the item relating to section 417 and 
        inserting the following new item:

``Sec. 416. Allocation of resources by the Secretary.''.

          (4) By striking the items relating to sections 427 through 
        433 and inserting the following new items:

``Sec. 425. Coordination of information and information technology.
``Sec. 426. Visa issuance.
``Sec. 427. Information on visa denials required to be entered into 
electronic data system.
``Sec. 428. Office for Domestic Preparedness.
``Sec. 429. Border Enforcement Security Task Force.
``Sec. 430. Prevention of international child abduction.''.

          (5) By striking the items relating to sections 445 and 446.
          (6) By amending the item relating to subtitle E of title IV 
        to read as follows:

  ``Subtitle E--United States Citizenship and Immigration Services''.

          (7) By amending the item relating to section 451 to read as 
        follows:

``Sec. 451. Establishment of United States Citizenship and Immigration 
Services.''.

          (8) By striking the items relating to sections 455, 456, 459, 
        460, and 461 and inserting before the item relating to section 
        457 the following new item:

``Sec. 455. Children's affairs.''.

          (9) By amending the item relating to section 471 to read as 
        follows:

``Sec. 471. Reorganization and prohibition.''.

          (10) By striking the items relating to sections 472 through 
        478 and inserting the following new items:

``Sec. 472. Separation of funding.
``Sec. 473. Annual report on immigration functions.''.

          (11) By striking the item relating to section 502.
          (12) By striking the item relating to section 524.
          (13) By striking the items relating to sections 706 through 
        709 and inserting the following new items:

``Sec. 706. Quadrennial Homeland Security Review.
``Sec. 707. Joint Task Forces.
``Sec. 708. Office of Strategy, Policy, and Plans.''.

          (14) By striking the items relating to sections 811 and 812 
        and inserting the following new item:

``Sec. 811. Law enforcement powers of Inspector General agents.''.

          (15) By striking the items relating to sections 857 and 858 
        and inserting the following new item:

``Sec. 857. Identification of new entrants into the Federal 
marketplace.''.

          (16) By striking the item relating to section 872.
          (17) By striking the item relating to section 881.
          (18) By striking the items relating to sections 893 and 894 
        and inserting the following new item:

``Sec. 893. Authorization of appropriations.''.

          (19) By striking the items relating to sections 1502 and 1503 
        and inserting the following new item:

``Sec. 1502. Review of congressional committee structures.''.

                          Purpose and Summary

    The purpose of H.R. 2825 is to authorize the activities of 
the Department of Homeland Security (DHS) by asserting 
Congress's Article I authority to legislate and provide 
authority and direction to DHS. It is the proper role of 
Congress to provide proper guidance to ensure that the 
Department's structure and focus are best linked to securing 
the homeland. This bill provides oversight of and direction to 
the Department in numerous areas to ensure that it is 
effectively carrying out the mission of securing the homeland.
    H.R. 2825 aims to create efficiencies and streamline 
programs and offices by clarifying and uniting the offices that 
constitute ``DHS Headquarters.''
    Further, this legislation integrates existing DHS 
intelligence systems and data sets into the data framework; 
creates a FEMA Chief Management Official to achieve further 
efficiencies and accountability modernizing internal functions; 
strengthens the role of the Under Secretary for Management to 
implement efficiencies across components to better ensure 
proper oversight and accountability; and requires DHS to review 
the organization of its offices with research and development 
and chemical, biological, radiological, nuclear and explosives 
activities to ensure an efficient and streamlined 
organizational structure that eliminates duplication.
    This legislation protects taxpayer dollars and holds DHS 
accountable by directing the Department to develop a multi-year 
acquisition strategy resulting in major acquisitions programs 
be subject to greater Departmental oversight throughout the 
acquisition process to ensure they meet key cost, schedule and 
performance requirements.
    Further, H.R. 2825 mandates DHS to find cost savings 
through real property consolidation and other common sense 
efforts, strengthens the role of the Chief Information Officer 
to forge stronger information technology collaboration to save 
taxpayer dollars; empowers the Chief Financial Officer to 
continue progress made on the Department's financial statement 
audits and improve internal controls to better safeguard 
against waste, fraud, and abuse; and ensures terrorism grant 
funds are used efficiently to close identified capability gaps 
while mandating a transparent system that measures the return 
on these investments.
    Finally, H.R. 2825 support America's front-line defenders 
and first responders and improves the security of our Nation.
    The legislation provides resources, including training and 
equipment, to first responders to counter existing and evolving 
terrorist threats; improves agency morale by implementing 
workforce planning efforts; eliminates unnecessary and 
duplicative human capital policies; better addresses employee 
misconduct; maintains support for State and local law 
enforcement presence at airports; ensures the FEMA 
Administrator has the benefit of expert law enforcement advice; 
and allows DHS to better focus on recruiting, retraining, and 
training a qualified workforce.
    The legislation makes important enhancements to information 
sharing efforts within DHS and between the Department and 
State, local, Tribal and territorial partners. It provides 
resources to secure passenger surface transportation and 
improve security at our Nation's ports; directs the Department 
to share with State, local and regional fusion centers release 
information of certain individuals convicted of terrorism; 
improves airport access controls, employee vetting, perimeter 
security, and insider threat mitigation efforts; and expands 
the use of explosive-detecting K-9 teams.

                  Background and Need for Legislation

    In the aftermath of the September 11th terrorist attacks on 
our Nation, President Bush and Congress examined ways to 
improve our national security. This led to the creation of the 
Department of Homeland Security through the passage of the 
Homeland Security Act of 2002 (Pub. L. 107-296). Since this 
original authorization 15 years ago, DHS has never been 
reauthorized. It has received guidance from annual 
appropriations legislation, but it has not received the 
thorough guidance that comes from a comprehensive authorization 
of its activities.
    One of the most important responsibilities of Congress is 
to assert its Article I authority and pass authorizing 
legislation that provides direction to key offices and missions 
of Federal agencies.
    The United States faces dynamic national security 
challenges brought forth by terrorists, human traffickers, drug 
smugglers, and state and non-state actors waging a silent war 
in cyberspace. America's enemies are agile and are constantly 
looking for ways to inflict damage. Our government and our 
nation must stay ahead of these ever-evolving threats by 
reforming and improving the Department of Homeland Security 
through a first ever reauthorization.

                                Hearings

    No hearings were held on H.R. 2825 in the 115th Congress. 
However, the Committee held the following oversight hearings 
which informed the legislation:

115th Congress

    The Committee held a hearing on June 7, 2017, entitled 
``Department of Homeland Security Reauthorization and the 
President's FY 2018 Budget Request.'' The Committee received 
testimony by Hon. John F. Kelly, Secretary, U.S. Department of 
Homeland Security.
    On February 28, 2017, the Subcommittee on Emergency 
Preparedness, Response, and Communications held a hearing 
entitled ``The Future of FEMA: Recommendations of Former 
Administrators.'' The Subcommittee received testimony from Hon. 
W. Craig Fugate, Former Administrator, Federal Emergency 
Management Agency, U.S. Department of Homeland Security; and 
Hon. R. David Paulison, Former Administrator, Federal Emergency 
Management Agency, U.S. Department of Homeland Security.
    On February 16, 2017, the Subcommittee on Oversight and 
Management Efficiency held a hearing entitled ``Watchdog 
Recommendations: A Better Way Ahead to Manage the Department of 
Homeland Security.'' The Subcommittee received testimony from 
Hon. John Roth, Inspector General, U.S. Department of Homeland 
Security; and Ms. Rebecca Gambler, Director, Homeland Security 
and Justice Issues, U.S. Government Accountability Office.
    On February 14, 2017, the Subcommittee on Emergency 
Preparedness, Response, and Communications held a hearing 
entitled ``The Future of the FEMA: Stakeholder Recommendations 
for the Next Administrator.'' The Subcommittee received 
testimony from Captain Chris A. Kelenske, Deputy State 
Director/Commander, Emergency Management and Homeland Security, 
Michigan State Police, testifying on behalf of the National 
Governors Association; Chief John Sinclair, Fire Chief, 
Kittitas Valley Fire and Rescue (WA), testifying on behalf of 
the International Association of Fire Chiefs; and Richard F. 
Bland, J.D., M.T.S. National Director, Policy, Advocacy and 
Development, Save the Children.
    On February 2, 2017, the Subcommittee on Transportation and 
Protective Security held a hearing entitled ``The Future of the 
Transportation Security Administration.'' The Subcommittee 
received testimony from Mr. Roger Dow, CEO, U.S. Travel 
Association; Ms. Nina E. Brooks, Head of Security, Airports 
Council International; and Mr. J. David Cox, National 
President, American Federation of Government Employees.

114th Congress

    On September 8, 2016, the Subcommittee on Counterterrorism 
and Intelligence held a hearing entitled ``State and Local 
Perspectives on Federal Information Sharing.'' The Subcommittee 
received testimony from Chief Richard Beary, Immediate Past 
President, International Association of Chiefs of Police; Mr. 
Mike Sena, President, National Fusion Center Association; and 
Dr. Cedric Alexander, National President, National Organization 
of Black Law Enforcement Executives (NOBLE).
    On July 13, 2016, the Subcommittee on Counterterrorism and 
Intelligence held a hearing entitled ``Counterintelligence and 
Insider Threats: How Prepared is the Department of Homeland 
Security?'' The Subcommittee received testimony from Hon. 
Francis X. Taylor, Under Secretary, Office of Intelligence and 
Analysis, U.S. Department of Homeland Security; Col. Richard D. 
McComb, Chief Security Officer, U.S. Department of Homeland 
Security; and Rdml. Robert Hayes, Assistant Commandant for 
Intelligence, U.S. Coast Guard, U.S. Department of Homeland 
Security.
    On July 7, 2016, the Subcommittee on Coast Guard and 
Maritime Transportation of the Committee on Transportation and 
Infrastructure and the Subcommittee on Border and Maritime 
Security held a joint hearing entitled ``An Examination of the 
Maritime Nuclear Smuggling Threat.'' The Subcommittees received 
testimony from Rear Admiral Linda L. Fagan, Deputy Commandant 
for Operations, Policy, and Capabilities, U.S. Coast Guard, 
U.S. Department of Homeland Security; Dr. Todd C. Owen, 
Assistant Commissioner, Office of Field Operations, U.S. 
Customs and Border Protection, U.S. Department of Homeland 
Security; Dr. Wayne Brasure, Acting Director, Domestic Nuclear 
Detection Office; Ms. Anne Harrington, Deputy Administrator, 
Defense Nuclear Nonproliferation, National Nuclear Security 
Administration; Ms. Jennifer Grover, Director, Homeland 
Security and Justice Issues, U.S. Government Accountability 
Office; Dr. Gregory H. Canavan, Senior Fellow, Los Alamos 
National Laboratories; Mr. David A. Espie, Director of 
Security, Maryland Port Administration, Port of Baltimore; and 
Mr. James H.I. Weakley, President, Lake Carriers' Association.
    On June 21, 2016, the Subcommitteeon Emergency 
Preparedness, Response, and Communications held a field hearing 
in Jersey City, New Jersey entitled ``Protecting Our 
Passengers: Perspectives on Securing Surface Transportation in 
New Jersey and New York.'' The Subcommittee received testimony 
from Ms. Sonya Proctor, Director, Surface Division, Office of 
Security Policy and Industry Engagement, Transportation 
Security Administration, U.S. Department of Homeland Security; 
Mr. Thomas Belfiore, Chief Security Officer, The Port Authority 
of New York and New Jersey; Mr. Raymond Diaz, Director of 
Security, Metropolitan Transportation Authority (New York); Mr. 
Christopher Trucillo, Chief of Police, New Jersey Transit 
Police Department; Mr. Martin Conway, Deputy Police Chief, 
National Railroad Passenger CorporationAMTRAK; Sergeant W. Greg 
Kierce, Director, Office of Emergency Management and Homeland 
Security, City of Jersey City, New Jersey; Mr. Rick Sposa, 
Operations Coordinator, Emergency Medical Services, Jersey City 
Medical Center; Lieutenant Vincent Glenn, Commander, Emergency 
Services Unit, Police Department, Jersey City, New Jersey; 
Captain Richard D. Gorman, Department of Fire and Emergency 
Services, Office of Emergency Management and Homeland Security, 
Jersey City, New Jersey; and Mr. Mike Mollahan, Trustee, Port 
Authority Police Benevolent Association.
    On May 24, 2016, the Subcommittee on Emergency 
Preparedness, Response, and Communications and the Subcommittee 
on Cybersecurity, Infrastructure Protection, and Security 
Technologies held a joint hearing entitled ``Enhancing 
Preparedness and Response Capabilities to Address Cyber 
Threats.'' The Subcommittees received testimony from Mr. Mark 
Ghilarducci, Director, Emergency Services, Office of the 
Governor, State of California; Lt. Col. Daniel J. Cooney, 
Assistant Deputy Superintendent, Office of Counter Terrorism, 
New York State Police; Brig. Gen. Steven Spano (Ret.--USAF), 
President and Chief Operating Officer, Center for Internet 
Security; Mr. Mark Raymond, Vice President, National 
Association of State Chief Information Officers; and Mr. Robert 
Galvin, Chief Technology Officer, Port Authority of New York 
and New Jersey.
    On March 15, 2016, the Subcommittee held a hearing entitled 
``State of Emergency: The Disaster of Cutting Preparedness 
Grants.'' The Subcommittee received testimony from the Hon. 
Bill de Blasio, Mayor, City of New York, New York; Mr. Jim 
Butterworth, Director, Emergency Management/Homeland Security, 
State of Georgia, testifying on behalf of the National 
Emergency Management Association, Ms. Rhoda Mae Kerr, Fire 
Chief, City of Austin Fire Department, Austin, Texas, 
testifying on behalf of the International Association of Fire 
Chiefs, Mr. George Turner, Chief of Police, Atlanta Police 
Department, Atlanta, Georgia, testifying on behalf of the Major 
Cities Chiefs Association; Mr. Mike Sena, Director, Northern 
California Regional Intelligence Center, testifying on behalf 
of the National Fusion Center Association; and Sergeant W. Greg 
Kierce, Director, Office of Emergency Management and Homeland 
Security, City of Jersey City, New Jersey.
    On March 2, 2016, the Subcommittee on Transportation 
Security held a hearing entitled ``The Transportation Security 
Administration's FY2017 Budget Request.'' The Subcommittee 
received testimony from Hon. Peter V. Neffenger, Administrator, 
Transportation Security Administration, U.S. Department of 
Homeland Security.
    On February 11, 2016, the Subcommittee held a hearing 
entitled, ``Improving the Department of Homeland Security's 
Biological Detection and Surveillance Programs.'' The 
Subcommittee received testimony from Dr. Kathryn Brinsfield, 
Assistant Secretary, Office of Health Affairs, U.S. Department 
of Homeland Security; Dr. Reginald Brothers, Under Secretary 
for Science and Technology, U.S. Department of Homeland 
Security; Mr. Chris P. Currie, Director, Emergency Management, 
National Preparedness, and Critical Infrastructure Protection, 
Homeland Security and Justice Team, U.S. Government 
Accountability Office.
    On December 8, 2015, the Subcommittee on Transportation 
Security held a hearing entitled ``Examining TSA's Global 
Efforts to Protect the Homeland from Aviation Threats and 
Enhance Security at Last Point of Departure Airports.'' The 
Subcommittee received testimony from Mr. Joseph P. Terrell, 
Deputy Assistant Administrator, Office of Global Strategies, 
Transportation Security Administration, U.S. Department of 
Homeland Security.
    On November 3, 2015, the Committee held a hearing entitled 
``Defending Against Bioterrorism: How Vulnerable is America?'' 
The Committee received testimony from Hon. Thomas J. Ridge, Co-
Chair, Blue Ribbon Study Panel on Biodefense; Hon. Joseph I. 
Lieberman, Co-Chair, Blue Ribbon Study Panel on Biodefense; and 
Leonard A. Cole, PhD, Director, Terror Medicine and Security 
Program, Department of Emergency Medicine, Rutgers New Jersey 
Medical School.
    On October 28, 2015, the Subcommittee on Counterterrorism 
and Intelligence held a hearing entitled ``Terror Inmates: 
Countering Violent Extremism in Prison and Beyond.'' The 
Subcommittee received testimony from Mr. Jerome P. Bjelopera, 
Specialist in Organized Crime and Terrorism, Congressional 
Research Service, Library of Congress; Mr. Tony C. Parker, 
Assistant Commissioner, Department of Correction, State of 
Tennessee; and Mr. Brian Levin, Professor, Department of 
Criminal Justice, Director, Center for Study of Hate and 
Extremism, California State University, San Bernardino.
    On October 22, 2015, the Subcommittee held a hearing 
entitled ``Ready and Resilient?: Examining Federal Emergency 
Preparedness and Response Capabilities.'' The Subcommittee 
received testimony from the Hon. W. Craig Fugate, 
Administrator, Federal Emergency Management Agency, U.S. 
Department of Homeland Security; Mr. Bryan Koon, Director, 
Florida Division of Emergency Management, testifying on behalf 
of the National Emergency Management Association; and Mr. Chris 
P. Currie, Director, Emergency Management, National 
Preparedness, and Critical Infrastructure Protection, Homeland 
Security and Justice Team, U.S. Government Accountability 
Office.
    On October 8, 2015, the Subcommittee on Border and Maritime 
Security held a hearing entitled ``Reform and Improvement: 
Assessing the Path Forward for the Transportation Security 
Administration.'' The Subcommittee received testimony from The 
Honorable John Roth, Inspector General, Office of Inspector 
General, U.S. Department of Homeland Security; and The 
Honorable Peter Neffenger, Administrator, Transportation 
Security Administration, U.S. Department of Homeland Security.
    On September 18, 2015, the Subcommittee on Oversight and 
Management Efficiency held a hearing entitled ``Making DHS More 
Efficient: Industry Recommendations to Improve Homeland 
Security.'' The Subcommittee received testimony from Mr. Marc 
A. Pearl, President and Chief Executive Officer, Homeland 
Security and Defense Business Council; Mr. Harry Totonis, Board 
Director, Business Executives for National Security; and Hon. 
Elaine Duke, Principal, Elaine Duke & Associates, LLC.
    On September 17, 2015, the Subcommittee on Transportation 
Security and the Subcommittee on Counterterrorism and 
Intelligence held a joint hearing entitled ``Safeguarding our 
Nation's Surface Transportation Systems Against Evolving 
Terrorist Threats.'' The Subcommittees received testimony from 
Mr. Eddie Mayenschein, Assistant Administrator, Office of 
Security Policy and Industry Engagement, Transportation 
Security Administration, U.S. Department of Homeland Security; 
Ms. Jennifer Grover, Director, Transportation Security and 
Coast Guard Issues, Homeland Security and Justice Team, U.S. 
Government Accountability Office; Mr. Raymond Diaz, Director of 
Security, Metropolitan Transportation Authority (New York); and 
Ms. Polly Hanson, Chief of Police, National Railroad Passenger 
Corporation (Amtrak).
    On July 14, 2015, the Subcommittee on Cybersecurity, 
Infrastructure Protection, and Security Technologies and the 
Subcommittee on Emergency Preparedness, Response, and 
Communications held a joint hearing entitled ``Weapons of Mass 
Destruction: Bolstering DHS to Combat Persistent Threats to 
America.'' The Subcommittees received testimony from Dr. 
Reginald Brothers, Under Secretary for Science and Technology, 
U.S. Department of Homeland Security; Dr. Kathryn Brinsfield, 
Assistant Secretary, Office of Health Affairs, U.S. Department 
of Homeland Security; Dr. Huban Gowadia, Director, Domestic 
Nuclear Detection Office, U.S. Department of Homeland Security; 
Mr. Alan D. Cohn, Counsel, Steptoe & Johnson LLP; Mr. Rick 
``Ozzie'' Nelson, Senior Associate, Homeland Security and 
Counterterrorism Program, Center for Strategic and 
International Studies; and Mr. Warren Stern, Former Director, 
Domestic Nuclear Detection Office, U.S. Department of Homeland 
Security.
    On April 30, 2015, the Subcommittee on Transportation 
Security held a hearing entitled ``A Review of Access Control 
Measures at Our Nation's Airports, Part II.'' The Subcommittee 
received testimony from Mr. Melvin J. Carraway, Acting 
Administrator, Transportation Security Administration, U.S. 
Department of Homeland Security; Jeanne M. Olivier, A.A.E., 
Assistant Director, Aviation Security and Technology, Security 
Operations and Programs Department, The Port Authority of New 
York & New Jersey, testifying on behalf of The American 
Association of Airport Executives; and Mr. Steven Grossman, 
Chief Executive Officer/Executive Director, Jacksonville 
International Airport, Jacksonville Aviation Authority, 
testifying on behalf of The Airports Council International, 
North America.
    On April 22, 2015, the Subcommittee on Oversight and 
Management Efficiency held a hearing entitled ``Acquisition 
Oversight: How Effectively Is DHS Safeguarding Taxpayer 
Dollars?'' The Subcommittee received testimony from Ms. Michele 
Mackin, Director, Acquisition and Sourcing Management, U.S. 
Government Accountability Office; Hon. Chip Fulghum, Chief 
Financial Officer, U.S. Department of Homeland Security; and 
Dr. Cedric Sims, Partner, Evermay Consulting Group.
    On April 22, 2015, the Subcommittee on Emergency 
Preparedness, Response, and Communications held a hearing 
entitled ``Strategic Perspectives on the Bioterrorism Threat.'' 
The Subcommittee received testimony from the Hon. Jim Talent, 
Former Senator from the State of Missouri and Co-Chair, the 
Commission on the Prevention of Weapons of Mass Destruction 
Proliferation and Terrorism; Dr. Charles B. Cairns, Interim 
Dean, Health Sciences Center, University of Arizona College of 
Medicine; and Marisa Raphael, MPH, Deputy Commissioner, Office 
of Emergency Planning and Response, Department of Health and 
Mental Hygiene, New York City, New York.
    On March 18, 2015, the Subcommittee on Emergency 
Preparedness, Response, and Communications held a hearing 
entitled ``Unmanned Aerial System Threats: Exploring Security 
Implications and Mitigation Technologies.'' The Subcommittee 
received testimony from Dr. Todd E. Humphreys, Assistant 
Professor, Cockrell School of Engineering, The University of 
Texas at Austin; Major General Frederick Roggero, (USAF-Ret.), 
President and Chief Executive Officer, Resilient Solutions, 
Ltd.; Chief Richard Beary, President, International Association 
of Chiefs of Police; and Gregory S. McNeal, JD/PhD, Associate 
Professor, School of Law, Pepperdine University.
    On February 26, 2015, the Subcommittee on Counterterrorism 
and Intelligence held a hearing entitled ``Addressing Remaining 
Gaps in Federal, State, and Local Information Sharing.'' The 
Subcommittee received testimony from Mr. Mike Sena, President, 
National Fusion Center Association; Chief Richard Beary, 
President, International Association of Chiefs of Police; and 
Dr. Cedric Alexander, National President, National Organization 
of Black Law Enforcement Executives (NOBLE).
    On February 26, 2015, the Subcommittee on Oversight and 
Management Efficiency held a hearing entitled ``Assessing DHS's 
Performance: Watchdog Recommendations to Improve Homeland 
Security.'' The Subcommittee received testimony from Hon. John 
Roth, Inspector General, U.S. Department of Homeland Security; 
Ms. Rebecca Gambler, Director, Homeland Security and Justice 
Issues, U.S. Government Accountability Office; and Dr. Daniel 
M. Gerstein, Senior Policy Researcher, The RAND Corporation.

113th Congress

    On November 18, 2014, the Subcommittee on Emergency 
Preparedness, Response, and Communications held a hearing 
entitled ``Interoperable Communications: Assessing Progress 
Since 9/11.'' The Subcommittee received testimony from RdAM 
Ronald Hewitt, (USCG Ret.), Director, Office of Emergency 
Communications, U.S. Department of Homeland Security; Mr. TJ 
Kennedy, Acting General Manager, First Responder Network 
Authority; and Mr. Mark A. Grubb, Director, Division of 
Communications, Department of Safety and Homeland Security, 
State of Delaware.
    On October 10, 2014, the Committee held a field hearing in 
Dallas, Texas, entitled ``Ebola in the Homeland: The Importance 
of Effective International, Federal, State and Local 
Coordination.'' The Committee received testimony from Dr. Toby 
Merlin, Director, Division of Preparedness and Emerging 
Infection, National Center for Emerging and Zoonotic Infectious 
Diseases, Center for Disease Control and Prevention; Kathryn 
Brinsfield, MD, MPH, FACEP, Acting Assistant Secretary and 
Chief Medical Officer, Office of Health Affairs, U.S. 
Department of Homeland Security; Mr. John P. Wagner, Acting 
Assistant Commissioner, Office of Field Operations, U.S. 
Customs and Border Protection, U.S. Department of Homeland 
Security; Dr. David L. Lakey, Commissioner of Health, Texas 
Department of State Health Services; Dr. Brett P. Giroir, 
Executive Vice President and CEO, Texas A&M Health Science 
Center, Texas A&M University, Director, Texas Task Force on 
Infectious Disease Preparedness and Response; Hon. Clay Lewis 
Jenkins, Judge, Dallas County, Texas; and Catherine L. Troisi, 
Ph.D., Associate Professor, Division of Management, Policy, and 
Community Health, Center for Infectious Diseases, The 
University of Texas.
    On June 10, 2014, the Subcommittee on Emergency 
Prepardness, Response, and Communications held a hearing 
entitled ``BioWatch: Lessons Learned and the Path Forward.'' 
The Subcommittee received testimony from Dr. Kathryn 
Brinsfield, Acting Assistant Secretary, Office of Health 
Affairs, U.S. Department of Homeland Security; Dr. Reginald 
Brothers, Under Secretary, Science and Technology Directorate, 
U.S. Department of Homeland Security; Mr. Chris Cummiskey, 
Acting Under Secretary, Management Directorate, U.S. Department 
of Homeland Security; Mr. Chris Currie, Acting Director, 
Homeland Security and Justice Issues, U.S. Government 
Accountability Office; and Dr. Deena S. Disraelly, Research 
Staff, Strategy, Forces and Resources Division, Institute for 
Defense Analyses.
    On April 8, 2014, the Subcommittee on Border and Maritime 
Security held a hearing entitled ``Authorizing U.S. Customs and 
Border Protection and U.S. Immigration and Customs 
Enforcement.'' The Subcommittee received testimony from Mr. 
Kevin K. McAleenan, Acting Deputy Commissioner, U.S. Customs 
and Border Protection, U.S. Department of Homeland Security; 
and Mr. Daniel H. Ragsdale, Acting Director, U.S. Immigration 
and Customs Enforcement, U.S. Department of Homeland Security.
    On February 11, 2014, the Subcommittee on Emergency 
Prepardness, Response, and Communications held a hearing 
entitled ``Bioterrorism: Assessing the Threat.'' The 
Subcommittee received testimony from Dr. Robert P. Kadlec, 
Former Special Assistant to the President for Biodefense; Dr. 
Tom Inglesby, CEO and Director, University of Pittsburgh 
Medical Center for Health Security; and Dr. Leonard Cole, 
Director, Terror Medicine and Security, Department of Emergency 
Medicine, Rutgers New Jersey Medical School.

                        Committee Consideration

    The Committee met on June 14, 2017, to consider H.R. 2825, 
and ordered the measure to be reported to the House with a 
favorable recommendation, amended, by voice vote. The Committee 
took the following actions:
    The following amendments were offered:
 An Amendment in the Nature of a Substitute offered by Mr. 
McCaul (#1); was AGREED TO, as amended by voice vote.

 An en bloc amendment to the Amendment in the Nature of a 
Substitute to H.R. 2825 offered by Mr. McCaul (#1A); was AGREED 
TO by voice vote.
     Consisting of the following amendments:

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Perry (en bloc amendment 1):
     Page 16, line 12, strike ``and''.
     Page 16, line 15, strike the first period, the closing quotes, and 
the second period, and insert ``; and''.
     Page 16, beginning line 16, insert the following:
     ``(10) track, approve, oversee, and make public information on 
expenditures by components of the Department for conferences, as 
appropriate, including by requiring each component to-
     ``(A) report to the Inspector General of the Department the 
expenditures by such component for each conference hosted or attended 
by Department employees for which the total expenditures of the 
Department exceed $20,000, within 15 days after the date of the 
conference; and ``(B) with respect to such expenditures, provide to the 
Inspector General-
     ``(i) the information described in subsections (a), (b), and (c) 
of section 739 of title VII of division E of the Consolidated and 
Further Continuing Appropriations Act, 2015 (Public Law 113-235); and 
``(ii) documentation of such expenditures.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Thompson of Mississippi (en bloc amendment 2):
     Page 6, beginning line 7, insert the following : ``Subtitle A-
Headquarters Operations''
     Page 60, beginning line 14, insert a new subtitle entitled 
``Subtitle B-Human Resources''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Fitzpatrick (en bloc amendment 3):
     In section 111, redesignate subsections (a) and (b) as subsections 
(b) and (c).
     In section 111, insert before subsection (b), a new subsection 
entitled ``(a) Sense of Congress.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. Jackson Lee (en bloc amendment 4):
     Page 9, beginning line 24, insert the following:
     ``(H) establish and implement, in consultation with the Office of 
Civil Rights and Civil Liberties, policies which preserve individual 
liberty, fairness, and equality under the law;''.
     Page 29, line 16 insert before the semicolon the following: ``, in 
consultation with the Office for Civil Rights and Civil Liberties''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Richmond (en bloc amendment 5):
     In title I, insert after section 111 a new section (and 
redesignate subsequent sections accordingly) the following ``Sec. 112. 
Office for Civil Rights and Civil Liberties.''
     Page 173, line 22, insert ``OMBUDSMAN,'' before ``AND''.
     Page 173, line 25, insert ``Ombudsman,'' before ``and''.
     Page 174, line 5, insert ``Ombudsman,'' before ``and''.
     Page 174, line 10, strike ``ensuring that the traveling public'' 
and insert ``managing allegations of violations of civil rights and 
civil liberties from the public, carrying out the Administration's 
equal employment opportunity and diversity policies and programs, 
including complaint management and adjudication, and helping to ensure 
that employees and the traveling public''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Payne (en bloc amendment 6):
     At the end of title I, add a new section entitled ``Sec. 118. 
Activities Related to Children.''
     At the end of subtitle A of title VI, add a new section entitled 
``Sec. 623. Technical Expert Authorized.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Payne (en bloc amendment 7):
     Page 58, line 13, after ``Department'' insert ``, including a 
specific description of operational challenges resulting from the 
current organizational structure and a detailed explanation of how the 
proposed organizational structure will address such challenges''.
     Page 58, line 18, strike ``the'' and insert ``any''.
     Page 58, line 22, after ``changes'' insert ``, an explanation of 
why no statutory or organizational changes are necessary, or a request 
for additional time to complete the organizational justification''.
     Page 60, line 8, after ``Department'' insert ``, including a 
specific description of operational challenges resulting from the 
current organizational structure and a detailed explanation of how the 
proposed organizational structure will address such challenges''.
     Page 60, line 9, strike ``the'' and insert ``any''.
     Page 60, line 13, after ``changes'' insert ``, an explanation of 
why no statutory or organizational changes are necessary, or a request 
for additional time to complete the organizational justification.''.
     Page 60, after line 13, a new subsection entitled ``(c) Review 
Required.-''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Watson Coleman (en bloc amendment 8):
     Page 37, line 12, after ``matters'' insert the following: ``, 
including advice with respect to the preparation of the Quadrennial 
Homeland Security Review''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Watson Coleman (en bloc amendment 9):
     Page 60, after line 13, insert a new section entitled ``Sec. __. 
Center for Faith-based Neighborhood Partnerships.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Miss Rice of New York (en bloc amendment 10):
     Add at the end to title I a new section entitled ``Sec. 118. 
Timely Guidance to DHS Personnel Regarding Executive Orders.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Richmond (en bloc amendment 11):
     At the end of title I, add a new section entitled ``Sec. 118. 
Secretaries' Responsibilities Regarding Election Infrastructure.''

 An en bloc amendment to the Amendment in the Nature of a 
Substitute to H.R. 2825 offered by Mr. McCaul (#1B); was AGREED 
TO by voice vote.
     Consisting of the following amendments:

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Duncan (en bloc amendment 1):
     Page 114, line 6, redesignate subsection (b) as subsection (c).
     Page 114, beginning line 6, insert a new subsection entitled ``(b) 
Level 3 Acquisition Programs of Components of the Department.-''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. Jackson Lee (en bloc amendment 2):
     Page 99, line 23, insert ``to keep pace with changes in technology 
that could impact deliverables,'' after ``risks,''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 3):
     After section 222 insert a new section entitled ``Sec. 223. 
Department Leadership Council.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 4):
     Page 65, after line 8, insert the following:
     ``(11) The term `life cycle cost' means the total ownership cost 
of an acquisition, including all relevant costs related to acquiring, 
owning, operating, maintaining, and disposing of the system, project, 
or product over a specified period of time.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 5):
     At the end of subtitle A of title II, add a new section entitled 
``Sec. 215. Acquisition Innovation.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 6):
     Page 68, after line 9, insert the following:
     ``(F) Providing additional scrutiny and oversight for an 
acquisition that is not a major acquisition if-
     ``(i) the acquisition is for a program that is important to 
departmental strategic and performance plans;
     ``(ii) the acquisition is for a program with significant program 
or policy implications; and
     ``(iii) the Secretary determines that such scrutiny and oversight 
for the acquisition is proper and necessary.''.
     Page 68, line 10, strike ``(F)'' and insert ``(G)''.
     Page 68, line 14, strike ``(G)'' and insert ``(H)''.
     Page 68, line 22, strike ``(H)'' and insert ``(I)''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 6):
     Page 69, beginning line 3, insert the following:
     ``(I) Ensuring acquisition decision memoranda adequately document 
decisions made at acquisition decision events, including any 
affirmative determination of contractor responsibility at the down 
selection phase and any other significant procurement decisions related 
to the acquisition at issue.''.

 An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Thompson of Mississippi (#1C); was NOT AGREED TO 
by a recorded vote of 12 yeas and 14 nays (Roll Call Vote No. 
9).
     At the end of subtitle C of title II add a new section entitled 
``Sec. 234. Exercise of Eminent Domain in Major Acquisitions.''.

 An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Watson Coleman (#1D); was NOT AGREED TO by a 
recorded vote of 11 yeas and 15 nays (Roll Call Vote No. 10).
     At the end of subtitle B of title II, add a new section entitled 
``Sec. 226. Acquisition Management Directive.''

 An en bloc amendment to the Amendment in the Nature of a 
Substitute to H.R. 2825 offered by Mr. McCaul (#1E); was AGREED 
TO by voice vote.
     Consisting of the following amendments:

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. King of New York (en bloc amendment 1):
     At the end of subtitle A of title III, add a new section entitled 
``Sec. 308. Border and Gang Threat Assessment.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Thompson of Mississippi (en bloc amendment 2):
     At the end of subtitle A of title III, add a new section entitled 
``Sec. 208. Security Clearance Management and Administration.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Hurd (en bloc amendment 3):
     In section 304(b)(3), insert ``promulgate data standards and'' 
before ``instruct''.
     In section 304(b)(3), insert ``standard'' before ``format''.
     Amend subsection (e) of section 304 ``(e) Deadline for 
Implementation.-''
     In subsection (g) of section 304, strike paragraphs (1) and (2) 
(and redesignate subsequent paragraphs accordingly).

     An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. Jackson Lee (en bloc amendment 4):
     Page 156, line 14, strike `` inserting `; and' '' and insert 
``inserting a semicolon''.
     Page 156, line 16, strike ``paragraph'' and insert ``paragraphs''.
     Page 157, line 14, strike the first period and insert ``; and''.
     Page 157, line 14, strike the closing quotes and the second 
period.
     Page 157, beginning line 15, insert the following:
     ``(H) in coordination with appropriate components and offices of 
the Department and other Federal agencies, develop, maintain, and make 
available information on Federal resources intended to support fusion 
center access to Federal information and resources.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Fitzpatrick (en bloc amendment 5):
     Page 139, beginning line 1, insert the following (and make 
subsequent conforming changes):
     ``(15) promote and facilitate, to the greatest extent practicable, 
nationwide suspicious activity report training of fire, emergency 
medical services, emergency management, and public heath personnel;''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Langevin (en bloc amendment 6):
     Page 142, line 12, insert the following (and redesignate 
subsequent clauses accordingly):
     ``(vii) The national cybersecurity and communications integration 
center under section 227.''.

 An en bloc amendment to the Amendment in the Nature of a 
Substitute to H.R. 2825 offered by Mr. McCaul (#1F); was AGREED 
TO by voice vote.
     Consisting of the following amendments:

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Rutherford (en bloc amendment 1):
     Strike section 405.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 2):
     Redesignate section 410 as section 411.
     After 409 insert a new section entitled ``Sec. 410. Maritime 
Security Capabilities Assessments.''.

 An en bloc amendment to the Amendment in the Nature of a 
Substitute to H.R. 2825 offered by Mr. McCaul (#1G); was AGREED 
TO by voice vote.
     Consisting of the following amendments:

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Rogers of Alabama (en bloc amendment 1):
     In section 521, add at the end a new subsection entitled ``(d) 
Briefing to Congress.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Thompson of Mississippi (en bloc amendment 2):
     Amend paragraph (3) of section 584 (f) to read as follows:
     (3) Rule of Construction.-Nothing in this section may be construed 
to-
      (A) replace or affect in any way the use of 9-1-1 services in an 
emergency; or
      (B) replace or affect in any way the security training program 
requirements specified in section 1408, 1517, and 1534 of the 
Implementing Recommendations of the 9/11 Commission Act of 2007 (6 
U.S.C. 1137, 1167, and 1184; Public Law 110-53).

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Katko (en bloc amendment 3):
     In subtitle C of title V, add at the end a new section entitled 
``Sec. 533. Prohibition of Advance Notice of Covert Testing to Security 
Screeners.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Katko (en bloc amendment 4):
     Page 173, line 22, insert ``OMBUDSMAN,'' before ``AND''.
     Page 173, line 25, insert ``Ombudsman,'' before ``and''.
     Page 174, line 5, insert ``Ombudsman,'' before ``and''.
     Page 174, line 9, strike ``(2)'' and insert ``(3)''.
     Page 174, line 10, strike ``the traveling public is'' and insert 
``Transportation Security Administration employees and the traveling 
public are''.
     Amend subsection (pp) of section 502 to read as follows:
     (pp) SECTION 45107.-Section 45107 of title 49, United States Code, 
is amended-
      (1) in subsection (a), by striking ``Under Secretary of 
Transportation for Security'' and inserting ``Administrator of the 
Transportation Security Administration''; and
      (2) in subsection (b), by striking the second sentence.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Watson Coleman (en bloc amendment 5):
     At the end of subtitle B of title V, add a new section entitled 
``Sec. 529. Innovation Task Force.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Watson Coleman (en bloc amendment 6):
     At the end of title V add a new subtitle entitled ``Subtitle H-
Security Enhancements in Public Areas of Transportation Facilities''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Donovan (en bloc amendment 7):
     At the end of subtitle B of title V, add a new section entitled 
``Sec. 529. Airport Law Enforcement Reimbursement.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Miss Rice of New York (en bloc amendment 8):
     At the end of title V, insert a new subtitle entitled ``Subtitle 
H-Strategic 5-year Technology Investment Plan of the Transportation 
Security Administration.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Miss Rice of New York (en bloc amendment 9):
     At the end of title V, insert a new subtitle entitled ``Subtitle 
H-Maintenance of Security-Related Technology''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Miss Rice of New York (en bloc amendment 10):
     Page 252, line 18, insert ``for aviation security'' after 
``model''.
     Page 254, line 11, insert ``upon request,'' before ``conduct''.
     Page 254, beginning line 12, strike ``and share the results of 
such assessments with relevant stakeholders''.
     Page 254, after line 14, insert a new paragraph entitled ``(3) TSA 
Database Cyber Assessment.-"
     Page 254, line 15, strike ``(3)'' and insert ``(4)''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Gallagher (en bloc amendment 11):
     At the end of subtitle A of title V, add a new section entitled 
``Sec. 504. Transportation Security Administration Efficiency.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Demings (en bloc amendment 12):
     At the end of subtitle D of title V, add a new section entitled 
``Sec. 543. Exit Lane Security.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Garrett (en bloc amendment 13):
     At the end of subtitle A of title V, add a new section entitled 
``Sec. 505. Transportation Senior Executive Service Accountability.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. Barragan (en bloc amendment 14):
     At the end of subtitle D of title V, add a new section entitled 
``Sec. 543. Reimbursement for Deployment of Armed Law Enforcement 
Personnel at Airports.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Watson Coleman (en bloc amendment 15):
     In section 576, redesignate subsections (a) through (c) as 
subsections (d) through (f), respectively.
     In section 576, insert before subsection (d), as so redesignated, 
a new subsection entitled ``(a) In General.''
     In section 576, in subsection (d), as so redesignated, strike ``IN 
GENERAL.-If'' and insert ``STAKEHOLDER NOTIFICATION.-When''.
     In section 576, in subsection (d), as so redesignated, strike 
``Visible Intermodal Prevention and Response (VIPR)'' and insert 
``VIPR''.
     In section 576, in subsection (e), as so redesignated, strike 
``This section'' and insert ``Subsection (d)''.
     In section 576, in subsection (e), as so redesignated, strike 
``subsection (a)'' and insert ``such subsection''.

 An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Thompson of Mississippi (#1H); was NOT AGREED TO 
by a recorded vote of 12 yeas and 14 nays (Roll Call Vote No. 
11).
     At the end of subtitle B of title V, add a new section entitled 
``Sec. 529. Repeal of Requirement Regarding Diversion of Aviation 
Security Fees.''.

 An en bloc amendment to the Amendment in the Nature of a 
Substitute to H.R. 2825 offered by Mr. McCaul (#1I); was AGREED 
TO by voice vote.
     Consisting of the following amendments:

     An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. McSally (en bloc amendment 1):
     At the end of subtitle A of title VI, add a new section entitled 
``Sec. 623. Operation Stonegarden.''
     Page 319, line 14, strike ``for'' and insert ``to make grants 
to''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Thompson of Mississippi (en bloc amendment 2):
     Page 322, line 10, before ``The'' insert ``(a) Implementation 
Plan.-''.
     Page 322, line 11, after ``shall'' insert ``develop an 
implementation plan, including benchmarks and milestones, to address 
the findings and recommendations of the 2017 Management Review Team 
that issued a report on May 8, 2017 regarding live agent training at 
the Chemical, Ordnance, Biological and Radiological Training Facility 
and''.
     Page 322, after line 22, insert a new subsection entitled ``(b) 
Comptroller General Review.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Thompson of Mississippi (en bloc amendment 3):
     At the end of subtitle A of title VI, add a new section entitled 
``Sec. 623. Non-profit Security Grant Program.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Rutherford (en bloc amendment 4):
     At the end of subtitle A of title VI, add a new section entitled 
``Sec. 623. FEMA Senior Law Enforcement Advisor.''
     Page 329, line 21, strike ``528'' and insert ``529''.
     Page 331, line 1, strike ``528'' and insert ``529''.
     Page 333, after line 22, strike ``528'' with respect to the item 
being added and insert ``529''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. Jackson Lee (en bloc amendment 5):
     Page 306, beginning line 20, insert the following: ``(9) The Chief 
Medical Officer.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. Jackson Lee (en bloc amendment 6):
     Page 311, beginning line 8, insert the following: (1) in 
subsection (c), insert ``to the extent practicable, provide training in 
settings that simulate real response environments, such as urban 
areas,'' after ``levels,''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Garrett (en bloc amendment 9):
     Page 299, line 3, strike ``and''.
     Page 299, line 12, strike the period and insert ``; and''.
     Page 299, beginning line 13, insert the following:
     (3) by adding at the end the following new paragraph:
     ``(4) ANNUAL REPORT.-The Administrator, in coordination with the 
Assistant Secretary for State and Local Law Enforcement, shall report 
annually from fiscal year 2018 through fiscal year 2022 on the use of 
grants under sections 2003 and 2004 for law enforcement terrorism 
prevention activities authorized under this section, including the 
percentage and dollar amount of funds used for such activities and the 
types of projects funded.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Langevin (en bloc amendment 8):
     At the end of subtitle A of title VI (page 322, after line 22), 
insert a new section entitled ``Sec. ------. Study of the Use of Grant 
Funds for Cybersecurity.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Langevin (en bloc amendment 9):
     Page 337, after line 7, insert a new section entitled ``Sec. 654. 
Office of Disability Integration and Co-ordination of Department of 
Homeland Security.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Payne (en bloc amendment 10):
     Page 301, line 19, strike ``and''.
     Page 301, after line 19, insert the following:
     (C) in paragraph (5), by adding at the end the following: ``, 
provided such purchases align with the Statewide Communication 
Interoperability Plan and are coordinated with the Statewide 
Interoperability Coordinator or Statewide interoperability governance 
body of the State of the recipient''; and

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Demings (en bloc amendment 11):
     Page 301, beginning line 11, insert a new subtitle entitled ``(c) 
Comptroller General Review.''.

 An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Payne (#1J); was NOT AGREED TO by a recorded 
vote of 11 yeas and 15 nays (Roll Call Vote No. 12).
     Page 296, line 19, strike ``$800,000,000'' and insert 
``$900,000,000''.
     Page 298, line 7, strike ``$600,000,000'' insert ``$900,000,000''.

 An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Watson Coleman (#1K); was NOT AGREED TO by a 
recorded vote of 11 yeas and 15 nays (Roll Call Vote No. 13).
     Page 310, line 10, strike ``$200,000,000'' and insert 
``$400,000,000''.

 An amendment to the Amendment in the Nature of a Substitute 
offered by Mrs. Demings (#1L); was WITHDRAWN by unanimous 
consent.
     Page 322, after line 22, insert a new section entitled ``Sec. 6--
--. Preservation of Urban Area Security Initiative Security Gains.''

 An amendment to the Amendment in the Nature of a Substitute 
offered by Ms. Barragan (#1M); was NOT AGREED TO by a recorded 
vote of 11 yeas and 15 nays (Roll Call Vote No. 14).
     Page 311, line 1, strike ``$200,000,000'' insert ``$400,000,000''.

 An en bloc amendment to the Amendment in the Nature of a 
Substitute to H.R. 2825 offered by Mr. McCaul (#1N); was AGREED 
TO by voice vote.
     Consisting of the following amendments:

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Perry (en bloc amendment 1):
     Page 351, line 11, insert the following (and make necessary 
conforming changes):
      (6) By striking section 872 (6 U.S.C. 452).
     Page 355, line 15, insert the following (and make necessary 
conforming changes):
      (16) By striking the item relating to section 872.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Perry (en bloc amendment 2):
     At the end of the bill, add a new section entitled ``Sec. 702. 
Decision Regarding Certain Executive Memoranda.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Miss Rice of New York (en bloc amendment 3):
     At the end of title VII insert a new section entitled ``Sec. 702. 
Permanent Authorization for Asia-Pacific Economic Cooperation Business 
Travel Card Program.''

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 4):
     Page 356, after line 4, insert a new section entitled ``Sec. 702. 
Authorization of Appropriations for Office of Inspector General.''.

     An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (en bloc amendment 5):
     Add at the end a new section entitled ``Sec. 702. Canine Teams.''

 An amendment to the Amendment in the Nature of a Substitute 
offered by Mr. Correa (#1O); was WITHDRAWN by unanimous 
consent.
     At the end, add a new section entitled `Sec. 702. Conversion of 
Certain User Fee Airports to Ports of Entry.''

                            Committee Votes

    Clause 3(b) of Rule XIII of the Rules of the House of 
Representatives requires the Committee to list the recorded 
votes on the motion to report legislation and amendments 
thereto.
    The Committee on Homeland Security considered H.R. 2825 on 
June 14, 2017, and took the following votes:


ROLL CALL NO. 9
 
 


On agreeing to the amendment to the Amendment in the Nature of a Substitute #1C offered by Mr. Thompson of
 Mississippi.
Not Agreed to: 12 yeas and 14 nays.
 


----------------------------------------------------------------------------------------------------------------
                Representative                  Yea    Nay               Representative              Yea    Nay
----------------------------------------------------------------------------------------------------------------
Mr. McCaul, Chair............................            X   Mr. Thompson of Mississippi, Ranking      X
                                                              Member.
Mr. Smith of Texas...........................                Ms. Jackson Lee......................     X
Mr. King of New York.........................            X   Mr. Langevin.........................     X
Mr. Rogers of Alabama........................            X   Mr. Richmond.........................     X
Mr. Duncan of South Carolina.................                Mr. Keating..........................     X
Mr. Marino...................................                Mr. Payne............................     X
Mr. Barletta.................................            X   Mr. Vela.............................
Mr. Perry....................................            X   Mrs. Watson Coleman..................     X
Mr. Katko....................................            X   Miss Rice of New York................     X
Mr. Hurd.....................................     X          Mr. Correa...........................     X
Ms. McSally..................................            X   Mrs. Demings.........................     X
Mr. Ratcliffe................................            X   Ms. Barragan.........................     X
Mr. Donovan..................................            X
Mr. Gallagher................................            X
Mr. Higgins of Louisiana.....................            X
Mr. Rutherford...............................            X
Mr. Garrett..................................            X
Mr. Fitzpatrick..............................            X
                                                                                                   -------------
                                                             Vote Total:                              12     14
----------------------------------------------------------------------------------------------------------------



ROLL CALL NO. 10
 
 


On agreeing to the amendment to the Amendment in the Nature of a Substitute #1D offered by Mrs. Watson Coleman.
Not Agreed to: 11 yeas and 15 nays.
 


----------------------------------------------------------------------------------------------------------------
                Representative                  Yea    Nay               Representative              Yea    Nay
----------------------------------------------------------------------------------------------------------------
Mr. McCaul, Chair............................            X   Mr. Thompson of Mississippi, Ranking      X
                                                              Member.
Mr. Smith of Texas...........................                Ms. Jackson Lee......................     X
Mr. King of New York.........................            X   Mr. Langevin.........................     X
Mr. Rogers of Alabama........................            X   Mr. Richmond.........................     X
Mr. Duncan of South Carolina.................                Mr. Keating..........................     X
Mr. Marino...................................                Mr. Payne............................     X
Mr. Barletta.................................            X   Mr. Vela.............................
Mr. Perry....................................            X   Mrs. Watson Coleman..................     X
Mr. Katko....................................            X   Miss Rice of New York................     X
Mr. Hurd.....................................            X   Mr. Correa...........................     X
Ms. McSally..................................            X   Mrs. Demings.........................     X
Mr. Ratcliffe................................            X   Ms. Barragan.........................     X
Mr. Donovan..................................            X
Mr. Gallagher................................            X
Mr. Higgins of Louisiana.....................            X
Mr. Rutherford...............................            X
Mr. Garrett..................................            X
Mr. Fitzpatrick..............................            X
                                                                                                   -------------
                                                             Vote Total:                              11     15
----------------------------------------------------------------------------------------------------------------



ROLL CALL NO. 11
 
 


On agreeing to the amendment to the Amendment in the Nature of a Substitute #1H offered by Mr. Thompson of
 Mississippi.
Not Agreed to: 12 yeas and 14 nays.
 


----------------------------------------------------------------------------------------------------------------
                Representative                  Yea    Nay               Representative              Yea    Nay
----------------------------------------------------------------------------------------------------------------
Mr. McCaul, Chair............................            X   Mr. Thompson of Mississippi, Ranking      X
                                                              Member.
Mr. Smith of Texas...........................                Ms. Jackson Lee......................     X
Mr. King of New York.........................            X   Mr. Langevin.........................     X
Mr. Rogers of Alabama........................            X   Mr. Richmond.........................     X
Mr. Duncan of South Carolina.................                Mr. Keating..........................     X
Mr. Marino...................................                Mr. Payne............................     X
Mr. Barletta.................................            X   Mr. Vela.............................
Mr. Perry....................................            X   Mrs. Watson Coleman..................     X
Mr. Katko....................................     X          Miss Rice of New York................     X
Mr. Hurd.....................................            X   Mr. Correa...........................     X
Ms. McSally..................................            X   Mrs. Demings.........................     X
Mr. Ratcliffe................................            X   Ms. Barragan.........................     X
Mr. Donovan..................................            X
Mr. Gallagher................................            X
Mr. Higgins of Louisiana.....................            X
Mr. Rutherford...............................            X
Mr. Garrett..................................            X
Mr. Fitzpatrick..............................            X
                                                                                                   -------------
                                                             Vote Total:                              11     15
----------------------------------------------------------------------------------------------------------------



ROLL CALL NO. 12
 
 


On agreeing to the amendment to the Amendment in the Nature of a Substitute #1J offered by Mr. Payne.
Not Agreed to: 11 yeas and 15 nays.
 


----------------------------------------------------------------------------------------------------------------
                Representative                  Yea    Nay               Representative              Yea    Nay
----------------------------------------------------------------------------------------------------------------
Mr. McCaul, Chair............................            X   Mr. Thompson of Mississippi, Ranking      X
                                                              Member.
Mr. Smith of Texas...........................                Ms. Jackson Lee......................     X
Mr. King of New York.........................            X   Mr. Langevin.........................     X
Mr. Rogers of Alabama........................            X   Mr. Richmond.........................     X
Mr. Duncan of South Carolina.................                Mr. Keating..........................     X
Mr. Marino...................................                Mr. Payne............................     X
Mr. Barletta.................................            X   Mr. Vela.............................
Mr. Perry....................................            X   Mrs. Watson Coleman..................     X
Mr. Katko....................................            X   Miss Rice of New York................     X
Mr. Hurd.....................................            X   Mr. Correa...........................     X
Ms. McSally..................................            X   Mrs. Demings.........................     X
Mr. Ratcliffe................................            X   Ms. Barragan.........................     X
Mr. Donovan..................................            X
Mr. Gallagher................................            X
Mr. Higgins of Louisiana.....................            X
Mr. Rutherford...............................            X
Mr. Garrett..................................            X
Mr. Fitzpatrick..............................            X
                                                                                                   -------------
                                                             Vote Total:                              11     15
----------------------------------------------------------------------------------------------------------------



ROLL CALL NO. 13
 
 


On agreeing to the amendment to the Amendment in the Nature of a Substitute #1K offered by Mrs. Watson Coleman.
Not Agreed to: 11 yeas and 15 nays.
 


----------------------------------------------------------------------------------------------------------------
                Representative                  Yea    Nay               Representative              Yea    Nay
----------------------------------------------------------------------------------------------------------------
Mr. McCaul, Chair............................            X   Mr. Thompson of Mississippi, Ranking      X
                                                              Member.
Mr. Smith of Texas...........................                Ms. Jackson Lee......................     X
Mr. King of New York.........................            X   Mr. Langevin.........................     X
Mr. Rogers of Alabama........................            X   Mr. Richmond.........................     X
Mr. Duncan of South Carolina.................                Mr. Keating..........................     X
Mr. Marino...................................                Mr. Payne............................     X
Mr. Barletta.................................            X   Mr. Vela.............................
Mr. Perry....................................            X   Mrs. Watson Coleman..................     X
Mr. Katko....................................            X   Miss Rice of New York................     X
Mr. Hurd.....................................            X   Mr. Correa...........................     X
Ms. McSally..................................            X   Mrs. Demings.........................     X
Mr. Ratcliffe................................            X   Ms. Barragan.........................     X
Mr. Donovan..................................            X
Mr. Gallagher................................            X
Mr. Higgins of Louisiana.....................            X
Mr. Rutherford...............................            X
Mr. Garrett..................................            X
Mr. Fitzpatrick..............................            X
                                                                                                   -------------
                                                             Vote Total:                              11     15
----------------------------------------------------------------------------------------------------------------



ROLL CALL NO. 14
 
 


On agreeing to the amendment to the Amendment in the Nature of a Substitute #1M offered by Ms. Barragan.
Not Agreed to: 11 yeas and 15 nays.
 


----------------------------------------------------------------------------------------------------------------
                Representative                  Yea    Nay               Representative              Yea    Nay
----------------------------------------------------------------------------------------------------------------
Mr. McCaul, Chair............................            X   Mr. Thompson of Mississippi, Ranking      X
                                                              Member.
Mr. Smith of Texas...........................                Ms. Jackson Lee......................     X
Mr. King of New York.........................            X   Mr. Langevin.........................     X
Mr. Rogers of Alabama........................            X   Mr. Richmond.........................     X
Mr. Duncan of South Carolina.................                Mr. Keating..........................     X
Mr. Marino...................................                Mr. Payne............................     X
Mr. Barletta.................................            X   Mr. Vela.............................
Mr. Perry....................................            X   Mrs. Watson Coleman..................     X
Mr. Katko....................................            X   Miss Rice of New York................     X
Mr. Hurd.....................................            X   Mr. Correa...........................     X
Ms. McSally..................................            X   Mrs. Demings.........................     X
Mr. Ratcliffe................................            X   Ms. Barragan.........................     X
Mr. Donovan..................................            X
Mr. Gallagher................................            X
Mr. Higgins of Louisiana.....................            X
Mr. Rutherford...............................            X
Mr. Garrett..................................            X
Mr. Fitzpatrick..............................            X
                                                                                                   -------------
                                                             Vote Total:                              11     15
----------------------------------------------------------------------------------------------------------------


                      Committee Oversight Findings

    Pursuant to clause 3(c)(1) of Rule XIII of the Rules of the 
House of Representatives, the Committee has held oversight 
hearings and made findings that are reflected in this report.

   New Budget Authority, Entitlement Authority, and Tax Expenditures

    In compliance with clause 3(c)(2) of Rule XIII of the Rules 
of the House of Representatives, the Committee finds that H.R. 
2825, the Department of Homeland Security Authorization Act of 
2017, would result in no new or increased budget authority, 
entitlement authority, or tax expenditures or revenues.

                  Congressional Budget Office Estimate

    Pursuant to clause 3(c)(3) of Rule XIII of the Rules of the 
House of Representatives, a cost estimate provided by the 
Congressional Budget Office pursuant to section 402 of the 
Congressional Budget Act of 1974 was not made available to the 
Committee in time for the filing of this report. The Chairman 
of the Committee shall cause such estimate to be printed in the 
Congressional Record upon its receipt by the Committee.

         Statement of General Performance Goals and Objectives

    Pursuant to clause 3(c)(4) of Rule XIII of the Rules of the 
House of Representatives, H.R. 2825 contains the following 
general performance goals and objectives, including outcome 
related goals and objectives authorized.
    The goals and objective of H.R. 2825 is to provide a 
comprehensive reauthorization of the Department of Homeland 
Security for the first time since its creation. This includes a 
reform and reauthorization of the Department's headquarters, 
acquisitions reform, improvements to the Department's 
information sharing and counterterrorism efforts, important 
maritime security improvements, a complete reauthorization of 
the Transportation Security Administration, comprehensive 
authorization and congressional guidance on DHS grants, and 
technical corrections to the Homeland Security Act of 2002.

                      Duplicative Federal Programs

    Pursuant to clause 3(c) of Rule XIII, the Committee finds 
that H.R. 2825 does not contain any provision that establishes 
or reauthorizes a program known to be duplicative of another 
Federal program.

   Congressional Earmarks, Limited Tax Benefits, and Limited Tariff 
                                Benefits

    In compliance with Rule XXI of the Rules of the House of 
Representatives, this bill, as reported, contains no 
congressional earmarks, limited tax benefits, or limited tariff 
benefits as defined in clause 9(e), 9(f), or 9(g) of the Rule 
XXI.

                       Federal Mandates Statement

    An estimate of Federal mandates prepared by the Director of 
the Congressional Budget Office pursuant to section 423 of the 
Unfunded Mandates Reform Act was not made available to the 
Committee in time for the filing of this report. The Chairman 
of the Committee shall cause such estimate to be printed in the 
Congressional Record upon its receipt by the Committee.

                        Preemption Clarification

    In compliance with section 423 of the Congressional Budget 
Act of 1974, requiring the report of any Committee on a bill or 
joint resolution to include a statement on the extent to which 
the bill or joint resolution is intended to preempt State, 
local, or Tribal law, the Committee finds that H.R. 2825 does 
not preempt any State, local, or Tribal law.

                  Disclosure of Directed Rule Makings

    The Committee estimates that H.R. 2825 would require no 
directed rule makings.

                      Advisory Committee Statement

    No advisory committees within the meaning of section 5(b) 
of the Federal Advisory Committee Act were created by this 
legislation.

                  Applicability to Legislative Branch

    The Committee finds that the legislation does not relate to 
the terms and conditions of employment or access to public 
services or accommodations within the meaning of section 
102(b)(3) of the Congressional Accountability Act.

             Section-by-Section Analysis of the Legislation



             TITLE V-TRANSPORTATION SECURITY ADMINISTRATION


                       Subtitle A-Administration

Sec. 1.   Short title; Table of contents.

    This section provides that this bill may be cited as the 
``Department of Homeland Security Authorization Act of 2017'' 
or the ``DHS Authorization Act of 2017''.
    This section also details the table of contents for the 
bill.

          TITLE I-DEPARTMENT OF HOMELAND SECURITY HEADQUARTERS


                   Subtitle A-Headquarters Operations

Sec. 101.   Homeland security enterprise defined.

    Section 101 amends the Homeland Security Act of 2002 to 
include a definition of ``homeland security enterprise''

Sec. 102.   Functions and components of Headquarters of Department of 
        Homeland Security.

    Section 102 identifies the offices that constitute DHS's 
headquarters and outlines Headquarters' functions, including, 
but not limited to, establishing an overall strategy to 
successfully further the mission of the Department, 
establishing initiatives that improve Department-wide 
operational performance, managing and encouraging shared 
services across Department components, and establishing and 
implementing policies, in consultation with the Office of Civil 
Rights and Civil Liberties, which preserve individual liberty, 
fairness, and equality under the law.

Sec. 103.   Repeal of Director of Shared Services and Office of 
        Counternarcotics Enforcement of Department of Homeland 
        Security.

    Section 103 abolishes the Director of Shared Services 
position as well as the now defunct Office of Counternarcotics 
Enforcement.

Sec. 104.   Responsibilities and functions of Chief Privacy Officer.

    Section 104 amends the Homeland Security Act of 2002 by 
authorizing the Chief Privacy Officer and requiring that 
official to report directly to the Secretary. Section 104 
establishes responsibilities for the Chief Privacy Officer to 
include, among other things, developing privacy-related 
policies and guidance, establishing mechanisms to ensure 
components are in compliance with privacy policies and laws, 
serving as the Department's central office for managing and 
processing Freedom of Information Act (FOIA) requests, and 
preparing an annual report to Congress on the activities of the 
Department that affect privacy during the Fiscal Year covered 
by the report. Section 104 allows the Secretary to reassign the 
functions related to FOIA to another official within the 
Department, if necessary.

Sec. 105.   Responsibilities of Chief Financial Officer.

    Section 105 amends the Homeland Security Act of 2002 by 
including additional responsibilities for the Chief Financial 
Officer (CFO). Specifically, Section 105 requires the CFO to 
oversee the Department's budget formulation and execution, lead 
cost-estimating and performance-based budgeting practices for 
the Department, oversee coordination of the Department's budget 
into strategic planning, develop financial management policy, 
develop financial system modernization guidance, establish 
internal controls over financial reporting systems, lead 
assessments of internal controls, lead financial oversight, 
ensure components identify and report all acquisition program 
costs, oversee budget formulation and execution, and implement 
a common accounting structure by Fiscal Year 2020.
    Additionally, this section requires the Chief Financial 
Officer to oversee, approve, and make public information on 
Department expenditures for conferences, including requiring 
each component to report such expenditures in excess of $20,000 
to the Inspector General of the Department.

Sec. 106.   Chief Information Officer.

    Section 106 amends the Homeland Security Act of 2002 by 
requiring the Chief Information Officer (CIO) to report 
directly to the USM and establishes areas of responsibility 
relating to information technology. The section also requires 
the CIO to develop an information technology strategic plan 
every 5 years. Additionally, the CIO must inventory DHS' 
software licenses within 180 days and every 2 years thereafter 
until 2022 to assess the Department's needs for software 
licenses, examine how to achieve cost savings related to the 
purchase of software licenses, determine whether cloud-based 
services will impact the need for software licenses, and 
establish plans and estimated costs for eliminated unused 
software licenses. Finally, it requires a Comptroller General 
review of these actions by Fiscal Year 2019.

Sec. 107.   Quadrennial Homeland Security review.

    Section 107 amends the Homeland Security Act of 2002 by 
making a few technical changes to DHS' requirements relating to 
the Quadrennial Homeland Security Review (QHSR), such as 
collaboration with the Homeland Security Advisory Committee and 
the use of a risk assessment when evaluating the threats facing 
the homeland. It also requires the Secretary to retain, and 
upon request, provide to Congress certain documentation 
relating to the preparation of the QHSR.

Sec. 108.   Office of Strategy, Policy, and Plans.

    Section 108 States that the Office of Strategy, Policy, and 
Plans shall include the following components: the Office of 
Partnership and Engagement, the Office of International 
Affairs, the Office of Cyber, infrastructure, and Resilience 
Policy, the Office of Strategy, Planning, Analysis, and Risk, 
the Office of Threat Prevention and Security Policy, and the 
Office of Border, Immigration, and Trade Policy. The section 
also lays out various responsibilities and duties of the 
Assistant Secretary for Partnership and Engagement, such as 
leading efforts to incorporate external feedback from 
stakeholders and lays out responsibilities of the Assistant 
Secretary for International Affairs, including coordinating 
international activities within the Department.
    The current Office of International Affairs is abolished, 
with all of its assets and personnel transferred to the like 
office in the Office of Strategy, Policy, and Plans. The 
following offices have their functions, assets, and personnel 
transferred to the Office of Partnership and Engagement: the 
Office for State and Local Law Enforcement, the Office for 
State and Local Law Government Coordination, and the Special 
Assistant to the Secretary authorized by section 102(f) of the 
Homeland Security Act of 2002.
    Section 108 further specifies 13 Assistant Secretary 
positions and States that no other Assistant Secretary position 
may be created or designated by DHS. It also requires DHS to 
conduct a duplication review within 1 year relating to 
components responsible for international affairs.
    Section 108 amends the Homeland Security Act of 2002 by 
authorizing the Secretary to establish the Homeland Security 
Advisory Council to provide advice and recommendations on 
homeland security-related matters, including advice with 
respect to the preparation of the Quadrennial Homeland Security 
Review.

Sec. 109.   Chief Procurement Officer.

    Section 109 amends the Homeland Security Act of 2002 by 
establishing the Chief Procurement Officer (CPO). The CPO is 
required to report directly to the USM and will be a senior 
business advisor of the Department on procurement related 
matters. Section 109 establishes responsibilities for the CPO, 
to include, among other things, issuing procurement policies, 
serving as the primary liaison to industry, and collecting data 
and establishing performance measures on the impact of 
strategic sourcing initiatives on the private sector. Section 
109 includes a clerical amendment to include the CPO in the 
Homeland Security Act's table of contents.

Sec. 110.   Chief Security Officer.

    Section 110 amends the Homeland Security Act of 2002 by 
authorizing the Chief Security Officer and requiring that 
official to report directly to the USM. Section 110 establishes 
responsibilities for the Chief Security Officer to include (1) 
developing DHS's security policies, (2) providing security-
related training, and (3) providing support to components on 
security-related matters.

Sec. 111.   Office of Inspector General.

    Section 111 provides a sense of Congress, with findings, 
that the Inspector General of the Department of Homeland 
Security plays a vital role in fulfilling the Department's 
daily missions.
    Additionally, section 111 requires the heads of offices and 
components of DHS to advise the DHS Inspector General of all 
allegations of misconduct that they receive over which the 
Inspector General has jurisdiction.

Sec. 112.   Office for Civil Rights and Civil Liberties.

    Section 112 lays out the responsibilities for the Office 
for Civil Rights and Civil Liberties, under the direction of 
the Officer for Civil Rights and Civil Liberties, including 
integrating civil rights and civil liberties into activities of 
the Department, investigating public allegations of civil 
rights and civil liberties violations, carrying out the 
Department's equal employment and diversity policies and 
programs, and communicating with individuals and communities 
whose civil rights and civil liberties may be affected by 
Department activities.
    Additionally, this section authorizes to be appropriated 
$22,571,000 for fiscal years 2018 and 2019 to carry out section 
705 of the Homeland Security Act of 2002, as amended.

Sec. 113.   Department of Homeland Security Rotation Program.

    Section 113 enhances the DHS Security Rotation Program to 
require greater focus on departmental integration and unity of 
effort as well as personnel development. It also requires the 
Secretary to disseminate information on the program widely 
throughout the Department and to protect various rights of 
employees participating in the program.
    Subsection (g) of Section 113 requires the Secretary to 
establish the ``Intelligence Rotational Assignment Program'' to 
be administered by the Department's Chief Human Capital 
Officer, in conjunction with the Chief Intelligence Officer. 
The rotation program shall to be open to employees serving in 
existing analyst positions with the Department's Intelligence 
Enterprise (DHS IE), as well as other DHS employees, as 
appropriate. The responsibilities and requirements that apply 
to the DHS Rotation Program shall also apply to the 
Intelligence Rotational Assignment Program.
    The DHS IRAP was created in 2014 to promote a broader 
understanding of the various intelligence missions and 
functions across the DHS IE, to enhance career development of 
DHS intelligence personnel, and promote DHS-wide intelligence 
competencies. Despite its important mission, the Committee 
found that numerous intelligence components were not aware of 
this program's existence and that it was not being coordinated 
with other rotational programs offered by the Department or the 
Intelligence Community.
    A joint Intelligence Community, DHS, and Department of 
Justice OIG review of ``Domestic Sharing of Counterterrorism 
Information,'' published in March 2017, specifically referenced 
the creation of the IRAP as an important step to help unify the 
DHS IE, but noted the lack of incentives to encourage 
participation in this initiative. Section 113 will provide 
certainty in the future of the IRAP, raise much-needed 
awareness of the program, and promote participation by all 
intelligence components.
    Consolidating the IRAP into the Department's Homeland 
Security Rotation Program will ensure coordination with other 
DHS-wide rotation programs and that analyst participation in 
the IRAP will be factored into promotions and other career 
advancement opportunities. This promotes greater consistencies 
in the Department's policies for how to track and capitalize on 
intelligence analyst participation the Department's various 
rotation programs. Section 113 is also intended to encourage 
the Chief Human Capital Officer and Chief Intelligence Officer 
to offer similar incentives and promotional opportunities to 
analysts participating in the IRAP as those afforded to DHS 
personnel who complete a rotation in the Intelligence 
Community's ``Joint Duty Assignment.''

Sec. 114.   Future Years Homeland Security Program.

    Section 114 amends the Homeland Security Act of 2002 by 
requiring DHS to submit to the House and Senate homeland 
security committees a Future Years Homeland Security Program 
report that provides detailed projected cost estimates of 
anticipated programs over 5 fiscal years. Section 114 also 
requires that the Future Years Homeland Security Program 
project acquisition cost and schedule estimates over that same 
5-year period. These reports are to be made available to the 
public, to the extent that they do not contain classified 
information.

Sec. 115.   Field efficiencies plan.

    Section 115 requires DHS to submit a field efficiencies 
plan within 270 days of enactment of the Act, which examines 
DHS' real property portfolio and provides recommendations and a 
cost-benefit analysis for the consolidation of its facilities. 
The Committee does not intend for this provision or any other 
section of the legislation to be construed as providing new 
authorities to the Department of Homeland Security or any of 
its component agencies or programs real property authorities, 
including leases, construction, or other acquisitions, and 
disposals.

Sec. 116.   Submission to Congress of information regarding 
        reprogramming or transfer of Department of Homeland Security 
        resources to respond to operational surges.

    Section 116 requires DHS to provide to Congress every year 
until 2023 information on any circumstances in which the 
Secretary exercised authority to reprogram or transfer funds to 
address unforeseen costs.

Sec. 117.   Report to Congress on cost savings and efficiency.

    Section 117 requires that the Secretary submit to the House 
and Senate homeland security committees reports on: (1) 
components' management and administrative costs; (2) an 
examination of the Department's major physical assets; (3) 
size, experience level, and geographic distribution of 
operational personnel; and (4) recommendations for how to 
address deficiencies, reduce costs, and enhance efficiencies.

Sec. 118.   Research and development and CBRNE organizational review.

    Section 118 requires the Secretary to assess the 
organization and management of DHS' research and development 
(R&D) activities, and then submit a plan to Congress with a 
proposed organization structure, which must also include a 
justification of that plan, including a description of the 
effects on specific directorates and offices, such as the 
Science and Technology Directorate and Domestic Nuclear 
Detection Office, based on any proposed relocation of their 
activities. Section 118 also requires the Secretary to do a 
similar assessment and plan for DHS' chemical, biological, 
radiological, nuclear, and explosives (CBRNE) activities, 
including those of the Office of Health Affairs, Domestic 
Nuclear Detection Office, and Office for Bombing Prevention. 
Additionally, this section requires the Government 
Accountability Office to review and report to Congress on the 
proposed organizational structure no later than 3 months after 
the submission of each plan.
    The Committee believes that R&D and CBRNE activities are 
vital to the homeland security mission, and is committed to 
ensuring that those activities are carried out in the most 
effective, efficient way possible. By having the Secretary 
conduct a thorough review of the Department's R&D and CBRNE 
activities and having GAO review such plans, we can ensure the 
Department is operating efficiently and effectively, and that 
its R&D mission and CBRNE missions are structured in a manner 
that best supports the Department's mission.

Sec. 119.   Activities related to children.

    This section amends the Homeland Security Act of 2002 
requiring the Department of Homeland Security to consider the 
needs of children in homeland security planning. This section 
is similar to H.R. 1372, which passed the House by voice vote 
on April 25, 2017.

                       Subtitle B-Human Resources

Sec. 121.   Chief Human Capital Officer responsibilities.

    Section 121 amends the Homeland Security Act of 2002 to 
improve morale, employee engagement, and communications within 
the Department of Homeland Security work force by conferring 
new responsibilities to the Chief Human Capital Officer and 
allowing for the designation of a Chief Learning and Engagement 
Officer, who will assist with work force planning and employee 
development. Additional responsibilities of the Chief Human 
Capital Officer include carrying out an assessment of the 
learning and developmental needs of employees in supervisory 
and non-supervisory roles across the Department and maintenance 
of a catalogue of available employee development opportunities 
and ensuring that employee discipline and adverse action 
programs comply with all pertinent laws, regulations, guidance, 
and ensure due process for employees.

Sec. 122.   Employee engagement steering committee and action plan.

    Section 122 establishes an employee engagement steering 
committee at the Department of Homeland Security to help 
improve employee morale. The Committee is to be comprised of 
representatives from operational components, headquarters, and 
field personnel that are supervisory and non-supervisory as 
well as labor organizations that represent Department 
employees. The committee is required to (1) identify factors 
that have a negative impact on employee engagement, morale and 
communications within the Department by collecting employee 
feedback; (2) identify, develop and distribute initiatives and 
best practices to improve employee engagement, morale and 
communications within the Department; (3) monitor component 
efforts to address these factors; and (5) advise to the 
Secretary on efforts to improve employee engagement, morale, 
and communications within the Department. It further requires 
the Secretary, acting through the Chief Human Capital Officer, 
to issue an action plan reflecting the input from the employee 
engagement steering committee, as well as require the head of 
each component to then develop and issue a component-specific 
employee engagement plan.
    Additionally, this section shall terminate 5 years after 
the date of enactment of this section.

Sec. 123.   Annual employee award program.

    Section 123 authorizes an annual employee award program at 
the Department of Homeland Security to recognize employees who 
have made significant contributions to the Department's 
mission. An internal review board comprised of Department 
personnel shall submit to the Secretary award recommendations 
regarding specific employees or groups of employees. The 
internal review board shall consult with representatives from 
operational components and headquarters, including supervisory 
and non-supervisory personnel, and employee labor organizations 
that represent Department employees.

Sec. 124.   Independent investigation and implementation plan.

    Section 124 directs the Comptroller General to investigate 
whether discipline and adverse actions are handled in an 
equitable and consistent manner across the Department for 
misconduct by a non-supervisory or supervisory employee.

Sec. 125.   Center for faith-based and neighborhood partnerships.

    This section codifies the Center for Faith-Based and 
Neighborhood Partnerships, which coordinates outreach and 
collaboration efforts between the emergency management 
community and faith-based and community organizations, provides 
guidance to places of worship on how to secure their 
facilities, and engages with local communities on the 
Department's Blue Campaign, among other things.

Sec. 126.   Timely guidance to DHS personnel regarding Executive 
        Orders.

    Section 126 requires, to the maximum extent practicable, 
the Secretary to, in coordination with relevant component 
heads, make every effort to provide to relevant Department 
personnel written guidance regarding how an Executive Order is 
to be implemented, before any Executive Order affecting 
Departmental functions, programs, or operations takes effect.

Sec. 127.   Secretary's responsibilities regarding election 
        infrastructure.

    Section 127 requires the Secretary to continue to 
prioritize the provision of assistance, on a voluntary basis, 
to State and local election officials in recognition of the 
importance of election infrastructure.

TITLE II-DEPARTMENT OF HOMELAND SECURITY ACQUISITION ACCOUNTABILITY AND 
                               EFFICIENCY


Sec. 201.   Definitions.

    Section 201 adds a series of acquisition related 
definitions that will apply to the acquisitions title of the 
Act. These include: acquisition, acquisition decision 
authority, acquisition decision event, acquisition decision 
memorandum, acquisition program, acquisition program baseline, 
best practices, breach, congressional homeland security 
committees, life cycle cost-as currently defined in the Federal 
Acquisition Regulation, and major acquisition program.

                   Subtitle A-Acquisition Authorities

Sec. 211.   Acquisition authorities for Under Secretary for Management 
        of the Department of Homeland Security.

    Section 211 codifies the Under Secretary for Management 
(USM) as the Chief Acquisitions Officer for the Department with 
the authority to approve, pause, modify, or cancel major 
acquisition programs. It also includes a requirement that each 
major acquisition program have documentation showing it has a 
Department-approved Acquisition Program Baseline (APB) and is 
meeting agreed-upon cost, schedule, and performance 
requirements. It also charges the USM with overseeing the 
organizational structure for acquisitions operations throughout 
the Department. The USM is responsible for ensuring acquisition 
decision memoranda (ADM) adequately document decisions made at 
acquisition decision events (ADE) including any affirmative 
determination of contractor responsibility at the down 
selection phase, in addition to any other significant 
procurement decisions related the acquisition at issue. The 
Committee intends for the USM to only include information on 
any affirmative determination of contractor responsibility in 
ADMs at approval points for low rate production for testing 
purposes or for full production and deployment of a system. The 
USM or designee shall determine what actions meet the criteria 
for a ``significant procurement decision.'' This must occur 
before the USM can delegate Acquisition Decision Authority to 
the relevant Component Acquisition Executive. Section 211 
allows for additional scrutiny and oversight for certain non-
major acquisitions.
    Section 211 also requires the USM to cooperate with the 
Under Secretary for Science and Technology (S&T) in 
acquisitions, so that S&T can support current and future 
requirements more effectively. This section also requires that 
the USM ensures component heads comply with Federal law, 
Federal Acquisition Regulation (FAR), and Departmental 
acquisition directives.

Sec. 212.   Acquisition authorities for Chief Financial Officer of the 
        Department of Homeland Security.

    Section 212 requires the Department's Chief Financial 
Officer to oversee acquisition program costs to ensure that 
acquisition programs are affordable over the program's life-
cycle.

Sec. 213.   Acquisition authorities for Chief Information Officer of 
        the Department of Homeland Security.

    Section 213 authorizes the Chief Information Officer (CIO) 
to oversee the management of the Homeland Security Enterprise 
Architecture and to provide recommendations to the Acquisition 
Review Board on IT programs and IT acquisition strategic 
guidance. Section 213 also requires the CIO to ensure, in 
consultation with the USM, that IT acquisition programs comply 
with IT management processes, technical requirements, and 
management directives.

Sec. 214.   Acquisition authorities for Program Accountability and Risk 
        Management.

    Section 214 establishes the Program Accountability and Risk 
Management (PARM) office within the Department to provide 
accountability and consistency to components' major acquisition 
programs, as well as serve as the central oversight function 
for the Department and support the ARB. This section does not 
create a new office within DHS, as PARM is the current entity 
within DHS with these responsibilities.
    Section 214 authorizes the PARM Executive Director to 
oversee PARM's role in monitoring the performance of DHS 
acquisition programs, assisting the USM in managing acquisition 
programs, and developing certification standards in 
consultation with CAEs for all acquisition program managers.
    Section 214 also authorizes PARM to prepare and make 
available to Congress the DHS Comprehensive Acquisition Status 
Report (CASR). This section also requires Components to follow 
Federal law, the Federal Acquisition Regulation (FAR), and DHS 
acquisition management directives, among other things.
    Section 214 further requires DHS components to submit 
certain acquisition documentation as part of the CASR, unless a 
waiver is granted. Any waiver must be submitted to Congress 
along with the grounds on which it was granted.

Sec. 215.   Acquisition innovation.

    Section 215 allows for the USM to designate an individual 
within the Department to manage acquisition innovation efforts; 
test, develop, and distribute acquisition best practices 
throughout the Department; establish performance metrics to 
evaluate the effectiveness of those efforts; and determine 
impacts of acquisition innovation efforts on the private 
sector, including small businesses.
    Section 215 also allows for the USM to obtain feedback from 
the private sector on acquisition innovation efforts and 
incorporate such feedback into future activities. Further, this 
section effectively codifies innovation activities executed by 
the current Chief Procurement Officer of the Department, such 
as the Procurement Innovation Lab. Section 215 also requires 
the Department to provide a report to the House and Senate 
homeland security committees each year on acquisition 
innovation activities executed in the prior year. This will 
assist Congress in determining whether the Department is 
effectively executing its acquisition innovation efforts. The 
report must include information on (1) tested acquisition best 
practices, (2) efforts to distribute related best practices 
within the Department, (3) utilization of best practices by 
components, (4) results of performance metrics, (5) outcomes of 
efforts to distribute best practices throughout the Department, 
(6) any impacts of acquisition innovation activities on the 
private sector and small businesses, (7) the criteria used to 
identify specific acquisition programs or activities to be 
included in efforts and their associated outcomes, and (8) any 
recommendations that could improve acquisition practices in the 
Department.
    The private sector is a vital element of the homeland 
security enterprise and it is essential that the Department 
proactively engage with industry partners, particularly as the 
Department's acquisition innovation efforts directly impact 
them. As a result, it is vital that DHS reach out to industry 
to identify areas for improvement as it relates to acquisition 
innovation efforts and incorporate its feedback as necessary. 
The Committee strongly believes that DHS should engage with the 
private sector, and in particular small businesses, when 
attempting to improve the very acquisition and procurement 
processes in which the Department seeks their participation.

          Subtitle B-Acquisition Program Management Discipline

Sec. 221.   Acquisition Review Board.

    Section 221 codifies the Acquisition Review Board and 
requires the board to review, on a regular basis, foundational 
acquisition documents of each major acquisition program, 
including the Acquisition Program Baseline (APB), which contain 
cost, schedule, and performance requirements. It does not 
create a new board within DHS because the ARB already exists. 
The board must meet at any time a major acquisition program 
requires authorization to proceed from one decision event to 
another, is in breach of its approved requirements, or requires 
additional review under determined by the Under Secretary for 
Management.
    Section 221 includes provisions to strengthen 
accountability and uniformity within the DHS acquisition review 
process. Section 221 seeks to prevent delays in the acquisition 
process by requiring the ARB to meet regularly to ensure all 
major acquisition programs proceed through the acquisition 
process in a timely manner.
    Section 221 authorizes the ARB to conduct systematic 
reviews of acquisitions and consider tradeoffs among cost, 
schedule, and performance objectives as part of the process for 
developing requirements, among other things.
    If the USM approves a major acquisition program to proceed 
without an APB, Section 221 requires a report to Congress with 
the justification for the decision. To ensure component buy-in, 
this section also requires that at least two component heads or 
their designees permanently serve on the ARB.

Sec. 222.   Requirements to reduce duplication in acquisition programs.

    Section 222 requires DHS to establish policies to reduce 
unnecessary duplication and inefficiency for all DHS 
investments, including major acquisition programs. In 
fulfilling this requirement, the Deputy Secretary shall consult 
with the Under Secretary for Management, Component Acquisition 
Executives, other relevant DHS officials, advisors from 
Federal, State, Local, and Tribal governments, nonprofits, and 
the private sector. The Deputy Secretary is also given 
responsibilities to ensure that major acquisitions and 
investments decisions are well reasoned and are not 
unnecessarily duplicative or inefficient.

Sec. 223.   Department leadership council.

    Section 223 authorizes the Secretary to establish, if 
deemed necessary, a Departmental leadership council to ensure 
coordination of programs and activities of DHS. The mission of 
the leadership council shall be to (1) validate joint 
requirements to meet the mission needs of DHS, (2) ensure 
appropriate efficiencies are made among the life-cycle cost, 
scheduled, and performance objectives in the approval of joint 
requirements, (3) make prioritized capability recommendations 
for joint requirements, and (4) other matters assigned by the 
Secretary and Deputy Secretary. The leadership council shall be 
composed of senior officials representing components and a 
chairperson appointed by the Secretary. The Secretary would 
also be required to ensure that the Future Years of Homeland 
Security Program is consistent with any recommendations of a 
leadership council.

Sec. 224.   Government Accountability Office review of Board and of 
        requirements to reduce duplication in acquisition programs.

    Section 224 requires the Government Accountability Office 
to conduct a review of the Acquisition Review Board established 
in Section 221.

Sec. 225.   Excluded party list system waivers.

    Section 225 requires the Secretary to submit to Congress 
within 5 days, notice and explanation for any waiver issued to 
a contractor in the Excluded Party List System.

Sec. 226.   Inspector General oversight of suspension and debarment.

    Section 226 allows the DHS Inspector General to audit 
decisions about grant and procurement awards to identify any 
improper awards to debarred entities. It also requires the DHS 
Inspector General to review the suspension and debarment 
program throughout DHS to assess whether criteria are 
consistently applied.

     Subtitle C-Acquisition Program Management Accountability and 
                              Transparency

Sec. 231.   Congressional notification for major acquisition programs.

    Section 231 requires internal notification reporting within 
DHS for breaches and a remediation plan (this is currently 
already required in DHS policy). This section also requires 
program managers (PMs) to conduct a root cause analysis to 
determine the cause(s) of the breach and requires congressional 
reporting for actual breaches that occur with cost overruns 
greater than 15 percent of the acquisition program baseline 
(APB), or with a schedule delay of more than 180 days in the 
delivery schedule specified in the acquisition program 
baseline, or with an anticipated failure for any key 
performance threshold or parameter specified in the APB. 
Additionally, if a likely cost overrun is greater than 20 
percent or a likely delay is greater than 12 months from what 
is in the APB, then the USM must notify Congress.

Sec. 232.   Multiyear Acquisition Strategy.

    Section 232 requires the Secretary to submit to the House 
and Senate homeland security committees and the Comptroller 
General of the United States a multiyear acquisition strategy 
to guide the overall direction of DHS acquisitions within 1 
year of the bill's enactment. Every year thereafter, the 
Secretary must update and include that strategy in each Future 
Years Homeland Security Program report already required by 
section 874 of the Homeland Security Act of 2002. Section 232 
also requires the Secretary to consult with headquarters, 
components, employees in the field, industry, and the academic 
community when developing the strategy. The strategy must allow 
flexibility to deal with ever-changing threats, risks, and 
technology to help industry better understand, plan, and align 
resources to meet the future acquisition needs of DHS.
    Section 232 requires the Secretary to include the following 
elements in the strategy:
       A prioritized list of acquisition investments;
       A plan to develop a reliable DHS-wide inventory of 
        investments and real property assets;
       A plan to address known funding gaps between 
        requirements and resources for acquisitions;
       An identification of test, evaluation, modeling, and 
        simulation capabilities required to leverage emerging 
        technology and R&D trends;
       A focus on flexible solutions to allow needed 
        incentives and protections for appropriate risk-taking 
        to meet acquisition needs with resiliency, agility, and 
        responsiveness;
       A focus on incentives for program managers and senior 
        Department acquisitions officials to achieve cost 
        savings;
       An assessment of ways to address delays and bid 
        protests;
       A focus on ways to increase outreach to key 
        stakeholders that includes methods to engage small and 
        disadvantaged businesses and guidance for interaction 
        by program managers with key stakeholders to prevent 
        misinterpretation of acquisition regulations;
       A plan to ensure competition or the option of 
        competition for major acquisition programs; and
       A plan to address DHS acquisition work force 
        accountability that identifies the acquisition work 
        force needs of each Component and develops options for 
        filling those needs. This plan shall also address ways 
        to improve recruitment, hiring, training, and retention 
        of DHS acquisition work force personnel to retain 
        highly qualified personnel, among other things.
    Section 232 also requires GAO to review the Department's 
multiyear acquisition strategy within 6 months of the Secretary 
submitting the first strategy. The review shall assess the 
Department compliance with Section 2's requirements, 
establishment of clear connections between DHS objectives and 
acquisition priorities, and demonstrate that acquisition policy 
reflects acquisition best practices, among other things.

Sec. 233.   Acquisition reports.

    Section 233 requires the Under Secretary of Management 
(USM) to submit to Congress an annual comprehensive acquisition 
status report. The report must include information required as 
part of the DHS Appropriations Act of 2013, a listing of 
programs canceled, modified, paused or referred to the USM or 
Deputy Secretary for additional oversight, and a listing of 
established Executive Steering Committees that are involved in 
certain acquisition decision events. For each major acquisition 
program, the report must include a narrative description, the 
Acquisition Review Board status of the acquisition, the most 
current and approved program baseline, a comparison of the 
original acquisition program baseline, the current program 
baseline and current cost estimate, whether independent 
verification and validation has been implemented, a rating of 
cost risk, schedule risk, and technical risk, the contract 
status, and lifecycle cost of the acquisition.
    Section 233 also requires DHS component heads to identity 
to the USM all level of their respective level 3 acquisition 
programs, and the USM must certify to congressional homeland 
security committees whether such component heads have properly 
identified such programs no later than 30 days after receipt of 
such information. To do so, the USM would be required to 
establish a process with a repeatable methodology to 
continually identify level 3 acquisition programs. Component 
heads would also have to submit to the USM their respective 
polices and guidance for level 3 acquisition programs, and the 
USM would be required to certify to congressional homeland 
security committees that the respective policies and guidance 
adhere to Department-wide acquisition policies.

             TITLE III-INTELLIGENCE AND INFORMATION SHARING


        Subtitle A-Department of Homeland Security Intelligence 
                               Enterprise

Sec. 301.   Homeland intelligence doctrine.

    A detailed evaluation of the Department's Intelligence 
Enterprise conducted by the Committee during the 114th Congress 
found that disparate guidance for the intelligence components 
within the Department of Homeland Security (DHS) undermined the 
Departments ability to fully utilize important data and 
analysis. On December 13, 2016, the Committee released a report 
recommending that the Department ``should develop and issue a 
Departmental Intelligence Doctrine, using relevant Component 
policies and [Intelligence Community] Directives as a starting 
point.''\1\
---------------------------------------------------------------------------
    \1\  House Homeland Security Committee Majority Staff Report, 
``Reviewing the Department of Homeland Security's Intelligence 
Enterprise,'' December 2016.
---------------------------------------------------------------------------
    During the course of the Committee's oversight, series of 
senior current and former intelligence officials and experts 
specifically identified the Department's Chief Intelligence 
Officer (CINT) (which also serves as the DHS Undersecretary for 
Intelligence and Analysis) as the best individual within the 
Department to produce this doctrine.
    This section requires the Secretary, acting through the 
Chief Intelligence Officer and in coordination with other DHS 
entities, to develop and disseminate a written Department-wide 
guidance regarding the processing, analysis, production, and 
dissemination of homeland security information and terrorism 
information. This section also requires that the guidance be 
submitted in unclassified form with a classified annex as 
appropriate.

Sec. 302.   Analysts for the Chief Intelligence Officer.

    This section amends section 201(e)(1) of the Homeland 
Security Act to include the requirement that the Secretary 
provide the Chief Intelligence Officer with an experienced and 
qualified staff. Currently, the Homeland Security Act only 
mandates staff for the Under Secretary of Intelligence and 
Analysis and the Under Secretary of Infrastructure Protection.
    Though this section does not authorize any new funds for 
this staff, it recognizes the role of the CINT within the 
Department, including existing detailed staff to the CINT 
mission. The Department has dedicated some existing staff 
within the Office of Intelligence and Analysis (I&A), Customs 
and Border Protection (CBP), Transportation Security 
Administration (TSA), and National Protection Programs 
Directorate (NPPD) to support the CINT's mission. This section 
will ensure that a small number of existing DHS personnel 
remain dedicated to carrying out CINT-related missions focused 
on coordinating and enhancing the DHS Intelligence Enterprise.

Sec. 303.   Annual homeland terrorist threat assessments.

    Throughout the Second Session of the 114th Congress, the 
Committee undertook a department-wide examination of the 
Department of Homeland Security's structure and mission. As 
part of this effort, numerous senior experts reiterated that 
the Department has a unique ability to draw data from multiple 
components, partner agencies, and State and local authorities. 
Yet nearly all survey respondents and roundtable participants 
who took part in this effort, as well as a number of other 
experts, agreed that DHS could improve or increase the use of 
intelligence, threat assessments, and similar information, into 
policy and planning. Similarly, experts were critical of the 
Department's use of information unique to DHS components in the 
development of their intelligence products. These points were 
further described in the Committee's Department of Homeland 
Security Intelligence Enterprise report released in December 
2016.\2\
---------------------------------------------------------------------------
    \2\  House Homeland Security Committee Majority Staff Report, 
``Reviewing the Department of Homeland Security's Intelligence 
Enterprise'', December 2016.
---------------------------------------------------------------------------
    This section requires the Department to take a long-term 
analytical view utilizing Departmental information to identify 
emerging and persistent threats to the United States Homeland. 
This assessment must be based on analysis of information 
gathered by DHS components linked to DHS mission areas. Though 
there are examples of similar assessments produced by other 
Federal departments and agencies, none rely on unique DHS data, 
and it is not clear that these assessments are incorporated 
into how the Department plans and considers policy.
    By relying on information provided by on-the-ground 
professionals, including State and local law enforcement and 
the National Network of Fusion Centers, this threat assessment 
will be a unique contribution to the Intelligence Community, 
policymakers, and local law enforcement. Furthermore, by 
requiring the Department to consider specific threats to cyber, 
transportation, and border security, in addition to terror 
threats, this section ensures that DHS focuses on its core 
mission areas. This assessment will inform the Department's 
budgeting and planning by clarifying the nature and scale of 
the threats DHS is intended to counter.
    The assessment must be completed within 180 days of 
enactment and must be shared with Congress as a classified 
report with appropriate unclassified summaries and annexes.

Sec. 304.   Department of Homeland Security data framework.

    This section authorizes the Department of Homeland Security 
(DHS) Data Framework. The Data Framework is an ongoing 
initiative at the Department to connect many of data sets 
collected by DHS component agencies to improve vetting 
capability for law enforcement, through a system called 
Neptune, and intelligence purposes, through the Cerberus 
system.
    The development of the Data Framework has been challenging 
because each dataset held by DHS component agencies is subject 
to privacy and legal protections. Additionally, the scope of 
the project is complicated given the number of DHS component 
agencies and offices, the variety of DHS missions, and the 
existence of hundreds of different systems and datasets.
    For use in the Cerberus system, which is the Department's 
current priority, there are 13 datasets fully or partially 
included in the framework.\3\ The four sets fully connected to 
the Framework are the Electronic System for Travel 
Authorization (ESTA), the Advanced passenger Information System 
(APIS), I-94 records for foreign visitors, and the Passenger 
Name Record (PNR) system.\4\ Additional systems in progress 
include, Secure Flight, Aviation Worker, Border Crossing 
Information, and several U.S. Citizenship and Immigration 
Services datasets.\5\
---------------------------------------------------------------------------
    \3\  Department of Homeland Security briefing slides shared with 
the Committee on Homeland Security, June 9, 2017.
    \4\  Ibid.
    \5\  Ibid.
---------------------------------------------------------------------------
    The Department initially planned to incorporate at least 20 
data sets by the end of 2016\6\ but has refocused on building 
full mission capability within the Cerberus system.\7\ Given 
the program delays, privacy considerations, and the potential 
security value provided by the initiative, the Committee 
believes authorizing the Data Framework is important. The 
provision includes a deadline of 2 years after enactment for 
the Department to ensure the Data Framework includes all 
appropriate information linked to critical missions.
---------------------------------------------------------------------------
    \6\  House Homeland Security Committee Majority Staff Report, 
``Reviewing the Department of Homeland Security's Intelligence 
Enterprise, December 2016, pg. 37.
    \7\  Department of Homeland Security briefing slides shared with 
the Committee on Homeland Security, June 9, 2017.
---------------------------------------------------------------------------
    This section provides the first authorization for the 
program, mandates safeguards and training as part of the 
process by which appropriate Departmental personnel are able to 
access the system and includes important privacy and insider 
threat safeguards. The Secretary must ensure information in the 
Framework is protected and auditable by requiring mechanisms 
for identifying insider threats, security risks, and 
safeguarding privacy. The section also includes a requirement 
that DHS personnel make information available in a machine-
readable, standard format, to the greatest extent practicable, 
to improve the search functionality of the framework.
    The Committee believes that the Data Framework has the 
potential to greatly enhance the Department's ability to 
conduct security vetting and improve vetting against classified 
holdings. The section includes requirements for Congress to 
receive regular status updates and notification when the Data 
Framework is fully operational.
    As the Department continues to develop and mature the Data 
Framework, it will be crucial for Department personnel to 
receive training in how to fully utilize the Framework and 
safeguard the information. The Committee directs the Secretary 
to ensure all applicable DHS components are sharing relevant 
and appropriate information in the Data Framework. 
Additionally, the Secretary shall review existing capability 
within the Department for data science to ensure that data sets 
in the Framework are being utilized to their fullest potential 
as allowed under the law. If the Department needs additional 
data science resources, the Secretary shall notify the 
Committee and make recommendations as necessary.

Sec. 305.   Establishment of Insider Threat Program.

    This section authorizes the `Department of Homeland 
Security Insider Threat and Mitigation Act,' establishes an 
internal DHS Steering Committee to manage and coordinate DHS 
activities related to insider threat issues and mandates 
employee education and training programs.
    The Committee believes that an insider threat program is 
necessary to standardize Department-wide efforts. The Committee 
is concerned that progress across the Department's component 
agencies has been uneven and requires more centralized 
coordination to ensure that all offices within the Department 
reach a baseline standard of effectiveness.
    The Committee strongly believes that while insiders with 
malicious intent have caused the most serious damage to 
national security, most insider incidents occur by unwitting 
employees who are not properly trained. The purpose of the 
Insider Threat Program is not only to identify and prevent 
insiders from damaging the United States, but also to spot 
individuals who may demonstrate tendencies of an insider 
threat, and intervene through contact with an investigator to 
mitigate the activity through education and increased 
awareness.
    This section also creates a Steering Committee within the 
Department to coordinate insider threat efforts across the 
Department, and review insider threat cases and issues related 
to the Department's critical assets. The Steering Committee 
shall be chaired by the Under Secretary for Intelligence and 
Analysis and the Chief Security Officer shall serve as the 
Vice-Chair. The Steering Committee's membership includes 
relevant stakeholders from across the Department and its 
component organizations that hold pertinent information to 
insider threats.
    The Committee believes that a designated Steering 
Committee, chaired by senior officials, with a mandate to 
develop, execute and manage the daily operations of the 
Department's Insider Threat Program, will ensure that a 
comprehensive strategy is developed and a thorough assessment 
of the Department's critical assets is conducted. The Committee 
also believes that the Steering Committee should be responsible 
for issuing guidance and training related to insider threats 
Department-wide to ensure that all employees and contractors 
achieve a consistent-level of understanding and awareness about 
the program.
    Additional responsibilities for the Steering Committee 
include leveraging best practices and technology from across 
the Federal Government, industry, and the research community to 
implement insider threat solutions that are validated and cost-
effective; developing a timeline for deploying workplace 
monitoring technologies, awareness campaigns, and insider 
threat training; and developing metrics that indicate the 
effectiveness of the program.
    In addition to the Department's networks, information and 
technology, the Committee believes that the Department's 
critical assets include its work force and physical assets. It 
is important that the Department consider all its assets when 
conducting its risk assessment so that it can prioritize and 
allocate resources accordingly.
    As part of leveraging best practices and technology, the 
Committee notes that according to a survey of Federal IT 
managers, more than 40 percent of Federal agencies don't track 
data assets on their networks, and therefore they cannot be 
sure when and how specific documents are shared or otherwise 
exfiltrated.\8\
---------------------------------------------------------------------------
    \8\  Aaron Boyd, ``Survey: Insider threats target nearly half of 
agencies'', C4ISR Networks, September 14, 2015, available at: http://
www.c4isrnet.com/story/military-tech/it/2015/09/14/us- government-
insider-threats-survey/72254846/.
---------------------------------------------------------------------------
    This section requires the Secretary to submit a report to 
Congress no later than 2 years after the date of enactment that 
describes how the Department and its components have 
implemented the insider threat strategy, the status of the 
Department's risk assessment of critical assets, training that 
has been provided to Department employees, and information on 
the effectiveness of the program. The Committee believes that 
the required report in this subsection will assist the 
Department in articulating its insider threat strategy, how it 
intends to increase awareness of the problem and train 
employees on how to identify and report signs of an insider 
threat, and collect data that will help it evaluate the 
effectiveness of the program as a whole. Finally, this section 
provides for definitions used in this section including: 
`critical assets,' `insider,' and `insider threat.'

Sec. 306.   Threat assessment on terrorist use of virtual currency.

    This section requires the Under Secretary for Intelligence 
and Analysis to assess the threat posed by the use of virtual 
currencies to support designated Foreign Terrorist 
Organizations (FTOs), and disseminate the assessment to State, 
local, and tribal law enforcement officials via the national 
network of fusion centers.
    As they have been come increasingly well-known and utilized 
more widely, some experts have suggested that virtual 
currencies could be used to support criminal or terrorist 
activity, as a means of avoiding more formal (and regulated) 
financial systems. In 2015 the Department of the Treasury 
warned that VCs ``have attracted the attention of various 
criminal groups, and may be vulnerable to abuse by terrorist 
financiers.''\9\ However, most experts and officials agree, 
``there is no more than anecdotal evidence that terrorist 
groups have used virtual currencies to support 
themselves.''\10\ Still, the Committee is concerned that 
terrorists could eventually embrace virtual currencies as a 
means of making or moving funds. Toward that end, this section 
requires the Department to proactively study the threat this 
might pose in doing so, and provide potential solutions.
---------------------------------------------------------------------------
    \9\  ``National Terrorist Financing Risk Assessment 2015,'' United 
States Department of the Treasury. https://www.treasury.gov/resource-
center/terrorist-illicit-finance/Documents/National Terrorist Financing 
Risk Assessment - 06-12-2015.pdf.
    \10\  Zachary K. Goldman, Ellie Maruyama, Elizabeth Rosenberg, 
Edoardo Saravalle, and Julia Solomon-Strauss, ``TERRORIST USE OF 
VIRTUAL CURRENCIES Containing The Potential Threat,'' the Center for a 
New American Security, April 2017. https://s3.amazonaws.com/
files.cnas.org/documents/CNASReport-TerroristFinancing-Final.pdf.
---------------------------------------------------------------------------

Sec. 307.   Department of Homeland Security counterterrorism advisory 
        board.

    In September 2015, the Committee on Homeland Security's 
Task Force on Combating Terrorist and Foreign Fighter Travel 
issued a report with 32 findings and more than 50 
recommendations for enhancing U.S. security. Among other 
conclusions, the Task Force found that Congress should 
authorize the DHS Counterterrorism Advisory Board (CTAB)--an 
internal body charged with advising the Secretary of Homeland 
Security on counterterrorism issues--and ensure it is aligned 
with the current threat environment.\11\
---------------------------------------------------------------------------
    \11\  Committee on Homeland Security Task Force on Combatting 
Terrorist and Foreign Fighter Travel, ``Final report of the Task Force 
on Combating Terrorist and Foreign Fighter Travel,'' September 2015, 
pg. 31.
---------------------------------------------------------------------------
    Established at the behest of the Secretary of Homeland 
Security in 2010, the CTAB brings together top DHS officials to 
share information and coordinate counterterrorism activities. 
The CTAB has improved the Department's ability to respond to 
terrorism threats and harmonize counterterrorism programs and 
activities across DHS components.
    Given that the CTAB has never been authorized in law, there 
is a risk that the board will be dismantled and that the 
internal DHS gains achieved, with respect to counterterrorism 
coordination, will be lost. The Task Force concluded that 
authorization in law and updates to the charter would keep the 
CTAB on a strong footing so it can be utilized by future DHS 
Secretaries and component leaders.
    This section inserts a new section 210G into the Homeland 
Security Act of 2002 entitled `Departmental Coordination on 
Counterterrorism,' establishing a board of senior 
representatives of departmental operational components and 
headquarters elements to coordinate and integrate departmental 
intelligence, activities, and policy related to the 
counterterrorism mission and functions of the Department. It 
requires the board to update its charter, as appropriate, every 
4 years and to align it with the threat environment. This 
section further delineates the membership of the board and 
requires that Secretary to appoint a Coordinator for 
Counterterrorism who will serve as chair of the board. It 
requires the board to convene on a regular basis to discuss 
intelligence and coordinate ongoing threat mitigation efforts 
and departmental activities and to make recommendations to the 
Secretary. Finally, this subsection directs the board to advise 
the Secretary on the issuance of terrorism alerts.

Sec. 308.   Border and gang threat assessment.

    Acts of gang-related violence connected to transnational 
gangs, including specifically MS-13, have increased across the 
country in the last several years. Encompassed in this 
disturbing trend is an increase in violence committed by 
individuals who have entered the country after being subjected 
to vetting through various border security screening programs.
    The Committee believes that a review of border security 
screening programs to identify and remedy any vulnerabilities 
is vital to address this situation. This section directs the 
Secretary to conduct this necessary review. It provides the 
Secretary with additional responsibilities that require the 
Department of Homeland Security (DHS or the Department) to 
conduct a threat assessment of these border security screening 
programs and to ensure that the borders of the United States 
are secure from the threats posed by human smuggling 
organizations and transnational gangs. Once this threat 
assessment has been completed, this section requires the 
Secretary to make a determination if any changes are necessary 
to these border security screening programs to address any 
security vulnerabilities that have been identified.

Sec. 309.   Security clearance management and administration.

    The Department of Homeland Security has over 230,000 
employees. Across the DHS Enterprise, there are approximately 
124,000 clearances with 86,000 at the Secret level, 25,000 at 
the Top Secret Level, and 13,000 TS//SCI.\12\
---------------------------------------------------------------------------
    \12\  Department of Homeland Security Office of Congressional 
Affairs email to Committee staff, November 13, 2013.
---------------------------------------------------------------------------
    The proliferation of original and derivative classified 
material and the exponential growth in the number of 
individuals with security clearances present significant costs 
and homeland security and national security challenges that 
warrant timely action. In addition to the high costs incurred 
by the Federal Government to investigate the large number of 
individuals for positions requiring security clearances, over-
designations have undoubtedly resulted in the Federal 
Government recruiting, hiring, and paying individuals at rates 
that are higher than necessary and not hiring individuals who 
otherwise have the required knowledge and skills.
    This bill seeks to make specific reforms at the Department 
with respect to security clearance and position designations 
practices. The reforms at DHS are targeted at the designations 
of positions and the investigations, adjudications, denials, 
suspensions, revocations, and appeals processes for security 
clearances.
    Within 1 year of enactment, the Secretary is required to 
review all sensitivity level designations of national security 
positions within the Department. If the Secretary determines 
that a change in the sensitivity level of a position is 
warranted, the access to the classified information will be 
adjusted to an appropriate level and a periodic reinvestigation 
will be completed as necessary.
    The Secretary is required to report to the House Committee 
on Homeland Security and the Senate Committee on Homeland 
Security and Government Affairs after completion of each review 
to include the number of positions, by classification and 
component and office, as well as the determination of whether 
the position requires access to classified information, no 
longer requires access to classified information, or requires a 
different level of access. As an added measure of 
accountability, this section also requires the Inspector 
General to conduct audits on Departmental compliance.
    This section also requires the Secretary to report to the 
House Committee on Homeland Security, House Committee on 
Oversight and Government Reform, and the Senate Committee on 
Homeland Security and Government Affairs on an annual basis for 
5 years regarding individuals who have had security clearances 
denied, suspended, or revoked. Within 1 year of enactment, the 
Secretary must develop a plan for creating greater uniformity 
across the Department in the security adjudication process and 
ensure that such information is protected.

               Subtitle B-Stakeholder Information Sharing

Sec. 311.   Department of Homeland Security Fusion Center Partnership 
        Initiative.

    This section amends 210A of the Homeland Security Act to 
update existing statutory requirements related to Department of 
Homeland Security responsibilities and support for fusion 
centers.
    As the National Network of Fusion Centers continues to 
mature into a national asset, this section adds several new 
responsibilities for the Secretary to reflect the current role 
of fusion centers in detecting and preventing a terrorist 
attack. These new responsibilities include ``coordinating with 
the heads of other Federal departments'' to provide operational 
and intelligence support, supporting ``the maturation and 
sustainment'' of fusion centers, reducing inefficiencies of 
Federal resources provided to fusion centers, ensuring that 
support to fusion centers is included as a priority in homeland 
security grant guidance, coordinating nationwide suspicious 
activity reports, ensuring that fusion centers are the focal 
points for sharing information, and disseminating best 
practices for appropriate State and local staffing at fusion 
centers. Additionally, this section addresses concerns the 
Members heard from stakeholders that fusion centers do not have 
access to certain Federal information and information systems 
by requiring the Secretary to become an information sharing 
advocate on behalf of fusion centers.
    Section 210A(c) is amended to require the Under Secretary 
for Intelligence and Analysis to ensure fusion centers have 
access to DHS information sharing systems and to deploy 
appropriate DHS personnel to fusion centers. Such personnel may 
include intelligence officers, intelligence analysts, and other 
liaison personnel from DHS component agencies. Furthermore, the 
Under Secretary shall negotiate memoranda of understanding 
between DHS and appropriate State or local government agencies 
regarding how information shall be exchanged and protected 
between DHS and fusion centers. This subsection also requires 
DHS to coordinate with other Federal agencies regarding 
appropriate personnel that should be detailed to fusion 
centers. Finally, this subsection requires the Secretary to 
make available the criteria used by the Department for 
deploying personnel to fusion centers.
    Subsection 210A(d), which relates to the responsibilities 
of Departmental personnel assigned to fusion centers, is 
amended by inserting a new subparagraph (5) to require such 
personnel ensure that they are incorporating relevant 
information from within the Department, including the 
components, in their analysis. The Committee believes the 
Department needs to work with fusion center to enhance 
Department intelligence information data by including State and 
local generated data. The Office of Intelligence and Analysis 
is one of the only members of the Intelligence Community that 
can directly work with State and local stakeholders.
    Subsection 210A(e) is amended to require the Secretary to 
prioritize the deployment of resources, including Departmental 
personnel, from DHS components with border and maritime 
security responsibilities.
    Subsection 210A(j) is amended to add a definition for the 
``National Network of Fusion Centers.''
    Subsection 210A(k) is deleted. This subsection contained 
the expired authorization of appropriations. This section is 
being removed because the funding for Departmental support to 
fusion centers comes largely from the Office of Intelligence 
and Analysis, which is funded through the National Intelligence 
Program, a classified appropriation. Other funds are available 
to State and local governments for fusion centers through 
homeland security grant programs.
    Additionally, to hold the Department accountable, this 
section requires the Under Secretary of Intelligence and 
Analysis to report to Congress annually on how the Department 
is improving support to fusion centers and meeting the 
requirements in Section 210A of the Homeland Security Act. The 
reporting requirement sunsets in 2024.

Sec. 312.   Fusion center personnel needs assessment.

    This section requires the Comptroller General of the United 
States, within 120 days of enactment, to conduct an assessment 
of Departmental personnel detailed to fusion centers across the 
Nation and whether deploying additional Departmental personnel 
will enhance homeland security information sharing between 
Federal, State, and local departments and agencies. The 
assessment will examine the numbers of department personnel 
deployed to each fusion centers, information on the roles and 
responsibilities of personnel deployed to fusion centers, a 
review of additional Federal resources provides to fusion 
centers, analysis of the optimal number of such personnel at 
fusion centers, information and analysis on fusion centers near 
the land and maritime borders of the United States, and 
information and analysis on fusion centers near large and 
medium hub airports.
    There are 79 centers across the country and they have 
established the National Network of Fusion Centers to enhance 
information sharing and coordination between the individual 
centers. In testimony before the Committee, as well as through 
numerous briefings and site visits, fusion center personnel 
have noted that increasing access to information and expertise 
from other parts of the Department, such as Customs and Border 
Protection, Immigration and Customs Enforcement, and the 
Transportation Security Administration would improve the 
National Network's ability to detect and prevent potential 
terrorist attacks and other emergencies.

Sec. 313.   Program for State and local analyst clearances.

    The Committee has heard repeatedly from witnesses and 
stakeholders about the need for some State and local analysts 
and officials to have higher security clearance levels, 
particularly Top Secret and Sensitive Compartmented Information 
(TS/SCI) clearances. The witnesses and stakeholders noted that 
in order to continue breaking down stovepipes and increasing 
information sharing between Federal, State, and local law 
enforcement officials, State and local analysts should have Top 
Secret clearances in order to understand the entire threat 
picture and communicate with Federal personnel about the threat 
and terrorism investigations.
    This section provides a sense of Congress that any program 
established by the Under Secretary of Intelligence and Analysis 
to provide eligible State and local analysts located in fusion 
center with Top Secret clearances must be consistent with the 
need to know requirements pursuant to Executive Order 13526. 
Additionally, this section requires the Under Secretary to 
submit a one-time report to Congress on the effectiveness of 
granting higher clearance levels to State and local officials 
to improve information sharing and situational awareness, the 
costs for issuing and administering clearances and the 
associated training programs, and the operational security of 
such program.

Sec. 314.   Information technology assessment.

    This section requires the Under Secretary of Intelligence 
and Analysis, in collaboration with the Chief Information 
Officer and representatives from the National Network of Fusion 
Centers, to conduct an assessment of information system used to 
share homeland security information between the Department and 
fusion centers. The assessment shall include an evaluation of 
the accessibility and ease of use, a review of how departmental 
information systems connect with existing systems in the fusion 
centers, and an evaluation of participation levels of 
departmental components and offices using information systems 
to share information with fusion centers. The Committee has 
heard that despite numerous updates to Department's information 
systems specifically for State and local partners, there are 
still issue with usability and components' connectivity to such 
information systems. This section addresses these concerns.

Sec. 315.   Department of Homeland Security classified facility 
        inventory and dissemination.

    This section requires the Secretary, to the extent 
practicable, to maintain and update an inventory of all 
facilities certified by the Department to house classified 
infrastructure or systems above the SECRET level. This section 
also requires the Secretary to share the inventory, as 
appropriate, with Departmental and other governmental 
personnel.
    Greater transparency in the locations of all facilities 
certified by DHS to store classified infrastructure or systems 
above the Secret level\13\ will ensure DHS is tracking the 
specific locations of all the Department's secure facilities 
and making this information available to departmental and State 
and local personnel, as appropriate. It will also ensure that 
DHS does not unnecessarily invest in new facilities in areas 
already covered by a pre-existing facility and thus reduce the 
chances for wasteful spending.
---------------------------------------------------------------------------
    \13\  These facilities are commonly known as Sensitive 
Compartmented Information Facilities (``SCIFs''). A SCIF is an 
accredited area, room, or group of rooms, buildings, or installation 
where sensitive compartmented information may be used, stored, 
discussed, and/or processed. [Note: This definition is taken from a 
recent IC, DHS, DOJ joint OIG report entitled, ``Review of Domestic 
Sharing of Counterterrorism Information.'']
---------------------------------------------------------------------------
    The significance of DHS personnel gaining access to SCIFs 
in the field was highlighted in a joint Intelligence Community, 
DHS, and Department of Justice OIG report, published in March 
2017, which reviewed the domestic sharing of counterterrorism 
information. The report found that while counterterrorism 
information is usually classified at the Top Secret level, DHS 
personnel lack sufficient access to SCIFs in the field. The 
report assesses that the effectiveness of DHS's Office of 
Intelligence and Analysis ``as an IC member in particular, is 
hampered by its limited access to classified systems and 
facilities.'' Section 315 ensures that the physical locations 
of all DHS-certified facilities at the Top Secret level will be 
known to DHS personnel, including field personnel, as 
appropriate, and arrangements can be made for access.
    In regards to State, local, tribal, and territorial (SLTT) 
partners, according to a DHS fact sheet, as of February 2017, 
SLTT personnel applying for a DHS sponsored Top Security 
clearance must provide documentation that clearly articulates 
the facility where Top Secret information will be accessed. 
However, the Committee has found that the locations of these 
facilities or not readily available to SLTT partners, which can 
pose unnecessary barriers in the security clearance nomination 
process. The requirement that the locations of these facilities 
to be made available to SLTT personnel, as appropriate, will 
assist in eliminating unnecessary impediments that could 
prevent or delay these stakeholders from applying for Top 
Secret security clearances. Last, section 315 also intends to 
assist SLTT personnel with active Top Secret clearances seeking 
to locate the nearest DHS-certified facility in which they can 
access systems and information above the Secret level.

Sec. 316.   Terror inmate information sharing.

    This section directs the Secretary, in coordination with 
the Attorney General and other appropriate Federal officials, 
to provide fusion centers and other law enforcement entities, 
as appropriate, with release information related to individuals 
incarcerated for terror-related offenses as defined under Title 
18 U.S.C. Section 2332b. This information is to be provided by 
the Secretary for Homeland Security purposes. The Secretary 
must also conduct periodic assessments on the overall threat 
posed by known or suspected terrorists currently incarcerated 
in Federal correctional facilities, including the risk of such 
populations engaging in terrorist activities upon release. In 
carrying out these authorities the Secretary is required to 
receive input from the Officer for Civil Rights and Civil 
Liberties, the Officer for Privacy, and the Chief Intelligence 
Officer of the Department of Homeland Security (DHS or the 
Department). Section 316 does not require or give the 
Department the right or responsibility to establish a list or 
registry of individuals convicted of terrorism.
    The Committee believes the new responsibilities added to 
the Secretary under this section will help mitigate the risk 
posed by individuals in Federal prison for crimes of terrorism 
who will be released. This situation must be addressed with 
consistent, proactive information sharing among Federal 
agencies, including the Department, the Bureau of Prisons, and 
State and local partners.
    This section directs the Secretary to engage in a 
consistent, proactive information sharing process by 
coordinating with appropriate Federal officials and reaching 
out to State, local, and regional fusion centers and other law 
enforcement entities with release information related to 
individuals incarcerated for terror-related offenses. 
Additionally, the periodic assessment requirement will ensure 
that the Secretary communicates with appropriate Federal 
officials as well as State, local, and regional fusion centers 
on the overall threat from individuals who are known terrorists 
currently incarcerated in Federal prison, including the risk of 
recidivism of these populations upon release.
    The Department is best suited to provide this information 
to State, local, and regional fusion centers due to existing 
relationships and systems that have been developed between the 
Department and these entities. Requiring the collection and 
dissemination of this information does not impose any new 
requirements on the Bureau of Prisons, as it routinely shares 
this same information with other Federal partners. The 
Committee believes that a Memorandum of Understanding between 
the Secretary and the Attorney General is the appropriate 
vehicle to facilitate passing this inmate release information 
to the Department from the Bureau of Prisons.

Sec. 317.   Annual report on Office for State and Local Law 
        Enforcement.

    This section amends Section 2006(b) of the Homeland 
Security Act to require the Office for State and Local Law 
Enforcement (OSLLE) to provide an annual report on their 
activities for next 5 years. This report must include details 
of the efforts of the office to coordinate with and improve 
information sharing between the DHS component agencies, and 
State, local, and tribal law enforcement; a review of efforts 
made to improve information sharing through the DHS Homeland 
Security Information Network (HSIN); the status of performance 
metrics OSLLE uses; feedback they receive from State, local, 
and tribal partners; and a description of other ongoing efforts 
to meet their statutory mandates.
    As the Department's primary liaison between DHS and State 
and local law enforcement agencies, it is critical OSLLE 
maintains a robust relationship with these key stakeholders. 
The production of an annual report detailing OSLLE's activities 
will encourage this office to continually identify gaps and 
areas for improvement in the Department's information sharing 
efforts with State and locals, and coordinate with relevant DHS 
component agencies to close these gaps. The requirement that 
OSLLE provides performance metrics and details on the feedback 
the office receives from State and locals will provide much 
needed assistance to the Committee in its oversight of this 
office.

Sec. 318.   Annual catalog on Department of Homeland Security training, 
        publications, programs, and services for State, local, and 
        tribal law enforcement agencies.

    This section amends section 2006(b)(4) of the Homeland 
Security Act to require the Office of State and Local Law 
Enforcement (OSLLE) to produce and disseminate an annual 
catalog that summarizes opportunities for training, 
publications, programs, and services available to non-Federal 
law enforcement agencies from the Department, and disseminate 
it to State and local law enforcement entities within 30 days 
of production. In furtherance of its role as the Department's 
liaison to State and local law enforcement it is incumbent on 
the OSLLE to proactively identify ways in which the Department 
can support these important stakeholders. This section promotes 
these efforts by requiring the OSLLE to continue to produce 
this resource and ensuring that the services described in the 
catalog are relevant and useful to State and locals.
    This section also requires DHS to share the catalog through 
the Homeland Security Information Network (HSIN) and share a 
copy with the Committee on Homeland Security of the House of 
Representatives and the Committee on Homeland Security and 
Governmental Affairs of the Senate. This catalog is a product 
OSLLE currently produces. This section will require them to 
continue to do so. By requiring the OSLLE to share this catalog 
on HSIN, section 318 encourages OSLLE to utilize this important 
information sharing platform that many State and local law 
enforcement partners rely upon to receive information from the 
Department. It also ensures this catalog reaches as many of 
these stakeholders as possible.
    Furthermore, this section adds a new requirement for OSLLE 
to coordinate with other DHS components and Federal agencies to 
develop and share information on other Federal resources 
available to enhance fusion center access to information and 
resources.

                       TITLE IV-MARITIME SECURITY


Sec. 401.   Strategic plan to enhance the security of the international 
        supply chain.

    This section requires DHS Secretary submit a strategic plan 
to Congress every 3 years to address threats to the 
international supply chain.
    Specifically, this section requires an updated strategy, 
and a subsequent updated strategic plan to be submitted to 
Congress every 3 years. This ensures that the strategy to 
secure the highly complex international supply chain, which is 
responsible for 30 percent of the U.S. economy, is adapting to 
the present threat environment.
    Congress has not received a Strategic Plan to Enhance the 
Security of the International Supply Chain since the initial 
passage of the Safe Port of 2006. The Committee believes that 
as threats to our supply chain and ports evolve, so must our 
whole of government approach to security.

Sec. 402.   Container Security Initiative.

    This section is a clerical change to existing Container 
Security Initiative (CSI) language that removes the requirement 
for an outdated report.
    CSI is a valuable security program that detects and 
resolves threats before it reaches our shores and the Committee 
strongly supports it.

Sec. 403.   Cyber at ports.

    This section amends the Maritime Transportation Security 
Act (MTSA) and formally gives the United States Coast Guard 
(USCG) responsibility for cybersecurity at ports. While USCG 
does not currently have operational authority of cybersecurity 
at ports, it is responsible for ensuring that cybersecurity is 
part of the USCG approved facility security plan for ports. 
With the language proposed in this section, this will be 
formally codified in MSTA.
    Additionally, this section requires the Coast Guard to 
share information related to cybersecurity risks and incidents 
among port partners through the National Maritime Advisory 
Committee.
    The Committee believes that our ports and the automated 
systems that control them are vulnerable to cyber-attacks, 
which could be devastating to the transit of international 
commerce. While USCG inspects and approves what are known as 
``facility security plans'' at ports twice a year, these plans 
are not currently required to have a cybersecurity strategy. 
The Committee believes that requiring facility operators to 
have a cyber security plan, and providing them with a mechanism 
to share best practices and receive current intelligence, is 
critical to maintaining the uninterrupted flow of maritime 
commerce and the security of our ports.

Sec. 404.   Facility inspection intervals.

    Under the Maritime Transportation Security Act (MTSA), USCG 
is currently required to verify and inspect the implementation 
of a port's facility security plan twice a year: once 
announced, and once unannounced. This section amends MTSA to 
require inspections at every facility at least once a year, but 
allows USCG to complete additional inspections in a risk-based 
manner, given a limited number of resources.
    This section ensures that both the low-risk grain terminal 
and the high-risk LNG terminal are inspected at least once a 
year, but allows USCG to prioritize the highest risk and 
conduct only one inspection of the grain terminal, and three 
inspections of the LNG terminal if deemed necessary. The 
Committee believes that by giving USCG the flexibility to 
conduct port inspections in a risk-based manner it will 
increase the security of our most vulnerable ports. For 
example, currently, both a grain terminal and a Liquid Natural 
Gas (LNG) terminal are required to be inspected by the USCG 
twice a year.

Sec. 405.   Updates of maritime operations coordination plan.

    This section directs the DHS Secretary to update the 
Maritime Operations Coordination Plan (MOC-P) to decrease 
duplicative operations between the USCG and CBP AMO. The last 
MOC-P was signed in 2011 and many of its provisions were never 
actualized by DHS. Updating the MOC-P is also a DHS OIG 
recommendation in a recent report on USCG and CBP AMO 
duplicative operations.
    The Committee is concerned with the continued lack of DHS 
interagency cooperation and a duplication of efforts, 
particularly in the maritime domain. Updating the MOC-P will 
allow the Department to take a renewed look at how to best 
allocate maritime resources.

Sec. 406.   Evaluation of Coast Guard Deployable Specialized Forces.

    This section directs the DHS Secretary to update the 
Maritime Operations Coordination Plan (MOC-P) to decrease 
duplicative operations between the USCG and CBP AMO. The last 
MOC-P was signed in 2011 and many of its provisions were never 
actualized by DHS. Updating the MOC-P is also a DHS OIG 
recommendation in a recent report on USCG and CBP AMO 
duplicative operations.
    The Committee is concerned with the continued lack of DHS 
interagency cooperation and a duplication of efforts, 
particularly in the maritime domain. Updating the MOC-P will 
allow the Department to take a renewed look at how to best 
allocate maritime resources.

Sec. 407.   Cost benefit analysis of co-locating DHS assets.

    This section requires the Comptroller General to submit to 
Congress a report that describes and assesses the State of the 
Coast Guard's homeland security related Deployable Specialized 
Forces (DSF). This report will address the cost, capability and 
operations completed as part of the program. This report will 
also provide recommendations for future coordination of the 
DSF.
    The Committee believes the DSF provides the Coast Guard 
with a necessary counter-terrorism, anti-terrorism and counter-
narcotic capability. However, the Committee is concerned that 
some of the high-cost capabilities of the DSF have not provided 
tangible operational results to date. The Coast Guard made many 
changes following the Stem to Stern Review of the Deployable 
Specialized Forces and this section will provide additional 
insight for the future direction of the DSF program.

Sec. 408.   Repeal of interagency operational centers for port security 
        and secure systems of transportation.

    This section requires DHS to examine locations where both 
CBP AMO and the USCG have maritime or aviation assets deployed 
and to determine the potential for cost savings through co-
location. The Committee strongly believes that where 
operationally feasible, DHS should maximize limited resources 
and increase operational efficiencies.

Sec. 409.   Maritime security capabilities assessments.

    This section repeals the mandate for brick and mortar 
interagency operations centers, giving the Department the 
flexibility to proceed with virtual situational awareness tool 
or to leverage existing, proven, interagency coordination 
mechanisms such as the Regional Coordinating Mechanisms 
(RECOMs), or the newly enacted Border Security Joint Task 
Forces to accomplish the same goal.
    This section also repeals an obsolete section in U.S. Code 
(46 U.S.C. 70116) that was updated by the Safe Port Act of 2006 
and never repealed.

Sec. 410.   Conforming and clerical amendments.

    This Section requires the Secretary of the Department of 
Homeland Security to submit a report to the congressional 
homeland security committees that details how many maritime 
assets and personnel the Department would need to increase the 
interdiction rate of illicit activity in the Transit Zone.
    The Committee is concerned that, with the current force 
laydown and current resource constraints, the Coast Guard is 
only able to interdict 30 percent of known illicit drug loads 
moving through the Transit Zone. This reporting requirement 
will provide a valuable addition to metrics already required by 
the 2017 National Defense Authorization Act (Pub. L. 114-328) 
to identify the number of assets and personnel required to 
increase the Department's interdiction rate of known illicit 
activity in the Transit Zone.

             TITLE V-TRANSPORTATION SECURITY ADMINISTRATION


                       Subtitle A-Administration

Sec. 501.   Amendments to the Homeland Security Act of 2002 and title 
        5, United States Code.

    This section amends the Homeland Security Act of 2002 to 
re-establish the official position and title of the 
Administrator of the Transportation Security Administration 
(TSA). It also amends Title 5 of the United States Code to add 
the Administrator as an officer of the Department of Homeland 
Security (DHS) and ensure that the Administrator's level and 
pay rate are appropriate for an Assistant Secretary.
    When TSA was transferred to DHS from the Department of 
Transportation via the Homeland Security Act of 2002, the 
Administrator's position, title, and level did not transfer 
along with it. This section addresses these gaps by reinstating 
the Administrator as an Assistant Secretary within DHS.

Sec. 502.   Amendments to title 49, United States Code.

    This section amends Title 49 of the United States Code to 
reflect current policy by ensuring that the TSA Administrator, 
DHS, and the DHS Secretary are included in the appropriate 
places in Federal statute. This clarifies that TSA is a 
component of DHS and ensures that the Administrator has the 
appropriate title and the 5-year term originally intended by 
Congress. This section also establishes and updates offices and 
positions within TSA to ensure that it can successfully carry 
out its mission. This includes the Deputy Administrator; the 
Office of Public Affairs; the Office of Civil Rights, 
Liberties, Ombudsman, and Traveler Engagement; the Office of 
Legislative Affairs; the Office of Finance and Administration; 
the Office of the Chief of Operations; the Office of the Chief 
of Mission Support; the Office of the Chief Counsel; and the 
corresponding heads of such offices.
    When TSA was transferred to DHS from the Department of 
Transportation via the Homeland Security Act of 2002, the 
Administrator's original 5-year term did not transfer along 
with it. This section reinStates that 5-year term to ensure 
consistent leadership at TSA, as originally intended by 
Congress. Additionally, the transfer of TSA and the absence of 
any authorization legislation since has left many outdated 
titles, roles, and responsibilities. This section addresses 
those issues by updating Federal statute to conform to current 
policy and practice.

Sec. 503.   Amendments to the Aviation and Transportation Security Act.

    This section amends the Aviation and Transportation 
Security Act (ATSA) to ensure that Federal statute accurately 
reflects current policy and appropriate roles of TSA.
    ATSA, which created TSA in 2001 after the 9/11 terrorist 
attacks, contains outdated titles and responsibilities. This 
section modernizes ATSA by updating the titles and 
responsibilities appropriate for TSA's current mission.

Sec. 504.   Information required to be submitted to Congress under the 
        strategic 5-year technology investment plan of the 
        Transportation Security Administration.

    This section amends the Homeland Security Act of 2002 to 
require TSA to annually report to Congress information about 
technological acquisitions completed in the preceding and 
current fiscal year. The section also directs the Administrator 
of TSA to submit to Congress notice of any increase or decrease 
in the dollar amount allocated to the procurement of a 
technology or increase in the number of units of a technology. 
Additionally, this section requires the Administrator to submit 
to Congress a report on technology in use after its operational 
lifecycle or its useful life projection, as specified by either 
the manufacturer or TSA's own 5-year technology investment 
plan. Finally, TSA is required to notify airports and airlines 
of any changes to the 5-year technology investment plan.
    Congress previously enacted legislation to require a 5-year 
technology investment plan for TSA, in order to provide greater 
transparency for policymakers and stakeholders into the 
direction TSA intends to go in technology procurement. 
Unfortunately, TSA issued disparate strategic guidance among 
different documents, thus continued to cause confusion among 
industry stakeholders. This legislation will ensure that TSA's 
5-year plan is updated more consistently and that Congress and 
stakeholders are informed of any changes in procurement costs.

Sec. 505.   Maintenance of security-related technology.

    This section amends the Homeland Security Act of 2002 by 
requiring the Administrator to develop and implement a 
preventative maintenance validation process for security-
related technology deployed to airports within 180 days of 
enactment. This process must provide guidance to Administration 
personnel at airports on how to conduct and document 
preventative maintenance actions, as well as mechanisms for the 
Administrator to verify compliance with the newly implemented 
procedures.
    Additionally, this section specifies that when preventative 
maintenance is carried out by a contractor additional reporting 
and verification processes must be put into place. The 
contractors must provide the appropriate Administration 
personnel with monthly preventative maintenance reports that 
include information on what specific actions were carried out 
by the contractor, notification to appropriate Administration 
personnel when maintenance action is completed, and an 
independent process to verify the contractor's claims.
    Last, this section requires the Administrator to impose 
penalties for noncompliance when preventative and/or corrective 
maintenance does meet contractual requirements or manufacturer 
specifications.
    The Department of Homeland Security Office of the Inspector 
General recently issued a report entitled ``The Transportation 
Security Administration Does Not Properly Manage Its Airport 
Screening Equipment Maintenance Program'' (DHS OIG-15-86) which 
examined the TSA's airport screening equipment maintenance 
program and determined that adequate policies and procedures 
had not been implemented. This has resulted in equipment not 
being maintained to the specifications required by the 
manufacturer. Additionally, TSA did not have adequate policies 
to oversee if the routine preventative maintenance was 
accomplished resulting in equipment not being ready for 
operational use. This could shorten the operational life of 
some equipment and incur unnecessary costs to replace it. 
Additionally, the equipment, if not properly maintained, has 
the potential to be less effective at detecting dangerous 
items, which could jeopardize passenger and airline safety.

Sec. 506.   Transportation Security Administration efficiency.

    This section requires the Administrator to conduct a 
comprehensive, agency-wide efficiency review to identify and 
effectuate spending reductions and savings by streamlining and 
restructuring TSA. In the review, the Administrator shall 
consider the elimination of unnecessarily duplicative programs; 
the elimination of unnecessary rules, regulations, directives, 
or procedures; and the reduction of overall operating expenses, 
including costs associated with the number of personnel. The 
Administrator must also report to Congress on the results and 
potential savings of the review.
    Since its creation in 2001 after the 9/11 terrorist 
attacks, TSA has struggled to accomplish its mission in an 
efficient manner. Low employee morale, leadership turnover and 
bureaucracy, prolonged airport wait times, and failed internal 
investigations are just a few of the challenges that TSA 
continues to face. This section seeks to address these issues 
by forcing an internal accounting of the agency with an 
emphasis on efficiency, organization, and savings in order to 
improve TSA's ability to focus on its important transportation 
security mission.

Sec. 507.   Transportation senior executive service accountability.

    This section requires the DHS Secretary, acting through the 
TSA Administrator, to develop a strategic plan to reduce the 
number of Senior Executive Service (SES) positions at TSA by 20 
percent by June 30, 2019. The Administrator must submit a copy 
of the plan to Congress.
    Currently TSA has over 160 SES positions-more than any 
other DHS component-with the average salary of over $160,000, 
which is above the General Schedule (GS)-15 level. Given the 
high salaries and other benefits granted to SES employees--as 
well as the large number of such positions at TSA--this section 
seeks to restore accountability and savings of taxpayer 
dollars.

              Subtitle B-Passenger Security and Screening

Sec. 511.   Department of Homeland Security trusted traveler program 
        collaboration.

    This section directs the Secretary of Homeland Security to 
continue its review of all trusted traveler vetting programs to 
make recommendations on possible efficiencies that could be 
gained by integrating requirements and operations and 
increasing information and data sharing across programs.
    The Department of Homeland Security offers several trusted 
traveler programs that passengers can enroll in thereby 
allowing the government to vet them to ensure they are not a 
threat in exchange for expediting screening. However, because 
these trusted traveler vetting programs are administered by 
different components within the Department interoperability 
issues have arisen such as those between TSA PreCheck and CBP 
Global Entry. The Department should work to ensure that these 
programs can interface and seek to gain efficiencies by 
exploring opportunities to harmonize requirements and 
operations and increase information and data sharing.

Sec. 512.   PreCheck Biometric pilot project.

    This section requires the Administrator of TSA to conduct a 
pilot project to test secure, automated and biometric-based 
systems at airports to verify the identity of individuals who 
are members of TSA PreCheck or another Department of Homeland 
Security trusted traveler program. The biometric-based systems 
must be designed to improve security while reducing the need 
for security screening personnel to perform identity and travel 
document verification; reduce average wait times; reduce 
Administration operating expenses; be integrated with DHS watch 
listing and trusted traveler programs; and be integrated with 
other technologies to further facilitate risk-based passenger 
screening at checkpoints, to the extent practicable.
    The Committee believes that the significant advancements in 
biometric identity verification technology by both the public 
and private sectors present an opportunity for TSA to improve 
security while reducing the need for personnel to perform 
identity and travel document verification. Through the TSA 
PreCheck program, the Administration maintains the fingerprint 
records of individuals enrolled in the program and therefore 
such technology can be piloted in PreCheck passenger screening 
lanes using existing datasets.

Sec. 513.   Identity and travel document verification.

    This section requires the Administrator of TSA, no later 
than December 31, 2018, subject to the availability of 
appropriations, to implement a secure, automated system at all 
airports, for verifying travel and identity documents of 
passengers who are not members of a Department of Homeland 
Security (DHS) trusted traveler programs. Such system shall 
assess the need for security screening personnel to perform 
identity and travel document verification for such passengers, 
thereby assessing the overall number of such screening 
personnel; reduce the average wait time of passengers; reduce 
the overall operating expenses of the Administration; be 
integrated with the Administration's watch list matching 
programs and other technologies to further facilitate risk-
based passenger screening.
    The 9/11 Commission report noted that fraud in 
identification documents and boarding passes was a critical 
weakness in the system that needed to be prevented. To this 
end, in 2014 the Transportation Security Administration (TSA) 
awarded a contract for credential authentication technology. 
This technology has been tested and piloted multiple times to 
ensure its effectiveness. However, the deployment of this 
technology has been repeatedly delayed. The committee directs 
TSA to prioritize deployment of this technology across the 
Nation's airports no later than December 2018.

Sec. 514.   Computed tomography pilot project.

    This section directs TSA to conduct a pilot program to test 
the use of technology using computed tomography to screen 
baggage at passenger checkpoints.
    The committee believes that TSA should pilot computed 
tomography technology, which has long been used to screen 
passenger baggage, at the checkpoint to determine if such 
technology could improve detection of threat items by security 
screening personnel in carry-on baggage.

Sec. 515.   Explosives detection canine teams for aviation.

    The section requires the Administrator to ensure at least 
300 explosive detection canine teams dedicated to passenger 
screening are deployed at airports by December, 31, 2018.
    In a briefing to the committee, the Transportation Security 
Administration (TSA) indicated that 300 passenger screening 
canine teams would be the optimal number to achieve the desired 
level of security and efficiencies by using canines to detect 
screening anomalies. Further, TSA indicated that training and 
deploying 300 canine teams by December 31, 2018, is a 
reasonable and achievable goal. Therefore, the committee 
expects that TSA will meet this goal or otherwise notify the 
committee in advance as to why it will not be possible to 
deploy 300 passenger screening canine teams by the 
aforementioned deadline.

Sec. 516.   Standard operating procedures at airport checkpoints.

    This section requires the Administrator of TSA to ensure 
that standard operating procedures at airport checkpoints for 
passengers and carry-on baggage are carried out in a uniform 
manner among similarly situated airports, to the extent 
practicable. This section also requires the Administrator to 
report to Congress, not later than 270 days after enactment of 
this Act, on how standard operating procedures were made 
uniform. Further, 1 year after enactment of this Act, the 
Inspector General of the Department of Homeland Security shall 
conduct periodic audits of adherence to standard operating 
procedures at large, medium and small airports in diverse 
geographical areas.
    An overabundance of standard operating procedures (SOPs) 
for security screening personnel at airport security 
checkpoints was burdensome to screeners and has the potential 
to reduce screening effectiveness. Recognizing that different 
protocols are necessary for airports of differing sizes and 
locations, the committee directs TSA to continue to streamline 
SOPs at checkpoints, to the greatest extent possible.

Sec. 517.   Traveler redress improvement.

    This section requires the Administrator of the 
Transportation Security Administration (TSA) to ensure 
availability of the Department of Homeland Security Traveler 
Redress Inquiry Program (DHS TRIP) to adjudicate inquiries for 
individuals who are U.S. citizens or lawful permanent 
residents; have filed an inquiry with DHS TRIP after receiving 
enhanced screening at an airport passenger security checkpoint 
more than three times in any 60-day period; and believe they 
have wrongly been identified as a threat to aviation security. 
It also requires the Administrator to provide a report to the 
House Committee on Homeland Security and the Senate Committee 
on Commerce, Science and Transportation on the implementation 
of the process described above not later than 180 days after 
enactment of this Act.
    This section also requires the Administrator of TSA to 
review and update the Privacy Impact Assessment for the Secure 
Flight programs to ensure that the Assessment accurately 
reflects the operation of such programs. It requires the 
Assessment to be published on a publicly available website and 
submitted to the House Committee on Homeland Security and the 
Senate Committee on Commerce, Science and Transportation.
    Additionally, this section requires the Assistant 
Administrator of TSA's Office of Intelligence and Analysis to 
coordinate a comprehensive review of the Transportation 
Security Administration's intelligence-based screening rules 60 
days after the enactment of this Act and every 120 days 
thereafter in conjunction with TSA's Office of Civil Rights and 
Liberties, Office of the Ombudsman, Office of Traveler 
Engagement, Office of Chief Counsel, Privacy Office, the 
Federal Air Marshal Service, and DHS's Office of Civil Rights 
and Liberties, Office of General Counsel, Privacy Office and 
Traveler Redress Inquiry Program. It also requires that all of 
these entities be notified not later than 48 hours after 
changing, updating, implementing or suspending an intelligence-
based screening rule.
    This section also requires that the TSA Administrator 
ensures that intelligence-based screening rules are 
incorporated in the risk analysis conducted during the Federal 
Air Marshal mission scheduling process. Not later than 180 days 
after enactment of this Act the Administrator is required to 
submit a report to the House Committee on Homeland Security and 
the Senate Committee on Commerce, Science and Transportation on 
the implantation of the new scheduling process.
    This section also requires that the Government 
Accountability Office conduct a study on the effectiveness of 
intelligence-based screening rules on mitigating potential 
threats to aviation security not later than 1 year after 
enactment of this Act. The study will also examine the 
coordination between TSA, DHS and other relevant partners 
relating to changing, updating, implementing or suspending 
intelligence-based screening rules.
    TSA employs intelligence-based screening rules to flag 
individuals for enhanced screening at security checkpoints-on 
both domestic flights and flights coming into the United States 
from abroad. This program was conceived by TSA's Office of 
Intelligence Analysis as a way to identify individuals who may 
not be formally watchlisted, but may present a risk to aviation 
security.
    The Committee has significant concerns with TSA's 
intelligence-base screening rules program as it circumvents the 
formal watchlisting process. Moreover, while there is a redress 
process to adjudicate cases of individuals who are placed on 
the ``No Fly List,'' there is currently no redress process for 
an individual who feels that they have been repeatedly selected 
for enhanced screening due to an error.

Sec. 518.   Screening in areas other than passenger terminals.

    This section authorizes the Administrator of TSA to provide 
screening services to commercial charter air carriers in areas 
other than primary passenger terminals upon the request of such 
a carrier. Such a carrier requesting such services shall direct 
the request to the Federal Security Director of the airport 
where such services are requested. The Federal Security 
Director of such airport may provide screening services if they 
are available. The Administrator shall enter into an agreement 
with a commercial charter air carrier for compensation for all 
reasonable costs, including overtime, of such screening 
services.
    The committee believes that the Administrator should have 
the authority to provide security screening services to a 
commercial charter air carrier in areas other than primary 
passenger terminals, as long as the commercial charter air 
carrier has entered into an agreement with TSA to provide 
reimbursement for such services, and the Federal Security 
Director has security screening personnel and other resources 
available.

Sec. 519.   Federal Air Marshal Service agreements.

    This section directs the Administrator to develop a 
standard working document that shall be the basis of all 
negotiations and agreements between the FAMS and foreign 
governments and partners regarding Federal Air Marshal coverage 
of flights to and from the United States. This section also 
requires such agreements to be written and signed by the 
Secretary of Homeland Security or the Secretary's designee. 
Following the signing of such agreements, the relevant 
congressional committees must be notified within 30 days.
    The committee believes that the Federal Air Marshal Service 
(FAMS) should develop a written document outlining the basis of 
all negotiations and agreements for FAMS coverage between the 
U.S. and foreign governments or partners. Further, the 
committee is concerned that the Federal Air Marshal Service 
does not maintain written agreements between the United States 
and foreign governments or partners outlining the terms and 
conditions of agreements pertaining to the coverage of flights 
by Federal Air Marshals. In the past, the Administration has 
refused to provide the committee with information and 
documentation regarding FAMS agreements hindering the 
committee's oversight efforts, making it necessary for the 
Administration to transmit all new agreements to Congress.

Sec. 520.   Federal Air Marshal mission scheduling automation.

    This section directs the Administrator of TSA to seek to 
acquire automated software for the scheduling of FAMS missions 
based on current risk modeling.
    Currently, the Federal Air Marshal Service relies on manual 
methods to schedule missions. Given the existence of off-the-
shelf and customizable scheduling software, the committee 
directs FAMS to pursue automated scheduling software to achieve 
increased efficiencies and security effectiveness.

Sec. 521.   Canine detection research and development.

    This section requires the Department of Homeland Security 
(DHS) to conduct an audit of all canine training programs 
within DHS and convene a working group of representatives from 
all such programs to make recommendations on possible 
efficiencies that could be gained by integrating training 
standards and facilities.
    This section also requires the Administrator of the TSA to 
develop a staffing allocation model for canines to determine 
the optimal number of passenger screening canines at airports 
in the United States.
    Finally, this section requires the Secretary of DHS to 
submit to the House Committee on Homeland Security and the 
Senate Committee on Commerce, Science and Transportation a 
report on the recommendations made in the aforementioned 
working group not later than 180 days after enactment of this 
Act.
    Canines are an invaluable passenger screening tool in that 
they both reduce checkpoint wait times and increase security 
effectiveness. Demand for additional canine teams remains high, 
but TSA is not currently training enough canines to meet the 
ongoing need. TSA should explore expanding kennel space at the 
existing training facility at Lackland Air Force Base or 
opening a second training facility. Further, the committee 
requests a briefing by TSA on outreach and coordination efforts 
with private explosive detection canine production and training 
companies.

Sec. 522.   International Civil Aviation Organization.

    This section directs the U.S. Ambassador or Charge 
d'Affaires to the United States Mission to the International 
Civil Aviation Organization to pursue improvements to airport 
security, including introducing a resolution to raise minimum 
standards for airport security if practicable. This section 
also directs the Ambassador or Charge d'Affaires to report to 
the relevant congressional Committees no later than 180 days 
after the enactment of this Act on the aforementioned efforts.
    The committee believes that the minimum security standards 
for airport security set forth by the Chicago Convention 
established by the International Civil Aviation Organization 
are not robust enough in the current threat environment where 
we have repeatedly seen terrorist organizations planning 
attacks targeting aviation. Therefore, the committee believes 
the United States should take a leadership role at the ICAO in 
building consensus among member States to raise these 
standards.

Sec. 523.   Passenger security fee.

    This section prohibits the Secretary of Homeland Security 
from incorporating an increase in the passenger security fees 
under section 44940 of title 49 U.S. code in the annual budget 
proposal to Congress unless an increase to the fee has been 
authorized by Congress prior to the submission of the 
President's Budget Proposal.
    For a number of years, both Republican and Democratic 
Administrations have proposed increases in the passenger 
security fee as an offset in the annual budget proposal, 
despite no such fee increase having been authorized by 
Congress. The committee believes this practice should not 
continue absent an authorization of an increase in the 
passenger security fee by Congress.

Sec. 524.   Last point of departure airport certification.

    This section amends Subparagraph (B) of section 44907(a)(2) 
of title 49, United States Code, by inserting ``, including the 
screening and vetting of airport workers'' before the semicolon 
at the end.
    In light of evolving threats to aviation security by 
individuals with access to sensitive areas of the airport and 
aircrafts, the Committee believes that TSA should collect data 
about how airport workers are vetted at airports that serve as 
last points of departure to the United States.

Sec. 525.   Security standards at foreign airports.

    This section amends section 44907 of title 49, United 
States Code, in subsections (a) through (d) by striking 
``Secretary of Transportation'' each place it appears and 
inserting ``Secretary of Homeland Security''. This section also 
amends section 44907 of title 49, United States Code, in 
subsection (e), in the matter preceding paragraph (1) by 
striking ``and 40106(b) of this title, the Secretary of 
Transportation, with the approval of the Secretary of State and 
without notice or hearing, shall'' and inserting ``40106(b), 
and 41307 of this title, at the request of the Secretary of 
Homeland Security and with the approval of the Secretary of 
State and without notice of a hearing, the Secretary of 
Transportation shall''. Finally this section also amends 
subsection (e) by striking ``when the Secretary of 
Transportation decides'' and inserting ``when the Secretary of 
Homeland Security decides''.
    When responsibility for aviation security was transferred 
from the Department of Transportation to the Department of 
Homeland Security, Section 44907 of title 49, United States 
Code, was not updated to reflect this change. This section 
makes it clear that it is the Secretary of Homeland Security 
that is ultimately responsible for taking actions to ensure 
that foreign airports and air carriers are in compliance with 
internationally recognized security standards and has the 
authority to suspend flights from last point of departure 
airports due to security related concerns.

Sec. 526.   Security incident response at airports and surface 
        transportation hubs.

    This section amends the Gerardo Hernandez Airport Security 
Act of 2015 (Public Law 114-50; 49 U.S.C. 44903 note) in 
section 3 subsection (b), in the matter preceding paragraph 
(1), by striking ``may'' in each place it occurs and inserting 
``shall''; by redesignating subsection (c) as subsection (d); 
and by inserting after subsection (b) a new subsection which 
requires the Administrator of the TSA to review the active 
shooter response guidelines specified for Department of 
Homeland Security personnel and make a recommendation to the 
Secretary of DHS to modify such guidelines for personnel who 
are certified Federal law enforcement officials and for 
personnel who are uniformed but unarmed security officials. 
This section also amends section 7 of the aforementioned Act by 
in subsection (b), in the matter preceding paragraph (1), by 
striking ``may'' in each place it appears and inserting 
``shall'' and by redesignating subsections (c) and (d) as 
subsections (d) and (e) and inserting after subsection (b) a 
subsection which requires the Administrator of TSA to review 
the active shooter response guidelines specified for Department 
of Homeland Security personnel and make a recommendation to the 
Secretary of DHS to modify such guidelines for personnel who 
are certified Federal law enforcement officials and for 
personnel who are uniformed but unarmed security officials.
    On January 6, 2017, an active shooter opened fire in the 
baggage claim area of Fort Lauderdale-Hollywood International 
Airport causing a mass evacuation of the airport. A perceived 
active shooter situation at John F. Kennedy International 
Airport on August 14, 2016, similarly caused a mass evacuation 
and subsequent delay. In the wake of these incidents, it is 
clear that our Nation's airports are not all adequately 
prepared to coordinate mass evacuations therefore the committee 
deems it necessary to require airports to prepare for these 
situations.
    Further, following these incidents there were reports of 
uniformed TSA personnel adding to the chaos and panic by 
running and pushing passengers as they exited the terminals. It 
is the committee's understanding that the Department of 
Homeland Security trains all personnel to ``run, hide, fight'' 
in the event of an active shooter situation. However, it does 
not seem appropriate for all personnel to receive this training 
given that there are certified Federal law enforcement officers 
that work for the Department. The committee believes that 
despite the fact that transportation security officers are not 
law enforcement officials, the Secretary should consider 
revising active shooter guidance for these individuals who 
serve important safety and security functions.

Sec. 527.   Airport security screening opt-out program.

    This section requires the Administrator of TSA to make best 
efforts to enter into a contract with a private screening 
company to provide screening services at an airport not later 
than 180 days after the date of approval of an application 
submitted by the operator of such airport. This section also 
amends the aforementioned section of the U.S. Code in 
subparagraph (A) of paragraph (4), as so redesignated, in the 
matter preceding clause (i), by striking ``not later than 60 
days following the date of the denial'' and inserting 
``immediately upon issuing the denial''.
    Furthermore, this section strikes subsection (h) of the 
aforementioned section of the U.S. Code and inserts a new 
subsection (h) which allows the Administrator of TSA to 
nominate to the head of the contracting activity an individual 
representing the airport operator that applied and has been 
approved to have security screening services carried out by a 
qualified private screening company. This section also adds a 
new subsection (i) which encourages the operator of an airport 
at which screening services are provided to recommend to the 
Administrator of the TSA innovative screening approaches and 
technologies. Upon receipt of such recommendations, the 
Administrator shall review and, if appropriate, test, conduct a 
pilot project, and, if appropriate, deploy such approaches and 
technologies.
    The committee believes that when an airport chooses to 
participate in the Screening Partnership Program (SPP) that 
they should participate in the contract evaluation and award 
process. Additionally, the period of time between when the SPP 
application is submitted, approved and the contract decision 
made is unduly lengthy and should be truncated to the greatest 
extent possible without sacrificing the integrity of the 
procurement process.

Sec. 528.   Personnel management system review.

    This section requires the Administrator of TSA to convene a 
working group consisting of representatives of the 
Administration and representatives of the labor organization 
representing security screening personnel to discuss reforms to 
the Administration's personnel management system, including 
appeals to the Merit Systems Protection Board, not later than 
30 days after enactment of this Act. This section also requires 
the working group to transmit to the House Homeland Security 
Committee and the Senate Committee on Commerce, Science and 
Transportation a report containing recommendations to reform 
the Administration's personnel management system, not later 
than 1 year after enactment of this Act.
    The committee acknowledges that Transportation Security 
Officers (TSOs) believe they have legitimate grievances that 
they cannot address through the existing grievance resolution 
process. The committee believes that TSA could improve and 
streamline the grievance resolution process in a way that would 
gain efficiencies at headquarters and improve the morale of 
frontline workers. Therefore, the committee believes that TSA 
should establish a working group in conjunction with the 
American Federation of Government Employees (AFGE) which 
represents security screening officers and issue a report with 
recommendations to improve the grievance resolution process. 
The committee does not expect TSA to implement the 
recommendations in this report absent further congressional 
action.

Sec. 529.   Innovation task force.

    This section allows the Administrator of TSA to establish a 
task force to collaborate with air carriers, airport operators, 
and other aviation security stakeholders to foster the pursuit 
of innovations in aviation security prior to the acquisition 
process. The task force is authorized to conduct activities 
designed to identify and develop an innovative technology or 
capability with the potential of enhancing aviation security. 
This section also authorizes the composition of such a task 
force and notes that the Federal Advisory Committee Act (5 
U.S.C. App.) shall not apply.
    The Committee supports the work done by TSA's Innovation 
Task Force (ITF), which was originally established by former 
Administrator Neffenger in the Spring of 2016. The Committee 
encourages the ITF to continue its collaboration with aviation 
and surface transportation security stakeholders in an effort 
to develop, test and deploy innovative new technology in areas 
at and outside the security screening checkpoint, such as 
employee screening checkpoints and the public areas of 
airports. The ITF's initial focus on automated screening lane 
technology shows promises at enhancing passenger facilitation 
and security operations, more recent lines of effort in 
technologies such as computed tomography and biometric 
identification are welcome developments.

Sec. 530.   Airport law enforcement reimbursement.

    This section directs the Administrator of TSA to submit to 
the House Committee on Homeland Security and the Senate 
Committee on Commerce, Science and Transportation, a report on 
TSA's law enforcement officer reimbursement program, not later 
than 120 days after the date of enactment of the Act. This 
report shall include information related to the current 
structure of the program and law enforcement activities covered 
by the program, an assessment of threats at airports, the 
annual costs to airport authorities for providing law 
enforcement for covered activities related to the security 
checkpoint, and proposed methodology for funding allocations.
    In the Administration's Fiscal Year budget proposal to 
Congress, the Administration proposed the elimination of the 
airport law enforcement reimbursement program. The committee 
recognizes that budgets across the Department of Homeland 
Security and the whole of government are constrained. However, 
airports and airlines remain a high-profile target for 
terrorists and other criminals conducting illicit activity that 
has the potential to put the public in danger. While the 
Transportation Security Administration provides security 
screening services at the checkpoint, these individuals who 
provide such services are not sworn law enforcement and do not 
have the authority, equipment or training to make arrests or 
interdict criminal or terrorist activity. Therefore, a robust 
law enforcement presence at airports is critical to ensuring 
the safety of the traveling public. The committee supports TSA 
reimbursement of local law enforcement for these purposes, and 
given the changing threat environment believes TSA should 
reexamine the threat and provide the committee with 
recommendations to reform the program to ensure that resources 
are being directed where the need is most acute.

    Subtitle C-Transportation Security Screening Personnel Training 
                           and Accountability

Sec. 531.   Transportation security training programs.

    This section authorizes the TSA training program for new 
security screening personnel at the Federal Law Enforcement 
Training Center (FLETC) in Glynco, Georgia. This section also 
requires the Administrator of TSA to establish recurrent 
training for security screening personnel that addresses 
updates to screening procedures and technologies not later than 
180 days after enactment of this Act. Finally, this section 
requires the Government Accountability Office to issue a report 
on the findings of a study on the effectiveness of the security 
screening personnel initial training program at FLETC.
    In January 2015, former TSA Administrator Peter Neffenger 
established the TSA Academy at the Federal Law Enforcement 
Training Center (FLETC) in Glynco, Georgia, in order to 
establish a centralized, consistent and coordinated approach to 
training new security screening personnel. In addition to the 
training program for new security screening personnel, TSA also 
developed new training for Transportation Security Executive 
Service level executives and other employees at various levels 
throughout the agency. The committee is encouraged by these 
developments, but would like to see independent validation by 
the Government Accountability Office that the training at the 
Academy is leading to improved performance and effectiveness 
and is a valuable use of taxpayer dollars.

Sec. 532.   Alternate new security screening personnel training program 
        cost and feasibility study.

    This section requires the Administrator of TSA to conduct a 
cost and feasibility study of developing a training program 
within 50 miles of a security screening personnel's duty 
station that will provide such personnel with an equal level of 
training as is administered at FLETC.
    While the establishment of a unified training center for 
transportation security officers (TSOs) in Glynco, Georgia, at 
the Federal Law Enforcement Training Center (FLETC) has 
reportedly increased the morale and strengthened the mission of 
TSA, it also has unintended consequences. The academy requires 
new TSOs to spend 6 weeks in Glynco, possibly dissuading highly 
qualified and motivated individuals from applying to TSA due to 
family and other obligations, such as lack of childcare or 
enrollment in school. TSA should examine the impact of these 
unintended consequences on its recruiting efforts and ability 
to onboard part-time personnel when necessary, and conduct a 
cost and feasibility assessment of training to the same 
curriculum and standards at FLETC that would be accessible to 
individuals who are unable to travel for an extended period of 
time.

Sec. 533.   Prohibition of advance notice of covert testing to security 
        screeners.

    This section requires the Administrator of the 
Transportation Security Administration (TSA) to ensure, to the 
greatest extent practicable, that information concerning a 
covert test of a transportation security system to be conducted 
by a covert testing office, the Inspector General of the 
Department of Homeland Security or the Government 
Accountability Office is not provided to any individual 
involved in such test prior to its completion. This section 
also outlines a number of exceptions to the prohibition of 
advanced notification described above.
    The committee directs the Administrator of TSA, to the 
greatest extent practicable, to ensure that the least number of 
people possible are notified of covert testing done at airport 
security screening checkpoints. The committee recognizes that a 
limited number of individuals need to be notified prior to 
testing to ensure the safety of personnel conducting testing, 
and that it may be necessary for such personnel to disclose 
their identity to avoid panic that could lead to a public 
safety or security incident. However, disclosure of covert 
testing should be limited to avoid compromising the integrity 
of testing results and trends.

       Subtitle D-Airport Access Controls and Perimeter Security

Sec. 541.   Reformation of certain programs of the Transportation 
        Security Administration.

    Subsection (a) provides definitions for the following terms 
in correspondence with the act. The term ``Administration'' 
means the Transportation Security Administration (TSA). The 
term ``Administrator'' means the Administrator of the 
Transportation Security Administration. The terms ``air 
carrier'' and ``foreign air carrier'' have the meaning given 
such terms in section 40102 of title 49, United States Code. 
The terms ``secured area,'' ``Security Identification Display 
Area,'' and ``sterile area'' have the meaning given such terms 
in section 1540.5 of title 49, Code of Federal Regulations. 
``Appropriate congressional Committees'' refers to the 
Committee on Homeland Security of the House of Representatives 
and the Committee on Homeland Security and Governmental Affairs 
and the Committee on Commerce, Science, and Transportation of 
the Senate. The final term, ``Intelligence Community,'' refers 
to the meaning given such a term in section 3(4) of the 
National Security Act of 1974 (50 U.S.C. 3003 (4)).
    Subsection (b) amends the Homeland Security Act of 2002 by 
directing the Administrator in consultation with the Aviation 
Security Advisory Committee to submit to the appropriate 
congressional committees and the Comptroller General of the 
United States, a cost and feasibility study of a statistically 
significant number of airports. The study should concern the 
cost and feasibility of all employee entry and exit points that 
lead to secure areas of airports being comprised of a secure 
door with a card and pin entry or biometric technology, 
surveillance video that is stored for at least 30 days, and 
advanced screening technology. The advanced screening 
technology ought to include one of the following: a 
magnetometer, explosive detection canines, explosives trace 
detection, advanced imaging technology, or x-ray bag screening 
technology.
    The report will include information from airports that 
already have such technology implemented, screening 100 percent 
of employees that enter and exit the secure area. The report 
shall include costs associated with establishing employee entry 
and exit operational technology and a cost comparison of the 
requirements based on whether the requirements were implemented 
by the Administration or the airports. Once the report is 
complete, the Comptroller General shall review the study for 
its reliability and efficiency and will report to the 
appropriate congressional committees. The Committee believes a 
reliable cost and feasibility study to be a necessary source of 
data for stakeholders, TSA, and Congress to make future 
decisions on aviation worker screening at airports. Through 
significant oversight in the 114th and 115th Congresses, the 
Committee has found that there remains a lack of effective 
access controls at airports across the United States, despite 
increased and pronounced concerns of insider threats to 
aviation security from individuals with secure access to 
sterile and otherwise sensitive areas of airports. While 
stakeholders and TSA have articulated a desire to create an 
expectation of screening without implementing full employee 
screening, the Committee has not been provided sufficient data 
or evidence on the security effectiveness of different forms 
and levels of screening. With a litany of access controls 
breaches in recent years and investigations uncovering 
extensive criminal networks within the aviation system, the 
Committee believes more data is necessary as a means of 
identifying potential future improvements to screening.
    Subsection (c) focuses on the security awareness of 
credentialed airport populations regarding insider threats to 
aviation security and best practices related to airport access 
control. The Committee believes that aviation workers with 
trusted access to sensitive areas of airports should be given 
security awareness related to the need to mitigate insider 
threats to aviation and best practices related to access 
controls.
    Within 180 days of the enactment of this Act, the 
Administrator shall consult various air carriers, foreign air 
carriers, airport operators, vendors, and airport 
concessionaries to assess credentialing standards, policies, 
and practices to ensure that insider threats to aviation 
security are adequately addressed. The report must be submitted 
to appropriate congressional committees no later than 30 days 
after the assessment has been completed. Within 60 days of the 
enactment of this Act, the Administrator must require social 
security numbers of individuals applying for SIDA, sterile, and 
air operations area access. This currently exists as a security 
vulnerability in the aviation sector, as individuals are not 
statutorily required to provide social security numbers for 
vetting purposes, sometimes leaving gaps in necessary vetting 
capabilities. The Committee believes requiring this data 
submission along with applications for secure access 
credentials will enhance the overall integrity of security 
vetting among credentialed aviation workers.
    Subsection (d) requires the Administrator, working with 
airport operators, to identify advanced technologies that will 
secure employee access to secure and sterile areas of the 
airport. The act will also ensure that all credentialed 
aviation worker populations are constantly vetted through the 
Federal Bureau of Investigation's Rap Back Service. Within 180 
days after the enactment of this Act, the Administrator shall 
identify means to leverage resources of the Department of 
Homeland Security and the intelligence community to educate 
Administration personnel on insider threats. The Administrator 
shall ensure that the Playbook operations--Administration-led 
employee physical inspection efforts-are focused on providing 
the greatest level of security effectiveness. The Committee 
recognizes that advanced biometric security technologies can 
provide enhanced legitimacy to access controls at airports. 
Similarly, the Committee believes that the FBI's Rap Back 
Service can achieve significant improvements in the visibility 
the Administration and airports have into potential 
disqualifying offenses committed by credentialed aviation 
workers. Ensuring that credentialed populations are enrolled 
will not only lower the background check costs for airports 
stakeholders, but will also provide much faster insight into 
potential insider threats. The agency's Playbook operations 
sometimes focus on conducting physical inspections of 
credentialed aviation workers as a means of mitigating 
potential security risks. The Committee believes that the 
Administration should work to make these operations more 
strategic, targeted, and effective in order to achieve the 
desired expectation of screening. Historically, the Committee 
has been concerned that Playbook operations targeting aviation 
workers has focused too broadly on screening a high number of 
employees, rather than being strategic in screening areas of 
vulnerability. While the Committee is encouraged by recent 
efforts to achieve this goal, this provision will ensure that 
such inspection efforts achieve maximum security effectiveness.
    This provision also works to ensure that the Administrator 
shall increase covert testing of Playbook employee screening 
and measure existing security operations. The Administrator 
shall also provide to appropriate stakeholders the results of 
the testing, and recommendations on how to improve security 
screening operations. The Administrator, under this Act shall 
submit to the appropriate congressional committees an annual 
transparency report on the frequency, methodology, strategy, 
and effectiveness of employee screenings at airports. The 
Committee believes that both Congress and the appropriate 
stakeholders should have visibility into the effectiveness and 
results of employee screening operations at airports, in order 
to obtain an accurate assessment of insider threat mitigation 
efforts.
    The provision also ensures that within 180 days of its 
enactment, the Administrator, along with the Aviation Security 
Advisory Committee, shall compile a national data base of 
airport employees who have had their badges revoked for failure 
to comply with security requirements. The Administrator will 
determine the proper reporting mechanisms for airports, air 
carriers, and foreign air carriers to submit the data of 
employees with revoked data, as well as access to such a data 
base. The Administrator will reestablish employees who were 
wrongly added to the list. Currently, there exists a startling 
lack of coordination and communication within the aviation 
security community related to aviation workers who have had 
their secure credentials revoked. The Committee believes that 
as the arbiter of security threat assessments for aviation 
workers, TSA should take steps to establish a national data 
base of aviation workers who have had their credentials revoked 
for failure to comply with security requirements. This will 
enhance TSA's ability to provide accurate security threat 
assessments to airport stakeholders for individuals applying 
for access to sensitive areas of airports. The Committee also 
believes in the need for a redress process for employees who 
have been wrongly added to such data base.
    Subsection (e) requires the Department of Homeland 
Security, as the lead interagency pertaining to insider threat 
investigations and mitigation efforts at airports, shall make 
every effort to coordinate with other relevant Government 
entities when involved in such investigations.
    Subsection (f) authorizes the Secretary of the Department 
of Homeland Security to utilize Homeland Security 
Investigations personnel and any other DHS personnel to form 
airport task forces to investigate and mitigate insider threats 
to aviation security in coordination with Federal, State, 
local, tribal, and territorial law enforcement partners. While 
the Department of Homeland Security serves as the interagency 
lead on insider threat investigation and mitigation efforts at 
airports, DHS and its components should make every effort to 
coordinate with other relevant Federal, State, and local 
entities. Moreover, this section should not be read to construe 
a change or modification in existing, well-established 
jurisdictional boundaries between Federal, State, and local 
entities. The Committee believes that the Department's Homeland 
Security Investigations airport task forces are a valuable 
counterterrorism and insider threat mitigation tool. These task 
forces have served as interagency coordinators for countless 
investigations and should remain the primary Federal effort in 
investigation and mitigating insider threats to aviation 
security.
    Subsection (g) implements a 90 day policy in which the 
Administrator shall submit to the appropriate congressional 
committees a plan to conduct recurring reviews of the security 
controls for Administration information technology systems at 
airports. This provision is based on recent findings by the 
Department of Homeland Security's Inspector General that TSA's 
information technology security is in need of more stringent 
oversight and accountability.

Sec. 542.   Airport perimeter and access control security.

    Subsection (a) requires the Administrator of the 
Transportation Security Administration (TSA) to provide an 
update to the Transportation Sector Security Risk Assessment 
(TSSRA) no later than 120 days after the Act's enactment with 
an aviation sector update. No more than 180 days after the 
enactment of the Act, the Administrator must also provide an 
update with the latest and most up-to-date intelligence 
information pertaining to the Risk Assessment of Airport 
Security in addition to determining a timeframe for when 
further updates to the Risk Assessment of Airport Security will 
occur. No more than 90 days after the Act's enactment, a 
system-wide assessment of airport access control points and 
airport perimeter security must also occur.
    The security risk assessment shall include those updates 
reflected in the findings of both the TSSRA and Joint 
Vulnerability Assessment (JVA) including changes to the risk 
environment pertaining to airport access control points and 
airport perimeters. The assessment shall also utilize security 
data for analysis of system-wide trends related to airport 
access control points and airport perimeter security so as to 
better inform risk management decision. Finally, the assessment 
shall take into consideration the geographic and current best 
practices utilized by airports to help mitigate potential 
vulnerabilities. The results of the risk assessments shall be 
reported by the TSA Administrator to the Committee on Homeland 
Security of the House of Representatives, the Committee on 
Homeland Security and Governmental Affairs, the Committee on 
Commerce, Science, and Transportation of the Senate, relevant 
agencies and departments, and airport operators. The Committee 
believes that airport access controls and perimeter security 
remain a point of vulnerability in the ever changing threat 
landscape facing aviation security. Despite this, the Committee 
remains concerned that there is a lack of clear assessment and 
consistency in perimeter security across the country, and feels 
there is a need for TSA to take a fresh look at perimeter 
security.
    Subsection (b) requires that no more than 180 days after 
the Act's enactment, the TSA Administrator must provide an 
update to the 2012 National Strategy for Airport Perimeter and 
Access Control Security, also referred to as the National 
Strategy. This updated National Strategy shall include all 
information from the Risk Assessment of Airport Security as 
well as information pertaining to airport security-related 
activities, the status of TSA efforts to address the goals and 
objectives outlined in subsection (a) of the Act, finalized 
outcome-based performance measures and performance levels for 
each relevant and goal and objective listed under subparagraphs 
(A) and (B) of the Act, as well as input from airport 
operators.
    Finally, the TSA Administrator must implement a process for 
determining when additional updates to the strategy will be 
needed not more than 90 days after the update in subsection (a) 
of the Act is completed.

Sec. 543.   Exit lane security.

    This section authorizes $77,000,000 for each of fiscal 
years 2018 and 2019 for the purposes of carrying out subsection 
(n)(1) of section 44903 of title 49, United States Code. This 
provision concerns funding for staffing of airport exit lanes 
by Transportation Security Officers. The Committee believes 
that TSA has a statutory responsibility to continue staffing 
exit lanes, where the Administration currently provides 
staffing. However, the Committee understands the importance of 
finding efficiencies and prioritizing Transportation Security 
Officers for essential security functions, such as passenger 
screening, and recognizes that many airports have successfully 
implemented technology solutions for exit lane security. The 
Committee also believes that other efficiency and staffing 
reviews required by this legislation will provide relevant data 
for exit lane staffing in the future.

Sec. 544.   Reimbursement for deployment of armed law enforcement 
        personnel at airports.

    This section authorizes $45,000,000 for each of fiscal 
years 2018 and 2019 to carry out subsection (h) of section 
44901 of title 49, United States Code. This provision 
authorizes funding for TSA's Airport Law Enforcement 
Reimbursement Program, in order to support security efforts 
carried out by State and local law enforcement at airports 
pursuant to 49 U.S.C. 44903(c) and 49 C.F.R. part 1542. The 
Committee recognizes the value of TSA's funding for airport law 
enforcement as an important counterterrorism tool serving to 
protect the airport environment, including passenger screening 
checkpoints. Additionally, given the heightened nature of 
threats to soft target areas of transportation systems, such as 
the prescreening public areas of airports, the Committee 
believes that a robust law enforcement presence in such areas 
is important to deterring, preventing, and responding to 
attacks. As amended, section 529 of this legislation also 
requires a report on the current structure of this program, as 
well as information relating to threats requiring law 
enforcement officer response at airports, the scope of current 
law enforcement activities covered under this program, the 
annual costs to airport authorities for providing law 
enforcement for such covered activities, and a proposed 
methodology for funding allocations. The Committee believes 
this will provide important data on how this program can 
maximize efficiency and security effectiveness.

                     Subtitle E-Air Cargo Security

Sec. 551.   Air cargo advance screening program.

    This section directs the Secretary, through the 
Commissioner of CBP and in coordination with the Administrator 
of TSA, to implement the long-piloted Air Cargo Advance 
Screening program, ensuring DHS access to relevant security 
data and enhanced ability to protect against threats to cargo. 
The Committee recognizes the desire of both industry 
stakeholders and the Department to fully implement this program 
and issue a final rule on air cargo advance screening for the 
purposes of receiving data and inspecting high-risk cargo. The 
Committee believes that the Department needs to take actionable 
steps to implement the program, which is broadly supported by 
industry, taking into account the lessons learned from the 
pilot, as well as industry stakeholder perspectives on how the 
program should be implemented and carried out.

Sec. 552.   Explosives detection canine teams for air cargo security.

    This section directs TSA to issue standards to be used to 
certify third-party canines for use in the air cargo sector, in 
order to expand the number of canines being used for cargo 
screening and enhance security in an operationally efficient 
manner. The Committee believes third-party, non-Federal 
explosives trace detection canines are a valuable tool in 
screening air cargo and that TSA should issue standards to be 
used to certify such canines in a timely manner. The Committee 
recognizes that TSA and industry partners have been working 
collaboratively on developing processes and standards for the 
use of third-party, non-Federal explosives detection canines to 
screening of air cargo and desires to see such collaboration 
continue.

            Subtitle F-Information Sharing and Cybersecurity

Sec. 561.   Information sharing and cybersecurity.

    This section requires the Administrator to direct Federal 
Security Directors at airports to meet at least quarterly with 
relevant stakeholders to discuss incident management protocols 
and to inform stakeholders of relevant security matters within 
a timely manner. The section also requires the creation of an 
information sharing improvement plan to enhance the overall 
quality of information sharing by TSA. Additionally, this 
section requires TSA to establish a mechanism through which to 
share aviation security best practices and develop a 
cybersecurity risk assessment model to evaluate cyber risks to 
aviation security. Additionally, the section directs TSA to 
seek enhanced sector participation in cybersecurity mitigation 
efforts and directs the Secretary, upon request, to conduct a 
cybersecurity vulnerability assessment for airports and air 
carriers. As amended, the provision also ensures clarity that 
requirements under this section pertain exclusively to aviation 
security. Additionally, the amended provision requires a 
cybersecurity vulnerability assessment of the data transmitted 
and held for the Department's trusted traveler and security 
credentialed populations, such as TSA PreCheck and the TWIC 
program.
    Through its oversight, the Committee has come to appreciate 
the vital role that relationships among airport operators, 
aviation stakeholders, and local TSA personnel play in the 
overall effectiveness of aviation security operations and 
coordination. The Committee believes TSA and its Federal 
Security Directors should take all necessary steps to regularly 
engage with stakeholders on the ground and maintain productive 
working relationship. Additionally, TSA should remain a 
clearinghouse of aviation security best practices and establish 
effective strategies, policies, and procedures for information 
sharing. Further, the Committee believes that the cybersecurity 
landscape continues to shift and that the aviation community 
remains a point of vulnerability. Because of this, the 
Committee believes that the Secretary, in consultation with 
relevant partners, should develop an aviation security risk 
assessment model to identify risks to cybersecurity in the 
aviation environment. The Committee believes that cybersecurity 
mitigation efforts should be voluntary on the part of industry 
stakeholders and that risk assessments should only be conducted 
upon request from the stakeholder.
    The Committee also believes that the Department must work 
to ensure that potential vulnerabilities in the security of 
personally identifiable information held in its various trusted 
traveler or vetting programs are identified and mitigation 
strategies implemented. The Committee notes that the 
President's budget request for Fiscal Year 2018 estimates a 
growth in PreCheck participation. The Committee believes that 
ensuring the American flying public that their most sensitive 
data, including their biometrics, is secure will foster more 
confidence within the population that TSA needs to attract to 
the PreCheck program.

               Subtitle G-Surface Transportation Security

Sec. 571.   Definitions.

    This section defines terms used in this Subtitle.

Sec. 572.   Surface transportation security assessment and 
        implementation of risk-based strategy.

    This section requires the Administrator of the 
Transportation Security Administration to conduct a 
vulnerability and risk assessment for surface transportation 
using current threat intelligence. This section further 
requires the Administrator to develop and implement a multi-
modal, risk-based strategic plan to mitigate threats identified 
in the risk assessment, and coordinate with other stakeholders 
in the implementation of the plan. This section further 
requires the Administrator to report to Congress on the 
security assessment and the implementation of the risk-based 
plan, and to provide regular updates for both.
    The Committee believes that surface transportation modes 
are of particular concern given the ongoing rise in terrorist 
attacks overseas against surface transportation hubs and other 
soft targets of transportation modes. The porous nature of 
surface transportation makes the sector difficult to secure, 
and the Committee feels there needs to be an updated security 
assessment and risk-based strategy for securing surface 
transportation modes.

Sec. 573.   Risk-based budgeting and resource allocation.

    This section requires that the TSA budget submissions 
clearly indicate which resources will be used for surface 
transportation security and which will be dedicated to 
aviation. This section further requires TSA to notify Congress 
if agency resources, including staff, were used for purposes 
not related to transportation security. In prior years, the 
Committee has been concerned that TSA has failed to clearly and 
coherently articulate surface transportation budget priorities, 
deployments, and allocations. In response to this, the 
Committee believes this provision will ensure that TSA and DHS 
provide more useful information to Congress related to surface 
transportation security efforts.

Sec. 574.   Surface transportation security management and interagency 
        coordination review.

    This section requires a GAO review of TSA's surface 
transportation program management structure, including the 
allocation of staff to different modes of transportation, and 
how the programs are developed, managed and implemented. As 
part of the above review, GAO will examine how TSA can improve 
coordination between other Federal, State, local, or industry 
stakeholders to reduce redundancy and regulatory burden. Given 
the overlapping nature of many surface transportation security 
entities, the Committee believes a GAO review to be both 
prudent and necessary in assessing the overall State of 
interagency coordination in protecting the Nation's vital 
surface transportation systems.

Sec. 575.   Transparency.

    This section requires TSA to regularly update a public 
website on the status of surface transportation rulemakings. 
This section further requires the Department of Homeland 
Security Inspector General (DHS IG) to review the required 
regulations to see if they are still necessary or relevant. The 
Committee has become concerned by stakeholder perspectives that 
rulemaking processes are often opaque and lack input from 
relevant stakeholders. Additionally, in some instances, 
previously required but unimplemented regulations may no longer 
be practicable or relevant to the current threat landscape. 
This provision will provide for greater transparency in the 
rulemaking process and give needed information on the relevancy 
or need of regulatory requirements.

Sec. 576.   TSA counterterrorism asset deployment.

    This section requires, except during times of urgent need, 
the Administrator to provide a 2-week notification to any 
affected stakeholder before terminating any TSA resource that 
was provided for 6 months or more. Additionally, the provision 
requires the development of performance measures and objectives 
for TSA's Visual Intermodal Prevention and Response (VIPR) 
teams, as well as risk-based deployment metrics. As amended, 
this provision authorizes up to 30 VIPR teams for the 
Administrator to use in support of counterterrorism efforts at 
surface and aviation transportation hubs, while requiring 
congressional notification if the number of teams drops below 
30. Moreover, the amended provision requires a report to 
Congress, after the development of the performance measures and 
objectives, on the identified number of teams needed by the 
Administrator.
    The Committee recognizes that TSA VIPR teams serve as a TSA 
counterterrorism tool in deterring and responding to terrorist 
attacks. However, the Committee also has longstanding concerns 
as to the lack of proven security effectiveness of VIPR teams, 
and believes it necessary for TSA to develop performance 
measures and objectives in order to assess the value of the 
teams and ensure that VIPR teams are deployed in a risk-based 
manner that maximizes security effectiveness. Due to the 
heightened threat landscape facing soft terror targets at 
transportation hubs, the Committee believes that it is critical 
that limited resources are directed effectively, while 
maintaining flexibility for the Secretary and the Administrator 
to deploy the resources of the Federal Air Marshal Service to 
respond to changing threats, and potential increased aviation 
mission needs.

Sec. 577.   Surface transportation security advisory committee.

    This section requires the Administrator to establish a 
Surface Transportation Security Advisory Committee to provide 
stakeholders and the public the opportunity to coordinate with 
the agency and comment on policy and pending regulations.
    The Committee has seen a significant positive impact in 
establishing the Aviation Security Advisory Committee for TSA 
to receive valuable input from stakeholders across the aviation 
sector. In establishing a similar entity for the surface 
environment, the Committee hopes to create critical lines of 
communication on security-related issues among surface 
transportation modes and the Administrator. The Committee 
recognizes that the surface transportation sector is multi-
modal and different from the aviation sector but like the 
aviation sector, has government and sector coordinating 
councils to foster collaboration. The Committee also believes 
that the advisory committee established by this provision can 
serve a valuable role in raising awareness within TSA of 
surface transportation security issues, challenges, and can be 
a critical help to the Administrator in determining policies 
and strategies aimed at protecting surface transportation 
systems. The Committee in no way intends to direct policymaking 
authority away from the Administrator or other relevant 
government entities for the surface transportation sector, but 
desires to implement a model similar to that of the Aviation 
Security Advisory Committee.

Sec. 578.   Review of the explosives detection canine team program.

    This section requires the DHS IG to conduct a review of the 
National Explosives Detection Canine Team Program to determine 
examine how TSA is administering the program and how they are 
using the canine teams to mitigate risks.
    Explosives detection canines play a critical role in 
protecting transportation assets from security threats. The 
Committee believes that the National Explosives Detection 
Canine Team Program requires prudent review in order to 
maximize the security effectiveness of and proliferate the 
overall use of explosives detection canines within 
transportation security modes.

Sec. 579.   Expansion of national explosives detection canine team 
        program.

    This section allows for the immediate expansion of 70 
additional canine teams upon passage of the legislation. It 
directs TSA to consider the DHS Inspector General's 
recommendations before adding any further additional teams. The 
Committee believes that this program requires additional 
resources in order to expand the use of explosives detection 
canines across transportation sectors and modes. Further, the 
evolving and stark threat landscape requires emphasis on 
proven, effective security resources and counterterrorism 
assets like explosives detection canines. The Committee 
believes that TSA should expand this program by 70 additional 
teams, while taking the recommendations of the DHS Inspector 
General related to this program into account before adding 
further additional teams.

Sec. 580.   Explosive detection technology.

    This section requires the Secretary to research and develop 
next generation technologies to detect explosives in 
transportation systems and transportation facilities. The 
Committee has seen worrying changes in the overall threat 
landscape and believes that the Secretary of Homeland Security 
should concentrate on advancing and prioritizing the next 
generation of explosives detection for transportation systems.

Sec. 581.   Study on security standards and best practices for United 
        States and foreign passenger transportation systems.

    This section requires the GAO of the United States to 
conduct a study of how TSA identifies international security 
best practices and disseminates that information to 
stakeholders. The Committee believes that TSA plays an 
important role in identifying and sharing international best 
practices related to transportation security but that 
improvements can be made in both policies and procedures. This 
provision will ensure that such improvements are identified by 
the required GAO study and provide TSA and Congress with 
recommendations for enhancing security.

Sec. 582.   Amtrak security upgrades.

    This section allows Amtrak to use security grant funding to 
improve passenger manifest systems to ensure that passengers 
can be identified. The Committee recognizes the important role 
that surface stakeholder data can play in preparing for and 
responding to potential threats, and believes that additional 
flexibility in how Amtrak uses its allotted grant funding can 
assist in protecting rail passengers and the passenger rail 
system from security threats.

Sec. 583.   Study on surface transportation inspectors.

    This section requires GAO to submit a report to Congress 
that reviews the effectiveness of surface transportation 
security inspectors, including hiring practices and training 
standards. The report will also determine the extent to which 
the Transportation Security Administration has used a risk-
based, strategic approach to determine the appropriate number 
of surface transportation security inspectors and if the 
Transportation Security Administration's surface transportation 
inspection policies are risk-based.
    Through its oversight activities, the Committee has 
determined a need to review TSA's Surface Transportation 
Inspectors program, due to a lack of clarity on the distinct 
roles, skills, and mission of surface inspectors. While the 
program makes up a small part of TSA's larger efforts to secure 
surface and aviation transportation system, the Committee would 
like additional information related to the overall security 
contribution, effectiveness, and performance measures of 
surface inspectors.

Sec. 584.   Security awareness program.

    This section requires the Administrator of the 
Transportation Security Administration to establish a program 
to enhance the security of surface transportation by training 
the surface transportation operators and frontline employees. 
As amended, this program is clarified as not serving in 
fulfillment of other statutorily required regulatory 
responsibilities.
    Due to the reality of the challenges in protecting surface 
transportation from threats to security, the Committee 
recognizes a need for TSA to develop a security awareness 
program for use by frontline surface transportation employees 
and surface mode operators to better recognize, understand, and 
respond to security threats.

Sec. 585.   Voluntary use of credentialing.

    This section authorizes the voluntary use of TWIC for 
security at transportation facilities other than ports. The 
Committee recognizes the security and efficiency value of 
permitting individuals requiring background investigations to 
satisfy such requirements by voluntarily obtaining a TWIC card. 
Such requirements would be due to a need for a hazardous 
material endorsement on a commercial driver's license or 
because their employment is regulated by the Transportation 
Security Administration, Coast Guard, or Department of 
Transportation or as required by the Homeland Security Act of 
2002.

Sec. 586.   Background records checks for issuance of hazmat licenses.

    This section ensures that individuals who have undergone a 
security threat assessment for a TWIC do not have to pay a 
duplicative assessment to be run for a hazardous materials 
endorsement. The Committee recognizes a need to clarify 
sometimes conflicting and duplicative background investigation 
requirements for drivers seeking to obtain credentials 
regulated by the Department of Homeland Security or the 
Transportation Security Administration. The Committee believes 
this provision increases efficiency and eliminates unnecessary 
burden on certain stakeholders and drivers requiring security 
credentials without compromising security requirements or 
standards.

Sec. 587.   Recurrent vetting for surface transportation credential-
        holders.

    This section amends Section 70105 of title 46, United 
States Code, to require the Secretary of the Department of 
Homeland Security to develop and implement a plan to utilize 
the FBI's Rap Back Service in order to establish recurrent 
vetting capabilities for individuals holding valid 
transportation security cards. The Committee recognizes the 
value of the FBI's Rap Back program for the purposes of 
providing perpetual vetting capabilities for certain 
credentialed populations requiring an FBI criminal history 
records check. The Committee believes that enabling TWIC card 
holders to be enrolled in this program will both enhance 
security and eliminate the need for biannual investigation 
requirements.

Sec. 588.   Pipeline security study.

    This section requires the Comptroller General of the United 
States within 180 days of enactment to conduct a study to 
determine the respective roles of the Department of Homeland 
Security and the Department of Transportation in pipeline 
security. Additionally, not later than 90 days after the 
submission of the aforementioned report, the Secretary shall 
submit any recommendations for changes to the Annex to the 
Memorandum of Understanding executed on August 9, 2006, between 
the Department of Homeland Security and the Department of 
Transportation or improvements to pipeline security. The 
Committee recognizes pipelines as a critical transportation 
system. Pipelines serve as a vital security concern and the 
Committee believes a security study conducted by the GAO to be 
necessary to clarify roles and responsibilities.

Sec. 589.   Repeal of limitation relating to motor carrier security-
        sensitive material tracking technology.

    This section repeals a requirement for Congress to grant 
additional approval for TSA to implement requirements on motor 
carrier sensitive security tracking technologies. The Committee 
believes that the statutory requirement for Congress to grant 
additional approval of an otherwise standard rulemaking 
authority for motor carrier security-sensitive material 
tracking technology to be duplicative and unnecessary. 
Therefore, the Committee seeks to update the existing code by 
repealing this requirement. However, the Committee in no way 
intends for this provision to be interpreted as direction by 
Congress for the Secretary to engage in a rulemaking on this 
matter. Additionally, the Committee expects that, as in all 
rulemaking efforts, any regulatory process on this matter 
includes sufficient input from stakeholder and industry 
perspectives prior to any finalization or implementation of a 
regulation.

          Subtitle H-Security Enhancements in Public Areas of 
                       Transportation Facilities

Sec. 591.   Working group.

    This section allows the Secretary of Homeland Security to 
establish a working group to promote collaborative engagement 
between the Department and public and private sector 
stakeholders to develop recommendations for enhancing public 
area security at transportation facilities. If such a working 
group is established, the Secretary shall report on the 
organization, participation, activities, findings, and non-
binding recommendations for the immediately preceding 12-month 
period. The Federal Advisory Committee Act does not apply to 
this working group or any subsidiary thereof. The Committee 
believes that recent efforts by the Department and TSA to 
promote security collaboration and awareness in response to 
increased threats to public areas of airports and other 
transportation hubs are an important part of responding to 
changing threats. The Committee hopes that this provision will 
ensure the continued efforts to prepare for and respond to 
threats targeting public areas of transportation facilities.

Sec. 592.   Technical assistance; Vulnerability assessment tools.

    This section directs the Secretary of Homeland Security to 
inform stakeholders of the availability of Departmental 
technical assistance, including vulnerability assessments, to 
help enhance public area security at transportation facilities 
and provide assistance upon request, subject to appropriations. 
Moreover, this section directs the Secretary to publish and 
disseminate best practices for protecting and enhancing the 
resiliency of public areas of transportation facilities. The 
Committee believes the Department of Homeland Security plays an 
important role in raising the overall State of security 
readiness and awareness at transportation hubs across the 
country. Additionally, the Department should be working to 
raise the level of resiliency of transportation systems.

Sec. 593.   Operations centers.

    This section requires the Administrator, within 120 days of 
enactment, to make available to stakeholders a framework for 
establishing an operations center within a transportation 
facility to promote interagency response and coordination.

Sec. 594.   Review of regulations.

    This section requires that not later than 1 year after 
enactment, the Administrator of TSA shall submit a report to 
Congress reviewing regulations, directives, policies, and 
procedures issued by the Administrator regarding the 
transportation of a firearm and ammunition by an aircraft 
passenger, and, as appropriate, plans to modify any such 
regulation, directive, policy, or procedure based on such 
review. In preparing the report, the Administrator shall 
consult with stakeholders through the Aviation Security 
Advisory Committee. The Committee believes that TSA should 
endeavor on such a review, in order to ensure consistency, 
clarity, and efficiency.

Sec. 595.   Definition.

    This section defines the term ``public and private sector 
stakeholders'' as the meaning given such term in section 
114(u)(1)(C) of title 49, United States Code, which the 
Committee believes fully encompasses the intent of the overall 
provision.

     TITLE VI-EMERGENCY PREPAREDNESS, RESPONSE, AND COMMUNICATIONS


        Subtitle A-Grants, Training, Exercises, and Coordination

Sec. 601.   Urban Area Security Initiative.

    This section amends section 2003 of the Homeland Security 
Act of 2002 by requiring States to provide a detailed 
accounting of items, services, or activities purchased 
utilizing funds retained from the Urban Area Security 
Initiative to relevant high-risk urban areas within 90 days of 
retention. The intent of this language is to ensure 
transparency and the avoidance of unnecessary duplication of 
effort between States and eligible high-risk urban areas. This 
section also requires Urban Area Security Initiative awardees 
to submit a Threat and Hazard Identification and Risk 
Assessment to the Administrator, consistent with current 
practice.
    This section codifies the period of performance for funding 
awarded under the Urban Area Security Initiative at 36 months. 
The Committee shared the concern of grant recipients that the 
previous period of performance, 24 months, did not provide a 
sufficient amount of time for grantees to complete projects, 
particularly at the subgrantee level. The Committee supports 
FEMA's decision to revert to a 36-month period of performance 
for grant programs in this Title and encourages the continued 
enforcement of that deadline.
    In addition, this section authorizes the appropriation of 
$800 million for each of the fiscal years from 2018 through 
2022 for the Urban Area Security Initiative, which is $195 
million above the current appropriated level and $350 million 
above the President's Fiscal Year 2018 budget request.

Sec. 602.   State Homeland Security Grant Program.

    This section amends section 2004 of the Homeland Security 
Act of 2002 by requiring States participating in the State 
Homeland Security Grant Program to submit a Threat and Hazard 
Identification and Risk Assessment to the Administrator, 
consistent with current practice. States are required to 
include input on their assessments from local and tribal 
governments, including first responders. First responders are 
defined in this section as representatives from local 
governmental and nongovernmental fire, law enforcement, 
emergency management, and emergency medical personnel. This 
section also codifies the period of performance for the State 
Homeland Security Grant Program at 36 months. Finally, this 
section authorizes $600 million each Fiscal Year 2018 through 
2022 for the State Homeland Security Grant Program, which is 
$133 million above the current appropriated level and $250 
million above the President's Fiscal Year 2018 budget request. 
The Committee has held numerous hearings, briefings, and 
meetings with stakeholders in the first responder community 
regarding the consistent need for homeland security investments 
provided through this program.

Sec. 603.   Grants to directly eligible tribes.

    This section codifies the period of performance for grant 
awards to directly eligible tribes at 36 months.

Sec. 604.   Law enforcement terrorism prevention.

    This section seeks to ensure that the 25 percent set aside 
for law enforcement terrorism prevention activities required 
under the State Homeland Security Grant Program and Urban Area 
Security Initiative is met by requiring the Assistant Secretary 
for State and Local Law Enforcement to work with the FEMA 
Administrator to certify and report annually to Congress that 
the grants are appropriately focused on law enforcement 
terrorism prevention activities. This section also requires the 
Assistant Secretary for State and Local Law Enforcement to 
coordinate with State, local, and tribal law enforcement 
partners on Department policies and programs that may impact 
such partners.

Sec. 605.   Prioritization.

    This section clarifies the population data that must be 
considered as part of the risk formula, including international 
tourists and military personnel living outside military 
installations.
    This section further requires the Administrator and 
Government Accountability Office to each review the risk 
formula and methodology used to determine awards for the Urban 
Area Security Initiative and the State Homeland Security Grant 
Program. Additionally, the Administrator is required to report 
the results of this review within 90 days of enactment of this 
Act to the Committee on Homeland Security and the Committee on 
Appropriations of the House of Representatives and the 
Committee on Homeland Security and Governmental Affairs and the 
Committee on Appropriations of the Senate.
    A number of stakeholders have expressed concern with the 
transparency of the risk formula utilized by FEMA to make grant 
awards. FEMA should, to the extent practicable, share as much 
data as possible with grant recipients to ensure confidence in 
the grant aware process.

Sec. 606.   Allowable uses.

    This section authorizes State Homeland Security Grant 
Program and Urban Area Security Initiative funds to be used to 
(1) enhance medical preparedness, and (2) enhance 
cybersecurity. This section consolidates two allowable use 
bills, both of which passed the House earlier this year.
    The section also requires communications expenditures to 
align with the Statewide Communication Interoperability Plan 
and be coordinated with the Statewide Interoperability 
Coordinator or Statewide interoperability governance body of 
the State, consistent with current grant guidance.

Sec. 607.   Approval of certain equipment.

    This section amends subsection (f) of section 2008 of the 
Homeland Security Act of 2002 (6 U.S.C. 609) by adding at the 
end a review process for applications seeking to purchase 
equipment or systems that do not meet or exceed applicable 
national voluntary consensus standards using funds from the 
Urban Area Security Initiative or the State Homeland Security 
Grant Program. The Administrator is required to implement a 
uniform process for reviewing such applications against the 
following criteria:
       current or past use of proposed equipment or systems by 
        Federal agencies or the Armed Forces;
       the absence of a national voluntary consensus standard 
        for such equipment or systems;
       the existence of an international consensus standard 
        for such equipment or systems, and whether such 
        equipment or systems meets such standard;
       the nature of the capability gap identified by the 
        applicant and how such equipment or systems will 
        address such gap;
       the degree to which such equipment or systems will 
        serve the needs of the applicant better than that which 
        meets or exceeds existing consensus standards; and
       any other factor determined appropriate by the 
        Administrator.
    This section also requires the Inspector General to report 
to Congress, no later than 3 years after enactment of this Act, 
on the implementation of the review process established under 
this Act that includes the number of requests to purchase 
equipment or systems that do not meet or exceed any applicable 
consensus standard evaluated under such review process; the 
number of such requests granted and denied; and how long it 
takes to review such requests. This section is identical to 
H.R. 687, which passed the House by voice vote on January 31, 
2017.

Sec. 608.   Memoranda of understanding.

    This section requires the Administrator of the Federal 
Emergency Management Agency (FEMA) to enter into memoranda of 
understanding with subject matter experts from other Department 
of Homeland Security (DHS) components and offices to ensure 
subject matter experts are involved in policy guidance 
decisions relating to the State Homeland Security Grant 
Program, Urban Area Security Initiative, Port Security Grant 
Program, and Transit Security Grant Program.

Sec. 609.   Grants metrics.

    This section requires FEMA to use information provided by 
States and high-risk urban areas in their Threat and Hazard 
Identification and Risk Assessments and State Preparedness 
Reports to determine the extent to which State Homeland 
Security Grant Program and Urban Area Security Initiative funds 
have been used effectively to close capability gaps. FEMA is 
also required to submit an assessment of the data to the 
Committee on Homeland Security and the Committee on 
Transportation and Infrastructure of the House of 
Representatives and the Committee on Homeland Security and 
Governmental Affairs of the Senate.

Sec. 610.   Grant management best practices.

    This section requires FEMA to share information on methods 
to address areas identified for improvement in grant audits 
conducted by the Department's Office of Inspector General and 
innovative projects and practices with recipients of State 
Homeland Security Grant Program and Urban Area Security 
Initiative funds as part of yearly grant guidance.
    The Committee believes that grant recipients can greatly 
benefit from sharing information on management best practices, 
corrective actions, and other innovative practices. They could 
also benefit from access to information on projects conducted 
by other jurisdictions. The Committee has received testimony 
from first responders advocating for the development of a 
searchable data base of grant projects funded through the State 
Homeland Security Grant Program and Urban Area Security 
Initiative through which grantees can reference while 
developing their own projects. The Committee supports FEMA's 
efforts to collect more project level data in grant 
applications, but acknowledges that such a data base may not be 
within FEMA's capabilities as this time. However, as FEMA gains 
greater insight into individual projects, there may be merit in 
the development of a mechanism for grant applicants to learn 
about successful projects in another jurisdiction.

Sec. 611.   Prohibition on consolidation.

    This section prohibits the Secretary of Homeland Security 
from implementing the National Preparedness Grant Program or 
any successor program to consolidate grant programs unless the 
Secretary receives prior authorization from Congress.

Sec. 612.   Maintenance of grant investments.

    This section requires grant applicants to develop a plan 
for the maintenance of equipment purchased using State Homeland 
Security Grant Program or Urban Area Security Initiative funds.

Sec. 613.   Transit security grant program.

    The Committee believes it is important to invest consistent 
resources to secure passenger surface transportation. Surface 
transportation modes serve over 28 million riders daily and 
over 10 billion riders annually. As a result, this mode of 
transportation continues to remain a terror target. For this 
reason the Committee authorizes $200 million for the Transit 
Security Grant Program for each Fiscal Year from 2018 to 2022, 
which is a 100 percent increase over the current appropriated 
level and $152 million above the President's Fiscal Year 2018 
budget request. This section amends section 1406 of the 
Implementing Recommendations of the 9/11 Commission Act of 2007 
to permit grant recipients to use funding to pay for backfill 
associated with sending personnel to security training. 
Further, this section codifies the period of performance for 
grants awarded under the Transit Security Grant Program at 36 
months, with the exception of large-scale capital security 
projects.
    During the 114th Congress, the Committee conducted a field 
hearing in Jersey City, New Jersey that addressed the critical 
security challenges facing surface transportation. Members 
heard at the field hearing that the current period of 
performance of 36 months is insufficient for transit agencies 
to complete large scale capital projects to harden their 
systems. This section addresses this issue by setting the 
period of performance for large scale capital projects at 55 
months. This section is similar to H.R. 549, which passed the 
House by voice vote on January 31, 2017.

Sec. 614.   Port security grant program.

    This section codifies the period of performance for the 
grants awarded under the Port Security Grant Program at 36 
months. The Committee recognizes the importance of this program 
to the security of our Nation's ports and, as such, this 
section authorizes $200 million from Fiscal Year 2018 through 
2022 for the Port Security Grant Program, which a 100 percent 
increase over the current appropriated level and $152 million 
above the President's Fiscal Year 2018 budget request.

Sec. 615.   National Domestic Preparedness Consortium.

    This section reauthorizes the National Domestic 
Preparedness Consortium, which was originally authorized in the 
Implementing Recommendations of the 9/11 Commission Act of 
2007. Additionally, the section requires the National Domestic 
Preparedness Consortium to provide training exercises 
simulating real response environments, such as urban areas, for 
State, local, and tribal emergency response providers. The 
section authorizes $63,939,000 for the Center for Domestic 
Preparedness for fiscal years 2018 and 2019 and the $101 
million for the remaining members of the National Domestic 
Preparedness Consortium for fiscal years 2018 and 2019, amounts 
equal to the current appropriated levels.
    The Committee believes the National Domestic Preparedness 
Consortium remains an invaluable resource to first responders, 
and therefore the entire DHS enterprise. More than 2.6 million 
first responders and emergency managers have received vital 
training through the consortium.

Sec. 616.   Rural Domestic Preparedness Consortium.

    This section authorizes the Rural Domestic Preparedness 
Consortium, which provides training to emergency response 
providers from rural communities. This section authorizes $5 
million out of the amount appropriated for the Continuing 
Training Grants to be used for the Rural Domestic Preparedness 
Consortium.

Sec. 617.   Emergency support functions.

    This section requires the Administrator to periodically 
update the National Response Framework. Additionally, based on 
findings from a recent Government Accountability Office (GAO) 
report, this section requires the President, through the 
Administrator, to develop and provide to relevant Federal 
agencies and departments, metrics to ensure readiness to 
execute responsibilities under the National Response 
Framework's Emergency Support Functions.

Sec. 618.   Review of National Incident Management System.

    The Committee believes that as threats to the homeland 
evolve, we must maintain our ability to efficiently adapt to 
the threats. This section amends the Homeland Security Act of 
2002 by requiring the National Incident Management System to be 
updated not less than once every 5 years. During this process, 
FEMA should work with critical partners in the first responder 
community, including law enforcement, to ensure their input and 
expertise is appropriately incorporated to meet capabilities in 
the field.

Sec. 619.   Remedial action management program.

    The section requires the Administrator to utilize the 
Remedial Action Management Program, authorized in the Post 
Katrina Emergency Management Reform Act of 2006, for the 
purpose of coordinating corrective actions identified as a 
result of exercises and the response to acts of terrorism and 
both man-made and natural disasters. The section also requires 
the FEMA Administrator to electronically share after-action 
reports and information on lessons learned and best practices 
from responses to acts of terrorism, natural disasters, and 
other exercises or emergencies with Congress and relevant 
Federal, State, local, tribal, and private sector officials. 
Recent GAO work has identified the need for Federal departments 
and agencies to coordinate efforts to close capability gaps 
identified in Federal response after-action reports.

Sec. 620.   Cyber preparedness.

    This section seeks to ensure information related to cyber 
risks and threats is shared with fusion centers. This section 
includes, as a function of the National Cybersecurity and 
Communications Integration Center (NCCIC), sharing information 
about cyber best practices, in addition to the sharing of cyber 
threat indicators and defensive measures currently required by 
law. The section also authorizes representatives from fusion 
centers to be assigned to the NCCIC, similar to the assignment 
of representatives from information sharing and analysis 
centers (ISACs) permitted under current law. Further this 
section expresses the sense of Congress that the Department of 
Homeland Security should, to the greatest extent practicable, 
work to establish tear lines so actionable intelligence related 
to cyber threats may be shared with those without clearances. 
This section is similar to H.R. 584, which passed the House by 
voice vote on January 31, 2017.
    The Committee has heard that, while improving, the flow of 
Federal cyber threat and risk information to State and local 
emergency response providers is slow and over-classified. 
Additionally, for several years now, FEMA has released an 
annual National Preparedness Report, which highlights the 
States' 32 core capabilities, as defined by the National 
Preparedness Goal. Since the first National Preparedness Report 
was released in 2012, States have ranked their cybersecurity 
capabilities as one of their lowest.
    The current process of sharing information has caused 
emergency response providers to be reactive rather than 
proactive in addressing the current cyber threats. To date, 
there are 79 fusion centers across the Nation with the primary 
mission to serve as the conduit between the Federal Government 
and States and localities for the sharing of intelligence and 
homeland security information. Most fusion centers have 
developed dissemination channels that can be used to ensure 
cyber threat and risk information is getting to the appropriate 
emergency response providers. Additionally, the Committee 
supports the ability of States and urban areas to use SHSGP and 
UASI funds for cyber preparedness. This section will ensure 
that SHSGP and UASI funds remain available for cyber 
preparedness. The Department should work to establish tear 
lines to ensure valuable cyber threat information is 
disseminated to all appropriate stakeholders.

Sec. 621.   Major metropolitan area counterterrorism training and 
        exercise grant program.

    This section establishes the Major Metropolitan Area 
Counterterrorism Training and Exercise Grant Program. 
Specifically, the section authorizes $39 million in annual 
grants from fiscal years 2018 through 2022 for emergency 
response providers to enable them to prevent, prepare for, and 
respond to emerging terrorist attack scenarios, including 
complex, coordinated terrorist attacks and active shooters, 
against major metropolitan areas. Eligible applicants for this 
program include emergency response providers in jurisdictions 
that are currently receiving, or that previously received, 
Urban Area Security Initiative funding. Recipients of this 
program may use the above described funding for identifying 
capability gaps, developing and updating plans, as well as 
conducting training and exercises associated with complex, 
coordinated terrorist attacks. FEMA should ensure that funding 
authorized under this section is not utilized for purely 
administrative purposes. Additionally, FEMA is required to 
collect, analyze, and disseminate information for first 
responders on lessons learned and best practices from 
activities conducted using these grant funds. This section is 
similar to H.R. 2188, which passed the Committee earlier this 
year.

Sec. 622.   Center for Domestic Preparedness.

    This section requires FEMA to develop an implementation 
plan and submit to Congress information on efforts to implement 
recommendations from the Management Review of the Chemical, 
Ordinance, Biological, and Radiological Training Facility at 
the Center for Domestic Preparedness. Additionally, the 
Government Accountability Office is required to review and 
report to Congress on FEMA's progress implementing the 
recommendations.
    Last year, the Committee learned that the Center for 
Domestic Preparedness was unknowingly using ricin holotoxin, 
rather than an inactive form of ricin, in first responder 
training at the Chemical, Ordinance, Biological, and 
Radiological Training Facility. FEMA conducted a review of the 
training facility and issued management recommendations to 
prevent another incident like this from happening.

Sec. 623.   Operation Stonegarden.

    This section establishes Operation Stonegarden, a 
Department of Homeland Security grant program for law 
enforcement agencies to help improve border security. The 
section authorizes Operation Stonegarden at $110,000,000 for 
each Fiscal Year from 2018 to 2022.

Sec. 624.   Non-Profit Security Grant Program.

    This section establishes the Non-Profit Security Grant 
Program within the Department of Homeland Security, which 
awards grants to eligible non-profit organizations for 
hardening activities including physical security enhancements 
and inspection systems to protect against terrorist attacks. 
The section authorizes the Non-Profit Security Grant Program at 
$50,000,000 for each Fiscal Year from 2018 through 2022.
    The Committee authorizes the Non-Profit Security Grant 
Program for the first time, recognizing the impact of this 
program on the security of non-profit organizations at risk of 
terrorist attacks, many of which have seen an increase in 
threats this year. In authorizing the program, the Committee 
intends the Federal Emergency Management Agency to maintain the 
current program guidelines, risk-based scoring, and review 
process.
    In recognition of this increase in threats, the Committee 
expands eligibility to non-profit organizations located outside 
of Urban Area Security Initiative (UASI) jurisdictions. The 
section divides the funding authorization between the two types 
of eligible applicants with $35 million authorized for 
organizations in UASI jurisdictions and $15 million for 
organizations outside UASI jurisdictions. This program has 
traditionally been funded as a carve out of funding 
appropriated for UASI. In expanding eligibility, the Committee 
does not intend for organizations outside of UASI jurisdictions 
to be funded from the UASI account.

Sec. 625.   FEMA Senior Law Enforcement Advisor.

    This section codifies the position, qualifications, and 
responsibilities of the Senior Law Enforcement Advisor to the 
Administrator of FEMA. The Senior Law Enforcement Advisor is 
responsible for coordinating with State, local, and tribal law 
enforcement officials to help prevent, protect, and respond to 
natural disasters, terrorist attacks, or other manmade 
disasters.
    Law enforcement stakeholders have discussed the value of 
the Senior Law Enforcement Advisor in their efforts to 
communicate effectively with FEMA. This section codifies that 
provision to ensure their voices are heard in the development 
of policies and programs.

Sec. 626.   Study of the use of grant funds for cybersecurity.

    This section requires the Administrator of FEMA, in 
consultation with relevant Department of Homeland Security 
components, to report to Congress on how State Homeland 
Security Grant Program and Urban Area Security Initiative grant 
funds are used to prepare for and respond to cybersecurity 
incidents. Every year it has been published, the National 
Preparedness Report indicates that States rank cybersecurity as 
the core capability in which they have the least confidence. At 
the same time, Urban Area Security Initiative and State 
Homeland Security Grant Program grantees generally do not 
invest significant portions of their awards in addressing 
cybersecurity gaps. In light of the evolving cybersecurity 
threats, it is critical to understand why grantees are not 
using grant funds to address this pressing national security 
issue. The Committee urges FEMA to use the findings of its 
report to better tailor grant guidance to help grantees 
identify investments that will bolster cybersecurity 
capabilities.

Sec. 627.   Technical expert authorized.

    This section codifies the Children's Technical Expert at 
the Federal Emergency Management Agency. The provision is 
identical to a provision in H.R. 1372, which passed the House 
by voice vote on April 25, 2017.
    In 2009, FEMA appointed Children's Needs Coordinator and 
established a Children's Working Group to address the unique 
needs of children during a disaster. Administrator Fugate 
eliminated the position in 2012, but restored it in 2015 
pursuant to a recommendation made by the FEMA National Advisory 
Council (NAC). According to the NAC, significant gaps remain 
related to integrating children into disaster planning. Former 
Administrator Fugate acknowledged as much when he testified 
that incorporating the needs of children into disaster policy 
and planning is ``not something that's in the DNA yet.'' At 
present, FEMA has a technical expert that focuses on the needs 
of children in disasters, but the position is not formally 
authorized. By formally authorizing the Children's Technical 
Expert, the Committee is making clear that integrating children 
in emergency planning, policies, and activities should be a 
priority at FEMA.

                       Subtitle B-Communications

Sec. 631.   Office of Emergency Communications.

    This section restricts the Secretary of Homeland Security's 
ability to change the location or reporting structure of the 
Office of Emergency Communications (OEC) without prior 
authorization from the House Committee on Homeland Security and 
the Senate Committee on Homeland Security and Governmental 
Affairs.
    First responder organizations, one of OEC's primary 
constituents, have expressed concern with the Department of 
Homeland Security's plans to move OEC as part of its 
reorganization of the National Protection and Programs 
Directorate (NPPD). The Committee is currently working with the 
Department and stakeholders on legislation authorizing NPPD and 
its structure, which will include OEC. Until such time as that 
legislation is enacted, the Committee expects OEC to remain in 
its current location.

Sec. 632.   Responsibilities of Office of Emergency Communications 
        Director.

    This section makes technical corrections to the 
responsibilities of the Director of the Office of Emergency 
Communications and codifies additional responsibilities.

Sec. 633.   Annual reporting on activities of the Office of Emergency 
        Communications.

    This section requires the Director of the Office of 
Emergency Communications to submit an annual report, for the 
next 5 years, to the Committee on Homeland Security and the 
Committee on Energy and Commerce of the House and the Committee 
on Homeland Security and Governmental Affairs of the Senate on 
the activities and programs of the Office of Emergency 
Communications. The reports must include specific information 
on the Office's efforts to: promote communication among 
emergency response providers during disasters; conduct 
nationwide outreach to foster the development of interoperable 
emergency communications capabilities; and provide 
interoperable emergency communications technical assistance to 
State, regional, local, and tribal government officials.

Sec. 634.   National Emergency Communications Plan.

    This section requires the Office of Emergency 
Communications to update the National Emergency Communications 
Plan at least once every 5 years and consider the impact of 
emerging technologies on the attainment of interoperable 
communications as part of that update.

Sec. 635.   Technical edit.

    This section makes technical corrections to the Emergency 
Communications Title of the Homeland Security Act of 2002.

Sec. 636.   Public Safety Broadband Network.

    This section requires the Under Secretary of the Department 
of Homeland Security's National Protection and Programs 
Directorate to submit information to the House Committee on 
Homeland Security, the House Committee on Energy and Commerce, 
and the Senate Committee on Homeland Security and Governmental 
Affairs on the Department of Homeland Security's 
responsibilities related to the development of the nationwide 
Public Safety Broadband Network. This includes information on 
efforts by the Department to work with the First Responder 
Network Authority to identify and address cyber risks that 
could impact the near or long term availability and operations 
of the network and recommendations to mitigate such risks.

Sec. 637.   Communications training.

    Based on the findings of a GAO report, this section 
requires the Under Secretary for Management, in coordination 
with appropriate component heads, to develop a mechanism to 
verify that radio users at the Department of Homeland Security 
receive relevant radio training.

                    Subtitle C-Medical Preparedness

Sec. 641.   Chief Medical Officer.

    This section codifies the current responsibilities of the 
Department's Chief Medical Officer, including coordinating the 
Department's policy, strategy, and preparedness for pandemic 
influenza and emerging infectious diseases; ensuring the 
Department work force has standards, policies, and metrics for 
occupational safety and health; and providing medical liaisons 
to the Department's components.

Sec. 642.   Medical Countermeasures Program.

    This section authorizes the Department of Homeland 
Security's medical countermeasures program to protect the DHS 
work force, working animals, and individuals in the 
Department's care and custody from the effects of chemical, 
biological, radiological, and nuclear agents, and to ensure 
mission continuity. The section also addresses findings from a 
September 2014 DHS Inspector General review of the medical 
countermeasures program. Additionally, this section requires 
the Chief Medical Officer to establish a medical 
countermeasures working group comprised of representatives from 
relevant Department components and offices. The working group 
is responsible for ensuring medical countermeasures standards 
are maintained and guidance is consistent. Further, the Chief 
Medical Officer must report to the House Committee on Homeland 
Security and the Senate Committee on Homeland Security and 
Governmental Affairs, within 180 days of enactment of this Act, 
on efforts made to achieve the requirements of this section.
    The Committee is concerned with findings from an August 
2014 DHS Inspector General review of the Department's medical 
countermeasure program, DHS Has Not Effectively Managed 
Pandemic Personal Protective Equipment and Antiviral Medical 
Countermeasures (OIG-14-129). As a result, the section 
addresses the Inspector General recommendations related to 
medical countermeasure quantity determination; stockpile 
replenishment; inventory tracking; and cross-component 
standards for storage, security, dispensing and documentation.

                         Subtitle D-Management

Sec. 651.   Mission support.

    This section requires the Administrator of FEMA to 
designate an individual to serve as the chief management 
official and principal advisor to the FEMA Administrator on 
matters related to the management of FEMA.
    The Committee is supportive of FEMA's efforts to strengthen 
and improve its management through the Mission Support Bureau 
and authorizes the designation of a chief management official 
and principal advisor to the FEMA Administrator on issues 
related to the five management business lines: human resources, 
procurement, information technology, real property, and 
security. The Committee believes the role of a chief management 
official is essential to the efficient functioning of the 
agency. The Committee believes FEMA must develop and implement 
management controls to ensure appropriate oversight of Agency 
management functions. The Committee continues to remain 
concerned about previous findings from the DHS Office of 
Inspector General and the Government Accountability Office. 
Findings identified trends with program offices responsible for 
the acquisition of systems that support FEMA's mission which 
did not follow appropriate acquisition policies. As a result, 
these million dollar acquisitions were subject to dysfunction, 
life cycle cost increases, and limited oversight.
    The Committee intends for the review of the five management 
business lines to identify management controls, costs, number 
of associated systems, associated capability gaps, and areas of 
duplication both at FEMA headquarters and the ten regional 
offices. Further, this review must include a strategy that 
demonstrates how the designated management official captures 
reliable, interoperable, and measurable data on all management 
and administrative activities. The strategy should address any 
problems identified in the review.

Sec. 652.   Systems modernization.

    This section requires the Administrator of FEMA to report 
to the Committee on Homeland Security and the Committee on 
Transportation and Infrastructure of the House and the 
Committee on Homeland Security and Governmental Affairs of the 
Senate on plans to modernize its grants and financial 
information technology systems within 180 days of enactment of 
this Act. The report should include lessons learned in the 
summary of all previous efforts to modernize each of these 
systems. This report should identify how each of these 
modernization efforts are meeting cost schedule expectations 
and the efforts being made to avoid delays in the acquisition 
life cycle.

Sec. 653.   Strategic human capital plan.

    This section reinStates a requirement in the Post Katrina 
Emergency Management Reform Act of 2006 requiring the 
Administrator of FEMA to develop and submit to Congress a 
strategic human capital plan. This plan must include a work 
force gap analysis, recruitment and retention analysis, 
performance metrics, and staffing goals.
    According to a July 2015 GAO report, FEMA's Workforce 
Management (GAO-15-437), FEMA's strategic work force plan for 
2008-2012 did not include performance metrics or identify 
potential work force gaps, overlaps, or inconsistencies. 
Additionally, the National Academy for Public Administration 
recommended that FEMA develop a 5-year strategic work force 
plan that addresses retention challenges by implementing goals 
and objectives for recruiting and retaining employees. In 2016, 
FEMA ranked 284 out of 355 for best place to work in the 
Federal Government according to the Partnership for Public 
Service. To address these shortcomings, the Committee continues 
the requirement that FEMA develop and implement a strategic 
human capital plan. The Committee commends FEMA's efforts to 
address these longstanding challenges by publishing the Human 
Capital Strategic Plan for Fiscal Years 2016-2020. The 
Committee will continue to follow FEMA's progress in 
aggressively address challenges facing their work force.

Sec. 654.   Office of Disability Integration and Coordination of 
        Department of Homeland Security.

    This section codifies the Office of Disability Integration 
and Coordination (ODIC) within FEMA to be responsible for 
coordinating matters relating to individuals with disabilities 
in before, during, and after natural disasters, terrorist 
attacks, or other manmade disasters. Additionally, the section 
requires the Government Accountability Office to study and 
report to Congress on the funding and staffing needs of the 
Office of Disability Integration and Coordination.
    Hurricane Katrina revealed that adequate measures had not 
been taken to integrate the needs of vulnerable populations 
into disaster response planning. Congress responded by, among 
other things, establishing the position of the Disability 
Coordinator at FEMA to assess the unique needs of children 
related to the preparation for, response to, and recovery from 
all hazards, including major disasters and emergencies.
    The Disability Coordinator was tasked with providing 
guidance and coordination on matters related to individuals 
with disabilities in emergency planning and relief efforts, 
providing guidance to ensure disaster response plans, including 
evacuation routes and transportation options accommodate and 
are made known to individuals with disabilities, and 
implementing policies to ensure that the rights and feedback of 
individuals with disabilities regarding post-evacuation 
residency and relocation are respected, among other things.. In 
December 2009, the Disability Coordinator assumed the 
leadership of a new Office of Disability Integration and 
Coordination.
    The Committee formally authorized the ODIC in recognition 
of its important work advancing the goal of integrating the 
needs of those with disabilities into emergency plans and the 
work that remains to be done.

                        TITLE VII-OTHER MATTERS



Sec. 701.   Decision regarding certain executive memoranda.

    This section requires the Secretary of Homeland Security to 
review existing Department of Homeland Security memoranda to 
determine whether such memoranda should remain in effect and if 
so whether any memoranda should be modified.
    The Committee believes the Department should work to 
streamline existing guidelines and supports action by the 
Secretary to review and organize existing Department memoranda.

Sec. 702.   Permanent authorization for Asia-Pacific Economic 
        Cooperation Business Travel Card Program.

    This section will permanently authorize the Asia-Pacific 
Economic Cooperation Business Travel Card Program (APEC) while 
maintaining the Department of Homeland Security's authority to 
revoke an individual's card if there is a sufficient security 
justification.
    Nearly 30,000 American business and government card-holders 
will be able to access fast-track lanes at airports in the 21 
APEC countries, which saves a significant amount of time. This 
program is of no cost to taxpayers, and facilitates travel for 
verified individuals who have enrolled in a trusted traveler 
program. The program will sunset on September 30, 2018, and all 
cards will expire in 2021. This section will permanently 
authorize the APEC program while maintaining the Department's 
authority to revoke an individual's card if there is a 
sufficient security justification.
    This section defines the term ``public and private sector 
stakeholders'' as the meaning given such term in section 
114(u)(1)(C) of title 49, United States Code, which the 
Committee believes fully encompasses the intent of the overall 
provision.

Sec. 703.   Authorization of appropriations for Office of Inspector 
        General.

    This section authorizes the Office of the Inspector General 
of the Department of Homeland Security at $175,000,000 for each 
Fiscal Year from 2018 to 2019.

Sec. 704.   Canine teams.

    This section authorizes the Commissioner of U.S. Customs 
and Border Protection to request additional canine teams to 
assist in the drug detection mission at the border. There must 
be a justified and documented shortage of existing canine teams 
in order to invoke this section. Canine teams serve a critical 
function and are one of the most reliable assets for drug 
detection.
    The Committee believes that canines are a valuable resource 
for CBP to detect drugs, and fully supports the Commissioner's 
authority to deploy them as necessary.

Sec. 705.   Technical amendments to the Homeland Security Act of 2002.

    This section makes a number of technical changes to the 
Homeland Security Act of 2002. The section also strikes section 
872 of the Homeland Security Act of 2002, removing the 
Secretary of Homeland Security's authority to reorganize the 
Department of Homeland Security without specific congressional 
authorization.
    In keeping with its Article I constitutional powers, the 
Committee believes that reorganization of the Department should 
only occur following specific statutory authorization by 
Congress.

         Changes in Existing Law Made by the Bill, as Reported

    The changes to existing law made by the bill in compliance 
with clause 3(e) of rule XIII of the Rules of the House of 
Representatives, were not made available at the time the report 
was filed.

                                  [all]