Codify — Article

Creates DHS working group to counter CCP-linked terrorist, cyber, and border threats

Establishes a DHS-led, seven-year Working Group with reporting, information-sharing, R&D, and privacy staffing requirements focused on threats the bill attributes to the Chinese Communist Party.

The Brief

The bill requires the Department of Homeland Security to stand up a dedicated Working Group to examine and coordinate the Department’s response to terrorist, cybersecurity, border and port, and transportation-security threats the text links to the Chinese Communist Party. The Working Group must be operational within 180 days, led by a Director appointed by the Secretary, and staffed with a minimum privacy compliance employee and other sufficient personnel.

Beyond coordination, the statute mandates annual unclassified assessments (with a classified annex option) for five years, a Comptroller General implementation review within one year, and an R&D program to test technologies for situational awareness. The Working Group must follow constitutional and civil‑liberties protections, cannot infringe lawful U.S. persons’ speech, and sunsets seven years after creation — creating a time‑limited, centralized mechanism for DHS to align resources and share threat information with federal, state, local, Tribal, territorial partners, and the National Network of Fusion Centers.

At a Glance

What It Does

Requires DHS to create a Working Group within 180 days to assess and coordinate responses to terrorist, cybersecurity, border/port, and transportation threats attributed to the Chinese Communist Party; the Director reports to the Secretary. The statute mandates annual public-facing assessments for five years, a GAO review within one year, and a one-year R&D directive tied to DHS’s Science & Technology office.

Who It Affects

Directly affects DHS components (including the Office of Intelligence and Analysis and S&T), the intelligence community and other agencies that may provide detailees, the National Network of Fusion Centers and state/local partners that receive and contribute threat information, and congressional committees that receive mandated reports and briefings.

Why It Matters

This bill centralizes DHS efforts on CCP‑attributed threats, requires public accountability through unclassified assessments, and formalizes interagency and intergovernmental information sharing and tech testing — shifting how DHS documents resource allocation and program efficacy related to these specific threat vectors.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill instructs the Secretary of Homeland Security to create a time‑limited Working Group focused exclusively on threats the statute ties to the Chinese Communist Party: terrorism, cybersecurity, border and port security, and transportation security. The Working Group must be in place within 180 days, led by a Director appointed by the Secretary who reports directly to the Secretary on administrative, operational, and security matters.

The statute sets a baseline staffing obligation — DHS must provide enough employees to do the work and at least one staffer dedicated to privacy compliance.

The Working Group’s core tasks are diagnostic and coordinating: it must examine DHS efforts across several specific threat streams (including identity theft, visa exploitation, human smuggling and trafficking, forced labor and counterfeit goods, illicit drug trafficking routes such as mail and express consignments, and illicit financial flows), account for Department resources devoted to those programs, identify policy and operational gaps, and coordinate offices and components to create a more holistic response. It can accept detailees from the intelligence community and other federal agencies to fill expertise gaps.The bill builds in transparency and oversight: DHS must deliver an unclassified annual assessment (with an optional classified annex) for five years that describes activities the Working Group undertook and other relevant matters; the unclassified portion must be posted publicly and briefed to specified congressional committees within 30 days of submission.

The Comptroller General must review implementation within one year. Separately, DHS — working with the Under Secretary for S&T — must, within one year, pursue research, operational testing, and development of technologies and techniques to improve situational awareness related to these threats, to the extent practicable.Legal and civil‑liberty guardrails are explicit: all activities must comply with constitutional protections, privacy, civil rights, and civil liberties laws, and the statute bars infringing lawful free speech by United States persons.

The Working Group terminates seven years after establishment, and the bill defines who counts as appropriate congressional committees, fusion centers, the intelligence community, the National Network of Fusion Centers, and United States persons for the statute’s purposes.

The Five Things You Need to Know

1

DHS must establish the Working Group within 180 days of enactment and terminate it seven years after establishment.

2

The Director of the Working Group is appointed by and reports to the Secretary of Homeland Security on administrative, operational, and security matters.

3

DHS must staff the Working Group with a sufficient number of employees and at least one employee dedicated to ensuring compliance with privacy laws and regulations.

4

DHS must submit an unclassified annual assessment (with an optional classified annex) for five years and post the unclassified portion publicly; briefings to specified congressional committees must follow within 30 days.

5

The Comptroller General must report on implementation within one year, and DHS must, within one year, coordinate S&T-led R&D and operational testing of technologies and techniques related to these threat streams.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Provides the Act’s short title: 'Strategic Homeland Intelligence and Enforcement Legislation to Defend Against the CCP Act' or the 'SHIELD Against CCP Act.' This is purely nominative but useful when tracking statutory references or delegated authorities tied to the name.

Section 2(a)

Establish Working Group; leadership and staffing rules

Requires DHS to establish the Working Group within 180 days, and authorizes the Secretary to appoint a Director who reports to the Secretary on all administrative, operational, and security matters. The Secretary must provide 'a sufficient number of employees' and explicitly at least one employee focused on privacy compliance. The Group may accept detailees from the intelligence community or other federal agencies, with or without reimbursement, subject to applicable laws and regulations governing detailees.

Section 2(b)-(c)

Duties: review, coordination, and information sharing

Directs the Working Group to examine DHS efforts across named threat categories (nontraditional immigration exploitation, predatory economic practices including forced labor and IP theft, drug trafficking via borders and mail, and illicit financial flows tied to Chinese Money Laundering Organizations). The Group must account for Department resources devoted to those programs, identify gaps, and coordinate across DHS components. It must also integrate and disseminate relevant information with the Office of Intelligence and Analysis, federal partners, state/local/Tribal/territorial partners, and the National Network of Fusion Centers.

2 more sections
Section 2(d)-(e)

Reporting, public posting, briefings, and GAO review

Requires an annual assessment for five years beginning no later than 180 days after enactment, submitted to multiple House and Senate committees specified in the statute. Assessments must be unclassified with an optional classified annex; DHS must post the unclassified portion publicly and provide a congressional briefing within 30 days. Separately, the Comptroller General must produce an implementation report within one year, creating an external audit of whether DHS meets the statute’s construction and operational requirements.

Section 2(f)-(i)

R&D mandate, civil‑liberties guardrails, sunset, and definitions

Directs DHS, in coordination with the Director and the Under Secretary for Science and Technology, to pursue research, development, and operational testing of technologies and techniques to enhance security and situational awareness tied to the specified threats, to the extent practicable and within one year. Stipulates that all activities must comply with constitutional, privacy, civil rights, and civil liberties protections and may not infringe lawful free speech by U.S. persons. Establishes a seven‑year termination date for the Working Group and supplies statutory definitions for key terms and the list of congressional committees that must receive reports.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Defense across all five countries.

Explore Defense in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • DHS components responsible for intelligence and operations — gain a centralized coordinating mechanism, mandated resource accounting, and a formal forum to align counter‑threat activities across cybersecurity, border/port, and transportation domains.
  • Congressional oversight committees — receive annual unclassified assessments (and classified annexes if used) plus briefings, enabling clearer legislative oversight of DHS activities tied to these named threat vectors.
  • State, local, Tribal, and territorial fusion centers and partners — the bill requires the Working Group to ingest and disseminate relevant threat information with the National Network of Fusion Centers, improving information flow and situational awareness at sub‑federal levels.
  • DHS Science & Technology and defense/tech vendors — stand to benefit from directed R&D and operational testing opportunities to develop technologies and techniques for the threat areas the statute prioritizes.

Who Bears the Cost

  • Department of Homeland Security — must allocate staff, including at least one privacy compliance employee, and resources to stand up and sustain the Working Group and produce recurring reports and briefings.
  • Federal agencies and intelligence community elements — may need to provide detailees and share information and personnel expertise without guaranteed reimbursement, imposing personnel and administrative costs.
  • Taxpayers and appropriators — while the bill does not appropriate funds, the new requirements (staffing, R&D testing, public reporting, and GAO review) are likely to require funding decisions and sustained resource commitments from DHS budgets.
  • Privacy and civil‑liberties offices and oversight bodies — will likely see increased workload monitoring compliance and responding to public postings, briefings, and the statutory guardrails the Working Group must follow.

Key Issues

The Core Tension

The central dilemma is between centralized, aggressive threat‑centric coordination (which promises faster detection, resource alignment, and R&D deployment) and the risk that concentrating counter‑CCP activities into a focused DHS Working Group will strain privacy, civil‑liberty protections, and interagency relations—especially where public accountability and classified intelligence must be balanced without clear funding or deconfliction mechanisms.

The statute bundles ambitious coordination, transparency, and technology testing requirements into a single DHS‑led entity, but leaves critical implementation details unresolved. The bill does not appropriate funds or specify how DHS should reallocate existing resources; 'a sufficient number of employees' is a flexible standard that will depend on internal budget and prioritization choices.

The R&D mandate is qualified by 'to the extent practicable,' creating discretion about scale and pace of testing. The authorization to accept detailees with or without reimbursement raises interagency burden‑sharing questions: agencies may be unwilling or constrained from sending personnel without funding assurances.

The reporting architecture requires an unclassified annual assessment with an optional classified annex and a public posting, which creates operational tension: presenting useful, action‑oriented findings publicly while protecting sensitive intelligence. The bill instructs the Working Group to build on other reviews and avoid duplication, but offers no formal mechanism to resolve overlapping missions, which could leave DHS components and other entities repeating work or defending turf.

Finally, the statutory guardrails on privacy, civil rights, civil liberties, and free speech are explicit, yet operationalizing those protections during information collection, fusion center sharing, and technology testing is complex and will likely demand robust internal compliance procedures and external oversight.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.