Codify — Article

Creates DHS working group to counter CCP-related terrorism, cyber, border, and transport threats

Centralizes cross-component analysis, reporting, and R&D inside DHS to address threats tied to the Chinese Communist Party — with set deadlines, privacy guardrails, and a seven-year sunset.

The Brief

This bill requires the Department of Homeland Security to stand up a dedicated Working Group focused on terrorist, cybersecurity, border and port, and transportation security threats linked to the Chinese Communist Party. The group will examine DHS efforts, tally departmental resources devoted to those programs, coordinate across components and partners, and identify policy or capability gaps.

The Working Group must begin work within a statutory window, produce recurring assessments for Congress (with an unclassified public portion), support targeted research and development, and operate under explicit privacy and civil‑liberties constraints. The package formalizes a temporary, centralized mechanism to align DHS analytic, operational, and technical activity against a specific foreign actor across multiple threat domains.

At a Glance

What It Does

The bill directs the Secretary of Homeland Security to establish a Working Group within 180 days, led by a Director appointed by the Secretary, to evaluate and coordinate DHS efforts against CCP-related threats. It tasks the group with examining DHS programs, accounting for resources, avoiding duplication, facilitating intercomponent cooperation, sharing information with fusion centers and state/local partners, and conducting R&D related to those threats.

Who It Affects

Affected actors include DHS components (I&A, CBP, TSA, S&T), the Office of the Under Secretary for Intelligence and Analysis, the FBI and the Director of National Intelligence (as reporting partners), state and local fusion centers, and private operators in ports, transportation, and logistics sectors. Congress and GAO receive recurring reports and briefings.

Why It Matters

By creating a cross-cutting vehicle for analysis and resource accounting, the bill shifts how DHS organizes response to a named foreign actor: it can change funding priorities, information flows to state/local partners, and the department’s research agenda, while imposing specific transparency and privacy requirements.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill mandates a DHS internal Working Group whose scope spans terrorism, cyber threats, border and port security, and transportation security connected to activities by or attributable to the Chinese Communist Party. The Secretary must establish the group within a statutory deadline and appoint a Director who answers to the Secretary; the group can bring in detailees from the intelligence community and other agencies to fill expertise gaps.

Operational design includes minimum staffing expectations and an explicit requirement for at least one staff member dedicated to privacy compliance. The Working Group’s investigation mandate is detailed: it must examine how DHS is addressing nontraditional immigration exploitation (identity theft, visa fraud, human smuggling/trafficking), predatory economic practices (counterfeits, forced labor, IP theft), transnational drug trafficking channels (fentanyl and precursors via borders, mail, and express consignment), and illicit financial flows tied to those activities.On information sharing, the bill requires the Working Group to coordinate with DHS’s Office of Intelligence and Analysis to incorporate material from federal and state/local partners and the National Network of Fusion Centers and to push relevant intelligence back out to those partners.

Transparency mechanisms include annual assessments for five years that the bill requires be submitted jointly with FBI and DNI leadership, with an unclassified portion posted publicly and an option for a classified annex, followed by committee briefings.Accountability features include a Comptroller General review within a year and a statutory sunset for the Working Group after seven years. The bill also directs DHS, in coordination with its science and technology arm and the Working Group, to pursue R&D and operational testing of technologies and techniques to improve situational awareness and response to the specified CCP-linked threats.

All activities must comply with constitutional, privacy, civil‑rights, and civil‑liberties protections and may not infringe lawful free speech by U.S. persons.

The Five Things You Need to Know

1

The Secretary must establish the Working Group within 180 days of enactment and appoint a Director who reports to the Secretary.

2

The Working Group must include at least one employee whose sole task is ensuring compliance with privacy laws and regulations.

3

Each year for five years the Secretary, coordinating with the DHS Under Secretary for Intelligence and Analysis, the FBI Director, and the DNI, must submit an assessment on CCP-related threats; the unclassified portion must be publicly posted and a classified annex is permitted.

4

The Comptroller General must deliver a report on implementation to Congress within one year of enactment.

5

The Working Group automatically terminates seven years after establishment; the bill also directs DHS S&T to carry out R&D and operational testing tied to the Working Group’s mission.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 2(a)

Establishment, leadership, and staffing of the Working Group

This section sets the 180‑day clock for standing up the Working Group inside DHS and requires the Secretary to appoint a Director who reports directly to the Secretary. It mandates sufficient staff and specifically requires at least one employee dedicated to privacy compliance. The provision also permits detailees from the intelligence community and other federal agencies, with or without reimbursement, subject to existing personnel rules—mechanics that enable rapid capability intake but can strain sending components.

Section 2(b)

Mandated duties: examinations, resource accounting, gap identification

The Working Group’s core tasks are to examine and report on DHS efforts across four threat domains tied to the CCP, account for departmental resources supporting those programs, avoid duplicating existing evaluations, identify policy and capability gaps, and foster holistic departmental responses. The bill enumerates discrete threat vectors (immigration exploitation, counterfeit/forced labor, narcotics trafficking routes, and illicit financial flows) to guide the group’s analytic work and prioritization.

Section 2(c)

Information sharing with I&A, fusion centers, and state/local partners

The Working Group must coordinate closely with the Office of Intelligence and Analysis to gather and integrate intelligence from federal, state, local, Tribal, and territorial partners and the National Network of Fusion Centers. It must also ensure dissemination of relevant information back to those partners. Practically, this creates a formal conduit inside DHS intended to standardize what intelligence reaches nonfederal entities and fusion centers.

3 more sections
Section 2(d)

Annual assessments and congressional briefings

Within 180 days of enactment and then annually for five years, DHS (in coordination with I&A, FBI, and DNI) must provide Congress with assessments of CCP-related threats during the prior 12 months. The statute requires unclassified versions to be posted publicly (with a classified annex option) and mandates a congressional briefing within 30 days of submission—procedures that build public transparency while preserving classified reporting channels.

Sections 2(e)–(f)

Comptroller General review and R&D mandate

The Comptroller General is directed to review implementation within one year and report to Congress, creating an external audit point early in the Working Group’s life. Separately, DHS (working with the Director and S&T) must, to the extent practicable, pursue research, development, and operational testing of technologies and techniques to enhance detection and situational awareness tied to the specified threats—linking analytic work to potential procurement or test programs.

Sections 2(g)–(i)

Legal constraints, sunset, and definitions

The bill explicitly requires compliance with constitutional, privacy, civil‑rights, and civil‑liberties protections and bars infringement of lawful free speech by U.S. persons. It establishes a seven‑year sunset for the Working Group and provides statutory definitions for terms like ‘‘appropriate congressional committees,’’ ‘‘fusion center,’’ ‘‘intelligence community,’’ and ‘‘United States persons,’’ thereby fixing reporting lines and partner definitions for implementation.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Defense across all five countries.

Explore Defense in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • DHS intelligence and analytic components (I&A, S&T): gain a formalized cross-component convening mechanism and a clearer mandate to set priorities, which can unlock coordinated funding requests and R&D pilots.
  • State, local, Tribal, and territorial fusion centers: receive a statutory conduit for DHS-sourced threat information tied to a named foreign actor, improving situational awareness and operational targeting at local levels.
  • Congressional oversight committees: receive structured annual assessments, briefings, and a GAO-style implementation review, improving lawmakers’ ability to track program performance and resource allocation.
  • Federal law enforcement partners (FBI, DOJ): benefit from consolidated DHS analysis and resource accounting that can inform investigations and interagency strategies against transnational criminal networks connected to CCP-linked activities.
  • Port, logistics, and transportation operators: stand to receive more consistent threat reporting and potential R&D outcomes (such as detection technologies) that could improve security planning and risk mitigation.

Who Bears the Cost

  • Department of Homeland Security components: must allocate personnel and operating funds to staff the Working Group, provide detailees, and support R&D and public reporting obligations—potentially diverting resources from other priorities.
  • State and local partners and fusion centers: may need to absorb additional intelligence reporting and engage in new coordination activities without guaranteed funding, increasing operational workload.
  • Private sector entities in supply chain, ports, and transit: could face more intrusive security measures or compliance expectations resulting from the Working Group’s findings and DHS guidance.
  • Agencies providing detailees (intelligence community and other federal entities): lose staff time and expertise temporarily, which can affect ongoing missions and require backfill.
  • Privacy and civil‑liberties offices: internal counsel and oversight staff may face expanded responsibilities ensuring compliance and responding to transparency and reporting requirements.

Key Issues

The Core Tension

The central dilemma is between centralized, transparent, coordinated threat management aimed at a named foreign actor (which demands information sharing, public reporting, and focused R&D) and the simultaneous need to protect civil liberties, preserve necessary classification, avoid interagency duplication, and manage limited personnel and funding—each objective pulls implementation in a different direction with no single, cost‑free solution.

The bill centralizes an explicit focus on a named foreign actor inside DHS, which creates immediate trade-offs. Consolidation can improve coordination, but it risks duplicating or overlapping with existing authorities across DHS components, the FBI, and the wider intelligence community unless roles are tightly delineated.

The statute tries to avoid duplication by directing the Working Group to build on existing evaluations, but in practice operational overlap and interagency turf battles are likely without implementing guidance.

Another practical tension lies between transparency and classified intelligence: the statute requires unclassified public posting of assessments while permitting classified annexes. Determining what to include in the unclassified portion will be a constant implementation challenge and a potential source of interagency disagreement.

The privacy and free‑speech language sets floor obligations but leaves open granular questions about collection thresholds, retention policies, and handling of information about U.S. persons, especially where investigative and analytic lines blur. Finally, the bill mandates R&D and operational testing 'to the extent practicable' but does not attach specific funding, creating an unfunded or underfunded mandate risk that will affect program scope and timeline.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.