TITLE 6 - US CODE - SUBCHAPTER II - INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION

Part A - Information and Analysis and Infrastructure Protection; Access to Information

6 USC 121 - Information and Analysis and Infrastructure Protection

(a) Intelligence and analysis and infrastructure protection 
There shall be in the Department an Office of Intelligence and Analysis and an Office of Infrastructure Protection.
(b) Under Secretary for Intelligence and Analysis and Assistant Secretary for Infrastructure Protection 

(1) Office of Intelligence and Analysis 
The Office of Intelligence and Analysis shall be headed by an Under Secretary for Intelligence and Analysis, who shall be appointed by the President, by and with the advice and consent of the Senate.
(2) Chief Intelligence Officer 
The Under Secretary for Intelligence and Analysis shall serve as the Chief Intelligence Officer of the Department.
(3) Office of Infrastructure Protection 
The Office of Infrastructure Protection shall be headed by an Assistant Secretary for Infrastructure Protection, who shall be appointed by the President.
(c) Discharge of responsibilities 
The Secretary shall ensure that the responsibilities of the Department relating to information analysis and infrastructure protection, including those described in subsection (d), are carried out through the Under Secretary for Intelligence and Analysis or the Assistant Secretary for Infrastructure Protection, as appropriate.
(d) Responsibilities of Secretary relating to intelligence and analysis and infrastructure protection 
The responsibilities of the Secretary relating to intelligence and analysis and infrastructure protection shall be as follows:
(1) To access, receive, and analyze law enforcement information, intelligence information, and other information from agencies of the Federal Government, State and local government agencies (including law enforcement agencies), and private sector entities, and to integrate such information, in support of the mission responsibilities of the Department and the functions of the National Counterterrorism Center established under section 119 of the National Security Act of 1947 (50 U.S.C. 404o), in order to
(A) identify and assess the nature and scope of terrorist threats to the homeland;
(B) detect and identify threats of terrorism against the United States; and
(C) understand such threats in light of actual and potential vulnerabilities of the homeland.
(2) To carry out comprehensive assessments of the vulnerabilities of the key resources and critical infrastructure of the United States, including the performance of risk assessments to determine the risks posed by particular types of terrorist attacks within the United States (including an assessment of the probability of success of such attacks and the feasibility and potential efficacy of various countermeasures to such attacks).
(3) To integrate relevant information, analyses, and vulnerability assessments (whether such information, analyses, or assessments are provided or produced by the Department or others) in order to identify priorities for protective and support measures by the Department, other agencies of the Federal Government, State and local government agencies and authorities, the private sector, and other entities.
(4) To ensure, pursuant to section 122 of this title, the timely and efficient access by the Department to all information necessary to discharge the responsibilities under this section, including obtaining such information from other agencies of the Federal Government.
(5) To develop a comprehensive national plan for securing the key resources and critical infrastructure of the United States, including power production, generation, and distribution systems, information technology and telecommunications systems (including satellites), electronic financial and property record storage and transmission systems, emergency preparedness communications systems, and the physical and technological assets that support such systems.
(6) To recommend measures necessary to protect the key resources and critical infrastructure of the United States in coordination with other agencies of the Federal Government and in cooperation with State and local government agencies and authorities, the private sector, and other entities.
(7) To review, analyze, and make recommendations for improvements to the policies and procedures governing the sharing of information within the scope of the information sharing environment established under section 485 of this title, including homeland security information, terrorism information, and weapons of mass destruction information, and any policies, guidelines, procedures, instructions, or standards established under that section.
(8) To disseminate, as appropriate, information analyzed by the Department within the Department, to other agencies of the Federal Government with responsibilities relating to homeland security, and to agencies of State and local governments and private sector entities with such responsibilities in order to assist in the deterrence, prevention, preemption of, or response to, terrorist attacks against the United States.
(9) To consult with the Director of National Intelligence and other appropriate intelligence, law enforcement, or other elements of the Federal Government to establish collection priorities and strategies for information, including law enforcement-related information, relating to threats of terrorism against the United States through such means as the representation of the Department in discussions regarding requirements and priorities in the collection of such information.
(10) To consult with State and local governments and private sector entities to ensure appropriate exchanges of information, including law enforcement-related information, relating to threats of terrorism against the United States.
(11) To ensure that
(A) any material received pursuant to this chapter is protected from unauthorized disclosure and handled and used only for the performance of official duties; and
(B) any intelligence information under this chapter is shared, retained, and disseminated consistent with the authority of the Director of National Intelligence to protect intelligence sources and methods under the National Security Act of 1947 (50 U.S.C. 401 et seq.) and related procedures and, as appropriate, similar authorities of the Attorney General concerning sensitive law enforcement information.
(12) To request additional information from other agencies of the Federal Government, State and local government agencies, and the private sector relating to threats of terrorism in the United States, or relating to other areas of responsibility assigned by the Secretary, including the entry into cooperative agreements through the Secretary to obtain such information.
(13) To establish and utilize, in conjunction with the chief information officer of the Department, a secure communications and information technology infrastructure, including data-mining and other advanced analytical tools, in order to access, receive, and analyze data and information in furtherance of the responsibilities under this section, and to disseminate information acquired and analyzed by the Department, as appropriate.
(14) To ensure, in conjunction with the chief information officer of the Department, that any information databases and analytical tools developed or utilized by the Department
(A) are compatible with one another and with relevant information databases of other agencies of the Federal Government; and
(B) treat information in such databases in a manner that complies with applicable Federal law on privacy.
(15) To coordinate training and other support to the elements and personnel of the Department, other agencies of the Federal Government, and State and local governments that provide information to the Department, or are consumers of information provided by the Department, in order to facilitate the identification and sharing of information revealed in their ordinary duties and the optimal utilization of information received from the Department.
(16) To coordinate with elements of the intelligence community and with Federal, State, and local law enforcement agencies, and the private sector, as appropriate.
(17) To provide intelligence and information analysis and support to other elements of the Department.
(18) To coordinate and enhance integration among the intelligence components of the Department, including through strategic oversight of the intelligence activities of such components.
(19) To establish the intelligence collection, processing, analysis, and dissemination priorities, policies, processes, standards, guidelines, and procedures for the intelligence components of the Department, consistent with any directions from the President and, as applicable, the Director of National Intelligence.
(20) To establish a structure and process to support the missions and goals of the intelligence components of the Department.
(21) To ensure that, whenever possible, the Department
(A) produces and disseminates unclassified reports and analytic products based on open-source information; and
(B) produces and disseminates such reports and analytic products contemporaneously with reports or analytic products concerning the same or similar information that the Department produced and disseminated in a classified format.
(22) To establish within the Office of Intelligence and Analysis an internal continuity of operations plan.
(23) Based on intelligence priorities set by the President, and guidance from the Secretary and, as appropriate, the Director of National Intelligence
(A) to provide to the heads of each intelligence component of the Department guidance for developing the budget pertaining to the activities of such component; and
(B) to present to the Secretary a recommendation for a consolidated budget for the intelligence components of the Department, together with any comments from the heads of such components.
(24) To perform such other duties relating to such responsibilities as the Secretary may provide.
(25) To prepare and submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security in the House of Representatives, and to other appropriate congressional committees having jurisdiction over the critical infrastructure or key resources, for each sector identified in the National Infrastructure Protection Plan, a report on the comprehensive assessments carried out by the Secretary of the critical infrastructure and key resources of the United States, evaluating threat, vulnerability, and consequence, as required under this subsection. Each such report
(A) shall contain, if applicable, actions or countermeasures recommended or taken by the Secretary or the head of another Federal agency to address issues identified in the assessments;
(B) shall be required for fiscal year 2007 and each subsequent fiscal year and shall be submitted not later than 35 days after the last day of the fiscal year covered by the report; and
(C) may be classified.
(e) Staff 

(1) In general 
The Secretary shall provide the Office of Intelligence and Analysis and the Office of Infrastructure Protection with a staff of analysts having appropriate expertise and experience to assist such offices in discharging responsibilities under this section.
(2) Private sector analysts 
Analysts under this subsection may include analysts from the private sector.
(3) Security clearances 
Analysts under this subsection shall possess security clearances appropriate for their work under this section.
(f) Detail of personnel 

(1) In general 
In order to assist the Office of Intelligence and Analysis and the Office of Infrastructure Protection in discharging responsibilities under this section, personnel of the agencies referred to in paragraph (2) may be detailed to the Department for the performance of analytic functions and related duties.
(2) Covered agencies 
The agencies referred to in this paragraph are as follows:
(A) The Department of State.
(B) The Central Intelligence Agency.
(C) The Federal Bureau of Investigation.
(D) The National Security Agency.
(E) The National Geospatial-Intelligence Agency.
(F) The Defense Intelligence Agency.
(G) Any other agency of the Federal Government that the President considers appropriate.
(3) Cooperative agreements 
The Secretary and the head of the agency concerned may enter into cooperative agreements for the purpose of detailing personnel under this subsection.
(4) Basis 
The detail of personnel under this subsection may be on a reimbursable or non-reimbursable basis.
(g) Functions transferred 
In accordance with subchapter XII of this chapter, there shall be transferred to the Secretary, for assignment to the Office of Intelligence and Analysis and the Office of Infrastructure Protection under this section, the functions, personnel, assets, and liabilities of the following:
(1) The National Infrastructure Protection Center of the Federal Bureau of Investigation (other than the Computer Investigations and Operations Section), including the functions of the Attorney General relating thereto.
(2) The National Communications System of the Department of Defense, including the functions of the Secretary of Defense relating thereto.
(3) The Critical Infrastructure Assurance Office of the Department of Commerce, including the functions of the Secretary of Commerce relating thereto.
(4) The National Infrastructure Simulation and Analysis Center of the Department of Energy and the energy security and assurance program and activities of the Department, including the functions of the Secretary of Energy relating thereto.
(5) The Federal Computer Incident Response Center of the General Services Administration, including the functions of the Administrator of General Services relating thereto.

6 USC 122 - Access to information

(a) In general 

(1) Threat and vulnerability information 
Except as otherwise directed by the President, the Secretary shall have such access as the Secretary considers necessary to all information, including reports, assessments, analyses, and unevaluated intelligence relating to threats of terrorism against the United States and to other areas of responsibility assigned by the Secretary, and to all information concerning infrastructure or other vulnerabilities of the United States to terrorism, whether or not such information has been analyzed, that may be collected, possessed, or prepared by any agency of the Federal Government.
(2) Other information 
The Secretary shall also have access to other information relating to matters under the responsibility of the Secretary that may be collected, possessed, or prepared by an agency of the Federal Government as the President may further provide.
(b) Manner of access 
Except as otherwise directed by the President, with respect to information to which the Secretary has access pursuant to this section
(1) the Secretary may obtain such material upon request, and may enter into cooperative arrangements with other executive agencies to provide such material or provide Department officials with access to it on a regular or routine basis, including requests or arrangements involving broad categories of material, access to electronic databases, or both; and
(2) regardless of whether the Secretary has made any request or entered into any cooperative arrangement pursuant to paragraph (1), all agencies of the Federal Government shall promptly provide to the Secretary
(A) all reports (including information reports containing intelligence which has not been fully evaluated), assessments, and analytical information relating to threats of terrorism against the United States and to other areas of responsibility assigned by the Secretary;
(B) all information concerning the vulnerability of the infrastructure of the United States, or other vulnerabilities of the United States, to terrorism, whether or not such information has been analyzed;
(C) all other information relating to significant and credible threats of terrorism against the United States, whether or not such information has been analyzed; and
(D) such other information or material as the President may direct.
(c) Treatment under certain laws 
The Secretary shall be deemed to be a Federal law enforcement, intelligence, protective, national defense, immigration, or national security official, and shall be provided with all information from law enforcement agencies that is required to be given to the Director of Central Intelligence, under any provision of the following:
(1) The USA PATRIOT Act of 2001 (Public Law 10756).
(2) Section 2517 (6) of title 18.
(3) Rule 6(e)(3)(C) of the Federal Rules of Criminal Procedure.
(d) Access to intelligence and other information 

(1) Access by elements of Federal Government 
Nothing in this subchapter shall preclude any element of the intelligence community (as that term is defined in section 401a (4) of title 50,[1] or any other element of the Federal Government with responsibility for analyzing terrorist threat information, from receiving any intelligence or other information relating to terrorism.
(2) Sharing of information 
The Secretary, in consultation with the Director of Central Intelligence, shall work to ensure that intelligence or other information relating to terrorism to which the Department has access is appropriately shared with the elements of the Federal Government referred to in paragraph (1), as well as with State and local governments, as appropriate.
[1] So in original. There probably should be a closing parenthesis after “50”.

6 USC 123 - Terrorist travel program

(a) Requirement to establish 
Not later than 90 days after August 3, 2007, the Secretary of Homeland Security, in consultation with the Director of the National Counterterrorism Center and consistent with the strategy developed under section 7201,1 shall establish a program to oversee the implementation of the Secretarys responsibilities with respect to terrorist travel.
(b) Head of the program 
The Secretary of Homeland Security shall designate an official of the Department of Homeland Security to be responsible for carrying out the program. Such official shall be
(1) the Assistant Secretary for Policy of the Department of Homeland Security; or
(2) an official appointed by the Secretary who reports directly to the Secretary.
(c) Duties 
The official designated under subsection (b) shall assist the Secretary of Homeland Security in improving the Departments ability to prevent terrorists from entering the United States or remaining in the United States undetected by
(1) developing relevant strategies and policies;
(2) reviewing the effectiveness of existing programs and recommending improvements, if necessary;
(3) making recommendations on budget requests and on the allocation of funding and personnel;
(4) ensuring effective coordination, with respect to policies, programs, planning, operations, and dissemination of intelligence and information related to terrorist travel
(A) among appropriate subdivisions of the Department of Homeland Security, as determined by the Secretary and including
(i) United States Customs and Border Protection;
(ii) United States Immigration and Customs Enforcement;
(iii) United States Citizenship and Immigration Services;
(iv) the Transportation Security Administration; and
(v) the United States Coast Guard; and
(B) between the Department of Homeland Security and other appropriate Federal agencies; and
(5) serving as the Secretarys primary point of contact with the National Counterterrorism Center for implementing initiatives related to terrorist travel and ensuring that the recommendations of the Center related to terrorist travel are carried out by the Department.
(d) Report 
Not later than 180 days after August 3, 2007, the Secretary of Homeland Security shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the implementation of this section.
[1] See References in Text note below.

6 USC 124 - Homeland Security Advisory System

(a) Requirement 
The Secretary shall administer the Homeland Security Advisory System in accordance with this section to provide advisories or warnings regarding the threat or risk that acts of terrorism will be committed on the homeland to Federal, State, local, and tribal government authorities and to the people of the United States, as appropriate. The Secretary shall exercise primary responsibility for providing such advisories or warnings.
(b) Required elements 
In administering the Homeland Security Advisory System, the Secretary shall
(1) establish criteria for the issuance and revocation of such advisories or warnings;
(2) develop a methodology, relying on the criteria established under paragraph (1), for the issuance and revocation of such advisories or warnings;
(3) provide, in each such advisory or warning, specific information and advice regarding appropriate protective measures and countermeasures that may be taken in response to the threat or risk, at the maximum level of detail practicable to enable individuals, government entities, emergency response providers, and the private sector to act appropriately;
(4) whenever possible, limit the scope of each such advisory or warning to a specific region, locality, or economic sector believed to be under threat or at risk; and
(5) not, in issuing any advisory or warning, use color designations as the exclusive means of specifying homeland security threat conditions that are the subject of the advisory or warning.

6 USC 124a - Homeland security information sharing

(a) Information sharing 
Consistent with section 485 of this title, the Secretary, acting through the Under Secretary for Intelligence and Analysis, shall integrate the information and standardize the format of the products of the intelligence components of the Department containing homeland security information, terrorism information, weapons of mass destruction information, or national intelligence (as defined in section 401a (5) of title 50) except for any internal security protocols or personnel information of such intelligence components, or other administrative processes that are administered by any chief security officer of the Department.
(b) Information sharing and knowledge management officers 
For each intelligence component of the Department, the Secretary shall designate an information sharing and knowledge management officer who shall report to the Under Secretary for Intelligence and Analysis regarding coordinating the different systems used in the Department to gather and disseminate homeland security information or national intelligence (as defined in section 401a (5) of title 50).
(c) State, local, and private-sector sources of information 

(1) Establishment of business processes 
The Secretary, acting through the Under Secretary for Intelligence and Analysis or the Assistant Secretary for Infrastructure Protection, as appropriate, shall
(A) establish Department-wide procedures for the review and analysis of information provided by State, local, and tribal governments and the private sector;
(B) as appropriate, integrate such information into the information gathered by the Department and other departments and agencies of the Federal Government; and
(C) make available such information, as appropriate, within the Department and to other departments and agencies of the Federal Government.
(2) Feedback 
The Secretary shall develop mechanisms to provide feedback regarding the analysis and utility of information provided by any entity of State, local, or tribal government or the private sector that provides such information to the Department.
(d) Training and evaluation of employees 

(1) Training 
The Secretary, acting through the Under Secretary for Intelligence and Analysis or the Assistant Secretary for Infrastructure Protection, as appropriate, shall provide to employees of the Department opportunities for training and education to develop an understanding of
(A) the definitions of homeland security information and national intelligence (as defined in section 401a (5) of title 50); and
(B) how information available to such employees as part of their duties
(i) might qualify as homeland security information or national intelligence; and
(ii) might be relevant to the Office of Intelligence and Analysis and the intelligence components of the Department.
(2) Evaluations 
The Under Secretary for Intelligence and Analysis shall
(A) on an ongoing basis, evaluate how employees of the Office of Intelligence and Analysis and the intelligence components of the Department are utilizing homeland security information or national intelligence, sharing information within the Department, as described in this subchapter, and participating in the information sharing environment established under section 485 of this title; and
(B) provide to the appropriate component heads regular reports regarding the evaluations under subparagraph (A).

6 USC 124b - Comprehensive information technology network architecture

(a) Establishment 
The Secretary, acting through the Under Secretary for Intelligence and Analysis, shall establish, consistent with the policies and procedures developed under section 485 of this title, and consistent with the enterprise architecture of the Department, a comprehensive information technology network architecture for the Office of Intelligence and Analysis that connects the various databases and related information technology assets of the Office of Intelligence and Analysis and the intelligence components of the Department in order to promote internal information sharing among the intelligence and other personnel of the Department.
(b) Comprehensive information technology network architecture defined 
The term comprehensive information technology network architecture means an integrated framework for evolving or maintaining existing information technology and acquiring new information technology to achieve the strategic management and information resources management goals of the Office of Intelligence and Analysis.

6 USC 124c - Coordination with information sharing environment

(a) Guidance 
All activities to comply with sections 124, 124a, and 124b of this title shall be
(1) consistent with any policies, guidelines, procedures, instructions, or standards established under section 485 of this title;
(2) implemented in coordination with, as appropriate, the program manager for the information sharing environment established under that section;
(3) consistent with any applicable guidance issued by the Director of National Intelligence; and
(4) consistent with any applicable guidance issued by the Secretary relating to the protection of law enforcement information or proprietary information.
(b) Consultation 
In carrying out the duties and responsibilities under this part, the Under Secretary for Intelligence and Analysis shall take into account the views of the heads of the intelligence components of the Department.

6 USC 124d - Intelligence components

Subject to the direction and control of the Secretary, and consistent with any applicable guidance issued by the Director of National Intelligence, the responsibilities of the head of each intelligence component of the Department are as follows:
(1) To ensure that the collection, processing, analysis, and dissemination of information within the scope of the information sharing environment, including homeland security information, terrorism information, weapons of mass destruction information, and national intelligence (as defined in section 401a (5) of title 50), are carried out effectively and efficiently in support of the intelligence mission of the Department, as led by the Under Secretary for Intelligence and Analysis.
(2) To otherwise support and implement the intelligence mission of the Department, as led by the Under Secretary for Intelligence and Analysis.
(3) To incorporate the input of the Under Secretary for Intelligence and Analysis with respect to performance appraisals, bonus or award recommendations, pay adjustments, and other forms of commendation.
(4) To coordinate with the Under Secretary for Intelligence and Analysis in developing policies and requirements for the recruitment and selection of intelligence officials of the intelligence component.
(5) To advise and coordinate with the Under Secretary for Intelligence and Analysis on any plan to reorganize or restructure the intelligence component that would, if implemented, result in realignments of intelligence functions.
(6) To ensure that employees of the intelligence component have knowledge of, and comply with, the programs and policies established by the Under Secretary for Intelligence and Analysis and other appropriate officials of the Department and that such employees comply with all applicable laws and regulations.
(7) To perform such other activities relating to such responsibilities as the Secretary may provide.

6 USC 124e - Training for employees of intelligence components

The Secretary shall provide training and guidance for employees, officials, and senior executives of the intelligence components of the Department to develop knowledge of laws, regulations, operations, policies, procedures, and programs that are related to the functions of the Department relating to the collection, processing, analysis, and dissemination of information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, or national intelligence (as defined in section 401a (5) of title 50).

6 USC 124f - Intelligence training development for State and local government officials

(a) Curriculum 
The Secretary, acting through the Under Secretary for Intelligence and Analysis, shall
(1) develop a curriculum for training State, local, and tribal government officials, including law enforcement officers, intelligence analysts, and other emergency response providers, in the intelligence cycle and Federal laws, practices, and regulations regarding the development, handling, and review of intelligence and other information; and
(2) ensure that the curriculum includes executive level training for senior level State, local, and tribal law enforcement officers, intelligence analysts, and other emergency response providers.
(b) Training 
To the extent possible, the Federal Law Enforcement Training Center and other existing Federal entities with the capacity and expertise to train State, local, and tribal government officials based on the curriculum developed under subsection (a) shall be used to carry out the training programs created under this section. If such entities do not have the capacity, resources, or capabilities to conduct such training, the Secretary may approve another entity to conduct such training.
(c) Consultation 
In carrying out the duties described in subsection (a), the Under Secretary for Intelligence and Analysis shall consult with the Director of the Federal Law Enforcement Training Center, the Attorney General, the Director of National Intelligence, the Administrator of the Federal Emergency Management Agency, and other appropriate parties, such as private industry, institutions of higher education, nonprofit">nonprofit institutions, and other intelligence agencies of the Federal Government.

6 USC 124g - Information sharing incentives

(a) Awards 
In making cash awards under chapter 45 of title 5, the President or the head of an agency, in consultation with the program manager designated under section 485 of this title, may consider the success of an employee in appropriately sharing information within the scope of the information sharing environment established under that section, including homeland security information, terrorism information, and weapons of mass destruction information, or national intelligence (as defined in section 401a (5) of title 50[1], in a manner consistent with any policies, guidelines, procedures, instructions, or standards established by the President or, as appropriate, the program manager of that environment for the implementation and management of that environment.
(b) Other incentives 
The head of each department or agency described in section 485 (i) of this title, in consultation with the program manager designated under section 485 of this title, shall adopt best practices regarding effective ways to educate and motivate officers and employees of the Federal Government to participate fully in the information sharing environment, including
(1) promotions and other nonmonetary awards; and
(2) publicizing information sharing accomplishments by individual employees and, where appropriate, the tangible end benefits that resulted.
[1] So in original. A closing parenthesis probably should precede the comma.

6 USC 124h - Department of Homeland Security State, Local, and Regional Fusion Center Initiative

(a) Establishment 
The Secretary, in consultation with the program manager of the information sharing environment established under section 485 of this title, the Attorney General, the Privacy Officer of the Department, the Officer for Civil Rights and Civil Liberties of the Department, and the Privacy and Civil Liberties Oversight Board established under section 2000ee of title 42, shall establish a Department of Homeland Security State, Local, and Regional Fusion Center Initiative to establish partnerships with State, local, and regional fusion centers.
(b) Department support and coordination 
Through the Department of Homeland Security State, Local, and Regional Fusion Center Initiative, and in coordination with the principal officials of participating State, local, or regional fusion centers and the officers designated as the Homeland Security Advisors of the States, the Secretary shall
(1) provide operational and intelligence advice and assistance to State, local, and regional fusion centers;
(2) support efforts to include State, local, and regional fusion centers into efforts to establish an information sharing environment;
(3) conduct tabletop and live training exercises to regularly assess the capability of individual and regional networks of State, local, and regional fusion centers to integrate the efforts of such networks with the efforts of the Department;
(4) coordinate with other relevant Federal entities engaged in homeland security-related activities;
(5) provide analytic and reporting advice and assistance to State, local, and regional fusion centers;
(6) review information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that is gathered by State, local, and regional fusion centers, and to incorporate such information, as appropriate, into the Departments own such information;
(7) provide management assistance to State, local, and regional fusion centers;
(8) serve as a point of contact to ensure the dissemination of information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information;
(9) facilitate close communication and coordination between State, local, and regional fusion centers and the Department;
(10) provide State, local, and regional fusion centers with expertise on Department resources and operations;
(11) provide training to State, local, and regional fusion centers and encourage such fusion centers to participate in terrorism threat-related exercises conducted by the Department; and
(12) carry out such other duties as the Secretary determines are appropriate.
(c) Personnel assignment 

(1) In general 
The Under Secretary for Intelligence and Analysis shall, to the maximum extent practicable, assign officers and intelligence analysts from components of the Department to participating State, local, and regional fusion centers.
(2) Personnel sources 
Officers and intelligence analysts assigned to participating fusion centers under this subsection may be assigned from the following Department components, in coordination with the respective component head and in consultation with the principal officials of participating fusion centers:
(A) Office of Intelligence and Analysis.
(B) Office of Infrastructure Protection.
(C) Transportation Security Administration.
(D) United States Customs and Border Protection.
(E) United States Immigration and Customs Enforcement.
(F) United States Coast Guard.
(G) Other components of the Department, as determined by the Secretary.
(3) Qualifying criteria 

(A) In general 
The Secretary shall develop qualifying criteria for a fusion center to participate in the assigning of Department officers or intelligence analysts under this section.
(B) Criteria 
Any criteria developed under subparagraph (A) may include
(i) whether the fusion center, through its mission and governance structure, focuses on a broad counterterrorism approach, and whether that broad approach is pervasive through all levels of the organization;
(ii) whether the fusion center has sufficient numbers of adequately trained personnel to support a broad counterterrorism mission;
(iii) whether the fusion center has
(I) access to relevant law enforcement, emergency response, private sector, open source, and national security data; and
(II) the ability to share and analytically utilize that data for lawful purposes;
(iv) whether the fusion center is adequately funded by the State, local, or regional government to support its counterterrorism mission; and
(v) the relevancy of the mission of the fusion center to the particular source component of Department officers or intelligence analysts.
(4) Prerequisite 

(A) Intelligence analysis, privacy, and civil liberties training 
Before being assigned to a fusion center under this section, an officer or intelligence analyst shall undergo
(i) appropriate intelligence analysis or information sharing training using an intelligence-led policing curriculum that is consistent with
(I) standard training and education programs offered to Department law enforcement and intelligence personnel; and
(II) the Criminal Intelligence Systems Operating Policies under part 23 of title 28, Code of Federal Regulations (or any corresponding similar rule or regulation);
(ii) appropriate privacy and civil liberties training that is developed, supported, or sponsored by the Privacy Officer appointed under section 142 of this title and the Officer for Civil Rights and Civil Liberties of the Department, in consultation with the Privacy and Civil Liberties Oversight Board established under section 2000ee of title 42; and
(iii) such other training prescribed by the Under Secretary for Intelligence and Analysis.
(B) Prior work experience in area 
In determining the eligibility of an officer or intelligence analyst to be assigned to a fusion center under this section, the Under Secretary for Intelligence and Analysis shall consider the familiarity of the officer or intelligence analyst with the State, locality, or region, as determined by such factors as whether the officer or intelligence analyst
(i) has been previously assigned in the geographic area; or
(ii) has previously worked with intelligence officials or law enforcement or other emergency response providers from that State, locality, or region.
(5) Expedited security clearance processing 
The Under Secretary for Intelligence and Analysis
(A) shall ensure that each officer or intelligence analyst assigned to a fusion center under this section has the appropriate security clearance to contribute effectively to the mission of the fusion center; and
(B) may request that security clearance processing be expedited for each such officer or intelligence analyst and may use available funds for such purpose.
(6) Further qualifications 
Each officer or intelligence analyst assigned to a fusion center under this section shall satisfy any other qualifications the Under Secretary for Intelligence and Analysis may prescribe.
(d) Responsibilities 
An officer or intelligence analyst assigned to a fusion center under this section shall
(1) assist law enforcement agencies and other emergency response providers of State, local, and tribal governments and fusion center personnel in using information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, to develop a comprehensive and accurate threat picture;
(2) review homeland security-relevant information from law enforcement agencies and other emergency response providers of State, local, and tribal government;
(3) create intelligence and other information products derived from such information and other homeland security-relevant information provided by the Department; and
(4) assist in the dissemination of such products, as coordinated by the Under Secretary for Intelligence and Analysis, to law enforcement agencies and other emergency response providers of State, local, and tribal government, other fusion centers, and appropriate Federal agencies.
(e) Border intelligence priority 

(1) In general 
The Secretary shall make it a priority to assign officers and intelligence analysts under this section from United States Customs and Border Protection, United States Immigration and Customs Enforcement, and the Coast Guard to participating State, local, and regional fusion centers located in jurisdictions along land or maritime borders of the United States in order to enhance the integrity of and security at such borders by helping Federal, State, local, and tribal law enforcement authorities to identify, investigate, and otherwise interdict persons, weapons, and related contraband that pose a threat to homeland security.
(2) Border intelligence products 
When performing the responsibilities described in subsection (d), officers and intelligence analysts assigned to participating State, local, and regional fusion centers under this section shall have, as a primary responsibility, the creation of border intelligence products that
(A) assist State, local, and tribal law enforcement agencies in deploying their resources most efficiently to help detect and interdict terrorists, weapons of mass destruction, and related contraband at land or maritime borders of the United States;
(B) promote more consistent and timely sharing of border security-relevant information among jurisdictions along land or maritime borders of the United States; and
(C) enhance the Departments situational awareness of the threat of acts of terrorism at or involving the land or maritime borders of the United States.
(f) Database access 
In order to fulfill the objectives described under subsection (d), each officer or intelligence analyst assigned to a fusion center under this section shall have appropriate access to all relevant Federal databases and information systems, consistent with any policies, guidelines, procedures, instructions, or standards established by the President or, as appropriate, the program manager of the information sharing environment for the implementation and management of that environment.
(g) Consumer feedback 

(1) In general 
The Secretary shall create a voluntary mechanism for any State, local, or tribal law enforcement officer or other emergency response provider who is a consumer of the intelligence or other information products referred to in subsection (d) to provide feedback to the Department on the quality and utility of such intelligence products.
(2) Report 
Not later than one year after August 3, 2007, and annually thereafter, the Secretary shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report that includes a description of the consumer feedback obtained under paragraph (1) and, if applicable, how the Department has adjusted its production of intelligence products in response to that consumer feedback.
(h) Rule of construction 

(1) In general 
The authorities granted under this section shall supplement the authorities granted under section 121 (d) of this title and nothing in this section shall be construed to abrogate the authorities granted under section 121 (d) of this title.
(2) Participation 
Nothing in this section shall be construed to require a State, local, or regional government or entity to accept the assignment of officers or intelligence analysts of the Department into the fusion center of that State, locality, or region.
(i) Guidelines 
The Secretary, in consultation with the Attorney General, shall establish guidelines for fusion centers created and operated by State and local governments, to include standards that any such fusion center shall
(1) collaboratively develop a mission statement, identify expectations and goals, measure performance, and determine effectiveness for that fusion center;
(2) create a representative governance structure that includes law enforcement officers and other emergency response providers and, as appropriate, the private sector;
(3) create a collaborative environment for the sharing of intelligence and information among Federal, State, local, and tribal government agencies (including law enforcement officers and other emergency response providers), the private sector, and the public, consistent with any policies, guidelines, procedures, instructions, or standards established by the President or, as appropriate, the program manager of the information sharing environment;
(4) leverage the databases, systems, and networks available from public and private sector entities, in accordance with all applicable laws, to maximize information sharing;
(5) develop, publish, and adhere to a privacy and civil liberties policy consistent with Federal, State, and local law;
(6) provide, in coordination with the Privacy Officer of the Department and the Officer for Civil Rights and Civil Liberties of the Department, appropriate privacy and civil liberties training for all State, local, tribal, and private sector representatives at the fusion center;
(7) ensure appropriate security measures are in place for the facility, data, and personnel;
(8) select and train personnel based on the needs, mission, goals, and functions of that fusion center;
(9) offer a variety of intelligence and information services and products to recipients of fusion center intelligence and information; and
(10) incorporate law enforcement officers, other emergency response providers, and, as appropriate, the private sector, into all relevant phases of the intelligence and fusion process, consistent with the mission statement developed under paragraph (1), either through full time representatives or liaison relationships with the fusion center to enable the receipt and sharing of information and intelligence.
(j) Definitions 
In this section
(1) the term fusion center means a collaborative effort of 2 or more Federal, State, local, or tribal government agencies that combines resources, expertise, or information with the goal of maximizing the ability of such agencies to detect, prevent, investigate, apprehend, and respond to criminal or terrorist activity;
(2) the term information sharing environment means the information sharing environment established under section 485 of this title;
(3) the term intelligence analyst means an individual who regularly advises, administers, supervises, or performs work in the collection, gathering, analysis, evaluation, reporting, production, or dissemination of information on political, economic, social, cultural, physical, geographical, scientific, or military conditions, trends, or forces in foreign or domestic areas that directly or indirectly affect national security;
(4) the term intelligence-led policing means the collection and analysis of information to produce an intelligence end product designed to inform law enforcement decision making at the tactical and strategic levels; and
(5) the term terrorism information has the meaning given that term in section 485 of this title.
(k) Authorization of appropriations 
There is authorized to be appropriated $10,000,000 for each of fiscal years 2008 through 2012, to carry out this section, except for subsection (i), including for hiring officers and intelligence analysts to replace officers and intelligence analysts who are assigned to fusion centers under this section.

6 USC 124i - Homeland Security Information Sharing Fellows Program

(a) Establishment 

(1) In general 
The Secretary, acting through the Under Secretary for Intelligence and Analysis, and in consultation with the Chief Human Capital Officer, shall establish a fellowship program in accordance with this section for the purpose of
(A) detailing State, local, and tribal law enforcement officers and intelligence analysts to the Department in accordance with subchapter VI of chapter 33 of title 5 to participate in the work of the Office of Intelligence and Analysis in order to become familiar with
(i) the relevant missions and capabilities of the Department and other Federal agencies; and
(ii) the role, programs, products, and personnel of the Office of Intelligence and Analysis; and
(B) promoting information sharing between the Department and State, local, and tribal law enforcement officers and intelligence analysts by assigning such officers and analysts to
(i) serve as a point of contact in the Department to assist in the representation of State, local, and tribal information requirements;
(ii) identify information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that is of interest to State, local, and tribal law enforcement officers, intelligence analysts, and other emergency response providers;
(iii) assist Department analysts in preparing and disseminating products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that are tailored to State, local, and tribal law enforcement officers and intelligence analysts and designed to prepare for and thwart acts of terrorism; and
(iv) assist Department analysts in preparing products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that are tailored to State, local, and tribal emergency response providers and assist in the dissemination of such products through appropriate Department channels.
(2) Program name 
The program under this section shall be known as the Homeland Security Information Sharing Fellows Program.
(b) Eligibility 

(1) In general 
In order to be eligible for selection as an Information Sharing Fellow under the program under this section, an individual shall
(A) have homeland security-related responsibilities;
(B) be eligible for an appropriate security clearance;
(C) possess a valid need for access to classified information, as determined by the Under Secretary for Intelligence and Analysis;
(D) be an employee of an eligible entity; and
(E) have undergone appropriate privacy and civil liberties training that is developed, supported, or sponsored by the Privacy Officer and the Officer for Civil Rights and Civil Liberties, in consultation with the Privacy and Civil Liberties Oversight Board established under section 2000ee of title 42.
(2) Eligible entities 
In this subsection, the term eligible entity means
(A) a State, local, or regional fusion center;
(B) a State or local law enforcement or other government entity that serves a major metropolitan area, suburban area, or rural area, as determined by the Secretary;
(C) a State or local law enforcement or other government entity with port, border, or agricultural responsibilities, as determined by the Secretary;
(D) a tribal law enforcement or other authority; or
(E) such other entity as the Secretary determines is appropriate.
(c) Optional participation 
No State, local, or tribal law enforcement or other government entity shall be required to participate in the Homeland Security Information Sharing Fellows Program.
(d) Procedures for nomination and selection 

(1) In general 
The Under Secretary for Intelligence and Analysis shall establish procedures to provide for the nomination and selection of individuals to participate in the Homeland Security Information Sharing Fellows Program.
(2) Limitations 
The Under Secretary for Intelligence and Analysis shall
(A) select law enforcement officers and intelligence analysts representing a broad cross-section of State, local, and tribal agencies; and
(B) ensure that the number of Information Sharing Fellows selected does not impede the activities of the Office of Intelligence and Analysis.

6 USC 124j - Rural Policing Institute

(a) In general 
The Secretary shall establish a Rural Policing Institute, which shall be administered by the Federal Law Enforcement Training Center, to target training to law enforcement agencies and other emergency response providers located in rural areas. The Secretary, through the Rural Policing Institute, shall
(1) evaluate the needs of law enforcement agencies and other emergency response providers in rural areas;
(2) develop expert training programs designed to address the needs of law enforcement agencies and other emergency response providers in rural areas as identified in the evaluation conducted under paragraph (1), including training programs about intelligence-led policing and protections for privacy, civil rights, and civil liberties;
(3) provide the training programs developed under paragraph (2) to law enforcement agencies and other emergency response providers in rural areas; and
(4) conduct outreach efforts to ensure that local and tribal governments in rural areas are aware of the training programs developed under paragraph (2) so they can avail themselves of such programs.
(b) Curricula 
The training at the Rural Policing Institute established under subsection (a) shall
(1) be configured in a manner so as not to duplicate or displace any law enforcement or emergency response program of the Federal Law Enforcement Training Center or a local or tribal government entity in existence on August 3, 2007; and
(2) to the maximum extent practicable, be delivered in a cost-effective manner at facilities of the Department, on closed military installations with adequate training facilities, or at facilities operated by the participants.
(c) Definition 
In this section, the term rural means an area that is not located in a metropolitan statistical area, as defined by the Office of Management and Budget.
(d) Authorization of appropriations 
There are authorized to be appropriated to carry out this section (including for contracts, staff, and equipment)
(1) $10,000,000 for fiscal year 2008; and
(2) $5,000,000 for each of fiscal years 2009 through 2013.

6 USC 124k - Interagency Threat Assessment and Coordination Group

(a) In general 
To improve the sharing of information within the scope of the information sharing environment established under section 485 of this title with State, local, tribal, and private sector officials, the Director of National Intelligence, through the program manager for the information sharing environment, in coordination with the Secretary, shall coordinate and oversee the creation of an Interagency Threat Assessment and Coordination Group (referred to in this section as the ITACG).
(b) Composition of ITACG 
The ITACG shall consist of
(1) an ITACG Advisory Council to set policy and develop processes for the integration, analysis, and dissemination of federally-coordinated information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information; and
(2) an ITACG Detail comprised of State, local, and tribal homeland security and law enforcement officers and intelligence analysts detailed to work in the National Counterterrorism Center with Federal intelligence analysts for the purpose of integrating, analyzing, and assisting in the dissemination of federally-coordinated information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, through appropriate channels identified by the ITACG Advisory Council.
(c) Responsibilities of program manager 
The program manager, in consultation with the Information Sharing Council, shall
(1) monitor and assess the efficacy of the ITACG; and
(2) not later than 180 days after August 3, 2007, and at least annually thereafter, submit to the Secretary, the Attorney General, the Director of National Intelligence, the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the progress of the ITACG.
(d) Responsibilities of Secretary 
The Secretary, or the Secretarys designee, in coordination with the Director of the National Counterterrorism Center and the ITACG Advisory Council, shall
(1) create policies and standards for the creation of information products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, that are suitable for dissemination to State, local, and tribal governments and the private sector;
(2) evaluate and develop processes for the timely dissemination of federally-coordinated information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, to State, local, and tribal governments and the private sector;
(3) establish criteria and a methodology for indicating to State, local, and tribal governments and the private sector the reliability of information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, disseminated to them;
(4) educate the intelligence community about the requirements of the State, local, and tribal homeland security, law enforcement, and other emergency response providers regarding information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information;
(5) establish and maintain the ITACG Detail, which shall assign an appropriate number of State, local, and tribal homeland security and law enforcement officers and intelligence analysts to work in the National Counterterrorism Center who shall
(A) educate and advise National Counterterrorism Center intelligence analysts about the requirements of the State, local, and tribal homeland security and law enforcement officers, and other emergency response providers regarding information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information;
(B) assist National Counterterrorism Center intelligence analysts in integrating, analyzing, and otherwise preparing versions of products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information that are unclassified or classified at the lowest possible level and suitable for dissemination to State, local, and tribal homeland security and law enforcement agencies in order to help deter and prevent terrorist attacks;
(C) implement, in coordination with National Counterterrorism Center intelligence analysts, the policies, processes, procedures, standards, and guidelines developed by the ITACG Advisory Council;
(D) assist in the dissemination of products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, to State, local, and tribal jurisdictions only through appropriate channels identified by the ITACG Advisory Council; and
(E) report directly to the senior intelligence official from the Department under paragraph (6);
(6) detail a senior intelligence official from the Department of Homeland Security to the National Counterterrorism Center, who shall
(A) manage the day-to-day operations of the ITACG Detail;
(B) report directly to the Director of the National Counterterrorism Center or the Directors designee; and
(C) in coordination with the Director of the Federal Bureau of Investigation, and subject to the approval of the Director of the National Counterterrorism Center, select a deputy from the pool of available detailees from the Federal Bureau of Investigation in the National Counterterrorism Center; and
(7) establish, within the ITACG Advisory Council, a mechanism to select law enforcement officers and intelligence analysts for placement in the National Counterterrorism Center consistent with paragraph (5), using criteria developed by the ITACG Advisory Council that shall encourage participation from a broadly representative group of State, local, and tribal homeland security and law enforcement agencies.
(e) Membership 
The Secretary, or the Secretarys designee, shall serve as the chair of the ITACG Advisory Council, which shall include
(1) representatives of
(A) the Department;
(B) the Federal Bureau of Investigation;
(C) the National Counterterrorism Center;
(D) the Department of Defense;
(E) the Department of Energy;
(F) the Department of State; and
(G) other Federal entities as appropriate;
(2) the program manager of the information sharing environment, designated under section 485 (f) of this title, or the program managers designee; and
(3) executive level law enforcement and intelligence officials from State, local, and tribal governments.
(f) Criteria 
The Secretary, in consultation with the Director of National Intelligence, the Attorney General, and the program manager of the information sharing environment established under section 485 of this title, shall
(1) establish procedures for selecting members of the ITACG Advisory Council and for the proper handling and safeguarding of products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, by those members; and
(2) ensure that at least 50 percent of the members of the ITACG Advisory Council are from State, local, and tribal governments.
(g) Operations 

(1) In general 
Beginning not later than 90 days after August 3, 2007, the ITACG Advisory Council shall meet regularly, but not less than quarterly, at the facilities of the National Counterterrorism Center of the Office of the Director of National Intelligence.
(2) Management 
Pursuant to section 404o (f)(E)1 of title 50, the Director of the National Counterterrorism Center, acting through the senior intelligence official from the Department of Homeland Security detailed pursuant to subsection (d)(6), shall ensure that
(A) the products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, prepared by the National Counterterrorism Center and the ITACG Detail for distribution to State, local, and tribal homeland security and law enforcement agencies reflect the requirements of such agencies and are produced consistently with the policies, processes, procedures, standards, and guidelines established by the ITACG Advisory Council;
(B) in consultation with the ITACG Advisory Council and consistent with sections 403–1 (f)(1)(B)(iii) and 404o (f)(E)1 of title 50, all products described in subparagraph (A) are disseminated through existing channels of the Department and the Department of Justice and other appropriate channels to State, local, and tribal government officials and other entities;
(C) all detailees under subsection (d)(5) have appropriate access to all relevant information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information, available at the National Counterterrorism Center in order to accomplish the objectives under that paragraph;
(D) all detailees under subsection (d)(5) have the appropriate security clearances and are trained in the procedures for handling, processing, storing, and disseminating classified products derived from information within the scope of the information sharing environment, including homeland security information, terrorism information, and weapons of mass destruction information; and
(E) all detailees under subsection (d)(5) complete appropriate privacy and civil liberties training.
(h) Inapplicability of the Federal Advisory Committee Act 
The Federal Advisory Committee Act (5 U.S.C. App.) shall not apply to the ITACG or any subsidiary groups thereof.
(i) Authorization of appropriations 
There are authorized to be appropriated such sums as may be necessary for each of fiscal years 2008 through 2012 to carry out this section, including to obtain security clearances for the State, local, and tribal participants in the ITACG.
[1] So in original. Probably should be section “404o(f)(1)(E)”.

6 USC 124l - National asset database

(a) Establishment 

(1) National asset database 
The Secretary shall establish and maintain a national database of each system or asset that
(A) the Secretary, in consultation with appropriate homeland security officials of the States, determines to be vital and the loss, interruption, incapacity, or destruction of which would have a negative or debilitating effect on the economic security, public health, or safety of the United States, any State, or any local government; or
(B) the Secretary determines is appropriate for inclusion in the database.
(2) Prioritized critical infrastructure list 
In accordance with Homeland Security Presidential Directive7, as in effect on January 1, 2007, the Secretary shall establish and maintain a single classified prioritized list of systems and assets included in the database under paragraph (1) that the Secretary determines would, if destroyed or disrupted, cause national or regional catastrophic effects.
(b) Use of database 
The Secretary shall use the database established under subsection (a)(1) in the development and implementation of Department plans and programs as appropriate.
(c) Maintenance of database 

(1) In general 
The Secretary shall maintain and annually update the database established under subsection (a)(1) and the list established under subsection (a)(2), including
(A) establishing data collection guidelines and providing such guidelines to the appropriate homeland security official of each State;
(B) regularly reviewing the guidelines established under subparagraph (A), including by consulting with the appropriate homeland security officials of States, to solicit feedback about the guidelines, as appropriate;
(C) after providing the homeland security official of a State with the guidelines under subparagraph (A), allowing the official a reasonable amount of time to submit to the Secretary any data submissions recommended by the official for inclusion in the database established under subsection (a)(1);
(D) examining the contents and identifying any submissions made by such an official that are described incorrectly or that do not meet the guidelines established under subparagraph (A); and
(E) providing to the appropriate homeland security official of each relevant State a list of submissions identified under subparagraph (D) for review and possible correction before the Secretary finalizes the decision of which submissions will be included in the database established under subsection (a)(1).
(2) Organization of information in database 
The Secretary shall organize the contents of the database established under subsection (a)(1) and the list established under subsection (a)(2) as the Secretary determines is appropriate. Any organizational structure of such contents shall include the categorization of the contents
(A) according to the sectors listed in National Infrastructure Protection Plan developed pursuant to Homeland Security Presidential Directive7; and
(B) by the State and county of their location.
(3) Private sector integration 
The Secretary shall identify and evaluate methods, including the Departments Protected Critical Infrastructure Information Program, to acquire relevant private sector information for the purpose of using that information to generate any database or list, including the database established under subsection (a)(1) and the list established under subsection (a)(2).
(4) Retention of classification 
The classification of information required to be provided to Congress, the Department, or any other department or agency under this section by a sector-specific agency, including the assignment of a level of classification of such information, shall be binding on Congress, the Department, and that other Federal agency.
(d) Reports 

(1) Report required 
Not later than 180 days after August 3, 2007, and annually thereafter, the Secretary shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the database established under subsection (a)(1) and the list established under subsection (a)(2).
(2) Contents of report 
Each such report shall include the following:
(A) The name, location, and sector classification of each of the systems and assets on the list established under subsection (a)(2).
(B) The name, location, and sector classification of each of the systems and assets on such list that are determined by the Secretary to be most at risk to terrorism.
(C) Any significant challenges in compiling the list of the systems and assets included on such list or in the database established under subsection (a)(1).
(D) Any significant changes from the preceding report in the systems and assets included on such list or in such database.
(E) If appropriate, the extent to which such database and such list have been used, individually or jointly, for allocating funds by the Federal Government to prevent, reduce, mitigate, or respond to acts of terrorism.
(F) The amount of coordination between the Department and the private sector, through any entity of the Department that meets with representatives of private sector industries for purposes of such coordination, for the purpose of ensuring the accuracy of such database and such list.
(G) Any other information the Secretary deems relevant.
(3) Classified information 
The report shall be submitted in unclassified form but may contain a classified annex.
(e) Inspector General study 
By not later than two years after August 3, 2007, the Inspector General of the Department shall conduct a study of the implementation of this section.
(f) National Infrastructure Protection Consortium 
The Secretary may establish a consortium to be known as the National Infrastructure Protection Consortium. The Consortium may advise the Secretary on the best way to identify, generate, organize, and maintain any database or list of systems and assets established by the Secretary, including the database established under subsection (a)(1) and the list established under subsection (a)(2). If the Secretary establishes the National Infrastructure Protection Consortium, the Consortium may
(1) be composed of national laboratories, Federal agencies, State and local homeland security organizations, academic institutions, or national Centers of Excellence that have demonstrated experience working with and identifying critical infrastructure and key resources; and
(2) provide input to the Secretary on any request pertaining to the contents of such database or such list.

Part B - Critical Infrastructure Information

6 USC 131 - Definitions

In this part:
(1) Agency 
The term agency has the meaning given it in section 551 of title 5.
(2) Covered Federal agency 
The term covered Federal agency means the Department of Homeland Security.
(3) Critical infrastructure information 
The term critical infrastructure information means information not customarily in the public domain and related to the security of critical infrastructure or protected systems
(A) actual, potential, or threatened interference with, attack on, compromise of, or incapacitation of critical infrastructure or protected systems by either physical or computer-based attack or other similar conduct (including the misuse of or unauthorized access to all types of communications and data transmission systems) that violates Federal, State, or local law, harms interstate commerce of the United States, or threatens public health or safety;
(B) the ability of any critical infrastructure or protected system to resist such interference, compromise, or incapacitation, including any planned or past assessment, projection, or estimate of the vulnerability of critical infrastructure or a protected system, including security testing, risk evaluation thereto, risk management planning, or risk audit; or
(C) any planned or past operational problem or solution regarding critical infrastructure or protected systems, including repair, recovery, reconstruction, insurance, or continuity, to the extent it is related to such interference, compromise, or incapacitation.
(4) Critical infrastructure protection program 
The term critical infrastructure protection program means any component or bureau of a covered Federal agency that has been designated by the President or any agency head to receive critical infrastructure information.
(5) Information Sharing and Analysis Organization 
The term Information Sharing and Analysis Organization means any formal or informal entity or collaboration created or employed by public or private sector organizations, for purposes of
(A) gathering and analyzing critical infrastructure information in order to better understand security problems and interdependencies related to critical infrastructure and protected systems, so as to ensure the availability, integrity, and reliability thereof;
(B) communicating or disclosing critical infrastructure information to help prevent, detect, mitigate, or recover from the effects of a[1] interference, compromise, or a[2] incapacitation problem related to critical infrastructure or protected systems; and
(C) voluntarily disseminating critical infrastructure information to its members, State, local, and Federal Governments, or any other entities that may be of assistance in carrying out the purposes specified in subparagraphs (A) and (B).
(6) Protected system 
The term protected system
(A) means any service, physical or computer-based system, process, or procedure that directly or indirectly affects the viability of a facility of critical infrastructure; and
(B) includes any physical or computer-based system, including a computer, computer system, computer or communications network, or any component hardware or element thereof, software program, processing instructions, or information or data in transmission or storage therein, irrespective of the medium of transmission or storage.
(7) Voluntary 

(A) In general 
The term voluntary, in the case of any submittal of critical infrastructure information to a covered Federal agency, means the submittal thereof in the absence of such agencys exercise of legal authority to compel access to or submission of such information and may be accomplished by a single entity or an Information Sharing and Analysis Organization on behalf of itself or its members.
(B) Exclusions 
The term voluntary
(i) in the case of any action brought under the securities laws as is defined in section 78c (a)(47) of title 15
(I) does not include information or statements contained in any documents or materials filed with the Securities and Exchange Commission, or with Federal banking regulators, pursuant to section 78l (i) of title 15; and
(II) with respect to the submittal of critical infrastructure information, does not include any disclosure or writing that when made accompanied the solicitation of an offer or a sale of securities; and
(ii) does not include information or statements submitted or relied upon as a basis for making licensing or permitting determinations, or during regulatory proceedings.
[1] So in original. Probably should be “an”.
[2] So in original. The word “a” probably should not appear.

6 USC 132 - Designation of critical infrastructure protection program

A critical infrastructure protection program may be designated as such by one of the following:
(1) The President.
(2) The Secretary of Homeland Security.

6 USC 133 - Protection of voluntarily shared critical infrastructure information

(a) Protection 

(1) In general 
Notwithstanding any other provision of law, critical infrastructure information (including the identity of the submitting person or entity) that is voluntarily submitted to a covered Federal agency for use by that agency regarding the security of critical infrastructure and protected systems, analysis, warning, interdependency study, recovery, reconstitution, or other informational purpose, when accompanied by an express statement specified in paragraph (2)
(A) shall be exempt from disclosure under section 552 of title 5 (commonly referred to as the Freedom of Information Act);
(B) shall not be subject to any agency rules or judicial doctrine regarding ex parte communications with a decision making official;
(C) shall not, without the written consent of the person or entity submitting such information, be used directly by such agency, any other Federal, State, or local authority, or any third party, in any civil action arising under Federal or State law if such information is submitted in good faith;
(D) shall not, without the written consent of the person or entity submitting such information, be used or disclosed by any officer or employee of the United States for purposes other than the purposes of this part, except
(i) in furtherance of an investigation or the prosecution of a criminal act; or
(ii) when disclosure of the information would be
(I) to either House of Congress, or to the extent of matter within its jurisdiction, any committee or subcommittee thereof, any joint committee thereof or subcommittee of any such joint committee; or
(II) to the Comptroller General, or any authorized representative of the Comptroller General, in the course of the performance of the duties of the Government Accountability Office.[1]
(E) shall not, if provided to a State or local government or government agency
(i) be made available pursuant to any State or local law requiring disclosure of information or records;
(ii) otherwise be disclosed or distributed to any party by said State or local government or government agency without the written consent of the person or entity submitting such information; or
(iii) be used other than for the purpose of protecting critical infrastructure or protected systems, or in furtherance of an investigation or the prosecution of a criminal act; and
(F) does not constitute a waiver of any applicable privilege or protection provided under law, such as trade secret protection.
(2) Express statement 
For purposes of paragraph (1), the term express statement, with respect to information or records, means
(A) in the case of written information or records, a written marking on the information or records substantially similar to the following: This information is voluntarily submitted to the Federal Government in expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure Information Act of 2002.; or
(B) in the case of oral information, a similar written statement submitted within a reasonable period following the oral communication.
(b) Limitation 
No communication of critical infrastructure information to a covered Federal agency made pursuant to this part shall be considered to be an action subject to the requirements of the Federal Advisory Committee Act.
(c) Independently obtained information 
Nothing in this section shall be construed to limit or otherwise affect the ability of a State, local, or Federal Government entity, agency, or authority, or any third party, under applicable law, to obtain critical infrastructure information in a manner not covered by subsection (a) of this section, including any information lawfully and properly disclosed generally or broadly to the public and to use such information in any manner permitted by law.
(d) Treatment of voluntary submittal of information 
The voluntary submittal to the Government of information or records that are protected from disclosure by this part shall not be construed to constitute compliance with any requirement to submit such information to a Federal agency under any other provision of law.
(e) Procedures 

(1) In general 
The Secretary of the Department of Homeland Security shall, in consultation with appropriate representatives of the National Security Council and the Office of Science and Technology Policy, establish uniform procedures for the receipt, care, and storage by Federal agencies of critical infrastructure information that is voluntarily submitted to the Government. The procedures shall be established not later than 90 days after November 25, 2002.
(2) Elements 
The procedures established under paragraph (1) shall include mechanisms regarding
(A) the acknowledgement of receipt by Federal agencies of critical infrastructure information that is voluntarily submitted to the Government;
(B) the maintenance of the identification of such information as voluntarily submitted to the Government for purposes of and subject to the provisions of this part;
(C) the care and storage of such information; and
(D) the protection and maintenance of the confidentiality of such information so as to permit the sharing of such information within the Federal Government and with State and local governments, and the issuance of notices and warnings related to the protection of critical infrastructure and protected systems, in such manner as to protect from public disclosure the identity of the submitting person or entity, or information that is proprietary, business sensitive, relates specifically to the submitting person or entity, and is otherwise not appropriately in the public domain.
(f) Penalties 
Whoever, being an officer or employee of the United States or of any department or agency thereof, knowingly publishes, divulges, discloses, or makes known in any manner or to any extent not authorized by law, any critical infrastructure information protected from disclosure by this part coming to him in the course of this employment or official duties or by reason of any examination or investigation made by, or return, report, or record made to or filed with, such department or agency or officer or employee thereof, shall be fined under title 18, imprisoned not more than 1 year, or both, and shall be removed from office or employment.
(g) Authority to issue warnings 
The Federal Government may provide advisories, alerts, and warnings to relevant companies, targeted sectors, other governmental entities, or the general public regarding potential threats to critical infrastructure as appropriate. In issuing a warning, the Federal Government shall take appropriate actions to protect from disclosure
(1) the source of any voluntarily submitted critical infrastructure information that forms the basis for the warning; or
(2) information that is proprietary, business sensitive, relates specifically to the submitting person or entity, or is otherwise not appropriately in the public domain.
(h) Authority to delegate 
The President may delegate authority to a critical infrastructure protection program, designated under section 132 of this title, to enter into a voluntary agreement to promote critical infrastructure security, including with any Information Sharing and Analysis Organization, or a plan of action as otherwise defined in section 2158 of title 50, Appendix.
[1] So in original. The period probably should be a semicolon.

6 USC 134 - No private right of action

Nothing in this part may be construed to create a private right of action for enforcement of any provision of this chapter.

Part C - Information Security

6 USC 141 - Procedures for sharing information

The Secretary shall establish procedures on the use of information shared under this subchapter that
(1) limit the redissemination of such information to ensure that it is not used for an unauthorized purpose;
(2) ensure the security and confidentiality of such information;
(3) protect the constitutional and statutory rights of any individuals who are subjects of such information; and
(4) provide data integrity through the timely removal and destruction of obsolete or erroneous names and information.

6 USC 142 - Privacy officer

(a) Appointment and responsibilities 
The Secretary shall appoint a senior official in the Department, who shall report directly to the Secretary, to assume primary responsibility for privacy policy, including
(1) assuring that the use of technologies sustain, and do not erode, privacy protections relating to the use, collection, and disclosure of personal information;
(2) assuring that personal information contained in Privacy Act systems of records is handled in full compliance with fair information practices as set out in the Privacy Act of 1974 [5 U.S.C. 552a];
(3) evaluating legislative and regulatory proposals involving collection, use, and disclosure of personal information by the Federal Government;
(4) conducting a privacy impact assessment of proposed rules of the Department or that of the Department on the privacy of personal information, including the type of personal information collected and the number of people affected;
(5) coordinating with the Officer for Civil Rights and Civil Liberties to ensure that
(A) programs, policies, and procedures involving civil rights, civil liberties, and privacy considerations are addressed in an integrated and comprehensive manner; and
(B) Congress receives appropriate reports on such programs, policies, and procedures; and
(6) preparing a report to Congress on an annual basis on activities of the Department that affect privacy, including complaints of privacy violations, implementation of the Privacy Act of 1974 [5 U.S.C. 552a], internal controls, and other matters.
(b) Authority to investigate 

(1) In general 
The senior official appointed under subsection (a) may
(A) have access to all records, reports, audits, reviews, documents, papers, recommendations, and other materials available to the Department that relate to programs and operations with respect to the responsibilities of the senior official under this section;
(B) make such investigations and reports relating to the administration of the programs and operations of the Department as are, in the senior officials judgment, necessary or desirable;
(C) subject to the approval of the Secretary, require by subpoena the production, by any person other than a Federal agency, of all information, documents, reports, answers, records, accounts, papers, and other data and documentary evidence necessary to performance of the responsibilities of the senior official under this section; and
(D) administer to or take from any person an oath, affirmation, or affidavit, whenever necessary to performance of the responsibilities of the senior official under this section.
(2) Enforcement of subpoenas 
Any subpoena issued under paragraph (1)(C) shall, in the case of contumacy or refusal to obey, be enforceable by order of any appropriate United States district court.
(3) Effect of oaths 
Any oath, affirmation, or affidavit administered or taken under paragraph (1)(D) by or before an employee of the Privacy Office designated for that purpose by the senior official appointed under subsection (a) shall have the same force and effect as if administered or taken by or before an officer having a seal of office.
(c) Supervision and coordination 

(1) In general 
The senior official appointed under subsection (a) shall
(A) report to, and be under the general supervision of, the Secretary; and
(B) coordinate activities with the Inspector General of the Department in order to avoid duplication of effort.
(2) Coordination with the Inspector General 

(A) In general 
Except as provided in subparagraph (B), the senior official appointed under subsection (a) may investigate any matter relating to possible violations or abuse concerning the administration of any program or operation of the Department relevant to the purposes under this section.
(B) Coordination 

(i) Referral Before initiating any investigation described under subparagraph (A), the senior official shall refer the matter and all related complaints, allegations, and information to the Inspector General of the Department.
(ii) Determinations and notifications by the Inspector General
(I) In general Not later than 30 days after the receipt of a matter referred under clause (i), the Inspector General shall
(aa) make a determination regarding whether the Inspector General intends to initiate an audit or investigation of the matter referred under clause (i); and
(bb) notify the senior official of that determination.
(II) Investigation not initiated If the Inspector General notifies the senior official under subclause (I)(bb) that the Inspector General intended to initiate an audit or investigation, but does not initiate that audit or investigation within 90 days after providing that notification, the Inspector General shall further notify the senior official that an audit or investigation was not initiated. The further notification under this subclause shall be made not later than 3 days after the end of that 90-day period.
(iii) Investigation by senior official The senior official may investigate a matter referred under clause (i) if
(I) the Inspector General notifies the senior official under clause (ii)(I)(bb) that the Inspector General does not intend to initiate an audit or investigation relating to that matter; or
(II) the Inspector General provides a further notification under clause (ii)(II) relating to that matter.
(iv) Privacy training Any employee of the Office of Inspector General who audits or investigates any matter referred under clause (i) shall be required to receive adequate training on privacy laws, rules, and regulations, to be provided by an entity approved by the Inspector General in consultation with the senior official appointed under subsection (a).
(d) Notification to Congress on removal 
If the Secretary removes the senior official appointed under subsection (a) or transfers that senior official to another position or location within the Department, the Secretary shall
(1) promptly submit a written notification of the removal or transfer to Houses of Congress; and
(2) include in any such notification the reasons for the removal or transfer.
(e) Reports by senior official to Congress 
The senior official appointed under subsection (a) shall
(1) submit reports directly to the Congress regarding performance of the responsibilities of the senior official under this section, without any prior comment or amendment by the Secretary, Deputy Secretary, or any other officer or employee of the Department or the Office of Management and Budget; and
(2) inform the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives not later than
(A) 30 days after the Secretary disapproves the senior officials request for a subpoena under subsection (b)(1)(C) or the Secretary substantively modifies the requested subpoena; or
(B) 45 days after the senior officials request for a subpoena under subsection (b)(1)(C), if that subpoena has not either been approved or disapproved by the Secretary.

6 USC 143 - Enhancement of non-Federal cybersecurity

In carrying out the responsibilities under section 121 of this title, the Under Secretary for Intelligence and Analysis, in cooperation with the Assistant Secretary for Infrastructure Protection[1] shall
(1) as appropriate, provide to State and local government entities, and upon request to private entities that own or operate critical information systems
(A) analysis and warnings related to threats to, and vulnerabilities of, critical information systems; and
(B) in coordination with the Under Secretary for Emergency Preparedness and Response, crisis management support in response to threats to, or attacks on, critical information systems; and
(2) as appropriate, provide technical assistance, upon request, to the private sector and other government entities, in coordination with the Under Secretary for Emergency Preparedness and Response, with respect to emergency recovery plans to respond to major failures of critical information systems.
[1] So in original. Probably should be followed by a comma.

6 USC 144 - NET Guard

The Assistant Secretary for Infrastructure Protection may establish a national technology guard, to be known as NET Guard, comprised of local teams of volunteers with expertise in relevant areas of science and technology, to assist local communities to respond and recover from attacks on information systems and communications networks.

6 USC 145 - Cyber Security Enhancement Act of 2002

(a) Short title 
This section may be cited as the Cyber Security Enhancement Act of 2002.
(b) Amendment of sentencing guidelines relating to certain computer crimes 

(1) Directive to the United States Sentencing Commission 
Pursuant to its authority under section 994 (p) of title 28 and in accordance with this subsection, the United States Sentencing Commission shall review and, if appropriate, amend its guidelines and its policy statements applicable to persons convicted of an offense under section 1030 of title 18.
(2) Requirements 
In carrying out this subsection, the Sentencing Commission shall
(A) ensure that the sentencing guidelines and policy statements reflect the serious nature of the offenses described in paragraph (1), the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses;
(B) consider the following factors and the extent to which the guidelines may or may not account for them
(i) the potential and actual loss resulting from the offense;
(ii) the level of sophistication and planning involved in the offense;
(iii) whether the offense was committed for purposes of commercial advantage or private financial benefit;
(iv) whether the defendant acted with malicious intent to cause harm in committing the offense;
(v) the extent to which the offense violated the privacy rights of individuals harmed;
(vi) whether the offense involved a computer used by the government in furtherance of national defense, national security, or the administration of justice;
(vii) whether the violation was intended to or had the effect of significantly interfering with or disrupting a critical infrastructure; and
(viii) whether the violation was intended to or had the effect of creating a threat to public health or safety, or injury to any person;
(C) assure reasonable consistency with other relevant directives and with other sentencing guidelines;
(D) account for any additional aggravating or mitigating circumstances that might justify exceptions to the generally applicable sentencing ranges;
(E) make any necessary conforming changes to the sentencing guidelines; and
(F) assure that the guidelines adequately meet the purposes of sentencing as set forth in section 3553 (a)(2) of title 18.
(c) Study and report on computer crimes 
Not later than May 1, 2003, the United States Sentencing Commission shall submit a brief report to Congress that explains any actions taken by the Sentencing Commission in response to this section and includes any recommendations the Commission may have regarding statutory penalties for offenses under section 1030 of title 18.
(d) Emergency disclosure exception 

(1) Omitted 
(2) Reporting of disclosures 
A government entity that receives a disclosure under section 2702 (b) of title 18 shall file, not later than 90 days after such disclosure, a report to the Attorney General stating the paragraph of that section under which the disclosure was made, the date of the disclosure, the entity to which the disclosure was made, the number of customers or subscribers to whom the information disclosed pertained, and the number of communications, if any, that were disclosed. The Attorney General shall publish all such reports into a single report to be submitted to Congress 1 year after November 25, 2002.

Part D - Office of Science and Technology

6 USC 161 - Establishment of Office; Director

(a) Establishment 

(1) In general 
There is hereby established within the Department of Justice an Office of Science and Technology (hereinafter in this subchapter referred to as the Office).
(2) Authority 
The Office shall be under the general authority of the Assistant Attorney General, Office of Justice Programs, and shall be established within the National Institute of Justice.
(b) Director 
The Office shall be headed by a Director, who shall be an individual appointed based on approval by the Office of Personnel Management of the executive qualifications of the individual.

6 USC 162 - Mission of Office; duties

(a) Mission 
The mission of the Office shall be
(1) to serve as the national focal point for work on law enforcement technology; and
(2) to carry out programs that, through the provision of equipment, training, and technical assistance, improve the safety and effectiveness of law enforcement technology and improve access to such technology by Federal, State, and local law enforcement agencies.
(b) Duties 
In carrying out its mission, the Office shall have the following duties:
(1) To provide recommendations and advice to the Attorney General.
(2) To establish and maintain advisory groups (which shall be exempt from the provisions of the Federal Advisory Committee Act (5 U.S.C. App.)) to assess the law enforcement technology needs of Federal, State, and local law enforcement agencies.
(3) To establish and maintain performance standards in accordance with the National Technology Transfer and Advancement Act of 1995 (Public Law 104113) for, and test and evaluate law enforcement technologies that may be used by, Federal, State, and local law enforcement agencies.
(4) To establish and maintain a program to certify, validate, and mark or otherwise recognize law enforcement technology products that conform to standards established and maintained by the Office in accordance with the National Technology Transfer and Advancement Act of 1995 (Public Law 104113). The program may, at the discretion of the Office, allow for suppliers declaration of conformity with such standards.
(5) To work with other entities within the Department of Justice, other Federal agencies, and the executive office of the President to establish a coordinated Federal approach on issues related to law enforcement technology.
(6) To carry out research, development, testing, evaluation, and cost-benefit analyses in fields that would improve the safety, effectiveness, and efficiency of law enforcement technologies used by Federal, State, and local law enforcement agencies, including, but not limited to
(A) weapons capable of preventing use by unauthorized persons, including personalized guns;
(B) protective apparel;
(C) bullet-resistant and explosion-resistant glass;
(D) monitoring systems and alarm systems capable of providing precise location information;
(E) wire and wireless interoperable communication technologies;
(F) tools and techniques that facilitate investigative and forensic work, including computer forensics;
(G) equipment for particular use in counterterrorism, including devices and technologies to disable terrorist devices;
(H) guides to assist State and local law enforcement agencies;
(I) DNA identification technologies; and
(J) tools and techniques that facilitate investigations of computer crime.
(7) To administer a program of research, development, testing, and demonstration to improve the interoperability of voice and data public safety communications.
(8) To serve on the Technical Support Working Group of the Department of Defense, and on other relevant interagency panels, as requested.
(9) To develop, and disseminate to State and local law enforcement agencies, technical assistance and training materials for law enforcement personnel, including prosecutors.
(10) To operate the regional National Law Enforcement and Corrections Technology Centers and, to the extent necessary, establish additional centers through a competitive process.
(11) To administer a program of acquisition, research, development, and dissemination of advanced investigative analysis and forensic tools to assist State and local law enforcement agencies in combating cybercrime.
(12) To support research fellowships in support of its mission.
(13) To serve as a clearinghouse for information on law enforcement technologies.
(14) To represent the United States and State and local law enforcement agencies, as requested, in international activities concerning law enforcement technology.
(15) To enter into contracts and cooperative agreements and provide grants, which may require in-kind or cash matches from the recipient, as necessary to carry out its mission.
(16) To carry out other duties assigned by the Attorney General to accomplish the mission of the Office.
(c) Competition required 
Except as otherwise expressly provided by law, all research and development carried out by or through the Office shall be carried out on a competitive basis.
(d) Information from Federal agencies 
Federal agencies shall, upon request from the Office and in accordance with Federal law, provide the Office with any data, reports, or other information requested, unless compliance with such request is otherwise prohibited by law.
(e) Publications 
Decisions concerning publications issued by the Office shall rest solely with the Director of the Office.
(f) Transfer of funds 
The Office may transfer funds to other Federal agencies or provide funding to non-Federal entities through grants, cooperative agreements, or contracts to carry out its duties under this section: Provided, That any such transfer or provision of funding shall be carried out in accordance with section 605 of Public Law 10777.
(g) Annual report 
The Director of the Office shall include with the budget justification materials submitted to Congress in support of the Department of Justice budget for each fiscal year (as submitted with the budget of the President under section 1105 (a) of title 31) a report on the activities of the Office. Each such report shall include the following:
(1) For the period of 5 fiscal years beginning with the fiscal year for which the budget is submitted
(A) the Directors assessment of the needs of Federal, State, and local law enforcement agencies for assistance with respect to law enforcement technology and other matters consistent with the mission of the Office; and
(B) a strategic plan for meeting such needs of such law enforcement agencies.
(2) For the fiscal year preceding the fiscal year for which such budget is submitted, a description of the activities carried out by the Office and an evaluation of the extent to which those activities successfully meet the needs assessed under paragraph (1)(A) in previous reports.

6 USC 163 - Definition of law enforcement technology

For the purposes of this subchapter, the term law enforcement technology includes investigative and forensic technologies, corrections technologies, and technologies that support the judicial process.

6 USC 164 - Abolishment of Office of Science and Technology of National Institute of Justice; transfer of functions

(a) Authority to transfer functions 
The Attorney General may transfer to the Office any other program or activity of the Department of Justice that the Attorney General, in consultation with the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives, determines to be consistent with the mission of the Office.
(b) Transfer of personnel and assets 
With respect to any function, power, or duty, or any program or activity, that is established in the Office, those employees and assets of the element of the Department of Justice from which the transfer is made that the Attorney General determines are needed to perform that function, power, or duty, or for that program or activity, as the case may be, shall be transferred to the Office: Provided, That any such transfer shall be carried out in accordance with section 605 of Public Law 10777.
(c) Report on implementation 
Not later than 1 year after November 25, 2002, the Attorney General shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives a report on the implementation of this subchapter. The report shall
(1) provide an accounting of the amounts and sources of funding available to the Office to carry out its mission under existing authorizations and appropriations, and set forth the future funding needs of the Office; and
(2) include such other information and recommendations as the Attorney General considers appropriate.

6 USC 165 - National Law Enforcement and Corrections Technology Centers

(a) In general 
The Director of the Office shall operate and support National Law Enforcement and Corrections Technology Centers (hereinafter in this section referred to as Centers) and, to the extent necessary, establish new centers through a merit-based, competitive process.
(b) Purpose of Centers 
The purpose of the Centers shall be to
(1) support research and development of law enforcement technology;
(2) support the transfer and implementation of technology;
(3) assist in the development and dissemination of guidelines and technological standards; and
(4) provide technology assistance, information, and support for law enforcement, corrections, and criminal justice purposes.
(c) Annual meeting 
Each year, the Director shall convene a meeting of the Centers in order to foster collaboration and communication between Center participants.
(d) Report 
Not later than 12 months after November 25, 2002, the Director shall transmit to the Congress a report assessing the effectiveness of the existing system of Centers and identify the number of Centers necessary to meet the technology needs of Federal, State, and local law enforcement in the United States.