Difference between revisions of "Real ID Act"
Line 8: | Line 8: | ||
|Categories of personal information covered=Authenticating, Identifying, Computer Device, Communication | |Categories of personal information covered=Authenticating, Identifying, Computer Device, Communication | ||
|Short summary introduction=An Act to establish and rapidly implement regulations for state driver's license and identification document security standards, to prevent terrorists from abusing the asylum laws of the United States, to unify terrorism-related grounds for inadmissibility and removal, and to ensure expeditious construction of the San Diego border fence. | |Short summary introduction=An Act to establish and rapidly implement regulations for state driver's license and identification document security standards, to prevent terrorists from abusing the asylum laws of the United States, to unify terrorism-related grounds for inadmissibility and removal, and to ensure expeditious construction of the San Diego border fence. | ||
− | |Text of the law=SEC. 203. TRAFFICKING IN AUTHENTICATION FEATURES FOR USE IN | + | |Text of the law={{SectionHarm|Section=SEC. 203. TRAFFICKING IN AUTHENTICATION FEATURES FOR USE IN |
− | FALSE IDENTIFICATION DOCUMENTS. | + | FALSE IDENTIFICATION DOCUMENTS.|Harms=Distortion, Identification, Insecurity}} |
+ | |||
(a) CRIMINAL PENALTY.—Section 1028(a)(8) of title 18, United | (a) CRIMINAL PENALTY.—Section 1028(a)(8) of title 18, United | ||
States Code, is amended by striking ‘‘false authentication features’’ | States Code, is amended by striking ‘‘false authentication features’’ | ||
and inserting ‘‘false or actual authentication features’’. | and inserting ‘‘false or actual authentication features’’. | ||
+ | |||
(b) USE OF FALSE DRIVER’S LICENSE AT AIRPORTS.— | (b) USE OF FALSE DRIVER’S LICENSE AT AIRPORTS.— | ||
+ | |||
(1) IN GENERAL.—The Secretary shall enter, into the appropriate aviation security screening database, appropriate | (1) IN GENERAL.—The Secretary shall enter, into the appropriate aviation security screening database, appropriate | ||
information regarding any person convicted of using a false | information regarding any person convicted of using a false | ||
driver’s license at an airport (as such term is defined in section | driver’s license at an airport (as such term is defined in section | ||
40102 of title 49, United States Code). | 40102 of title 49, United States Code). | ||
+ | |||
(2) FALSE DEFINED.—In this subsection, the term ‘‘false’’ | (2) FALSE DEFINED.—In this subsection, the term ‘‘false’’ | ||
has the same meaning such term has under section 1028(d) | has the same meaning such term has under section 1028(d) | ||
of title 18, United States Code. | of title 18, United States Code. | ||
+ | |||
SEC. 302. USE OF GROUND SURVEILLANCE TECHNOLOGIES FOR | SEC. 302. USE OF GROUND SURVEILLANCE TECHNOLOGIES FOR | ||
BORDER SECURITY. | BORDER SECURITY. | ||
+ | |||
(a) PILOT PROGRAM.—Not later than 180 days after the date | (a) PILOT PROGRAM.—Not later than 180 days after the date | ||
of the enactment of this division, the Under Secretary of Homeland | of the enactment of this division, the Under Secretary of Homeland | ||
Line 33: | Line 39: | ||
border security of the United States. In developing the program, | border security of the United States. In developing the program, | ||
the Under Secretary shall— | the Under Secretary shall— | ||
+ | |||
(1) consider various current and proposed ground surveillance technologies that could be utilized to enhance the border | (1) consider various current and proposed ground surveillance technologies that could be utilized to enhance the border | ||
security of the United States; | security of the United States; | ||
+ | |||
(2) assess the threats to the border security of the United | (2) assess the threats to the border security of the United | ||
States that could be addressed by the utilization of such technologies; and | States that could be addressed by the utilization of such technologies; and | ||
+ | |||
(3) assess the feasibility and advisability of utilizing such | (3) assess the feasibility and advisability of utilizing such | ||
technologies to address such threats, including an assessment | technologies to address such threats, including an assessment | ||
of the technologies considered best suited to address such | of the technologies considered best suited to address such | ||
threats. | threats. | ||
+ | |||
(b) ADDITIONAL REQUIREMENTS.— | (b) ADDITIONAL REQUIREMENTS.— | ||
+ | |||
(1) IN GENERAL.—The pilot program shall include the utilization of a variety of ground surveillance technologies in a | (1) IN GENERAL.—The pilot program shall include the utilization of a variety of ground surveillance technologies in a | ||
variety of topographies and areas (including both populated | variety of topographies and areas (including both populated | ||
Line 47: | Line 58: | ||
borders of the United States in order to evaluate, for a range | borders of the United States in order to evaluate, for a range | ||
of circumstances— | of circumstances— | ||
+ | |||
(A) the significance of previous experiences with such | (A) the significance of previous experiences with such | ||
technologies in homeland security or critical infrastructure | technologies in homeland security or critical infrastructure | ||
protection for the utilization of such technologies for border | protection for the utilization of such technologies for border | ||
security; | security; | ||
+ | |||
(B) the cost, utility, and effectiveness of such technologies for border security; and | (B) the cost, utility, and effectiveness of such technologies for border security; and | ||
+ | |||
(C) liability, safety, and privacy concerns relating to | (C) liability, safety, and privacy concerns relating to | ||
the utilization of such technologies for border security. | the utilization of such technologies for border security. | ||
+ | |||
(2) TECHNOLOGIES.—The ground surveillance technologies | (2) TECHNOLOGIES.—The ground surveillance technologies | ||
utilized in the pilot program shall include the following: | utilized in the pilot program shall include the following: | ||
+ | |||
(A) Video camera technology. | (A) Video camera technology. | ||
+ | |||
(B) Sensor technology. | (B) Sensor technology. | ||
+ | |||
(C) Motion detection technology. | (C) Motion detection technology. | ||
+ | |||
(c) IMPLEMENTATION.—The Under Secretary of Homeland Security for Border and Transportation Security shall implement the | (c) IMPLEMENTATION.—The Under Secretary of Homeland Security for Border and Transportation Security shall implement the | ||
pilot program developed under this section. | pilot program developed under this section. | ||
+ | |||
(d) REPORT.—Not later than 1 year after implementing the | (d) REPORT.—Not later than 1 year after implementing the | ||
pilot program under subsection (a), the Under Secretary shall | pilot program under subsection (a), the Under Secretary shall | ||
Line 70: | Line 90: | ||
as the Under Secretary finds appropriate, including recommendations for terminating the program, making the program permanent, | as the Under Secretary finds appropriate, including recommendations for terminating the program, making the program permanent, | ||
or enhancing the program. | or enhancing the program. | ||
+ | |||
SEC. 303. ENHANCEMENT OF COMMUNICATIONS INTEGRATION AND | SEC. 303. ENHANCEMENT OF COMMUNICATIONS INTEGRATION AND | ||
INFORMATION SHARING ON BORDER SECURITY. | INFORMATION SHARING ON BORDER SECURITY. | ||
+ | |||
(a) IN GENERAL.—Not later than 180 days after the date of | (a) IN GENERAL.—Not later than 180 days after the date of | ||
the enactment of this division, the Secretary of Homeland Security, | the enactment of this division, the Secretary of Homeland Security, | ||
Line 81: | Line 103: | ||
for Communications and Information, and other appropriate Federal, State, local, and tribal agencies, shall develop and implement | for Communications and Information, and other appropriate Federal, State, local, and tribal agencies, shall develop and implement | ||
a plan— | a plan— | ||
+ | |||
(1) to improve the communications systems of the departments and agencies of the Federal Government in order to | (1) to improve the communications systems of the departments and agencies of the Federal Government in order to | ||
facilitate the integration of communications among the departments and agencies of the Federal Government and State, | facilitate the integration of communications among the departments and agencies of the Federal Government and State, | ||
local government agencies, and Indian tribal agencies on matters relating to border security; and | local government agencies, and Indian tribal agencies on matters relating to border security; and | ||
+ | |||
(2) to enhance information sharing among the departments | (2) to enhance information sharing among the departments | ||
and agencies of the Federal Government, State and local | and agencies of the Federal Government, State and local | ||
government agencies, and Indian tribal agencies on such matters. | government agencies, and Indian tribal agencies on such matters. | ||
+ | |||
(b) REPORT.—Not later than 1 year after implementing the | (b) REPORT.—Not later than 1 year after implementing the | ||
plan under subsection (a), the Secretary shall submit a copy of | plan under subsection (a), the Secretary shall submit a copy of |
Revision as of 10:33, 26 April 2020
Real ID Act | |
---|---|
Short Title | Real ID Act of 2005 |
Official Text | Real ID Act |
Country/Jurisdiction | United States |
State or Province | |
Regulatory Bodies | United States Congress |
Date Enacted | 2005/05/11 |
Scope of the Law | Individuals |
Information | |
Taxonomy | Distortion, Identification, Insecurity |
Strategies |
An Act to establish and rapidly implement regulations for state driver's license and identification document security standards, to prevent terrorists from abusing the asylum laws of the United States, to unify terrorism-related grounds for inadmissibility and removal, and to ensure expeditious construction of the San Diego border fence.
Text of the law
SEC. 203. TRAFFICKING IN AUTHENTICATION FEATURES FOR USE IN FALSE IDENTIFICATION DOCUMENTS. Distortion, Identification, Insecurity
(a) CRIMINAL PENALTY.—Section 1028(a)(8) of title 18, United
States Code, is amended by striking ‘‘false authentication features’’
and inserting ‘‘false or actual authentication features’’.
(b) USE OF FALSE DRIVER’S LICENSE AT AIRPORTS.—
(1) IN GENERAL.—The Secretary shall enter, into the appropriate aviation security screening database, appropriate information regarding any person convicted of using a false driver’s license at an airport (as such term is defined in section 40102 of title 49, United States Code).
(2) FALSE DEFINED.—In this subsection, the term ‘‘false’’ has the same meaning such term has under section 1028(d) of title 18, United States Code.
SEC. 302. USE OF GROUND SURVEILLANCE TECHNOLOGIES FOR BORDER SECURITY.
(a) PILOT PROGRAM.—Not later than 180 days after the date of the enactment of this division, the Under Secretary of Homeland Security for Science and Technology, in consultation with the Under Secretary of Homeland Security for Border and Transportation Security, the Under Secretary of Homeland Security for Information Analysis and Infrastructure Protection, and the Secretary of Defense, shall develop a pilot program to utilize, or increase the utilization of, ground surveillance technologies to enhance the border security of the United States. In developing the program, the Under Secretary shall—
(1) consider various current and proposed ground surveillance technologies that could be utilized to enhance the border security of the United States;
(2) assess the threats to the border security of the United States that could be addressed by the utilization of such technologies; and
(3) assess the feasibility and advisability of utilizing such technologies to address such threats, including an assessment of the technologies considered best suited to address such threats.
(b) ADDITIONAL REQUIREMENTS.—
(1) IN GENERAL.—The pilot program shall include the utilization of a variety of ground surveillance technologies in a variety of topographies and areas (including both populated and unpopulated areas) on both the northern and southern borders of the United States in order to evaluate, for a range of circumstances—
(A) the significance of previous experiences with such technologies in homeland security or critical infrastructure protection for the utilization of such technologies for border security;
(B) the cost, utility, and effectiveness of such technologies for border security; and
(C) liability, safety, and privacy concerns relating to the utilization of such technologies for border security.
(2) TECHNOLOGIES.—The ground surveillance technologies utilized in the pilot program shall include the following:
(A) Video camera technology.
(B) Sensor technology.
(C) Motion detection technology.
(c) IMPLEMENTATION.—The Under Secretary of Homeland Security for Border and Transportation Security shall implement the pilot program developed under this section.
(d) REPORT.—Not later than 1 year after implementing the pilot program under subsection (a), the Under Secretary shall submit a report on the program to the Senate Committee on Commerce, Science, and Transportation, the House of Representatives Committee on Science, the House of Representatives Committee on Homeland Security, and the House of Representatives Committee on the Judiciary. The Under Secretary shall include in the report a description of the program together with such recommendations as the Under Secretary finds appropriate, including recommendations for terminating the program, making the program permanent, or enhancing the program.
SEC. 303. ENHANCEMENT OF COMMUNICATIONS INTEGRATION AND INFORMATION SHARING ON BORDER SECURITY.
(a) IN GENERAL.—Not later than 180 days after the date of the enactment of this division, the Secretary of Homeland Security, acting through the Under Secretary of Homeland Security for Border and Transportation Security, in consultation with the Under Secretary of Homeland Security for Science and Technology, the Under Secretary of Homeland Security for Information Analysis and Infrastructure Protection, the Assistant Secretary of Commerce for Communications and Information, and other appropriate Federal, State, local, and tribal agencies, shall develop and implement a plan—
(1) to improve the communications systems of the departments and agencies of the Federal Government in order to facilitate the integration of communications among the departments and agencies of the Federal Government and State, local government agencies, and Indian tribal agencies on matters relating to border security; and
(2) to enhance information sharing among the departments and agencies of the Federal Government, State and local government agencies, and Indian tribal agencies on such matters.
(b) REPORT.—Not later than 1 year after implementing the plan under subsection (a), the Secretary shall submit a copy of the plan and a report on the plan, including any recommendations the Secretary finds appropriate, to the Senate Committee on Commerce, Science, and Transportation, the House of Representatives Committee on Science, the House of Representatives Committee on Homeland Security, and the House of Representatives Committee on the Judiciary.
Disclaimer: The text of this law may not be the most recent version. We make no warranties or representations about the accuracy, completeness, or adequacy of the information contained on this site. Please check official sources.