Creates a federal Checkpoint Program Management Office (CPMO) inside U.S. Border Patrol to oversee land‑border checkpoint operations nationwide, require standardized policies, data collection, training, and reporting on checkpoint activity and surveillance technology, and establish points of contact for sector-level oversight. The law requires multiple reports to Congress, a GAO review, and specific plans and timelines (many due within 180 days), forbids any new appropriations to implement it, and automatically expires five years after enactment.
Defines the term “appropriate congressional committees” as: the ; and the . (The text contains two placeholders and does not specify which committees.)
Defines the term “Assistant Chief” as the Assistant Chief selected to manage the CPMO pursuant to section 3(a)(2).
Defines the term “checkpoint” as a permanent or temporary checkpoint operated by the U.S. Border Patrol.
Defines the term “Chief” as the Chief of the U.S. Border Patrol.
Defines the term “CPMO” as the Checkpoint Program Management Office established pursuant to section 3.
Federal border enforcement agencies and personnel: U.S. Border Patrol agents, sector leaders, and CBP staff will face new oversight, reporting, and coordination requirements. They must follow standardized policies, provide data, participate in training, and appoint sector checkpoint contacts. Checkpoint operations may become more uniform and subject to review and covert testing. Travelers and drivers at land‑border checkpoints: checkpoint encounters and secondary inspections will be recorded in more detail and reported up the chain, which may mean more consistent documentation of stops, searches, seizures, referrals, and outcomes; this could increase transparency but also raise privacy and civil‑liberties questions about surveillance and data retention. Oversight and accountability bodies: DHS leadership, Congress, and the GAO will receive new regular reporting and a near‑term GAO evaluation, giving lawmakers and auditors more information on checkpoint practices and surveillance technology use. Implementation constraints: because the Act bars new appropriations, agencies must implement requirements within existing budgets or reallocate funds, which could limit the speed or scale of implementation. Duration: all requirements expire after five years, making the changes temporary unless reauthorized. Civil‑liberties and privacy stakeholders: increased data collection and unredacted surveillance reporting may trigger privacy and legal scrutiny by advocacy groups and the public. Local communities near checkpoints may see modest effects through changes in checkpoint practices and reporting but are not assigned direct responsibilities.
Read twice and referred to the Committee on Homeland Security and Governmental Affairs.
Last progress June 12, 2025 (8 months ago)
Introduced on June 12, 2025 by Richard Lynn Scott