Department of Homeland Security Vehicular Terrorism Prevention and Mitigation Act of 2025

Download PDF
Bill ID: 119/hr/1608
Last Updated: November 20, 2025

Sponsored by

Rep. Gimenez, Carlos A. [R-FL-28]

ID: G000593

Bill's Journey to Becoming a Law

Track this bill's progress through the legislative process

Latest Action

Invalid Date

Introduced

📍 Current Status

Next: The bill will be reviewed by relevant committees who will debate, amend, and vote on it.

🏛️

Committee Review

🗳️

Floor Action

âś…

Passed Senate

🏛️

House Review

🎉

Passed Congress

🖊️

Presidential Action

⚖️

Became Law

📚 How does a bill become a law?

1. Introduction: A member of Congress introduces a bill in either the House or Senate.

2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.

3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.

4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.

5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.

6. Presidential Action: The President can sign the bill into law, veto it, or take no action.

7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!

Bill Summary

Another masterpiece of legislative theater, brought to you by the same geniuses who think a report on "emerging threats" will somehow magically prevent vehicular terrorism. Let me dissect this farce for you.

**Main Purpose & Objectives:** The bill's primary objective is to create a report – yes, just a report – on the Department of Homeland Security's efforts to prevent and respond to vehicular terrorism. Because what we really need is more paperwork and bureaucratic posturing. The "report" will supposedly assess current and emerging threats, analyze methods and motivations, and evaluate domestic and international trends. Wow, I can already feel the terrorists shaking in their boots.

**Key Provisions & Changes to Existing Law:** The bill requires the Secretary of Homeland Security to submit a report within 180 days, which is just enough time for the bureaucrats to gather some statistics, copy-paste from existing reports, and slap on a fancy cover page. The report will include an assessment of threats, a review of higher-risk locations, and a summary of actions taken by various agencies. Oh, and it'll also identify potential future threats related to autonomous vehicles and ride-sharing services – because that's not already being done by actual experts in the field.

**Affected Parties & Stakeholders:** The usual suspects are involved: the Department of Homeland Security, Transportation Security Administration, Cybersecurity and Infrastructure Security Agency, State, local, Tribal, and territorial governments, and industry partners. You know, the same folks who have been "working together" to prevent terrorism for years with such great success.

**Potential Impact & Implications:** The impact will be negligible, as this bill is nothing more than a PR stunt designed to make politicians look like they're doing something about terrorism. The report will likely gather dust on some shelf, and the only real outcome will be the creation of more bureaucratic jobs and the allocation of funds for "research" and "studies." Meanwhile, actual counter-terrorism efforts will continue to suffer from lack of resources and effective strategies.

Diagnosis: This bill is a classic case of "Legislative Placebo Syndrome," where politicians prescribe a feel-good solution that does nothing to address the underlying problem. The real disease here is bureaucratic ineptitude, and this bill is just another symptom of a system more concerned with appearances than actual results.

Treatment: A healthy dose of skepticism, followed by a strong injection of reality-based policy-making. But don't hold your breath; in Washington, D.C., placebos are the preferred treatment for most ailments.

Related Topics

Government Operations & Accountability Civil Rights & Liberties Criminal Justice & Law Enforcement Federal Budget & Appropriations State & Local Government Affairs Congressional Rules & Procedures Small Business & Entrepreneurship National Security & Intelligence Transportation & Infrastructure
Generated using Llama 3.1 70B (Dr. Haus personality)

đź’° Campaign Finance Network

Rep. Gimenez, Carlos A. [R-FL-28]

Congress 119 • 2024 Election Cycle

Total Contributions
$94,200
19 donors
PACs
$0
Organizations
$0
Committees
$0
Individuals
$94,200

No PAC contributions found

No organization contributions found

No committee contributions found

1
HOLMES, TERESA
2 transactions
$8,000
2
CARR, JIM
1 transaction
$6,600
3
GRIFFIN, KENNETH
1 transaction
$6,600
4
KEMMERER, JOHN L
1 transaction
$6,600
5
KEMMERER, KAREN
1 transaction
$6,600
6
STAHL, LEWIS
1 transaction
$6,600
7
POOLE, GREG III
1 transaction
$5,000
8
CARRICARTE, MICHAEL
1 transaction
$5,000
9
TORRES, HUMBERTO
1 transaction
$5,000
10
TORRES, YADIRA
1 transaction
$5,000
11
BERMAN, MICHAEL
1 transaction
$4,000
12
CHASE, KEVIN
1 transaction
$4,000
13
NAHMAD, AL
1 transaction
$4,000
14
SANCHEZ, IGNACIO
1 transaction
$4,000
15
YONKE, ERIC
1 transaction
$4,000
16
CODINA, MARGARITA
1 transaction
$3,300
17
FALIC, JANA
1 transaction
$3,300
18
FALIC, SIMON
1 transaction
$3,300
19
HECKLER, ALEXANDER
1 transaction
$3,300

Donor Network - Rep. Gimenez, Carlos A. [R-FL-28]

PACs
Organizations
Individuals
Politicians

Hub layout: Politicians in center, donors arranged by type in rings around them.

Loading...

Showing 20 nodes and 20 connections

Total contributions: $94,200

Top Donors - Rep. Gimenez, Carlos A. [R-FL-28]

Showing top 19 donors by contribution amount

19 Individuals

Project 2025 Policy Matches

This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.

Introduction

Low 54.4%
Pages: 254-256

— 222 — Mandate for Leadership: The Conservative Promise forward-leaning in sharing cyber threat intelligence with private-sector partners and the public, emphasizing that the protective nature of such information is of value only if put into the right hands at the right time. Since critical infrastructure and services are overwhelmingly owned, managed, and defended by the private sector in the United States, there has been an increasing emphasis on declassify- ing intelligence and sharing actionable information with private-sector partners, often through industry-specific Information Sharing and Analysis Centers (ISACs); regional meetings of government and private-sector experts called InfraGard, run by the FBI; direct public notification from the Department of Homeland Security, the FBI, and (increasingly) the NSA; and more discreet one-on-one engagements led by the collecting agencies. These programs properly recognize the private sector’s role in providing cyber- security for Americans; in practice, however, the intelligence shared by the U.S. government through these venues is too often already known or no longer relevant by the time it makes its way through the downgrade process for sharing. In addition, government-shared information often needs to take advantage of the opportunity to provide contexts, such as attribution, trends, and size of the observed cyber problem. As warranted, additional context should be provided to the private sector as a matter of routine. To continue improving the U.S. government’s ability to defend the country’s most vital networks, the IC must adopt an “obligation to share” policy process, including the capacity for “write to release” intelligence products whereby newly discovered technical indicators, targeting, and other intelligence relevant to cyber defense are automatically provided either to the public or to targeted entities within 48 hours of their collection—which is how counterterrorism intel- ligence has been managed for years when it comes to a “duty to warn.” Under this policy, agency heads should still have the flexibility to withhold intelligence for operational or counterintelligence reasons but would need to report regularly to Congress on the number of and justification for exceptions. This policy would make sharing intelligence and defending networks the default, as it already is in the rest of the cybersecurity community outside the IC, to improve the quantity, relevance, and timeliness of defensive information while ensuring accountability for top leaders when they must withhold this information. One of the most significant challenges within the IC is presented by the need to share information promptly among the 18 elements of the intelligence enterprise. The only long-term solution to the understandable tension between the need to share information and the need to protect intelligence sources and methods is a robust real-time auditing capability that electronically flags unauthorized access. Under an identity management system with real-time audit, even the most sensi- tive information acquired by America’s intelligence agencies can be shared, and the access to and use of that information are appropriately monitored. Establishing — 223 — Intelligence Community a real-time auditing capability is essential to decreasing the risk for the heads of intelligence agencies in meeting their statutory requirements to ensure that they protect sources and methods associated with the classified information their agen- cies collect. Overclassification. There is broad consensus across the U.S. government and among stakeholders that the system for classifying, declassifying, and otherwise marking and handling sensitive information is at a crossroads. Exorbitant amounts of classified data are created daily, and agency personnel often mistakenly choose classification as the default selection to ensure national security. At the same time, the effectiveness of downgraded and carefully declassified information to support foreign policy efforts has been borne out in, for example, alerting the broader world of Russia’s buildup and likely plans for its invasion of Ukraine. Two executive orders principally govern how the U.S. government handles clas- sified and sensitive information. l Executive Order 13526, “Classified National Security Information,” issued in 2009,38 prescribes the classification levels and procedures for declassification. l Executive Order 13556, “Controlled Unclassified Information,” issued in 2010,39 aimed to establish a uniform program for managing all unclassified information that requires safeguarding or dissemination controls. The current system for declassifying classified national security information (CNSI) is extraordinarily analog, requiring experts’ review of individual records. Declassification policies are based on human review of paper and need to con- template and handle the proliferation and volume of digital records created by agencies. The U.S. government will soon reach the point at which manual review is impossible. The declassification of CNSI should support key U.S. national security objectives, reflect mission priorities, and not serve solely as a necessary procedural function. Reforms should include: l Tighter definitions and greater specificity for categories of information requiring protection. l More stringent policies to effect significant reductions in the number of Original Classification Authorities (OCAs). l Stricter accountability measures at the OCA level and more detailed security classification guides.

Introduction

Low 52.4%
Pages: 168-170

— 135 — Department of Homeland Security Unfortunately for our nation, the federal government’s newest department became like every other federal agency: bloated, bureaucratic, and expensive. It also lost sight of its mission priorities. DHS has also suffered from the Left’s wokeness and weaponization against Americans whom the Left perceives as its political opponents. To truly secure the homeland, a conservative Administration needs to return the department to the right mission, the right size, and the right budget. This would include reorganizing the department and shifting significant resources away from several supporting components to the essential operational components. Prior- itizing border security and immigration enforcement, including detention and deportation, is critical if we are to regain control of the border, repair the historic damage done by the Biden Administration, return to a lawful and orderly immi- gration system, and protect the homeland from terrorism and public safety threats. This also includes consolidating the pieces of the fragmented immigration system into one agency to fulfill the mission more efficiently. The Cybersecurity and Infrastructure Security Agency (CISA) is a DHS com- ponent that the Left has weaponized to censor speech and affect elections at the expense of securing the cyber domain and critical infrastructure, which are threat- ened daily.2 A conservative Administration should return CISA to its statutory and important but narrow mission. The bloated DHS bureaucracy and budget, along with the wrong priorities, provide real opportunities for a conservative Administration to cut billions in spending and limit government’s role in Americans’ lives. These opportunities include privatizing TSA screening and the Federal Emergency Management Agency (FEMA) National Flood Insurance Program, reforming FEMA emergency spending to shift the majority of preparedness and response costs to states and localities instead of the federal government, eliminating most of DHS’s grant pro- grams, and removing all unions in the department for national security purposes. A successful DHS would: l Secure and control the border; l Thoroughly enforce immigration laws; l Correctly and efficiently adjudicate immigration benefit applications while rejecting fraudulent claims; l Secure the cyber domain and collaborate with critical infrastructure sectors to maintain their security; l Provide states and localities with a limited federal emergency response and preparedness; — 136 — Mandate for Leadership: The Conservative Promise l Secure our coasts and economic zones; l Protect political leaders, their families, and visiting heads of state or government; and l Oversee transportation security. OFFICE OF THE SECRETARY (SEC) In the next Administration, the Office of the Secretary should take on the fol- lowing key issues and challenges to ensure the effective operation of DHS. Expansion of Dedicated Political Personnel. The Secretary of Homeland Security is a presidentially appointed and Senate-confirmed political appointee, but for budgetary reasons, he or she has historically been unable to fund a dedi- cated team of political appointees. A key first step for the Secretary to improve front-office functions is to have his or her own dedicated team of political appoin- tees selected and vetted by the Office of Presidential Personnel, which is not reliant on detailees from other parts of the department, to help ensure the completion of the next President’s agenda. An Aggressive Approach to Senate-Confirmed Leadership Positions. While Senate confirmation is a constitutionally necessary requirement for appointing agency leadership, the next Administration may need to take a novel approach to the confirmations process to ensure an adequate and rapid transition. For example, the next Administration arguably should place its nominees for key positions into similar positions as “actings” (for example, putting in a person to serve as the Senior Official Performing the Duties of the Commissioner of CBP while that person is going through the confirmation process to direct ICE or become the Secretary). This approach would both guarantee implementation of the Day One agenda and equip the department for potential emergency situations while still honoring the confirmation requirement. The department should also look to remove lower-level but nevertheless important positions that currently require Senate confirmation from the confirmation requirement, although this effort would require legislation (and might also be mooted in the event of legisla- tion that closes portions of the department that currently have Senate-confirmed leadership). Clearer, More Durable, and Political-Only Line of Succession. Based on previous experience, the department needs legislation to establish a more durable but politically oriented line of succession for agency decision-making purposes. The ideal sequence for line of succession is certainly debatable, except that in cir- cumstances where a career employee holds a leadership position in the department, that position should be deemed vacant for line-of-succession purposes and the next eligible political appointee in the sequence should assume acting authority. Further,

Introduction

Low 52.4%
Pages: 168-170

— 135 — Department of Homeland Security Unfortunately for our nation, the federal government’s newest department became like every other federal agency: bloated, bureaucratic, and expensive. It also lost sight of its mission priorities. DHS has also suffered from the Left’s wokeness and weaponization against Americans whom the Left perceives as its political opponents. To truly secure the homeland, a conservative Administration needs to return the department to the right mission, the right size, and the right budget. This would include reorganizing the department and shifting significant resources away from several supporting components to the essential operational components. Prior- itizing border security and immigration enforcement, including detention and deportation, is critical if we are to regain control of the border, repair the historic damage done by the Biden Administration, return to a lawful and orderly immi- gration system, and protect the homeland from terrorism and public safety threats. This also includes consolidating the pieces of the fragmented immigration system into one agency to fulfill the mission more efficiently. The Cybersecurity and Infrastructure Security Agency (CISA) is a DHS com- ponent that the Left has weaponized to censor speech and affect elections at the expense of securing the cyber domain and critical infrastructure, which are threat- ened daily.2 A conservative Administration should return CISA to its statutory and important but narrow mission. The bloated DHS bureaucracy and budget, along with the wrong priorities, provide real opportunities for a conservative Administration to cut billions in spending and limit government’s role in Americans’ lives. These opportunities include privatizing TSA screening and the Federal Emergency Management Agency (FEMA) National Flood Insurance Program, reforming FEMA emergency spending to shift the majority of preparedness and response costs to states and localities instead of the federal government, eliminating most of DHS’s grant pro- grams, and removing all unions in the department for national security purposes. A successful DHS would: l Secure and control the border; l Thoroughly enforce immigration laws; l Correctly and efficiently adjudicate immigration benefit applications while rejecting fraudulent claims; l Secure the cyber domain and collaborate with critical infrastructure sectors to maintain their security; l Provide states and localities with a limited federal emergency response and preparedness;

Showing 3 of 5 policy matches

About These Correlations

Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.