Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Intelligence and Information Sharing Initiative: Homeland Security Intelligence & Information Fusion
"Terrorism-related intelligence is derived by collecting, blending, analyzing, and evaluating relevant information from a broad array of sources on a continual basis. There is no single source for terrorism-related information. It can come through the efforts of the intelligence community; Federal, State, tribal, and local law enforcement authorities; other government agencies (e.g., transportation, health care, general government), and the private sector (e.g., transportation, health care, financial, Internet/information technology). For the most part, terrorism-related information has traditionally been collected outside of the United States. Typically, the collection of this type of information was viewed as the responsibility of the intelligence community and, therefore, there was little to no involvement by most State and local law enforcement entities. The attacks of September 11, 2001, however, taught us that those wanting to commit acts of terrorism may live in our local communities and be engaged in criminal and/or other suspicious activity as they plan attacks on targets within the United States and its territories. Important intelligence that may forewarn of a future attack may be derived from information collected by State, tribal, and local government personnel through crime control and other routine activities and/or by people living and working in our local communities."
United States. Department of Homeland Security
2005-04-28
-
America's Waterway Watch Executive Briefing: U.S. Coast Guard Homeland Security Outreach Program
This presentation profiles specific successes and previous incidents on America's waterways, including assistance employed with other agencies to prevent large-scale attacks. Also included here are possible preventative measures to be employed in protection of coastal bridges, tunnels, and ports.
United States. Department of Homeland Security
2004-08-25
-
2004 Yearbook of Immigration Statistics
"Statistical data on immigration have been published annually by the U.S. government since the 1890s. Over the years, the federal agencies responsible for reporting on immigration have changed, as have the content, format, and title of the annual publication. Currently, immigration data are published in the Yearbook of Immigration Statistics by the Office of Immigration Statistics (OIS) in the Policy Directorate of the Department of Homeland Security (DHS). The 2004 Yearbook of Immigration Statistics consists of a compendium of tables organized by subject matter, including: immigrants, refugees and asylees, nonimmigrant admissions, naturalizations, and enforcement actions."
United States. Department of Homeland Security
2006-01
-
Fact Sheet: President Bush Honors America's National Guard and Reserve [August 24, 2005]
This fact sheet provides information on the President's strategy to win the war on terror and the importance of the U.S. military remaining in Iraq.
United States. Office of the White House Press Secretary
2005-08-24
-
President Bush's Radio Address [January 13, 2007]
President Bush delivers this radio address on January 13, 2007 and speaks about America's new strategy towards Iraq in light of terrorist and insurgent acts.
United States. Office of the White House Press Secretary
Bush, George W. (George Walker), 1946-
2007-01-13
-
Trends in Federal Landownership and Management, Hearing Before the Committee on Resources, House of Representatives, One Hundred Fourth Congress, First Session, March 2, 1995
This is the March 2, 1995 hearing on "Trends in Federal Landownership and Management," held before the U.S. House of Representatives Committee on Resources. From the opening statement of Don Young: "The committee is meeting today to hear testimony on trends in Federal landownership and management. [...] I have never believed that the official government statistics which show that Federal landownership has actually decreased in the lower 48 states. As a result, last year Congressman Pombo and I requested the GAO [Government Accountability Office] determine how much public land has been locked up for multiple-use management and the net gain in Federal landownership since 1964. [...] As you can see from this chart facing you, GAO found that 95,000,000 acres of public lands have been locked up in varying degrees during this 29-year period." Statements, letters, and materials submitted for the record include those of the following: John H. Anderson, Terry L. Anderson, John Baranek, Ron Johnson, Ralph Lamoreaux, Bob Lessard, and Anna Sparks.
United States. Government Printing Office
1995
-
Comparisons of Conventional and Trunked Systems
"This report provides background information for public safety communications system planners to assist them in their evaluation of radio architecture options. Specifically, this document analyzes and compares conventional, trunked, and hybrid LMR systems and provides high-level definitions of the architecture alternatives associated with each option."
United States. Department of Homeland Security
Booz, Allen & Hamilton
1999-05
-
Draft National Preparedness Goal: Homeland Security Presidential Directive 8
This is the December 2005 draft version of Homeland Security Presidential Directive 8. "The President directed the development of a National Preparedness Goal (or Goal) in Homeland Security Presidential Directive (HSPD)-8. The Goal reorients how the Federal government proposes to strengthen the preparedness of the United States to prevent, protect against, respond to, and recover from terrorist attacks, major disasters, and other emergencies. The Goal establishes a vision, capabilities, and priorities for national preparedness. It should be utilized in conjunction with the three capabilities-based planning tools referenced in the Goal: the National Planning Scenarios, Universal Task List (UTL), and Target Capabilities List (TCL). Collectively, they identify key requirements that can help guide domestic all-hazards preparedness efforts."
United States. Department of Homeland Security
2005-12
-
S. Rept. 104-4: Oversight Over Intelligence Activities, Report, January 18, 1995
"Over the past several years, Committee Members and staff have visited with officials from a large number of foreign governments to discuss the Congressional oversight process of the U.S. Intelligence Community. In response to the growing number of requests received from foreign governments for information regarding the U.S. system of oversight, and at the direction of Senator DeConcini, the Committee produced a booklet entitled 'Legislative Oversight of Intelligence Activities: The U.S. Experience.' The booklet contains a narrative which traces the evolution and accomplishments of the congressional intelligence committees, and explains how the committees are organized and function. The Committee was instrumental in making more intelligence-related information available to the public. The Committee accomplished this by holding an unprecedented number of hearings and briefings that were open to the public. In addition, the Committee took the lead in a number of efforts to declassify previously classified material by the Executive Branch. In total, the Committee has worked with the Executive Branch to declassify and make available to the public over 36,400 pages of material. [...] In conclusion, this report demonstrates the wide range of issues the Committee dealt with during the 103rd Congress. The Committee continued to carry out its responsibilities in the same bipartisan manner that has characterized its work since its inception, and, for the most part, received excellent cooperation from the Intelligence Community. Rarely did the Committee receive information that it had requested in less than a timely and complete manner. Overall, the close working relationship between the Committee and the Intelligence Community, so essential to the conduct of legislative oversight, has continued. While the future will hold new challenges for both institutions, the experience during the 103rd Congress provides a good foundation for the years to follow."
United States. Government Printing Office
1995-01-18
-
Continuing Progress: A 1-Year Update on Hurricane Recovery and Rebuilding
August 29th marks the 1-year anniversary of Hurricane Katrina battering the Gulf Coast of the United States. Katrina, followed by Rita one month later, were two of the most intense hurricanes ever recorded in the nation's history. The storms had a massive physical impact on the land, affecting 90,000 square miles - an area the size of Great Britain. President Bush continues to follow through with the Federal commitment to do what it takes to help residents of the Gulf Coast rebuild their lives in the wake of this disaster, with $110.6 billion in Federal aid alone going towards relief, recovery and rebuilding efforts. Below is a partial list of the work Federal agencies have accomplished to help not only get the region back on its feet but also to provide for a stronger and better future for the residents of the Gulf Coast.
United States. Department of Homeland Security
Office of the Federal Coordinator for Gulf Coast Rebuilding
-
Quick Reference Guide for the National Response Plan [Version 4.0]
This 27 page guide condenses the basic scope and structure, roles and responsibilities, and concepts of operations for the National Response Plan.
United States. Department of Homeland Security
2006-05-22
-
Best Practices for Government to Enhance the Security of National Critical Infrastructures
"The NIAC has been asked to make a recommendation on the role of government regulation in ensuring a more effective response to physical and cyber security challenges. The Working Group therefore focused on how selected sectors differ in their physical and cyber security needs, the advantages and disadvantages of market intervention, and identifying the conditions under which government intervention should occur. It has reviewed existing studies on government efforts in specific sectors, conducted in-depth interviews across many critical infrastructure sectors to develop a broad view of security issues, and developed a framework for analysis. Subsequently, the validity of this framework was tested with extensive industry participation in four sectors: chemicals, financial services, information technology and water. It proved to be a useful tool for assessing the ability of markets to effect change, and to structure the debate on the need for intervention in each sector. In the first section of the document, the Working Group discusses the framework for evaluating the applicability of government intervention across and within sectors, and identifies a number of best practices for government when considering intervention to encourage a more sustained and effective security posture. The second section of the document discusses in greater detail the implications for specific sectors, and how the framework leads to different conclusions for each sector."
United States. Department of Homeland Security
Katen, Karen
2004-04-13
-
Use of RFID for Human Identification: A Draft Report from DHS Emerging Applications and Technology Subcommittee to the Full Data Privacy and Integrity Advisory Committee, Version 1.0
"The purposes of this paper are to: (1) address the use of Radio Frequency Identification technology (RFID) by the Department of Homeland Security (DHS) to identify and track individuals; (2) outline the potential data privacy and integrity issues implicated by this use of RFID technology; (3) offer guidance to the Secretary of DHS, program managers, and the DHS Privacy Office on deciding whether to deploy RFID technology to track individuals; and (4) offer steps to consider in order to mitigate privacy and data integrity risks when planning to use RFID to identify and track individuals." The report concludes that while RFID technology is valuable for tasks such as inventory management, it is appropriate for human identification only in narrowly defined situations. RFID "increases risks to personal privacy and security, with no commensurate benefit for performance or national security." The subcommittee recommends that "RFID be disfavored for identifying and tracking human beings."
United States. Department of Homeland Security
2006-05
-
FY 2006 Homeland Security Grant Program (HSGP) Allocations
This document contains the FY 2006 Homeland Security Grant Program (HSGP) allocations by state/territory and by urban area. At the state level, detail is provided for allocations for state homeland security grant programs, law enforcement terrorism and prevention programs, urban area security initiatives, metropolitan medical response systems, and citizen corps. Also included is the Department of Homeland Security press release announcing the grant awards.
United States. Department of Homeland Security
2006-01-03
-
Interoperable Communications Technical Assistance Program
This power point details the goals and objectives of the Interoperable Communications Technical Assistance Program (TICP). TCIP spending figures, services, processes, implementation requirements, sites, and a timeline are also included in the presentation.
United States. Department of Homeland Security
2006-05-24
-
Environmental Monitoring for Nuclear Safeguards
This report analyzes how environmental monitoring works and what can be expected of it as part of safeguards. Chapter 2 reviews the emissions that can be expected from nuclear facilities that are supporting a weapons program. Chapter 3 looks at the techniques used for detecting those emissions, including sampling in the field and laboratory analysis. Chapter 4 reviews IAEA activities to implement environmental monitoring. Finally, chapter 5 looks at technologies now in the laboratory that could improve the effectiveness of environmental monitoring in the future. The remainder of this chapter provides a summary of the report and additional background.
United States. Government Printing Office
United States. Congress. Office of Technology Assessment
1995-09
-
Homeland Security Advisory Council: Report of the Critical Infrastructure Task Force
"The objective of this report by the Critical Infrastructure Task Force (CITF) is to advance national policies and strategies that will foster the development of more resilient critical infrastructures. The recommendations contained herein leverage the foundation built by prior and ongoing Critical Infrastructure Protection programs, but assert that a future focus on resilience would establish a more appropriate basis for risk-based decision-making. Our Nation's critical infrastructures-cyber and physical-empower and enable every aspect of our society and economy. From a homeland security perspective, fully functioning infrastructures are fundamental to all preparedness efforts. Consequently, our critical infrastructures represent attractive targets to adversaries. At the same time, critical infrastructures are inherently vulnerable to natural disasters, accidents, and other hazards that are a part of daily life. Given this diverse spectrum of potential threats, coupled with the reality that resources are limited, the CITF concluded that policies and strategies focusing on achieving resilience would be more robust than current guidance, which focuses primarily on protection. Specifically, the CITF observes that while protection is a necessary component of building resilience, resilience is not an inevitable outcome of strategies that focus on protection."
United States. Department of Homeland Security
2006-01
-
LLIS Intelligence and Information Sharing Initiative: Homeland Security Intelligence Requirements Process
"To gain a better understanding of current state, local, tribal, and private sector information and intelligence sharing capabilities and requirements, Lessons Learned Information Sharing (LLIS.gov), DHS's network for lessons learned and best practices, solicited feedback from relevant subject-matter experts (SME) from across the country. The LLIS.gov program's experience in working with the emergency response and homeland security communities, sustained research into the subject of information/intelligence sharing, and extensive network of more than 18,000 public safety officials made it well-suited to undertake this endeavor. The report is intended to complement and expand upon the recent findings and recommendations of the HSAC's Intelligence and Information Sharing Working Group and the Fusion Center Guidelines Initiative of the Department of Justice's (DOJ's) Global Justice Information Sharing Working Group. Together, these initiatives represent a cooperative effort among DHS, DoJ, and state, local, tribal, and private sector responders and homeland security officials to identify specific gaps and shortfalls within our Nation's information and intelligence sharing environment and develop clear recommendations to address them."
United States. Department of Homeland Security
2005-12
-
Critical Infrastructure Task Force: Presentation to Homeland Security Advisory Council, 10 January 2006
"Review current and provide recommendations on advancing national critical infrastructure policy & planning to ensure the reliable delivery of critical infrastructure services while simultaneously reducing the consequences of the exploitation, destruction, or disruption of critical infrastructure products, services, and/or operations."
United States. Department of Homeland Security
David, Ruth A., 1953-
2006-01-10
-
United States Department of Homeland Security: Homeland Security Advisory Council Charter
"The HSAC exists to provide organizationally independent advice and recommendations to the Secretary of the Department aiding in the creation and implementation of critical and actionable policy relating to the security of the American homeland. The HSAC shall periodically report, as appropriate, to the Secretary on matters within the scope of that function. The HSAC serves solely as an advisory body with the goal of providing advice predicated upon the request of the Secretary or the identification of issues of relevance and concern to the mission of the Department and the security of America."
United States. Department of Homeland Security
2005-04-04
-
List of Fiscal Year 2006 Urban Areas Security Initiative Eligible Applicants
"The Department of Homeland Security (DHS) announced today $765 million in direct funding for high threat urban areas as part of the fiscal year 2006 Urban Areas Security Initiative (UASI). UASI provides resources for the unique equipment, training, planning, and exercise needs of select high threat urban areas." This spreadsheet monitors all funding for select states under these parameters, as well urban areas included in this plan.
United States. Department of Homeland Security
2005
-
Multilateral Layered Defense Strategy: Interim Report to the Homeland Security Advisory Council
"Our adversaries have declared an intent to use Weapons of Mass Effect against us. Given the volume of people and material that traverse our borders, any one method of defense will be prone to failure posing unacceptable risks. To develop a layered, integrated and multilateral system of defense to prevent the entry of Weapons of Mass Effect (WME) and the people who would use them on American soil." This document profiles the involvement of internal agencies and actors, in association with private sector individuals, towards prevention management to prevent entry of WME into the country. Additional topics, such as the multilateral layered defense strategy involved in such preparedness processes, is included here.
United States. Department of Homeland Security
2005-06-23
-
Michigan Indian Recognition, Hearing Before the Subcommittee on Native American Affairs of the Committee on Natural Resources, House of Representatives, One Hundred Third Congress, First Session, September 17, 1993
This is the September 17, 1993 hearing on "Michigan Indian Recognition," held before the U.S. House of Representatives Subcommittee on Native American Affairs of the Committee on Natural Resources. From the opening statement of Bill Richardson: "Today we will be hearing testimony from unacknowledged tribes in the State of Michigan. The two bills, one is sponsored by Representative Kildee, H.R. 2376, would provide recognition to the Little Traverse Bay Bands of Odawa Indians and the Little River Band of Ottawa Indians and H.R. 878, sponsored by Representative Upton, provides for the recognition of the Pokagon Band of Potawatomi Indians. In addition, we will hear from some tribes on the third panel who are also unacknowledged in the State of Michigan." Statements, letters, and materials submitted for the record include those of the following: Frank Ettawageshik, Shirley Oldman, Daniel Bailey, Katherine Glocheski, William Brooks, James McClurken, Joseph R. Winchester, Richard 'Mike' Daugherty, James Keedy, Rachel Daugherty, Thomas Topash, Carl Frazier, D.K. Sprague, William Church, Gary Shawa, and Phil Alexis.
United States. Government Printing Office
1995
-
Annual Report to the President and the Congress [April 1997]
From the Document: "Important U.S. navigation and overflight interests in the world's oceans continue to be challenged by the excessive claims of certain coastal states which assert maritime claims inconsistent with international law. Such excessive claims are contrary to the clear international consensus demonstrated by the entry into force of the UN Law of the Sea (LOS) Convention and the large number of States party to the Convention (107 States as of September 30, 1996). Although not yet a party to the LOS Convention, the United States views the navigational provisions of the Convention as reflective of customary international law and, as such, available for all nations to enjoy. Despite these positive developments in the law of the sea, it remains necessary for maritime nations, like the United States, to protest excessive claims by coastal states through diplomatic channels and to exercise navigation and overflight rights in disputed areas. The United States Freedom of Navigation program has challenged excessive claims to counter any argument that such claims are valid due to acquiescence over time. Since its inception in 1979, the Freedom of Navigation program has filed over 100 diplomatic protests and conducted over 300 operational assertions against excessive claims. In FY 1996, the U.S. armed forces conducted operational assertions against the excessive maritime claims of the countries listed in the table below. In addition, military vessels and aircraft frequently conducted routine transits on, over, and under international straits, such as the Straits of Gibraltar, Hormuz, and Malacca. Over 50 air, surface, and subsurface transits through the archipelagic sea lanes of Indonesia and the Philippines were conducted in accordance with the LOS Convention."
United States. Department of Defense
Cohen, William S.
1997-04
-
Annual Report to the President and the Congress [1999]
From the Document: "For 19 years, the U.S. Freedom of Navigation program has ensured that excessive coastal state claims over the world's oceans and airspace are repeatedly challenged. By diplomatic protests and operational assertions, the United States has insisted upon adherence by the nations of the world to the international law of the sea, as reflected in the UN Law of the Sea Convention. A significant majority of countries (130) are now Parties to the Convention, and there is an encouraging trend toward the rolling-back of excessive maritime claims. Nonetheless, some coastal states continue to assert maritime claims inconsistent with international law, which left unchallenged would limit navigational freedoms vital to U.S. national security and essential to peaceful uses of the world's oceans. In FY 1998, U.S. armed forces conducted operational assertions challenging the excessive maritime claims listed in the accompanying table. In addition, military vessels and aircraft frequently conducted routine transits through international straits, such as the Straits of Gibraltar, Hormuz, and Malacca. Air and surface units also transited the Indonesian Archipelago in archipelagic sea lanes passage on 20 occasions and transited the Philippine Archipelago by exercising high seas freedoms, transit passage, and innocent passage, as applicable, on 32 occasions. Combined with robust and highly visible routine operations by U.S. forces on, over, and under the world's oceans, and scrupulous adherence by the United States to the navigational provisions of the UN Law of the Sea Convention, Freedom of Navigation operations have continued to underscore the U.S. commitment to a stable legal regime for the world's oceans."
United States. Department of Defense
Cohen, William S.
1999
-
Annual Report to the President and the Congress [2000]
From the Document: "For 20 years, the U.S. Freedom of Navigation program has ensured that excessive coastal state claims over the world's oceans and airspace are repeatedly challenged. By diplomatic protests and operational assertions, the United States has insisted upon adherence by the nations of the world to the international law of the sea, as reflected in the UN Law of the Sea Convention. A significant majority of countries ( 131) are now Parties to the Convention, and there is an encouraging trend toward the rolling-back of excessive maritime claims. Nonetheless, some coastal states continue to assert maritime claims inconsistent with international law, which left unchallenged would limit navigational freedoms vital to U.S. national security and essential to peaceful uses of the world's oceans. In FY 1999, U.S. armed forces conducted operational assertions challenging the excessive maritime claims as listed [in the document]."
United States. Department of Defense
Cohen, William S.
2000
-
Annual Report to the President and the Congress [2001]
From the Document: "For over 20 years, the United States has reaffirmed its long-standing policy of exercising and asserting its freedom of navigation and overflight rights on a worldwide basis. Such assertions by the U.S. preserve navigational freedoms for all nations, ensure open access to the world's oceans for international trade, and preserve global mobility of U.S. armed forces. Assertions communicate that the U.S. does not acquiescence to the excessive maritime claims of other nations and thereby prevent them from becoming accepted as the international norm. Over the years, many nations have commented favorably upon the U.S.'s actions to maintain high vigilance of countries making maritime claims that exceed the provisions of the UN Convention on the Law of the Sea and to ensure that coastal regimes inconsistent with freedom of navigation do not become accepted as the customary norm. Challenges to other nations' excessive maritime claims are conducted both through diplomatic protests and operational assertions by U.S. armed forces, under the Freedom of Navigation Program. Freedom of Navigation assertions are non-provocative and oftentimes have persuaded States to bring their practices into conformity with the UN Convention on the Law of the Sea. In FY 2000, U.S. armed forces conducted operational assertions described [in the document], all without incident."
United States. Department of Defense
Cohen, William S.
2001
-
Freedom of Navigation (FON) FY 06 Operational Assertions
This document contains a summary of maritime claims that were challenged by DoD operational assertions and activities during the period of Fiscal Year 2006, in order to preserve the rights, freedoms, and uses of the sea and airspace guaranteed to all nations under international law.
United States. Department of Defense
2007-02-21?
-
Prohibition on Intervention Under International Law and Cyber Operations
From the Introduction: "Attempts to influence the affairs of other States have occurred since time immemorial. The Parliament of England in 1533 accused the Pope of 'abusing and beguiling [King Henry VIII's] subjects ... in great derogation of [Henry's] imperial crown and authority royal.' More recently, during the Cold War, Soviet bloc and developing States strongly objected to western radio broadcasts into their territories without their prior consent, on grounds that they should be able 'to develop and maintain their own social, political, economic and cultural systems.' Yet, cyber technologies have made way for such meddling to occur in novel and unique ways--particularly in light of how they enable reaching otherwise inaccessible places and audiences, while allowing a large degree of anonymity. [...] The essence of this article's argument is that under the 'lex lata' the prohibition on intervention only applies to acts amounting to a use of force or constituting support for the violent overthrow of a foreign regime. [...] The structure of the article is as follows. Part II will examine how the prohibition on intervention under customary international law was treated in its formative years--the 1960s to 1980s. This will set the stage for Part III, which will seek to dissect the ICJ [International Court of Justice]'s findings regarding the prohibition on intervention in the 'Nicaragua' case--the leading case on the subject. Part IV will analyze how the prohibition on intervention has been understood by States since the 'Nicaragua' judgment. Part V will provide some concluding observations."
Naval War College (U.S.). International Law Studies
Pomson, Ori
2022
-
State Homeland Security Program and Capability Review Guidebook Volume 2: Enhancement Plan
"The State Homeland Security Program and Capability Review Guidebook Volume 2: Enhancement Plan (the Enhancement Plan Guidebook) is the companion document to the State Homeland Security Program and Capability Review Guidebook Volume 1 (the Program and Capability Review Guidebook). The Enhancement Plan Guidebook provides a framework for how the States should use the assessment work completed through Program and Capability Review process to build a State-wide, comprehensive Enhancement Plan around the State homeland security program and capabilities...The Enhancement Plan Guidebook builds upon the work completed as part of the Program and Capability Review, fostering a comprehensive, multi-disciplinary review and analysis of capability strengths and weaknesses across the entire State homeland security program. The Enhancement Plan Guidebook will walk States through a process of closely examining the strengths, weaknesses, gaps, and deficiencies identified in the Program and Capability Review, selecting those that are most critical based on a series of need-indicators, and creating a high level plan for addressing those needs by forming overarching Initiatives, outlining key milestones, recognizing stakeholders, and identifying next steps."
United States. Department of Homeland Security
2005-11