Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Artificial Intelligence, Automation, and the Economy
From the Executive Summary: "Accelerating artificial intelligence (AI) capabilities will enable automation of some tasks that have long required human labor. These transformations will open up new opportunities for individuals, the economy, and society, but they have the potential to disrupt the current livelihoods of millions of Americans. Whether AI leads to unemployment and increases in inequality over the long-run depends not only on the technology itself but also on the institutions and policies that are in place. This report examines the expected impact of AI-driven automation on the economy, and describes broad strategies that could increase the benefits of AI and mitigate its costs."
United States. White House Office
2016-12
-
National Security Strategy for a New Century [May 1997]
From the Preface: "This report, submitted in accordance with Section 603 of the Goldwater-Nichols Defense Department Reorganization Act of 1986, sets forth a national security strategy to advance our national interests in this era of unique opportunities and dangers. It is premised on the belief that both our domestic strength and our leadership abroad are essential to advancing our goal of a safer, more prosperous America. Building upon America's unmatched strengths, the strategy's three core objectives are: [1] To enhance our security with effective diplomacy and with military forces that are ready to fight and win. [2] To bolster America's economic prosperity. [3] To promote democracy abroad. To achieve these objectives, we will remain engaged abroad and work with partners, new and old, to promote peace and prosperity. We can--and we must--use America's leadership to harness global forces of integration, reshape existing security, economic and political structures, and build new ones that help create the conditions necessary for our interests and values to thrive. "
United States. White House Office
1997-05
-
Parameters Regarding the Iran's Nuclear Program
From the Document: "Below are the key parameters of a Joint Comprehensive Plan of Action (JCPOA) regarding the Islamic Republic of Iran's nuclear program that were decided in Lausanne, Switzerland. These elements form the foundation upon which the final text of the JCPOA will be written between now and June 30, and reflect the significant progress that has been made in discussions between the P5+1 [UN Security Council's five permanent members (the P5); namely China, France, Russia, the United Kingdom, and the United States; plus Germany], the European Union, and Iran. Important implementation details are still subject to negotiation, and nothing is agreed until everything is agreed. We will work to conclude the JCPOA based on these parameters over the coming months."
United States. White House Office
2015-04-02?
-
Executive Order: Amending the Order of Succession in the Department of Homeland Security [August 13, 2007]
This document is the executive order amending the order of succession in the Department of Homeland Security.
United States. Office of the White House Press Secretary
2007-08-13
-
National Security Directive 53: Interagency Review and Disposition of Export Control Licenses Issued by the Department of Commerce
In National Security Directive (NSD) 53, President H.W. Bush directs that "American exporters are entitles to prompt review of export license applications submitted to the United States Government. It is United States policy that there is a presumption of approval of such applications based on our commitment to an open international trading system and the need to ensure American competitiveness. Therefore, any U.S. agency that opposes an export license on national security grounds shall bear the burden to overcome this presumption of approval. At the same time, I want to emphasize that none of the changes set fourth in this directive are intended in any way to signal a lessening of our determination to weigh cautiously license applications raising potential nonproliferation or broader national security concerns."
United States. White House Office
1990-12-10
-
National Security Directive 56: National Security Emergency Preparedness Telecommunications Funding
In National Security Directive (NSD) 56, President H.W. Bush directs that "implementation and recurring costs for national level NESP [National Security Emergency Preparedness] telecommunications programs shall be shared by Defense and FEMA. Defense, as the Executive Agent for the National Communications System (NCS), shall fund all pre-implementations costs for national level NSEP telecommunications programs. Participation by federal agencies in the National Communications System will continue to be in accordance with the provisions of Executive Order 12472."
United States. White House Office
1991-04-30
-
Department of Energy's Strategy for Exporting Liquefied Natural Gas, Hearing Before the Subcommittee on Energy and Policy, Health Care and Entitlements of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Thirteenth Congress, First Session, March 19, 2013
This is the March 19, 2013 hearing on "Department of Energy's Strategy for Exporting Liquefied Natural Gas," held before the House of Representatives Committee on Oversight and Government Reform. From the opening statement of James Lankford: "Today we are here to discuss the Department of Energy's [DOE] strategy and process in reviewing applications to export liquefied natural gas, LNG, specifically to non-free trade agreement countries. For countries with which we have a free trade agreement [FTA] covering the Natural Gas Act of 1938, and obviously amended multiple times since then, the Department of Energy is required to grant applications to export LNG. Such export is deemed to be consistent with the public interest and the authorization must be granted without modification or delay. For countries with which we do not have a free trade agreement covering natural gas, the Natural Gas Act presumes the Department of Energy will grant the application to export LNG unless the Department finds the proposed exportation will not be consistent with the public interest. The issue we are here to discuss today is not if we should export natural gas. The U.S. has exported natural gas via pipeline to Canada and Mexico since the 1930s. We are also not here to discuss if we should export liquefied natural gas. The U.S. has exported LNG from the Kenai Peninsula in Alaska since 1969. Again, by statute, the Department of Energy must approve LNG exports to FTA countries and the default position is it exports to non-FTA countries unless DOE finds that it is not consistent with the public interest. Finally, we are not here to discuss if we should export liquefied natural gas to non-FTA countries. Again, the U.S. has exported to Japan, which is not an FTA country, from Alaska since 1969. In the lower 48 in May 2011, the Department of Energy granted the first permit to export LNG to a non-FTA country. That facility is currently under construction in southwest Louisiana and will begin exporting LNG within two years." Statements, letters, and materials submitted for the record include those of the following: Tom Choi, Paul Cicio, Charles Ebinger, Chris Smith, Jim Jordan, James Lankford, Jackie Speier, and Elijah E. Cummings.
United States. Government Printing Office
2013
-
H.R. 3, Northern Route Approval Act, Hearing Before the Subcommittee on Energy and Power, Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, First Session, April 10, 2013
This is the April 10, 2013 Hearing, "H.R. 3 [House Resolution Three], The Northern Route Approval Act," before the Subcommittee on Energy and Power of the House Committee on Energy and Commerce. From the opening statement of Ed Whitfield: "We are going to be discussing H.R. 3, the Northern Route Approval Act, which would remove the federal delays that continue to block the Keystone XL pipeline expansion project. Keystone pipeline has become a household name across the country. [...] Our first legislative attempt to approve Keystone was criticized by some as unnecessary on the grounds that the Obama Administration was already committed to make a final decision by the end of the year, and by that year, I mean 2011. [...] So to be truthful, at this point we believe that the Administration has continued to delay this because we invited to testify today someone from the U.S. Department of State, the Bureau of Land Management, the U.S. Fish and Wildlife Service, the U.S. Army Corps of Engineers, and U.S. EPA, and no one would agree to come. [...] We have a unique opportunity to be energy independent in America. And there are more safeguards put on this pipeline than any that has been proposed to be built ever." Statements, letters, and materials submitted for the record include those of the following: Ed Whitfield, Lee Terry, Bobby L. Rush, Fred Upton, Henry A. Waxman, Alexander Pourbaix, Anthony Swift, Keith Stelter, David Mallino, and Mark Jaccard.
United States. Government Printing Office
2013
-
Balancing Maritime Security and Trade Facilitation: Protecting Our Ports, Increasing Commerce and Securing the Supply Chain--Part I, Hearing Before the Subcommittee on Border and Maritime Security of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, Second Session, February 7, 2012
From the opening statement of Candice S. Miller: "The subcommittee is meeting today to hear testimony from Congressman Jerry Nadler, from assistant secretary David Heyman, from Department of Homeland Security Office of Policy, acting assistant commissioner Kevin McAleenan, Office of Field Operations, Customs and Border Protection, Rear Admiral Paul Zukunft--I know I am never pronouncing that correctly, assistant commandant for marine safety, security, and stewardship with the U.S. Coast Guard, and Mr. Steve Caldwell, who is the director of Maritime Security from GAO [Government Accountability Office]. Today our very important topic is the global supply chain. I would recognize myself for an opening statement. This hearing is really the first of a two-part series. We are going to have another follow-on hearing as well. We are going to examine the Nation's maritime and global supply chain security measures. Last year, this subcommittee focused on security at the Southern and the Northern Border, both at and between the ports of entry. But I think it is important as well to remember that we really have three borders. The Nation's maritime border is certainly just as important as the other two. It is a conduit for much of the country's trade. Commerce, of course, is the life blood of the Nation." Statements, letters, and materials submitted for the record include those of the following: Candice S. Miller, Henry Cuellar, Bennie G. Thompson, Laura Richardson, Jerrold Nadler, David Heyman, Kevin McAleenan, Paul Zukunft, Stephen L. Caldwell, and Mike Rogers.
United States. Government Printing Office
2013
-
National Drug Control Strategy (February 2005)
From the Introduction: "Three years ago this month, President Bush released the Administration's first National Drug Control Strategy. Consistent with his view of government, it was a document that clearly laid out a plan for accountable results in achieving a single goal 'reducing drug use.' The President's decision to hold his administration accountable for helping drive down drug use followed a decade during which the use of drugs by young people had doubled. It came at a time when fully half of 12th graders had used an illegal drug at least once by graduation. It was seen, and rightly, as an audacious challenge to the skeptics, who invariably counsel despair when it comes to illegal drugs. The President's goal 'a 10 percent reduction in youth drug use over two years' has been met and exceeded. Youth drug use has dropped by 11 percent over two years, and now a third year of data puts the program ahead of schedule for the five-year goal, with a three-year drop of 17 percent (see Figure 3). Figures for adult drug use will become available with the publication, this summer, of the 2004 National Survey on Drug Use and Health."
United States. White House Office
2005-02
-
Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights
From the Preface: "Big data and associated technologies have enormous potential for positive impact in the United States, from augmenting the sophistication of online interactions to enhancing understanding of climate change to making advances in healthcare. These efforts, as well as the technological trends of always-on networked devices, ubiquitous data collection, cheap storage, sensors, and computing power, will spur broader use of big data. Our challenge is to support growth in the beneficial use of big data while ensuring that it does not create unintended discriminatory consequences. […] This report examines several case studies from the spheres of credit and lending, hiring and employment, higher education, and criminal justice to provide snapshots of opportunities and dangers, as well as ways that government policies can work to harness the power of big data and avoid discriminatory outcomes. These are issues that strike at the heart of American values, which we must work to advance in the face of emerging, innovative technologies."
United States. White House Office
2016-05
-
Fact Sheet: Strategy to Combat Transnational Organized Crime [July 25, 2011]
This Fact Sheet is about the new Strategy to Combat Transnational Organized Crime. From the Document: "In the U.S. National Security Strategy, the President committed his Administration to the pursuit of four enduring national interests: security, prosperity, respect for universal values, and the shaping of an international order that can meet the challenges of the 21st century. The expanding size, scope, and influence of Transnational Organized Crime (TOC) and its impact on U.S. and international security and governance represent one of the most significant of those challenges."
United States. Office of the White House Press Secretary
2011-07-25
-
Humane Treatment of al Qaeda and Taliban Detainees, Unclassified
Recent discussions regarding the status of al Qaeda and Taliban detainees confirms that the application of the Geneva Convention Relative to the Treatment of Prisoners raises some complex legal questions. This memo describes how the definitive definition of what constitutes as a terrorist is needed before legal concerns are fully applied and addressed.
United States. White House Office
2002-02-07
-
Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to Be Consistently Addressed, Report to Congressional Requesters
From the Highlights: "Pervasive and sustained computer-based attacks pose a potentially devastating impact to systems and operations and the critical infrastructures they support. Addressing these threats depends on effective partnerships between the government and private sector owners and operators of critical infrastructure. Federal policy, including the Department of Homeland Security's (DHS) National Infrastructure Protection Plan, calls for a partnership model that includes public and private councils to coordinate policy and information sharing and analysis centers to gather and disseminate information on threats to physical and cyber-related infrastructure. GAO was asked to determine (1) private sector stakeholders' expectations for cyber-related, public-private partnerships and to what extent these expectations are being met and (2) public sector stakeholders' expectations for cyber-related, public-private partnerships and to what extent these expectations are being met. To do this, GAO conducted surveys and interviews of public and private sector officials and analyzed relevant policies and other documents."
United States. Government Accountability Office
2010-07
-
Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment, Report to Congressional Requesters
From the Highlights: "The nation's critical infrastructure sectors (e.g., energy, banking) rely extensively on information technology systems. The Department of Homeland Security (DHS) issued guidance in 2006 that instructed lead federal agencies, referred to as sector-specific agencies, to develop plans for protecting the sector's critical cyber and other (physical) infrastructure. These agencies issued plans in 2007, but GAO found that none fully addressed all 30 cyber security-related criteria identified in DHS's guidance and recommended that the plans be updated to address it by September 2008. GAO was asked to determine the extent to which sector plans have been updated to fully address DHS's cyber security requirements and assess whether these plans and related reports provide for effective implementation. To do this, GAO analyzed documentation, interviewed officials, and compared sector plans and reports with DHS cyber criteria. [...] GAO recommends that DHS assess whether existing sector-specific planning processes should continue to be the nation's approach to securing cyber and other critical infrastructure and consider whether other options would provide more effective results. DHS concurred with the recommendation; however, it took exception with certain report facts and conclusions. GAO addressed these comments, but they did not result in substantive report revisions."
United States. Government Accountability Office
2009-09
-
Cybersecurity: Continued Federal Efforts Are Needed to Protect Critical Systems and Information, Statement of Gregory C. Wilshusen, Director, Information Security Issues, Testimony before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives
From the Highlights: "Federal laws and policy have assigned important roles and responsibilities to the Department of Homeland Security (DHS) and the National Institute of Standards and Technology (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure - much of which is owned by the private sector - and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. GAO was asked to describe cybersecurity efforts at DHS and NIST - including partnership activities with the private sector - and the use of cybersecurity performance metrics in the federal government. To do so, GAO relied on its reports on federal information security and federal efforts to fulfill national cybersecurity responsibilities."
United States. Government Accountability Office
2009-06-25
-
Critical Infrastructure Protection: OMB Leadership Needed to Strengthen Agency Planning Efforts to Protect Federal Cyber Assets, Report to Congressional Requesters
From the Highlights: "Because the nation's critical infrastructure relies on information technology systems and data, the security of those assets is critical to ensuring national security and public safety. In 2003, the President directed federal agencies to (1) develop plans for the protection of their computer-related (cyber) critical infrastructure assets and (2) submit them for approval to the Office of Management and Budget (OMB) by July 31, 2004. To help agencies do this, OMB issued guidance with 19 criteria deemed essential for effective cyber critical infrastructure protection planning that were required to be included in the plans. GAO was asked to determine (1) the extent to which agencies developed their plans and whether they submitted them to OMB by the deadline and (2) whether the plans met criteria in OMB's guidance. To do this, GAO reviewed plans from 24 agencies, many of which own and operate key government cyber and other critical infrastructure; reviewed OMB documentation; interviewed officials; and compared submitted plans to relevant criteria […]. GAO is recommending that OMB (1) direct agencies to update cyber plans to fully address OMB requirements and (2) follow up to see that agencies make sure plans meet requirements and are being implemented. In commenting on a draft of this report, OMB agreed with the first recommendation; it agreed with the second after GAO revised it to better clarify OMB and agency follow up responsibilities."
United States. Government Accountability Office
2009-10-15
-
Cybersecurity: Continued Efforts are Needed to Protect Information Systems from Evolving Threats, Statement for the Record to the Subcommittee on Terrorism and Homeland Security, Committee on the Judiciary, U.S. Senate Statements of Gregory C. Wilshusen, Director Information Security Issues and David A. Powner, Director Information Technology Managment Issues,
From the Document: "Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the federal government. In recent months, federal officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the United States; and press accounts have reported attacks on the Web sites of government agencies. The ever-increasing dependence of federal agencies on computerized systems to carry out essential, everyday operations can make them vulnerable to an array of cyber-based risks. Thus it is increasingly important for the federal government to have effective information security controls in place to safeguard its systems and the information they contain. GAO was asked to provide a statement describing (1) cyber threats to federal information systems and cyber-based critical infrastructures, (2) control deficiencies at federal agencies that make these systems and infrastructures vulnerable to cyber threats, and (3) opportunities that exist for improving federal cybersecurity. In preparing this statement, GAO relied on its previously published work in this area."
United States. Government Accountability Office
2009-11-17
-
Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems, Statement of Gregory C. Wilshusen, Director Information Security Issues, Testimony Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Committee on Homeland Security, House of Representatives
From the Document: "Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact on federal and nonfederal systems and operations. In February 2011, the Director of National Intelligence testified that, in the past year, there had been a dramatic increase in malicious cyber activity targeting U.S. computers and networks, including a more than tripling of the volume of malicious software since 2009. Recent press reports that computer hackers broke into and stole proprietary information worth millions of dollars from the networks of six U.S. and European energy companies also demonstrate the risk that our nation faces. Such attacks highlight the importance of developing a concerted response to safeguard federal and nonfederal information systems."
United States. Government Accountability Office
2011-03-16
-
Information Security: Cyber Threats and Vulnerabilities Place Federal Systems at Risk, Statement of Gregory C. Wilshusen, Director, Information Security Issues, Testimony before the Subcommittee on Government Management, Organization, and Procurement; House Committee on Oversight and Government Reform
From the Highlights: "Information security is a critical consideration for any organization that depends on information systems and computer networks to carry out its mission or business. It is especially important for government agencies, where maintaining the public's trust is essential. The need for a vigilant approach to information security has been demonstrated by the pervasive and sustained computer-based (cyber) attacks against the United States and others that continue to pose a potentially devastating impact to systems and the operations and critical infrastructures that they support. GAO was asked to describe (1) cyber threats to federal information systems and cyber-based critical infrastructures and (2) control deficiencies that make these systems and infrastructures vulnerable to those threats. To do so, GAO relied on its previous reports and reviewed agency and inspectors general reports on information security."
United States. Government Accountability Office
2009-05-05
-
Critical Infrastructure Protection: DHS Needs to Fully Address Its Cybersecurity Responsibilities, Statement of David Powner, Director, Information Technology Management Issues, Testimony before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives
From the Highlights: "Recent cyber attacks demonstrate the potentially devastating impact these pose to our nation's computer systems and to the federal operations and critical infrastructures that they support. They also highlight that we need to be vigilant against individuals and groups with malicious intent, such as criminals, terrorists, and nation-states perpetuating these attacks. Federal law and policy established the Department of Homeland Security (DHS) as the focal point for coordinating cybersecurity, including making it responsible for protecting systems that support critical infrastructures, a practice commonly referred to as cyber critical infrastructure protection. Since 2005, GAO has reported on the responsibilities and progress DHS has made in its cybersecurity efforts. GAO was asked to summarize its key reports and their associated recommendations aimed at securing our nation's cyber critical infrastructure. To do so, GAO relied on previous reports, as well as two reports being released today, and analyzed information about the status of recommendations."
United States. Government Accountability Office
2008-09-16
-
Cybersecurity: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats, Statement of Gregory C. Wilshusen, Director, Information Security Issues, Testimony, Before the Committee on Homeland Security, House of Representatives
From the Document: "Cyber-based threats to federal systems and critical infrastructure are evolving and growing. These threats can come from a variety of sources, including criminals and foreign nations, as well as hackers and disgruntled employees. These potential attackers have a variety of techniques at their disposal, which can vastly enhance the reach and impact of their actions. For example, cyber attackers do not need to be physically close to their targets, their attacks can easily cross state and national borders, and cyber attackers can easily preserve their anonymity. Further, the interconnectivity between information systems, the Internet, and other infrastructure presents increasing opportunities for such attacks. Consistent with this, reports of security incidents from federal agencies are on the rise, increasing by over 400 percent from fiscal year 2006 to fiscal year 2009. Compounding the growing number and kinds of threats, GAO-along with agencies' internal assessments-has identified significant deficiencies in the security controls on federal information systems, which have resulted in pervasive vulnerabilities. These include weaknesses in the security of both financial and non-financial systems and information, including vulnerabilities in critical federal systems. These deficiencies continue to place federal assets at risk of inadvertent or deliberate misuse, financial information at risk of unauthorized modification or destruction, and critical operations at risk of disruption." This testimony offers suggestions of how to make the government's information systems more secure. It also encourages the Department of Homeland Security to embrace its "key cybersecurity responsibilities."
United States. Government Accountability Office
2010-06-16
-
1 is 2 Many: Twenty Years Fighting Violence Against Women and Girls
From the Overview: "Twenty years after the passage of the Violence Against Women Act (VAWA), many citizens cannot remember a day in which Americans ignored this violence, or worse, condoned it. The papers are flooded daily with stories from abroad--of gang rapes and kidnappings, of honor killings and acid attacks, of a child shot for promoting girls' education. History tells us, however, that what we see today so clearly as an assault on human dignity abroad has not always been seen so clearly at home. Twenty years ago, for most citizens, domestic violence and sexual assault were covered by a veil of ignorance and inattention, an open secret, acknowledged but ignored. In the late 1970s and early 1980s, public officials openly declared that the federal government had no role to play, that battling domestic violence was a 'private family matter.' Then, members of Congress complained that federal intervention was 'anti-family,' that shelters were 'indoctrination centers' filled with 'missionaries who would war' on the family, that domestic violence was somehow akin to 'spanking' or 'nagging.' Citizens dismissed sexual assault and battering by blaming the victim--'She asked for it,' 'she wore a short skirt,' 'she drank too much.' In 1990, when it was first introduced, the Violence Against Women Act gave a new name and a new voice to an ancient tragedy."
United States. White House Office
2014-09
-
National Drug Control Strategy (February 2007)
The 2007 National Drug Control Strategy is consistent with the timing set forth in Section 201 of the office of National Drug Control Policy Reauthorization Act of 2006. The strategy focuses on three areas: stopping drug use before it starts - education and community action; intervening and healing America's drug users, and; disrupting the market for illicit drugs.
United States. White House Office
2007-02
-
Trans-Pacific Partnership Agreement: Challenges and Potential, Joint Hearing Before the Subcommittee on Terrorism, Nonproliferation, and Trade and the Subcommittee on Asia and the Pacific of the Committee on Foreign Affairs, House of Representatives, One Hundred Twelfth Congress, Second Session, May 17, 2012
From the opening statement of Donald A. Manzullo: "The Trans-Pacific Partnership [TPP] free trade negotiation is one of the most significant opportunities we have for trade liberalization in the world today. The nine-country pact, if successfully completed and passed by Congress, will offer more direct benefits to the United States than many prior free trade agreements. TPP brings together the U.S. and eight Pacific Rim nations in a high quality, 21st Century legal framework that promises to shape the future of Asia, and possibly of the rest of the world. It is in this part of the world, the Asia-Pacific region, that has the fastest-growing economies and most populous nations; and, it must be our mission to help American companies succeed in exporting to these markets so that we grow more jobs here at home. In fact, direct exports from Illinois, the Land of Lincoln to TPP countries more than doubled from 3.4 billion in 2005 to 7.7 billion in 2011, making Illinois the third-largest exporting state in the nation to the TPP countries, after Texas and California. The importance of TPP for America's long-term economic future is clear." Statements, letters, and materials submitted for the record include those of the following: Donald A. Manzullo, Susan C. Schwab, Linda Menghetti, Celeste Drake, Philip I. Levy, Edward R. Royce, and Ted Poe.
United States. Government Printing Office
2012
-
Not Alone: The First Report of the White House Task Force to Protect Students From Sexual Assault
"This report was prepared by the 'White House Task Force to Protect Students From Sexual Assault.' The Task Force is Co-Chaired by the Office of the Vice President and the White House Council on Women and Girls." From the Executive Summary: "One in five women is sexually assaulted in college. Most often, it's by someone she knows -- and also most often, she does not report what happened. Many survivors are left feeling isolated, ashamed or to blame. Although it happens less often, men, too, are victims of these crimes. The President created the Task Force to Protect Students From Sexual Assault to turn this tide. As the name of our new website -- NotAlone.gov -- indicates, we are here to tell sexual assault survivors that they are not alone. And we're also here to help schools live up to their obligation to protect students from sexual violence. Over the last three months, we have had a national conversation with thousands of people who care about this issue. Today, we offer our first set of action steps and recommendations."
United States. White House Office
2014-04
-
Press Briefing by Press Secretary Jay Carney [July 5, 2011]
In this July 5, 2011 press briefing, Press Secretary Jay Carney provides information and takes questions on a report stating that weapons from the Fast and Furious program are now showing up in the United States attached to criminal transactions, the Minnesota government shutdown, current U.S. job opportunity statistics, the Status of Forces Agreement with the Iraqi government, and the current debt crisis.
United States. Office of the White House Press Secretary
2011-07-05
-
Less-Redacted Version of CIA Document 3-002 [Originally Released March 15,2010]
From the Document: "This letter expresses concern about the origin of certain claims made by the President and members of his administration before the Mar 03 invasion of Iraq and requests answers to the questions listed in this letter; Please describe in detail the decision making process which concluded with al-Libi being transferred to a foreign government? Does the United States have a uniform policy regarding the transfer of an individual into the custody of a state that appears on the list of states that engage in torture in the Country Reports on Human Rights? Was there thought given to the possibility that under the custody of a foreign government al-Libi might be tortured, especially if the foreign government which received custody of al-Libi had been cited by the Department of State's by the Department of State's annual Country Reports on Human Rights Practices for torture or abuse of prisoners and detainees? Central Intelligence agency operation cables from February 2004, as quoted by the Senate Select Committee on Intelligence, contain many references to allegations by al-Libi that he was tortured by the foreign intelligence service. After transferring custody of al-Libi to a foreign government, were United States personnel involved in the interrogation? Please describe in detail the judgments your Administration made as to the veracity of the information obtained from al-Libi under interrogation by the foreign intelligence service?"
United States. White House Office; United States. Central Intelligence Agency
Markey, Edward J.
2007-05-24
-
Fact Sheet: Not Alone - Protecting Students from Sexual Assault, April 29, 2014
This White House Press Release announces the actions taken by the White House Task Force to Protect Students from Sexual Assault since its establishment on January 22, 2014. On the date of this release, the Task Force opened a website, www.NotAlone.gov that provides data and resources to students and schools.
United States. Office of the White House Press Secretary
2014-04-29
-
Fact Sheet: Military Commissions Act of 2006 [October 17, 2006]
From the Document: "'President Bush signed The Military Commissions Act of 2006 which will preserve the tools needed to help save American lives.' This bill will allow the CIA to continue its program for questioning key terrorist leaders and operatives like Khalid Sheikh Mohammed - the man believed to be the mastermind of the 9/11 attacks. This program has been one of the most successful intelligence efforts in American history, and the Military Commissions Act will ensure that we can continue using this vital tool to protect the American people for years to come. With this bill, America reaffirms our determination to win the War on Terror."
United States. Office of the White House Press Secretary
2006-10-17