Advanced search Help
Searching for terms: ALL (national AND preparedness) in: full text and any metadata
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Special Inspector General for Iraq Reconstruction: Quarterly Report and Semiannual Report to the United States Congress [January 30, 2009]
"This 20th Quarterly Report appears virtually upon the anniversary of my appointment as [Special Inspector General for Iraq Reconstruction (SIGIR)] five years ago and precedes by two days the release of Hard Lessons: The Iraq Reconstruction Experience, which completes SIGIR's Lessons Learned Initiative. Taken together, these two new reports provide a comprehensive and coherent picture of both the course and the current state of Iraq reconstruction." The report is broken down into five sections: SIGIR Observations, which asserts that Iraq has entered a new era in 2009; Iraq Reconstruction Sources and Uses; Reconstruction by Province; SIGIR Oversight; and Other Agency Oversight. The report concludes with 13 appendices containing the following information: statutory requirements, impact of SIGIR operations, cross reference of SIGIR budget terms, sector cross-reference, U.S. appropriated funds, Iraqi funds, international support for Iraq, completed SIGIR audits, completed SIGIR inspections, convictions, suspensions and debarments, detailed summary of other agency oversight, and summary of U.S. oversight in Iraq.
United States. Office of the Special Inspector General for Iraq Reconstruction
2009-01-30
-
Maritime Threat Response
"In the twenty-first century, the threat of asymmetric warfare in the form of terrorism is one of the most likely direct threats to the United States homeland. It has been recognized that perhaps the key element in protecting the continental United States from terrorist threats is obtaining intelligence of impending attacks in advance. Enormous amounts of resources are currently allocated to obtaining and parsing such intelligence. However, it remains a difficult problem to deal with such attacks once intelligence is obtained. In this context, the Maritime Threat Response Project has applied Systems Engineering processes to propose different cost-effective System of Systems (SoS) architecture solutions to surface-based terrorist threats emanating from the maritime domain. The project applied a five-year time horizon to provide near-term solutions to the prospective decision makers and take maximum advantage of commercial off-the-shelf (COTS) solutions and emphasize new Concepts of Operations (CONOPS) for existing systems. Results provided insight into requirements for interagency interactions in support of Maritime Security and demonstrated the criticality of timely and accurate intelligence in support of counter-terror operations."
Naval Postgraduate School (U.S.)
Kessler, Andrew; Shewfelt, Michael; Davis, Jennifer
2006-06
-
USS Thresher Interim Release 5, Part 1, part 1
This unclassified reference document on "Sea-Based Airborne Antisubmarine Warfare 1940-1977, Volume I 1940-1960," was released in accordance with the Freedom of Information Act (FOIA) regarding the 1963 loss at sea of the USS Thresher.
United States. Department of the Navy; R. F. Cross Associates, Ltd.
1978-02-17
-
Guidelines and Specifications for Flood Hazard Mapping Partners: Appendix I: Project Scoping Toolbox [April 2003]
This appendix to the Federal Emergency Management Agency's (FEMA) "Guidelines and Specifications for Flood Hazard Mapping Partners" includes "everything required to produce a new or revised flood map: initial identification of mapping needs, scoping the project, conducting flood hazard analyses (i.e., hydrologic and hydraulic analyses), converting manually produced maps to digital format, merging revised and non-revised flood hazard data, providing due process (i.e., Preliminary and post-Preliminary processing), and printing and distribution. These Flood Map Project activities are described generally in Volume 1 and in greater detail in Appendices A through M of these Guidelines. This Appendix provides additional guidance for Project Scoping. Project Scoping begins after community mapping needs have been assessed and the Federal Emergency Management Agency (FEMA) has decided to initiate a flood map creation or update."
United States. Federal Emergency Management Agency
2003-04
-
Pediatric Surgery and Medicine for Hostile Environments
From the Document: "Many lessons have been learned from the past decade regarding pediatric inpatient care in austere environments. Military MTFs [medical treatment facilities] and personnel must be prepared for the longer-term care of critically ill and injured children. This includes the transition from the MTF to the local medical facility and ultimately the patient's community. Unlike our injured soldiers, who are typically evacuated out of theater via critical care air transport teams in 12 to 24 hours, children generally must remain in the austere environments where they were injured. We have learned that embarking on treatment regimens that cannot be supported long term in these environments are ultimately not beneficial. [...] We hope that this text provides military physicians, often practicing in austere environments, with a current and concise reference for the basic medical, surgical, and critical care of children. It should be used as a pragmatic reference but not as a substitute for current peer-reviewed articles or reasoned judgment. Operative procedures performed on children require careful assessment of the available resources and equipment, experience of the operating room team, potential complications, nonoperative options, availability of follow-up care, and an honest overall assessment of the risk to the child from the procedure to be undertaken. Fortunately, the operative procedures done to care for these patients are largely within the scope of practice of well-trained general and orthopedic surgeons."
United States. Department of the Army. Office of the Surgeon General; US Army Medical Department Center and School
Fuenfer, Michael M.; Creamer, Kevin M.
2016
-
Earthquake Strengthening of Cripple Walls in Wood-Frame Dwellings, South Napa Recovery Advisory
"The August 24, 2014 South Napa earthquake has
reinforced past observations that wood-frame dwellings
with flexible wood foundation walls (known as cripple
walls) and inadequate anchorage (bolting) to the
foundation are vulnerable to damage from earthquake
shaking (Figure 1). Damage due to vulnerable cripple
walls, particularly taller cripple walls, can be significant
and costly to repair. In addition, homes with cripple wall
damage are usually identified as unsafe to occupy (i.e.,
'red tagged'). As a result, occupants will be displaced
and unable to live in their home until repairs can be
performed, adding living expenses to the cost of
repairing earthquake damage."
United States. Federal Emergency Management Agency
2015-04
-
Hurricane Jeanne Post-Storm Transportation Analysis
This report addresses transportation and clearance time issues during Hurricane Jeanne including the roadway network's ability to meet evacuation traffic demand, how quickly the public responded to evacuation orders, the volume of traffic during the evacuation, the duration of the evacuation event relative to clearance times, and traffic problems experienced during the evacuation.
Lessons Learned Information Sharing (LLIS)
2005-09-01?
-
Development and Application of Skill Standards for Security Practitioners
"Federal agencies, government contractors, and the military services require well-trained and competent security personnel to ensure the effective administration of their security programs. The Joint Security Training Consortium (JSTC) requested the Defense Personnel Security Research Center to conduct research and development work to improve the training and professional development of the security workforce. The work described in the present report was driven by a JSTC tasking to develop skill standards for security practitioners in seven different security disciplines: security management, security investigations, and communications, physical, information, personnel, and information systems security. Skill standards define competent job performance and the underlying knowledge and skills that competent workers must possess. They are powerful tools with many different applications for training and career development."
Defense Personnel Security Research Center (U.S.); United States. Department of Defense
Simpson, Henry K.; Fischer, Lynn F.; Tippit, John D. . . .
2006-07
-
FM 3-0 Operations
"Adversaries have studied the manner in which U.S. forces deployed and conducted operations over the past three decades. Several have adapted, modernized, and developed capabilities to counter U.S. advantages in the air, land, maritime, space, and cyberspace domains. Military advances by Russia, China, North Korea, and Iran most clearly portray this changing threat. While the U.S. Army must be manned, equipped, and trained to operate across the range of military operations, large-scale ground combat against a peer threat represents the most significant readiness requirement. FM [Field Manual] 3-0 provides doctrine for how Army forces, as part of a joint team, and in conjunction with unified action partners, do this. FM 3-0 is concerned with operations using current Army capabilities, formations, and technology in today's operational environment (OE). It expands on the material in ADRP [Army Doctrine Reference Publication] 3-0 by providing tactics describing how theater armies, corps, divisions, and brigades work together and with unified action partners to successfully prosecute operations short of conflict, prevail in large-scale combat operations, and consolidate gains to win enduring strategic outcomes."
United States. Department of the Army
2017-10-06
-
'To Our Great Detriment': Ignoring What Extremists Say About Jihad (with appendices)
This document is a thesis submitted to the faculty of the National Defense Intelligence College in partial fulfillment of the requirements of the degree of Master of Science of Strategic Intelligence. "Likewise, the nature of today's jihadist enemies can only be understood within the context of their declared strategic doctrine to dominate the world. Just as we ignored Mein Kampf " to our great detriment" prior to World War II, so we are on the verge of suffering a similar fate today. The reason the Intelligence Community is unable to define the nature of the jihadi enemy, the Chairman implies, is because we have not 'read what the enemy has said.' In other words, we have failed to undertake an assessment of the threat based on the jihadi enemy's declared strategic doctrine. This conclusion leads to three fundamental research questions: Why have we failed to do a doctrine-based threat assessment?; What is the doctrinal basis of the jihad threat?; How can we come to understand the jihadi threat? A brief discussion of the research questions will be used to frame the hypothesis that Islamic law forms the doctrinal basis of the jihadi threat that can only be understood through an unconstrained review of the the Islamic law of jihad."
National Defense Intelligence College (U.S.)
Coughlin, Stephen Collins
2007-07
-
Ground Team Member and Leader Reference Text
"The following course material has been developed from several years of experience and knowledge. Documentation and ideas were accepted from all Civil Air Patrol Regions and Wings so that a comprehensive standardized program could be developed at a national level. The chapters included, if properly used in conjunction with a strong field program, should fulfill the minimum requirements for successful specialty qualification of basic ground team members and leaders. The course work is presented in the following manner. Chapters are ordered so that a person builds on skills. Team members need to know certain things before going into the field out of a controlled or safe environment. Once those skills are learned, a trainee can build on that to progress through the training program and work with less guidance in an area that may not be familiar. Finally, a trainee progresses to the point of being qualified, where the person not only can but, is often expected to work autonomously. Trainees are told the topic and objectives up front. As the trainee reads and practices skills, he or she should focus on the objectives already established because this is the same material on which trainees will be tested. At the end of each chapter there are review questions. These are samples of the possible questions to be asked as part of the trainee's final evaluation. Additionally, more specific training on individual tasks is presented in the field task guides, as referenced in the text. You will work through these tasks on field exercises throughout your training."
United States. Civil Air Patrol
2003-04
-
Summary of Existing Guidelines for Hydrologic Safety of Dams
From the background section of the document: "There is a need for updated guidelines for evaluating the hydrologic safety of dams, and in particular, for determining the appropriate Inflow Design Flood (IDF) and freeboard requirements. The existing hydrologic guidelines of some states and federal agencies were written in the late 1970s. Since that time, significant technological and analytical advances have been made along with better watershed and rainfall information that improve the analysis of extreme floods and quantification of incremental dam failure consequences. Many existing dams that were constructed before dam safety rules existed still do not meet regulatory guidelines for safely passing the IDF. Existing guidelines often do not treat new and existing dams the same in recognition of the fact that upgrading older dams to pass the IDF can be difficult and expensive. […] The overriding purpose of this report is to document the available data and to present the state of the practice for evaluating the hydrologic safety of dams, including inventorying current practices used by state and federal agencies. This work included a review of hydrologic guidelines currently used in each state and federal agency that regulates dams, and was guided by an independent steering committee and reviewed by the Research Work Group. A subsequent publication will include new federal guidelines for the evaluation of the hydrologic safety of dams that could be applied nationwide."
United States. Federal Emergency Management Agency
2012-07
-
U.S. Citizenship and Immigration Services: USCIS Policy Manual
"U.S. Citizenship and Immigration Services (USCIS) makes decisions on benefit and service requests that not only affect foreign nationals and their future, but also the well-being of U.S. citizens, families, organizations, businesses, industries, localities, states, the nation, and international communities. Accordingly, USCIS strives to secure America's promise as a nation of immigrants by providing accurate and useful information to customers, promoting awareness and understanding of citizenship rights and responsibilities, and making adjudication decisions in a consistent and accurate manner that furthers the goals and integrity of our nation's immigration system. Our policies drive our benefit and services decisions and ensure that our guidance to USCIS officers who make those decisions reflects our agency's mission, and strategic vision. These policies also greatly affect our interaction with USCIS's diverse customer and stakeholder community. […] The USCIS Policy Manual provides transparency to our customers, including outlining policies that are easy to understand, while also furthering consistency, quality, and efficiency in our adjudications and customer service. The USCIS Policy Manual contains the official policies of USCIS and must be followed by all USCIS officers in the performance of their duties. The Policy Manual does not create any substantive or procedural right or benefit that is legally enforceable by any party against the United States or its agencies or officers or any other person."
U.S. Citizenship and Immigration Services
2021-06-17
-
Ch-2 to 03-03, Implementation Guidance for the Regulations Mandated by the Maritime Transportation Security Act of 2002 (MTSA) for Facilities
"This document revises Navigation and Vessel Inspection Circular (NVIC) No. 03-03, Change 1. It is designed to provide further clarity and guidance for the implementation of the maritime security regulations mandated by the Maritime Transportation Security Act of 2002 (MTSA). This document also introduces the process of submitting security plans and security plan . amendments by way of HOMEPORT, information regarding the new Transportation Worker Identification Credential (TWIC) rule and its applicability to regulated facilities and requirements of the Safe Port Act including scheduled and non-scheduled facility inspections. This NVIC details Facility Security Plan implementation, the plan review process, provides guidance to successfully execute compliance inspections, adds information for guidance for the purposes of performing Facility Security Assessments, and provides clarification on the applicability ofMTSA mandated regulations found in 33 CFR part 105."
United States. Coast Guard
2009-02-28
-
Serial No. 112-46: TSA Reform: Exploring Innovations in Technology Procurement to Stimulate Job Growth, Hearing Before the Subcommittee on Transportation Security of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, First Session, September 22, 2011, October 13, 2011, and November 3, 2011
This document contains the September 22, 2011, October 13, 2011, and November 3, 2011 hearings on "TSA Reform: Exploring Innovations in Technology Procurement to Stimulate Job Growth," held before the U.S. House Committee on Homeland Security, Subcommittee on Transportation Security. From the opening statement of Mike Rogers: "The Committee on Homeland Security Subcommittee on Transportation Security will come to order. The subcommittee is meeting today to examine innovative solutions to technology procurement at TSA that could generate cost savings for the Federal Government and stimulate job growth in the private sector. […] As part of our oversight of the Transportation Security Administration, one of the things we are looking to do is to encourage good ideas that will stimulate job growth in the private sector. Given the hundreds of millions of dollars that the agency spends on technology procurement per year, I believe the TSA has ample opportunity to generate any number of private-sector jobs. The House-passed fiscal year 2012 appropriations bill would provide TSA with more than $550 million for explosive detection system procurement and maintenance. I would like to see if we can find creative ways to reduce that cost over time while still keeping the traveling public safe from acts of terrorism." Statements, letters, and materials submitted for the record include those of the following: Mike Rogers, Sheila Jackson Lee, Bennie G. Thompson, Elaine C. Duke, Michael P. Jackson, Stephen M. Lord, Marc A. Pearl, Scott Boylan, Guy Ben-Ari, Nick Nayak, Robin E. Kane, Paul Benda, and Charles K. Edwards.
United States. Government Printing Office
2012
-
Department of Homeland Security: Disaster Contracts Quarterly Report: Fourth Quarter, Fiscal Year 2017 (Fiscal Year 2017 Report to Congress)
"FEMA strives to compete its procurements whenever possible and practical, including making use of advance contracting for reoccurring disaster-related requirements. There are, however, times when the Agency must use different contracting methods to provide a seamless response and foster a timely recovery. These instances that reduce risk and expedite delivery of services include: missions to safeguard disaster survivors quickly; assisting state, local, territorial, and tribal governments; micropurchases; and protecting property from imminent danger. The FY 2007 DHS Appropriations Act (P.L. 109-295) requires the Administrator of FEMA to provide a quarterly report on all contracts issued during any disaster, which shall include a detailed justification for any contract entered into by means other than competitive procedures. To fulfill this requirement, FEMA gathered data from its contract writing system of record, the Procurement Information System for Management (PRISM). To ensure the integrity of the data, information also was gathered from the Federal Procurement Data System - Next Generation (FPDS-NG) for the fourth quarter of FY 2017. The PRISM fund source data has a greater level of detail than the data provided by FPDS-NG. FEMA relies on the PRISM data to calculate the disaster-related contract action statistics. FEMA uses FPDS-NG data in conjunction with and to validate PRISM-based data and calculations. The data tables herein contain both PRISM and FPDS-NG data. In the fourth quarter of FY 2017, FEMA issued 2,492 contract actions having a total value of approximately $2,606,960,514."
United States. Department of Homeland Security; United States. Federal Emergency Management Agency
2018-05-17
-
Department of Defense Annual Report on Sexual Assault in the Military: Fiscal Year 2012, Volume I
"This report is the 'DoD FY12 Annual Report on Sexual Assault in the Military'. It fulfills the following statutory requirements: 1) Section 1631 of Public Law (P.L.) 111-383, the Ike Skelton NDAA for FY11, requires the Secretary of Defense to submit to the Committees on Armed Services an annual report on sexual assaults involving members of the Armed Forces. 2) Section 1602 of P.L. 111-383 requires the Secretary of Defense to develop and implement an evaluation plan for assessing the effectiveness of the DoD SAPR program. The Annual Report is consistent with these evaluation plan requirements. 3) Section 567 of P.L. 111-84, the NDAA for FY10, and Section 596 of P.L. 109- 163, the NDAA for FY06, specify additional reporting elements pertaining to data collection and case tracking to be included in the Annual Report. This report is the Department's ninth annual report; it describes sexual assault reports that were made during FY12 (October 1, 2011, through September 30, 2012). This report organizes and validates the Department's accomplishments using the five overarching priorities within the 'DoD-Wide SAPR Strategic Plan', published December 2009."
United States. Department of Defense
2012
-
Senate Select Committee on Intelligence: Committee Study of the Central Intelligence Agency's Detention and Interrogation Program
This is an unclassified report that was released on December 9, 2014, by the Senate Select Committee on Intelligence. The purpose of this report is to review the Central Intelligence Agency's Detention and Interrogation Program. The report includes a Foreword by Senate Select Committee on Intelligence Chairman Dianne Feinstein, a Findings and Conclusions section, and an Executive Summary. From the Foreword: "On April 3, 2014, the Senate Select Committee on Intelligence voted to send the Findings and Conclusions and the Executive Summary of its final Study on the CIA's Detention and Interrogation Program to the President for declassification and subsequent public release. This action marked the culmination of a monumental effort that officially began with the Committee's decision to initiate the Study in March 2009, but which had its roots in an investigation into the CIA's destruction of videotapes of CIA detainee interrogations that began in December 2007. The full Committee Study, which totals more than 6,700 pages, remains classified but is now an official Senate report. The full report has been provided to the White House, the CIA, the Department of Justice, the Department of Defense, the Department of State, and the Office of the Director of National Intelligence in the hopes that it will prevent future coercive interrogation practices and inform the management of other covert action programs. […] Nearly 13 years later, the Executive Summary and Findings and Conclusions of this report are being released. They are highly critical of the CIA's actions, and rightfully so. Reading them, it is easy to forget the context in which the program began - not that the context should serve as an excuse, but rather as a warning for the future. […] This Committee Study documents the abuses and countless mistakes made between late 2001 and early 2009. The Executive Summary of the Study provides a significant amount of new information, based on CIA and other documents, to what has already been made public by the Bush and Obama Administrations,' as well as non-governmental organizations and the press."
United States. Congress. Senate. Select Committee on Intelligence
2014-12-09?
-
Agriculture and Related Agencies: FY2015 Appropriations [July 30, 2014]
"The annual Agriculture appropriations bill provides funding for all of the U.S. Department of Agriculture (USDA) except the Forest Service. It also includes the Food and Drug Administration (FDA) and--in the House bill and in enacted bills in even-numbered fiscal years--the Commodity Futures Trading Commission (CFTC). [...] Notable policy riders affecting the Agriculture appropriation bill this year include limitations on implementing nutrition standards for the school meals programs (particularly a waiver in the House-reported bill) and provisions in both bills to prevent USDA from excluding white potatoes from the WIC [Women, Infants, and Children] program. Also, the House bill would restrict USDA from implementing some rules about livestock and poultry marketing practices and some country-of-origin labeling regulations. Both bills continue a provision to prevent federal inspection of horse slaughter facilities, and a House floor amendment was adopted for local and regional international food aid purchases."
Library of Congress. Congressional Research Service
Monke, James
2014-07-30
-
Law Enforcement Tech Guide for Information Technology Security: How to Assess Risk and Establish Effective Policies, A Guide for Executives, Managers, and Technologies
"The Law Enforcement Tech Guide for Information Technology Security: How to Assess Risk and Establish Effective Policies is intended to provide the law enforcement community with strategies, best practices, recommendations, and ideas for developing and implementing information technology security policies. It will help you identify and assess information technology security risks within your agency and provide ideas for mitigating them. Moreover, it will encourage readers to view security policies and practices as an ongoing process of assessment, modification, and measurement. This guide is one of the many resources that the Office of Community Oriented Policing Services (COPS) offers to law enforcement."
United States. Department of Justice. Office of Community Oriented Policing Services
Harris, Kelly J.; Shipley, Todd G.
2006
-
Serial No. 109-35: Gulf Coast Recovery: Facing Challenges and Coming Back Stronger in Education: Hearing before the Committee on Education and the Workforce, U.S. House of Representatives, One Hundred Ninth Congress, Second Session, April 26, 2006
From the opening statement of Howard McKeon: "Good morning, and thank you all for joining us at this hearing, which will focus on the challenges faced and successes achieved by Gulf Coast schools in the wake of Hurricanes Katrina and Rita. Last year, the Gulf Coast endured one of the worst series of hurricanes in our nation's history. Students, workers, retirees and families from the region were impacted in ways seemingly incomprehensible before the storm struck. And the impact of the storms reached far beyond the Gulf Coast. Thousands of schools across the Nation opened their doors to displaced students, and scores of churches, charities and families did the same. Looking back months later, it is no secret that there have been many bumps in the road. Difficulties have been well-documented, and constructive criticism has been appropriately delivered, all with the hope and the expectation that we have learned valuable lessons along the way. But, at the same time, we must be cautious not to concentrate solely on what went wrong after the hurricanes. Rather, we should balance those lessons with an understanding and an appreciation of what went right." Statements, letters, and materials submitted for the record include those of the following: Howard P. McKeon, George Miller, Douglas Chance, Scott S. Cowen, Marvalene Hughes, Fr. William Maestri, Jim Nelson, and Doris Voitier.
United States. Government Printing Office
2006
-
Serial No. 112-27: Removing the Barriers to Free Enterprise and Economic Growth, Hearing Before the Committee on the Budget House of Representatives, One Hundred Twelfth Congress, Second Session, June 1, 2012
From the opening statement of Paul Ryan: "I welcome all to the House Budget Committee for this hearing on one of the key threats posed to our free enterprise system, the growing cronyism in Washington and government-imposed barriers to upward mobility. While we are dealing with tough economic times, Americans still live in the most prosperous and dynamic country in the world. Our free enterprise system has lifted millions from the grips of poverty, a record of success that is increasingly challenged by the corrosive influence of Washington's misguided policies. Over the years, both political parties have pursued deficit-driven spending aimed at favored companies, tax carve-outs for the well connected, and regulatory barriers that stack the deck against the average citizen. This creates a rigged game where success is too often determined not by the quality of service or products that a business provides but by their relationships with those in power in Washington." Statements, letters, and material submitted for the record include those of the following: Chris Van Hollen, Jeb Bush, Chris Edwards, Henry A. Waxman, Kathy Castor, Marcy Kaptur, and Debbie Wasserman Schultz.
United States. Government Printing Office
2012
-
Substantial Improvement/ Substantial Damage Desk Reference
"When buildings undergo repair or improvement, it is an opportunity for local floodplain management programs to reduce flood damage to existing structures. More than 21,000 communities participate in the National Flood Insurance Program (NFIP), which is managed by the Federal Emergency Management Agency (FEMA). To participate in the NFIP, communities must adopt and enforce regulations and codes that apply to new development in Special Flood Hazard Areas (SFHAs). Local floodplain management regulations and codes contain minimum NFIP requirements that apply not only to new structures, but also to existing structures which are 'substantially improved (SI)' or 'substantially damaged (SD).' Enforcing the SI/SD requirements is a very important part of a community's floodplain management responsible. There are many factors that local officials will need to consider and several scenarios they may encounter while implementing the SI/SD requirements. This Desk Reference provides practical guidance and suggested procedures to implement the NFIP requirements for SI/SD. This Desk Reference provides guidance on the minimum requirements of the NFIP regulations. State or locally-adopted requirements that are more restrictive take precedence (often referred to as 'exceeding the NFIP minimums' or 'higher standards')."
United States. Federal Emergency Management Agency
2010-05
-
2013 Sequestration: Selected Federal Agencies Reduced Some Services and Investments, While Taking Short-Term Actions to Mitigate Effects, Report to the Chairman, Committee on the Budget, House of Representatives
"On March 1, 2013 the President ordered a sequestration of $85.3 billion across federal government accounts. Final appropriations enacted on March 26, 2013 reduced this amount to $80.5 billion. Under current law, a sequestration of direct spending will occur through fiscal year 2024 and another sequestration of discretionary appropriations could occur in any fiscal year through 2021. GAO was asked to evaluate how agencies prepared for and implemented sequestration in fiscal year 2013. GAO's March 2014 report broadly examined fiscal year 2013 sequestration at 23 large federal agencies. This report examines in greater depth: (1) the effects of fiscal year 2013 sequestration on the operations, performance, or services to the public for selected components within federal agencies; and (2) how those selected components planned for and implemented the fiscal year 2013 sequestration. GAO reviewed programs and activities operated by four components of federal agencies: CBP, CMS, OESE, and PIH. GAO selected these case studies based on factors such as the share of total sequestered funds and level of direct services provided to the public. GAO also incorporated findings from a November 2013 report that addressed similar objectives for select operations at DOD. GAO's case study selections account for about 77 percent of the total defense funding sequestered and 36 percent of the total nondefense funding sequestered in fiscal year 2013."
United States. Government Accountability Office
2014-05
-
Task Force Report: The Role of Autonomy in DoD Systems
"Unmanned systems are proving to have a significant impact on warfare worldwide. The true value of these systems is not to provide a direct human replacement, but rather to extend and complement human capability in a number of ways. These systems extend human reach by providing potentially unlimited persistent capabilities without degradation due to fatigue or lack of attention. Unmanned systems offer the warfighter more options and flexibility to access hazardous environments, work at small scales, or react at speeds and scales beyond human capability. With proper design of bounded autonomous capabilities, unmanned systems can also reduce the high cognitive load currently placed on operators/supervisors. Moreover, increased autonomy can enable humans to delegate those tasks that are more effectively done by computer, including synchronizing activities between multiple unmanned systems, software agents and warfighters--thus freeing humans to focus on more complex decision making."
United States. Defense Science Board
2012-07
-
Biological Defense Research Program: Final Programmatic Environmental Impact Statement
"The proposed action, and subject of this Final Environmental Impact Statement (FEIS), is continuation of the Biological Defense Research Program (BDRP). The BDRP is a research, development, test and evaluation (RDT&E) program conducted by the Department of Defense (DoD), with the Department of the Army (DA) serving as the executive agent. This FEIS addresses the ongoing program and provides a basis for evaluating future BDRP activities. The objectives of the BDRP are to develop measures for detection, treatment, protection and decontamination of potential biological warfare threat agents. Development of medical defensive measures, such as prophylactic vaccines and drugs, therapeutic measures, and patient treatment and management protocols are important components of the program. The purpose of the BDRP is to maintain and promote a solid national defense posture with respect to potential biological warfare threats. The BDRP supports RDT&E efforts necessary for the maintenance and development of defensive measures and materiel to meet these threats. In addition to promoting the national defense posture, the BDRP benefits the scientific community in general through its research and development efforts, and benefits the global population in the development of diagnostic methods, and vaccine and drug therapies for the treatment of diseases."
United States. Army Medical Research and Development Command
1989-04
-
Wildland Firefighter Safety Awareness Study: Phase I - Identifying the Organizational Culture, Leadership, Human Factors, and Other Issues Impacting Firefighter Safety
"There are many characterizations of wildland firefighters and their work culture. These characterizations vary across all levels of organizations, jurisdictions and types of jobs. As closely held as these perceptions are, as confident as each of us is with our own perceptions--it begs the question of what a systematic look at firefighters and their culture, from within and without, would reveal. This report summarizes the results of Phase I of a four-phase study to examine the Federal wildland firefighting community and to improve firefighter safety. The first phase identified and assessed the organizational culture, leadership, accountability and human factors that affect firefighter safety in the five federal agencies most directly involved in wildland firefighting: the Department of Agriculture Forest Service, and the Department of the Interior Bureau of Land Management, National Park Service, Bureau of Indian Affairs, and Fish and Wildlife Service."
National Interagency Fire Center (U.S.)
1996-10
-
Guide to Developing, Maintaining, and Succeeding With Your School Resource Officer Program
"Many SRO [School Resource Officer] programs have experienced difficulty recruiting, screening, retaining, training, and supervising SROs. Many programs have also had problems maintaining funding over time. This report documents promising methods that selected SRO programs have used to address these potential problem areas of SRO program operations. The information in the report is intended to enable other SRO programs--and jurisdictions that are thinking of starting SRO programs--'to benefit from the experiences of these selected programs by adopting or adapting some of their approaches to solving obstacles in these seven areas'."
United States. Department of Justice. Office of Community Oriented Policing Services
Abt Associates
2005-08-15?
-
Revision 1: Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement
"In January 1998, the Deputy Under Secretary of Defense for Policy Support dispatched the first Department of Defense (DoD) Overprint to the National Industrial Security Program Operating Manual Supplement (NISPOMSUP). The initial Overprint provided additional guidance unique to the DoD Special Access Community, and a framework of security options that affected all Special Access Program (SAP) protection levels." The new guidance itself is contained in this "Department of Defense Overprint to the National Industrial Security Program Operating Manual (NISPOM) Supplement," Revision 1, April 2004.
United States. Department of Defense
2004-04-01
-
Voices of First Responders -- Examining Public Safety Communication Problems and Requested Functionality, Findings from User-Centered Interviews, Phase 1, Volume 2.1
From the Abstract: "The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first responders with communication technology as well as first responders' communication technology requests provides the basis for addressing and developing solutions to improve public safety communication. [...] This Volume 2 report is the second in a series of reports documenting the findings. A qualitative analysis of the transcribed interview data revealed thousands of problems currently being experienced by first responders and new functionality requests. Further analysis, with respect to current problems identified 25 distinct categories, with 1 729 quotes categorized across the four domains. The new functionality request data analysis resulted in 1 143 categorized quotes belonging to 18 categories. From the problems and requested functionality data, three major themes across the public safety landscape were identified in addition to discipline-specific topics that need to be addressed as future communication technology for first responders develops."
National Institute of Standards and Technology (U.S.)
Dawkins, Shanee; Choong, Yee-Yin; Theofanos, Mary . . .
2019-05