Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
More Community, Less Confinement: A State-By-State Analysis on How Supervision Violations Impacted Prison Populations During the Pandemic
From the Webpage: "To understand the impact of community supervision (i.e., probation, parole, post-release supervision) on state prison populations, The Council of State Governments (CSG) Justice Center [hyperlink] surveyed corrections leaders in all 50 states. [...] The resulting data span 3 years--from 2018 to 2020--and demonstrate how the number of people sent to prison for supervision violations changed during (and prior to) the pandemic."
Justice Center (Council of State Governments)
-
CISA's Public Safety Communications and Cyber Resiliency Toolkit
This interactive guide was produced by the Cybersecurity and Infrastructure Security Agency (CISA) to "assist public safety agencies and others responsible for communications networks in evaluating current resiliency capabilities, identifying ways to improve resiliency, and developing plans for mitigating the effects of potential resiliency threats." From the CISA webpage introducing the toolkit: "The ability to maintain voice and data communications at all times is critical for public safety agencies to perform their life-saving missions. By establishing resiliency measures, public safety communications can better withstand potential disruptions to service. [...] To facilitate viewing available resources, an interactive graphic is provided. Topic specific systems-based resources appear as building shapes (blue); threats are cloud shapes (red). Clicking on a topic reveals a list of resources accompanied by a brief description. Note: by clicking on the image, you will receive a notification that you are being redirected to a website outside the CISA.gov domain."
United States. Cybersecurity & Infrastructure Security Agency
-
Long COVID: Lessons Learned [presentation]
This presentation provides information regarding the symptoms of "Long COVID [coronavirus disease]," including clinical experiences and the evaluation of possible treatments.
Penn Medicine
Abramoff, Benjamin
-
After Action Report/ Improvement Plan: Comanche Peak Nuclear Power Plant [December 03, 2009]
From the Executive Summary: "On December 3, 2009, an out-of-sequence medical drill was conducted for the Comanche Peak Nuclear Power Plant (CPNPP), located near Glen Rose, Texas. Personnel from the U.S. Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) Region VI Office evaluated all activities. The purpose of the drill was to assess the level of preparedness of responders to react to a simulated medical emergency with a radiologically contaminated patient. [...] This report contains the final evaluation of this out-of-sequence drill."
United States. Federal Emergency Management Agency
-
Understanding and Preventing Violence: Summary of 2016 Research and Surveillance Activities
From the Document: "Violence is a public health problem that has substantial impact on individuals, their families, and entire communities. Each year, millions of people experience the physical, mental, and economic consequences of violence. The good news is that violence is preventable, and the Centers for Disease Control and Prevention (CDC) is committed to stopping violence before it can begin. The Division of Violence Prevention (DVP) within CDC's Injury Center works to prevent violence and the injuries and deaths caused by violence, so people can live life to the fullest. As the only federal agency that focuses on stopping violence before it starts, DVP monitors and tracks violence trends, conducts research to identify factors that increase or decrease the risk for violence, develops and rigorously evaluates innovative prevention approaches, and supports the widespread use of evidence-based prevention strategies. This critical work helps us prevent violence across the lifespan, including child abuse and neglect, youth violence, intimate partner violence, sexual violence, and suicidal behavior."
Centers for Disease Control and Prevention (U.S.); National Center for Injury Prevention and Control (U.S.)
-
Social-Ecological Model: A Framework for Violence Prevention
From the Document: "The ultimate goal of the work of violence prevention is to stop violence before it begins. CDC [Centers for Disease Control and Prevention] uses a four-level social-ecological model (SEM) to better understand and prevent violence. Violence is complicated and results from a combination of multiple influences on behavior. It is about how individuals relate to those around them and to their broader environment. The SEM allows us to address the factors that put people at risk for or protect them from experiencing or perpetrating violence (risk and protective factors) and the prevention strategies that can be used at each level to address these factors."
Centers for Disease Control and Prevention (U.S.); National Center for Injury Prevention and Control (U.S.)
-
Public Health Approach to Violence Prevention
From the Document: "The public health perspective asks the foundational questions: Where does the problem begin? How could we prevent it from occurring in the first place? To answer these questions, public health uses a systematic, scientific approach for understanding and preventing violence . While violence prevention practitioners may not be involved in all steps, understanding each step and why they are necessary to assure the desired impact on community health is helpful in selecting and/or developing prevention strategies."
Centers for Disease Control and Prevention (U.S.); National Center for Injury Prevention and Control (U.S.)
-
How to Assess and Improve Operations of Small Law Enforcement Agencies
From the Document: "The purpose of this training guide is to provide a framework of the areas that need to be reviewed and the indicators to look for that might indicate a problem. It will also provide practical tips on how to improve each functional area. Agency executives need to have a system in which they can review critical department functions on a regular basis. Failing to provide leadership and management in any organization will clearly result in not only diminished effectiveness but also a high likelihood of catastrophic failure. Often times, police executives provide leadership but fail to manage, and eventually, the organization suffers. A successful police executive can both lead and manage."
Justice Technology Information Center (U.S.)
Schultz, Paul
-
Pandemic Oversight [website]
From the Website: "[The Pandemic Response Accountability Committee is] here to help you understand how the federal government has responded to the pandemic. We show you data on where pandemic program funding money was spent. Our committee of 22 Inspectors General [hyperlink], along with our other law enforcement partners, uses the data you'll find on our website along with other data to detect and combat fraud, waste, abuse, and mismanagement of any pandemic-related programs and funding."
Pandemic Response Accountability Committee
-
CFATS Outreach Implementation Plan, Fiscal Year 2019
From the Introduction: "Established in 2007, the Chemical Facility Anti-Terrorism Standards (CFATS) program has helped make the Nation more secure by identifying and regulating high-risk chemical facilities.1 On December 18, 2014, President Obama signed into law the 'Protecting and Securing Chemical Facilities from Terrorist Attacks Act of 2014' (the CFATS Act of 2014), Public Law 113-254 (6 U.S.C. 621 et seq.). The CFATS Act of 2014 reauthorizes the CFATS program and adds new provisions while preserving most of the existing CFATS regulations. The CFATS Act of 2014 directs the Department of Homeland Security (DHS or the Department) Secretary, among other provisions, to establish an outreach implementation plan (Plan) in coordination with the heads of appropriate Federal and State agencies, relevant business associations, and public and private stakeholders' labor organizations in order to identify chemical facilities of interest (CFOI) that may be subject to regulations under CFATS and to make available compliance assistance materials and information on CFATS-related education and training."
United States. Cybersecurity & Infrastructure Security Agency
-
Counter Unmanned Aircraft Systems Legal Authorities
From the Document: "The Preventing Emerging Threats Act of 2018 grants the Department of Homeland Security statutory authority to counter credible threats from unmanned aircraft systems (UAS) to the safety or security of a covered facility or asset. This authority is paramount to the Department's mission to protect and secure the Homeland from evolving threats. The Department is in the process of coordinating with Components and stakeholders regarding the need for additional counter-UAS (CUAS) authorities."
United States. Cybersecurity & Infrastructure Security Agency
-
Cybersecurity Directives [website]
"The Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) develops and oversees the implementation of 'binding operational directives' and 'emergency directives,' which require action on the part of certain federal agencies in the civilian executive branch."
United States. Cybersecurity & Infrastructure Security Agency
-
Security and Resiliency Guide: Counter-Improvised Explosive Device (C-IED) Annex for Healthcare and Public Health Facility Stakeholders
From the Purpose: "Bombings using improvised explosive devices (IEDs) are a common security concern related to terrorism and violence in the United States (U.S.). Multiple high-profile, domestic incidents have occurred over the last several decades, and international attacks are frequently in the news. Healthcare facilities are not immune from IED incidents, including bomb threats, suspicious items or behavior, and attacks using IEDs. Between May 2016 and May 2019, media reports indicated that there were 243 healthcare-related IED incidents in the U.S. According to the World Health Organization (WHO), from 2016 to 2018, there was an annual average of 337 attacks on healthcare targets across 19 overseas countries that reported data. During that time span, those attacks resulted in an average of 325 deaths and 415 injuries per year. On average, 60% of attacks were bombings. This guide defines actions that management and staff at healthcare facilities can take to understand and improve their ability to perform counter-IED (C-IED) activities and make security decisions."
United States. Cybersecurity & Infrastructure Security Agency
-
Atirador Ativo: Como Reagir
"Atirador ativo é alguém que toma a iniciativa de matar ou tentar matar pessoas em ambiente delimitado e populoso; na maioria dos casos, os atiradores ativos usam armas de fogo sem nenhum padrão ou método definido para seleção das suas vítimas. As situações de atirador ativo são imprevisíveis e evoluem rapidamente. Em geral, é necessária a mobilização imediata da polícia para parar os tiros e reduzir os danos às vítimas. Como frequentemente as situações de atirador ativo terminam dentro de 10 a 15 minutos, antes da chegada da polícia ao local, as pessoas precisam estar preparadas mental e fisicamente para lidar com uma situação de atirador ativo."
United States. Cybersecurity & Infrastructure Security Agency
-
Synchronization of Situational Awareness Between Critical Infrastructures and the Public Sector Using Unmanned Aerial Systems (UAS)
From the Document: "Rapid damage assessment of critical infrastructure elements following a disruptive event, and the sharing of that information allows both public and private sectors to more quickly establish situational awareness and optimally deploy response resources. This project focused on the development of plans, procedures, processes, and mechanisms for using Unmanned Aerial Systems (UAS) to provide rapid situational awareness and for sharing that information between public and private partners. This information was transmitted to State Emergency Operations Centers (EOC) and was used to create a common operational map that can be shared with the federal government, other jurisdictional organizations, and the private sector during emergency response situations. As the use of private sector UAS increases, first responders have the ability to leverage these resources to rapidly gain situational awareness across a larger geographic region."
United States. Cybersecurity & Infrastructure Security Agency
-
Biopolymer-Stabilized Earth Materials for Resilient and Adaptable Infrastructure
From the Document: "Earthen infrastructure in the U.S. comprises around 85,000 earthen dams, also known as embankment dams or earth filled dams, and most of the 100,000 miles of levees. Many earthen dams and levees face considerable risk from both natural and man-made hazards. Rehabilitation of these aging infrastructures relies mainly on the same materials used decades ago to build and reinforce the structures. Failure of any of these structures could result in major negative impacts on the U.S. economy and threaten the health and safety of surrounding communities."
United States. Cybersecurity & Infrastructure Security Agency
-
Safeguarding Patients by Enabling Accelerated Government and Utility Response Through Real Time Data Sharing of Hospital Generator Status During Disasters
From the Document: "In large scale disasters that cause widespread power outages, emergency power systems at hospitals and other medical facilities are the primary lifeline for maintaining critical operations. Failures of these systems can have deadly consequences and can trigger emergency evacuations, as seen during Hurricanes Katrina (2005), Sandy (2012), and Matthew (2016). [...] An estimated 2,000 plus hospitals have connected remote monitoring and automated reporting technology to their emergency power systems. They provide real time, automated alerts to facility staff and generator service providers any time a mechanical threat to emergency power is detected or if fuel levels run dangerously low. This technology affords an opportunity to provide government and private utilities with real time, early warning of a threat to emergency power at a hospital. Yet, U.S. hospitals do not regularly share this highly valuable data with government or utility officials because protocols often do not exist to govern how this information sharing should take place."
United States. Cybersecurity & Infrastructure Security Agency
-
Cyber Risk Management Toolkit for Small Government Entities
From the Document: "According to the National League of Cities, there are approximately 39,000 municipal, county, and township government entities in the U.S., 90 percent of which serve small populations. Another 50,000 special purpose government entities and small school districts exist. These jurisdictions face considerable threats of theft of personally identifiable information (PII) and hacking that would disrupt critical infrastructure services. Unfortunately, the basic cyber risk management tools built for the commercial and nonprofit sectors do not address the subtle but important differences that define small government cyber risks. The cyber risk management solutions that currently exist for commercial and nonprofit entities need to be updated with research, analysis, and models that are unique to small government entities. Applying cyber risk management tools with the correct underlying research,analysis,and models for small government entities will fill an important gap in cybersecurity resources and tools for small government entities."
United States. Cybersecurity & Infrastructure Security Agency
-
Building Disaster Resiliency in the Public Sector by Leveraging Critical Healthcare Supply Chain Information
From the Document: "The nation's healthcare supply chain undergoes significant strain when there are disruptions to U.S. critical infrastructure. The supply chain depends upon private medical-surgical distributors who deliver supplies to 300,000 points-of-care, including hospitals, nursing homes, and other medical facilities. Due to limited suitable storage space in healthcare facilities, the needed health care products are usually sourced from local distribution centers,which typically make daily deliveries. As a result, any interruption of deliveries could cause significant shortages at these healthcare facilities. Currently, there is no mapping framework or formal method of communication that public agencies can use to identify where the nation's distribution centers are located and what supplies are available. This lack of information limits the ability of public and private partners to respond quickly to disasters by re-routing or prioritizing delivery of healthcare products."
United States. Cybersecurity & Infrastructure Security Agency
-
Condition Assessment Procedures for Concrete Dams with Post-Tensioned Anchors
From the Document: "Researchers at the US Army Engineer Research and Development Center (ERDC) sought to develop engineering procedures to estimate the current load-carrying capacity of ground anchorage, and other factors related to the deterioration and lifespan of dam anchors. Based on previous work developed during the FY2017 NIPP [National Infrastructure Protection Plan] Challenge by the team of researchers from Harvey Mudd College and Engineering Innovations, the ERDC needed to fully understand the benefits and limitations associated with the techniques developed by the 2017 project team. Early research into the use of Performance Based Testing (PBT) for evaluating the condition of anchors in concrete dams was conducted in 2017. The research procedures established during the 2017 project relied upon the dam's ability to pull the anchors into resonance. This process deviated from current testing procedures because typical post-tensioned anchor tests are designed using basic equilibrium (static) equations."
United States. Cybersecurity & Infrastructure Security Agency
-
Convenience Store and Fuel Retailer Emergency Preparedness: Resilience for the Last 50 Feet
From the Document: "Convenience stores and fuel retailers represent a critical component of the Nation's supply chain, providing necessary resources to communities across the Nation. Often referred to as the last 50 feet of the supply chain for fuel, food, water and financial services, convenience stores house 80 percent of the Nation's gasoline, 50 percent of its water, and operate 33 percent of its ATMs [automated teller machines]. Additionally, convenience stores and fuel retailers may have the only source of electricity (through on-site generators) during disaster incidents. They are a familiar presence in the community, and it is estimated that 165 million people shop at convenience stores or fuel retailers every day, generating approximately $601 billion in annual revenue. From an operations perspective, the situation is unique; 24/7 operations, diffused ownership, geographically at-risk locations, diversity of managers and employees, and low-margin businesses that, nonetheless, are the endpoint of the supply chain for food, fuel, water, and finance. Unfortunately, more often than not, they do not have procedures in place for when disasters take place."
United States. Cybersecurity & Infrastructure Security Agency
-
Expand and Enhance a Regional Common Operating Picture for Disaster Resilience (Phase 2)
From the Document: "During the 2017 NIPP [National Infrastructure Protection Plan] Challenge, the All Hazards Consortium (AHC) developed a private sector operated Sensitive Information Sharing Environment (SISE) and an associated SISE Working Group. The 2018 project focused on developing an operational plan and closer coordination between the National Infrastructure Coordinating Center (NICC) and the SISE. The coordination focused on developing strategies and plans, enhancing agreements, standards, data sets, technical processes and connections to organize and share information faster. The sharing attempted to increase decision maker confidence in data sets, create common federated agreements to use information, and address specific use case in both disaster management and active shooter scenarios."
United States. Cybersecurity & Infrastructure Security Agency
-
Location Detection of Rogue Base Stations/IMSI Catchers
From the Document: "Rogue base stations, also known as international mobile subscriber identity (IMSI) catchers, are devices that masquerade as cell phone towers, tricking cell phones within a certain radius into connecting to the device rather than a tower. During recent pilot tests conducted over the public airwaves, DHS detected anomalous activity that appeared to be consistent with rogue technology being used in proximity to sensitive facilities such as the White House. Some rogue base stations may have advanced features allowing interception and alteration of communication content. As a result of unknown capabilities, there is a need to detect rogue base stations in order to better protect the communication sector's critical infrastructure."
United States. Cybersecurity & Infrastructure Security Agency
-
Small Telecommunications Operator Information Sharing Study and Pilot Project
From the Document: "Cyber threat intelligence is a critical component to the development of a cyber security risk-management strategy. This intelligence assists with identifying and assessing threats and offers mitigation techniques toward managing cyber risks. The Federal government has long recognized the importance of public-private information sharing to improve an individual company's cyber program and collectively the nation's cyber posture. [...] Small telecommunications operators have limited financial, technical, and operational resources. As a result, many small operators do not actively participate in cyber threat information sharing programs and may not be receiving the necessary critical intelligence to inform and bolster their security efforts."
United States. Cybersecurity & Infrastructure Security Agency
-
CISA: Tool Secures Privileged Access Management
This document describes a successful example from the U.S Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA)'s Continuous Diagnostics and Mitigation (CDM) Program. From the Document: "CISA recently deployed an industry-leading privileged access management (PAM) tool as part of its CDM implementation to transition the 30 disparate information systems it managed into a cohesive enterprise-wide approach. With this tool, CISA's security operations team found an effective solution for the results they desired and gained visibility and enhanced security throughout their organization."
United States. Cybersecurity & Infrastructure Security Agency
-
SBA: Urgent Need Leads to Long-Term Improvements
This document describes a successful example from the U.S Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA)'s Continuous Diagnostics and Mitigation (CDM) Program. From the Document: "As the entire nation grappled with the onset of the coronavirus pandemic, the Small Business Administration (SBA) faced a seemingly ominous challenge. Just when most Americans were forced to work from home--and when office systems and structures were upended as a result--SBA had to quickly implement a major and critical funding program for its small business community to help keep them afloat. The Coronavirus Aid, Relief, and Economic Security Act (CARES Act) was signed into law March 27, 2020, to respond to the economic fallout of the COVID-19 [coronavirus disease 2019] pandemic in the United States. The CARES Act provided direct assistance to American workers and small businesses and authorized SBA to provide funding through the Paycheck Protection Program, Economic Injury Disaster Loans, and other debt/loan programs."
United States. Cybersecurity & Infrastructure Security Agency
-
HHS: Cybersecurity Enhancements to Ensure Health Protections for All Americans
This document describes a successful example from the U.S Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA)'s Continuous Diagnostics and Mitigation (CDM) Program. From the Document: "In March 2020 when the Department of Health and Human Services (HHS) was transitioning its workforce to teleworking due to COVID-19 [coronavirus disease 2019], the department experienced a series of cyberattacks that attempted to overload the agency with computer data requests that could slow down or potentially disable its systems. While HHS quickly addressed and nullified the attacks, the department determined that increased vigilance was needed. Safeguarding HHS pandemic-related information, particularly regarding vaccine research and related data, was essential to protect it from bad actors and foreign adversaries seeking to profit from the data. Under the leadership of HHS Chief Information Security Officer Janet Vogel, HHS turned to the CISA's CDM Program for assistance. The effort was led by HHS Senior Security Advisor Bernard Asare and HHS Enterprise Security Architect and Manager Mark Deffenbaugh."
United States. Cybersecurity & Infrastructure Security Agency
-
Protect Pulp and Paper Production Chemicals from Use in a Terrorist Attack
From the Document: "The pulp and paper industry uses a variety of chemicals throughout the manufacturing process of paper and paper products--from books and currency, to paper towels and food wrappers--that are indispensable to our modern way of life. In the wrong hands, however, some of these same chemicals can be used for great harm. In 2006, Congress authorized the U.S. Department of Homeland Security (DHS) to establish the Chemical Facility Anti-Terrorism Standards (CFATS) program. Managed by the Cybersecurity and Infrastructure Security Agency (CISA), the CFATS program identifies and regulates high-risk chemical facilities to ensure that security measures are in place that reduce the risk of certain chemicals being weaponized. [...] Pulp, paper, and paper conversion facilities--e.g., pulp mills, paper mills, paperboard mills, newsprint mills, and specialty paper manufacturers--that use COI are chemical facilities under CFATS and may be subject to its regulations."
United States. Cybersecurity & Infrastructure Security Agency
-
Election Security Risk Profile Tool [website]
From the Introduction: "This tool is intended to help identify and prioritize risk to a State or Jurisdiction's election infrastructure and to identify mitigation options. In order to provide this Risk Profile, the user should respond to the questions in each election component page. Responses across components are transferred to the 'Risk Profile' report which provides an overview of the component's high priority risk areas."
United States. Cybersecurity & Infrastructure Security Agency; United States. Election Assistance Commission
-
Guide to Vulnerability Reporting for America's Election Administrators
From the Introduction: "America expresses itself through its elections. Citizens expect the same speed, security, and accuracy in voting as they expect in their communications. Even when we cast a paper ballot at a polling place, election officials rely on dozens of electronic data systems to bring the right ballots to each registered voter and to ensure they are accurately counted. Like other electronic systems, risk to election systems can be effectively managed, but vulnerabilities do exist. Election administrators should know that the cybersecurity research community can help ensure these systems are safe so that the choices of the voting public can be clearly heard. This Guide offers a step by step guide for election administrators who seek to establish a successful vulnerability disclosure program."
United States. Cybersecurity & Infrastructure Security Agency