Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
DHS and the Department of State Establish Annotated B-1 Visa for Foreign Maritime Workers Applying for the Transportation Worker Identification Credential Program [February 9, 2011]
"The Department of Homeland Security (DHS) and Department of State (DOS) today announced the creation of an annotated version of the B-1 visa--issued to foreign citizens visiting the United States for business purposes--that will make foreign maritime workers eligible to apply for a Transportation Worker Identification Credential (TWIC). The TWIC is a tamper-resistant biometric identification card that maritime workers must obtain in order to gain unrestricted access to secure areas of maritime facilities. 'Strengthening the security of our maritime global supply chain is critical to protecting our nation from evolving threats,' said Secretary of Homeland Security Janet Napolitano. 'This new TWIC process is a critical step toward ensuring that foreign maritime workers can quickly and efficiently obtain the necessary credentials to do their jobs and help grow the American economy.' Under this process, foreign maritime workers who need to acquire a TWIC for the performance of their official duties must provide notice of their need for a TWIC to DOS upon application for a B-1 visa, as well as a letter from their employer indicating that the individual will be required to perform service in secure port areas. Upon receipt of the new TWICannotated B-1 visa, each individual will apply separately for a TWIC. As is the case for all visa and TWIC applicants, these foreign maritime workers will undergo rigorous background checks, including checks against the terrorist watchlist, criminal history, and immigrations records."
United States. Department of Homeland Security. Press Office
2011-02-09
-
Readout of Secretary Napolitano's Remarks to the Homeland Security Advisory Council [February 8, 2011]
"Secretary of Homeland Security Janet Napolitano today met with the Homeland Security Advisory Committee (HSAC) - an independent, bipartisan advisory board of leaders from state and local government, first responder communities, the private sector and academia - to discuss the Department of Homeland Security's (DHS) ongoing initiatives and key priorities in 2011. During the meeting, Secretary Napolitano applauded the critical role of the HSAC Homeland Security Advisory System Task Force in leading to the Department's announcement last month, during the first annual 'State of America's Homeland Security' address, that it will discontinue the color-coded Homeland Security Advisory System (HSAS) in favor the new National Terrorism Advisory System (NTAS) based on the Task Force's assessment. Under the new system, DHS will coordinate with other federal entities to issue formal, detailed alerts when the federal government receives information about a specific or credible terrorist threat. The alerts will provide a concise summary of the potential threat, information about actions being taken to ensure public safety, and recommended steps that individuals and communities, businesses and governments can take."
United States. Department of Homeland Security. Press Office
2011-02-08
-
Statement by Secretary Janet Napolitano on the Death of Retired CBP Officer David Hillman [February 8, 2011]
"'It is with great sadness that I learned yesterday that Mr. David Hillman, a retired U.S. Customs and Border Protection (CBP) Officer with more than 30 years of federal service, was killed in a suicide bombing at the Inland Customs Warehouse in Kandahar, Afghanistan. Like many former DHS employees, Mr. Hillman was continuing to serve his country by contributing his vast knowledge and experience, working as a Border Mentor and Advisor in Afghanistan. Mr. Hillman began his career with the U.S Customs Service in Buffalo, New York in 1973. He served in various assignments, including as a Customs Inspector, Supervisor, Program Manager, and, prior to his retirement in 2009, the Port Director at the Halifax International Airport.'"
United States. Department of Homeland Security. Press Office
2011-02-08
-
Rhumb Lines: Executing the Maritime Strategy, February 7, 2011
"Around the world, the Navy is executing the core capabilities of the Maritime Strategy - some examples from throughout the fleet in January 2011 were: Forward Presence"; "Deterrence"; "Power Projection"; "Maritime Security"; "Humanitarian Assistance / Disaster Response"; and "Building Maritime Partnerships".
United States. Department of the Navy. Office of the Chief of Information
2011-02-07
-
Game Theory: Toolkit and Workbook for Defense Analysis Students
"The purpose of this thesis is to provide a workbook of the game theory topics covered in the course SO4410 Models of Conflict. The thesis also provides a software toolkit, which enables students to solve the problems easier and faster, therefore focusing more on analyses of the situation than on the actual mathematical side of the problem. The workbook gives a basic review of the fundamental concepts and a detailed explanation for solving 'simple' game theory problems by pen and paper. Topics cover two and three person games. Two person games include (1) zero-sum games and their solutions in the pure or mixed strategy, (2) partial-sum games without communication between the players, and (3) communication among players and its effect on the game. Three person games focus on likely coalitions among the players. The toolkit covers two person zero-sum games, the Nash arbitration scheme, strategic moves, prudential and equalizing strategies in partial-sum games, 3-person games, and a supplemental template for linear programming problems with up to 10 variables and 30 constraints."
Naval Postgraduate School (U.S.)
Feix, Miroslav
2007-06
-
Statement by Secretary Napolitano on Senator Lieberman's Retirement [January 19, 2011]
"'The very existence of the Department of Homeland Security is due in large part to Senator Lieberman. Dating back to the first days after 9/11, he has been an instrumental architect of the very way we work to keep America safe from the evolving threats we face in the 21st century. Senator Lieberman's tireless, nonpartisan efforts have truly made our country more secure, and he has my personal thanks. I wish him the very best in his upcoming retirement, and I look forward to continuing to work with him to secure our country over the next two years.'"
United States. Department of Homeland Security. Press Office
2011-01-19
-
Press Gaggle by Robert Gibbs en route Green Bay, Wisconsin [January 26, 2011]
In this January 26, 2011 press gaggle, Press Secretary Robert Gibbs answers questions on protests in Tunisia and Egypt, President Obama's State of the Union Address, and gun control.
United States. Office of the White House Press Secretary
2011-01-26
-
Press Briefing by Press Secretary Robert Gibbs [January 13, 2011]
In this January 13, 2011 briefing, White House Press Secretary Robert Gibbs takes questions on the upcoming State of the Union Address, the shooting of Representative Gabrielle Giffords, New START (Strategic Arms Reduction Treaty), and a comprehensive energy plan.
United States. Office of the White House Press Secretary
2011-01-13
-
After Action Report: May 2010 Flood Event Cumberland River Basin, 1-3 May 2010, Great Lakes and Ohio River Division [November 2010]
"The Corps values continuous improvement, transparency and accountability to the nation. Following the May 2010 Flood event, the Corps committed to an objective review of this agency's role before, during and after the event. We are equally committed to sharing these findings with the public. We are and will continue to work to improve our procedures for the future. This After Action Report (AAR) demonstrates the first step in fulfilling that commitment. It captures twenty-seven lessons learned from this event and details what worked and needs to continue and what did not work and needs to be improved. The specific mission and activities of the Corps during periods of flooding are outlined by several guiding laws. The Corps regulates each flood risk reduction and navigation project in accordance with the provisions of its authorizing legislation as well as specific water management criteria defined in reports approved during the planning and design phases of a project or system. The Corps provides support to the state Emergency Management Agencies as authorized by Public Law (PL) 84-99 by providing technical and material assistance for flood fighting. Public Law 93-288, the Robert T. Stafford Relief and Emergency Assistance Act, authorizes the Corps to support the Federal Emergency Management Agency (FEMA) as the lead agency in Emergency Support Function."
United States. Army. Corps of Engineers
2010-11
-
Analysis of Disaster Preparedness Planning Measures in DOD Computer Facilities
"This thesis will analyze a disaster recovery plan currently in use at a selected DOD [Department of Defense] computer facility, as well as investigate facility contingency planning documents actually tested during recent natural disasters."
Naval Postgraduate School (U.S.)
Harrigan, John D.
1993-09
-
Latin America: The Unfinished Business of Security
"The authors explore the relationship between the theory and practice of democracy in Latin America and the changing roles of the U.S. and Latin American militaries. This is a period when many Latin American countries continue to be threatened by guerrilla movements and/or resurgent militarism and/or narcotrafficking. Among lessons learned during the 1980s are the critical importance of democratization, civilian responsibility, and the development of a civil-military dialogue for the ongoing challenge of maintaining national security. The authors emphasize the importance of keeping an open mind with regard to the threat that narcotrafficking poses to hemispheric security."
Army War College (U.S.). Strategic Studies Institute
Schulz, Donald E., 1942-; Marcella, Gabriel
1993-10-20
-
Army Veterinary Service Role in Low-Intensity Conflict
"National security of the United States depends on stability in the Western Hemisphere, and this stability in turn depends in large part on the respective governments being able to control disease, malnutrition, and poverty in their exploding populations. In spite of the remarkable trend of democratization in Latin America, there continues to be widespread political unrest and terrorism as fledgling democracies strive for moral legitimacy to govern. Terrorism and insurgency are basically rooted in economic and social inequality that can only be improved by providing a broader and more equitable access to economic resources and the benefits they imply (health, education, housing, etc..) The low-intensity conflict environment of Latin America then extends beyond military confrontation. It is characterized more by confrontation between man and his socioeconomic and political situation, of which health and nutrition are integral parts. Properly applied veterinary medicine programs can make a difference in this struggle. They impact on health, economics, and nutrition more than any other single discipline."
Army War College (U.S.)
Stamp, Gary L.
1992
-
Drugs and Terror: A Threat to U.S. National Security
"One of the most ominous developments in recent years is the union of drug traffickers and terrorists. This growing problem, called narcoterrorism, threatens U.S. national security. This threat causes corruption at every level of government and society. In 1989 President Bush declared that drug abuse was the gravest domestic problem facing our nation and was a national security threat. There has been little or no improvement since then. Secretary of Defense Cheney has stated that the detection and countering of the production, trafficking, and the use of illicit narcotics is a high priority national security mission of the Department of Defense. The social impact of the widespread drug abuse in the United States, the staggering effect on the economy, and Third World instability all have substantial national security implications. Narcoterrorism links the drug problem with the terrorist problem, and it is an international and domestic security threat."
Army War College (U.S.)
Cantrell, Alvin D.
1992-03-23
-
Function of Human Intelligence for Low-Intensity Conflict
"This paper argues for improved human intelligence (HUMINT) support of U.S. efforts in low-intensity conflict (LIC). It is reasonable to assume that the United States will continue to be involved in such conflicts for the future. Conventional tactical and national technical intelligence capabilities are formidable and make meaningful contributions to LIC. However, HUMINT will remain a key source to assist our leaders in formulating appropriate responses to LIC. The case for the value of HUMINT in LIC is based on several principle considerations. First, the nature of LIC compared to peacetime competition, conflict, and war. Second, the application of intelligence to support operations in LIC across the operational continuum. Third, the unique contributions of human collection of information to advise decision-makers on responses to LIC. Fourth, the challenges now and in the future for our decision-makers and the intelligence community to meet the requirements of LIC. And last, recommendations to improve efficiency in planning, execution, and exploitation of all available intelligence resources."
Army War College (U.S.)
1991-04-03
-
United States versus the Third World Submarine: Are We Ready?
"The United States faces a serious problem with proliferation of highly capable state of the art submarines and submarine technology. The Maritime Strategy, developed primarily to advance the interests of the United States vis-a-vis the Soviet Union, is flexible enough to allow the Third World submarine challenge to be discounted. The United States needs to recognize that a problem exists and take action to diminish the threat. This study examines historical submarine usage and the capabilities of new generation diesel-electric submarines to provide the reader with an appreciation for the types of situations that may present themselves in the future. With a rapid spread of submarines throughout the world, the United States will soon be involved in some type of crisis that requires a significant Anti-Submarine Warfare force."
Naval War College (U.S.)
Cragg, Clinton H.
1991-02-11
-
Defeating Guerrilla Warfare
"The United States military has had little success in countering guerrilla warfare as part of an insurgency since World War II. The U.S. approach has been to use conventional forces which rely on high technology and massive firepower against low tech enemies who refuse to stand and fight. This paper focuses on developing ways to defeat the basic strategy guerrillas employ as part of an insurgency, through the examination of classic guerrilla warfare literature. Overall insurgent strategies, tactics, and operational considerations are synthesized and from these, strategy, tactics and an operational plan is developed to specifically counter the aims of the insurgent. This examination then leads to some basic operational concepts of counter-guerrilla warfare. Guerri1las can best be defeated militarily using guerrilla warfare techniques. The major tools are psychological operations and effective use of intelligence assets. Defeating guerrillas will not eliminate an insurgency if the causes which gave rise to it are not addressed and corrected by the government in power."
Naval War College (U.S.)
Dotto, Peter A.
1991-06-21
-
Targeting International Terrorism with the Law of Armed Conflict: An Alternative Strategy
"The Law of Armed and Peacetime Reprisal are reviewed and analyzed relative to their applicability toward using the U.S. Armed Forces against international terrorists. The Law of Armed Conflict (LOAC) is proposed as an alternative to the currently used law enforcement approach. The LOAC provides a viable, more practical alternative to law enforcement for dealing with international terrorism. Legal obligations more often posed against use of the LOAC against international terrorists are analyzed and refuted."
Naval War College (U.S.)
Fengya, Darryl J.
1991-02-11
-
Conflict with Libya: Use of Military Force against Terrorism
"The United States attack on Libya on April 15, 1986 was the culmination of a series of developments in U.S. foreign policy and military strategy intended to combat international terrorism. It was the culmination of the U.S. attempt to use both nonmilitary and military methods to combat terrorism. This paper examines the use of military force as an appropriate means to combat terrorism. In particular, the 1986 conflict with Libya is examined concentrating on the following aspects: whether operational level objectives contributed to achievement of strategic goals; and the use of military force as an effective instrument in the war against terrorism. This paper concludes that the use of military force (along with the European nonmilitary responses) was an effective instrument in the war against terrorism as measured by the decrease in Libyan sponsored attacks from 1986 to 1991. However, the U.S. attack on Libya is still an isolated event and does not provide a sufficient basis for a doctrine of military retaliation against terrorism."
Naval War College (U.S.)
Curry, Bruce H.
1994-06-17
-
Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk, Report to Congressional Committees
"Over the past several years, federal agencies have rapidly adopted the use of wireless technologies for their information systems. In a 2005 report, GAO recommended that the Office of Management and Budget (OMB), in its role overseeing governmentwide information security, take several steps to help agencies better secure their wireless networks. GAO was asked to update its prior report by (1) identifying leading practices and state-of-the-art technologies for deploying and monitoring secure wireless networks and (2) assessing agency efforts to secure wireless networks, including their vulnerability to attack. To do so, GAO reviewed publications, guidance, and other documentation and interviewed subject matter experts in wireless security. GAO also analyzed policies and plans and interviewed agency officials on wireless security at 24 major federal agencies and conducted additional detailed testing at these 5 agencies: the Departments of Agriculture, Commerce, Transportation, and Veterans Affairs, and the Social Security Administration. […] GAO is making two recommendations to OMB to enhance governmentwide oversight and four recommendations to the Department of Commerce for additional guidelines related to wireless security. The Department of Commerce concurred with GAO's recommendations. OMB did not provide comments on the report."
United States. Government Accountability Office
2010-11-30
-
Information Security: Federal Deposit Insurance Corporation Needs to Mitigate Control Weaknesses, Report to the Chairman, Federal Deposit Insurance Corporation
"The Federal Deposit Insurance Corporation (FDIC) has a demanding responsibility enforcing banking laws, regulating financial institutions, and protecting depositors. Because of the importance of its work, the corporation must employ strong information security controls to ensure that its information systems are adequately protected from inadvertent misuse, fraud, and improper disclosure. As part of its audit of the 2009 financial statements of the Deposit Insurance Fund and the Federal Savings & Loan Insurance Corporation Resolution Fund administrated by FDIC, GAO assessed (1) the effectiveness of FDIC's controls in protecting the confidentiality, integrity, and availability of its financial systems and information and (2) the progress FDIC has made in mitigating previously reported information security weaknesses. To perform the audit, GAO examined security policies, procedures, reports, and other documents; tested controls over key financial applications; and interviewed key FDIC personnel. […] GAO is recommending that FDIC improve key information activities to enhance the corporation's information security program. FDIC generally agreed with GAO's recommendations and stated that it plans to address the identified weaknesses."
United States. Government Accountability Office
2010-11-30
-
Retraumatization: How One College Campus Responded to Emotional Reinjury
"April 16, 2007 (4/16), is an indelible date in the history of the Virginia Polytechnic Institute and State University (Virginia Tech). On that day, a single student gunman took the lives of 32 individuals on the school's campus in what is the single most deadly shooting incident of its kind in U.S. history. This tragedy affected the university, its small community of Blacksburg, Va., and communities throughout the country and world. The event itself, including response and prevention-mitigation measures, is still being analyzed more than two years later. What continues to endure is the psychological impact and trauma experienced by the individuals working, living and studying at and around Virginia Tech. In the years since the shootings, the psychological and emotional impact of the tragedy continues to be evident as additional events have occurred that have reawakened or amplified the feelings associated with trauma. This Lessons Learned document will discuss the experiences of some members of the Virginia Tech community following the events of 4/16 as they work to rebuild their community despite additional trauma. In addition, this document will provide insights regarding how other colleges, universities or local education agencies can prepare for mitigating the impact of retraumatization following painful or disturbing events."
Readiness and Emergency Management for Schools Technical Assistance Center (U.S.)
2010
-
Responding to Gangs in the School Setting
"Gang members do not leave their conflicts, attitudes, and behaviors outside the school doors. Some of the most dangerous gang activities in any community may take place in and around local schools. Gang members encounter each other at school during class changes, in the lunchroom, in common areas, and during assemblies and school events. Students may loiter on or around the school campus before and after school, and conflicts may occur between rival gangs. In some instances, gang members come to school to engage in criminal behavior (drug dealing) or to confront rivals. Because of the potential for violent gang interactions at school, school staff members and administrators need to formulate a plan to deal with gang activity. This article provides an overview of action steps that schools can take to prevent, intervene in, and suppress violent gang activity, as well as crisis response plans that can be developed to address potential acts of school violence including, but not limited to, gang activity."
United States. Bureau of Justice Assistance; United States. Office of Juvenile Justice and Delinquency Prevention
Arciaga, Michelle; Sakamoto, Wayne; Jones, Errika Fearbry
2010-11
-
Business of War: How Criminal Organizations Perpetuate Conflict and What to Do about It
"It is now a mantra that building local institutions is essential to winning the counterinsurgency (COIN) fight. The host nation must exercise sovereignty and provide necessary security and services to its citizens. However, institution building requires more than a focus on governance and capacity development programs. The criminal structures that commonly arise during war economies inhibit the proper growth of state institutions, limiting the state's ability to defeat insurgencies. The military should provide support for law enforcement activities that attack such organizations and tip the balance in favor of honest officials and more productive institutional development."
U.S. Army Combined Arms Center
Dahl, Brock
2009-03
-
Comprehensive Data Management System
"The CDMS [Comprehensive Data Management System] is a complimentary tool to HAZUS-MH that provides users with the capability to update and manage statewide datasets, which are currently used to support analysis in HAZUS-MH. The CDMS will function as a single user or shared desktop application. Click here to view larger graphic. Currently, HAZUS-MH users are required to undertake a large amount of manual effort to incorporate new data into the statewide datasets according to their predefined formats. To reduce this effort, the CDMS will streamline and automate raw data processing, the conversion of external data sources into HAZUS-MH compliant data, and the transfer of data into and out of the statewide datasets. Processing site-specific level and aggregate information at the census block and tract levels will be supported. All new data brought into the system will be validated. Once data are imported into the statewide datasets, the CDMS will allow users to query, sort, export and print information. A backwards compatibility utility will be in place for upgrading previous versions of HAZUS-MH databases. The CDMS will replace the Building Information Tool (BIT) and Inventory Collection and Survey Tool (InCAST) that are currently available on HAZUS-MH DVD."
United States. Federal Emergency Management Agency
2009-09-28
-
Comprehensive Data Management System (CDMS) Version 2.6
"This record holds the executable set-up file for the Comprehensive Data Management System (CDMS) 2.6. The associated files include installation instructions, a data dictionary, and release notes. New features in CDMS Version 2.6 include: Operation only with Hazus-MH MR5, operation on Windows XP SP3 and Windows 7 32-bit, operation with ArcGIS 9.3.1 SP1, correction of issues importing data into the CDMS repository from a Hazus study region, and correction of issues importing datasets larger than 200,000 records (1GB)."
United States. Federal Emergency Management Agency
2010-12
-
Bureau of Alcohol, Tobacco, Firearms and Explosives Annual Financial Statements Fiscal Year 2010
"This audit report contains the Annual Financial Statements of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) for the fiscal years (FY) ended September 30, 2010, and September 30, 2009. Under the direction of the Office of the Inspector General (OIG), Cotton & Company LLP performed the audit in accordance with U.S. generally accepted auditing standards. The audit resulted in an unqualified opinion on the FY 2010 financial statements. An unqualified opinion means that the financial statements present fairly, in all material respects, the financial position and the results of the entity's operations in conformity with U.S. generally accepted accounting principles."
United States. Department of Justice. Office of the Inspector General
2011-01
-
Executive Order -- Export Coordination Enforcement Center [November 9, 2010]
This November 9, 2010 White House press release provides information on President Obama's executive order to establish an Export Coordination Enforcement Center to "advance United States foreign policy and protect the national and economic security of the United States through strengthened and coordinated enforcement of United States export control laws and enhanced intelligence exchange in support of such enforcement efforts."
United States. Office of the White House Press Secretary
2010-11-09
-
Chief of Mission Authority as a Model for National Security Integration
"The inability of the President of the United States to delegate executive authority for integrating the efforts of departments and agencies on priority missions is a major shortcoming in the way the national security system of the U.S. Government functions. Statutorily assigned missions combined with organizational cultures create 'stovepipes' that militate against integrated operations. This obstacle to 'unity of effort' has received great attention since 9/11 but continues to adversely affect government operations in an era of increasingly multidisciplinary challenges, from counterproliferation to counterinsurgency in Afghanistan. Presidents have tried various approaches to solving the problem: National Security Council committees, 'lead agencies,' and 'czars,' but none have proven effective. Yet one precedent of a relatively successful cross-agency executive authority does exist: the Chief of Mission authority delegated to U.S. resident Ambassadors. The Congress and White House could build on this precedent to provide the President greater ability to manage complex national security problems while strengthening congressional oversight of such missions. Specifically, this paper makes a case in favor of legislation that gives the President authority to delegate his integration powers to 'Mission Managers.' Congress would need to provide resources to empower mission accomplishment, and the President would need to ensure that the Mission Manager's authority is used properly and respected by the heads of departments and agencies. This paper argues that while such reform is politically challenging, there are no insuperable legal or organizational obstacles to such reform."
National Defense University. Institute for National Strategic Studies
Marks, Edward, 1934-
2010-12
-
FBI en Español [website] [Spanish]
"Aquí se ofrece información básica sobre cómo contactar al FBI [Federal Bureau of Investigation] y sobre el tipo de delitos que investiga. También se pueden leer artículos sobre cómo protegerse contra el fraude, qué hacer ante un delito y cómo mantenerse seguro."
"Here you will find basic information about how to contact the FBI [Federal Bureau of Investigation] and about the types of crimes it investigates. You can also read articles on how to protect yourself against fraud, how to cope with crime, and how to stay safe. "
United States. Federal Bureau of Investigation
-
DHS Achieves Major Aviation Security Milestone One Month Ahead of Schedule [November 30, 2010]
"Department of Homeland Security (DHS) Secretary Janet Napolitano today announced that 100 percent of passengers on flights within or bound for the United States are now being checked against government watchlists - fulfilling a key 9/11 Commission recommendation a month ahead of schedule. The TSA reached 100 percent watch list matching for all domestic airlines on June 22. Under Secure Flight, the Transportation Security Administration (TSA) prescreens passenger name, date of birth and gender against terrorist watchlists before passengers receive their boarding passes. In addition to facilitating secure travel for all passengers, the program helps prevent the misidentification of passengers who have names similar to individuals on government watchlists. Prior to Secure Flight, airlines held responsibility for checking passengers against watchlists. 'Each and every one of the security measures we implement serves an important goal: providing safe and efficient air travel for the millions of people who rely on our aviation system every day,' said Secretary Napolitano. 'Secure Flight makes air travel safer for everyone by screening every passenger against the latest intelligence before a boarding pass is issued.'"
United States. Department of Homeland Security. Press Office
2010-11-30