Notes: ADJ 243 Homeland Security and the Law: Notes 1 |
|||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Home Page // Assignments Page // Notes 1 // Notes 2 // Notes 3 // Notes 4 // Exam Page // Books // Paper // Articles |
|||||||||||||||||||||||
Date: | Notes: | Grade: | |||||||||||||||||||||
Notes from class: | Beginning for Test One
Customs and Border Protection building located in the Ronald Regan Building
Around 500,000 cars ruined from Hurrican Harvey
The term state is not a U.S. state but rather an entity or person.
French Revolution included the creation of the Committee of Public Safety that had great power making it the defacto ruler of the country-- the Reign of Terror. Basically you were tortured or killed if you were a counter revolutionary.
Watch You Tube videos of bombing of Germany in WW1 and WW2.
A bill is draft legislation
In the late 1800s cadets at West Point had to learn Greek and Latin because those that languages were used a lot in law.
After the Civil War, the North took over the South (homes, etc.) for about 14 years while reconstruction was going on.
The Spanish Civil War was in the 1930s.
The movie Road to 9-11 is a PBS movie that explains the timeline leading up to the attack.
The firebombing of Tokyo -- 1945.
The firebombing of Dresden and Germany at that time in history.
the 1996 Khobar Towers Bombing in Saudi Arabia-- killed 19 airmen.
1998 US Embassy Bombings Kenya And Tanzania.
Osama bin Laden, nationality of Saudi Arabia, was born into a family of billionaires. He was left handed. Releasing Osama Bin Laden's Porn Stash: The Public's Heroic Battle with the CIA Continues. For years, Bin Laden evaded a global manhunt by the world's most sophisticated intelligence agencies by giving off as few electronic signals as possible. He communicated with the outside world through documents on flash drives supplied to couriers and transmitted through internet cafes. He stayed away from phones, air-gapped his computers and did not use the internet. Isil and al-Qaeda 'using porn to hide secret messages to followers' His father and brother were killed by Americans accidently.
A caliphate (Arabic: خِلافة khilāfa) is a territory under the leadership of an Islamic steward known as a caliph (/ˈkælɪf, ˈkeɪ-/, Arabic: خَليفة khalīfah, About this sound pronunciation (help·info)), a person considered a religious successor to the Islamic prophet Muhammad (Muhammad ibn ʿAbdullāh) and a leader of the entire Muslim community.
A fatwā (Arabic: فتوى; plural fatāwā Arabic: فتاوى) in the Islamic faith is a nonbinding but authoritative legal opinion or learned interpretation that the Sheikhul Islam, a qualified jurist or mufti, can give on issues pertaining to the Islamic law. One was written declaring war on the U.S.
There have been a lot of terror attacks since 9/11 -- 10,000 +
At the time the World Trade Center was knocked down, they were the tallest buildings in the world. Around 50k workers worked in the buildings and it only took 90 minutes to collapse.
The hijackers in the September 11 attacks were 19 men affiliated with al-Qaeda. Fifteen of the 19 were citizens of Saudi Arabia, and the others were from the United Arab Emirates (2), Egypt, and Lebanon.
Hijackers
The National Commission on Terrorism, also known as the Bremer Commission, "Countering The Changing Threat of International Terrorism", Pursuant to Public Law 277, 105th Congress, was published June 2000. Ambassador L. Paul Bremer III served as Chairman, and Maurice Sonnenberg served as Vice Chairman.
FDIN Federal Drug Interdiction Number: Each employee wants to attach their items with a FDIN Federal Drug Interdiction Number to take credit for drug seizures and to meet the standards: to keep job
Executive Order is not law but an order by the president that has the enforcement of law.
A memorandum of understanding (MoU) is an agreement between two (bilateral) or more (multilateral) parties.
The Congress created the homeland secuity act and Bush signed it into law.
When the reorganization happened, most of the resources were moved around while the actual DHS need a space.
The location of DHS is the NAC ( Nebraska Avenue Complex)
U.S. Code: Title 18 - CRIMES AND CRIMINAL PROCEDURE
U.S. Code: Title 19 - CUSTOMS DUTIES
ICE (immigration and customs enforcement) is the second largest agency of HMS after the FBI.
CIS (citizens and immigration services) are in charge of: criminal investigations, detention and removal. and immagration court lawyers)
The Treasury Office lost all of its enforcement after DHS was created.
A treaty is an agreement between two nations.
Western Hemisphere Travel Initiative (WHTI) is a United States legal framework from 2007 that requires all travelers to show a valid passport or other approved secure document when traveling to the U.S. from areas within the Western Hemisphere. The police use of automatic license plate readers, photographing hundreds of license plates per minute and capturing the exact time and place of the photo, has become routine in law enforcement and is credited with helping to solve all manner of crimes, find missing persons and locate stolen autos.Automatic number-plate recognition (ANPR; see also other names below) is a technology that uses optical character recognition on images to read vehicle registration plates. It can use existing closed-circuit television, road-rule enforcement cameras, or cameras specifically designed for the task. Virginia | Court case (A motion for summary judgment pursuant to Rule 3:20 grants trial court judges the authority to end litigation at an early stage in such cases where no material fact is genuinely in dispute.)
The EyeSee mannequin from Italy's Almax SpA is being used with facial-recognition software that can identify the age, race, and gender of shoppers and record how long they spend around a display. Almax says the technology doesn't violate shoppers' privacy. |
||||||||||||||||||||||
Chapter 1 | September 10, 2017
Chpt One |
Digital History of Terrorism: The word "terrorism" comes from the French Revolution and the "Reign of Terror," when terror was used as an instrument of state policy. Terrorism is directed primarily against governments that allow a free press and that are responsive to public opinion. Terrorism has allowed small groups to exert an influence disproportion to their size.-- Go to links page at week 16
Definition of Terrorism: The Guardian
Japan's Unit 731 used Vivisection (from Latin vivus, meaning 'alive', and sectio, meaning 'cutting') is surgery conducted for experimental purposes on a living organism, typically animals with a central nervous system, to view living internal structure.
Unit 731 (Japanese: 731部隊 Hepburn: Nana-san-ichi Butai) was a covert biological and chemical warfare research and development unit of the Imperial Japanese Army that undertook lethal human experimentation during the Second Sino-Japanese War (1937–1945) of World War II. It was responsible for some of the most notorious war crimes carried out by Japan.
Chinese and Russians were the ones mostly killed.
During World War II Japan "bombed" China with fleas infected with Bubonic plague
Churchhill's "The Sinews of Peace" | Truman's Sectretary of State's Keenan's letter to Gen. George C. Marshalls.-- Both of these commuications are about the chilling reference to the upcoming cold war.
President Truman's diary in 1947
The Weathermen Underground: PBS-- Initially formed as a splinter group which believed that peaceful protests were ineffective, the Weathermen were widely criticized for their use of violence as a means of social and political change. Some accused the group of terrorism, while others accused it of giving all activists, both militant and more mainstream, a bad name.
In 1960, nearly 50 percent of America's population was under 18 years of age. This surplus of youth set the stage for a widespread revolt against the status quo.
Christian cross lighting ceremony--KKK
A caliphate (Arabic: خِلافة khilāfa) is a territory under the leadership of an Islamic steward known as a caliph (/ˈkælɪf, ˈkeɪ-/, Arabic: خَليفة khalīfah,
--------------------------------------------------------
Theodore John Kaczynski (/kəˈzɪnski/; born May 22, 1942), also known as the Unabomber, is an American mathematician, anarchist and domestic terrorist.
From late 1959 to early 1962, Murray was responsible for what have become ethically indefensible experiments, in which he used twenty-two undergraduates as research subjects. Among other purposes, experiments focused on measuring people's reactions under extreme stress. The unwitting undergraduates were submitted to what Murray called "vehement, sweeping and personally abusive" attacks. Assaults to their egos, cherished ideas and beliefs were used to cause high levels of stress and distress. Among them was 17-year-old Ted Kaczynski.
The Nanking Massacre was an episode of mass murder and mass rape committed by Japanese troops against the residents of Nanjing (Nanking), then the capital of the Republic of China, during the Second Sino-Japanese War. |
|||||||||||||||||||||
Week 2 | September 10, 2017 | Department of Homeland Security -- PDF
On September 20, 2001, Bush announced the creation of Homeland Security Office. Tom Ridge was the first director.
Photos of 19 suspects released by FBI on September 27
National Disaster Medical System: When disaster strikes, people need health professionals they can count on to protect health and augment healthcare systems to stabilize patients and save lives. Dispatched for the first time during this incident.
Proclamation 7463—Declaration of National Emergency by Reason of Certain Terrorist Attacks
The Homeland Security Act (HSA) of 2002, (Pub.L. 107–296, 116 Stat. 2135, enacted November 25, 2002) was introduced in the aftermath of the September 11 attacks and subsequent mailings of anthrax spores.The HSA was cosponsored by 118 members of Congress.It was signed into law by President George W. Bush in November 2002.
Title 6 of the United States Code governs Domestic Security in the United States Code. Title 6 — Domestic SecurityTitle 6 has five chapters:
Organizational Chart DHS | PDF
Complete text of Homeland Security Act 2002 | PDF
The National Cyber Security Center is now a part of the D
Jobs at DHS
Cyber Storm, the Department of Homeland Security's (DHS) biennial exercise series, provides the framework for the most extensive government-sponsored cybersecurity exercise of its kind. Congress mandated the Cyber Storm exercise series to strengthen cyber preparedness in the public and private sectors. Securing cyber space is the DHS Office of Cybersecurity and Communications' top priority.
The Office of University Programs streamlines access to the expertise of the nation's colleges and universities to address pressing homeland security needs.
Centers of Excellence: DHS Selects George Mason University for Criminal Investigations and Network Analysis Center of Excellence--Release Date: August 2, 2017-- George Mason--
From the Homeland Security Act of 2002: "The Secretary, acting through the Under Secretary for Science and Technology, shall establish … a university-based center or centers for homeland security. The purpose of this center or centers shall be to establish a coordinated, university-based system to enhance the nation's homeland security."
Emblem and Flag
DHS encourages that fisheries meet standards in order to be eco-friendly.
The United States have 95, 000 miles of coastline and close to 360 ports of entry.
Over the last two decades, the Secret Service's statutory authorities have been reinforced to include access device fraud (18 USC §1029), which includes credit and debit card fraud, computer fraud (18 USC §1030)
Department of Homeland Security Official Website
This is an example of a report that occured in 2013 in Cartagena, Columbia where some of the secret service agents were drunk and with protitutes while preparing for the arrival of Obama. | Reading Room
Federal Law Enforcement Training Center: The Glynco center is actually a town unto itself with its own zip code (31524) and is located on the northwestern edge of Brunswick, GA. TA training facility-- Training catalog
The Terrorist Screening Database or TSDB is the central terrorist watchlist consolidated by the FBI's Terrorist Screening Center and used by multiple agencies to compile their specific watchlists and for screening. Approximately one out of twenty of the people on the list are U.S. citizens or legal permanent residents.
The Computer-Assisted Passenger Prescreening System (often abbreviated CAPPS) is a counter-terrorism system in place in the United States air travel industry. The United States Transportation Security Administration (TSA) maintains a watchlist, pursuant to 49 USC § 114 (h)(2),[1] of "individuals known to pose, or suspected of posing, a risk of air piracy or terrorism or a threat to airline or passenger safety." The list is used to pre-emptively identify terrorists attempting to buy airline tickets or board aircraft traveling in the United States, and to mitigate perceived threats.
CAPPS systems rely on what is known as a passenger name record (PNR). When a person books a plane ticket, certain identifying information is collected by the airline: full name, address, etc. This information is used to check against some data store (e.g., a TSA No-Fly list, the FBI ten most wanted fugitive list, etc.) and assign a terrorism "risk score" to that person. High risk scores require the airline to subject the person to extended baggage and/or personal screening, and to contact law enforcement if necessary.
USNORTHCOM was created on 25 April 2002 when President George W. Bush approved a new Unified Command Plan, following the September 11 attacks. USNORTHCOM went operational on 1 October 2002. United States Northern Command (USNORTHCOM) is a Unified Combatant Command of the U.S. military tasked with providing military support for civil authorities in the U.S., and protecting the territory and national interests of the United States within the contiguous United States, Alaska (not Hawaii), Puerto Rico, Canada, Mexico, The Bahamas, and the air, land and sea approaches to these areas. It is the U.S. military command which, if applicable, would be the primary defender against a mainland invasion of the United States.
National Technical Investigators
|
|||||||||||||||||||||
Week 3 | Promulgate or promulgation: To publish, announce to the public.
The current Homeland Security Advisor is Tom Bossert who holds the rank of Assistant to the President for Homeland Security and Counterterrorism.
Executive Order 13228 is the origin of DHS — October 11, 2001 (October 8, 2001) -- Establishing the Office of Homeland Security and the Homeland Security Council
Executive Order 13231 of October 16, 2001 Critical Infrastructure Protection in the Information Age By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to ensure protection of information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems, in the information age, it is hereby ordered as follows:
Executive Order 13493 is an Executive Order issued by United States President Barack Obama ordering the identification of lawful alternatives to the detention of captives in the Guantanamo Bay detention camps, in Cuba.[1] The full title of the order is Executive Order 13493 - Review of Detention Policy Options. In his previous order, Executive Order 13492, Obama had ordered the camps' closure within a year, but Guantanamo Bay detention camp has still yet to be closed. As of January 2017, 45 detainees remain at Guantanamo.
The camp was established by the President George W. Bush's administration in 2002 during the War on Terror.
The Guantanamo Bay detention camp is a United States military prison located within Guantanamo Bay Naval Base, also referred to as Guantánamo or GTMO (/ˈɡɪtmoʊ/), which fronts on Guantánamo Bay in Cuba. Since the inmates have been detained indefinitely without trial and several inmates were severely tortured, this camp is considered as a major breach of human rights by Amnesty International. On 11 February 2008, The U.S. Military charged Khalid Sheikh Mohammed, Ramzi Bin Al-Shibh, Mustafa Ahmad Al-Hawsawi, Ali Abd Al-Aziz Ali and Walid Bin Attash of committing the September 11 attacks under the military commission system, as established under the Military Commissions Act of 2006 (MCA). In Boumediene v. Bush (2008), the U.S. Supreme Court ruled that the MCA was unconstitutional.
President Barack Obama signed Executive Order 13567 on March 7, 2011.Its purpose was to establish: "Periodic Review of Individuals Detained at Guantánamo Bay Naval Station Pursuant to the Authorization for Use of Military Force."
Of the 693 total former detainees transferred out of Guantanamo, 30% are suspected or confirmed to have reengaged in terrorist activity.Of those detainees that were transferred out under President Obama, 5.6% are confirmed and 6.8% are suspected of reengaging in terrorist activity.
Obama changed his views to close Guantanamo Detention Camp but instead ordered periodic reviews.
The Posse Comitatus Act is a United States federal law (18 U.S.C. § 1385, original at 20 Stat. 152) signed on June 18, 1878 by President Rutherford B. Hayes. The purpose of the act – in concert with the Insurrection Act of 1807 – is to limit the powers of the federal government in using federal military personnel to enforce domestic policies within the United States. It was passed as an amendment to an army appropriation bill following the end of Reconstruction, and was subsequently updated in 1956 and 1981.
Northcom--Per the Posse Comitatus Act, military forces can provide civil support, but cannot become directly involved in law enforcement. United States Northern Command (USNORTHCOM) is a Unified Combatant Command of the U.S. military tasked with providing military support for civil authorities in the U.S., and protecting the territory and national interests of the United States within the contiguous United States, Alaska (not Hawaii), Puerto Rico, Canada, Mexico, The Bahamas, and the air, land and sea approaches to these areas. It is the U.S. military command which, if applicable, would be the primary defender against a mainland invasion of the United States.
Patriot Act--H.R. 3199 (109th): USA PATRIOT Improvement and Reauthorization Act of 2005--it amended several items.
The USA Freedom Act (H.R. 2048, Pub.L. 114–23) is a U.S. law enacted on June 2, 2015 that restored in modified form several provisions of the Patriot Act, which had expired the day before.
Ten-letter backronym (USA FREEDOM) that stood for Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring Act.
Full Text of the USA Freedom Act.
Edward Snowden: Timeline
REAL ID The Department of Homeland Security (DHS) announced on December 20, 2013 a phased enforcement plan for the REAL ID Act (the Act), as passed by Congress, that will implement the Act in a measured, fair, and responsible way.
Immigration Website (map below)
The Office of Biometric Identity Management (OBIM) supports the Department of Homeland Security's responsibility to protect the nation by providing biometric identification services that help federal, state, and local government decision makers accurately identify the people they encounter and determine whether those people pose a risk to the United States. OBIM supplies the technology for collecting and storing biometric data, provides analysis, updates its watchlist, and ensures the integrity of the data.
OBIM was created in March, 2013, replacing the United States Visitor and Immigration Status Indicator Technology (US-VISIT) Program. OBIM is part of the National Protection and Programs Directorate.\
The Office of Biometric Identity Management 's (OBIM), formerly US-VISIT
Automated Biometric Identification System or IDENT, is operated and maintained by OBIM. IDENT currently holds more than 200 million unique identities and processes more than 300,000 biometric transactions per day.
Department of State consular officers and U.S. Customs a nd Border Protection (CBP) officers have been collecting biometrics—two digital fingerprints and a photograph—from all non-U.S. citizens between the ages of 14 and 79, with some exceptions , when they apply for visas or arrive at U.S. ports of entry .
European Dactyloscopy (EuroDac) is the European Union (EU) fingerprint database for identifying asylum seekers and irregular border-crossers. Asylum applicants and irregular border-crossers over the age of 14 have their fingerprints taken as a matter of European Community law.
The United Arab Emirates use iris scanners at part of their border and immigration control.
US-VISIT_Updated_Entry_StepxStep--Visuals to show how to fingerprint.
Chemical structures are constructed and are infrastructure.
Chemical Facility Anti-Terrorism Standards (CFATS) Risk-Based Performance Standards (RBPS)
The SAFETY Act provides important legal liability protections for providers of Qualified Anti-Terrorism Technologies - whether they are products or services. The goal of the SAFETY Act is to encourage the development and deployment of effective anti-terrorism products and services by providing liability protections. Approved Technologies List
The Integrated Deepwater System Program (IDS Program or Deepwater) was the 25-year program to replace all or much of the United States Coast Guard's equipment, including aircraft, ships, and logistics and command and control systems. The $24 billion program (which began with a price tag of $17 billion) lost authorization in Fiscal Year 2012 and is officially defunct.
Since July 13, 2007, Deepwater became part of the newly created Acquisition Directorate (CG-93).
CDC's Strategic National Stockpile is the nation's largest supply of potentially life-saving pharmaceuticals and medical supplies for use in a public health emergency severe enough to cause local supplies to run out.
Fort Detrick is located in Fredrick Maryland area.
The National Biodefense Analysis and Countermeasures Center (NBACC) is a one-of-a-kind facility dedicated to defending the nation against biological threats.
National Terrorism Advisory System (NTAS)--both logos below-- Look down on this page to see current advisories.
U.S. Citizenship and Immigration Services: Form Search
CSI: Container Security Initiative: CSI addresses the threat to border security and global trade posed by the potential for terrorist use of a maritime container to deliver a weapon.
The three core elements of CSI are:
Advanced Radiation Monitoring DeviceThe Department of Homeland Security's (DHS) Domestic Nuclear Detection Office (DNDO) is exploring new technologies for Spectroscopic Personal Radiation Detectors (SPRD) that can better detect, identify, and locate radiological or nuclear sources.
NTC: National Targeting Center located in Reston, Virginia.
230,000 employees in Department of Homeland Security.
Silicon Valley and Privacy | Definition of Terrorism
The White House National Security Council (NSC) is the principal forum used by the president of the United States for consideration of national security and foreign policy matters with senior national security advisors and Cabinet officials and is part of the executive office of the president of the United States.
The Code of Federal Regulations (CFR) is the codification of the general and permanent rules and regulations (sometimes called administrative law) published in the Federal Register by the executive departments and agencies of the federal government of the United States.
Electronic Code of Federal Regulations
Extradition law in the United States is the formal process by which a fugitive found in the United States is surrendered to another country or state for trial or punishment.
International extradition: Federal Criminal Code and Rules. Some countries DO NOT have treaties with the U.S.
Western Hemisphere Travel Initiative (WHTI) is a United States legal framework from 2007 that requires all travelers to show a valid passport or other approved secure document when traveling to the U.S. from areas within the Western Hemisphere.
The Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) is a 235-page Act of Congress, signed by President George W. Bush, that broadly affects United States federal terrorism laws: The act is formally divided into eight titles:
In 2005 the National Incident Management System (NIMS) was created to provide a program for all critical infrastructures and to provide facilities with a plan of action to protect and prevent attacks.
In September 2004, the Department of Homeland Security (DHS) established America's Shield Initiative (ASI)--a program that included a system of sensors, cameras, and databases formerly known as the Integrated Surveillance Intelligence System (ISIS). It was replaced by program below.
Project 28 is the name given to a U.S. border protection program that runs along a 28-mile (45 km) stretch of the US/Mexican border in southern Arizona.The four primary components of the system are the sensor towers, the P28 "Common Operating Picture" (COP), enhanced communications, and upgraded agent vehicles which include a laptop computer and a satellite phone. The project also incorporates unattended ground sensors that will detect intrusions via magnetic, seismic and acoustic sensors and transmit information that will be distributed via the COP. SBInet was a program initiated in 2006 for a new integrated system of personnel, infrastructure, technology, and rapid response to secure the northern and southern land borders of the United States. DHS announced the program's cancellation on Jan. 14, 2011.
SAFECOM was formed in 2001 after the terrorist attacks of September 11, 2001 as part of the Presidential E-Government Initiative to improve public safety interoperability, allowing emergency responders to communicate effectively before, during, and after emergencies and disasters.
The Emergency Alert System (EAS) is a national warning system in the United States. Testing to ensure the media can comply with needed information in case of an emergency is questionable because there is virtually no oversight and each station has different motivation to make sure the system will work: Furthermore, in a partial test of the national system, conducted in January 2007, 3 of the 33 available primary relay stations failed to effectively relay the test message.
The Cargo Advanced Automated Radiography System (CAARS), an initiative also funded by the DHS/DNDO. CAARS uses dual-energy X-rays and is designed to automatically detect shielded high-density materials, such as special nuclear materials hidden in trucks and shipping containers.
The Joint Intelligence Operations Center Europe (JIOCEUR) Analytic Center (JAC), is a Joint Intelligence Center serving as a military intelligence analysis centre for the United States European Command located at RAF Molesworth, Cambridgeshire, United Kingdom and managed by the Defense Intelligence Agency. The area of responsibility includes over 50 countries in Europe, 33 Sub-Saharan and West African countries, and the Middle East.
The Department of Homeland Security (DHS) continues to strengthen security at the Nation's high-risk chemical facilities through the Chemical Facility Anti-Terrorism Standards (CFATS) program. The Chemical Facility Anti-Terrorism Standards (CFATS) is a risk-based regulatory program that sets the standards for security at the Nation's high-risk chemical facilities. Personnel surety, the vetting of facility personnel and unescorted visitors who have or are seeking access to restricted areas and critical assets at high-risk chemical facilities, is a key aspect of chemical facility security.
Advanced Spectroscopic Portal (ASP)
Data gathered on containers bound for the United States in foreign ports participating in the Secure Freight Initiative is transmitted in near real-time to U.S. Customs and Border Protection (CBP) officers working in overseas ports and to the Department's National Targeting Center. This data is combined with other available risk assessment information such as currently required manifest submissions, to improve risk analysis, targeting and scrutiny of high-risk containers overseas.
E-Verify: U.S. law requires companies to employ only individuals who may legally work in the United States – either U.S. citizens, or foreign citizens who have the necessary authorization. This diverse workforce contributes greatly to the vibrancy and strength of our economy, but that same strength also attracts unauthorized employment.
Behavioral Detection Teams: These officers look for behaviors that are anomalous to the environmental baseline (defined as typical behaviors that would be expected at the time and place), and that may signal a need for further screening. BDOs look for verbal and nonverbal behaviors associated with a fear of discovery, as well as behaviors related to the stress or anxiety that comes with the execution of a terrorist attack. Additionally, BDOs look for behaviors that are associated with concealment (physical items or knowledge) that could be used in an impending terrorist attack.
A Visible Intermodal Prevention and Response team (VIPR) and is a Transportation Security Administration program. Various government sources have differing descriptions of VIPR's exact mission.T he program is to "augment the security of any mode of transportation at any location within the United States"
EINSTEIN 3: In 2010, DHS began planning for the design and development of an intrusion prevention capability (previously referred to as EINSTEIN 3) to identify and block cyber attacks. This new system would use classified signatures to protect government networks. As noted, using classified indicators allows DHS to detect and block many of the most significant cyber attacks. The E3A program also serves as a platform to aggregate federal civilian executive branch traffic so that DHS can implement new and advanced protections. In other words, by putting all federal government traffic through a few locations
BioWatch and Public Health Surveillance: Evaluating Systems for the Early Detection of Biological Threats--Since 2009, GAO has reported on progress and challenges with two of the Department of Homeland Security's (DHS) biosurveillance efforts—the National Biosurveillance Integration Center (NBIC) and the BioWatch program (designed to provide early detection of an aerosolized biological attack).
Members of Global Entry may use TSA PreCheck on all participating airlines by entering their Customs and Border Protection ID number from their Global Entry card into their flight reservation information or into their frequent flyer account under "Known Traveler Number" (KTN).
The budget for 2014 for DHS ran arouund $60 billion dollars.
National Bio and Agro-Defense Facility: The United States needs to be on the front line of livestock animal health research to defend against foreign animal, emerging, and zoonotic diseases. The National Bio and Agro-Defense Facility (NBAF) is envisioned as a state-of-the-art biosafety level (BSL) 3 and 4 facility that will enable the United States to conduct comprehensive research, develop vaccines and antivirals, and provide enhanced diagnostic capabilities to protect our country from numerous foreign animal and emerging diseases.
Located in Manhattan, KS
The DHS uses the Beechcraft Super King Air which is a mult-air enforcement aircraft.
The Tethered Aerostat Radar System (TARS)[1] is an American low-level airborne ground surveillance system that uses aerostats (moored balloons) as radar platforms. This ballon is used for counter-narcotics, air surveillance, and US air missions. One can be found in Fort Huachuca, Arizona. CBP took control of this craft in 2014.
Mobile Passport Control (MPC) allows U.S. citizens and Canadian visitors to use the Mobile Passport app to expedite their entry process into the United States.
H.R.2217 - Department of Homeland Security Appropriations Act, 2014
TSA were found selling pictures of full body scans.
Organizational Chart of DHS
|
||||||||||||||||||||||
|
|||||||||||||||||||||||
|
|||||||||||||||||||||||
Date started: Date completed: |
|||||||||||||||||||||||
Notes About Class:
|