Applied Coursework. Technology for Homeland Security Course Paper. Author: David Heller Cohort 0801/0802. Lead Instructor: Richard Bergin

Size: px
Start display at page:

Download "Applied Coursework. Technology for Homeland Security Course Paper. Author: David Heller Cohort 0801/0802. Lead Instructor: Richard Bergin"

Transcription

1 Applied Coursework Technology for Homeland Security Course Paper Author: David Heller Cohort 0801/0802 Lead Instructor: Richard Bergin The Nation s Homeland Security Educator Learn more about the CHDS Master s Degree Program: Website: chdsmaap@nps.edu Phone:

2 Naval Postgraduate School Technology for Homeland Security COHORT 802:IS4010 David E. Heller Research Paper: Leveraging Technology to Track State, Local & Tribal Domestic Terrorism Subjects (3.2.1) Information sharing and collaboration capabilities to enable effective prevention, protection, response, and recovery activities: The Federal Bureau of Investigation s (FBI) mission is to protect and defend the United States against terrorism, foreign intelligence threats, and to uphold and enforce the criminal laws of the United States. In combating Domestic Terrorism (DT), however, the United States has not implemented an adequate process to designate DT groups or individuals or to track and share information concerning those individuals. This failure to define such a process may have a deleterious affect of law enforcement impinging on the First Amendment Rights of our citizens: The Right of Free Speech, Free Exercise of Religion, and Right of Assembly. Defending the United States from terrorism and protecting our citizen s Constitutional Rights are not mutually exclusive. To the contrary, by properly defining the process of designating a DT group or individual and a universal system to share information, law enforcement will be able to avoid a Hobson s Choice of impinging upon First Amendment Rights so as to defend the nation against another Oklahoma City bombing. The FBI has the unique responsibility for identifying and investigating DT within the United States. The FBI s role in investigating DT has been defined within numerous government Presidential Directives and legislative actions. States have also developed laws and legislation providing for local law enforcement to take action against DT

3 activities within its own jurisdictions. In September of 2003, President Bush signed Homeland Security Presidential Directive (HSPD) 6 which directed the Attorney General to establish a process to consolidate the Government's approach to terrorism screening and provide for the appropriate and lawful use of Terrorist Information in a screening process. This directive led to the so named Watch List which is primarily used for affecting suspected terrorists travel. A second list, known as the Violent Gang/Terrorist Organization File (VGTOF), was established to track and identify gang members and terrorists. To date, these lists are the only repositories for the FBI and limited federal government entities to externally publish or identify DT subjects. To date there is no system/process for the tracking of state, local or tribal DT subjects. For the purpose of moving forward the FBI should accept there is significant ambiguity between the defining laws and regulations which address DT investigations and intelligence collection across the nation. This type of investigative diversity traditionally does not lend itself as an efficient process for connecting the dots. Conversely, the collection and retention of intelligence, when U.S. citizens are the target, promulgate significant First Amendment legal challenges further emphasizing the need for uniformity throughout the nation. Although this process has not yet failed catastrophically, the FBI should recognize the vulnerabilities and not wait for failure. Therefore, the FBI should leverage current technology combined with state, local and tribal policies and procedures for the purpose of information sharing, collaboration and full visibility of DT subjects across the nation. The Law Enforcement National Data Exchange (N-DEx) is a viable information technology system currently being deployed by the FBI which could be leveraged as a

4 platform for national information sharing concerning all DT subjects and investigations. The N-DEx information sharing platform houses law enforcement data with specific standardized elements. These data elements will be capable of capturing information which may be utilized to track DT adherents. When N-DEx reaches maturity, over the next three years, it will provide unprecedented accessibility to information across all local, state, tribal and federal agencies as depicted by the diagram below. Inciident/Case Reports Warrants Arrests FBI CJIS Local/ State/ Federal/ Tribal/Regional Systems N-DEx NCIC II IAFIS DOJ Data OneDOJ 18,000 LE Agencies 3,200 SO Agencies 50 State DOC Although N-DEx was not developed for the purpose of tracking DT adherents, this research paper suggests, after a detailed study of the system and technology, N-DEx has the capabilities to do so. By leveraging the N-DEx platform the FBI can continue to enhance the terrorism screening process as detailed within HSPD 6.

5 Curre nt Technologies The criteria for information sharing within the law enforcement community are broken down in two primary areas; secure networks and trusted partners. Prior to the development of the internet, data transfer/streams between law enforcement agencies were usually accomplished by hard copy paper files, computer media such as floppy disks, or point to point telecommunication lines. Accountability and audit trail requirements imposed on investigative products are part of the day-to-day business practices of all law enforcement agencies. Additionally, specific federal regulations govern the manner in which intelligence and investigative data will be stored and maintained by all federal and state government data systems. 1 The available technologies for information sharing are endless. But when the requirements for the sharing and retention of law enforcement data are imposed on a national technology solution the field of available candidates is greatly diminished. There are few trusted network systems currently being used on a national level. These systems include; National Crime Information Center (NCIC), VGTOF, Law Enforcement On-Line (LEO) and N-DEx. The Criminal Justice Information Services (CJIS) complex is located within the State of West Virginia. The complex houses a wide range of technologies that serve the FBI and the criminal justice community. The services they provide consist of the automated fingerprint system, gun background check system and secure communications networks for the law enforcement community (Federal Bureau of Investigation, 2008) C.F.R. part 23 establishes the policies surrounding the retention of information within government databases.

6 The pre-established trusted networks housed at the CJIS complex include NCIC, VGTOF, LEO and N-DEx. The NCIC network was established in 1967 and is a computerized index of criminal justice information. The information is available to criminal justice agencies nationwide. The data housed in NCIC assists authorized users to identify stolen property, locate missing persons and apprehend fugitives. All agencies who are authorized subscribers may add pertinent data directly into NCIC, such as warrants, missing persons, and fugitives. Additionally, NCIC is the gateway into the VGTOF database. But users may not enter suspected terrorists for watch list purposes directly into VGTOF. Only the FBI is authorized to do so. Although various data sets are located within NCIC, it is not a database for storing intelligence. The LEO network is an FBI sponsored secure web based platform providing local, state, tribal and federal law enforcement agencies access to an extensive array of law enforcement databases and additional networks. These include; OneDOJ, N-DEx, National Law Enforcement Telecommunications System (NLETS), the Regional Information Sharing Systems Network (RISSNet), which supports law enforcement users in six regional centers, and various Department of Homeland Security (DHS) law enforcement elements. Currently there are in excess of 100,000 LEO account holders. (Federal Bureau of Investigation, National Information Sharing Strategy, 2008). The OneDOJ system is a federation of regional data systems including the FBI, Bureau of Prisons, Drug Enforcement Administration, Bureau of Alcohol, Tobacco and Firearms, and US Marshals. This system is sponsored by the Department of Justice (DOJ). The system provides the user with limited investigative information based on the

7 contributor s discretion. State and local law enforcement agencies are not authorized to contribute data to this system. The RISSNet and NLETS systems service a wide range of law enforcement agencies. Both receive federal funding but are owned and operated by non-federal organizations. State and local law enforcement agencies are permitted to contribute criminal investigative information directly to these systems. Currently there is not a separate tracking data base within either system. The N-DEx system is designed for use by all local, state, tribal and federal law enforcement agencies. The system permits any agency to contribute, receive and share law enforcement information within a collaborative secure environment. The system does have unique functions which would allow for tracking of a specified target crime type. The FBI is the owner and administrator of the N-DEx system. The FBI s Office of General Council (OGC) was consulted with regard to legal liability and civil liberty issues in utilizing the aforementioned systems for tracking of DT adherents. The OGC s concern was databases used for the retention and collection of possible First Amendment protected activity may be problematic. The fact that the aforementioned systems are owned or under the access control of the FBI may expose the FBI to civil liability issues if the data collected, by the contributing agency, was collected outside the policies set forth by the Attorney General (Ptasienski, 2008).

8 Evaluating Technologies The terrorist watchlist process was thoroughly examined by the U.S. Department of Justice in The report looked at the following objectives: (1) DOJ s processes and standards for nominating individuals to the consolidated watchlist are consistent, are articulated in policy or other guidance, and are understood by nominators; (2) DOJ components have quality control processes to help ensure nominations are accurate, understandable, updated with new information, and include all individuals who should be placed on the watchlist based on information available to the agencies; (3) the responsibility for watchlist nominations is clear, effective, and understood; (4) nominators receive adequate training, guidance, or information on the nominations process; (5) DOJ components maintain records of their nominations, including the source of the nomination and what information was provided; and (6) DOJ organizations with terrorism, counterterrorism, and domestic counterterrorism information in their possession, custody, or control appropriately participate in the nominations process (U.S. Department of Justice of Justice Office of the Inspector General, 2008, page 2). The report evaluated the process but not the actual technology used to enable the process; although the process and technology are not mutually exclusive. Therefore, the technologies were evaluated based on their ability to support the aforementioned process. All of the systems were accessible through NCIC or LEO. Both are considered trusted secure networks. The systems available through these networks have individual aspects of functionality but may not support all the objectives identified by the DOJ report. Currently the most logical candidate would be a VGTOF-like database. The following diagram depicts the FBI s watchlist process: FBI Field Division TREX IT Cases DT Cases National Counterterrorism Center Terrorist Screening Center

9 The FBI currently has a detailed process for nominating an individual for placement into VGTOF. The VGTOF placement automatically places the nominee onto the Terrorism Watchlist, which is housed within the Terrorist Screening Center (TSC). During the nomination process the FBI provides a nomination form to the Terrorist Review and Examination Unit (TREX). The TREX Unit is responsible for reviewing and approving the nomination. International Terrorism nominees are forwarded directly to the National Counterterrorism Center. Domestic Terrorism nominees are sent directly to the TSC. Creating a VGTOF-like database would meet many of the DOJ objectives. The objectives which would come into to question in utilizing this model would be an increased burden of creating, reviewing, vetting, and maintaining a separate database by TSC and CJIS. Additionally, the FBI could not ensure the information was gathered in compliance with the Attorney General Guidelines creating potential violations of civil liberties. The technology deployed in support of N-DEx would provide the necessary attributes to address all of the DOJ objectives. Information could be provided directly into the system by local law enforcement. The data to be uploaded would be provided form local data systems which have already been certified as 28 C.F.R. part 23 compliant. The specific data sets would be in keeping with the National Information Exchange Model (NIEM) standard. This would shift the burden of liability of potential violations of civil liberties away from the FBI and back to the contributor. Law enforcement would have the ability to search for specific information and an audit trail would be fully recoverable for each search, for quality control purposes. This process will lessen the burden of review by TREX and federal data entry personnel.

10 # Auto Theft Pickaway, Fairfield, Union, Licking, Time 142 Washburn Seattle Wa Map It Other Addresses J. Blueman Parole Other Phone #s Associates Incident Bank Robbery Jesse Bluefield Arrest Report - Tacoma John Bluefield Arrest Report Seattle Jamie Bluefield Incident - DUI More More Jesse James More Next Auto Thefts January February Implementation Choosing the N-DEx solution for the tracking of local DT adherents would leverage the systems many attributes. Below is a graphic depiction of the process: Data Submitted Information Returned Data 2 Corruption Case XYZ Name: John England SSN: Sharing Attributes Share: OK Do Not Share: Conditional Share Options: Select Subscribe: Next Entity Inquiry James Bluefield 04/15/1968 Recent Address Disposition Entity Relationships Recent Phone Aliases Records Mug Franklin County Crime Characteristics Offense: Forcible Rape Suspect: Male Victim: Race: White Height: 0 to 64 Sex: Female Weight: 0 to 130 ORAge: 55 to 65 Hair: Blonde Find Similar: Subscribe: Next Services Entity Correlation Automated Processing Incident/ Case Correlation Entity Resolution N-DEx Catalog/ Index Capabilities Notification Visualization Search Collaboration Subscription Analytical/ Reporting People, Places, Things, Relationships, Characteristics Entities Contributors to N-DEx would follow the process as outlined bellow: 1. The N-DEx member agency would configure their legacy report/case management information technology system in accordance to the NIEM standard. 2. The contributor would create a report as specified within their department s legacy case management system. The report would have an Information Exchange Package Documentation (IEPD) corresponding to N-DEx.

11 3. The contributor would populate the Criminal Activity Code with the word terrorism. This is a specific IEPD within N-DEx. 4. The contributor would request he/she be notified by the N-DEx network if other N-DEx members queried his/her subject at a later date. 5. Other N-DEx users may query the terrorism Criminal Activity Code to assist them in furthering their investigative or intelligence missions. Conclusion The N-DEx technology will leverage existing trusted networks and extensive user base. Civil Liability issues will be overcome by contributing agencies following their own normal business practices. Providing local, state, and tribal law enforcement with a process for tracking DT adherents will further enhance there ability to connect the dots.

12 References Federal Bureau of Investigation. Criminal Justice Information Services. Retrieved October 15, 2008, from Federal Bureau of Investigation. (2008, August). National Information Sharing Strategy Ptasienski, Drew J. (2008, May). Database for Local and State Entry of Terrorist Information. Federal Bureau of Investigation

NATIONAL INFORMATION SHARING STRATEGY

NATIONAL INFORMATION SHARING STRATEGY The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

The Commonwealth of Massachusetts

The Commonwealth of Massachusetts The Commonwealth of Massachusetts Perpetuating Information Sharing Success: User Reported Successes Guide Planning and Development MassGangs, SWISS Projects IACP's Law Enforcement Information Management

More information

N-DEx Linking Corrections With Law Enforcement

N-DEx Linking Corrections With Law Enforcement Federal Bureau of Investigation Science and Technology Branch Criminal Justice Information Services Division N-DEx Linking Corrections With Law Enforcement Corrections Technology Association Summit Phoenix,

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

Advisory Commission on the Administration of Justice April 19, Julie Butler Division Administrator. Dedication, Pride, Service

Advisory Commission on the Administration of Justice April 19, Julie Butler Division Administrator. Dedication, Pride, Service Advisory Commission on the Administration of Justice Julie Butler Division Administrator Dedication, Pride, Service Statutory Authority Housed within the General Services Division of DPS (NRS 480.130,

More information

NSI. Suspicious Activity Reporting Line Officer Training

NSI. Suspicious Activity Reporting Line Officer Training Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding

More information

FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION

FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION SEARCH MEMBERSHIP MEETING July, 2011St. Louis, Mo. David Gavin Current State of Criminal Justice Information Sharing However beautiful the strategy,

More information

NGI and Rap Back Focus Group Briefing

NGI and Rap Back Focus Group Briefing NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus

More information

INCIDENT-BASED CRIME REPORTING

INCIDENT-BASED CRIME REPORTING INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

Nationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018

Nationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018 Nationwide Suspicious Activity Reporting Crime Stoppers USA Training Conference New Orleans September 2018 2 NSI Project Partners If You See Something, Say Something Campaign Overview Launched in 2010

More information

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins

More information

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO 1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it

More information

NC Department of Justice

NC Department of Justice Information Technology Division (ITD) Presented to: House Appropriations Subcommittee for Information Technology Scott Glawson CIO NC Department of Justice 05/09/2013 ITD Organizational Structure 73 IT

More information

Collaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014

Collaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Collaboration Trail - how Corrections information is shared CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Agenda Introductions Why Collaborate? Along the Collaboration Trail

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Private Sector Clearance Program (PSCP) Webinar

Private Sector Clearance Program (PSCP) Webinar Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance

More information

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT

More information

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments: From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

New York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006

New York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006 New York State Integrated Justice Information Exchange Project NGA GJXDM Policy Academy April 18-20, 2006 NYS Team Representatives at 2006 Policy Academy Name Title Agency Marlaine Hoffman Deputy Director

More information

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland

More information

DEPARTMENT OF JUSTICE. [CPCLO Order No ] Privacy Act of 1974; System of Records

DEPARTMENT OF JUSTICE. [CPCLO Order No ] Privacy Act of 1974; System of Records This document is scheduled to be published in the Federal Register on 12/04/2017 and available online at https://federalregister.gov/d/2017-25994, and on FDsys.gov Billing Code: 4410-02-P DEPARTMENT OF

More information

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust

Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Jamie Danker Director, Senior Privacy Officer National Protection and Programs Directorate, U.S.

More information

FBI Next Generation Identification (NGI)

FBI Next Generation Identification (NGI) FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest

More information

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR

More information

IACP N-DEx DISCUSSION WITH SEARCH MEMBERSHIP

IACP N-DEx DISCUSSION WITH SEARCH MEMBERSHIP IACP N-DEx DISCUSSION WITH SEARCH MEMBERSHIP The request of SEARCH membership is to have a discussion regarding N-DEx implementation, especially as related to the role of the states and the effect of the

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence

More information

FACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM

FACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM WEDNESDAY, MAY 29, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM When terrorism

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

The National Network of Fusion Center: Where We Have Been and Where We are Going

The National Network of Fusion Center: Where We Have Been and Where We are Going The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National

More information

Next Generation Identification Rap Back Services

Next Generation Identification Rap Back Services Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1

More information

AUDIT QUESTIONNAIRE. Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit.

AUDIT QUESTIONNAIRE. Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit. AUDIT QUESTIONNAIRE Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit. ORI Person Completing Date Phone Number AGENCY AGREEMENT

More information

FBI Role in Overseas Investigations

FBI Role in Overseas Investigations DONALD VAN DUYN CHIEF INTELLIGENCE OFFICER FEDERAL BUREAU OF INVESTIGATION BEFORE THE SENATE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS JANUARY 8, 2009 Good afternoon Chairman Lieberman, Senator

More information

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa

More information

Statisticians in the Federal Government: Producing Data on the Criminal Justice System

Statisticians in the Federal Government: Producing Data on the Criminal Justice System Statisticians in the Federal Government: Producing Data on the Criminal Justice System Washington Statistical Society Gonzaga College High School Washington, DC February 5, 2019 Jeri M. Mulrow Vice President

More information

REDACTED FOR PUBLIC RELEASE. U.S. Department of Justice Office of the Inspector General Audit Division. Audit Report September 2005

REDACTED FOR PUBLIC RELEASE. U.S. Department of Justice Office of the Inspector General Audit Division. Audit Report September 2005 THE EXTERNAL EFFECTS OF THE FEDERAL BUREAU OF INVESTIGATION S REPRIORITIZATION EFFORTS U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-37 September 2005 THE EXTERNAL

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3 Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical

More information

NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing

NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing The National Information Exchange Model (NIEM) A Presentation to the IACP-LIEM Conference May 9, 2008 Nashville, TN Paul Wormeli,

More information

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Working Together How Federal Agencies Coordinate Security Across All Disciplines: The

More information

National Counterterrorism Center

National Counterterrorism Center National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Judicial Inquiry System (JIS)

Judicial Inquiry System (JIS) Judicial Inquiry System (JIS) Active Warrant Alert Calendaring System (AWACS) User Manual Office of the State Courts Administrator Created March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3 SCOPE...

More information

GAO INFORMATION SHARING ENVIRONMENT

GAO INFORMATION SHARING ENVIRONMENT GAO United States Government Accountability Office Report to Congressional Requesters June 2008 INFORMATION SHARING ENVIRONMENT Definition of the Results to Be Achieved in Improving Terrorism-Related Information

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

National Incident-Based Reporting System. Volume 4: Error Message Manual

National Incident-Based Reporting System. Volume 4: Error Message Manual U.S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Uniform Crime Reporting National Incident-Based Reporting System Volume 4: Error Message Manual

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Washington Metropolitan Area Transit Authority Board Action/Information Summary Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 200972 Resolution: Yes No TITLE: MTPD 2014 Part I Crime Report, January - June PRESENTATION

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Law Enforcement Online

Law Enforcement Online Law Enforcement Online Facing the Challenges of Katrina By LESLEY G. KOESTNER John Barry Wayne County Sheriff s Office n today s age of terrorism, what does the weaponry of law enforcement look like? IPerhaps,

More information

FBI Criminal History Record Certification Program

FBI Criminal History Record Certification Program FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section

More information

Oregon State Police. Information Technology Overview

Oregon State Police. Information Technology Overview Oregon State Police Information Technology Overview Presented by: Tom M. Worthy, Major Presentation date: March 30, 2017 OSP I.T. Mission and Strategy Modernize Standardize Engage & Enable Innovate Workflow

More information

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate

More information

Louisiana - State Analytical & Fusion Exchange (LA-SAFE)

Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,

More information

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND GENERAL ORDER DISTRICT OF COLUMBIA Subject Teletype Unit Messages, Notifications, and Inquiries Topic Series Number SPT 302 04 Effective Date April 21, 2015 Replaces: GO-SP-302.04 (Transmitting of Telecommunications

More information

CRIME ANALYSIS SACRAMENTO COUNTY SHERIFF S DEPARTMENT

CRIME ANALYSIS SACRAMENTO COUNTY SHERIFF S DEPARTMENT 27 February 2018 Five Year Uniform Crime Reporting (UCR) Analysis 2013-2017 Page 1 16 SACRAMENTO COUNTY UNIFORM CRIME REPORT 2013-2017 This report provides a five-year analysis of crime trends within the

More information

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately

More information

-Eight types of cyber data, (Sec. 708(7))

-Eight types of cyber data, (Sec. 708(7)) WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-

More information

INTERPOL Washington U.S. National Central Bureau U.S. Department of Justice. Domestic Focus International Reach

INTERPOL Washington U.S. National Central Bureau U.S. Department of Justice. Domestic Focus International Reach INTERPOL Washington U.S. National Central Bureau U.S. Department of Justice The Myth The Reality Worldwide police communications Criminal investigative resources International police databases Arabic,

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Union Bank s NMLS REGISTRATION GUIDE. PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO)

Union Bank s NMLS REGISTRATION GUIDE. PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO) Union Bank s NMLS REGISTRATION GUIDE PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO) Revised 4/17/2012 Table of Contents 1.0 S.A.F.E. ACT... 3 1.1 Background... 3 1.2 Registration Overview for s...

More information

Oregon Department of Justice

Oregon Department of Justice Oregon Department of Justice Created in response to the 9/11 Commission Report Currently 78 Fusion Centers in the US Fusion Centers are unique in design, but the operation mission is the same nationally

More information

NATIONAL STRATEGY FOR INFORMATION SHARING. Successes and Challenges In Improving Terrorism-Related Information Sharing

NATIONAL STRATEGY FOR INFORMATION SHARING. Successes and Challenges In Improving Terrorism-Related Information Sharing NATIONAL STRATEGY FOR INFORMATION SHARING Successes and Challenges In Improving Terrorism-Related Information Sharing october 2007 NATIONAL STRATEGY FOR INFORMATION SHARING Successes and Challenges In

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Office of Inspector General Office of Professional Practice Services

Office of Inspector General Office of Professional Practice Services Office of Inspector General Office of Professional Practice Services Executive Summary In accordance with the Department of Education s fiscal year 2017-18 audit plan, the Office of Inspector General (OIG)

More information

DARPA s Information Awareness Office (IAO) and Total Information Awareness (TIA) Program. Frequently Asked Questions

DARPA s Information Awareness Office (IAO) and Total Information Awareness (TIA) Program. Frequently Asked Questions Question 1: What is the Total Information Awareness (TIA) program? Answer: TIA is a Defense Advanced Research Projects Agency (DARPA) research effort to create a prototype network that integrates innovative

More information

Genesis 1. He did not give Man dominion over Man

Genesis 1. He did not give Man dominion over Man Genesis 1 In the beginning God created the heavens and the earth. God said, Let there be light,, and there was light. On the sixth day God created Man and gave Man dominion over the earth. He did not give

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Kansas ecitation Submission Service Service Description Document

Kansas ecitation Submission Service Service Description Document Kansas ecitation Submission Service Service Description Document v 1.0.0 July 15, 2011 Page 1 Table of Contents Document Introduction... 4 ECitation Data Submission Service Overview... 6 Purpose... 6 Scope...

More information

ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING

ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING Helping to keep the lights on, businesses running and communities strong 1 Objectives The Utility Business has Changed Methodology Program

More information

TIME System Newsletter Volume February 2016

TIME System Newsletter Volume February 2016 Wisconsin Department of Justice Division of Law Enforcement Services Brad D. Schimel Attorney General TIME System Newsletter Volume 2016-1 February 2016 The TIME System processed 53,556,473 transaction

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)

More information

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide SAR Initiative (NSI) Responds directly to the Intelligence Reform and Terrorism Prevention Act of 2004 and to the direction of

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

CJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting

CJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting CJIS Advisory Policy Board Disposition Task Force 1 History The APB discussed the issue of incomplete records and the need to include courts in future discussions The APB recommended the formation of a

More information

Biometric Center of Excellence (BCOE)

Biometric Center of Excellence (BCOE) Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -

More information

Marijuana Establishment Agent Card Application and Checklist

Marijuana Establishment Agent Card Application and Checklist Marijuana Establishment Agent Card Application and Checklist State of Nevada Department of Taxation For use by Marijuana Establishments Owners, Officers, Board Members, Employees, Volunteers, and Contractors

More information

Summary of WISE Needs Assessment Project

Summary of WISE Needs Assessment Project Summary of WISE Needs Assessment Project Prepared by ASU s Center for Violence Prevention and Community Safety August 17, 2006 What is the ASU Center for Violence Prevention and Community Safety? An organizational

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

The Global Justice Information Network:

The Global Justice Information Network: The Global Justice Information Network: An Introductory Report on Infrastructure Issued by: Infrastructure/Standards Working Group Global Justice Information Network Advisory Committee June 2000 Message

More information

GAO. Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate

GAO. Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate GAO For Release on Delivery Expected at 10:00 a.m. EDT Wednesday, July 23, 2008 United States Government Accountability Office Testimony Before the Committee on Homeland Security and Governmental Affairs,

More information