Department of Homeland Security (DHS)

Top PDF Department of Homeland Security (DHS):

The Honorable Janet Napolitano, Secretary of Homeland Security U.S. Department of Homeland Security Washington, DC 20528

The Honorable Janet Napolitano, Secretary of Homeland Security U.S. Department of Homeland Security Washington, DC 20528

The U.S. has ignored this advisory. Indeed, on July 12, 2011, the Department of Homeland Security (DHS) deported an undisclosed number of individuals to Haiti, bringing the total number of Haitians removed since January 2011 to at least 75. Moreover, although DHS’s official policy purports to limit removals to dangerous individuals with “significant criminal records,” and requires DHS to consider individual equities in effectuating removal, 3 DHS continues to have no procedure to assess whether Haitian nationals have special protection needs that warrant the deprioritization of their deportation. Nor has DHS been willing to provide NGOs with the information they would need to assist individual Haitians in presenting their equities for consideration. As a result, DHS has already removed several Haitian nationals with minor criminal convictions, family ties in the United States, medical conditions that cannot be adequately treated in Haiti, and other equities in disregard of the joint advisory of the UNHCR.
Show more

6 Read more

Department of Homeland Security

Department of Homeland Security

According to the Department of Homeland Security (DHS), in fiscal year (FY) 2011, the USCG was responsible for 15 percent of DHS’ personal property and, between FY 2008 and FY 2010, disposed of approximately $3.3 billion worth of such property. 1 The Code of Federal Regulations (CFR) defines personal property as any Federal property except real property (interest in land, including improvements, structures, and fixtures on it), certain naval vessels, and Federal records. 2 The U.S. General Services Administration (GSA) defines excess personal property as property that is no longer required for an agency’s needs. Federal agencies are required to reutilize excess personal property unless doing so causes serious hardship, is impractical, or impairs operations, because reutilization
Show more

35 Read more

Department of Homeland Security

Department of Homeland Security

To expedite the reporting of alleged fraud, waste, abuse or mismanagement, or any other kinds of criminal or noncriminal misconduct relative to Department of Homeland Security (DHS) programs and operations, please visit our website at www.oig.dhs.gov and click on the red tab titled "Hotline" to report. You will be directed to complete and submit an automated DHS OIG Investigative Referral Submission Form. Submission through our website ensures that your complaint will be promptly received and

13 Read more

Department of Homeland Security INFORMATION TECHNOLOGY STRATEGIC PLAN

Department of Homeland Security INFORMATION TECHNOLOGY STRATEGIC PLAN

The Department of Homeland Security (DHS) has a vital mission: to secure the nation from the many threats it faces. The DHS vision is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards. These overarching goals are the basis for the IT mission and IT vision set forth in this document; the strategies and actions of the DHS CIO community are rooted in and aligned with the founding principles and highest priorities of Homeland Security. The DHS IT Strategic Plan 2015-2018 reflects our rapidly-changing IT environment and evolving mission and business needs, as well as IT’s role in every aspect of security and resilience. It outlines DHS’ IT priorities and provides strategic direction for the use of IT resources, in order to improve the efficiency of our programs, enhance our mission effectiveness, and ultimately, provide for the security of the American people.
Show more

23 Read more

Department of Homeland Security

Department of Homeland Security

The Department of Homeland Security (DHS) granted a limited, nationwide public interest waiver of the “buy American” requirements for each TSA Electronic Baggage Screening Program project. The waiver specifies that at least 95% of the costs of each project will comply with the buy American requirements of section 1605 of the Recovery Act, and allows up to 5% of total project costs to be used for non-American products.

9 Read more

Department of Homeland Security

Department of Homeland Security

TSP, GETS, and WPS are services provided through the Department of Homeland Security (DHS) National Communications System (NCS). TSP provides priority restoration and provisioning for users critical to coordinating and responding to a crisis. GETS provides emergency access and priority processing in the local and long distance segments of the Public Switched Telephone Network (PSTN) for voice and voice-band communications. WPS is the wireless equivalent to GETS and provides priority for calls from cellular telephones. Key Federal, state, local and tribal government, and critical infrastructure personnel are eligible for TSP, GETS, and WPS. Businesses supporting critical infrastructures, such as the power industry, should consider obtaining TSP for their enterprise and GETS and/or WPS for critical IT staff so these employees can support business continuity. More information about these services can be found at: http://gets.ncs.gov/, http://wps.ncs.gov/, and http://tsp.ncs.gov
Show more

56 Read more

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General

We have audited the consolidated balance sheet of the Immigration and Customs Enforcement (ICE), a component of the U.S. Department of Homeland Security (DHS), as of September 30, 2009 and the related consolidated statements of net cost, changes in net position, and the combined statement of budgetary resources (hereinafter referred to as “consolidated financial statements”) for the year then ended. In planning and performing our audit of the consolidated financial statements of ICE, in accordance with auditing standards generally accepted in the United States of America, we considered ICE’s internal control over financial reporting (internal control) as a basis for designing our auditing procedures for the purpose of expressing our opinion on the consolidated financial statements but not for the purpose of expressing an opinion on the effectiveness of ICE’s internal control. Accordingly, we do not express an opinion on the effectiveness of ICE’s internal control.
Show more

28 Read more

Department of Homeland Security

Department of Homeland Security

Attached for your information is our final report, DHS Needs To Strengthen Information Technology Continuity and Contingency Planning Capabilities. We incorporated the formal comments from the Departmental GAO/OIG Liaison Office in the final report. The report contains nine recommendations aimed at improving the Office of the Chief Information Officer. Your office concurred with eight recommendations. As prescribed by the Department of Homeland Security Directive 077-01, Follow-Up and Resolutions for Office of Inspector General Report Recommendations, within 90 days of the date of this memorandum, please provide our office with a written response that includes your (1) agreement or disagreement, (2) corrective action plan, and (3) target completion date for each recommendation. Also, please include responsible parties and any other supporting documentation necessary to inform us about the current status of the recommendation.
Show more

34 Read more

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY

By notice published on January 18, 2007, the Department of Homeland Security (“DHS”) announced it seeks to create the DHS Redress and Response Records System, which “maintains records for the DHS Traveler Redress Inquiry Program (TRIP),” also known as system DHS-ALL-005. 1 Under a second notice published the same day, DHS seeks to exempt this new records system from multiple requirements set out in the Privacy Act of 1974, 5 U.S.C. § 552a. 2 Pursuant to these notices, the Electronic Privacy Information Center (“EPIC”) submits these comments to request DHS fully apply
Show more

18 Read more

Cybersecurity & the Department of Homeland Security

Cybersecurity & the Department of Homeland Security

At the request of Homeland Security Secretary Janet Napolitano (the Secretary), the Aspen Cyber Working Group seeks to make recommendations to help prioritize and focus the Department of Homeland Security’s (DHS’s or the Department’s) cyber activities. Cybersecurity, which includes data protection, information security and industrial control systems, represents a national security concern. As discussed below, DHS has significant authority to lead and coordinate, along with other civil agencies, the nation’s defensive capabilities including all civil cybersecurity and private sector issues. The Department of Defense (DoD) is responsible for our nation’s offensive cybersecurity capabilities, including cyber warfare. Under this framework, the following paper discusses the challenges and
Show more

10 Read more

Department of Homeland Security

Department of Homeland Security

(l) State or territory of issuance. (m) Printed information. The name, date of birth, gender, card number, issue date, expiration date, and address on the face of the card must be in Latin alpha- numeric characters. The name must contain a field of no less than a total of 39 characters, and longer names shall be truncated following the standard established by International Civil Aviation Organization (ICAO) 9303, ‘‘Machine Readable Travel Documents,’’ Volume 1, Part 1, Sixth Edition, 2006. The Director of the Federal Register approves this incorporation by reference in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. You may obtain a copy of ICAO 9303 from the ICAO, Document Sales Unit, 999 University Street, Montreal, Quebec, Canada H3C 5H7, e- mail: sales@icao.int. You may inspect a copy of the incorporated standard at the Department of Homeland Security, 1621 Kent Street, 9th Floor, Rosslyn, VA (please call 703–235–0709 to make an appointment) or at the National Archives and Records Administration (NARA). For information on the availability of material at NARA, call 202–741–6030, or go to http:// www.archives.gov/federal _ register/ code _ of _ federal _ regulations/ ibr _ locations.html.
Show more

70 Read more

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General

Senator Hillary Rodham Clinton requested that we review the effectiveness of the Department of Homeland Security’s award fee process as it relates to successful acquisition outcomes. This report addresses the award fees that U.S. Customs and Border Protection paid to Chenega Technology Services Corporation for enforcement equipment maintenance and field operations support. Our objectives were to determine whether (1) the selected contract type was suitable; (2) Customs and Border Protection paid award fees based on contractor excellence; and (3) Customs and Border Protection had adequate expertise to develop a performance-based contract with expedited negotiating procedures. Through
Show more

39 Read more

Department of Homeland Security

Department of Homeland Security

The President’s Cyberspace Policy Review recommends that the United States work actively with all countries to develop a trusted, safe, and secure cyber infrastructure that enables prosperity for all nations. Further, the Blueprint requires that the homeland security enterprise, including the Department, implement collaboration principles that will foster the transfer of specific, actionable cybersecurity information using approved methods, while protecting and ensuring privacy protection. Robust interaction among all levels of

31 Read more

Department of Homeland Security

Department of Homeland Security

adversely affect transportation modes. TSA’s overall goal is to expand access to federal law enforcement data systems, but statutes and regulations restrict access to criminal records. To resolve this issue, we encourage TSA to request a permanent Coordination Centers liaison from CBP OFO to improve TSA’s access to timely information on foreign nationals via federal law enforcement data systems when a need to know is established. Both CBP and TSA officials have stated that they would like TSA to use DHS systems, particularly TECS, to obtain and share information. This collaboration between CBP and TSA would further strengthen aviation security and expand local support within the airport environment, eliminate delayed responses in an emergency, and improve information sharing between the
Show more

59 Read more

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY

A Hardship License is a special license issued to a minor fourteen (14) or fifteen (15) years of age. This special class of license shall be restricted to operation of a Class D (passenger vehicle) or Class M (motor-driven cycle) vehicle. This license shall be valid for use in daylight hours only. Travel to authorized locations will be specified by the Department of Safety and Homeland Security along with any restrictions deemed appropriate by the Department and set forth in

12 Read more

U.S. Department of Homeland Security MANAGEMENT DIRECTIVE 715

U.S. Department of Homeland Security MANAGEMENT DIRECTIVE 715

DHS’s mission is to make the nation safe, secure, and resilient against terrorism and other hazards, where the American way of life can thrive. DHS’s mission is comprised of five major areas of responsibility: 1) Preventing Terrorism and Enhancing Security; 2) Securing and Managing Our Borders; 3) Enforcing and Administering Our Immigration Laws; 4) Safeguarding and Securing Cyberspace; and 5) Ensuring Resilience to Disasters. In addition, DHS specifically focuses on maturing the homeland security enterprise. Over its eleven years, DHS has coordinated the transition of multiple agencies and programs into a single, integrated agency focused on
Show more

89 Read more

Department of Homeland Security

Department of Homeland Security

At the same time, the Privacy Office released Instruction 110-01-001, Privacy Policy for Operational Use of Social Media, to provide guidance for implementing Directive 110-01. The Instruction provides detailed definitions and Department- wide responsibilities associated with operational use of social media. The instruction also provides baseline “rules of behavior” for the operational use of social media, such as to use online screen names that indicate an official DHS affiliation while performing official tasks. To implement Directive 110-01, components were instructed to complete documents that specify the authority and purpose for each category of operational use of social media. Components were also instructed to establish their own rules of behavior to document operational use of social media, including date, site(s) accessed, information collected, and how that information was used. Components were instructed to develop training for the operational use of social media as well. Components were to provide this information to the Privacy Office for approval within 120 days from the release of the Directive. At the time of our audit, all seven component offices were in the process of developing and submitting the required documentation to the Privacy Office for approval. However, Privacy Office officials stated that stronger enforcement mechanisms are needed to ensure that components comply with this new Directive.
Show more

40 Read more

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General

As part of its compliance with the Aviation and Transportation Security Act, FAA currently provides TSA with data from the Airmen Registry database daily. The data include biographic information on all airman certificate holders. In early 2009, TSA performed a biographic name-based security threat assessment for every individual airman certificate issued by FAA. The name-based security threat assessment consisted of matching FAA biographic data, including variations, against the Terrorist Screening Database (TSDB) to determine whether credible information indicated that the individual holding a certificate is involved, or suspected of being involved, in any activity that could pose a threat to transportation or national security. TSA analysts manually review
Show more

13 Read more

Department of Homeland Security Office of Inspector General. TSA's Role in General Aviation Security

Department of Homeland Security Office of Inspector General. TSA's Role in General Aviation Security

TSA scales its security strategy to the wide range of airfield environments and classes of operators and aircraft, rather than introducing overly broad regulations that are costly to implement. TSA works closely with the many associations of GA owners and operators to implement voluntary security measures based on threat analysis and risk management. In addition, TSA has introduced voluntary guidelines that are being used throughout the GA community, and has developed several programs targeted at the most vulnerable GA sectors, such as the Twelve-Five Standard Security Program that requires additional security for charter aircraft weighing between 12,500 and 103,309 pounds, and the Maryland- Three Program to reduce the perceived threats posed by GA airports in the vicinity of Washington, DC. TSA has also evaluated the effect of its security initiatives on the GA industry and, where applicable, its effect on modeling international industry best practices and security measures. 8 A
Show more

36 Read more

WikiLeaks Document Release

WikiLeaks Document Release

the same variation as the coordinating councils, for some of the same reasons. While PDD-63 envisioned ISACs to be a primary conduit for exchanging critical infrastructure information between the federal government and specific sectors, the Department of Homeland Security has developed a number of other information sharing systems and mechanism. For example, US-CERT (the U.S. Computer Emergency Readiness Team, which took over many of the NIPC functions) publishes information on the latest computer-related vulnerabilities and threats and information on how to respond to a specific incident. U.S.-CERT also accepts incidents reports. It also manages the National Cyber Alert System, to which any organization or individual can subscribe. The Department also has developed a Homeland Security Information Network (HSIN). HSIN initially served as the primary communication network for communicating and analyzing threat information between government law enforcement agencies at the federal, state, and local levels. The HSIN now provides real-time connectivity between all 50 states, 5 territories, and 50 urban areas and the National Operations Center at DHS. The HSIN is being expanded to include each critical infrastructure sector (dubbed HSIN-CI) as part of the Critical Infrastructure Protection Partnership Model (i.e., through each sector and government coordinating council).
Show more

46 Read more

Show all 10000 documents...