Top PDF Tribal-federal government collaboration in homeland security

Tribal-federal government collaboration in homeland security

Tribal-federal government collaboration in homeland security

own economic success through self rule. Through extensive research with the Harvard Project on American Indian Economic Development, they extracted these examples of success: Supported by every U.S. President since the 1960s and bolstered, for a time, by a combination of federal court rulings and congressional policies, tribal self-rule – sovereignty – has proven to be the only policy that has shown concrete success in breaking debilitating economic dependence on federal spending programs and replenishing the social and cultural fabric that can support vibrant and healthy communities and families. While gaming enterprises of tribes’ governments garner most of the attention, self-rule is creating more and more economic success stories in Indian Country – from the virtual elimination of tribal unemployment and the boom in non-Indian hirings in the factories and other operations of the Mississippi Choctaw, to the cutting of unemployment from 70% to 13% in six years via the non-gaming businesses of the Winnebago Tribe’s (Nebraska) Ho-Chunk Inc. Gaming success itself is spurring self-sufficiency, as tribes such as Oneida (New York) and Mille Lacs (Minnesota) take the step of eschewing federal funding. And the success of self-determination is not solely economic – as when Mississippi Choctaw plows the fruits of economic development into dramatic improvements in public safety and health care delivery, Mille Lacs is able to invest in award-winning efforts to replenish Native language use, and Jicarilla Apache (New Mexico) and White Mountain Apache (New Mexico) are able to take control of wildlife and forest management with professionalism and results perhaps unmatched by any government anywhere. 73
Show more

68 Read more

Homeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action

Homeland Security in Michigan: A Cooperative Network of Local, State, and Federal Action

Supporters argue that there are procedural safeguards in place that protect the freedom and property of innocent people. Supporters say that these criticisms seem to reflect a general lack of faith in our criminal justice system rather than a criticism of specific legislation. They argue that as long as prosecutors uphold the law, judges do their duty in protecting due process rights of suspects, and jurors are fair, than this anti-terrorism legislation should not infringe upon civil liberties. 119 Also, supporters argue that under the Revised Judicature Act, a mechanism exists for a person who neither had prior knowledge of nor consented to the commission of a crime to ask the court to return the seized property. Currently, the prosecution has the burden of proof to show probable cause that the property was subject to forfeiture. Thus, supporters believe that existing laws do not make it easy for the government to seize the property of innocent people. 120 Critics also argue that pro-law enforcement forces had controversial legislation added to the homeland security package because they saw the post September 11 period as a window of opportunity. They argue that the September 11 attacks created a crisis atmosphere where the threat of terrorism captured the attention of the public and pushed away fears of government infringing upon civil liberties. However, many of these controversial bills, for example the wiretapping (SB 803) and ID card prohibitions for illegal aliens (HB 5497, HB 5498 and SB 931), died even during the post-September 11 legislative session. Thus, supporters argue that the system of checks and balances worked, in that, controversial legislation received similar scrutiny as it received in previous sessions.
Show more

45 Read more

Emergency Preparation for Schools: Response to the Federal Government s Homeland Security Advisory System. LaPorte Community School Corporation

Emergency Preparation for Schools: Response to the Federal Government s Homeland Security Advisory System. LaPorte Community School Corporation

Government Policy The United States Government through its Department of Homeland Security has established a means to disseminate information regarding the risk of terrorist acts to Federal, State and Local authorities and to the American people. This system would provide warnings in the form of graduated “Threat Conditions” that would increase as the risk of the threat increases. It has been recommended by the Government that at each threat level agencies, both public and private, activate protective steps in an attempt to reduce our vulnerability and at the same time increase our capability to respond depending on the threat level that’s activated.
Show more

15 Read more

Enhancing FBI terrorism and homeland security information sharing with state, local and tribal agencies

Enhancing FBI terrorism and homeland security information sharing with state, local and tribal agencies

1. Joint Terrorism Task Force (JTTF) The Joint Terrorism Task Force (JTTF) is the primary “ad hoc” operational means of terrorism and homeland security information sharing with other federal agencies and SLTs. Members have a top secret clearance, which grants them to access most terrorism and homeland security information in FBI files and electronic systems. JTTF liaison contacts are not required to have a security clearance, and are limited in their access to terrorism and homeland security information by their clearance level (DOJ-OIG, 2005, p. 18). The FBI shares PII with JTTF TFOs pursuant to the Privacy Act exception that allows sharing PII with agency officers and employees with a “need to know” (5 U.S.C. § 552a(b)(1)). Unfortunately, this exception does not authorize TFOs to provide the PII information to their parent agency without a separate Privacy Act exception or “routine use.” This exception addresses JTTF operational necessity and permits situational awareness for the parent agency through their TFOs, which is accomplished through regular member meetings. The frequency of these meetings varies according to the situation and needs of the individual JTTF. The JTTF holds Executive Board meetings on at least a quarterly basis to facilitate information exchanges with heads of other agencies and other top-level managers from participant agencies (DOJ-OIG, 2005, p. 37). A DOJ-OIG survey of JTTF members in 2004 revealed that 77% of the respondents rated the quality of the information sharing at these meetings as Good to Excellent (DOJ-OIG, 2005, p. 32). This JTTF “ad hoc” information sharing does not facilitate significant FBI PII sharing in an expansive and effective manner beyond these informal meetings with JTTF members and their management.
Show more

146 Read more

Open Government Plan 2.0 U.S. Department of Homeland Security

Open Government Plan 2.0 U.S. Department of Homeland Security

Only in existence since 2003, the Department of Homeland Security (DHS) has a minimal number of records of permanent historical value that are subject to the automatic declassification provisions of Executive Order 13526, “Classified National Security Information.” The majority of these records were produced by legacy components of DHS, which include the United States Secret Service (USSS), the Federal Emergency Management Agency (FEMA), and the United States Coast Guard (USCG). To address the declassification of applicable records generated by the component agencies, USSS and FEMA have created declassification guides that identify program specific information that is exempt from automatic declassification and that have been approved by the Interagency Security Classification Appeals Panel (ISCAP). In all other instances where an approved exemption from automatic declassification does not exist, DHS component generated classified information is automatically declassified, or, where such records contain the equities of other agencies, referred to the appropriate agencies. As such, and pursuant to Executive Order 13526, DHS routinely reviews information to affirm classification and to declassify when possible. Most information currently declassified by DHS resides in Presidential Libraries and the National Archives and Records Administration (NARA), and is subject to external publication schedules.
Show more

55 Read more

Department of Homeland Security Federal Emergency Management Agency Salaries and Expenses

Department of Homeland Security Federal Emergency Management Agency Salaries and Expenses

management effectiveness by seeking cost-effective, reliable, secure, and innovative solutions through which to continue to deliver the Agency’s services to Nation’s citizens and first responders. Our IT initiatives are closely aligned with those who carry out the Agency’s mission and with the broader framework provided by the President’s Management Agenda, and relevant legislation and guidance. To continue to ensure the sustained viability and resiliency of IT capabilities, we will continue to work toward the migration of applications from the Mount Weather facility and two other commercial data centers that are currently hosting FEMA mission support applications. OCIO will continue to take advantage of IT services offered at the DHS-enterprise level, such as email and internet collaboration services, that will improve capabilities and reduce costs. The OCIO is comprised of two divisions: the Operations Division and the Administration Division.
Show more

99 Read more

Department of Homeland Security

Department of Homeland Security

NPPD concurred with Recommendation 4. The Administration’s International Strategy for Cyberspace highlights the need for information sharing in “an interconnected global environment.” Open dialogue with foreign partners regarding cyber threats and vulnerabilities mutually benefits NPPD, foreign partners, and their respective stakeholders and customers. NPPD will examine its current internal policies and procedures related to such dialogue and address any identified gaps. NPPD currently has relationships with many countries that guide operational information sharing. However, it is important to note that the Federal Government has established information sharing policies that NPPD must follow. In particular, data sensitivity issues, foreign disclosure
Show more

31 Read more

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY

The agency also proposes to disclose all or a portion of the records or information contained in the system outside of the DHS when “it is suspected or confirmed that the security or confidentiality of information in the system of record has been compromised” and for other purposes. 52 While we support notification to affected individuals in the case of security breaches, this routine use would stand the presumption of the Privacy Act on its head. Instead of the agency informing the individual of information in the possession of the agency that could have an adverse impact, DHS would distribute the information widely across the federal government while keeping it secret from the individual whose interests are supposed to be protected by the Privacy Act.
Show more

18 Read more

Homeland Security Program

Homeland Security Program

the Intelligence Component of Fusion Centers for Local, State, Tribal, and Federal Law Enforcement, "HSPD-5 (Homeland Security Presidential Directive #5), requires the Department of Homeland Security (DHS) to coordinate with other federal departments and state, local, and tribal governments to establish a National Response Plan (NRP) and a National Incident Management System (NIMS). Each of these items plays a role in the establishment of fusion centers and lays a foundation for enhanced information and intelligence sharing among all levels of law enforcement, public safety, and the private sector." SEMA personnel have indicated they believe that Missouri's future federal funding may be contingent on the establishment of a working intelligence fusion center. To increase Missouri's ability to detect, prevent, and monitor terrorism within the state, and to ensure Missouri remains eligible for future federal homeland security funding, efforts should continue towards implementing an intelligence fusion center.
Show more

31 Read more

Department of Homeland Security

Department of Homeland Security

Social media has also enabled FEMA Watch Centers to develop more timely situational awareness to communicate information to emergency managers and government officials and improve incident management decision making. FEM!’s National Watch enter uses social media websites as an additional resource to maintain situational awareness of incidents that may require a coordinated Federal response. Watch Center personnel told us that they conduct searches to identify potential incidents that may predicate a coordinated Federal response. For example, the National Watch Center monitors social media during a storm to follow its progression and see how closely it matches the forecast and news reports. FEMA Watch Center staff also use this information to confirm the locations where weather events, such as tornado touchdowns, actually occurred.
Show more

40 Read more

Homeland Security Affairs

Homeland Security Affairs

To summarize, the defense community experience shows that the stakeholders should own the process and take responsibility for its use and outputs. Stakeholders generally control the information, resources, and authority required to support CBP. For homeland security, DHS attempted to include stakeholders such as state and local government officials, national associations, and other federal agencies involved in homeland security. However, instead of taking a partnering, collaborative approach, DHS used consultants to develop voluminous draft material and then asked for stakeholder reaction. DHS justified consultation rather than partnership on the tight national goal implementation timeframes in HSPD-8 and its requirement for federal development in consultation with others. The end result has been “push back” from key state and local stakeholders, confusion about intent and requirements, and lack of understanding of CBP and what it is intended to do. In hindsight, of course, a better approach would have been to partner and take a less complex approach to implementation if the HSPD-8 implementation timeframes could not be changed.
Show more

23 Read more

PUBLIC SAFETY AND HOMELAND SECURITY BUREAU Federal Communications Commission

PUBLIC SAFETY AND HOMELAND SECURITY BUREAU Federal Communications Commission

State Emergency Operations Center – Web EOC Louisiana also has an impressive Web EOC, which is an IP-based emergency information management application that allows for secure Internet connections and enables real-time access to state and local weather trends. The applications also provides operational details from various government and public safety groups; and offers local regional and national resource profiles and updates so that state and local officials can rapidly deploy essential resources to disaster-impacted areas.

10 Read more

Department of Homeland Security

Department of Homeland Security

The agreement also requires the City to comply with OMB Circular A-133, Audits of States, Local Governments, and Nonprofit Organizations, and Recovery Act provisions to submit quarterly recipient reports to the federal government; pay prevailing wages as determined by the Secretary of Labor; and use American 1 iron, steel, and manufactured goods.

9 Read more

Department of Homeland Security

Department of Homeland Security

Persons sometimes attempt illegal entry into the United States between land, sea, and air ports of entry, for example across the northern or southern land border, along the coast, or with an unregistered aircraft. Protecting the borders and coasts requires that the U.S. Border Patrol, the Office of Air and Marine (OAM), ICE HSI, and the Coast Guard cooperate with each other as well as with the Canadian and Mexican governments, the military, the Intelligence Community, other federal agencies, and state, local, and tribal governments. Aliens who cannot immediately be removed are referred to the ICE ERO immigration detention system. The U.S. Border Patrol, ICE HSI, the Coast Guard, or ICE ERO may refer detained aliens for a screening interview by an asylum officer for protection issues or a hearing before an
Show more

59 Read more

Department of Homeland Security

Department of Homeland Security

In answering these questions, it is useful to highlight several basic facts. First, the areas of research under consideration have been receiving generally healthy budgetary support in recent times, so the need for greater visibility under DHS to augment their financial resources seems weak. Second, while the health research worlds and the DOE world have both suffered of late from internal schisms, the general scientific cultures in both communities are reasonably strong. Third, the case for centralizing all these activities under one institutional roof is weaker for basic research than it is for emergency response. Basic research efforts do not require that thousands of state and local agencies around the country have quick and easy access to the federal government. Policymakers know the basic players well—DOE’s major laboratories, NIH, CDC—and do not need consolidation to keep track of them. Fourth, while more effort is needed in the area of CBRN research, and in the area of preparations for consequence management, the current reorganization plan does not provide much attention to prevention and protection. Nor does it adequately address non-CBRN issues in which science may be able to contribute importantly to homeland security.
Show more

79 Read more

U.S. Senate Homeland Security and Government Affairs Committee

U.S. Senate Homeland Security and Government Affairs Committee

Consistent with globally interoperable biometric specifications adopted by the International Civil Aviation Organization (ICAO) in May 2003, the United States has adopted the facial image as the first generation of biometric identifiers. The new U.S. passport includes a contactless chip in the rear cover of the passport that will contain the same data as that found on the biographic data page of the passport, including a digital image of the bearer’s photograph. This data includes the following information about the bearer: the photograph, the name, the date and place of birth, as well as the passport number and the date of issuance and expiration all of which is protected by a unique encrypted signature. Looking to the future, the Department decided to require 64 KB of writeable memory on the contactless chip in the event that we subsequently decide to introduce additional biometrics. Should the United States Government decide to change the biometric requirements, this change will be subject to vetting through the Federal Register process.
Show more

9 Read more

An Examination of Tribal Nation Integration in Homeland Security National Preparedness

An Examination of Tribal Nation Integration in Homeland Security National Preparedness

Finally, the polarizing issue of lack of inclusion in national preparedness policy was emphasized repeatedly by tribal nation study participants. They maintained frequently and clearly their views that historically, tribal nations have not been included in national preparedness policy development and decisions; that they have not had a “seat at the table;” that tribal nations are not like states and cities; that they don’t have tax bases; and that they are not benefitting equally from homeland security grant programs. The pointed out that states and tribal nations do not always work well together and that pro forma, “one-size-fits-all” policies for national preparedness, originally designed for states, will not work for tribal nations due to their widely varying circumstances. Tribal nation study participants expressed strong views that the federal government has not met its trust responsibilities with the tribal nations. They acknowledged that tribal nations are different, that they lack a unified tribal voice, but they know the threats they face, they are sovereign and, as multiple tribal nation study participants stated, should not be “treated like children.” One tribal nation study participant stated that representatives of both the federal government and tribal nations both have “chips on their shoulders.”
Show more

164 Read more

Department of Homeland Security

Department of Homeland Security

We received several comments relating to Federal aircraft resources. One commenter suggested that the Coast Guard should allow State and industry stakeholders to work with the Coast Guard in each area to define a strategy tailored to that area’s unique needs, including the use of government aircraft. This commenter also questioned the volume of dispersants required for stockpiles and the potential ‘‘shelf life’’ of stockpiles. Another commenter requested that the Coast Guard clarify the availability of Federal (aircraft) resources in the event of a major oil spill. And a different commenter urged that guidance language be provided and alternative compliance strategies (for aircraft resources) be included in the regulations. This commenter was particularly concerned about the ability to use Coast Guard C–130 aircraft as dispersant platforms in the Hawaiian Islands.
Show more

28 Read more

Department of Homeland Security

Department of Homeland Security

The Pandemic Influenza Impact on Communications Networks Study involves significant industry and government collaboration. Subject matter experts from the fields of communications, cyber security, IT, epidemiology, business continuity planning, financial services, and emergency response have contributed to the study. The study is being coordinated under the DHS Office of Cyber Security & Communications (CS&C) and includes input from the DHS Chief Medical Officer, Federal Communications Commission (FCC), and members of the Financial and Banking Information Infrastructure Committee (FBIIC). On the industry side, representatives from major communications carriers and Internet Service Providers (ISPs) as well as members from the Financial Services Sector Coordinating Council (FSSCC) have been closely involved in the study.
Show more

56 Read more

Department of Homeland Security

Department of Homeland Security

In 2011, TSA selected three vendors to provide aviation channeling services. This was done using Other Transaction Agreements (OTA) under the authority of the Aviation Transportation Security Act. 2 The vendors TSA selected were AAAE, Telos ID, and L1 Identity Solutions (now MorphoTrust Enrollment Solutions). The Federal Acquisition Regulation (FAR) does not apply to OTA agreements; therefore, TSA was not required to follow the FAR’s policies and regulations for full and open competition for the ACSP project. Yet TSA did advertise the solicitation on FedBizOpps, a public website that lists government contracting opportunities. TSA also performed market research and a review of proposals to select the three vendors for the ACSP project. All businesses had the opportunity to bid on the ACSP. Only five vendors applied; however, no small or disadvantaged businesses submitted proposals to TSA.
Show more

30 Read more

Show all 10000 documents...