<<

DHS State and Local Law Enforcement Resource Catalog Volume IV February 2016

Intentional Blank Page. Please Continue to Next Page.

2 3/1/16

Letter from the Office for State and Local Law Enforcement

March 1, 2016

Dear Law Enforcement Partners:

Homeland begins with hometown security, and DHS tirelessly works to get tools, information, and resources out of Washington, D.C. and into the hands of our state, local, and tribal law enforcement partners. With the release of the DHS State and Local Law Enforcement Resource Catalog Volume III, we are pleased to announce a continuation of that effort.

The DHS State and Local Law Enforcement Resource Catalog is a one-stop shop for non-federal law enforcement. This document summarizes and provides links to training, publications, newsletters, programs, and services available from across the Department to our law enforcement partners.

At DHS, we are continually developing new programs and resources that could be of assistance to state, local, and tribal law enforcement. If you cannot find what you are searching for in this catalog, please do not hesitate to contact the Office for State and Local Law Enforcement for additional assistance.

The Office for State and Local Law Enforcement has always worked to enhance the support that DHS provides to our law enforcement partners. We hope this catalog is another one of those tools that will assist in your efforts to keep our communities safe, secure, and resilient.

Sincerely,

Office for State and Local Law Enforcement Department of

3 3/1/16

Office for State Responsibilities

and Local Law  Serve as the primary Department liaison to state, Enforcement local, tribal, and territorial law enforcement;  Advise the Secretary on the issues, concerns, and Overview recommendations of state, local, tribal, and territorial law On the recommendation of the 9/11 enforcement;

Commission, Congress created the Office  Keep the law enforcement for State and Local Law Enforcement community informed about (OSLLE) in 2007 to lead the coordination Department-wide activities and initiatives such as “If You See of DHS-wide policies related to state, Something, Say Something™”, local, tribal, and territorial law the Blue Campaign, Nationwide enforcement’s role in preventing, Suspicious Activity Reporting preparing for, protecting against, and (SAR) Initiative (NSI), and the responding to natural disasters, acts of Department’s efforts in Countering Violent Extremism; terrorism, and other man-made disasters within the .  Identify and respond to law enforcement challenges that affect homeland security;

 Coordinate with the Office of Intelligence and Analysis to ensure timely coordination and distribution of intelligence and

Contact OSLLE strategic information to state, local, tribal, and territorial law Phone: 202-282-9545 enforcement; and  Work with the Federal Email: [email protected] Agency Website: to ensure that law enforcement http://www.dhs.gov/office- and terrorism-focused grants to state, local, tribal, and state-and-local-law- territorial law enforcement enforcement-oslle agencies are appropriately focused on terrorism prevention activities.

Helping to Build a Safe, Secure, and Resilient Nation 4 3/1/16

Table of Contents Letter from the Office for State and Local Law Enforcement ...... 3 Office for State and Local Law Enforcement (OSLLE) ...... 4 Department of Homeland Security Resources ...... 6 Department-wide Resources ...... 6 U.S. Citizenship and Immigration Services (USCIS) ...... 8 CIS Ombudsman (Ombudsman’s Office) ...... 10 Office for Civil Rights and Civil Liberties (CRCL) ...... 11 U.S. Coast Guard (USCG) ...... 13 Office of Community Partnerships (OCP) ...... 15 U.S. Customs and Border Protection (CBP) ...... 15 Domestic Nuclear Detection Office (DNDO) ...... 17 Federal Emergency Management Agency (FEMA) ...... 21 Federal Law Enforcement Training Centers (FLETC) ...... 24 Office of Health Affairs (OHA) ...... 24 U.S. Immigration and Customs Enforcement (ICE) ...... 25 Office of Intelligence and Analysis (I&A) ...... 34 National Protection and Programs Directorate (NPPD) ...... 36 Privacy Office (PRIV) ...... 50 Science and Technology Directorate (S&T) ...... 51 U.S. Secret Service (Secret Service) ...... 54 Transportation Security Administration (TSA) ...... 57

5 3/1/16

Department-Wide officer’s ability to provide Resources emergency first aid for (Federal, State, or Local); traumatic and non-traumatic Federal Employee affiliated Active Shooter Preparedness injuries during an active with the system Resources. The Department of threat scenario; and or intelligence communities; Homeland Security offers a  Tactical Medical First military personnel; and number of resources to state and Responder (8 hour) governmental agencies local law enforcement for Training Program (TMFR). associated with infrastructure responding to active shooter protection of the United States. incidents. These training programs are The Portal also shares designed to provide law Unclassified FOUO or SBU Active Shooter Preparedness enforcement officers with the information with private sector resources include a desk threat awareness, analytical partners, civilian security reference guide; a poster; and a knowledge, tactical skills, and personnel, corporate executives, pocket-size reference card to emergency first aid skills which academic institution employees, address how employees, are needed to successfully serve first responders (including managers, training staff, and as a law enforcement first firemen and EMS), international human resources personnel can responder in an active partners, religious leaders, and mitigate the risk of, and shooter/threat situation. They other state and local partners appropriately react in the event are conducted at selected that are not law enforcement of an active shooter situation. venues throughout the country, personnel, as appropriate. The To access all of these resources, hosted by a local law portal provides users and visit www.dhs.gov/active- enforcement agency or at one of training practitioners with shooter-preparedness. FLETC’s training delivery accurate, appropriate, and Materials are also available in points which are located in relevant CVE and Active Spanish. Artesia, NM; Charleston, SC; Shooter training development Cheltenham, MD; and Glynco, resources, subject matter expert The Federal Law Enforcement GA. To learn more about information, and outreach Training Centers (FLETC) offer FLETC training courses initiatives. It also has forums to tuition-free or low-cost training available to state, local, and provide feedback, products courses, including an Active tribal law enforcement and for useful to others, and allows Shooter Threat Training contact information, visit participants to ask questions Portfolio that includes the https://www.fletc.gov/state- concerning CVE or the Active following training programs: local-tribal or contact Shooter Program. Persons with [email protected]. a job-related duty, public  Active Shooter Threat service interest, or who support Training Program (ASTTP) Within the Homeland Security a CVE and/or Active Shooter – covers fundalmental/basic Information Network (HSIN), program can request access into skills; the Joint DHS and FBI this Portal. Work-related  Active Shooter Threat Countering Violent Extremism information is needed to ensure Instructor Training (CVE) and Active Shooter Web members are provided the Program (ASTITP) – Portal provides a forum to share appropriate accesses and their instructor level, “train-the- Unclassified For Official Use work activities justify a need to trainor” program; Only (FOUO), Sensitive but know. This information is used  Basic Tactical Medical Unclassified (SBU), and Law to nominate the user into HSIN. Training Program (BTMTP) Enforcement Sensitive (LES) The user will then receive an – provide skills to enhance Information with anyone who is email to validate their the law enforcement a sworn, full-time, salaried, information. To request access,

6 3/1/16

email: [email protected]. or, contact aftermath of a natural disaster, Provide the following [email protected]. act of terrorism, or man-made information in the body of the disaster. The DHS COP email: You can also report tips to the architecture coupled with data 1. Full Name; ICE Tip line at 866-DHS-2- from Homeland Security 2. Place of Employment; ICE, or 866-347-2423. partners and Homeland Security 3. Job Title; Information Network (HSIN), 4. Work Email Address; Specific Blue Campaign provides actionable 5. Work Phone Number; training products include: information, enhanced 6. Short Job Description as contextual understanding, and it Relates to CVE or  Web-based training about geospatial awareness. This Active Shooter. the indicators of human enables government and private trafficking; sector leaders to make timely Blue Campaign to Fight  Roll call videos explaining and informed decisions, and Human Trafficking. DHS is how available immigration identify courses of action during responsible for investigating relief for foreign victims an event or threat situation. The human trafficking, arresting provide a benefit to law DHS COP provides users a traffickers, and protecting enforcement; broad set of capabilities based victims. The Department also  Scenario based videos on best-in-class technologies provides immigration relief to depicting indicators of sex that deliver a rich, end user victims of human trafficking. trafficking and labor experience through a web- The Blue Campaign is the trafficking; accessible interface. unified voice for the DHS’  Printed educational and The DHS COP is an application efforts to combat human reference materials for law that supports the DHS mission trafficking. Working in enforcement, non- of responding to threats and collaboration with law governmental organizations, hazards to the nation by enforcement, government, non- judicial officials, first collecting, sharing, and governmental, and private responders, school staff, and displaying multi-dimensional organizations, the Blue victims or potential victims; information that facilitates Campaign strives to protect the and collaborative planning and basic right of freedom and to  Human trafficking responses to these threats. For bring those who exploit human awareness posters and more information, contact lives to justice. Increased public service [email protected]. awareness and training will lead announcements. to more tips to law enforcement, Homeland Security which results in more victims To access these and other Information Network (HSIN) being identified. We cannot do products, visit is a national secure and trusted this alone so please join us in www.dhs.gov/bluecampaign. web-based portal for the fight to end human information sharing and trafficking. Visit the Blue Common Operating Picture collaboration between federal, Campaign website to learn (COP) is a suite of capabilities state, local, tribal, territorial, about how we can work that provides government and private sector, and international together and to find out about private sector Homeland partners engaged in the available training, outreach Security Enterprise homeland security mission. materials, and victim assistance. professionals with enhanced Using a single login credential, To learn more, visit situational awareness to HSIN provides secure access www.dhs.gov/bluecampaign facilitate timely decision from multiple networks such as support prior to or in the LEEP, RISSnet, Intelink, and

7 3/1/16

Tripwire. HSIN is made up of terrorism and anti-terrorism of immigrants by providing growing network of crime related efforts. For more accurate and useful information communities, called information about the initiative, to our customers, granting Communities of Interest (COI). visit immigration and citizenship COIs are organized by state www.dhs.gov/ifyouseesomethin benefits, promoting an organizations, federal gsaysomething. awareness and understanding of organizations, or mission areas citizenship, and ensuring the such as emergency National Terrorism Advisory integrity of our immigration management, law enforcement, System (NTAS) has replaced system. Read the full mission critical sectors, and intelligence. the Homeland Security statement at Users can securely share within Advisory System as our www.uscis.gov/aboutus. their communities or reach out nation’s primary domestic to other communities as needed. terrorism alerting resource. Avoid Scams is a webpage for HSIN provides secure, real-time This system more effectively the public to find information collaboration tools, including a communicates information about how to recognize and virtual meeting space, instant about terrorist threats by report immigration scams and messaging, and document providing timely, detailed the unauthorized practice of sharing. HSIN allows partners information to the public, immigration law, and how to to work together instantly, government agencies, first find authorized help with regardless of their location, to responders, airports and other immigration services. To learn communicate, collaborate, and transportation hubs, and the more, visit coordinate. This enables private sector. It recognizes www.uscis.gov/avoidscams, or government and private sector that Americans all share www.uscis.gov/eviteestafas in leaders to make timely and responsibility for the nation’s Spanish. informed decisions, and identify security, and should always be courses of action during an aware of the heightened risk of Fraud Detection and National event or threat situation. For terrorist attack in the U.S. and Security (FDNS) Units. USCIS more information, visit what they should do. After Field Operations Directorate www.dhs.gov/HSIN. reviewing the available FDNS Units are staffed with information, the Secretary of immigration officers, who are "If You See Something, Say Homeland Security will decide, well-versed in immigration Something™". The in coordination with other related fraud and national nationwide "If You See federal entities, whether an security issues. Immigration Something, Say Something™" NTAS Alert should be issued. officers not only assist in the public awareness campaign is a For more information, visit adjudications of immigration simple and effective program to www.dhs.gov/national- benefit applications, but also raise public awareness of terrorism-advisory-system. support programs sponsored by indicators of terrorism and law enforcement agencies, such terrorism-related crime, and to as Joint Terrorism Task Forces emphasize the importance of U.S. Citizenship and (JTTFs), Document and Benefit reporting suspicious activity to Immigration Services Fraud Task Forces (DBFTFs), the proper local law (USCIS) and state and local fusion enforcement authorities. The centers. Immigraiton officers campaign was originally used participation in these programs by New York's Metropolitan USCIS is the government may be full-time, part-time, or Transportation Authority, which agency that oversees lawful virtual support. Immigration has licensed the use of the immigration to the United officers conduct administrative slogan to DHS for anti- States. USCIS will secure site visits and provide general America’s promise as a nation 8 3/1/16

or case-specific immigration "S" category. Requests for “S” and transparent communication information to law enforcement status are processed through the and to seek feedback regarding agencies under DHS guidance. requesting agency, the policies, priorities, and Currently there are more than Department of Justice, and organizational performance 60 immigration officers in the ultimately USCIS FDNS. reviews. For more information, JTTF Program, and 25 visit www.uscis.gov or contact immigraiton officers in most of Notional immigration [email protected]. the 21 ICE-led DBFTFs. In documents are genuine addition, designated immigration documents issued USCIS Resources is a webpage immigration officers in all 26 to individuals who do not with links to a variety of District Offices have made possess the associated publications and other materials positive contact with a point-of- immigration status. These for USCIS customers, the contact at state and local fusio documents are issued in organizations that serve them, ncenters, usually the DHS I&A furtherance of law enforcement and the public. Visit representative. For more investigations in order to create www.uscis.gov/resources. information, please contact the appearance that an [email protected] individual possesses or has been USCIS provides the latest hs.gov. approved for a particular version of its applications and immigration status. Law petitions on its website. All Law Enforcement Support enforcement requests for forms are free and available at Operation Unit. USCIS’s notional documents are www.uscis.gov/forms. For Fraud Detection and National submitted to U.S. Immigration more information, contact Security (FDNS) Directorate and Customs Enforcement [email protected]. has developed a centralized (ICE), which reviews the operation to administer the S notional document request to T and U Nonimmigrant Visa Program and facilitate the ensure that documents are being Status (“T Visas” and “U issuance of notional (“cover”) requested for a legitimate Visas”) for Victims of Human immigration documents. investigative purpose. If ICE Trafficking and Other believes the document request is Qualifying Crimes. The T visa The S visa program is available appropriate, USCIS will is generally available for for aliens who possess “critical consider production of the victims of human trafficking reliable information concerning requested document. For more who have complied with any a criminal organization or information, visit reasonable request for enterprise,” who are willing to http://www.uscis.gov/green- assistance in the investigation or share or have shared their card/other-ways-get-green- prosecution of the human information with a U.S. law card/green-card-informant-s- trafficking, and who meet other enforcement agency or court nonimmigrant. requirements. The U visa is and whose presence in the U.S. generally available for victims is necessary for the successful USCIS’s Public Engagement of certain qualifying crimes prosecution of criminal activity. Division (PED) seeks to focus who have been, are being, or are The S-6 visa is available to on open, candid, and likely to be helpful to law aliens possessing "critical constructive collaboration with enforcement in the investigation reliable information" regarding community stakeholders at all or prosecution of the crime, and terrorist activity. State and levels. PED is dedicated to who meet other requirements. federal law enforcement coordinating and directing Federal, state, local, tribal or authorities (including federal or agency-wide dialogue with territorial law enforcement state courts and U.S. attorneys) external stakeholders to actively agencies may sign a law can initiate a request under the collaborate and maintain open enforcement certification for the

9 3/1/16

victim detailing the crime and ion/u-visa-law-enforcement- T_U_VAWATraining@usci the victim’s cooperation in the certification-resource-guide. s.dhs.gov. investigation or prosecution. U visa petitioners are required to  Information for Law submit this law enforcement Enforcement Agencies and Citizenship and certification with their Form I- Judges. USCIS has a Immigration Services 918, Petition for U webpage for law Ombudsman Nonimmigrant Status, and T enforcement agencies and visa applicants may submit a judges that explains the (Ombudsman’s Office) law enforcement certification different types of benefits with their Form I-914, available for victims of The Ombudsman’s Office is Application for T human trafficking and other available to help law Nonimmigrant Status. The crimes. It also describes enforcement with issues or investigating or prosecuting law procedures for law concerns that they have enforcement agency does not enforcement, including a list regarding their interactions with apply to USCIS for a T or U of “Important Things to USCIS. The Ombudsman’s visa on the victim’s behalf. The Remember.” Other Office is an independent, victim applies to USCIS T and materials include roll call impartial, and confidential U visa and USCIS reviews the videos, information about office within DHS that helps request and all submitted continued presence (a individuals and employers evidence to determine temporary immigration resolve problems with USCIS eligibility. Related resources status administered by ICE applications and petitions. The include: for victims of human office also makes trafficking), and links to the recommendations to fix  The U and T Visa Law T visa declaration form and systemic problems and improve Enforcement Resource U visa certification form. the overall delivery of services Guide provides law Both of these forms are provided by USCIS. enforcement officials completed by the information about U and T investigating or prosecuting Send Your Recommendations visa requirements, the law agency but submitted to to the Ombudsman’s Office. enforcement certification USCIS by the victim. For The Ombudsman is dedicated to process, and answers to more information, visit identifying systemic issues in frequently asked questions www.uscis.gov/tools/resour the immigration benefits from law enforcement ces/information-law- process and preparing agencies to support enforcement-agencies-and- recommendations for investigations and judges. For law submission to USCIS for prosecutions involving enforcement inquiries, process changes. Send immigrant victims of human contact examples of identified issues trafficking and other crimes. LawEnforcement_UTVAW and suggestions to Included in the guide is a [email protected]. [email protected]. selection of best practices Submit a Request for Case and a frequently asked  In-Person and Web-Based questions section that draws Training. USCIS offers in Assistance to the Ombudsman’s Office. If you, upon questions received by person and web-based or someone you are working state and local law presentations for law with, are experiencing problems enforcement. The guide is enforcement on T and U during the adjudication of an available electronically at visas. If interested, contact immigration benefit with http://www.dhs.gov/publicat USCIS at USCIS, you can submit an 10 3/1/16

electronic DHS Form 7001 Civil Rights Requirements in available to state and local law through the Ombudsman Online Federally-Assisted Programs. enforcement. Case Assistance system. To CRCL provides resources, For more information, visit submit a request for assistance guidance, and technical www.dhs.gov/civil-rights-and- on behalf of another, follow the assistance to recipients of DHS civil-liberties-institute. form instructions to ensure the financial assistance on appropriate party consents to complying with Title VI of the Educational posters in your submission of the request Civil Rights Act of 1964 (Title customizable digital and hard for assistance. For more VI) Section 504 of the copy form can be ordered from information, see Rehabilitation Act of 1973, and the DHS CRCL by emailing www.dhs.gov/case-assistance. related statutes. [email protected]. Information for recipients on meeting their nondiscrimination Community Roundtables. Office for Civil Rights and requirements under Title VI is CRCL leads, or plays a Civil Liberties available on CRCL’s website, significant role, in regular (CRCL) www.dhs.gov/title-vi-overview- roundtable meetings across the recipients-dhs-financial- country in over 14 U.S. cities.

assistance. These roundtables bring DHS CRCL is available to help exceptionally diverse law enforcement with issues CRCL also published guidance demographic communities relating to the DHS mission and to help those who carry out together with federal, state, the protection of civil rights and Department-supported activities local, tribal, and territorial civil liberties. CRCL works to understand and implement government representatives. with other DHS offices and their obligations under Title VI Issues discussed range from components to develop policies, to provide meaningful access immigration and border issues programs, and training material. for people with limited English to civil rights issues in aviation It also investigates complaints proficiency security. CRCL also conducts alleging violation of rights, (www.dhs.gov/guidance- roundtables with young leaders programs, or policies by DHS published-help-department- of diverse communities. For employees, leading to supported-organizations- more information, contact recommendations to fix provide-meaningful-access- [email protected] identified problems and help people-limited). For more .gov. DHS safeguard the nation while information, please contact preserving individual liberty, [email protected]. Countering Violent fairness, and equality under the Extremism (CVE) Training law. Common Muslim American Guidance and Best Practices.

Head Coverings and Common This written guidance provides CRCL is also responsible for Sikh American Head best practices for federal, state, assuring that the Department’s Coverings Posters provide and local government and law federally-assisted programs guidance to Department enforcement officials comply with various civil right personnel on the appropriate organizing CVE, cultural laws, including but not limited ways in which to screen and, if awareness, and counterterrorism to Title VI of the Civil Rights necessary, search Muslim or training. Act of 1964, as amended; Title Sikh individuals wearing For more information, visit IX of the Education various types of religious head www.dhs.gov/civil-rights-and- Amendments of 1972, as coverings. Although these civil-liberties-institute. amended; and the Rehabilitation posters are primarily designed Act of 1973, as amended. for DHS personnel, they are

11 3/1/16

CRCL Impact Assessments Officers. Developed by CRCL course of their duties. For more review Department programs, in partnership with the information, visit policies, and activities to Department of Justice (DOJ), http://www.dhs.gov/civil-rights- determine whether these this training reviews the DOJ and-civil-liberties-institute or initiatives have an impact on the guidance regarding racial contact civil rights and civil liberties of profiling. [email protected]. those affected by the initiative. Duration: 20 minutes. CD- For more information about ROMs can be ordered from “I Speak” Language CRCL Impact Assessments, CRCL by emailing Identification Pocket Guides visit www.dhs.gov/crcl. [email protected]. and Posters. CRCL has created a set of three tools (“I DHS Complaint Avenues How to File and Submit a Speak” poster, pocket guide, Guide. DHS has many avenues Complaint. Under 6 U.S.C. § and job aid) for use by state and for the public to make complaints 345 and 42 U.S.C. § 2000ee-1, local law enforcement officers involving DHS employees or CRCL reviews and assesses and sheriffs who work directly programs, alleged violations of information concerning abuses with the public and who may civil rights and civil liberties, of civil rights, civil liberties, need to identify the language of immigration filing, travel redress, and profiling on the basis of the person with whom they are and other types of grievances. race, ethnicity, or religion, by interacting. These tools support CRCL developed a guide which employees and officials of the Limited English Proficiency brings together information about DHS. Complaints are accepted plans that many ’s offices these avenues. For more in languages other than English. have put in place to meet the information, visit: For more information, visit requirements of Title VI of the http://www.dhs.gov/sites/default/ www.dhs.gov/crcl. Civil Rights Act. The “I files/publications/dhs-complaint- Speak” format includes 75 of avenues-guide_10-03-12_0.pdf Introduction to Arab the most frequently encountered

American and Muslim languages, as well as 13 of the CRCL Newsletter is American Cultures is an hour- indigenous languages of distributed monthly to inform long training DVD, released in Mexico and Central America. stakeholders and the public the fall of 2006, that provides For more information, digital about office activities, including insights from four national and copies, samples, or how to make complaints; international experts, including customization of a low literacy ongoing and upcoming projects; an Assistant U.S. Attorney who version, email and opportunities to offer is a practicing Muslim; a [email protected]. comments and feedback. member of the National Newsletters are distributed via Security Council who is a Privacy, Civil Rights & Civil an email list to thousands of practicing Muslim; a scholar of Liberties Fusion Center non-governmental Islamic studies; and a civil Training Program. The organizations, community rights attorney who advocates Implementing members, and government on issues of concern to Arab Recommendations of the 9/11 partners, and made available to American and Muslim Commission Act requires that community groups for American communities. The DHS support fusion centers by redistribution. For more training assists law enforcement providing training on privacy, information, visit officers and other personnel civil rights, and civil liberties. http://www.dhs.gov/publication/ who interact with Arab and As a result, CRCL and the DHS crcl-newsletter. Muslim Americans, as well as Privacy Office have partnered

individuals from Arab or with the DHS Office of Guidance Regarding Use of Muslim communities in the Intelligence & Analysis and the Race for Law Enforcement

12 3/1/16

DOJ Bureau of Justice The First Three to Five Available at: Assistance to deliver this Seconds: Arab and Muslim www.it.ojp.gov/PrivacyLiberty. training program. The program Cultural Awareness for Law has included: A website Enforcement. This course is resource center intended to help law United States Coast Guard www.it.ojp.gov/PrivacyLiberty; enforcement personnel to better (USCG) a training of Privacy/Civil understand the culture of Arab Liberties Officers program; a and Muslim Americans, USCG has a wide array of technical assistance program; including topics such as why an surface, air, and specialized and an on-site training program. individual’s name may differ assets and capabilities available Topics covered include: civil among documents and general for multiple levels of response, rights and civil liberties basics background on Islam in the patrol, and mission specific and red flags (how to spot United States. This video was tasks. potential issues and incorporate developed by the DOJ safeguards into your Community Relations Service Surface platforms consist of procedures); privacy and reproduced by DHS. boats and larger cutters. fundamentals (how to integrate Duration: 10 minutes. Vessels under 65 feet in length your privacy policy and are classified as boats and recognize and respond to a For more information, visit usually operate near shore on privacy incident); cultural www.dhs.gov/civil-rights-and- inland waterways and from tactics for intelligence and law civil-liberties-institute. This cutters. Craft include: Motor enforcement professionals site also offers a transcript and Lifeboats; Medium and Small (covers frequently encountered limited resources and glossary. Response Boats; special misconceptions and stereotypes You may order DVDs from purpose response boats; port and addresses policies against CRCL by emailing security boats; Aids to racial or ethnic profiling); and [email protected]. Navigation boats; and a variety First Amendment issues in the of smaller, non-standard boats information sharing Web Portal for Privacy and including rigid hull inflatable environment (covers Civil Rights & Civil Liberties boats. Sizes range from 64-foot considerations when fusion Officers. This portal provides in length down to 12-foot. centers may encounter training materials and video Cutters are basically any constitutionally protected resources for state and local commissioned USCG vessel 65 activities, such as freedom of personnel and trainers on feet in length or greater, having speech, demonstrations, privacy, civil rights, and civil adequate accommodations for petitions for redress, etc.). liberties issues encountered by crew to live onboard. Cutters Fusion centers and their liaison fusion centers and justice usually have one or more rigid officer networks have the option entities. The recently updated hull inflatable boats onboard. of choosing additional topics to web portal includes over 30 Polar Class icebreakers also create a customized agenda. pages of new content carry an Arctic Survey Boat and Technical assistance is also specifically geared toward Landing Craft. The USCG available. privacy and civil rights and civil cutter fleet ranges from a 420- Duration: Full-day (eight liberties officers. The portal foot Icebreaker to a 65-foot hours) but can be customized to was developed as a result of a harbor tug, however, most shorter sessions. For more partnership between CRCL, commonly recognized and information, email Privacy Officers, and the DHS widely utilized are National [email protected]. Office of Intelligence and Security Cutters, High and gov. Analysis. Medium Endurance Cutters (420-foot, 378-foot, 270-foot,

13 3/1/16

and 210-foot) and our smaller Operations; Chemical, positioning and navigation. For 87-foot Marine Protector Biological, Radiological, more information, visit Class,110-foot Island Class, and Nuclear and Enhanced http://www.navcen.uscg.gov/ or 154-foot Sentinel Class patrol Conventional Weapons call 703-313-5900. vessels. (CBRNE) Detection and Identification; Disaster USCG Sector Command There are a total of 190 aircraft Response; Environmental Centers. Given USCG mission in Coast Guard inventory, a Response; Deployable Incident diversity, asset readiness status figure that will fluctuate due to Management; Advanced and ongoing operations, the operational and maintenance Planning; and multiple main avenue for proper and schedules. Major Missions supporting capabilities. expeditious USCG asset consist of Search/Rescue, Law mobilization requests are Enforcement, Environmental America’s Waterways Watch through USCG Sector Response, Ice Operations, and is a combined effort of the Command Centers. There are Air Interdiction. Fixed-wing USCG and its Reserve and 37 USCG Sectors. aircraft (C-130 Hercules and C- Auxiliary components to enlist 144 Ocean Sentry turboprops) the active participation of those Commands throughout the operate from large and small who live, work, or play around U.S. and U.S. territories:

Air Stations. Rotary wing America's waterfront areas. For Sector Command Centers aircraft (H-65 Dolphin and HH- more information, contact Sector Name Locations 24/7 Contact Anchorage Anchorage, AK 907-428-4100 60 Jayhawk helicopters) operate [email protected] or visit Baltimore Baltimore, MD 410-576-2693 Boston Boston, MA 617-223-5757 from flight-deck equipped http://americaswaterwaywatch.u Buffalo Buffalo, NY 716-843-9527 Cutters, Air Stations, and Air scg.mil. To report suspicious Charleston Charleston, SC 843-740-7050 Columbia River Warrenton, OR 503-861-6211 Facilities. activity call 877-24WATCH Corpus Christi, Corpus Christi 361-939-6393 TX (877-249-2824). Delaware Bay Philadelphia, PA 215-271-4940 USCG Deployable Specialized Detroit Detroit, MI 313-568-9560 Guam Santa Rita, Guam 671-355-4824 Forces (DSF) provides USCG Maritime Information Hampton Roads Portsmouth, VA 757-668-5555 additional teams and resources eXchange (“CGMIX”) makes Honolulu Honolulu, HI 808-842-2600 Houston- Houston, TX 281-464-4854 such as Maritime Safety and USCG maritime information Galveston McKinleyville, Humboldt Bay 707-839-6123 Security Teams (11), Port available to the public on the CA Atlantic Beach, Security Units (8), Tactical Law internet in the form of Jacksonville 904-564-7511 FL Enforcement Teams (2), searchable databases. Much of Juneau Juneau, AK 907-463-2980 Key West Key West, FL 305-292-8727 Maritime Security Response the information on the CGMIX Lake Michigan Milwaukee, WI 414-747-7182 Team (1), National Strike Force website comes from the LA-Long Beach San Pedro, CA 310-521-3600 Lower Memphis, TN 901-521-4822 and Regional Dive Lockers (2). USCG’s Marine Information for Mississippi Long Island New Haven, CT 800-774-8724 DSF teams are capable of Safety and Law Enforcement Miami Miami Beach, FL 305-535-4472 worldwide deployment via air, (MISLE) information system. Mobile Mobile, AL 251-411-6211 New Orleans New Orleans, LA 800-874-2153 ground or sea transportation in For more information, visit New York Staten Island, NY 718-354-4120 response to changing threat http://cgmix.uscg.mil/. North Bend North Bend, OR 541-756-9220 North Carolina Wilmington, NC 910-343-3880 Northern New South Portland, conditions and evolving 207-767-0303 England ME Maritime Homeland Security USCG Navigation Center Ohio Valley Louisville, KY 502-779-5400 mission requirements. Core supports safe and efficient Puget Sound Seattle, WA 206-217-6001 San Diego San Diego, CA 619-278-7000 capabilities include: Enhanced maritime transportation by San Francisco, San Francisco 415-399-3300 CA Law Enforcement Boardings; delivering accurate and timely San Juan San Juan, PR 787-289-2041 Sault Ste. Marie, Waterside Security/Force maritime information services Sault Ste. Marie 906-632-0967 MI Protection; Landside and Global Position System Southeastern Woods Hole, MA 508-457-3211 New England Security/Force Protection; Port (GPS) augmentation signals that St. Petersburg St. Petersburg, FL 727-824-7506 Upper Security; Subsurface permit high-precision St. Louis, MO 314-269-2500 Mississippi

14 3/1/16

Office of Community designed to help communities and assistance to international Partnerships (OCP) and law enforcement develop air carriers related to the necessary understanding of admissibility and fraudulent DHS has relaunched its al-Qa’ida, al-Shabaab, Islamic document detection in order to Countering Violent Extremism State of Iraq and the Levant encourage carrier compliance (CVE) public webpage in 2014 (ISIL), and related affiliates’ with U.S. immigration laws. and it will undergo further recruitment tactics and explore For more information about the revision this year. On the ways to collectively and Carrier Liaison Program, visit webpage, individuals can find holistically address these threats www.cbp.gov/travel/travel- information about the before they become a challenge industry-personnel/carrier- Department’s approach and at the local level. Due to the liaison-prog or contact resources such as a CVE tool- increased number of Western- [email protected] or 202-621- kit, information on “Building based fighters traveling to 7817. Communities of Trust”, and foreign war conflicts, such as information on how to apply for Syria and Somalia, the CAB CBP Border Community access to the DHS-FBI CVE now includes information Liaison Program. Border Training Resources and Active relating to the foreign fighter Community Liaisons focus on Shooter Webportal. The recruitment narrative by al outreach to community webpage is further being Shabaab and ISIL, and the stakeholders and provide fact- updated with resources and myths versus realities of the based information regarding the relevant links. You can access situation in Syria and Somalia. CBP mission, functions, the Department’s CVE landing authorities, and responsibilities. page at: To learn more about the CAB Border Community Liaisons http://www.dhs.gov/topic/count please email: nationwide can be assessed ering-violent-extremism#. [email protected]. through the CBP State, Local, Tribal Liaison Office at 202- Enhanced Engagement and 325-0775 or by emailing CBP- Training Resources. U.S. Customs and Border STATE-LOCAL-TRIBAL- The Community Awareness Protection (CBP) [email protected]. Briefings (CAB) To enhance engagement efforts CBP is one of the DHS’ largest CBP Information Center and provide awareness training and most complex components, provides general information in regards to CVE, DHS, in with a priority mission of about CBP requirements and partnership with the National keeping terrorists and their procedures, as well as handling Counterterrorism Center weapons out of the United the intake for complaints related (NCTC), developed and is States. It also has a to CBP interactions. The CBP delivering the CAB. This responsibility for securing the INFO Center also maintains an briefing has been conducted in border and facilitating lawful on-line database of Q&A’s cities across the country to international trade and travel covering all aspects of customs communities and state, local, while enforcing hundreds of and immigration operations. and federal law enforcement. U.S. laws and regulations, The CBP INFO Center can be including immigration and reached at 877-CBP-5511 or The CAB is designed to share customs laws. For more 202-325-8000 or by visiting unclassified information information, visit www.cbp.gov https://help.cbp.gov/app/home. regarding the threat of violent or contact 202-344-1700. extremism. The CAB has been CBP Laboratories and conducted in 14 U.S. cities over Carrier Liaison Program Scientific Services coordinates the past few years. It is provides standardized training technical and scientific support

15 3/1/16

to all CBP and DHS-wide trade _enganes/ or contact Laurel policy pertaining to border and border protection activities Smith at [email protected] security, trade, and facilitation including laboratory analysis or 202-344-1582. can be referred to the SLT at for trade enforcement and CBP-STATE-LOCAL- product safety, forensic services Port of Entry Information. TRIBAL- for criminal investigations, and CBP enforces the import and [email protected] or 202- 24/7 telephonic access to export laws and regulations of 325-0775. scientific resources for technical the U.S. Federal Government, case adjudication for processes international Suspicious Aircraft or Boats. radiation/nuclear materials and passengers and cargo, and The CBP Air and Marine other potential weapons of mass performs agriculture inspections Operations Center (AMOC) is effect. For more information, at ports of entry. Port personnel responsible for securing the visit www.cbp.gov\about\labs- are the face at the border for airspace at and beyond our scientific-svcs. most cargo and persons entering Nation’s borders through the United States. For a list of detection, monitoring, sorting Intellectual Property Rights ports, visit and interdiction of general (IPR) Help Desk. CBP’s IPR http://cbp.gov/xp/cgov/toolbox/ aviation and maritime threats. Help Desk provides information contacts/ports/. Suspicious air or maritime on IPR border enforcement activity to include low flying procedures and receives Preventing International Non- aircraft and drug or human allegations of IPR infringement. Custodial Parental Child smuggling activity should be Questions regarding IPR Abduction. DHS CBP directed to AMOC at 1-866- enforcement at U.S. borders and partners with the Department of AIRBUST. information on IPR infringing State’s (DOS) Office of goods that may be entering the Children’s Issues to prevent the Tip Line. Suspicious activity U.S. can be directed to the IPR international abduction of regarding international travel Help Desk at 562-980-3119 ext. children involved in custody and trade can be reported to 252, or via email at disputes or otherwise against CBP at 1-800-BE-ALERT. [email protected]. the published order of the court. If you are concerned about the Visa Waiver Program (VWP) Missing or Late International international travel of a child, enables citizens and nationals Travelers. Information please contact the DOS Office from 38 countries to travel to regarding reported missing or of Children’s Issues at and enter the U.S. for business late international travelers can [email protected] or or visitor purposes for up to 90 be obtained from the nearest the 24 hour hotline 888-407- days without obtaining a visa. port of entry. For a list of ports, 4747. For more information about the visit Visa Waiver Program, visit http://cbp.gov/xp/cgov/toolbox/ State, Local and Tribal http://www.cbp.gov/travel/inter contacts/ports/. Liaison. A component of the national-visitors/visa-waiver- CBP Commissioner’s Office, program. No Te Engañes (Don’t be the State, Local, and Tribal Fooled) is the CBP outreach Liaison strives to build and campaign to raise awareness of maintain effective relationships human trafficking among with state, local, and tribal potential migrants. For more governments through regular, information, visit transparent, and proactive www.cbp.gov/xp/cgov/border_s communication. Governmental ecurity/human_trafficking/no_te questions regarding issues and

16 3/1/16

Domestic Nuclear resources that are available to methods to answer scientific Detection Office assist federal, state, local, tribal, and technical questions posed (DNDO) and territorial entities in by DNDO stakeholders related selecting the right R/N detection to the radiological detection

equipment to meet their mission. For more information DNDO is a jointly staffed office operational needs. contact the DMAMC at within DHS. DNDO is the [email protected] primary entity in the U.S. DNDO has conducted several government for implementing equipment test campaigns to The GRaDER® Program. domestic radiological and evaluate the effectiveness of GRaDER® provides objective nuclear (R/N) detection efforts detection systems in multiple and reliable performance testing for a managed and coordinated performance areas to better information to federal, state, response to R/N threats, as well support R/N detection and local stakeholders for R/N as integration of federal nuclear procurement decisions and detection equipment tested forensics programs. DNDO is concept of operations against consensus and technical charged with coordinating the development by federal, state, capability standards to assist in development of the global local, tribal, and territorial making informed R/N detection nuclear detection and reporting stakeholders. equipment procurements. For architecture, with partners from more information, visit federal, state, local, tribal, These test campaigns have www.dhs.gov/GRaDER or territorial, and international included detection system email governments and the private categories such as: radiation [email protected] sector. For more information, isotope identification devices v. visit www.dhs.gov/about- (RIIDs), personal radiation domestic-nuclear-detection- detectors (PRDs), backpacks, Joint Analysis Center (JAC). office or contact and mobile systems (vehicle- The JAC, located within [email protected]. mounted, boat-mounted, and DNDO, provides awareness of

aerial-mounted). the Global Nuclear Detection Equipment Test Results. Architecture (GNDA) and Federal, state, local, tribal, and When test reports are completed provides technical support to territorial agencies intending to and are available for release, federal, state, local, tribal, and purchase R/N detection federal, state, local, tribal, and territorial authorities. Utilizing equipment are strongly territorial stakeholders are the Joint Analysis Center encouraged to consider notified via DNDO Operations Collaborative Information instruments that have been Support Directorate’s weekly System (JACCIS), the JAC independently tested by newsletter, The Source. To be facilitates R/N alarm accredited laboratories and have added to the distribution list for adjudication from detection demonstrated conformity with The Source, simply email a events and consolidates and the applicable American request to shares information and National Standards Institute/ [email protected]. databases. Institute of Electrical and

Electronics Engineers The Data Mining, Analysis, GNDA Awareness is achieved (ANSI/IEEE) N42 standards. and Modeling Cell (DMAMC) by establishing and maintaining Manufacturers offering new is a team of subject matter links to detectors and access to equipment for consideration experts from the radiation Nuclear Regulatory should be asked to provide detection community Commission and Agreement evidence of independent testing responsible for leveraging State Material Licensing Data. for compliance with these existing data and analysis GNDA Awareness also depends standards. DNDO has 17 3/1/16

upon non-time critical Mobile Detection Deployment integrate these capabilities into requirements such as access to Units (MDDU). existing operations. historical data on all detection Collaboration between federal, events (illicit and legitimate) state, local, tribal, and territorial Federal, state, local, tribal, and and access to information about law enforcement and public territorial agencies may request commerce and related R/N safety agencies is crucial to a an MDDU by contacting infrastructure that affects layered approach to radiological DNDO at detection assets and response and nuclear security. DNDO [email protected] protocols. developed the MDDU as a hs.gov surge asset to assist federal, JACCIS provides federal, state, state, local, tribal, and territorial Open Access to American local, tribal, and territorial agencies detect and report National Standards Institute stakeholders adjudication radiological and nuclear (ANSI) N42 Series Standards. connectivity, a detector threats. The MDDU was DNDO sponsors the Institute of database, and status information designed to supplement Electrical and Electronics regarding the events and radiological and nuclear Engineers (IEEE) to provide activities relating to R/N detection capabilities in support copies of the ANSI N42 detection and nuclear forensics of national and special security Radiation Detection Standards at the “Unclassified//For events, or in response to an free of charge to anyone who Official Use Only” level. In intelligence-driven event. wants a copy. The website to this capacity, JACCIS maintains obtain the latest published awareness of the GNDA, which MDDUs are mobile trailer version of one of the sponsored involves facilitating alarm packages containing radiation standards is adjudication and monitoring detection equipment for up to http://standards.ieee.org/about/g global efforts in R/N detection. 40 public safety et/. JACCIS is completely web professionals. MDDU packages enabled so connectivity is are prepositioned across the Radiological and Nuclear possible anywhere in the United States and are Detection Exercises. DNDO’s country in real-time and utilizes maintained and deployed for Exercises Program provides an agile development process to DNDO by U.S. Department of support in developing, release updates every quarter. Energy (DOE) Radiological designing, and conducting The JAC provides information Assistance Program (RAP) discussion or operational-based integration and analysis coupled personnel. The equipment R/N detection exercises that are with awareness of the GNDA. includes personal radiation compliant with the Homeland This enables the right detection devices, portable Security Exercise and information to be available at backpack radiation detection Evaluation Program the point of detection and units, high and low-resolution methodology. Exercises ensures that detection events radiation identification hand- provide valuable hands-on result in either a proper held instruments, mobile experience for federal, state, response to a threat or a quick radiation detection systems, and and local personnel performing dismissal of a non-threat. To interoperable communications R/N detection missions and contact the JAC, call 866-789- and tracking equipment. Each assist decision makers in 8304 or e-mail MDDU is accompanied by integrating the R/N detection [email protected]. For DOE RAP technical support mission into their daily more information, visit staff to train federal, state, local, operations. Additional www.dhs.gov/about-domestic- tribal, and territorial personnel information about R/N nuclear-detection-office. on the use of the specific detection exercises is available MDDU equipment, and to help by contacting DNDO at

18 3/1/16

[email protected]. coordinated the development of development centers, and R/N detection resource types in academia directly supporting Radiological /Nuclear partnership with federal, state, nuclear detection capability Detection and Adjudication local, tribal, and territorial development at all levels of Capability Development subject matter experts to government are encouraged to Framework (CDF). The support planning and join the site with other GNDA Capability Development organization, and increases community stakeholders. To Framework (CDF) provides efficiency and effectiveness for join the R/N Detection COI, guidance to federal, state, local, sharing R/N detection resources submit a request by email to tribal, and territorial through the Emergency DNDO with a message subject stakeholders to assist Management Assistance line of: “DNDO RND COI jurisdictions in identifying and Compact and other mutual aid HSIN Access Request” to the developing recommended levels mechanisms. The NIMS-typed address: of R/N detection capability teams, equipment, and job titles [email protected]. based on risk factors and the provide a common likelihood of encountering illicit categorization of R/N detection Radiological and Nuclear R/N material. The CDF resources. FEMA is currently Detection Assistance informs stakeholders of conducting a review to include Program. DNDO works with potential gaps in their ability to these as national level tier one federal, state, local, tribal, and detect, report, and respond to resources. The latest resource territorial government policy R/N material outside of type definitions can be obtained makers, program managers, and regulatory control. It is by contacting operational administrators to intended to provide strategic [email protected]. design, implement, and sustain guidance based on best a R/N detection program. practices, but not to establish Radiological and Nuclear DNDO’s R/N Detection specific requirements. The Detection Community of Assistance Program includes CDF is a DNDO product that Interest (COI). DNDO’s R/N the development of concepts of supports the Screening, Search, Detection COI is a site located operation, standard operating and Detection Core Capability on the Homeland Security procedures, multiyear Training and can be leveraged to support Information Network (HSIN) and Exercise Plans, Sustainment investment justifications. A that provides a repository of Plans, table top exercises CDF Calculator is also available useful information on DNDO, (coordinated through the to assist jurisdictions with PRND, the Global Nuclear Exercises Program), and the identifying recommended levels Detection Architecture sharing of lessons learned and of R/N detection capability (GNDA), and other nuclear best practices. quickly and easily. The CDF detection related activities that and supporting resources are can be accessed by external The program goal is to prevent available on the Homeland users. It is also a forum where the use of an R/N terrorist Security Information Network nuclear detection community weapon against the interior or (HSIN) PRND Community of stakeholders can securely maritime portion of the United Interest (COI) web portal or by collaborate and share best States. The Assistance Program contacting practices and lessons learned. seeks to establish sustainable [email protected]. State, local, tribal, and R/N Detection capabilities territorial law enforcement, fire, among federal, state, local, Radiological/Nuclear emergency management and tribal, and territorial agencies Detection National Incident radiation health and emergency responders to Management System (NIMS) personnel, federal agencies, detect and report unauthorized Resource Types. DNDO federally-funded research and R/N materials out of regulatory

19 3/1/16

control within their National Preparedness sustain their nuclear detection jurisdictions/regions. To request Directorate. Courses are taught program over time. There are assistance or for more by the National Domestic three phases to the program. In information on DNDO’s Preparedness Consortium Phase I, STC assists state and Assistance Program, contact member: Counter-Terrorism locals in developing an initial [email protected] Operations Support (CTOS) – operating capability to detect Center for Radiological/Nuclear and report the presence of Radiological and Nuclear Training. For more nuclear materials that are out of Detection Training. DNDO’s information, visit regulatory control. The initial Training Program provides www.ctosnnsa.org/. Courses regional capabilities are quality products to support, are also available through the mutually supportive through develop, enhance and expand FEMA Federal Sponsored cooperative agreements, region R/N detection capabilities in Course catalog. FEMA FSCC specific operations, support of the GNDA. Web page: interoperable equipment, Together with other federal www.firstrespondertraining.gov collective training, and partners, the DNDO Training /webforms/pdfs/fed_catalog.pdf progressive exercise planning. Program provides instructional . For additional information In Phase II, STC provides courses in basic, intermediate, regarding R/N detection additional resources to enhance advanced, and train-the-trainer training, visit detection, analysis, R/N detection tactics, https://gnda.energy.gov or email communication, and techniques, and procedures. [email protected]. coordination to better integrate The DNDO Training Program state and local capabilities with conducts technical review, Securing the Cities (STC) Federal government activities evaluation, and continual Program. The STC Program and the GNDA beyond Phase I. developmental improvement of assists state, local, and tribal Finally, in Phase III, STC the R/N detection training stakeholders design and provides indirect support to curriculum. These reviews implement or enhance existing sustain the program. DNDO increase the operational architectures for coordinated works with regional partners to detection capabilities of federal, and integrated detection and maintain connectivity with the state, local, tribal, and territorial interdiction of nuclear materials established local architecture agencies to detect and interdict out of regulatory control that through alarm adjudication and R/N materials and/or devices. may be used as a weapon within subject matter expertise and The program seeks to develop high-threat/high-density Urban provides advice on long-term and implement protocols and Area Security Initiative (UASI) training, exercise, and other training standards for effective areas. Urban Areas selected program support. State and use of R/N detection equipment through a competitive local participants will maintain and the associated alarm application process. The and continue to improve their reporting and resolution program assists these developed capabilities to processes. DNDO and its jurisdictions by using support the GNDA using local partners have completed R/N cooperative agreements to funds or other Federal detection training for over enhance regional capabilities to Government grant funds. For 35,000 law enforcement, first detect, identify, and interdict more information, email responder personnel, and public nuclear materials that are out of [email protected]. officials through Fiscal Year regulatory control, guide the 2015. coordination of federal, state, local, and tribal entities in their R/N detection training courses roles defined by the GNDA and are available through FEMA’s encourage participants to

20 3/1/16

Federal Emergency maintained by the FEMA Grant information. For more Management Agency Programs Directorate (GPD), is information visit: (FEMA) a tool used by grantees to http://beta.fema.gov/authorized- determine allowability of equipment-list.

equipment types for FEMA’s FEMA’s mission is to support Preparedness Grant Programs. our citizens and first responders Comprehensive Preparedness The AEL is used to facilitate to ensure that as a nation we Guide 502: Considerations more effective and efficient work together to build, sustain, for Fusion Center and procurement of items under and improve our capability to Emergency Operations specific FEMA Preparedness prepare for, protect against, Center Coordination provides Grants by informing grantees of respond to, recover from, and state and major urban area relevant standards, operating mitigate all hazards. fusion center and emergency considerations and operations center (EOC) programmatic considerations All-Hazards Emergency officials with guidance for the associated with each equipment Planning Guides. In coordination between fusion item. The AEL consists of 21 accordance with Now is the centers and EOCs. It outlines equipment categories, ranging Time: The President’s Plan to the roles of fusion centers and from Personal Protective Protect Our Children and Our EOCs and provides steps by Equipment (PPE) to Medical Communities by Reducing Gun which these entities can work Supplies to Terrorism Incident Violence, FEMA along with together to share information Prevention Equipment. The DHS, and the Departments of and intelligence on an ongoing AEL exists with considerable Health and Human Services, basis. CPG 502 supports the overlap with the Standard Justice, and Education, implementation of the Baseline Equipment List (SEL), a collaboratively designed and Capabilities for State and comprehensive list of first published revised all-hazards Major Urban Area Fusion responder equipment emergency management Centers, and likewise, assists maintained by the IAB, an inter- planning guides that include EOCs to fulfill their missions in governmental group with sections that speak to the both steady state and active representation from multiple importance of preparing for, state emergency operations. federal agencies and the first preventing, protecting against, CPG 502 provides guidance on responder community, and mitigating, responding to, and the broad capability strong connections to subject recovering from an active requirements of an EOC. An matter experts in all equipment shooter or mass casualty electronic version of the guide areas. GPD works in close incident. This joint federal is available at collaboration with the IAB on effort has resulted in the http://www.fema.gov/media- the items and relevant development of four guides library/assets/documents/25970. information that is maintained designed for Houses of on the AEL. The AEL has an Worship, Institutions of Higher First Responder Training. interactive version which allows Education, Schools for  Center for Domestic grantees to search for items by Kindergarten through Twelfth Preparedness (CDP), is keyword, equipment category, Grade, U.S. Airports, and DHS’s only Federally- or item number. Each item Medical Care Facilities. For chartered Weapons of Mass page includes the specific grant more information and for Destruction (WMD) training program(s) for which the item is electronic copies of the guides center committed to having allowable; a description of the visit, www.fema.gov/plan. an emergency response item; and SEL data including community prepared for and operating considerations, item capable of responding to all- The Authorized Equipment standards, and training List (AEL), published and hazards events. The 21 3/1/16

interdisciplinary resident perform missions and mass consequence events. and nonresident training functions that prevent, NTED primarily serves courses at CDP promote a protect against, respond to, state, local, territorial, and greater understanding recover from, and mitigate tribal entities in 18 among the diverse all hazards. As a component professional disciplines. responder disciplines: of the National Instruction is offered at the Emergency Management, Preparedness System, the awareness, performance, Emergency Medical NEP provides a consistent and management and Services, Fire Service, method to examine and planning levels. Students Governmental validate federal and whole attend NTED courses to Administrative, Hazardous community partner core learn how to apply the basic Materials, Healthcare, Law capabilities, which in turn skills of their profession in Enforcement, Public Health, indicate the Nation’s the context of preparing, Public Safety progress in reaching the preventing, deterring, Communications, and National Preparedness Goal responding to and Public Works. (Goal). recovering from acts of terrorism and catastrophic  Emergency Management Each Program cycle consists events. Course subjects Institute (EMI) serves as the of a two-year, progressive range from weapons of mass national focal point for the schedule of exercises that destruction terrorism, development and delivery of are selected based on their cybersecurity, and agro- emergency management support to the Goal, and the terrorism to citizen training to enhance the Program’s Principals’ preparedness and public capabilities of state, local, Objectives. The types of works. NTED training tribal, and territorial exercises selected into the includes multiple delivery government officials; program may include methods: instructor-led volunteer organizations; facilitated policy (direct deliveries), train-the- FEMA’s disaster workforce; discussions, seminars and trainers (indirect deliveries), other federal agencies; and workshops, tabletop customized (conferences the public and private exercises, modeling and and seminars) and web- sectors to minimize the simulation, drills, functional based. Instructor-led courses impact of disasters and exercises, and full-scale are offered in residence (i.e., emergencies on the exercises. All of which may at a training facility) or American public. be sponsored by through mobile programs, in organizations from any level which courses are brought  National Exercise Program of government, non- to state and local (NEP) serves as the governmental and private jurisdictions that request the principal mechanism for sector, and the whole training. examining the preparedness community. and readiness of the United Joint Counterterrorism States across the entire  National Training and Awareness Workshop Series homeland security and Education Division (NTED) (JCTAWS). The Joint management enterprise. serves the nation's first Counterterrorism Awareness The purpose of the NEP is responder community, Workshop Series (JCTAWS) is to design, coordinate, offering more than 150 a nationwide initiative designed conduct, and evaluate courses to help build critical to improve the ability of local exercises that rigorously test skills that responders need jurisdictions to detect, prevent, the Nation’s ability to to function effectively in and disrupt terrorist activities.

22 3/1/16

JCTAWS have been held more support the agency’s integration provides technical than 16 major cities across the of law enforcement, public assistance, and supports U.S., bringing together Federal, security, and emergency resource typing and the state, and local participants management communities. credentialing of emergency from across the law response personnel. enforcement, fire, emergency Preparedness (Non-Disaster) response, medical services, and Grant funding in the form of  Within its National private sector communities to formula and competitive grants Continuity Programs, include hospital and medical to enhance the capacity of state, FEMA provides guidance personnel. The workshops, local, tribal, territorial, and and tools for continuity at emphasizing the state and local private sector emergency all levels of government and response, delve into the responders to prevent, protect communications systems. challenges presented by both against, respond to, and recover Continuity of Operations is the operational and medical from a weapon of mass an effort within departments responses, and aim to review destruction, terrorism incident and agencies to ensure that existing preparedness, response involving chemical, biological, Primary Mission Essential and interdiction plans, policies, radiological, nuclear, explosive Functions continue to be and procedures related to a devices, and cyber-attacks as performed during a wide complex terrorist attack; well as other disasters. For range of emergencies, identify gaps in plans, more information on how to including localized acts of operational capabilities, find and apply for grants visit nature, accidents, and response resources, and www.fema.gov/preparedness- technological or attack- authorities; examine healthcare non-disaster-grants or related emergencies. system challenges unique to a www.Grants.gov. complex attack; strategize about  The Integrated Public community and bystander Protection and National Alert and Warning System assistance to the wounded and Preparedness contributes to the (IPAWS) is a national consider providing medical development and FEMA-managed system that management nearer to the attack implementation of preparedness public safety officials can site; and identify federal, state, doctrine that reaches federal use to send public and local resources—including state, local, tribal, and territorial information and warning grants, training, exercises, and emergency management messages to people in a technical assistance—available communities, as well as non- specific geographic to address potential gaps in government entities and the area. IPAWS connects capabilities. private sector. The guidance authorities at the federal, and doctrine includes the state, local, tribal, and Office of the Law National Preparedness Goal and territorial level and enables Enforcement Advisor. The National Preparedness System, sending of Wireless mission and role of FEMA’s National Incident Management Emergency Alert (WEA) Senior Law Enforcement System, and National Planning messages to cell phones, Advisor is to enhance Frameworks. Emergency Alert System communication and (EAS) broadcasts to radio coordination between FEMA  Within its National and TV, non-weather and the law enforcement Preparedness Directorate, emergency message community and provide the the National Integration broadcasts over NOAA All- Administrator and Agency with Center examines emerging Hazards Weather Radio, and a law enforcement perspective technologies, develops state internet applications and on plans and policies and to and local planning guidance, websites that support alert

23 3/1/16

and warning The FLETC offers advanced vetted law enforcement officers distribution. IPAWS and specialized law and agents. The Online provides emergency enforcement training in a Campus registration and access information to people variety of topics through the to course materials is provided without an understanding of State, Local, and Tribal through the Regional the English language and Division (SLTD), to state, local, Information Sharing System facilitates delivery of and tribal law enforcement (RISS), law enforcement emergency information to officers throughout the U.S. and officers and agents are required people with access and Indian country/jurisdictions. to complete the RISS functional needs. IPAWS is The programs SLTD delivers Automated Trusted Information also connected with the are developed with the advice, Exchange Application™ Canadian Multi-Agency assistance, and support of (ATIX) applicaiton. For more Situational Awareness federal, state, local, and tribal information, visit System to enable sharing of law enforcement agencies and www.fletc.gov/e-fletc-online- alert, warning, and incident are updated to ensure relevance campus. information across borders to today’s issues. They are to improve response conducted at selected venues coordination during throughout the country hosted Office of Health Affairs binational disasters. by a local law enforcement (OHA) Additional information and agency or at one of FLETC’s inquiries about IPAWS and training delivery points which OHA serves as DHS’s principal requirements for becoming are located in Artesia, NM; authority for all medical and an IPAWS user can be Charleston, SC; Cheltenham, health issues. OHA provides directed to the IPAWS MD; and Glynco, GA. Tuition, medical, public health, and Program Office at lodging, and meals assistance scientific expertise in support of [email protected]. may be available to state, local, the DHS mission to prepare for, and tribal officers, but respond to, and recover from all attendance is on a “space- threats. OHA serves as the available” basis. To learn more principal advisor to the Federal Law Enforcement about FLETC training courses Training Centers Secretary and the Federal available to state, local, and Emergency Management (FLETC) tribal law enforcement and for Agency (FEMA) Administrator contact information visit on medical and public health Contact Information: https://www.fletc.gov/state- issues. OHA leads the local-tribal or contact Federal Law Enforcement Department’s workforce health [email protected]. Training Centers protection and medical

Address: 1131 Chapel oversight activities. The office The FLETC Online Campus also leads and coordinates the Crossing Road, Bldg. 2200, is a secure online Academic Glynco, GA 31524 Department’s biological and Learning Management System chemical defense activities and

(ALMS) developed by the provides medical and scientific Web Site: FLETC in support of the law expertise to support the https://www.fletc.gov/state- enforcement learning Department’s preparedness and local-tribal environment. The Online response efforts. E-mail: Campus currently offers over [email protected] 100 professionally developed OHA has four strategic goals interactive online courses that that coincide with the strategic are available for U.S. sworn and goals of the Department:

24 3/1/16

The First Responder comprehensive electronic  Provide expert health and Guidance for Improving picture with assessments of medical advice to DHS Survivability in Improvised current biological events, leadership; Explosive Device (IED) and/or trends, and their potential  Build national resilience Active Shooter Incidents was impacts on the Nation’s against health incidents; developed at the request of the homeland security.  Enhance national and DHS Council’s Additionally, access to state and medical first responder working group on IED local NBIC Biosurveillance capabilities; and situations and in response to Reports are available on the  Protect the DHS workforce first responders who have Homeland Security Information against health threats. encountered mass casualties Network (HSIN) to public from IEDs and/or active shooter health, health care, agriculture, For more information on OHA incidents. Led by OHA environment, and law resources for support to state Medical First Responder enforcement personnel across and local law enforcement, Coordination Branch, the guide the country at all levels of please send an e-mail to was developed in coordination government. To request access [email protected], or with the Departments of to HSIN-NBIC-SL, contact [email protected]. Defense, Health and Human [email protected]. Services, Justice, and BioWatch is a nationwide Transportation. The Guide is biosurveillance monitoring available electronically at U.S. Immigration and system operating in more than http://www.dhs.gov/publication/ Customs Enforcement 30 metropolitan areas across the iedactive-shooter-guidance- (ICE) first-responders. country that is designed to detect the release of select ICE’s primary mission is to aerosolized biological agents. The National Biosurveillance Integration Center (NBIC) promote homeland security and OHA provides program public safety through the oversight for the BioWatch integrates biosurveillance activities across the human criminal and civil enforcement program while state and local of federal laws governing agencies operate the system in health, animal, plant, food, water, and environmental , customs, trade, their jurisdictions. BioWatch is and immigration. The agency a collaborative effort of domains to provide a biological common operating picture and has an annual budget of multidisciplinary partners at the approximately $6 billion federal, state, and local level, facilitate earlier detection of adverse events and trends. dollars, primarily devoted to its including public health, two operational directorates – laboratory, environmental NBIC works in partnership with federal, state, local, territorial, ICE Homeland Security agencies, emergency Investigations (HSI) and management, and law tribal, and private sector partners to synthesize and ICEEnforcement and Removal enforcement. Jurisdictional Operations (ERO). preparedness and response analyze information collected planning efforts related to the from across the spectrum of BioWatch program are these organizations to provide Toolkit for . To developed through these more rapid identification of and demonstrate its commitment to partnerships. Biowatch response to biological threats. strengthening coordination with partnerships bring experts at NBIC shares this information state and local every level of government with stakeholders via the DHS partners, ICE developed the together to enhance resilience. Common Operating Picture Toolkit for Prosecutors. This (COP), providing a Toolkit is aimed at helping prosecutors navigate situations 25 3/1/16

where important witnesses, approach that brings together https://www.ice.gov/criminal- victims, or defendants may face the skills and expertise of alien-program. removal because they are federal, state, and local illegally present in the United resources. State and local law ICE Enforcement and States. For more information, enforcement agencies play a Removal Operations 101 visit critical role in protecting our (ERO 101) is a PowerPoint www.ice.gov/doclib/about/offic national security because the presentation compiled to es/osltc/pdf/tool-kit-for- vast majority of criminals are introduce ICE ERO and its prosecutors.pdf. taken into custody under their program offices. Though the jurisdiction. The 287(g) Fact slides themselves are not Victim Assistance Program Sheet provides information accessible to the public, the (VAP) provides information regarding the 287(g) program. presentation can be delivered by and assistance to victims of For more information, visit any field office upon request. federal crimes, including human https://www.ice.gov/factsheets/ ICE ERO 101 is a condensed trafficking, child exploitation, 287g. overview of ICE ERO programs human rights abuse, and white and initiatives and is updated collar crime. VAP also The Criminal Alien Program quarterly. In addition, each provides information to victims (CAP) provides ICE-wide field office has area of on post-correctional release or direction and support in the responsibility-specific slides to removal of criminal aliens from biometric and biographic accompany the overall ICE ICE custody. VAP has identification, , and ERO 101 in order to provide a developed informational removal of priority aliens who more focused look at ICE ERO brochures on human trafficking are incarcerated within federal, in the local area. To find the victim assistance, crime state, and local prisons and jails, nearest field office, visit victims’ rights, white collar as well as at-large criminal https://www.ice.gov/contact/ero crime, and the victim aliens that have circumvented identification. The notification program. For ICE ERO Most Wanted further information, please identification and processing of Program is managed by the contact VAP at incarcerated criminal aliens, National Fugitive Operations [email protected] before release from jails and Program (NFOP) as a vital tool or 866-872-4973. prisons, decreases or eliminates to support ICE ERO's efforts in the time spent in ICE custody the location and arrest of the ICE ENFORCEMENT AND and reduces the overall cost to most dangerous fugitives and REMOVAL OPERATIONS the Federal Government. at-large criminal aliens. The (ERO) Additionally, ICE ERO, in Most Wanted Program serves as conjunction with the Offices of a force multiplier by focusing The 287(g) Program allows a the United States Attorneys, additional resources on the most state or local law enforcement actively pursues criminal egregious offenders, develops entity to enter into a partnership prosecutions upon the discovery community support by with ICE, under a joint of offenses of the nation's providing visibility and Memorandum of Agreement criminal code and immigration fostering awareness of ICE (MOA), in order to receive laws. This further enhances ERO’s public safety mission, delegated authority for public safety and provides a and builds cooperative immigration enforcement within significant deterrent to relationships with law their jurisdictions. In many recidivism. Additional enforcement partners though the cases, criminal activity is most information on CAP may be exchange of mutually beneficial effectively combated through a found at information aimed at removing multi-agency/multi-authority these threats from local 26 3/1/16

communities. More local law enforcement, ICE LESC operates 24 hours a day; information on the NFOP can ERO responds to situations 365 days a year to provide be found at where there is believed to be a timely, accurate and real-time www.ice.gov/fugitive- criminal and immigration assistance to law enforcement operations and nexus, and provides agencies that are in need of the http://www.ice.gov/most- investigative and enforcement immigration status and wanted. support with the goal of identities of a foreign national reducing crime. Individual ICE that has been encountered, ICE-INTERPOL Fugitive ERO officers or a Fugitive arrested or is under Alien Removal (FAR) Operations Team can embed investigation for criminal Initiative. The FAR Initiative with a state or local law activity. seeks to locate, arrest, and enforcement agency on a part- remove foreign fugitive aliens time basis or in a full-time To support these law at-large in the United States. A capacity. More information on enforcement efforts, the most "foreign fugitive" is a the Joint Effort Initiative can be efficient method to request and removable alien with an arrest found at www.ice.gov/fugitive- receive immigration warrant from a foreign country operations. information is by submitting an for an offense which is also Immigration Alien Query (IAQ) considered a crime in the Law Enforcement to the LESC. The IAQ is United States. ICE Liaisons at Information Sharing generated in two ways; either an INTERPOL assist in confirming Initiative (LEISI) facilitates automated biometric criminal wants and warrants the sharing of DHS sensitive (fingerprints) submission or a from foreign countries, but unclassified law biographic, initiated by utilizing developing investigative leads, enforcement information with the International Justice and and sharing information with other federal, tribal, state, local, Public Safety Network (Nlets), law enforcement partners across and message key IAQ at borders. The ICE Liaisons at enforcement agencies. LEISI VTICE0900. Direct contact can the INTERPOL Alien/Fugitive provides the electronic Law also be made via the Law Division can be contacted at Enforcement Information Enforcement Hotline at 1-802- 202-532-4297 or 202-616-2416. Sharing Service (LEIS Service) 872-6020. For additional The INTERPOL Operations and that other law enforcement information, visit Commaactind Center can be agencies can utilize to query www.ice.gov/lesc. reached at 202-616-3900 or records pertaining to ICE INTERPOL.ALIENFUGITIVE criminal subjects and ICE and The Pacific Enforcement [email protected]. CBP immigration violators. For Response Center (PERC) more information, contact LEISI at DHS- provides 24/7 mission critical Joint Effort Initiative. The support to ICE field offices by Joint Effort Initiative combines [email protected]. delivering near real-time the resources and expertise of detainer issuance, intelligence ICE ERO with local law Law Enforcement Support support, and proactive and risk- enforcement agencies to help Center (LESC), administered based targeting of removable make communities safer. The by ICE ERO, is a critical point criminal aliens. This is purpose of this initiative is to of contact for the national law accomplished through promote community safety enforcement community, interoperability and the through the arrest and removal providing a wide range of information sharing capabilities of criminal aliens and members information services to officers of the PERC, the LESC, and the of transnational street gangs. and investigators at federal, FBI’s Next Generation Working in a support role to state, and local levels. The Initiative (NGI) fingerprint 27 3/1/16

database. The PERC’s proactive transfer of the criminal alien aliens with removal orders who targeting focuses on removable from the state or local law have failed to depart the United criminal aliens who pose a enforcement agency. States. FOT members work threat to national security and Additional information on PEP together with law enforcement public safety. Real-time may be found at partners and on interagency task intelligence is disseminated to https://www.ice.gov/pep. forces to offer immigration field offices in the form of enforcement expertise and actionable leads associated with National Criminal Analysis pursue a common public safety criminal aliens in and Targeting Center strategy. For more information, federal/state/local custody and (NCATC). As part of ICE visit www.ice.gov/fugitive- at-large aliens. In addition, the ERO’s Targeting Operations operations. PERC provides critical Division, the NCATC analyzes information to INTERPOL, data and develops lead and Online Detainee Locator Joint Terrorism Task Forces, information referrals for law System (ODLS) is a public and other Federal law enforcement. The information system available online at enforcement partners in is used to locate and arrest www.ice.gov that allows family furtherance of shared public criminal and other priority members, legal representatives, safety and national security aliens who pose a threat to our and members of the public to missions. The PERC can be nation’s communities. By locate immigration detainees contacted directly 24/7 by leveraging technology and who are in ICE detention. As calling the Law Enforcement partnerships with domestic and part of detention reform, ICE Line at 949-360-4500. international law enforcement, deployed the ODLS so that regulatory, and intelligence family members and attorneys The Priority Enforcement agencies, the NCATC provides can locate detainees more easily Program (PEP) focuses on a specialized law enforcement online, 24 hours a day, seven individuals convicted of workforce that analyzes the days a week. The system is significant criminal offenses or nature and characteristics of the available in eight different who otherwise pose a threat to removable alien population. languages, with more languages public safety, such as gang The NCATC, in coordination to come. The ODLS can be members. Under PEP, ICE will with other ICE ERO and ICE searched in two ways: 1) by only seek transfer of individuals enforcement entities, serves as Alien Registration number (or in state and local custody in an operational component of A-number, the nine-digit specific, limited circumstances. ICE's cooperative and identification number assigned ICE will only issue a detainer community safety-based to a person who applies for where an individual fits within concept. immigration benefits or is DHS’snarrower enforcement subject to immigration priorities and ICE has probable National Fugitive Operations enforcement proceedings); or 2) cause that the individual is Program (NFOP) was by last name, first name, and removable. In many cases, established to locate and arrest country of birth. For more rather than issue a detainer, ICE removable aliens who are at- information, visit will instead request notification large within the United States. https://locator.ice.gov/odls/hom (at least 48 hours, if possible) of The 129 Fugitive Operations epage.do when an individual is to be Teams (FOTs) across the nation released. ICE will use this time prioritize their investigations on Probation and Parole to determine whether there is national security cases and Enforcement entails the to conclude that transnational gang members, identification and arrest of the individual is removable and convicted criminals and sex foreign born nationals who have arrange for the safe and orderly offenders, visa violators, and been convicted of crimes and 28 3/1/16

released from incarceration more information, visit [email protected] (paroled), or have been placed www.ice.gov/best/. ov. on probation without incarceration and released into Cultural Property, Art and Cyber Crimes Center (C3), a the community under Antiquities Program (CPAA) component of ICE HSI, was supervision. This is an essential oversees investigations established in 1997 for the immigration enforcement involving the illicit trafficking purpose of combating crimes function of ICE in carrying out of cultural property from committed on, or facilitated by, its public safety mission. ERO countries around the world and the Internet. C3 is ICE HSI’s Officers and Fugitive facilitates the repatriation of main focal point for Operations Teams work closely these objects to their rightful coordinating the agency’s cyber with probation and parole owners. United States federal strategy as it relates to agencies to serve as a force importation laws regarding cybercrime and computer multiplier, provide an open smuggling and trafficking forensics. ICE HSI’s main exchange of information, and provide ICE HSI special agents strategy for cybercrime is to fulfill common community the authority, jurisdiction, and combat transnational safety objectives. responsibility to take the cybercrime threats and the leading role in criminal criminal exploitation of the ICE HOMELAND SECURITY investigations that involve the Internet by investigating, INVESTIGATIONS (HSI) illicit importation and disrupting and dismantling distribution of stolen or looted transnational criminal Border Enforcement Security cultural property and organizations and other Task Force (BEST). In prosecuting those responsible malicious actors engaged in response to a significant for these crimes. When high-impact or far-reaching increase in violence along the contacting ICE HSI to report cybercrime, as well as provide Southwest border, ICE HSI, in instances of illicit importation training, guidance, and partnership with U.S. Customs and distribution of cultural assistance to ICE HSI offices and Border Protection (CBP), as property, please provide as located throughout the world. well as other federal, state, much detailed information and local, tribal, territorial, and supporting documentation as C3 is comprised of the Cyber international law enforcement possible, including the Crimes Unit (CCU), the Child officials have expanded its following: a detailed Exploitation Investigation Unit ongoing Border Crimes description of the artifact and (CEIU), and the Computer Initiative by creating BEST, a location (pictures if possible); a Forensics Unit (CFU). This multi-agency initiative. To full statement of the reasons for state-of-the-art center offers date, a total of 37 BESTs have the belief that the artifact may cyber-crime support and been initiated across 16 states be or has been imported into the training to federal, state, local and in Puerto Rico. These United States due to the illicit and international law teams are comprised of over importation from (1) country of enforcement agencies. C3 also 1,000 members who represent origin (if known) or (2) includes a fully equipped over 100 law enforcement distribution from an computer forensics laboratory, agencies that have jointly archeological site in the United which specializes in digital committed to investigate States (if known). For more evidence recovery. For more transnational criminal activity information, visit information, visit along the Southwest Border, http://www.ice.gov/cultural-art- http://www.ice.gov/cyber- Northern Border, and at our investigations. Reports may be crimes/. nation’s major seaports. For sent to

29 3/1/16

Document and Benefit Fraud enforcement agencies. DMV facilities. By adding Task Forces (DBFTF). ICE Supporting these task forces is education and outreach HSI leads 23 interagency task the ICE HSI Forensic components, ICE HSI and its forces across the United States. Laboratory, and the ICE HSI partners work together to deter Individual task forces are Cyber Crimes Center (C3). For the crime from happening, comprised of federal, state, more information, visit encourage people to report the and/or local law enforcement www.ice.gov/document-benefit- crime, and ensure that their partners working together to fraud/. investigations are combat immigration document comprehensive and more and benefit fraud, as well as Forced Labor Program. ICE efficient. Outreach materials, related criminal violations. HSI investigates allegations of including posters, brochures, DBFTF locations include forced labor in violation of the and short videos were Atlanta, Baltimore, Boston, Tariff Act of 1930 (Title 19 developed by ICE HSI to Buffalo, Chicago, Dallas, USC §1307), relating to the support the outreach and are Denver, Detroit, Harlingen, illegal importation of goods utilized by nearly every U.S. Houston, Honolulu, Los mined, manufactured, or jurisdictional (state) and Angeles, Miami, New York, produced, wholly or in part, territorial DMV in employee Newark, Orlando, Philadelphia, through the use of forced labor, new-hire and refresher ethics Sacremento, Salt Lake City, San prison labor, and/or indentured training. The materials provide Francisco, San Juan, St. Paul, labor under penal sanctions. guidance to DMV employees by and Washington D.C. Through When contacting ICE to report promoting accountability and collaboration and partnership instances of forced labor, please vigilance in an effort to reduce with multiple federal, state, and provide as much detailed corruption and preserve the local agencies, the DBFTFs information and supporting integrity of the DMV process. maximize resources, eliminate documentation as possible, For more information, please duplication of efforts, and including the following: a full email the Identity and Benefit produce a strong law statement of the reasons for the Fraud Unit at ibfu-ice- enforcement presence. They belief that the product was [email protected]. combine ICE HSI’s unique produced by forced labor and criminal and administrative that it may be or has been ICE HSI Forensic Laboratory authorities with a variety of imported into the United States; (HSI-FL) provides a broad other law enforcement a detailed description of the range of forensic, intelligence agencies’ tools and authorities product; and all pertinent facts and investigative support to ICE to achieve focused, high-impact known regarding the production HSI, DHS, and many other U.S. criminal prosecutions and of the product abroad. Reports and foreign law enforcement financial seizures. Partners may be emailed to agencies. The ICE HSI-FL is include U.S. Citizenship and [email protected]. accredited by the American Immigration Services, Fraud Society of Crime Laboratory Detection and National ICE HSI Department of Directors / Laboratory Security; U.S. Department of Motor Vehicles (DMV) Accreditation Board State, Diplomatic Security; U.S. Outreach was developed to (ASCLD/LAB). Forensic Department of Labor, Office of raise awareness about disciplines include questioned the Inspector General; U.S. corruption at DMV facilities. A documents, fingerprints, and Social Security Administration, principal component of the chemistry. Additionally, the Office of the Inspector General; campaign is to alert DMV ICE HSI-FL provides U.S. Postal Inspection Service; employees, law enforcement, intelligence alerts, reference U.S. Secret Service and and the public to the seriousness material on travel and identity numerous state and local law of fraud schemes perpetrated at documents, and fraudulent

30 3/1/16

document detection http://www.ice.gov/contact/hsi- and other forms of serious training. The ICE HSI-FL international-ops. human rights abuses from manages the ICE HSI conflicts around the globe. Polygraph Program and You may also go through the Individuals seeking to report oversees the ICE HSI Evidence ICE HSI domestic office in these abuses of human rights Recovery Team Program. For your jurisdiction or the 24/7 may contact the center at more information, visit hotline at 866- 347-2423 (from [email protected]. For www.ice.gov/hsi-fl. U.S. and Canada) or 802-872- additional information 6199 (from any country in the http://www.ice.gov/human- ICE HSI International world). rights-violators-war-crimes- Operations Overseas Offices unit. represent DHS’ largest ICE HSI Tip Line is an investigative law enforcement internationally accessible venue The Department of Homeland presence overseas. ICE HSI through which the public, as Security (DHS) Human deploys more than 240 special well as federal, state, and local Smuggling Cell (HSC) was agents and 156 Foreign Service law enforcement agencies, can established on October 1, 2014 nationals to 65 attaché offices in report suspected violations of in accordance with the White 46 countries in addition to ICE HSI-investigated House National Security liaison officers assigned to the 8 immigration and customs laws. Council’s mandate that law Department of Defense Special agents and intelligence enforcement and the Combatant Commands. These research specialists assigned to intelligence community agents enforce U.S. customs the Tip Line take reports 24 collaborate and share and immigration laws to protect hours, 365 days per year. and intelligence and information the United States and its have the capability to customize regarding human interests from terrorism and questions to meet the needs of smuggling. HSC will provide a illicit trade, travel, and finance national enforcement priorities. means to operationalize by conducting international law Phone toll free 866-347-2423 intelligence in a timely manner enforcement operations and from the U.S. and Canada, or to identify and disrupt human removals. from any country in the world smuggling organizations. HSC phone 802- 372-6199. For is committed to a collaborative The mission of ICE HSI more information, visit approach to detect, deter, International Operations is www.ice.gov/tips. disrupt and dismantle current threefold: (1) Support domestic human smuggling network operations by conducting and Human Rights Violators and activity, to include those coordinating investigations with War Crimes Center organizations engaged in the foreign counterparts; (2) (HRVWCC) is a multi-agency movement of Central Disrupt transnational criminal program directed by ICE HSI Americans and unaccompanied organizations before they can with partners from the FBI, children to the United States. bring illicit products, people, Department of State, USCIS Defined by its function as a and proceeds into or out of the and ICE’s Human Rights Law human smuggling targeting United States; (3) Build on Section. HRVWCC mechanism, the DHS/HSC will international partnerships and to conducts investigations focused have access to the entire increase foreign capacity on human rights violations in an spectrum of human smuggling through outreach and training. effort to prevent the United intelligence and will fuse this States from becoming a safe information into timely, To locate and contact any of the haven to those individuals who operationalized intelligence ICE HSI International Offices, engage in the commission of products designed to enhance go to war crimes, genocide, torture field enforcement efforts.

31 3/1/16

The International Organized federal, state, and local officers agencies in a task force Crime Intelligence and involved in enforcement and structure consisting of 19 key Operations Center (IOC-2) interdiction of bulk cash federal agencies, Interpol, supports member agency efforts smuggling and the Europol, and the governments to disrupt and dismantle transportation of illicit of Canada and Mexico. transnational criminal proceeds. This is accomplished organizations (TCO) posing the through the examination and These task forces enable the greatest threat to the United exploitation of evidence IPR Center to leverage the States. This mission is obtained at our borders, during resources, skills, and authorities accomplished through the traffic interdictions, and other of each partner, and they deconfliction of member agency law enforcement encounters. provide a comprehensive investigative endeavors; The BCSC targets transnational response to intellectual property dissemination of leads and criminal organizations who seek theft. For additional intelligence; coordination of to avoid traditional financial information on available multi-agency and multi-national institutions by repatriating illicit training opportunities, please law enforcement operations, proceeds through an array of contact the IPR Center at investigations, prosecutions, methods including commercial [email protected]. For more and forfeiture proceedings; and and private aircraft, passenger information on the IPR Center, the provision of operational and commercial vehicles, visit http://www.iprcenter.gov/. funding. IOC-2 focuses maritime vessels, and pedestrian primarily on TCOs involved in crossings at our U.S. land Operation Community Shield non-drug centric crime, such as borders. For more information, is the ICE HSI anti-gang money laundering, credit card visit https://www.ice.gov/bulk- initiative that combines ICE’s fraud, weapons trafficking, cash-smuggling-center or expansive statutory and identity theft, fraud scams, contact [email protected] or 866- administrative enforcement cybercrime, and human 981-5332. authorities to combat the growth smuggling/trafficking. To and proliferation of facilitate its efforts, the IOC-2 National Intellectual Property transnational criminal street leverages the resources of its Rights Coordination Center gangs, prison gangs, and outlaw ten member agencies, the (IPR Center) stands at the motorcycle gangs throughout OCDETF Fusion Center, the forefront of the U.S. the United States in cooperation Special Operations Division, government's response to global with our federal, state, local, and other domestic and intellectual property theft and tribal, and foreign law international resources. IOC-2 enforcement of its international enforcement partners. With our is limited to providing support trade laws. The IPR Center partners, ICE HSI enhances to member agencies only; helps ensure national security intelligence gathering and however, state and local law by protecting the public's health information sharing, exploits enforcement officers assigned and safety, the U.S. economy 21st century law enforcement to task forces operated by and U.S. warfighters by technology, and capitalizes on member agencies can utilize its stopping predatory and unfair our worldwide presence to capabilities. trade practices that threaten the combat these global criminal global economy. The IPR networks and mitigate the National Bulk Cash Center is led by an ICE HSI threats they pose to the public Smuggling Center (BCSC) is a director, along with deputy safety and national security of 24/7 operations and intelligence directors from ICE HSI, the the United States and other facility providing real-time Federal Bureau of Investigation countries. For more tactical intelligence and (FBI) and CBP. The center information, visit investigative support to the brings together 23 partner http://www.ice.gov/national-

32 3/1/16

gang-unit. customs laws and regulations. officers complement ICE HSI This reservation contains 2.8 investigations to effectively The Organized Crime Drug million acres of land and combat transnational crime. Enforcement Task Force includes a 75-mile-long stretch Law enforcement officers cross- Fusion Center (OFC) fosters of the U.S. border with Mexico. designated under Title 19 increased communication, The Shadow Wolves use their U.S.C. § 1401(i) harness their cooperation, and coordination unique language and tracking invaluable experience with this between member agencies skills to interdict and investigate unique federal authority to through the provision of target contraband and have assisted collectively enhance joint deconfliction and direct law enforcement with the investigations of narcotics intelligence support to ongoing investigation of kidnappings, smuggling, money laundering, HSI investigations. The OFC the deaths of illegal aliens, and fraud-related activities that utilizes a consolidated database sexual assaults, missing disrupt and dismantle criminal consisting of over 700 million children, and any reports of organizations threatening this law enforcement, regulatory, border violence. The Shadow country’s borders. With this and immigration records to Wolves have traveled to the authority, Title 19 cross- generate intelligence products Blackfeet Indian Reservation designated officers have the for field exploitation. OFC is and the Bay Mills Chippewa ability to execute and serve limited to providing support to Indian Reservation to share arrest warrants, subpoenas, and member agencies only; their expertise. summonses in compliance with however, state and local law customs laws as well as carry enforcement officers assigned Additionally, the Shadow firearms in compliance with to task forces operated by Wolves have conducted training ICE HSI firearms policy. For member agencies can utilize its with the U.S. Department of more information on the Title capabilities. Defense in several of the former 19 Program Directive, please Soviet Republics to teach the contact 800-973-2867 to speak Parole and Law Enforcement ancient art of tracking to with the Unit Chief for the ICE Programs Unit (PLEPU) combat nuclear proliferation HSI Narcotics, Smuggling, and serves as the clearinghouse for from the former Soviet BEST Unit in Washington, all Significant Public Benefit Republics. For additional D.C., or email the unit at Parole (SPBP) applications to information, please contact 800- [email protected]. For ICE from federal, state, and 973-2867 and ask to speak with additional information, visit local law enforcement the Unit Chief for the ICE HSI www.ice.gov/customs-cross- agencies. SPBP is a mechanism Contraband Smuggling Unit in designation. that allows otherwise Washington, D.C. For more inadmissible aliens to come to information, visit Trade Transparency Unit the United States for law www.ice.gov/news/library/facts (TTU) is a key component in enforcement purposes. For heets/shadow-wolves.htm. ICE HSI’s strategic efforts to more information on the SPBP combat and prevent Transnational Criminal program, please call 800-973- Title 19 Cross-Designation. 2867. Organizations (TCOs) from Title 19 of the U.S. Code exploiting international trade

section provides a mechanism and financial systems to Shadow Wolves. The ICE HSI for ICE HSI to designate disguise, move, and launder Shadow Wolves are Native federal, state, local, tribal, and illicit funds and proceeds, a American Tactical Officers foreign law enforcement scheme commonly known as assigned to the Tohono officers as “Customs Officers.” trade-based money laundering O’odham Nation in Arizona to The unique resources and (TBML). The TTU uses ICE enforce immigration and subject matter expertise of these 33 3/1/16

HSI’s unique authorities to DHS IE—by driving a common about behaviors that have a access financial and intelligence mission. potential nexus to terrorism. international trade data to The NSI recognizes that each identify financial irregularities I&A is the Executive Agent for community has an important and international trade coordinating federal support for role in preventing crime and anomalies indicative of TBML, state and major urban area terrorism and uses the concept customs fraud, contraband fusion centers. It also leads the of community policing to build smuggling and other financial Department’s information trust and cooperation to share crimes. For more information. sharing efforts. I&A works to information with state, visit www.ice.gov/trade- solidify productive and local, tribal, and territorial law transparency. collaborative relationships with enforcement officers. its partners to enhance information sharing. This To help ensure that appropriate collaboration and coordination SAR reporting takes place, it is Office of Intelligence and is bolstered by the placement of essential that law enforcement Analysis I&A field personnel at state and and community members have (I&A) major urban area fusion centers, strong, trusting relationships. as well as other strategic As these relationships are I&A is a member of the national locations, providing direct developed and maintained, Intelligence Community (IC) intelligence support to key state, members of the community are and ensures that information local, tribal, and territorial more likely to report crime and related to homeland security partners, and private sector suspicious activities, which is threats is collected, analyzed, partners. These services why the NSI has worked with and disseminated to the full include engagement and partners at the federal, state, and spectrum of homeland security intelligence and information local levels—including U.S. partners in the Department, at sharing support, intelligence Attorneys’ Offices, privacy federal, state, local, tribal, and analysis, and intelligence advocacy groups, faith territorial levels, in the private collection and reporting. leaders, and a diverse group of sector, and in the IC. local community members—to Building Communities of implement the BCOT initiative. I&A works closely with Trust (BCOT). The BCOT Department Component initiative focuses on developing The BCOT initiative has been intelligence organizations as trust among law enforcement, implemented in over well as state, local, tribal, fusion centers, and the 15 urban areas across the territorial, and private sector communities they serve country, with roundtables entities to ensure non-traditional to address the challenges of hosted by chiefs, streams of information are fused crime and terrorism prevention. sheriffs’ departments, and with traditional IC sources to Since initial implementation, fusion centers through the provide a complete assessment the BCOT initiative has been support of U.S. Attorneys, of threats to the homeland. administered primarily by the Federal Bureau of Investigation Nationwide Suspicious Activity field office executives, The Under Secretary for Reporting (SAR) Initiative fusion center directors, and Intelligence and Analysis, in the (NSI), a program that provides DHS field representatives. capacity of Chief Intelligence law enforcement with a Officer for DHS, implements a capacity for gathering, Community leaders and local mandate to integrate the documenting, processing, law enforcement share Department’s intelligence analyzing, and sharing responsibility for addressing the components and functions—the suspicious activity reports prevention of crime and

34 3/1/16

terrorism in their with their local FBI submitting an RFI to SPS, neighborhoods. BCOT counterparts and promoting the Federal and DHS Component roundtables provide a forum for event to their state, local, tribal partners should route their RFIs community leaders and law and territorial counterparts; as through their respective enforcement officials to have a well as to other DHS headquarters to ensure they candid conversation on how to representatives. have visibility. State and local work together to keep partners should work through communities safe from DHS Open Source Enterprise their Fusion Center(s) (via their terrorism, crime, violence, and Daily Intelligence Reports. deployed I&A Staff) to verify other locally-based problems These daily and weekly reports all local resources have been that would be better provide priority intelligence exhausted. requirements on multiple topics DHS-SPS representatives can solved together. For more of interest to facilitate a greater be contacted at: information, visit understanding of the nature and http://www.dhs.gov/publication/ scope of threats and hazards to Open/STE: 202-282-9555 building-communities-trust- the homeland. They are NSTS: 766-0888 bcot-initiative, or contact your provided to federal, state, local, local Fusion Center. tribal, territorial, and private NIPR: [email protected] sector officials to aid in the HSDN: DHS-SPS- Counterintelligence identification and development [email protected] Fundamentals Workshop of appropriate actions, priorities JWICS: DHS-SPS- (CIFWS) is a training initiative and follow-on measures. These [email protected]. offered by the DHS reports may be accessed via the Counterintelligence Division Homeland Security Information Fusion Process Technical (CIPD) to provide a one-day, Network (HSIN). To access or Assistance Program. on-site workshop to fusion sign-up for HSIN, visit Effective prevention efforts centers as a means of promoting http://www.dhs.gov/homeland- depend on the ability of all counterintelligence awareness security-information-network- levels and sectors of to fusion centers personnel. hsin government, as well as private The CIFWS program is industry, to collect, analyze, intended to familiarize students DHS-Single Point of Service disseminate, and use homeland with the potential intelligence (DHS-SPS) serves as DHS security and crime-related collection threat directed Headquarter’ central ingest information and intelligence. against their facility, and state, point for receiving, tracking, Accordingly, the establishment local, tribal and territorial and facilitating Operational and of a network of fusion centers to officials. This training also Intelligence Requests For facilitate effective nationwide equips attendees with the ability Information (RFIs) to and from information sharing has been a to recognize an elicitation federal, state, local, tribal, and top priority. To assist in the attempt or recruitment pitch. territorial partners. This development of this capability, Prior to the training, CIPD process—undertaken by I&A the U.S. Department of notifies the I&A field and the Office of Operations Homeland Security (DHS) and representative assigned to the Coordination and Planning—is the U.S. Department of Justice fusion center of training intent, not a replacement for existing (DOJ) partnered in 2007 to potential training dates, and lines of communication; rather, offer a series of fusion center logistic requirements for this it serves as a resource to technical assistance services. effort. I&A field facilitate validated RFIs with an These services have been representatives will be organization capable of developed based on the input responsible for coordinating providing a response. Before and guidance from the DHS

35 3/1/16

Office of Intelligence and Center Current portal for identify and prevent acts of Analysis (I&A); the Office of counter-terrorism information, terrorism. The NSI offers a the Director of National the DEA portal for host of customized online Intelligence (ODNI); the Office counternarcotics intelligence, training for law enforcement of the Program Manager, and a number of Department of and several other specific Information Sharing Defense sites including partner sectors. The training is Environment (PM-ISE); the cybersecurity, counterterrorism, designed to illustrate the Federal Bureau of Investigation intelligence, and importance of reporting (FBI); and experts from the counternarcotics information. suspicious activity linked to state and local community— pre-operational behaviors that including the Global Justice The DHS Intelligence are indicative of terrorist Information Sharing Initiative Training Academy (ITA) activity, the attendant privacy (Global), the Criminal coordinates the design and protections, practical case Intelligence Coordinating delivery of entry, mid-level, and examples and directions on how Council (CICC)—and will be advanced intelligence training to report SAR. NSI resources delivered by subject-matter for I&A, the DHS Intelligence and training may be accessed by experts with experience in the Enterprise (IE), and state, local, visiting its website at development and operation of territorial, and tribal partners https://nsi.ncirc. fusion centers. Fourteen throughout the United States. services are offered to support The mission of the ITA is to the implementation of the advance students’ knowledge, National Protection and Fusion Center Guidelines, the skills, and abilities through the Programs Directorate Information Sharing creation and dissemination of (NPPD) Environment (ISE) homeland security intelligence

Implementation Plan, and the training. The ITA is located in NPPD leads the national effort Baseline Capabilities for State Washington, D.C. To obtain a to protect and enhance the and Major Urban Area Fusion copy of the ITA’s course resilience of the nation's Centers to facilitate the catalog or training calendar, physical and cyber nationwide development and/or please contact the IA- infrastructure. enhancement of the fusion [email protected]. process. To learn more or to BIOMETRIC IDENTITY apply for assistance please visit: The Nationwide Suspicious MANAGEMENT https://ncirc.gov/. Activity Reporting (SAR)

Initiative (NSI). The NSI was Office of Biometric Identity HSDN Resources for State established to facilitate fusion Management (OBIM) and Local Partners. centers and law enforcement to Automated Biometric Appropriately-cleared state and easily share specific potential Identification System local personnel assigned to indicators of terrorist activity in (IDENT). The IDENT system Fusion Centers are granted order to prevent terrorist threats. matches, stores, and shares access to Secret-level network The NSI training strategy is fingerprints of more than 200 resources via the Homeland designed to increase the million unique identities for Secure Data Network (HSDN). effectiveness of state, local, immigration, border These resources include tribal, and territorial law management, law enforcement, intelligence products from I&A enforcement and homeland credentialing, and national that are hosted on HSDN, as security professionals in security purposes. IDENT is well as a range of other identifying, reporting, interoperable with the FBI’s resources such as access to the evaluating, and sharing pre- Next Generation Identification National Counterterrorism incident terrorism indicators to (NGI) system and provides 36 3/1/16

state, local, tribal, and territorial training, contact your local Workshop law enforcement with access to Protective Security Advisor  IED Counterterrorism IDENT information via NGI. (PSA) or contact Workshop [email protected].  IED Search Procedures OBIM Biometric Support Workshop Center (BSC) provides expert COUNTER-IMPROVISED  Protective Measures Course fingerprint identification EXPLOSIVE DEVICE (IED)  Detection services in support of DHS’s PROGRAMS AND Course for Law Automated Biometric RESOURCES  Enforcement and Security Identification System, which Professionals contains the fingerprints of Counter-IED & Risk  Vehicle Borne IED more than 200 million Mitigation Courses and (VBIED) Detection Course individuals. The BSC performs Resources. To reduce risk to manual fingerprint comparisons the Nation’s critical Counter-IED & Risk to identify both known and infrastructure, NPPD’s Office Mitigation Products. The unknown individuals (e.g. for Bombing Prevention (OBP) following products are made deceased subjects, cold cases). develops and delivers a diverse available from OBP and can be The BSC operates 24 hours a curriculum of training to build found at day/7 days a week. For nationwide counter-IED core http://www.dhs.gov/bombing- additional information, contact capabilities and enhance prevention-training. [email protected]. awareness of terrorist threats. Coordinated through State  Counter-IED Awareness CHEMICAL SECURITY Homeland Security Officials Cards & Posters and training offices, courses  DHS-DOJ Bomb Threat Chemical Facility Anti- educate federal, state, local, Guidance Brochure Terrorism Standards tribal, and territorial participants  DHS Bomb Threat (CFATS). The CFATS such as municipal officials and Procedures Checklist program is the Department's emergency managers, state and  DHS-DOJ Bomb Threat regulatory program focused local law enforcement and other Stand-off Card specifically on security at high- emergency services, critical  FiRST Smartphone risk chemical facilities not infrastructure owners and Application located on navigable operators, and security staff on  Incident Management waterways. The program strategies to prevent, protect Preparedness and identifies and regulates high- against, respond to, and mitigate Coordination Toolkit risk chemical facilities to ensure bombing incidents. Available (IMPACT) they have security measures in courses are listed below. For place to reduce the risks more information, visit  Protective Measures associated with these chemicals. http://www.dhs.gov/bombing- Guidance DHS chemical security prevention-training. To request  VBIED Identification inspectors work in all 50 states training, contact your local Guide: Parked Vehicles to help ensure facilities have Protective Security Advisor  Vehicle Inspection Guide security measures in place to (PSA) or contact (VIG) & Video meet security risk-based [email protected]. performance standards. Multi-Jurisdiction Improvised  Bomb-making Materials Explosive Device Security For more information, visit Awareness Program Planning (MJIEDSP) program http://www.dhs.gov/bombing- (BMAP) is a systematic process that fuses counter-IED capability prevention-training. To request  Bomb Threat Management analysis, training, and planning 37 3/1/16

to enhance urban area IED Technical Resource for exchange actionable prevention, protection, Incident Prevention cybersecurity information with mitigation, and response (TRIPwire) is the DHS 24/7 other practitioners. The capabilities. The MJIEDSP online, collaborative National Cybersecurity & assists with collectively information-sharing network for Communications Integration identifying roles, bomb technicians, first Center’s (NCCIC) operational responsibilities, capability gaps, responders, military personnel, branches, including US-CERT, and how to optimize limited government officials, share cyber threat indicators, resources within a multi- intelligence analysts, and select alert, and warning information, jurisdictional planning area. private sector security and analytical findings through OBP works closely with professionals to increase structured Portal compartments communities to provide awareness of evolving terrorist with registered public and expertise on planning and IED tactics, techniques, and private sector users, including operational requirements for procedures, as well as incident state, local, tribal, and territorial IED incident preparedness in lessons learned and counter- government representatives. alignment with the National IED preparedness information. For more information and to Preparedness Goal and Core Developed and maintained by request access, contact Capabilities. For more OBP, the system combines [email protected]. information, contact expert analyses and reports with [email protected]. relevant documents, images, The Continuous Diagnostics and videos gathered directly and Mitigation (CDM) National Counter-IED from terrorist sources to help Program enables federal, state, Capabilities Analysis users anticipate, identify, and local, and tribal governments to Database (NCCAD) is an prevent IED incidents. obtain the risk-based, cost- assessment program that uses a TRIPwire is also regularly used effective tools and capabilities consistent and repeatable to share critical information they need to fortify their IT analytical methodology to with our federal, state, local, systems and government assess and analyze the tribal, territorial, and private networks. CDM allows system capabilities of bomb squads, sector security partners during administrators to know the state explosives detection canine, periods of heightened alert or of their respective network at dive, and SWAT teams following IED related incidents. any given time, and identify throughout the United States. TRIPwire is available at no cost flaws for priority resolution at NCCAD assessments measure to registered subscribers at near-network speed, resulting in the capability elements of https://tripwire.dhs.gov, and lower operational personnel, equipment, and features a public-access risk/exploitation. training required for effective homepage with valuable prevention, protection, and preparedness information for DHS, in partnership with the response to IED threats. This the whole community. For General Services integrated information provides additional information, contact Administration (GSA), a snapshot of unit, State, [email protected]. established a government-wide regional and national counter- acquisition vehicle for CDM— IED preparedness that informs CYBERSECURITY the CDM Tools and Continuous decision makers on policy Monitoring as a Service decisions, resource allocation United States Computer (CMaaS) blanket purchase for capability enhancement, and Emergency Readiness Team agreement (BPA)—which is crisis management. For more (US-CERT) Portal is a web- available to federal, state, local, information, contact based information sharing and tribal government entities. [email protected]. portal that enables members to BPA participants achieve cost

38 3/1/16

savings through tiered-price and order to gain an understanding critical infrastructure sectors, task order discounts, enabling of the relationships and impacts state, local, tribal, and territorial more efficient use of financial of infrastructure performance in governments. For more resources. protecting critical infrastructure information, visit www.us- operations. The results can be cert.gov/ccubedvp/self-service- State and local governments used to evaluate a provider crr or contact [email protected]. may use the Direct Order/Direct independent of other Bill option to procure assessments, used with regional Cybersecurity Information products/services from the studies to build a common Products provide current CDM BPA via the delegated perspective on resiliency, and cybersecurity information and procurement authority, GSA used to examine systems-of- recommended security practices Federal Systems Integration and systems (i.e., large and diverse to help users understand Management Center (FEDSIM). operating and organizing cybersecurity issues and For specific ordering options, models). The key goal of the mitigation options. This visit GSA’s 2013 CDM/CMaaS CRR is to ensure that core information enables users to Ordering Guide at process-based capabilities exist, reduce their exposure and www.gsa.gov/cdm. are measureable, and are susceptibility to cyber-attacks meaningful as predictors for an and exploits. For a complete For more information about organization’s ability to manage list and access to cybersecurity CDM, visit: cyber risk to national critical information products, visit  www.gsa.gov/cdm for infrastructure. For more https://www.us- ordering information information about the CRR, cert.gov/security-publications  www.us-cert.gov/cdm for contact the CSEP program at and http://ics-cert.us- operational information [email protected]. cert.gov/Information-Products.  www.dhs.gov/cdm for the CDM public website Cybersecurity Evaluation Emergency Services Sector- Program (CSEP) conducts Cyber Risk Assessment (ESS- The CDM Program also offers a voluntary cybersecurity CRA). The 2012 ESS-CRA is secure community of interest assessments across all 16 the first ESS-wide cyber risk for stakeholders, hosted on the critical infrastructure sectors assessment that analyzes Homeland Security Information (including the Emergency strategic cyber risks to ESS Network (HSIN). To request Services Sector) and within infrastructure. The ESS-CRA membership, email the CDM state governments and large process provides a national- Program at urban areas. CSEP affords level risk profile that ESS [email protected]. critical infrastructure and key partners can use to prioritize resources sector participants a how they spend resources and Cyber Resiliency Review portfolio of assessment tools, where to focus training, (CRR) is an assessment that the techniques, and analytics, education, equipment Cyber Security Evaluation ranging from those that can be investments, grant requests, and Program offers to measure and self-applied to those that require further study. The risk enhance the implementation of expert facilitation or mentoring assessment consisted of seven key cybersecurity capacities and outreach. The CSEP works evaluation sessions to solicit capabilities of critical closely with internal and input from ESS subject-matter infrastructure. The purpose of external stakeholders to experts. Each scenario the CRR is to gather measure key performances in evaluated threats, information regarding cybersecurity management. vulnerabilities, and cybersecurity performance from The Cyber Resiliency Review is consequences to ESS cyber specific critical infrastructure in being deployed across all 16 infrastructure. Stakeholders

39 3/1/16

chose scenarios based on what visit http://www.dhs.gov/ would have the widest impact - enhanced-cybersecurity- If an organization believes it is the scenarios likely to affect the services for more information. experiencing a cyber event on most disciplines at a time. The control systems/critical final ESS-CRA report includes Federal Virtual Training infrastructure please call 1-877- a risk profile showing how the Environment (FedVTE) is an 776-7585 or e-mail ICS-CERT scenarios would affect each online training center featuring at [email protected]. To discipline, and the operational a wide range of cybersecurity report ICS software impact. Cyber risks to each courses – to state, local, tribal, vulnerability visit discipline are ranked from high and territorial government www.kb.cert.org/vuls/html/repo to low in terms of likelihood employees across the country. rt-a-vulnerability/ and fill out and consequence. The FedVTE provides government- the Vulnerability Reporting assessment approach is not wide, on-demand access to Form. Please follow the intended to be guidance for cybersecurity training to help directions to encrypt to the individual entity’s risk the workforce maintain CERT Pretty Good Privacy key management activities. Instead, expertise and foster operational in order to protect sensitive, by increasing the awareness of readiness at no cost to users. non-public vulnerability risks across the public and Courses range from beginner to information. private sector domains, the advanced levels and is ESS-CRA serves as a accessible from any internet- Industrial Control System foundation for ongoing enabled computer. For more Cybersecurity Standards and national-level collaboration to information, visit the National References provide an enhance the security and Initiative for Cybersecurity extensive collection of resilience of the ESS Careers and Studies portal cybersecurity standards and disciplines. If you have any at: http://niccs.us- reference materials as a ready questions about the ESS Cyber cert.gov/training/fedvte. resource for the industrial Risk Assessment, please contact control system stakeholder [email protected]. Industrial Control Systems community. The collection Cyber Emergency Response provides a one-stop location for Enhanced Cybersecurity Team (ICS-CERT). The ICS- accessing papers, reports, Services (ECS) is an intrusion CERT focuses on control references, and standards prevention capability that helps system security across all associated with industrial U.S. based organizations critical infrastructure and key control system cybersecurity. (including state, local, tribal, resource sectors. The ICS- To view the collection, visit and territorial government CERT supports asset owners http://ics-cert.us- groups) protect their computer with reducing the risk of cyber- cert.gov/Standards-and- systems against unauthorized attacks by conducting outreach References. For more access, exploitation, and data for awareness, performing information, contact ics- exfiltration. ECS works by assessments, providing alerts [email protected]. sharing sensitive and classified and advisories, conducting cyber threat information with incident response activities, and Industrial Control Systems accredited Commercial Service performing technical analysis of Cybersecurity Training. ICS- Providers (CSPs). These CSPs malware, artifacts, and CERT performs outreach in turn use that information to vulnerabilities. For more activities and assists the control block certain types of malicious information, visit systems community to improve traffic from entering customer http://www.ics-cert.us-cert.gov their cybersecurity preparedness networks. Groups interested in or contact ICS-CERT at through various cybersecurity receiving ECS services should [email protected]. training courses. For more

40 3/1/16

information, visit http://ics- they are experiencing a cyber Stakeholders can report cert.us-cert.gov/Training- event of any kind, please call 1- cybersecurity incidents Available-Through-ICS-CERT. 866-787-4722 for the 24x7 MS- (including unexplained network ISAC Security Operations failures), the discovery of Information Technology Center, or visit malicious code, and Government Coordinating http://msisac.cisecurity.org/abo vulnerability information at Council provides a forum for ut/incidents and click on the https://forms.us-cert.gov/report. interagency coordination, and “Report an Incident” button. Contact the NCCIC Operations partnership among DHS, Center at [email protected] National Cyber Security National Coordinating Center or 888-282-0870. Division, federal, state, local, for Communications (NCC) tribal, and territorial continuously monitors national National Cybersecurity governments with a role in and international incidents and Assessment and Technical protecting the IT Sector. For events that may impact national Services Team (NCATS). more information, visit security and emergency The National Cybersecurity www.dhs.gov/information- preparedness communications. Assessment and Technical technology-sector. Incidents include not only acts Services (NCATS) team of terrorism, but also natural supports the NCCIC mission by Information Technology events such as tornadoes, offering cybersecurity scanning Sector Risk Assessment floods, hurricanes, and and testing services that identify provides an all-hazards risk earthquakes. To receive vulnerabilities within profile that public and private information on the NCC or to stakeholder networks and IT Sector partners can use to be added to the NCC provide risk analysis reports inform resource allocation for distribution list, please contact with actionable remediation research and development and the NCC Watch at 703-235- recommendations. These other protective measures which 5080 or e-mail critical services enable enhance the security and [email protected]. proactive mitigation to resiliency of the critical IT exploitable risks and include Sector functions. For more National Cybersecurity & network (wired and wireless) information, visit Communications Integration mapping and system www.dhs.gov/xlibrary/assets/ni Center (NCCIC) serves as a characterization, vulnerability pp_it_baseline_risk_assessment centralized location where scanning and validation, threat .pdf or contact operational elements involved identification and evaluation, [email protected]. in cybersecurity and social engineering, application, communications reliance are database, and operating system Multi-State Information coordinated and integrated. configuration review, and Sharing and Analysis Center NCCIC partners include all incident response testing. (MS-ISAC) seeks to improve federal departments and To learn more about NCATS or the overall cybersecurity agencies; state, local, tribal, and request information about their posture of state, local, tribal, territorial governments; the services, please contact and territorial partners. private sector; and international [email protected] Collaboration and information entities. The center’s activities V. sharing among members, include providing greater private sector partners, and understanding of cybersecurity National Cyber Exercise and DHS are the keys to success. and communications situation Planning Program (NCEPP) State, local, tribal, and awareness vulnerabilities, increases the cyber territorial government intrusions, incidents, mitigation, preparedness and resilience of representatives who believe and recovery actions. the nation through the conduct

41 3/1/16

and development of cyber find out how to get involved, Appendix to the Baseline exercises and planning please contact the Campaign at Capabilities for State and templates for and with public, [email protected] or Major Urban Area Fusion private, and international visit www.dhs.gov/national- Centers. This document is stakeholders. As part of the cyber-security-awareness- accompanied by a Cyber NCCIC, NCEPP works with month. Toolkit for fusion centers to use state, local, tribal, and territorial in building or improving their partners to provide direct cyber State, Local, Tribal and cyber programs. For more exercise support as a service or Territorial Cybersecurity information, please contact through participation in the Engagement Program fosters [email protected]. Department’s flagship biennial the relationships that protect our national-level cyber exercise Nation’s critical infrastructure Stop.Think.Connect.™ series: ”Cyber Storm.” and facilitates access to no-cost Campaign is a national public Additionally, NCEPP works programs, resources, and awareness campaign aimed at with a range of stakeholders to services for state, local, tribal, increasing the understanding of develop and deliver planning and territorial governments. cyber threats and empowering templates, such as the Cyber Governors and other appointed the American public to be safer Capabilities Framework and and elected state, local, tribal, and more secure online. state, local, tribal, and territorial and territorial government Initiated by President Obama’s Cyber Incident Annex officials receive cybersecurity Cyberspace Policy Review, Template. NCEPP’s cyber risk briefings and information DHS leads the Campaign in planning and exercise offerings on available resources. More partnership with the National are available at no cost to the importantly, these officials look Cyber Security Alliance and the state, local, tribal, and territorial to the program to identify Anti-Phishing Working Group. community. For additional cybersecurity initiatives and Law enforcement agencies and information, contact partnership opportunities with other organizations can receive [email protected]. federal agencies, as well as state free cybersecurity materials and local associations, that will (including tip sheets, National Cyber Security help protect their citizens presentations, and more) and Awareness Month (NCSAM) online. For more information collaborate with other members, is an annual campaign held each on the State, Local, Tribal, and including the Internatioanl October to raise awareness Territorial Cybersecurity Association of Chiefs of Police about cyber security among all Engagement Program, contact and the Department of Justice, Americans, with law [email protected]. by joining the Cyber Awareness enforcement across the country Coalition of government participating. National Cyber The Fusion Center Cyber agencies or the National Security Awareness Month, the Pilot was a one-year pilot for Network of non-profit groups. capstone event of the developing a framework for all For more information visit Stop.Think.Connect. Campaign, fusion centers on how to www.dhs.gov/stopthinkconnect. is designed to engage and integrate cyber security into or contact the Campaign at educate public and private their areas of [email protected]. sector partners through events responsibility. Under the and initiatives with the goal of guidance of a multi-agency United States Computer raising awareness about review board, the DHS, the MS- Emergency Readiness Team cybersecurity and increasing the ISAC, and others worked with (US-CERT) responds to major resiliency of the nation in the six Fusion Centers to develop incidents, analyzes threats and event of a cyber incident. To the resulting Cyber Integration exchanges critical cybersecurity learn more about NCSAM and for Fusion Centers, An information with trusted

42 3/1/16

partners around the world. US- about how to use US-CERT’s information resources of our CERT is working more closely syndicated feeds. For network of federal, state, local, than ever with partners to additional information, contact tribal, territorial and private develop a comprehensive [email protected]. sector partners. FPS provides picture of malicious activity and security planning; stakeholder mitigation options. Vulnerability Notes Database engagement; law enforcement In its role as the federal and National Vulnerability and information sharing information security incident Database (NVD) provide services; and incident response. center, US-CERT accepts timely information about incident notifications 24x7x365. software vulnerabilities, Explosive Detector Canine Guidance for federal and non- including associated impact, (EDC) Program is a critical federal entities to use when solutions and workarounds, and element of FPS’s submitting an incident lists of affected vendors. comprehensive security notification can be found at For more information, visit measures and supports strategic https://www.us- www.kb.cert.org/vuls, detection activities to clear cert.gov/incident-notification- http://web.nvd.nist.gov/view/vu identified areas of interest of guidelines. To report an ln/search, contact info@us- explosive threats. The EDC incident, malware, phishing or cert.gov or call 888-282-0870. teams provide mobile and vulnerabilities, visit effective capabilities for the https://www.us- The Critical Infrastrucure protection of life and property cert.gov/forms/report. Cyber Community (C³) through the provision of a Voluntary Program strong, visible, and US-CERT shares actionable (pronounced “C-Cubed”) is a psychological deterrence information through its public- public-private partnership against criminal and terrorist facing website, secure portal, aligning business enterprises as threats. EDC teams are the and National Cyber Awareness well as federal, state, local, most effective countermeasure System. Learn more about US- tribal, and territorial available today for detection of CERT’s products and services governments to existing explosives. The EDC teams, at https://www.us-cert.gov/ and resources that will assist their each comprised of a dog and a by contacting 888-282-0870 or efforts to use the National handler with law enforcement [email protected]. Institute of Standards and authority, conduct searches for Technology (NIST) a variety of explosive materials US-CERT National Cyber Cybersecurity Framework to on or near building exteriors, Awareness System (NCAS) manage their cyber risks as part parking lots, office areas, offers subscriptions to a variety of an all-hazards approach to vehicles, materials, packages of cybersecurity information for enterprise risk management. and persons in and around users with varied technical For more information, visit federal facilities. They also expertise. NCAS products www.us-cert.gov/ccubedvp. provide immediate and include Alerts, Bulletins, Tips specialized response to bomb and Current Activity updates. FEDERAL PROTECTIVE threats and unattended packages A subscription to any or all SERVICE RESOURCES or other such dangerous items NCAS products ensures access that may present a hazard to a to timely information about The Federal Protective Service federal facility. For more security topics and threats. To (FPS) protects federal facilities information contact the Chief of learn more or subscribe, visit and their occupants and visitors the Canine Operations Branch https://www.us- by providing law enforcement Uniformed Operations Division cert.gov/mailing-lists-and-feeds. and protective security services, at 703-235-6080 or This page includes information leveraging the intelligence and [email protected].

43 3/1/16

Mobile Command Vehicle awareness and common independent study and (MCV) Program supports operating picture development. classroom training and FPS’s mission through the materials that address a variety provision of mobile, on-site FPS has eight MCVs located at of topics relevant to law platforms for command, regional offices around the enforcement that are designed control, and communications country, as well as four SUV- to promote the knowledge and during terrorist attacks, natural based mobile communications skills needed to implement disasters, National Special vehicles, known as “Rabbits.” critical infrastructure protection, Security Events, and other The Rabbits provide most of the and resilience activities. The similar occurrences. The same communications Independent Study courses MCVs can rapidly deploy to capabilities as the MCVs, but developed by the Office of any location in the continental lack the command and control Infrastructure Protection are U.S. where the communications space and workstations. The available free of charge through infrastructure is inadequate or Rabbits afford a rapid the FEMA Emergency has been disrupted, or where deployment capability, as well Management Institute. More enhanced interoperability as the ability to navigate tight information about infrastructure among law enforcement spaces and unimproved roads, protection training programs is agencies is needed. Incident which allows for the projection available at management in the nation’s of communications services into www.dhs.gov/video/training- current threat environment areas that would otherwise be programs-infrastructure- requires mobility, inaccessible. The Rabbits are partners. interoperability among public designed to extend their safety agencies, reliability, and electronic footprint into  Critical Infrastructure cost effectiveness. FPS MCVs buildings of opportunity so that Protection: Achieving meet this need. MCVs can they can be rapidly converted Results through Partnership support daily operations as well into command posts with the and Collaboration (IS-913) as special deployments of the full communications services. provides an overview of the FPS Crisis Response Teams and Strategic locations around the elements and processes that other organizational elements. country ensure that each vehicle develop and sustain These highly specialized has a 750 mile “first due” successful critical vehicles augment the response radius and that any infrastructure protection capabilities of the FPS dispatch area of the continental U.S. can partnerships and and call centers, known as be provided with service within collaborations. For more MegaCenters, by allowing them one day. For more information, information, visit to remotely dispatch units and contact the Chief of the Critical http://training.fema.gov/EM link different radio systems Incident Management Branch, IWeb/IS/courseOverview.as together without the need to Uniformed Operations Division px?CODE=IS-913.a. actually send personnel to the at 703-235-6080 or scene. Each MCV also [email protected].  Implementing Critical provides an environmentally Infrastructure Protection controlled platform for on-scene INFRASTRUCTURE Programs (IS-921.a) command and control functions, SECURITY AND addresses processes for with small conferencing areas, RESILIENCE TRAINING informing partnerships, video-teleconferencing, data AND RESOURCES sharing information, analysis and processing, and managing risk, and ensuring information acquisition and Critical Infrastructure continuous improvement. management for situational Security and Resilience For more information, visit Training includes web-based

44 3/1/16

https://training.fema.gov/E to critical infrastructure. It information, visit MIWeb/IS/courseOverview. is designed for all personnel http://training.fema.gov/EM aspx?code=IS-921.a and service providers who IWeb/IS/IS906.asp. are associated with critical  Active Shooter: What You infrastructure. For more These courses can be used by Can Do (IS-907), which information, visit law enforcement to educate uses interactive scenarios http://training.fema.gov/EM members of their community. and videos to illustrate how IWeb/IS/courseOverview.as The Workplace Security and individuals who become px?code=IS-915. Active Shooter courses are involved in an active supplemented by classroom shooter situation should  Retail Security Awareness: materials (instructor guides, react. For more Understanding the Hidden student manuals, and visuals) information, visit Hazards (IS-912), which is that can be downloaded from http://training.fema.gov/EM designed to make persons the website. IWeb/IS/IS907.asp. involved in commercial retail operations aware of Homeland Security  Critical Infrastructure the actions they can take to Information Network – Security: Theft and identify and report Critical Infrastructure Diversion – What You Can suspicious purchases or (HSIN-CI) Do (IS-916) is designed for thefts of products that actors critical infrastructure could use in terrorist or HSIN-CI provides secure employees and stakeholders, other criminal activities. networked information sharing and provides information For more information, visit covering the full range of and resources available to http://training.fema.gov/EM critical infrastructure interests. identify threats and IWeb/IS/IS912.asp. Validated critical infrastructure vulnerabilities to critical partners are eligible for HSIN- infrastructure from theft and  Surveillance Awareness: CI access. diversion of critical What You Can Do (IS-914) resources, raw materials, provides training on actions The National Infrastructure and products that can be that can be taken to detect, Coordinating Center (NICC) used for criminal or terrorist deter, and report suspicious posts content from a variety of activities. The course also activities associated with internal and external sources identifies actions that can be adversarial surveillance. It is that is available to all critical taken to reduce or prevent designed for individuals infrastructure partners, theft and diversion. For with little to no physical or including incident situation more information, visit operations security reports, threat reports, impact http://training.fema.gov/EM experience. For more modeling and analysis, common IWeb/IS/courseOverview.as information, visit vulnerabilities, potential px?code=IS-916. http://training.fema.gov/EM indicators, and protective IWeb/IS/courseOverview.as measures.  Protecting Critical px?code=is-914. Infrastructure Against The NICC combines current Insider Threats (IS-915)  Workplace Security high-interest incidents and provides guidance to critical Awareness (IS-906) which events on the HSIN-CI “front infrastructure employees provides training for a broad page” to enable easy access to and service providers on audience recognizing threats relevant information. how to identify and take and improving security in action against insider threats the workplace. For more

45 3/1/16

Individual sectors and sub- efforts. The IP Gateway provide 24/7 situational sectors self-manage more provides various data collection, awareness, information sharing, specific portals within HSIN-CI analysis, and response tools into and unity of effort to ensure the where smaller communities of one system, streamlining access protection and resilience of the participants receive and share to IP’s tools and datasets by Nation’s critical infrastructure. relevant information for their leveraging a single user When an incident or event particular information needs. registration, management, and impacting critical infrastructure authentication process. occurs that requires HSIN-CI also includes Highlights of the IP Gateway coordination between DHS and capabilities to facilitate multiple include the ability to access: the owners and operators of types of information sharing  a selection of physical and critical infrastructure, the NICC and coordination, including cyber vulnerability tools and serves as a national suspicious activity reporting, security surveys; coordination hub to support the webinars, shared calendars, etc.  a consolidated library of protection and resilience of critical infrastructure data, physical critical infrastructure To ensure broad sharing of assessments and reports; assets. Establishing and essential information, the NICC  integrated data visualization maintaining relationships with also receives and provides and mapping tools to critical infrastructure partners information via other HSIN support complex data both within and outside the portals. analysis; and Federal Government is at the  situational awareness tools core of the NICC’s ability to To request HSIN-CI access, to support special event and execute its functions. The submit the following to incident planning and NICC collaborates with federal [email protected]: response activities. departments and agencies and  Name For more information, contact private sector partners to  Employer [email protected] or 1- monitor potential, developing,  Title 866-844-8163. and current regional and  Business email national operations of the Nation’s critical infrastructure  Brief written justification National Infrastructure sectors. For more information, Coordinating Center (NICC). contact [email protected] or For questions regarding HSIN- The NICC serves as a 202–282–9201. CI access, please contact the clearinghouse to receive and

NICC. synthesize critical infrastructure Office of Cyber and information and provide that Infrastructure Analysis Infrastructure Protection information back to decision (OCIA) provides infrastructure Gateway (IP Gateway) serves makers at all levels inside and consequence analysis and as the single interface through outside of government to enable prioritization capabilities to which DHS mission partners rapid, informed decisions in DHS, government, and private can access a large range of steady state, heightened alert, sector stakeholders. OCIA integrated IP tools and data to and during incident response. experts analyze the effects of conduct comprehensive The NICC serves as the national risk mitigation actions in many vulnerability assessments and focal point for critical forms, including strategic threat data analysis. This, in turn, infrastructure partners to obtain and risk analysis; modeling and enables homeland security situational awareness and simulation; and analytic support partners to quickly identify integrated actionable to Department decision makers relevant vulnerability and information to protect physical and security partners before, consequence data in support of critical infrastructure. The during, and after incidents. event planning and response mission of the NICC is to

46 3/1/16

OCIA, the Office of assess and understand the risk All-Hazards Communications Intelligence and Analysis, and landscape, and provide leading Unit Leader (COML) Course FEMA also provides risk indicators for emerging cyber is an NPPD’s Office of analysis tradecraft training to security threats, and Emergency Communications Fusion Centers. For access to vulnerabilities to critical (OEC) Technical Assistance risk analysis training call 202- infrastructure. course that familiarizes 282-8866 or e-mail communications professionals [email protected] To find out how the PCII with the role and ov. For questions or requests, Program can support your responsibilities of a COML contact [email protected]. programmatic needs, contact us under the National Incident at [email protected] or at 1- Management System Incident Protected Critical 866-844-8163. Command System (NIMS ICS) Infrastructure Information and provides exercises that (PCII) Program Protective Security Advisors reinforce the lecture materials. Are you finding it difficult to (PSAs) are security subject OEC offers this course jointly obtain the vital critical matter experts who engage on with FEMA/EMI, as "E-969, infrastructure information (CII) protective measures and NIMS ICS All Hazards needed to support your critical resilience planning with state, Communications Unit Leader.” infrastructure initiatives? Are local, tribal, and territorial This course is available to state private industry partners government mission partners and local law enforcement reluctant to share their data with and members of the private agencies as part of OEC you, out of fear that it could sector stakeholder community Technical Assistance. For more expose potentially sensitive to protect the Nation’s critical information, contact and/or proprietary information infrastructure. As part of their [email protected]. to the public? mission supporting critical infrastructure protection, the All-Hazards Communications If so, the PCII Program offers a PSAs plan, coordinate, and Unit Technician (COMT) way for homeland security conduct security surveys and Course introduces public analysts to access vital CII, assessments; plan and conduct safety professionals and support while offering assurances to assistance visits; support staff to various communications facility owners/operators that National Special Security concepts and technologies their information is protected Events and Special Event including interoperable from public disclosure. Created Activity Rating events; respond communications solutions, land by Congress in the Critical to incidents; and plan, mobile radio (LMR) Infrastructure Information Act coordinate, and conduct training communications, satellite, of 2002, the PCII Program – to include coordinate telephone, data and computer ensures that PCII in the improvised explosive device technologies during an incident government’s hands is protected (IED) awareness and IED risk response and for planned from disclosure, from use in mitigation training. For more events. The course is taught by civil litigation; or for regulatory information or to contact your OEC/ICTAP instructors who purposes. local PSA, contact have both practitioner and [email protected]. Communications Unit By integrating PCII protections experience and is designed for into the data-collection process, PUBLIC SAFETY AND state, territory, tribal and urban homeland security analysts are EMERGENCY emergency response personnel better positioned to obtain and COMMUNICATIONS in all disciplines who have a protect the critical business technical communications sensitive information needed to background. For more

47 3/1/16

information, contact Governance to Achieve Assistance (TA) Program [email protected]. Statewide Communications provides technical assistance at Interoperability, and the Formal no cost to all levels of state, Auxiliary Communications Agreement and Standard local, and tribal law workshop is designed for the Operating Procedure Template enforcement to support Auxiliary Communicator and Suite. For more information, interoperable communications volunteer who provide contact [email protected] or visit solutions and practices. This emergency backup radio www.publicsafetytools.info. assistance is offered annually communications support to through Statewide public safety agencies for National Emergency Interoperability Coordinators planned or unplanned events at Communications Plan (SWICs) based on risk and state and local levels. It is (NECP) sets goals and capabilities, and it supports all designed for amateur radio identifies key national priorities lanes of the SAFECOM operators or groups who work to enhance governance, Interoperability Continuum. with public safety and cross- planning, technology, and There are 72 TA services are disciplinary emergency training and exercises to offered through the OEC TA response professionals. This improve disaster Catalog that can be viewed on workshop is available to state communications the PSTools site at: and local public safety capabilities. Originally www.publicsafetytools.info. personnel as part of OEC’s published in 2008, the NECP These offerings are at no-cost Technical Assistance Program. was revised in 2014 to address and can be requested through For more information, contact the rapidly evolving emergency Statewide Interoperability [email protected]. communications landscape, Coordinators. The services specifically the increased provided range from Emergency Communications adoption of IP-based communications-focused Guidance Documents and technologies. While the 2014 exercises, NIMS ICS Methodologies are stakeholder- NECP continues to focus on the communications training to driven guidance documents and maintenance and operation of developments in broadband for methodologies to support Land Mobile Radio (LMR) public safety, dispatch emergency responders across systems, it urges state and local operations and NG9-1-1- the Nation as they plan for and jurisdictions to plan and prepare implementation. For more implement emergency for the adoption and integration information, contact communications initiatives. of broadband technology into [email protected]. These resources identify and emergency communications, promote best practices for including the Nationwide Public OEC Route Diversity Project improving statewide Safety Broadband Network (RDP) assists agencies on governance, developing (NPSBN). Continued increasing the continuity of standard operating procedures, collaboration between public their local access networks. managing technology, and private sector entities is The local access network is the supporting training and vital as the 2014 NECP begins “last mile” connection between exercises, and encouraging use to be implemented an agency’s on-site of interoperable nationwide. For more communications communications. Each is information, visit infrastructure and the service available publicly and is www.dhs.gov/necp or contact provider’s Central Office updated as needed. Examples [email protected]. (CO) or Point of Presence include the Public Safety (POP). In the event of an Communications Evolution OEC Interoperable undesirable event, such as a Brochure, Establishing Communications Technical cable cut, flood, or damage to

48 3/1/16

the service provider’s facility, your selected SAFECOM Guidance on the local access network may be telecommunications carrier. Emergency Communications entirely lost, leaving the agency . Telecommunications Grants provides unable to perform mission- Service Priority (TSP) recommendations to grantees essential functions. The RDP provides priority repair and seeking funding for methodologies, tools, and installation of critical voice interoperable emergency handbooks are designed to and data circuits in many communications projects, assist agencies evaluate their situations. An initiation fee including allowable costs, items organization’s connectivity and and nominal monthly cost to consider when funding suggest mitigation solutions to are associated with this emergency communications increase route diversity. For service. projects, grants management more information, contact best practices for emergency [email protected]. For more information, please communications grants, and visit the following websites: information on standards that Priority Telecommunications www.dhs.gov/gets; ensure greater interoperability. Services (PTS) programs www.dhs.gov/wps; The guidance is intended to provide national security and www.dhs.gov/tsp. ensure that Federally-funded emergency preparedness investments are compatible and (NS/EP), public safety and first The SAFECOM Program support national goals and responders, and Critical works to improve multi- objectives for improving Infrastructure Key Resources jurisdictional and interoperability nationwide. For (CIKR) industries the ability to intergovernmental more information visit communicate on communications www.safecomprogram.gov/gran telecommunications networks interoperability. Its t/Default.aspx or contact during times of membership includes more than [email protected]. congestion. This is 70 members representing state, accomplished through the local, and tribal emergency The Southwest Border following three services: responders, and major Communications Working . Government Emergency intergovernmental and national Group (SWBCWG) serves as a Telecommunications public safety associations, who forum for federal, state, local, Service (GETS) provides provide input on the challenges, and tribal agencies in Arizona, priority access to the needs, and best practices California, New Mexico, and landline networks when involving emergency Texas to share information on abnormal call volumes exist, communications. The common issues, collaborate on providing enhanced call SAFECOM website provides existing and planned activities, completion for critical members of the emergency and facilitate federal personnel. response community and other involvement in multi-agency . Wireless Priority Service constituents with information projects within the Southwest (WPS) provides priority and resources to help them meet Border Region. The SWBCWG voice access to the cellular their communications and aims to enhance networks when abnormal interoperability needs. For communications operability and call volumes exist, more information, visit interoperability, effectively use providing enhanced call www.safecomprogram.gov, or the region’s available critical completion for critical contact communications infrastructure public safety personnel. An [email protected] resources, and ensure that initiation fee and nominal ov. programs continue to meet the monthly cost are associated stakeholders’ needs. For more with this service through

49 3/1/16

information, contact PIA and other tools to assess [email protected]. PRIV uses the DHS Fair and document the integration of Information Practice Principles rules into the Department’s Statewide Communication as the policy framework to programs and IT systems. To Interoperability Plans (SCIPs) enhance privacy protections by foster public trust through are locally-driven, multi- assessing the nature and transparency, DHS publishes its jurisdictional, and multi- purpose for all personally PIAs, as well as the templates disciplinary statewide strategic identifiable information (PII) and guides used to create those plans to enhance emergency collected to fulfill the PIAs, directly to the public. For communications. The SCIP Department's mission. more information, visit provides strategic direction and www.dhs.gov/privacy- alignment for those responsible PRIV makes much of its work compliance. for interoperable publically accessible via communications at the state, www.dhs.gov/privacy to share Policy Establishing the Fair regional, local, and tribal levels. its experience and work Information Practice These strategic plans outline products with DHS’s partners Principles as a matter of and define the current and and the public. Department procedure. DHS future vision for believes in a set of privacy communications PRIV is always available to principles that guide all DHS interoperability within the state support our state and local strategies, programs, and IT or territory. They also align partners. Please feel free to systems. DHS uses these emergency response agencies contact us at 202-343-1717 or principles as the foundation for with the goals, objectives, and [email protected]. new initiatives and PIAs of initiatives for achieving that existing programs. DHS vision. SCIPs are living The following materials may be memorialized these principles documents that are typically of particular interest to state and as department policy. For more updated on an annual basis, or local law enforcement offices, information, visit as frequently as needed. For programs, and IT systems. www.dhs.gov/xlibrary/assets/pri more information, visit vacy/privacy_policyguide_2008 www.dhs.gov/statewide- Privacy Compliance Reviews. -01.pdf. communication- PRIV issues privacy policies interoperability-plans. and conducts Privacy Impact Policy Establishing the Assessments (PIAs) to Privacy Impact Assessment as implement those policies. a standardized government DHS Privacy Office Later, PRIV revisits the results privacy compliance process. (PRIV) of these efforts to evaluate PRIV uses a structured performance according to its approach to build privacy PRIV protects all individuals guidance principles and protections into specific regardless of citizenship by standards. For more programs: The PIA. DHS embedding and enforcing information, visit formally established the PIA privacy protections and www.dhs.gov/privacy- requirement as a matter of transparency in all DHS investigations-compliance- policy. For more information, activities. PRIV works with reviews. visit every DHS component and www.dhs.gov/xlibrary/assets/pri program to ensure that privacy Privacy Compliance program, vacy/privacy_policyguide_2008 considerations are addressed guidance, and templates. -02.pdf. when planning or updating any PRIV operates a robust privacy program, system, or initiative. compliance program, using the

50 3/1/16

Privacy Incident Handling The Centers of Excellence establish operational Guidance. All organizations (COE) network is an extended requirements and standards, and face the risk of privacy breaches consortium of hundreds of develop and commercialize and other incidents. PRIV universities generating ground- solutions. Projects in the First created a formal approach to breaking ideas for new Responders Group’s four preparing for and responding to technologies and critical strategic priority areas – privacy incidents. For more knowledge, while also relying communications, data sharing, information, visit on each other's capabilities to first responder safety and www.dhs.gov/xlibrary/assets/pri serve the Department's many effectiveness, and vacy/privacy_guide_pihg.pdf. mission needs. radiological/nuclear response and recovery research and Privacy Outreach & Managed through S&T‘s Office development – result directly Education. PRIV shares its of University Programs, the from close collaboration with experience directly with the COEs organize leading experts the end users. Reflecting public and its partners in the and researchers to conduct S&T’s focus on transition, FRG public, private, and academic multidisciplinary homeland has worked to ensure that sectors. For more information, security research and education. technologies developed in visit www.dhs.gov/privacy- All COEs work closely with coordination with S&T are events. academia, industry, Department available to first responder components, and first- communities nationwide; PRIV issues tailored responders to develop S&T’s technologies are educational materials to support customer-driven research included in the Federal its government and commercial solutions to 'on the ground' Emergency Management colleagues, for example: The challenges as well as provide Agency’s Authorized Handbook for Safeguarding essential training to the next Equipment List that public Sensitive Personally Identifiable generation of homeland security safety agencies are authorized Information. For more experts. to purchase from with their information, visit federal grant dollars. For more www.dhs.gov/sites/default/files/ Each center is university-led or information, visit publications/privacy/Guidance/ co-led in collaboration with www.dhs.gov/science-and- handbookforsafeguardingsensiti partners from other institutions, technology/first-responders. vePII_march_2012_webversion agencies, national laboratories, .pdf. think tanks and the private FirstResponder.gov is a sector. The research portfolio is website that enables federal, a mix of applied research state, local, tribal, and territorial Science and Technology addressing both short and long- first responders to easily access Directorate (S&T) term needs. The COE extended and leverage federal resources network is also available for on products, standards, testing The S&T Directorate's mission rapid response efforts. For and evaluation, and best is to improve homeland security more information, visit practices to develop or deploy by providing to customers state- www.dhs.gov/science-and- technologies to enhance of-the-art technology that helps technology/centers-excellence. homeland security. The website them achieve their missions. provides original content S&T customers include the The First Responders Group through blogs and articles, operating components of the is S&T’s component that works which highlight federal Department, and state, local, directly with first responder programs, initiatives, webinars, tribal, and territorial emergency organizations to identify and and research. “Technology responders and officials. prioritize gaps in capabilities, Profiles” display DHS-funded

51 3/1/16

research and technologies by to first responders and the innovative technologies. The state. FirstResponder.gov also emergency preparedness and lack of consolidated categorizes information by response community at the requirements for first discipline: medical, explosives, federal, state, local, tribal, and responders, along with the fire, hazardous materials, law territorial levels. More than 120 limited purchasing, results in an enforcement, and search and responders from around the inadequate amount of new rescue. The website also country are engaged throughout technology being available. provides a user feedback S&T’s established solution This leads to an insufficient mechanism via email at: development process to amount of research & [email protected]. Visit identify, validate, and facilitate development (R&D) being www.firstresponder.gov. the fulfillment of first responder conducted in the first responder needs through the use of market. The goal of the First Responder Communities existing and emerging International Consortium for of Practice is an online technologies, knowledge First Responder R&D is to network, sponsored by DHS products, and standards. The work collaboratively with Science and Technology First group meets annually in person international partners to Responders Group, for vetted and virtually throughout the improve first responder active and retired first year. To learn more about the capabilities. To learn more responders, emergency response FRRG, contact about the International professionals; federal, state, [email protected]. Consortium for First Responder local, tribal, and territorial R&D contact Homeland Security and International Consortium for [email protected]. government officials, academic, First Responder Research and non-profit, and volunteers Development is being The National Urban Security sponsored by the DHS S&T’s established by FRG to Technology Laboratory First Responder Technologies collaborate with international (NUSTL) is tasked with the program. Registered members partners to consolidate common mission to test, evaluate, and of this professional network first responder capability gaps; analyze Homeland Security share information, ideas, and share knowledge and networks capabilities while serving as a best practices, enabling them to with industry, academia, technical authority to first more efficiently and effectively developers and innovators; and responder, state, and local prepare for all hazards. To date, support the aggregation of the entities in protecting our cities. First Responder Communities global first responder market. In executing its mission, the of Practice has more than 7,000 In order to respond more Laboratory serves as a federal active members and nearly 200 effectively, safely, and technical authority promoting active communities based on efficiently to everyday and the successful development and diverse interests and disciplines. catastrophic emergencies, first integration of homeland For more information, visit responders around the globe security technologies into www.firstresponder.gov or need technologically advanced operational end-user https://communities.firstrespond tools and equipment. However, environments by objectively: er.gov. there is no centralized  Conducting test programs, mechanism for them to identify pilots, demonstrations, and The First Responder Resource and discuss shared needs and other forms of evaluations Group (FRRG) serves as a requirements. In addition, they of homeland security mechanism for continuous tend to purchase tools and technologies, both in the dialogue and the coordination of equipment in small quantities, field and in the laboratory. research, development and which provides little incentive  Leveraging knowledge of delivery of technology solutions for industry to commercialize end-user operations for

52 3/1/16

more effective development assessment programs for eight laboratories were of technologies, training and products and equipment listed officially recognized by DHS as exercises, ConOps, and in FEMA AEL. The Office has part of the P25 CAP. A DHS- procedures. also entered into agreement approved laboratory is  Enabling first responders to with ASTM International to authorized to produce summary meet their mission facilitate the procurement and detail test reports for P25 requirements by supporting actions of the responder and law equipment. For more them in the development of enforcement community by information, visit operational requirements making standards available to www.llis.dhs.gov/knowledgeba and advising them on state and local law enforcement se/certifications-declarations. potential solutions to meet and responder organizations at these needs. no cost. The Office is currently The Responder Technology  Supporting development involved in developing Alliance (RTA) was and use of homeland standards for bomb squad established by FRG to reframe security equipment and robots, personal protective the discussion among first operational standards. equipment, urban search and responders, industry and rescue robots, communications investment community, and For more information, visit equipment, chemical and other research and development www.dhs.gov/science-and- biological detectors among organizations to address current technology/national-urban- others that directly address and future emerging security-technology-laboratory. needs expressed by the law technologies. The goal of the enforcement community. For program is to leverage resources The Office of Standards, more information, contact and expertise to deliver within the Capability [email protected]. integrated responder solutions Development Support Group at “market speed.” RTA is facilitates the development and Project 25 Compliance designed to bring a diverse set integration of standards across Assessment Program (P25 of stakeholders together to the entire spectrum from CAP) was established, in explore innovative technology innovation to operations. The coordination with NIST, to solutions, standards Office works closely with provide a process for ensuring formulation, and federal, state, and local law that first responder commercialization approaches enforcement partners to communications equipment to improve responder health, identify, developB and complies with P25 standards, safety, and effectiveness. RTA promulgate standards through meets performance focus areas are: (1) Body-Worn InterAgency Board’s (IAB) requirements, and is capable of Electronic Systems; (2) Standardized Equipment List interoperating across Integrated Voice and Data (SEL) and the FEMA manufacturers. P25 standards Communications; (3) Multiple Authorized Equipment List are focused on developing Hazard Personal Protective (AEL) for the law enforcement radios and other components Clothing and Equipment (PPE); community’s needs. In addition, that can interoperate regardless and (4) Advance Sensors and the Office works with the of manufacturer. P25 CAP Information Technologies. National Institute of Justice allows emergency responders to RTA’s goal is to work with (NIJ) and the National Institute confidently purchase and use industry to change the dynamic of Standards and Technology P25-compliant products, and the from first responder R&D (NIST) to promote the Program represents a critical efforts that are short-term and development and availability of step toward allowing responders incremental with fragmented relevant standards and to communicate with their own solutions often resulting in associated conformity equipment. In 2009, the first marginal, incremental

53 3/1/16

improvements to operations and and evaluation for enhanced emergency response agencies in interoperability, to solutions video quality through Sacramento, California, and is that are innovative, well measurable, objective, and currently upgrading EDGE integrated and make the standards-based solutions across with feedback collected from Nation’s first responders safer. the full spectrum of video-use the Sacramento exercise. To learn more about RTA cases for the public safety Eventually, S&T plans to contact [email protected]. community. For more incorporate this scenario, as information, contact well as others, into a System Assessment and [email protected] customizable, multi-player Validation for Emergency online game that is Responders (SAVER) Program Virtual Training provides a interoperable with multiple user assists emergency responders virtual environment that every interfaces (e.g., joy stick, making procurement decisions jurisdiction within the country keyboard, gaming console). To by providing subjective will be able to access, train learn more about simulation assessments of commercial within, and modify to meet their tools for first responders, responder equipment and individual needs. S&T is contact [email protected]. systems. SAVER provides leveraging investments and those assessment results along technological advances made by with other relevant responder the military, specifically the United States Secret equipment information in an U.S. Army’s prototype virtual Service operationally useful form. environment called Enhanced (Secret Service) SAVER focuses primarily on Dynamic Geo-Social answering two questions: Environment (EDGE) Virtual The mission of the Secret “What equipment is available?” Training. S&T is using EDGE Service is to safeguard the and “How does it perform?” to develop a series of realistic, nation’s financial infrastructure The Knowledge Products first responder-identified and payment systems to produced by the SAVER scenarios. The scenarios will preserve the integrity of the Program are available to the have varying levels of difficulty economy, and to protect responder community through and will require users to national leaders, visiting heads www.firstresponder.gov/SAVE successfully employ tactics, of state and government, R techniques, and procedures to designated sites and National respond. The tool also has a Special Security Events. Video Quality in Public Safety strategic component requiring (VQiPS) Working Group was responders to establish Unified Computer Emergency formed to focus on the major Command to manage complex Response Team (CERT) at policy, technology, and cross discipline events. S&T Carnegie Mellon. In August practical uses and challenges of worked with first responders to 2000, the Secret Service and the public safety video systems. identify critical incidents and Software Engineering Institute, The working group is chose an active shooter for the a federally-funded research and comprised of emergency first scenario and with the U.S. development center located at responders across all levels of Army to create a 3-D Carnegie Mellon University, government, academia, federal environment for the scenario, as instituted the Secret Service partners, and industry. The well as accurate avatars, Computer Emergency Response VQiPS Working Group creates equipment, and simulations of (CERT) liaison program. This knowledge products, fosters a individuals and crowds. program positions the Secret knowledge-sharing Following initial development, Service to meet emerging cyber environment, and supports S&T conducted a pilot to security threats as part of the research, development, testing, demonstrate this scenario with agency’s investigative and

54 3/1/16

protective missions. The agents bank fraud, and other computer- and other electronic media. assigned to the CERT liaison related crimes. CIS provides These agents possess the program lead Secret Service- crucial information and required expertise to collect and sponsored research and coordination to facilitate the process digital evidence to development as well as direct successful dismantling of support computer related technical support for international criminal investigations in the field. They investigative and protective organizations. Requests for also provide expertise in the operations. The agents assigned investigative assistance should investigations of network to the CERT liaison program be facilitated through your local intrusions and database thefts. work closely with the Software Secret Service Field Office at The program provides a venue Engineering Institute and http://www.secretservice.gov/co that establishes and maintains Carnegie Mellon University to ntact/field-offices/ or contact relationships with the private identify and implement your local ECTF at sector in order to sustain and advanced technology in support http://www.secretservice.gov/in continually improve its of the full spectrum of Secret vestigation/#field. knowledge of emerging trends Service operations. CERT does in the cyber industry. ECSAP distribute forensic tools eInformation Network. The agents conduct forensic developed at the university to Secret Service’s eInformation examinations for other federal, state and local law enforcement Network is available – for free – state, or local law enforcement agencies. For more to authorized law enforcement upon request. For more information, visit officers, financial institution information, please contact your http://www.cert.org/digital- investigators, academic local Secret Service Field intelligence/index.cfm. partners, and commercial Office at partners of the Secret Service. http://www.secretservice.gov/in Cyber Intelligence Section The site contains two tools: the vestigation/#field or contact (CIS) collects, analyzes, and eLibrary, a unique collection of your local ECTF at disseminates data in support of resource databases which http://www.secretservice.gov/in Secret Service investigations allows authorized users from vestigation/#field. worldwide and generates new throughout the law enforcement investigative leads based upon community to obtain Electronic Crimes Task Force this intelligence. CIS leverages information on a range of (ECTF). The USA PATRIOT digital equipment and sensitive topics including Act of 2001 mandated the information obtained through counterfeit corporate checks, Secret Service to establish private partnerships to monitor credit card issuing bank nationwide Electronic Crimes developing technologies and information, and recovered Task Forces to combine the trends in the financial payments skimming devices; and the U.S. resources of academia; the industry. This information is Dollars Counterfeit Note private sector; and local, state, used to enhance the Secret Search, a site that provides the and federal law enforcement Service’s capabilities to prevent user with the ability to conduct agencies to “prevent, detect and and mitigate attacks against the a search of the Secret Service investigate various forms of financial and critical counterfeit note database. For electronic crimes, including infrastructures. CIS has more information, visit potential terrorist attacks developed an operational www.einformation.usss.gov. against critical infrastructure investigative unit, which and financial payment targets, pursues, and Electronic Crimes Special systems.” There are currently international cyber criminals Agent Program (ECSAP). 39 Secret Service ECTFs, to involved in cyber intrusions, ECSAP trained specialists include London, England and identity theft, credit card fraud, conduct forensic examinations Rome, Italy. Membership in of computers, mobile devices, 55 3/1/16

the Secret Service ECTFs money laundering, and other The U.S. Department of include approximately 350 illicit activity. For more Justice’s IOC-2 marshals the academic partners; over 2,500 information, please contact your resources and information of international, federal, state, and local Secret Service Field nine U.S. law enforcement local law enforcement partners; Office at agencies, as well as federal and over 4,000 private sector http://www.secretservice.gov/co prosecutors, to collectively partners. Through the ECTFs, ntact/field-offices/. combat the threats posed by local and state law enforcement international criminal officers may request Financial Crimes Task Forces organizations to domestic safety investigative assistance from (FCTF). The Secret Service and security. The Secret the Secret Service’s Mobile through years of collaboration Service IOC-2 detailee serves as Wireless Investigations teams. on investigative endeavors the liaison between the Secret There are currently 22 MWI established unique partnerships Service and the IOC-2 acting as teams throughout the United with state, local, and other a conduit for information and States. For more information, Federal law enforcement requests in support of field visit agencies. Leveraging those agents. For more information, http://www.secretservice.gov/in partnerships with the agencies please contact your local Secret vestigation/#field. Also see long-standing cooperation with Service Field Office at ICE section above. the private sector, the Secret http://www.secretservice.gov/co Service established a national ntact/field-offices/. Financial Crimes network of Financial Crimes Enforcement Network Task Forces (FCTFs). The Mobile Device Forensic (FinCEN), a bureau within the FCTFs combine the resources Facility. The Mobile Device Department of Treasury, of the private sector and other Forensic Facility in Tulsa, OK provides financial transaction law enforcement agencies in an was created in 2008 to meet the information to law enforcement organized effort to combat challenges associated with the at the federal, state, local, and threats to our financial payment forensic extraction of data from international level. FinCEN systems and critical mobile devices. The Secret enhances the integrity of infrastructures. The multi- Service established a financial systems by facilitating agency components are well partnership with the University the detection and deterrence of suited to conduct complex, in- of Tulsa, Digital Forensic financial crime, by receiving depth, multi-jurisdictional Laboratory Center of and maintaining financial investigations. Through their Information Security to create transactions data; analyzing and membership in a FCTF, local and co-locate the Mobile disseminating that data for law and state law enforcement Device Forensic Facility at the enforcement purposes; and entities may access University. The facility building global cooperation investigative resources to provides training and conducts with counterpart organizations include FinCEN, INTERPOL, forensic examinations and in other countries and with and IOC-2 databases. For more research on mobile devices. international bodies. information, please contact your The ongoing research into these FinCEN utilizes numerous local Secret Service Field new devices, operating systems databases to provide Office at and mobile device technologies intelligence and analytical http://www.secretservice.gov/co provides valuable tools in the support to law enforcement ntact/field-offices/. Secret Service’s fight against investigators protecting the U.S. cybercrime. Requests for financial system from the International Organized investigative assistance should abuses of criminal activities to Crime Intelligence and be facilitated through your local include terrorist financing, Operations Center (IOC-2). Secret Service Field Office at

56 3/1/16

http://www.secretservice.gov/co Network Investigation Training, transportation domain, on ntact/field-offices/. Network Intrusion Response behalf of TSA’s Office of Law Program, Basic Mac Enforcement/Federal Air National Center for Missing Investigation Training, Basic Marshal Service. and Exploited Children. The Mobile Device Investigations, Secret Service supports the Mobile Device Examiner, Typical liaison contacts for the National Center for Missing and Advance Mobile Device AFSDs-LE may include airport Exploited Children and local Examiner, Online Social police authority, Transportation law enforcement with its Networking, Computer Security Officers, Immigration expertise in forensic analysis to Forensics in Court – and Customs Enforcement, the include crime scene, Prosecutors, Computer Joint Terrorism Task Force, handwriting, document Forensics in Court – Judges, Customs and Border Protection, authentication, ink analysis, Mobile Devices in Court – the TSA Office of Inspection, fingerprints and photography, Prosecutors and Mac Forensics and any other local, state, graphic design, video Training. NCFI provides and/or federal agencies whose productions, audio/image funding for all travel expenses, investigative interests may have enhancement and speaker hotel and per diem for state and a nexus to the transportation recognition services. local law enforcement officers. system within TSA’s area of Specialized polygraph and Additionally, all NCFI responsibility. For more crime scene services are graduates receive hardware, information on TSA’s AFSD- evaluated upon request. For software and licenses necessary LE program, visit the TSA more information, visit to conduct forensic computer Website or contact your http://www.missingkids.com/ho and network intrusion OLE/FAMS Supervisory Air me and examinations. For more Marshal in Charge (SAC) or http://www.secretservice.gov/in information, visit FSD. vestigation/#forensic. www.ncfi.usss.gov. Commercial Vehicle Counter- National Computer Forensics Terrorism Training. Created Institute (NCFI) – Hoover, Transportation Security under commission by TSA, the AL. The NCFI was established Administration DHS Federal Law Enforcement in 2007 through a partnership (TSA) Training Center (FLETC) initiative between DHS, the worked directly with state, Secret Service, and the federal and municipal law TSA protects the nation’s Alabama District Attorneys enforcement agencies to transportation systems to ensure Association. The NCFI offers identify the most effective ways freedom of movement for state and local law enforcement for on-site officers to identify people and commerce. officers, prosecutors, and judges and intercept commercial a variety of cyber-related vehicle-borne terrorist threats. Assistant Federal Security training courses based on the Training at FLETC facilities or Directors for Law Secret Service electronic crimes to law enforcement units at their Enforcement (AFSDs-LE) training model. NCFI offers the home stations has been certified The AFSD-LE, working under following 15 courses: Basic as eligible for DHS the direction of the Federal Investigation of Computer and reimbursement through state Security Director (FSD), works Electronic Crimes Program, assistance programs. Visit the to establish and maintain liaison Basic Scripting Techniques, FLETC website for more with local, state, and federal law Basic Computer Evidence information: enforcement authorities, as well Recovery Training, Advanced https://www.fletc.gov/training- as coordinate activities taking Forensics Training, Basic program/commercial-vehicle- place within their assigned 57 3/1/16

counterterrorism-training- and to order your training various transportation modes, I- program or contact the FLETC materials, visit STEP provides a variety of Glynco office at 912-267-3587. www.tsa.gov/stakeholders/traini products and services that ng-and-exercises. enable security partners to Counter-Terrorist Guides. enhance security capabilities by Pocket-sized publications First Observer Security™ participating in and conducting directed to surface Domain Awareness Training. exercises and training that transportation providers in Available online at TSA.gov, strengthens security plans, test highway, mass transit, training modules speak directly emergency procedures, and passenger and freight rail and to transportation professionals sharpen skills in incident pipeline modes identify terrorist to enhance their understanding management. I-STEP builds techniques, motivation and of terrorist techniques and partnerships by collaborating opportunities to disrupt threats, providing a message of with modal partners, law potential threats. These colorful “Observe, Assess, Report.” enforcement personnel, first guides have become many of Modules are currently available responders, medical the TSA Surface Division’s for highway-related professions. professionals, government most popular publications. For A new generation of messages leaders, and industry more information visit online at similarly created will focus on representatives to address https://www.tsa.gov/stakeholder those working in mass transit, challenges in transportation s/resources-and-reports-1 or passenger and freight rail and security. For more information, write to TSA- pipeline modes. More than contact the I-STEP Program [email protected]. 96,000 civilian transportation Office at 571-227-5150 or workers have been trained to [email protected]. DVD Training – Protecting date and TSA’s domain Pipeline Infrastructure: The awareness programs have been  Managed by the I-STEP, the Law Enforcement directly credited with disrupting Exercise Information Role. Identifying a gap in the two terrorist events. Learn more System (EXIS) is the only existing training materials, TSA by writing to exercise tool specifically developed this DVD training [email protected] or tailored to the transportation program to enhance the online at sector. EXIS takes a step- understanding of pipeline https://www.tsa.gov/first- by-step approach as it systems and their security issues observer. guides users though exercise by law enforcement planning. First it directs officials. This DVD provides a Intermodal Security Training users to identify the exercise basic understanding of how and Exercise Program (I- planning schedule and pipeline systems function, the STEP) provides exercise, sector focus; next it enables principal products they training, and security planning users to select specific transport, as well as a tools and services to the objectives and scenario description of the threats to, and transportation community. I- elements; and finally, it vulnerabilities of, STEP is the only federal allows users to plan pipelines. Law enforcement exercise program to focus on evaluation criteria, share officials will achieve a better the security nexus of the best practices and lessons- understanding of the usual intermodal transportation learned, and create post- measures taken to protect environment. As a result, it not exercise reports. EXIS pipelines, and actions they can only reduces risk to individual communities facilitate take to assist in this effort systems, but the entire information sharing among during times of heightened transportation network. users. Users can create security. For more information Working in partnership with the private communities and

58 3/1/16

sub-communities to design Transportation Security Act. nationwide in an effort to operator-specific exercises SAS conducts JVAs in order to identify and define potential and to delegate tasks to identify vulnerabilities and launch areas, areas that are rated other planning team recommends options to mitigate on the basis of seven specific members. EXIS is provided those vulnerabilities. SAS characteristics. A multi- at no cost by the TSA as an conducts JVA training as dimensional approach is integral part of I-STEP. To needed and it can be made designed to detect, deter, and become an EXIS member, available to local law defeat a MANPADS threat visit http://exis.tsa.dhs.gov. enforcement and security against civil aviation. SAS also For more information, personnel upon request. provides oversight and guidance contact [email protected]. For more information, contact on the development and [email protected]. implementation of MANPADS Joint Vulnerability mitigation plans at the Assessment (JVA) Training. Law Enforcement Officer commercial airports. The Security Assessments (LEO) Reimbursement Section (SAS), under the Office Program provides partial SAS provides a MVA Basic of Law Enforcement/Federal reimbursement to state, local, or Training Program (MVABTP) Air Marshal Service, Security other public institutions or course that provides field Services and Assessments organizations responsible for personnel with the basics on Division conducts JVAs in commercial airport operations how to conduct a MVA and the partnership with the FBI for the within their jurisdiction, as requirements for the MMP. In purpose of assessing current and specified in U.S. statute or TSA addition, it will provide potential threats to commercial program guidance documents knowledge on how to identify air transportation facilities and regulations. Funding is areas of concern for other stand- within the United Sates. The intended to help defray the cost off weapons threats. Report assessment process is a direct of providing highly visible law templates, reference and result of the increasing threat to enforcement presence and briefing material will be aviation, a threat which support of passenger screening provided to all trainees. prompted Congress to pass activities at U.S. commercial Section 310 of the Federal airports. For more information, SAS provides MANPADS Aviation Reauthorization Act of visit www.tsa.gov/about- awareness training and outreach 1996, requiring the Federal tsa/law-enforcement-officer- to local law enforcement and Aviation Administration (FAA) leo-reimbursement. other first responders. The Law and the FBI to conduct joint Enforcement MANPADS threat and vulnerability Man-Portable Air Defense Awareness Training Program assessments of security at U.S. Systems (MANPADS) (LEMATP) provides law airports. In response to this Awareness Training. enforcement and other first mandate, during Fiscal Years MANPADS are portable responders with the basic (FY) 1999, 2000, and 2001, surface to air guided missile knowledge on how to mitigate FAA and FBI prepared three- systems designed to be carried an attack. The course includes part assessments addressing the by an individual. The SAS, MANPADS capabilities, SAS vulnerability, criminal activity, under the Office of Law MVA methodology and and terrorist threat at selected Enforcement/Federal Air selection of sites, the airports nationwide. In Fiscal Marshal Service, Security requirements for a MMP, Year 2002, TSA took on the Services and Assessments patrol/security techniques, law responsibility of conducting Division, conducts MANPADS enforcement response to a assessments from the FAA Vulnerability Assessments MANPADS attack, and pursuant to the Aviation and (MVA) at commercial airports investigative tips after a

59 3/1/16

MANPADS attack. TSA also (SSI) is information obtained or If a person suspects that a TSA provides MANPADS pocket developed which, if released employee is engaging in identification cards and posters publicly, would be detrimental misconduct or fraud, they are to law enforcement and first to transportation security, and is asked to contact responders to assist in the defined at 49 CFR Part [email protected]. identification of MANPADS 1520. SSI is not authorized for gov and provide the name of the and their components. public disclosure and is subject employee suspected for alleged For more information, contact to handling and safeguarding misconduct and an explanation [email protected]. restrictions. of the issue, including date(s) and time(s). They are also Canine Training Center The TSA SSI Program, the asked to provide their name and (CTC). The Office of Training central SSI authority for all of contact information for and Workforce Engagement DHS, develops SSI guidance appropriate follow-up. CTC supports the TSA mission and training materials to assist Employees should provide their by providing highly trained state and local law enforcement name even if they choose to Explosives Detection Canine partners in the recognition and remain anonymous throughout teams for deployment safeguarding of SSI. The SSI the process. The public may throughout the Nation’s Program also develops SSI also report security-related transportation systems. The policies and procedures, incidents to TCC, and may canine teams provide explosive analyzes and reviews records request follow up information detection capabilities, visible for SSI content, and coordinates on the status of those reports deterrence, and a timely and with stakeholders, other through TCC. mobile response to security government agencies and incidents. These highly trained Congress on SSI-related issues. TSA Law Enforcement canine teams are trained to Officer (LEO) Flying Armed work within the major For more information about SSI Training Program. The TSA transportation environments, or for assistance in identifying Office of Training and i.e., aviation, maritime, mass SSI, visit Workforce Engagement, Law transit surface, and rail, to https://www.tsa.gov/for- Enforcement and Industry detect various explosives odors. industry/sensitive-security- Training Division is Detection capabilities include, information or contact 571-227- responsible for oversight of the but are not limited to, the 3513 or [email protected]. TSA LEO Flying Armed following: aircraft, trains, Training Program, which is ferries, cruise ships, vehicles, The TSA Call Center (TCC) is mandatory for all law passenger terminals, cargo, responsible for fielding incident enforcement officers flying baggage, as well as people and reports from the public. TSA’s armed under the Code of items either concealed on their Internal Affairs Division (IAD) Federal Regulation 1544.219, person or in their possession. is responsible for conducting Carriage of Accessible The capabilities provided by criminal and administrative Weapons. The LEO Flying these canine teams offer a very investigations of employees Armed training is a 1.5 to 2 proficient layer of security in who are alleged to have hour block of instruction that is our Nation’s transportation committed misconduct, comprised of a structured lesson systems in support of the TSA including identifying and plan, slide presentation, FAQs, mission. investigating potential worker’s NLETS procedures, and compensation fraud by TSA applicable codes of Federal Sensitive Security employees. regulation. This material is Information (SSI) Program. provided to federal, state, local, Sensitive Security Information territorial, tribal, and approved

60 3/1/16

railroad law enforcement Your supervisor’s name transportation. Teams may also agencies and departments to and contact information. be deployed to provide properly instruct their officers additional law enforcement or on the subject of flying on If you are not a qualified security presence at board commercial aircraft while instructor, please request a transportation venues during armed. The training includes member of your training staff to specific alert periods or in protocols in the handling of contact us by email. For time support of special events. prohibited items, prisoner sensitive training requests, transport, and dealing with an please call (855) 359-5367 The exact makeup of a VIPR act of criminal violence aboard between the core business hours operation team is determined an aircraft. The program of 9:00 am to 5:00 pm EST. jointly with local authorities. training material may be An operation can include obtained by emailing the TSA Federal Air Marshals, Visible Intermodal Prevention Office of Training and Transportation Security and Response (VIPR) Workforce Engagement, Law Program. Focusing on Officers, Behavior Detection Enforcement and Industry Officers, Transportation deterrence and detection of Training Division, at terrorist activities, TSA Security Inspectors, and [email protected] conducts VIPR operations that Transportation Security To request this training material promote confidence in and Specialists – Explosives, TSA you must: protect all modes of personnel can use explosives  Be a full-time law transportation through targeted operational support, security enforcement officer deployment of integrated TSA and explosive screening meeting the instructor assets, coming from TSA’s technology, and qualification standards of Offices of Law Enforcement radiological/nuclear detection the agency, academy, or and Security Operations. equipment. department in which you are employed; The VIPR Program has a For more information on TSA’s  Send the request from a nationwide footprint. Applying VIPR resources, visit the TSA governmental email a risk-based planning process, website or contact your address; and TSA conducts VIPR operations OLE/FAMS Supervisory Air  Include the following with state and local personnel Marshal in Charge (SAC) or information in the body of on a random, unpredictable Federal Security Director the email: (1) Your name basis. VIPR operations are (FSD). and contact information; conducted in all modes of (2) Your department’s aviation and surface name and address; and (3)

61 3/1/16

ACRONYMS

ACAMS Automated Critical Asset Management DSF Deployable Special Forces System ECSAP Electronic Crimes Program AEL Authorized Equipment List ECTF Electronic Crimes Task Force AMOC Air and Marine Operations Center EDCT Explosive Detection Canine Team ANSI American National Standard Institute EDD Explosive Detector Dog BCOT Building Communities of Trust EDGE Enhanced Dynamic Geo-Social BCSC National Bulk Cash Smuggling Center Environment BEST Border Enforcement Security Task Force EMI Emergency Management Institute BMAP Bomb-making Material Awareness Program EOC Emergency Operations Center BPA Blanket Purchase Agreement ERO ICE Enforcement and Removal Operations BSC Biometric Support Center ESS Emergency Sector Services C3 Cyber Crime Center ESS-CRA Emergency Sector Services-Cyber Risk CAB Community Awareness Briefing Assessment CAP Criminal Alien Program EXIS Exercise Information System CBP U.S. Customs and Border Protection FAA Federal Aviation Administration CBRNE Chemical, Biological, Radiological, Nuclear FAR Fugitive Alien Removal and Enhanced Conventional Weapons FBI Federal Bureau of Investigation CCU Cyber Crimes Unit FCTF Financial Crimes Task Force CDF Capability Development Framework FDNS Fraud Detection and National Security CDM Continuous Diagnostics and Mitigation FEDSIM Federal Systems Integration and CDP Center for Domestic Preparedness Management Center CEIU Child Exploitation Investigation Unit FEMA Federal Emergency Management Agency CERT Computer Emergency Response Team FinCEN Financial Crimes Enforcement Network CFATS Chemical Facility Anti-Terrorism Standards FiRST First Responder Support Tool CFU Computer Forensics Unit FLETC Federal Law Enforcement Training Centers CGMIX USCG Maritime Information eXchange FOT Fugitive Operations Teams CI Critical Infrastructure FOUO For Official Use Only CIFW Counterintelligence Fundamental Workshop FPS Federal Protective Services CIPD Counterintelligence Division FRG First Responders Group CIS Cyber Intelligence Section FRRG First Responder Resource Group CMaaS Continuous Monitoring as a Service FSCC Federal Sponsored Course Catalog COE Centers of Excellence FSLTT Federal, State, Local, Tribal, Territorial COI Community(ies) of Interest FY Fiscal Year COML Communications Unit Leader GNDA Global Nuclear Detection Architecture COMT Communications Unit Technician GPD Grant Programs Directorate COP Common Operating Picture GPS Global Position System CP Continued Presence GSA General Services Administration CPAA Cultural Property, Art, and Antiquities HAZMAT Hazardous Materials CRCL Office for Civil Rights and Civil Liberties HME Homemade Explosives CRR Cyber Resiliency Review HITRAC Homeland Infrastructure Threat and Risk CSEP Cybersecurity Evaluation Program Analysis Center CVE Countering Violent Extremism HSDN Homeland Security Data Network CVEC Countering Violent Extremism Coordinator HSI ICE Homeland Security Investigations DARTTS Data Analysis & Research for Trade HSIN Homeland Security Information Network Transparency Systems I&A Office of Intelligence and Analysis DBFTF Document and Benefit Fraud Task Force IAB Interagency Board DEA Drug Enforcement Administration IAD Internal Affairs Division DHS Department of Homeland Security IAQ Immigration Alien Query DHS-SPS DHS Single Point of Service IC Intelligence Community DMV Department of Motor Vehicles IED Improvised Explosive Device DNDO Domestic Nuclear Detention Office IEEE Institute of Electrical and Electronics DOE Department of Energy Engineers DOJ Department of Justice ICE U.S. Immigration and Customs Enforcement DOS Department of State

62 3/1/16

ICS-CERT Industrial Control Systems Cyber NCCIC National Cybersecurity and Emergency Response Team Communications Integration Center ICTAP OEC Interoperable Communications NCEPP National Cyber Exercise and Planning Technical Assistance Program Program IDENT Automated Biometric NCFI National Computer Forensics Institute Identification System NCSAM National Cybersecurity Awareness Month IMAGE ICE Mutual Agreement between NCTC National Counterterrorism Center Government and Employers NECP National Emergency Communications Plan IMPACT Incident Management Preparedness and NEDCTP National Explosives Detection Canine Team Coordination Toolkit Program INTERPOL International Criminal Police Organization NFOP National Fugitive Operations Program IOC-2 International Organized Crime Intelligence NGI Next Generation Identification and Operations Center NGO Nongovernmental Organization IP Intellectual Property NICC National Infrastructure Coordination Center IPAWS Integrated Public Alert and Warning System NIMS National Incident Management System IPR Intellectual Property Rights NIMS ICS NIMS Incident Command System IPR Center National Intellectual Property Rights NIPP National Infrastructure Protection Plan Coordination Center NIST National Institute of Standards and I-STEP Intermodal Security Training and Exercise Technology Program NPPD National Protection and Program Directorate ISIL and the Levant NPSBN Nationwide Public Safety Broadband ITA Intelligence Training Academy Network JAC Joint Analysis Center NSI Nationwide Suspicious Activity Reporting JACCIS JAC Collaborative Information System (SAR) Initiative JACTAWS Joint Counterterrorism Awareness NTAS National Terrorism Advisory System Workshop Series NTED National Training and Education Division JVA Joint Vulnerability Assessment NUSTL National Urban Security Technology LEO Law Enforcement Officer Laboratory LESC ICE Law Enforcement Support Center OBIM Office of Biometric Identity Management LEISI Law Enforcement Information Sharing OBP Office of Bombing Prevention Initiative OCIA Office of Cyber and Infrastructure Analysis LEIS Service Law Enforcement Information Sharing OCP Office of Community Partnerships Service OCSTF Operation Community Shield Task Forces LEMATP Law Enforcement MANPADS Awareness ODLS Online Detainee Locator System Training Program OEC Office of Emergency Communications LES Law Enforcement Sensitive OHA Office of Health Affairs LESC Law Enforcement Support Center OIG Office of Inspector General LMR Land Mobile Radio OSLLE Office for State and Local Law Enforcement LMS Learning Management System OSLTC ICE Office of State, Local, and Tribal MANPADS Man-Portable Air Defense Systems Coordination MCV Mobile Command Vehicle P25 CAP Project 25 Compliance Assessment Program MDDP Mobile Detection Deployment Program PED UCSIS Public Engagement Division MDDU Mobile Detection Deployment Unit PEP Priority Enforcement Program MISLE Marine Information for Safety and Law PERC Pacific Enforcement Response Center Enforcement PIA Privacy Impact Assessment MJIEDSP Multi-Jurisdictional Improvised Explosive PII Personally Identifiable Information Device Security Planning PLEPU Parole and Law Enforcement Programs Unit MS-ISAC Multi-State Information Sharing Center PM Program Management MVA MANPADS Vulnerability Assessments PPE Personal Protective Equipment MVABTP MANPADS Vulnerability Assessments PRIV DHS Office of Privacy Basic Training Program PRND Preventative Radiological/Nuclear Detection NBIC National Biosurveillance Integration Center PRD Personal Radiation Detector NCAS National Cyber Awareness System PSA Protective Security Advisors NCATS National Cybersecurity Assessment and R&D Research and Development Technical Services Teams RAAS Report Analysis and Archive System NCC National Coordination Center RD Regional Directors NCCAD National Counter-IED Capabilities Analysis RFI Request for Information Database RKB Response Knowledge Base 63 3/1/16

RIID Radiation Isotope Identification Device RISS Regional Information Sharing System R/N Radiological and Nuclear RTA Responder Technology Alliance S&T Science and Technology Directorate SAS Security Assessment Section SBU Sensitive but Unclassified SCIP Statewide Communication Interoperability Plan SEL Standard Equipment List SEVP Student Exchange Visitor Program SLT CBP State, Local, Tribal, Liaison SLTD State, Local, and Tribal Division SLTT State, local, tribal, and territorial SPBP Significant Public Benefit Parole SSI Sensitive Security Information STC Security the Cities SWBCWG Southwest Border Communications Working Grp. SWIC Statewide Interoperability Coordinator TA Technical Assistance TBML Trade-Based Money Laundering TCC TSA Call Center TCO Transnational Criminal Organization TRIPwire Technical Resource for Incident Prevention TSA Transportation Security Administration TTU Trade Transparency Unit UASI Urban Area Security Initiative US-CERT U.S. Computer Emergency Readiness Team USCG U.S. Coast Guard USCIS U.S. Citizenship and Immigration Services USSS United States Secret Service VAP Victims Assistance Program VAWA Violence Against Women Act VBIED Vehicle-borne Improvised Explosive Device VIG Vehicle Inspection Guide VQiPS Video Quality in Public Safety VWP Visa Waiver Program WMD Weapons of Mass Destruction

64 3/1/16

APPENDIX

# D

287(g) – 26 Department of Motor Vehicle Fraud – 30 Detainee Locator (Online) – 28 A Domestic Nuclear Detection Office – 17 Drug Trafficking – 16, 33 Active Shooter – 6, 25, 45 America’s Waterways Watch – 14 E Arab and Muslim American Cultural Awareness –12 Authorized Equipment List – 21 Electronic Crimes – 55 Aviation Security – 16, 59, 60, 61 Emergency Communications – 47, 48, 49, 50 Emergency Management Institute – 22 B Emergency Management Training – 22 Emergency Operations Center – 21 Biometrics – 36, 37 Emergency Planning Guides – 21 Biosurveillance – 25 Enforcement and Removal Operations – 26, 27, 28, 29 Blue Campaign to Fight Human Trafficking – 7 English as a Second Language – 11, 12 Border Community Liaison Program (CBP) – 15 Equipment Testing (Radiological and Nuclear) – 17 Border Enforcement Security Task Force – 29 Explosives – 37, 38, 60 Building Communities of Trust – 34 Explosive Detection Dogs – 43, 60 Bulk Cash Smuggling – 32 Exercises – 18, 19, 22, 41, 48, 58

C F

Canine Training – 43, 60 Federal Emergency Management Agency – 21 Carrier Liaison Program (CBP) – 15 Federal Law Enforcement Training Centers – 24 CBP Information Center – 15 Federal Protective Service – 43 CBP Laboratory – 15 Financial Crimes – 54 Center for Domestic Preparedness – 21 FirstResponder.gov – 51 Centers of Excellence – 51 Flying-Armed Training Program – 60 Chemical Facility Anti-Terrorism Standards (CFATS) – 37 Forced Labor – 30 Chemical Security – 37 Forensics (Computers) – 29, 57 Child Abductions (International) – 16 Forensics (Laboratory) – 30 Citizenship and Immigration Services – 8 Forensics (Mobile Devices) – 56, 57 Citizenship and Immigration Services Ombudsman Office Fugitive Aliens – 27 – 10 Fusion Centers – 12, 13, 21, 33, 34, 35, 36, 42 Civil Rights and Civil Liberties (Office of) – 11 Coast Guard – 13 G Community Awareness Briefing – 15 Community Partnerships (Office of) – 15 Gangs – 32 Continued Presence – 10 Grants – 21, 23, 49 Continuity of Operations – 23 Counterfeiting – 16, 32, 55 H Countering Violent Extremism – 6, 11, 15 Counterintelligence – 35 Health Affairs (Office of) – 24 Counterterrorism – 11, 15, 22, 57, 58 Homeland Security Data Network – 36 Criminal Alien Program – 26 Homeland Security Information Network (HSIN) – 6, 7, 19, Critical Infrastructure – 44, 45, 46, 47 25, 35, 39, 45 Cultural Property, Art, and Antiquities – 29 Homeland Security Investigations – 29, 30, 31, 32, 33, 34, 35 Customs and Border Protection – 15 Human Rights and Vulnerable Populations – 26 Cyber Crime – 29, 56, 57 Human Trafficking – 7, 9, 10, 16, 26 Cybersecurity – 38, 39, 40, 41, 42, 43,46, 54, 55

65 3/1/16

I P

If You See Something, Say Something™ – 8 Pacific Enforcement Response Center – 27 Immigrant Alien Query – 27 Pipelines (Safeguarding) – 58 Immigration and Customs Enforcement – 25 Port of Entry – 16 Immigration Document and Benefit Fraud – 8, 30 Preparedness (Non-Disaster) Grants – 21, 23 Immigration Services – 8, 9 Priority Enforcement Program – 28 Improvised Explosive Device – 25, 37, 38 Privacy – 13, 50, 51 Information Technology – 41 Privacy Office – 50 Infrastructure Protection – 44, 45, 46,47 Probation and Parole – 28, 33 Intellectual Property Rights – 16, 32 Protective Security Advisors – 49 Intelligence and Analysis (Office of) – 34 Prosecutions (Toolkit) – 25 Intelligence Reports (Daily) – 35 Intermodal Security – 58 R International Non-Custodial Parental Child Abduction – 16 International Office (HSI) – 31 Racial Profiling – 12, 13 International Travel and Trade – 16 Radiological Detection – 17, 18, 19, 20 INTERPOL – 27 Retail Security – 45

J S Joint Counterterrorism Awareness Workshop Series – 22 S Visa Program – 9 L SAFECOM – 49 Science and Technology Directorate (S&T) – 51 Language Identification Pocket Guide – 12 Secret Service – 54 Law Enforcement Information Sharing Initiative – 27 Securing the Cities Program – 20 Law Enforcement Support Center – 27 Sensitive Security Information (Safeguarding) – 60 Limited English Proficiency – 11, 12 Shadow Wolves – 33 Stop.Think.Connect – 42 M Suspicious Activity Reporting – 36 Suspicious Aircraft or Boats – 16 Man-Portable Air Defense Systems (MANPADS) – 59 Maritime Information Exchange – 14 T Maritime Navigation – 14 Missing and Exploited Children – 57 Tip Line (CBP) – 16 Missing or Late International Travelers – 16 Tip Line (HSI) – 31 Mobile Command Vehicles – 44 Title 19 Cross–Designation – 33 Money Laundering – 32, 33, 56 Title VI – 11, 12 Most Wanted (ERO) – 26 Training – 6, 7, 10, 11, 12, 13, 15, 20, 21, 22, 24, 29, 30, 31, Multi-State Information Sharing and Analysis Center – 41 32, 33, 35, 36, 37, 38, 39, 40, 44, 45, 47, 48, 54, 56, 57, 58, 59, 60, 61 N Transportation Security Administration – 57 TRIPwire – 38 National Cybersecurity and Communications Integration TSA Call Center – 60 Center – 41 T Visa – 9, 10 National Exercise Program – 22 U National Incident Management System – 19, 23, 47 National Protection and Program Directorate – 36 USCG Sector Command Centers – 14 National Terrorism Advisory System – 8 USCIS Resources – 10 National Training and Education Division – 22 U Visa – 9, 10 Nationwide Suspicious Activity Reporting Initiative – 36 Nuclear Detection – 17, 18, 19, 20 V O Vehicle-borne Improvised Explosive Device – 37 Organized Crime – 33, 56 Victim Assistance – 26 Visa Waiver Program – 16

66 3/1/16

Visas for Victims of Human Trafficking and Other Serious Crimes – 9, 10

W

War Crimes – 31 Workplace Security – 45

67 3/1/16