On Their Own Terms: a Lexicon with An

Total Page:16

File Type:pdf, Size:1020Kb

On Their Own Terms: a Lexicon with An Notes on the 4th edition___________________1 Introduction______________________________2 On Their Own Terms: A Lexicon with an Emphasis on Information-Related Terms How to Cite this Work___________________16 Produced by the U.S. Federal Government Creative Commons License______________16 4th edition June 16, 2009 Contact Information_____________________16 Susan L. Maret Ph.D. Terms Index_________________________17-30 Terms A-Z_________________________30-431 Notes on the 4th edition Since the first edition in 2005, On Their on Terms has reported language that reflects the scope of U.S. information policy. Now in its fourth edition, the Lexicon features new terms that further chronicle the federal narrative of information and its relationship to national security, intelligence operations, and freedom of information, privacy, technology, and surveillance as well as types of war, institutionalized secrecy, and censorship. This fourth edition of the Lexicon emphasizes the historical aspects of U.S. information policy and associated programs in that it is a testament to the information politics of the Bush- Cheney years; there is also a look back to historical agency recordkeeping practices such as the U.S. Army’s computerized personalities database, serendipitously discovered in a 1972 1 congressional hearing on military surveillance of civilians and the 1970s DoD program Project 2 Camelot, which has parallels with Project Minerva efforts to recruit academics. Including these programs alongside contemporary federal information initiatives and public policy critiques furthers the “history of ‘govermentality,’ ” an inquiry put forth by Michel Foucault (1994,1978: 219-222) that examines the “ensemble formed by the institutions, procedures, analyses, and 1 Does CIFA (the Counterintelligence Field Activity) have roots in the Army’s Counterintelligence Records Information System (CRIS), also called the Fort Monroe Data Bank? Or Talon? I leave it to FOIA researchers and historians to answer these questions; see Army Surveillance of Civilians: A Documentary Analysis, available at The Memory Hole, http://www.thememoryhole.org/2009/05/army-surveillance/ and Uncle Sam is Watching You: Highlights from the Hearings of the Senate Subcommittee on Constitutional Rights (Washington: Public Affairs Press, 1971). 2 For additional discussion of the role of academia and the military and university as “hypermodern militarized knowledge factory,” see John Armitage, “Beyond Hypermodern Militarized Knowledge Factories,” Review of Education, Pedagogy, and Cultural Studies 27 (2005):219–239 and Henry A. Giroux’s The University in Chains: Confronting the Military-Industrial-Academic Complex (Boulder, CO: Paradigm Publishers, 2007). reflections, the calculations and tactics that allow the exercise of this very specific albeit complex form of power.” This latter thought suggests an active, genealogical role for FOIA researchers, archivists, historians, information professionals, and public interest groups in not only rescuing lost histories but integrating findings into existing understanding of federal information practices. Throughout the Lexicon, links have been verified and replaced. However, in certain instances, Web pages and documents have been removed by the issuing federal agency. Considering the historical and archival importance of this information, links to the original source at the Wayback Machine is included. Introduction On Their Own Terms is a lexicon of information–rich terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms represent a virtual seed catalog to federal informationally-driven procedures, policies, and practices involving among other matters, the information life cycle, record keeping, ownership over information, collection and analysis of intelligence information, security classification categories and markings, censorship, citizen right-to-know, deception, propaganda, secrecy, technology, surveillance, threat, national security, and forms of warfare. The abundance of federally produced information terms as reported in the Lexicon illustrates the sheer weight that rests on federal agencies in grappling with every aspect of information: communication, control, integrity, management, organization, preservation, production, and security. Lexicon terms also reflect the role federal agencies play in constructing a somewhat standardized, specialized language that orchestrates government policies and communicates national and international interests among fellow agencies, with Congress, the public, and the international community. In speaking of the specialized language of the Air Force Space Command (AFSPC) as an example, Lt. Col. Dana Flood (2008: 31) notes In the quarter-century of its existence, AFSPC has, like all large organizations, evolved over time to develop its own language, jargon, and terminology. Unfortunately, by accident, function, or design, AFSPC was largely a separate entity from the rest of the Air Force. Thus, like an isolated culture on a remote island, AFSPC’s language developed to a point that it became a separate dialect, sometimes incomprehensible to the parent Air Force culture. 2 Maret | On Their Own Terms While language provides a group the means to identify within a given culture or political entity (Mueller 1973: 18), theorists such as David John Farmer (1995:1) claim that language is “more than a tool for thinking, for conceiving and communicating thoughts;” it is also a “factory of ideas, approaches, intuitions, assumptions, and urges” that mirrors and shapes the lifeworld. In addition to “sanctifying action” (Edelman 1964: 114), Jean-Jacques Lecercle (1999:47) observes that language is not a “simple representation” of the world, but an intervention within it. Lecercle writes that “words do not only do things, they are things.” In his “Glossary of Dispossession,” writer Paul de Rooij observes “words are very important. Words frame issues, palliate, mollify, exculpate or even hide sordid acts.” Many terms reported in the Lexicon meet de Rooij’s description, representing a federal language of control that often downplays the significance of government actions, policies, and programs.3 “Firstfruits,” “National Censorship,” “Public Diplomacy,” and “Rendition,” couch questionable policies and practices, and serve to legitimate authority, control over information, and public awareness of agency actions. Described by Claus Mueller (1973:24)4 as “distortion” because “conditions and policies are quite different from their meanings,” many Lexicon terms constitute a political language that “is designed to make lies sound truthful and murder respectable and to give an appearance of solidity to pure wind” (Orwell 1950:92). Another way of viewing this is that “language often masks administrative evil” (Adams and Balfour 1998:15).5 Information Terms as Bureaucratic Vocabulary: A Review Robert P. Watson (1998:389) observes “despite the widespread use of bureaucratese, there has been insufficient research devoted to the study of the language of bureaucracy, and 3 Deborah Tannen (1998: 14) cites Dwight Bolinger’s work in making the point that “language is like a loaded gun.” Tannen observes the “terms in which we talk about something shape the way we think about it – even what we see.” 4 Mueller powerfully illustrates his concept of distortion by offering examples of “reformulated language,” from the Meyers Lexicon published in the Weimar Republic in 1924, under National Socialist Germany in 1936, as Language Regulations issued by the Office of the Press (Reichspressant). 5 For example, the Central Intelligence Agency’s term “extraordinary rendition,” is a term that masks the chilling dimensions of “outsourcing” torture and human rights violations. 3 Maret | On Their Own Terms little is known about its effect.” Srikant Sarangi and Stefan Slembrouck (1996:7) go further, questioning if the language of bureaucracy is a [sic specialized] language used in bureaucratic settings, or if is it language used in a particular way. In response to Watson, Sarangi and Slembrouck, I pose that Lexicon terms comprise a specialized, evolving language that is created and employed across bureaucratic6 settings by federal agencies, which should really be thought of as “information societies.”7 With origins in law, regulation, territory, customary practices (relics or habits8), power, “hidden arrangements” (Sjoberg, Vaughn and Williams, 1984:446), and rational legal authority, these terms communicate and direct government policy across agencies, to the Congress, and the public. The terms listed in this work, which form the “language of bureaucracy,” permeate every aspect of the federal information system. At times, this system affronts citizen and congressional understanding of federal information practices, and has serious consequences for what James Russell Wiggens has outlined as the right-to- know. 9 A review of sociological, legal, and political science literature is helpful in positioning the problem of language in bureaucracy as a critical research problem: 6 Bureaucracy as used in this work follows Max Weber’s (1958: 196-198) description of “ideal” bureaucracy. That is, activity, authority, and the fulfillment of duties are distributed in a fixed way to constitute bureaucratic authority. This system is found in all bureaucratic structures as well as large party organizations and in management of the modern office, or bureau, which is based upon
Recommended publications
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Cross-Border Data Transfers Between the EU and the US
    Santa Clara Journal of International Law Volume 19 Issue 2 Article 1 5-1-2021 Cross-Border Data Transfers Between the EU and the U.S.: A Transatlantic Dispute Jiménez-Gómez, Briseida Sofía Follow this and additional works at: https://digitalcommons.law.scu.edu/scujil Part of the International Law Commons Recommended Citation Jiménez-Gómez, Briseida Sofía, Cross-Border Data Transfers Between the EU and the U.S.: A Transatlantic Dispute, 19 SANTA CLARA J. INT'L L. 1 (2021). Available at: https://digitalcommons.law.scu.edu/scujil/vol19/iss2/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara Journal of International Law by an authorized editor of Santa Clara Law Digital Commons. For more information, please contact [email protected]. 2021 Santa Clara Journal of International Law 19:2 Cross-Border Data Transfers Between the EU and the U.S.: A Transatlantic Dispute By: Briseida Sofía Jiménez-Gómez* This article deals with the clash between the European and American approach to transborder data flows. In the last decades, the discourse has been that the U.S. offers a market-dominated approach while the EU was embedded in a right-dominated policy. General Data Protection Regulation (GDPR) restricts data transfers outside the EU. An analysis of the meaning of the level of adequate protection of a non-EU country is necessary to transfer data beyond the EU. The Court of Justice of the European Union has invalidated the Privacy Shield agreement to transfer commercial data from the European Union to the United States, leaving transatlantic data transfers in a current predicament.
    [Show full text]
  • THE PRIVACY ACT of 1974 (As Amended) Public Law 93-579
    THE PRIVACY ACT OF 1974 (As Amended) Public Law 93-579, as codified at 5 U.S.C. 552a Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, that this Act may be cited as the "Privacy Act of 1974." SECTION 2 (a) The Congress finds that – (1) the privacy of an individual is directly affected by the collection, maintenance, use, and dissemination of personal information by Federal agencies; (2) the increasing use of computers and sophisticated information technology, while essential to the efficient operations of the Government, has greatly magnified the harm to individual privacy that can occur from any collection, maintenance, use, or dissemination of personal information; (3) the opportunities for an individual to secure employment, insurance, and credit, and his right to due process, and other legal protections are endangered by the misuse of certain information systems; (4) the right to privacy is a personal and fundamental right protected by the Constitution of the United States; and (5) in order to protect the privacy of individuals identified in information systems maintained by Federal agencies, it is necessary and proper for the Congress to regulate the collection, maintenance, use, and dissemination of information by such agencies. (b) The purpose of this Act is to provide certain safeguards for an individual against an invasion of personal privacy by requiring Federal agencies, except as otherwise provided by law, to -- (1) permit an individual to determine what records
    [Show full text]
  • A Citizen's Guide on Using the Freedom of Information
    1 Union Calendar No. 127 109TH CONGRESS "!REPORT 1st Session HOUSE OF REPRESENTATIVES 109–226 A CITIZEN’S GUIDE ON USING THE FREEDOM OF INFORMATION ACT AND THE PRIVACY ACT OF 1974 TO REQUEST GOVERNMENT RECORDS SECOND REPORT BY THE COMMITTEE ON GOVERNMENT REFORM Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html http://www.house.gov/reform SEPTEMBER 20, 2005.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 21–892 PDF WASHINGTON : 2005 VerDate 11-MAY-2000 14:44 Sep 20, 2005 Jkt 000000 PO 00000 Frm 00001 Fmt 4012 Sfmt 4012 D:\DOCS\21892.TXT HGOVREF1 PsN: HGOVREF1 COMMITTEE ON GOVERNMENT REFORM TOM DAVIS, Virginia, Chairman CHRISTOPHER SHAYS, Connecticut HENRY A. WAXMAN, California DAN BURTON, Indiana TOM LANTOS, California ILEANA ROS-LEHTINEN, Florida MAJOR R. OWENS, New York JOHN M. MCHUGH, New York EDOLPHUS TOWNS, New York JOHN L. MICA, Florida PAUL E. KANJORSKI, Pennsylvania GIL GUTKNECHT, Minnesota CAROLYN B. MALONEY, New York MARK E. SOUDER, Indiana ELIJAH E. CUMMINGS, Maryland STEVEN C. LATOURETTE, Ohio DENNIS J. KUCINICH, Ohio TODD RUSSELL PLATTS, Pennsylvania DANNY K. DAVIS, Illinois CHRIS CANNON, Utah WM. LACY CLAY, Missouri JOHN J. DUNCAN, JR., Tennessee DIANE E. WATSON, California CANDICE S. MILLER, Michigan STEPHEN F. LYNCH, Massachusetts MICHAEL R. TURNER, Ohio CHRIS VAN HOLLEN, Maryland DARRELL E. ISSA, California LINDA T. SANCHEZ, California GINNY BROWN-WAITE, Florida C.A. DUTCH RUPPERSBERGER, Maryland JON C. PORTER, Nevada BRIAN HIGGINS, New York KENNY MARCHANT, Texas ELEANOR HOLMES NORTON, District of LYNN A.
    [Show full text]
  • Key Issues Guidance
    Version 1.0 i February 11, 2008 Table of Contents Guidance Papers Outline..................................................................................................... ii Note on ISE Privacy and Civil Liberties Implementation Guidance.................................. ii A. REDRESS............................................................................................................ A1-A8 GUIDANCE.................................................................................................................. 1 BACKGROUND AND COMMENTARY................................................................ A3 RESOURCES AND TOOLS..................................................................................... A7 B. NOTICE MECHANISMS ....................................................................................B1-B9 GUIDANCE................................................................................................................B1 BACKGROUND AND COMMENTARY.................................................................B4 RESOURCES AND TOOLS......................................................................................B9 C. DATA QUALITY...............................................................................................C1-C12 GUIDANCE................................................................................................................C1 BACKGROUND AND COMMENTARY.................................................................C4 RESOURCES AND TOOLS....................................................................................C12
    [Show full text]
  • Transatlantic Privacy Regulation: Conflict and Cooperation
    GW Law Faculty Publications & Other Works Faculty Scholarship 2015 Transatlantic Privacy Regulation: Conflict and Cooperation Francesca Bignami George Washington University Law School, [email protected] Giorgio Resta Università degli Studi di Roma Tre, Law Department Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications Part of the Law Commons Recommended Citation Bignami, Francesca, Transatlantic Privacy Regulation: Conflict and Cooperation (2015). Law and Contemporary Problems, Vol. 78 (Fall 2015); GWU Law School Public Law Research Paper No. 2015-52; GWU Legal Studies Research Paper No. 2015-52. Available at SSRN: http://ssrn.com/abstract=2705601 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons. It has been accepted for inclusion in GW Law Faculty Publications & Other Works by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. TRANSATLANTIC PRIVACY REGULATION: CONFLICT AND COOPERATION FRANCESCA BIGNAMI* GIORGIO RESTA** I INTRODUCTION Regulatory differences in the data privacy arena have been a recurring source of contention in transatlantic trade relations. In the 1990s, the focus was primarily on differences in the rules governing market actors. Over the past decade, however, the focus has expanded to include the public sector and the policies regulating the collection and use of personal data by government actors, particularly national security agencies. This article surveys the considerable history of transatlantic relations in the privacy area and the attempts that have been made to reconcile legal and policy differences in the interest of trade liberalization and police and national security cooperation.
    [Show full text]
  • The Value of Privacy Federalism by Paul M
    09/24/14 (consolidated 3) The Value of Privacy Federalism By Paul M. Schwartz I. Introduction The United States features a dual system of federal and state sectoral law. In the absence of an omnibus privacy statute, the key question is how these laws interact with each other. When Congress enacts privacy law, it generally allows the states space for further action. The federal lawmaker typically does so through laws that set only a floor, that is, a minimum of safeguards, but that allow the states to exceed their privacy protections. This model has involved a wide range of institutional actors in the regulation of privacy. State legislatures and courts interpret state laws. Congress acts to preempt state law in enacting sectoral legislation, as needed, and federal judges interpret state legislation, including subsequent amendments to existing state law or new laws, to decide if they conflict with federal law. This existing U.S model is under pressure, however, because the federal government is largely inactive. The risk is that a new generation of state privacy legislation, such as breach notification laws, will not be consolidated and improved through the federal legislative process. Gridlock in Washington, D.C. has suspended the normal process of privacy federalism. In the European Union, the situation is different. At present, the Data Protection Directive requires Member States to enact legislation that is “harmonized” around its rules for information privacy. In the resulting legal system, the focus remains on the Member States, which are left with a “margin for maneuver” that permits national differences in the resulting statutes.
    [Show full text]
  • Overview of the Privacy Act of 1974 Table of Contents
    OVERVIEW OF THE PRIVACY ACT OF 1974 TABLE OF CONTENTS INTRODUCTION................................................................................................ 1 LEGISLATIVE HISTORY .................................................................................. 1 ROLE OF THE PRIVACY PROTECTION STUDY COMMISSION ................ 1 ROLE OF THE OFFICE OF MANAGEMENT AND BUDGET ....................... 2 COMPUTER MATCHING.................................................................................. 3 POLICY OBJECTIVES ....................................................................................... 4 DEFINITIONS ..................................................................................................... 4 A. Agency ................................................................................................... 4 B. Individual ............................................................................................. 14 C. Maintain ............................................................................................... 17 D. Record .................................................................................................. 17 E. System of Records ............................................................................... 28 1) Disclosure: Subsection (b) ........................................................... 34 2) Access and Amendment: Subsections (d)(1) and (d)(2) .............. 46 3) Other Aspects................................................................................ 48 CONDITIONS
    [Show full text]
  • The Pii Problem: Privacy and a New Concept of Personally Identifiable Information
    \\jciprod01\productn\N\NYU\86-6\NYU603.txt unknown Seq: 1 28-NOV-11 15:01 THE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION PAUL M. SCHWARTZ† & DANIEL J. SOLOVE‡ Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved. The basic assumption behind the applicable laws is that if PII is not involved, then there can be no privacy harm. At the same time, there is no uniform definition of PII in information privacy law. Moreover, computer science has shown that in many circumstances non-PII can be linked to individuals, and that de-identified data can be re-identified. PII and non-PII are thus not immutable categories, and there is a risk that information deemed non-PII at one time can be transformed into PII at a later juncture. Due to the malleable nature of what consti- tutes PII, some commentators have even suggested that PII be abandoned as the mechanism by which to define the boundaries of privacy law. In this Article, we argue that although the current approaches to PII are flawed, the concept of PII should not be abandoned. We develop a new approach called “PII 2.0,” which accounts for PII’s malleability. Based upon a standard rather than a rule, PII 2.0 utilizes a continuum of risk of identification. PII 2.0 regulates informa- tion that relates to either an “identified” or “identifiable” individual, and it estab- lishes different requirements for each category.
    [Show full text]
  • Data Protection and the Right to Privacy in the United States and West Germany [Note] [Comment]
    Data Protection and the Right to Privacy in the United States and West Germany [Note] [Comment] Item Type Article; text Authors Daniel-Paczosa, Angela Citation 1987 Ariz. J. Int'l Comp. L. 154 (1987) Publisher The University of Arizona James E. Rogers College of Law (Tucson, AZ) Journal Arizona Journal of International and Comparative Law Rights Copyright © The Author(s) Download date 28/09/2021 20:20:21 Item License http://rightsstatements.org/vocab/InC/1.0/ Version Final published version Link to Item http://hdl.handle.net/10150/659552 DATA PROTECTION AND THE RIGHT TO PRIVACY IN THE UNITED STATES AND WEST GERMANY INTRODUCTION The increasing use of computers in contemporary society has produced numerous threats to human rights. Computer data banks provide a vast amount of personal information, to governmental bodies and private firms. Consequently, a need has developed for protecting not only the accuracy but also the confidentiality of such personal data.2 The present article examines and compares the developments that have taken place regarding data protection in West Germany and the United States. West Germany's experience may help the United States to further develop its present system. A SHORT HISTORY In the United States, the individual's interest in privacy first became recognized as a constitutional principle4 in Griswold v. Connecticut.5 Griswold expanded on earlier due process and equal protection 'Trubow defines personal information as follows: Personal information is any information that identifiably refers to an individual by name, number, or any other identifying characteristic. Information is personal not because of its content but because of its reference.
    [Show full text]
  • Homeland Security: Department Organization and Management
    Order Code RL31493 Report for Congress Received through the CRS Web Homeland Security: Department Organization and Management Updated August 7, 2002 Harold C. Relyea Specialist in American National Government Government and Finance Division Congressional Research Service ˜ The Library of Congress Homeland Security: Department Organization and Management Summary After substantial congressional entreatment, President George W. Bush gave impetus to the creation of a Department of Homeland Security when, on June 6, 2002, he proposed the establishment of such an entity by Congress. At the time, bills to mandate a department were pending in both houses of Congress, the Senate legislation having been recently ordered to be reported from committee. The President’s action was viewed as an effort to move beyond the coordination efforts of the Office of Homeland Security, established by E.O. 13228 of October 8, 2001, to a strong administrative structure for managing consolidated programs concerned with border security and effective response to domestic terrorism incidents. On June 18, the President transmitted to the House of Representatives proposed legislation to establish a Department of Homeland Security. It was subsequently introduced by request (H.R. 5005). According to a legislative strategy announced by Speaker Dennis Hastert and Minority Leader Richard Gephardt, the House would begin working with this proposal on an expedited basis. Plans called for an initial review and modification of the administration bill by the Committee on Government Reform and other panels having jurisdiction over homeland security matters, followed by a similar review and refinement of the measure by an ad hoc select panel under the leadership of Majority Leader Dick Armey.
    [Show full text]