National Security Act of 1947.Xml

Total Page:16

File Type:pdf, Size:1020Kb

National Security Act of 1947.Xml G:\COMP\INTEL\NATIONAL SECURITY ACT OF 1947.XML NATIONAL SECURITY ACT OF 1947 [Chapter 343; 61 Stat. 496; approved July 26, 1947] [As Amended Through P.L. 116–283, Enacted January 1, 2021] øCurrency: This publication is a compilation of the text of Chapter 343 of the 80th Congress. It was last amended by the public law listed in the As Amended Through note above and below at the bottom of each page of the pdf version and reflects current law through the date of the enactment of the public law listed at https://www.govinfo.gov/app/collection/comps/¿ øNote: While this publication does not represent an official version of any Federal statute, substantial efforts have been made to ensure the accuracy of its contents. The official version of Federal law is found in the United States Statutes at Large and in the United States Code. The legal effect to be given to the Statutes at Large and the United States Code is established by statute (1 U.S.C. 112, 204).¿ AN ACT To promote the national security by providing for a Secretary of Defense; for a National Military Establishment; for a Department of the Army, a Depart- ment of the Navy, and a Department of the Air Force; and for the coordination of the activities of the National Military Establishment with other departments and agencies of the Government concerned with the national security. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SHORT TITLE That ø50 U.S.C. 3001¿ this Act may be cited as the ‘‘National Security Act of 1947’’. TABLE OF CONTENTS Sec. 2. Declaration of policy. Sec. 3. Definitions. TITLE I—COORDINATION FOR NATIONAL SECURITY Sec. 101. National Security Council. Sec. 101A. Joint Intelligence Community Council. Sec. 102. Director of National Intelligence. Sec. 102A. Responsibilities and authorities of the Director of National Intelligence. Sec. 103. Office of the Director of National Intelligence. Sec. 103A. Deputy Directors of National Intelligence. Sec. 103B. National Intelligence Council. Sec. 103C. General Counsel. Sec. 103D. Civil Liberties Protection Officer. Sec. 103E. Director of Science and Technology. Sec. 103F. Director of the National Counterintelligence and Security Center. Sec. 103G. Chief Information Officer. Sec. 103H. Inspector General of the Intelligence Community. Sec. 103I. Chief Financial Officer of the Intelligence Community. Sec. 103J. Functional managers for the intelligence community. Sec. 104. Central Intelligence Agency. Sec. 104A. Director of the Central Intelligence Agency. Sec. 104B. Deputy Director of the Central Intelligence Agency. 1 February 26, 2021 As Amended Through P.L. 116-283, Enacted January 1, 2021 VerDate Mar 15 2010 15:00 Feb 26, 2021 Jkt 000000 PO 00000 Frm 00001 Fmt 9001 Sfmt 6611 G:\COMP\INTEL\NSAO1.BEL HOLC G:\COMP\INTEL\NATIONAL SECURITY ACT OF 1947.XML NATIONAL SECURITY ACT OF 1947 2 Sec. 105. Responsibilities of the Secretary of Defense pertaining to the National In- telligence Program. Sec. 105A. Assistance to United States law enforcement agencies. Sec. 105B. Disclosure of foreign intelligence acquired in criminal investigations; no- tice of criminal investigations of foreign intelligence sources. Sec. 106. Appointment of officials responsible for intelligence-related activities. Sec. 106A. Director of the National Reconnaissance Office. øItem relating to section 107 was repealed by section 6742(a)(2) of division E of Public Law 116– 92..¿ Sec. 108. Annual National Security Strategy Report. Sec. 108A. National intelligence strategy. Sec. 108B. Annual reports on world-wide threats. 1 Sec. 109. Software licensing. Sec. 110. National mission of National Geospatial-Intelligence Agency. Sec. 112. Restrictions on intelligence sharing with the United Nations. Sec. 113. Detail of intelligence community personnel—intelligence community as- signment program. Sec. 113A. Non-reimbursable detail of other personnel. Sec. 113B. Special pay authority for science, technology, engineering, or mathe- matics positions. Sec. 114. Annual report on hiring and retention of minority employees. Sec. 115. Limitation on establishment or operation of diplomatic intelligence sup- port centers. Sec. 116. Travel on any common carrier for certain intelligence collection personnel. Sec. 117. POW/MIA analytic capability. Sec. 118. Annual report on financial intelligence on terrorist assets. Sec. 119. National Counterterrorism Center. Sec. 119A. National Counter Proliferation Center. Sec. 119B. National intelligence centers. Sec. 119C. Foreign Malign Influence Response Center. Sec. 120. Climate Security Advisory Council. TITLE II—THE DEPARTMENT OF DEFENSE Sec. 201. Department of Defense. øItems relating to sections 202–204 were re- pealed by section 6742(a)(4) of division E of Public Law 116–92..¿ Sec. 205. Department of the Army. Sec. 206. Department of the Navy. Sec. 207. Department of the Air Force. TITLE III—MISCELLANEOUS Sec. 301. National Security Agency voluntary separation. Sec. 302. Authority of Federal Bureau of Investigation to award personal services contracts. Sec. 303. Advisory committees and personnel. Sec. 304. Reporting of certain employment activities by former intelligence officers and employees. Sec. 307. Authorization for appropriations. Sec. 308. Definitions. Sec. 309. Separability. Sec. 310. Effective date. Sec. 311. Succession to the Presidency. Sec. 312. Repealing and saving provisions. TITLE V—ACCOUNTABILITY FOR INTELLIGENCE ACTIVITIES Sec. 501. General congressional oversight provisions. Sec. 502. Reporting of intelligence activities other than covert actions. Sec. 503. Presidential approval and reporting of covert actions. Sec. 504. Funding of intelligence activities. Sec. 505. Notice to Congress of certain transfers of defense articles and defense services. 1 The toc item of section 108B does not match the section heading. The toc item reads ‘‘world- wide’’ while the section heading reads ‘‘worldwide’’. See amendments made by section 617 of division W of Public Law 116-260. February 26, 2021 As Amended Through P.L. 116-283, Enacted January 1, 2021 VerDate Mar 15 2010 15:00 Feb 26, 2021 Jkt 000000 PO 00000 Frm 00002 Fmt 9001 Sfmt 6611 G:\COMP\INTEL\NSAO1.BEL HOLC G:\COMP\INTEL\NATIONAL SECURITY ACT OF 1947.XML 3 NATIONAL SECURITY ACT OF 1947 Sec. 506. Specificity of National Intelligence Program budget amounts for counter- terrorism, counterproliferation, counternarcotics, and counterintel- ligence. Sec. 506A. Budget treatment of costs of acquisition of major systems by the intel- ligence community. Sec. 506B. Annual personnel level assessments for the intelligence community. Sec. 506C. Vulnerability assessments of major systems. Sec. 506D. Intelligence community business system transformation. Sec. 506E. Reports on the acquisition of major systems. Sec. 506F. Critical cost growth in major systems. Sec. 506G. Future budget projections. Sec. 506H. Reports on security clearances. Sec. 506I. Summary of intelligence relating to terrorist recidivism of detainees held at United States Naval Station, Guantanamo Bay, Cuba. Sec. 507. Dates for submittal of various annual and semiannual reports to the con- gressional intelligence committees. Sec. 508. Certification of compliance with oversight requirements. Sec. 509. Auditability of certain elements of the intelligence community. Sec. 510. Significant interpretations of law concerning intelligence activities. Sec. 511. Annual report on violations of law or executive order. Sec. 512. Briefings and notifications on counterintelligence activities of the Federal Bureau of Investigation. TITLE VI—PROTECTION OF CERTAIN NATIONAL SECURITY INFORMATION Sec. 601. Protection of identities of certain United States undercover intelligence of- ficers, agents, informants, and sources. Sec. 602. Defenses and exceptions. Sec. 603. Extraterritorial jurisdiction. Sec. 604. Providing information to Congress. Sec. 605. Definitions. TITLE VII—PROTECTION OF OPERATIONAL FILES Sec. 701. Operational files of the Central Intelligence Agency. Sec. 702. Operational files of the National Geospatial-Intelligence Agency. Sec. 703. Operational files of the National Reconnaissance Office. Sec. 704. Operational files of the National Security Agency. Sec. 705. Operational files of the Defense Intelligence Agency. Sec. 706. Protection of certain files of the Office of the Director of National Intel- ligence. TITLE VIII—ACCESS TO CLASSIFIED INFORMATION Sec. 801. Procedures. Sec. 802. Requests by authorized investigative agencies. Sec. 803. Security Executive Agent. Sec. 804. Exceptions. Sec. 805. Definitions. TITLE IX—APPLICATION OF SANCTIONS LAWS TO INTELLIGENCE ACTIVITIES Sec. 901. Stay of sanctions. Sec. 902. Extension of stay. Sec. 903. Reports. Sec. 904. Laws subject to stay. TITLE X—EDUCATION IN SUPPORT OF NATIONAL INTELLIGENCE Subtitle A—Science and Technology Sec. 1001. Scholarships and work-study for pursuit of graduate degrees in science and technology. Sec. 1002. Framework for cross-disciplinary education and training. Subtitle B—Foreign Languages Program Sec. 1011. Program on advancement of foreign languages critical to the intelligence community. Sec. 1012. Education partnerships. Sec. 1013. Voluntary services. February 26, 2021 As Amended Through P.L. 116-283, Enacted January 1, 2021 VerDate Mar 15 2010 15:00 Feb 26, 2021 Jkt 000000 PO 00000 Frm 00003 Fmt 9001 Sfmt 6611 G:\COMP\INTEL\NSAO1.BEL HOLC G:\COMP\INTEL\NATIONAL SECURITY ACT OF 1947.XML Sec. 2 NATIONAL SECURITY ACT OF 1947 4 Sec. 1014. Regulations. Sec. 1015. Definitions. Subtitle
Recommended publications
  • BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE
    Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15
    [Show full text]
  • The Security Lexicon from Westphalia to the Present a Cautionary Tale
    THE SECURITY LEXICON FROM WESTPHALIA TO THE PRESENT A CAUTIONARY TALE MAX G. MANWARING, PH.D. A new and dangerous dynamic is at work around the world today. That new dynamic involves the migration of some of the monopoly of political power (i.e., the authoritative allocation of values in a society) from the traditional nation-state to unconventional actors such as the Islamic State (ISIS), transnational criminal organizations, Leninist-Maoist insurgents, tribal militias, pri- vate armies, enforcer gangs and other modern mercenaries. These actors conduct their own political-psychological type of war against various state and other non-state adversaries. These violent politicized non-state actors are being ignored; or, alternatively, are being considered too hard to deal with. That misunderstanding must inevitably result in an epochal transition from traditional Western nation-state systems and their liberal democratic values to something else dependent on the values—good, bad, or non-existent—of the winner.1 To help civilian and military leaders, policy-makers, opinion-makers, and anyone else who might have the responsibility for dealing with modern conflict come to grips analytically with the security dilemma and other realities of the 21st century political-psychological environment, this paper seeks to do three things. In Part One, we outline a bit of essential history that takes us from the Westphalian Peace Treaty of 1648 to the present. In that context, we briefly consider a con- temporary example of the traditional military-centric approach to national and international security that is still alive and well. That is, Chinese military activity in the South China Sea.
    [Show full text]
  • An Overview of the United States Intelligence Community
    AN OVERVIEW OF THE UNITED STATES INTELLIGENCE COMMUNITY 2007 007-02247-0224 DDNIHandbook.inddNIHandbook.indd i 112/15/062/15/06 9:40:489:40:48 AAMM 007-02247-0224 DDNIHandbook.inddNIHandbook.indd iiii 112/15/062/15/06 9:40:559:40:55 AAMM AN OVERVIEW OF THE UNITED STATES INTELLIGENCE COMMUNITY TABLE OF CONTENTS OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE ..................................................................... 1 CENTRAL INTELLIGENCE AGENCY .................................................................................................... 5 DEFENSE INTELLIGENCE AGENCY .................................................................................................... 7 DEPARTMENT OF ENERGY: OFFICE OF INTELLIGENCE AND COUNTERINTELLIGENCE ................................................................ 10 DEPARTMENT OF HOMELAND SECURITY: OFFICE OF INTELLIGENCE AND ANALYSIS .................................................................................... 11 DEPARTMENT OF STATE: BUREAU OF INTELLIGENCE AND RESEARCH ................................................................................. 12 DEPARTMENT OF THE TREASURY: OFFICE OF INTELLIGENCE AND ANALYSIS .................................................................................... 13 DRUG ENFORCEMENT ADMINISTRATION: OFFICE OF NATIONAL SECURITY INTELLIGENCE ........................................................................... 14 FEDERAL BUREAU OF INVESTIGATION NATIONAL SECURITY BRANCH ..................................................................................................
    [Show full text]
  • DDS Security Specification Will Have Limited Interoperability with Implementations That Do Implement the Mechanisms Introduced by This Specification
    An OMG® DDS Security™ Publication DDS Security Version 1.1 OMG Document Number: formal/2018-04-01 Release Date: July 2018 Standard Document URL: https://www.omg.org/spec/DDS-SECURITY/1.1 Machine Consumable Files: Normative: https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_spis.idl https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_model.xmi Non-normative: https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance_example.xml https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions_example.xml Copyright © 2018, Object Management Group, Inc. Copyright © 2014-2017, PrismTech Group Ltd. Copyright © 2014-2017, Real-Time Innovations, Inc. Copyright © 2017, Twin Oaks Computing, Inc. Copyright © 2017, THALES USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification.
    [Show full text]
  • “What Are Marines For?” the United States Marine Corps
    “WHAT ARE MARINES FOR?” THE UNITED STATES MARINE CORPS IN THE CIVIL WAR ERA A Dissertation by MICHAEL EDWARD KRIVDO Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2011 Major Subject: History “What Are Marines For?” The United States Marine Corps in the Civil War Era Copyright 2011 Michael Edward Krivdo “WHAT ARE MARINES FOR?” THE UNITED STATES MARINE CORPS IN THE CIVIL WAR ERA A Dissertation by MICHAEL EDWARD KRIVDO Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Joseph G. Dawson, III Committee Members, R. J. Q. Adams James C. Bradford Peter J. Hugill David Vaught Head of Department, Walter L. Buenger May 2011 Major Subject: History iii ABSTRACT “What Are Marines For?” The United States Marine Corps in the Civil War Era. (May 2011) Michael E. Krivdo, B.A., Texas A&M University; M.A., Texas A&M University Chair of Advisory Committee: Dr. Joseph G. Dawson, III This dissertation provides analysis on several areas of study related to the history of the United States Marine Corps in the Civil War Era. One element scrutinizes the efforts of Commandant Archibald Henderson to transform the Corps into a more nimble and professional organization. Henderson's initiatives are placed within the framework of the several fundamental changes that the U.S. Navy was undergoing as it worked to experiment with, acquire, and incorporate new naval technologies into its own operational concept.
    [Show full text]
  • National Security and Constitutional Rights in Korea
    National Security and Constitutional Rights in Korea - National Security Law, Past and Present Park Won Soon, Human Rights Lawyer Chair, Executive Committee, PSPD Director, Beautiful Foundation As of 25 August, of the 99 political prisoners in detention, 54 were detained on charges under the National Security Law. Of these, the majority were arrested under Article 7, which punishes membership of organizations deemed to "benefit the enemy", improving relations with North Korea prompted debate on reform of the National Security Law. President Kim Dae-Jung apparently encouraged by his award of the Nobel Peace Prize, announced his support for revisions to the National Security Law, but opposition to reform in the National Assembly from both the GNP and the ULD prevented significant revisions. (Amnesty International Report 2001) 1. Introduction De Facto Constitution - The National Security Law The National Security Law (NSL) in Korea has been called as a de facto constitution. It meas the NSL was under no other laws including the Constitution. Even though it is inferior to the Constitution namely, no legal enforcement agencies and the court could not challenge unconstitutionality of the law in reality. Korean peninsula has been one of the powder magazine where small incident could lead to big armed conflict. As a matter of fact, in 1950, there broke out Korean war in which over 3 million people were killed. Since then, national security has been regarded as the most important and senstive agenda among Korean people. Basic freedom and human rights enshrined in the Constitution has been sacrificed in the name of national security.
    [Show full text]
  • Fedramp SECURITY ASSESSMENT FRAMEWORK
    FedRAMP SECURITY ASSESSMENT FRAMEWORK Version 2.4 November 15, 2017 EXECUTIVE SUMMARY This document describes a general Security Assessment Framework (SAF) for the Federal Risk and Authorization Management Program (FedRAMP). FedRAMP is a Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services. FedRAMP uses a “do once, use many times” framework that intends to save costs, time, and staff required to conduct redundant Agency security assessments and process monitoring reports. FedRAMP was developed in collaboration with the National Institute of Standards and Technology (NIST), the General Services Administration (GSA), the Department of Defense (DOD), and the Department of Homeland Security (DHS). Many other Government Agencies and working groups participated in reviewing and standardizing the controls, policies and procedures. | i DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR Major revision for NIST SP 800-53 Revision 4. 06/06/2014 2.0 All FedRAMP PMO Includes new template and formatting changes. Formatting changes throughout. Clarified distinction 12/04/2015 2.1 All between 3PAO and IA. Replaced Figures 2 and 3, and FedRAMP PMO Appendix C Figures with current images. 06/06/2017 2.2 Cover Updated logo FedRAMP PMO Removed references to CSP Supplied Path to 11/06/2017 2.3 All Authorization and the Guide to Understanding FedRAMP PMO FedRAMP as they no longer exist. 11/15/2017 2.4 All Updated to the new template FedRAMP PMO HOW TO CONTACT US Questions about FedRAMP or this document should be directed to [email protected]. For more information about FedRAMP, visit the website at http://www.fedramp.gov.
    [Show full text]
  • 190701-Laying the Keel Update
    LAYING THE KEEL MAY 2019 THE SAILOR'S CREED I AM A UNITED STATES SAILOR. I WILL SUPPORT AND DEFEND THE CONSTITUTION OF THE UNITED STATES OF AMERICA AND I WILL OBEY THE ORDERS OF THOSE APPOINTED OVER ME. I REPRESENT THE FIGHTING SPIRIT OF THE NAVY AND THOSE WHO HAVE GONE BEFORE ME TO DEFEND FREEDOM AND DEMOCRACY AROUND THE WORLD. I PROUDLY SERVE MY COUNTRY'S NAVY COMBAT TEAM WITH HONOR, COURAGE AND COMMITMENT. I AM COMMITTED TO EXCELLENCE AND THE FAIR TREATMENT OF ALL. INTRODUCTION As our Navy grows and evolves to protect America's interests in a fast paced, more complex and increasingly competitive environment, more will be expected and demanded from its Enlisted Leaders at all levels. Today, we are the strongest Navy in the world by any measure – we have the most capable ships, the best equipment, and more importantly the finest Sailors. Petty Officers have been demonstrating technical competence and devotion to duty in our Navy since 1775. Just as our capital assets, procedures, policies and technology have evolved over the course of our history, so has the process to develop effective leadership qualities that address the challenges our Sailors face. Our Sailors today are recognized worldwide in their distinct ability to overcome adversity, courageously face challenges and accomplish our Navy's mission as the world's most well trained and combat ready force. The Navy the Nation Needs will require our Enlisted Leaders to be continuously flexible, more innovative and confident in achieving operational excellence in tougher and more challenging environments. As our Sailors operate on all domains, from the sea floor to space, their daily duties, mission and challenges are unique.
    [Show full text]
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • Nsa-Spybases-Expansi
    National Security Agency Military Construction, Defense-Wide FY 2008 Budget Estimates ($ in thousands) New/ Authorization Approp. Current Page State/Installation/Project Request Request Mission No. Georgia Augusta Regional Security Operation Center Inc. III - 100,000 C 202 Hawaii Kunia, Naval Security Group Activity Regional Security Operation Center Inc. III - 136,318 C 207 Maryland Fort Meade NSAW Utility Management System 7,901 7,901 C 213 OPS1 South Stair Tower 4,000 4,000 C 217 Total 11,901 248,219 201 1. COMPONENT 2. DATE NSA/CSS FY 2008 MILITARY CONSTRUCTION PROGRAM DEFENSE February 2007 3. INSTALLATION AND LOCATION 4. COMMAND 5. AREA CONSTRUCTION COST INDEX FORT GORDON, GEORGIA NSA/CSS 0.84 6. PERSONNEL STRENGTH PERMANENT STUDENTS SUPPORTED TOTAL Army Installation OFF ENL CIV OFF ENL CIV OFF ENL CIV a. AS OF x b. END FY CLASS IFIED 7. INVENTORY DATA ($000) A. TOTAL ACREAGE B. INVENTORY TOTAL AS OF C. AUTHORIZED NOT YET IN INVENTORY 340,854 D. AUTHORIZATION REQUESTED IN THIS PROGRAM 0 E. AUTHORIZATION INCLUDED IN FOLLOWING PROGRAM 0 F. PLANNED IN NEXT THREE YEARS 0 G. REMAINING DEFICIENCY 0 H. GRAND TOTAL 340,854 8. PROJECTS REQUESTED IN THIS PROGRAM: CATEGORY PROJECT COST DESIGN PROJECT TITLE CODE NUMBER ($000) START COMPLETE 141 50080 Georgia Regional Security Operations Center 100,000 Jan 06 May 06 (FY08) (3rd Increment) (NSA/CSS Georgia) 9. FUTURE PROJECTS: a. INCLUDED IN FOLLOWING PROGRAM CATEGORY COST PROJECT TITLE CODE ($000) 141 Georgia Regional Security Operations Center (FY09) 86,550 (4th Increment) (NSA/CSS Georgia) b. PLANNED IN NEXT THREE YEARS CATEGORY COST PROJECT TITLE CODE ($000) 10.
    [Show full text]
  • Global Terrorism: IPI Blue Paper No. 4
    IPI Blue Papers Global Terrorism Task Forces on Strengthening Multilateral Security Capacity No. 4 2009 INTERNATIONAL PEACE INSTITUTE Global Terrorism Global Terrorism Task Forces on Strengthening Multilateral Security Capacity IPI Blue Paper No. 4 Acknowledgements The International Peace Institute (IPI) owes a great debt of gratitude to its many donors to the program Coping with Crisis, Conflict, and Change. In particular, IPI is grateful to the governments of Belgium, Canada, Denmark, Finland, Greece, Luxembourg, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. The Task Forces would also not have been possible without the leadership and intellectual contribution of their co-chairs, government representatives from Permanent Missions to the United Nations in New York, and expert moderators and contributors. IPI wishes to acknowledge the support of the Greentree Foundation, which generously allowed IPI the use of the Greentree Estate for plenary meetings of the Task Forces during 2008. note Meetings were held under the Chatham House Rule. Participants were invited in their personal capacity. This report is an IPI product. Its content does not necessarily represent the positions or opinions of individual Task Force participants. suggested citation: International Peace Institute, “Global Terrorism,” IPI Blue Paper No. 4, Task Forces on Strengthening Multilateral Security Capacity, New York, 2009. © by International Peace Institute, 2009 All Rights Reserved www.ipinst.org CONTENTS Foreword, Terje Rød-Larsen. vii Acronyms. x Executive Summary. 1 The Challenge for Multilateral Counterterrorism. .6 Ideas for Action. 18 I. strengThen Political SupporT For The un’S role In CounTerIng Terrorism ii. enhanCe straTegic CommunicationS iii. deePen relationShips BeTween un head- quarTerS and national and regIonal parTnerS Iv.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]