Selected Homeland Security Issues in the 115Th Congress

Total Page:16

File Type:pdf, Size:1020Kb

Selected Homeland Security Issues in the 115Th Congress Selected Homeland Security Issues in the 115th Congress Updated May 11, 2017 Congressional Research Service https://crsreports.congress.gov R44847 Selected Homeland Security Issues in the 115th Congress Summary In 2001, in the wake of the terrorist attacks of September 11th, “homeland security” went from being a concept discussed among a relatively small cadre of policymakers and strategic thinkers to a broadly discussed issue among policymakers, including those in Congress. Debates over how to implement coordinated homeland security policy led to the passage of the Homeland Security Act of 2002 (P.L. 107-296) and the establishment of the Department of Homeland Security (DHS). Evolution of America’s response to terrorist threats has continued under the leadership of different Administrations, Congresses, and in a shifting environment of public opinion. DHS is currently the third-largest department in the federal government, although it does not incorporate all of the homeland security functions at the federal level, even if one constrains the definition of homeland security to the narrow field of prevention and response to domestic acts of terrorism. In policymaking terms, homeland security is a very broad and complex network of interrelated issues. For example, in its executive summary, the Quadrennial Homeland Security Review issued in 2014 delineates the missions of the homeland security enterprise as follows: prevent terrorism and enhance security; secure and manage the borders; enforce and administer immigration laws; safeguard and secure cyberspace; and strengthen national preparedness and resilience. This report outlines an array of homeland security issues that may come before the 115th Congress. After a brief discussion of the definitions of homeland security, the homeland security budget, and the role of homeland security actors in the intelligence community, the report divides the specific issues into five broad categories: Counterterrorism and Security Management; Border Security and Trade; Disaster Preparedness, Response, and Recovery; Cybersecurity; and DHS Management Issues. Each of those areas contains a survey of topics briefly analyzed by Congressional Research Service experts. The information included only scratches the surface of most of these selected issues. More detailed information on these topics and others can be obtained by consulting the CRS reports referenced herein, or for congressional clients, by contacting the relevant CRS expert. Congressional Research Service Selected Homeland Security Issues in the 115th Congress Contents What Is Homeland Security? ........................................................................................................... 1 The Budget and Security ........................................................................................................... 2 DHS Appropriations ........................................................................................................... 2 Homeland Security and the U.S. Intelligence Community ....................................................... 3 Selected Intelligence Community (IC) Issues with Homeland Security Implications ..................................................................................................................... 7 Homeland Security and Research and Development ................................................................ 9 Counterterrorism and Security Management ................................................................................. 10 The Transnational Trend of Terrorism ..................................................................................... 10 Al Qaeda ............................................................................................................................ 11 The Islamic State ............................................................................................................... 11 Considerations .................................................................................................................. 12 The Islamic State in the Homeland—the Departed, Returned, and Inspired .......................... 12 Beyond the Departed, Returned, and Inspired .................................................................. 14 Preempting and Monitoring Potential Terrorists ............................................................... 14 Medical Countermeasures to Chemical, Biological, Radiological, and Nuclear Terrorism .............................................................................................................................. 16 Chemical Facilities Security ................................................................................................... 16 Electric Grid Physical Security ............................................................................................... 17 Continuity of Government Operations .................................................................................... 19 U.S. Secret Service .................................................................................................................. 20 Federal Facility Security ......................................................................................................... 21 DHS State and Local Preparedness Grants ............................................................................. 22 Border Security and Trade ............................................................................................................. 24 Southwest Border Issues ......................................................................................................... 24 Drug Trafficking and the Southwest Border ..................................................................... 24 Illicit Proceeds and the Southwest Border ........................................................................ 25 Cross-Border Smuggling Tunnels ..................................................................................... 26 Cargo Security ......................................................................................................................... 27 Customs-Trade Partnership Against Terrorism (C-TPAT) ................................................ 27 100% Scanning Requirement ............................................................................................ 28 Transportation Worker Identification Credential (TWIC) ....................................................... 30 Immigration Inspections at Ports of Entry (POEs) .................................................................. 32 Port of Entry (POE) Infrastructure and Personnel ............................................................ 33 Entry-Exit System ............................................................................................................. 34 Enforcement Between Ports of Entry (POEs) ......................................................................... 35 Aviation Security ..................................................................................................................... 36 Explosives Screening Strategy for the Aviation Domain .................................................. 37 Risk-Based Passenger Screening ...................................................................................... 39 The Use of Terrorist Watchlists in the Aviation Domain .................................................. 40 Perimeter Security, Access Controls, and Worker Vetting ................................................ 41 Security Incidents at Airports ............................................................................................ 42 Foreign Last Point of Departure Airports ......................................................................... 42 Mitigating the Threat of Shoulder-Fired Missiles to Civilian Aircraft ............................. 43 Security Issues Regarding the Operation of Unmanned Aircraft ...................................... 44 Transit and Passenger Rail Security ........................................................................................ 46 Congressional Research Service Selected Homeland Security Issues in the 115th Congress Disaster Preparedness, Response, and Recovery ........................................................................... 48 Disaster Assistance Funding ................................................................................................... 48 Firefighter Assistance Programs .............................................................................................. 50 Emergency Communications .................................................................................................. 50 The National Flood Insurance Program (NFIP) ...................................................................... 51 NFIP Debt and Borrowing ................................................................................................ 53 Affordability and Solvency ............................................................................................... 53 The Role of Private Insurance in the NFIP ....................................................................... 54 FEMA Reauthorization ........................................................................................................... 55 National Preparedness System ................................................................................................ 56 National Health Security ........................................................................................................
Recommended publications
  • Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties 1
    Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties 1 Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties 2 Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties BENS Practitioners Panel Michael Allen Thomas Kean Former Majority Staff Director House Perma- Chair, The National Commission on Terrorist nent Select Committee on Intelligence United Attacks Upon the United States States House of Representatives Former Governor of New Jersey Alfred Berkeley Michael Leiter Vice Chair National Infrastructure Advisory Former Director of the National Counterter- Council rorism Center Former President NASDAQ Stock Market, Inc. Joseph Lieberman Michael Chertoff (Vice Chair) Former United States Senator (CT) Former Secretary of Homeland Security Former Chairman Homeland Security and Government Affairs Committee Commissioner Edward Davis United States Senate Former Commissioner, Boston Police Department James Locher Former Assistant Secretary of Defense for Robert Graham (Vice Chair) Special Operations and Low Intensity Conflict Former Governor of Florida Former Chairman Senate Select Committee Steven McCraw (Vice Chair) on Intelligence United States Senate Director, Texas Department of Public Safety Homeland Security Advisor to the Governor David Hall of Texas Director Missouri Information and Analysis Center Norton Schwartz (Chair) President & CEO Business Executives Lee Hamilton for National Security Former United States Representative (IN) Vice Chair The National Commission Maurice Sonnenberg on Terrorist Attacks Upon the United States Former Member President’s Intelligence Advisory Board Michael Hayden Vice Chair Report of the National Former Director CIA Commission on Terrorism Former Director NSA Frances Townsend Brian Michael Jenkins Former Assistant to the President for Home- Senior Advisor to the President RAND land Security and Counterterrorism Corporation Juan Zarate Loch K.
    [Show full text]
  • Board of County Commissioners Agenda Thursday, June 20, 2019, 9:00Am Commission Chambers, Room B-11 I
    BOARD OF COUNTY COMMISSIONERS AGENDA THURSDAY, JUNE 20, 2019, 9:00AM COMMISSION CHAMBERS, ROOM B-11 I. PROCLAMATIONS/PRESENTATIONS l. Presentation of award from the Kansas Breastfeeding Coalition-Human Resources II. UNFINISHED BUSINESS III. CONSENT AGENDA I. Consider authorization and execution of Contract C227-2019, updating a UMB signature card for the Dept. of Corrections Controlled Disbursement Account by adding Joshua Reamer as an authorized signer-Administrative Services. 2. Consider approval of Resolution No. 2019-37 updating the resolution from 2008 to include the appropriate approvals for issuance and cancellation, as well as providing authority for necessary temporary credit limit increases-- Commissioner Archer. 3. Consider approval of Resolution No. 2019-38 authorizing the issuance of a Shawnee County credit card for official business for Nancy Mitchell, Shawnee County Health Department, with a credit limit of$7,500.00- Commissioner Archer. 4. Consider authorization and execution of Contract C228-20J9 for annual maintenance of the PRTG network monitoring software through state contract pricing with Software House International at a cost of$599.00 with funding from the 2019 budget-lnfonnation Technology. 5. Acknowledge receipt of correspondence from Sheriff Hill to send Captain Shane Hoobler to the FBI National Academy Training Seminar in Phoenix, Arizona focusing on 21" Century contemporary law enforcement trends and issues at a cost of no more than $1,895.00 with funding from the Federal Forfeiture funds. 6. Consider authorization and execution of Contract C229-2Ql9 with COW Government for an extended four year warranty on one recently purchased computer at a cost of$35.00 from the department's operating funds-- Parks+ Recreation.
    [Show full text]
  • Testimony of Michael German Policy Counsel, American Civil Liberties Union, Former Special Agent, Federal Bureau of Investigation
    Testimony of Michael German Policy Counsel, American Civil Liberties Union, Former Special Agent, Federal Bureau of Investigation before the House Committee on Oversight and Government Reform May 14, 2009 The Whistleblower Protection Enhancement Act of 2009 (H.R. 1507) 915 15th Street, NW Washington, D.C. 20005 (202) 544-1681 Fax (202) 546-0738 Caroline Fredrickson Director Testimony of Michael German, Policy Counsel, American Civil Liberties Union, former Special Agent, Federal Bureau of Investigation, before the House Committee on Oversight and Government Reform, May 14, 2009 Chairman Towns, Ranking Member Issa, members of the Committee, thank you for inviting me to testify in support of H.R. 1507, the Whistleblower Protection Enhancement Act of 2009. I represent the American Civil Liberties Union, a non- partisan organization of half a million members nationwide dedicated to defending the Constitution and protecting civil liberties. The ACLU vigorously supports meaningful legal protections for all whistleblowers, and particularly for employees and contractors within the law enforcement and intelligence communities, where abuse and misconduct can have the most serious and direct consequences to our liberty and our security. INTRODUCTION Executive Order 12731 requires all federal employees to report “waste, fraud, abuse and corruption to the appropriate authorities.”1 Unfortunately, employees who follow this ethical obligation are often subject to retaliation by the very managers to whom they are duty-bound to report. Efforts by Congress to protect responsible whistleblowers, beginning with the Civil Service Reform Act in 1978 and followed by the landmark Whistleblower Protection Act (WPA) in 1989, have been steadily undermined by an ineffective Merit Systems Protection Board and hostile decisions of the United States Court of Appeals for the Federal Circuit, which has a monopoly on federal whistleblower appeals.
    [Show full text]
  • Special Report: the FBI's Compliance with the Attorney General's Investigative Guidelines
    U.S. Department of Justice Of'fice of the Inspector General The Federal Bureau of Investigation's Compliance with the Attorney General's Investigative Guidelines Ofice of the Inspector General Sentember 2005 TABLE OF CONTENTS TABLE OF CONTENTS ................................................................................ i TABLE OF APPENDICES ...........................................................................vii INDEX OF CASE STUDIES, DIAGRAMS, AND TABLES .............................. ix EXECUTIVE SUMMARY.............................................................................. 1 I. Overview ............................................................................................. 1 II. Background ........................................................................................ 5 III. The Scope and Methodology of the OIG Review .................................... 6 IV. OIG Findings....................................................................................... 7 A. The Attorney General’s Guidelines Regarding the Use of Confidential Informants ............................................................... 7 B. The Attorney General’s Guidelines on Federal Bureau of Investigation Undercover Operations ............................................ 9 C. The Attorney General’s Guidelines on General Crimes, Racketeering Enterprise and Terrorism Enterprise Investigations............................................................................. 10 D. Procedures for Lawful, Warrantless Monitoring of Verbal Communications
    [Show full text]
  • FBI ICPG 107.1 Unmasking Guidelines
    UNCLASSIFIED FEDERAL BUREAU OF INVESTIGATION POLICY DIRECTIVE Procedures for Unmasking Requests in Intelligence Information Reports and BLUEGEMReports Policy Directive 1053D I General Information Proponent Directorate of Intelligence (01) Publication Date 2020-09-28 Review Date 2023-09-28 Last Updated N/A Procedures for Unmasking Requests in Intelligence Supersession Information Reports and BLUEGEMReports Policy Notice (1024N) 1. Authorities • National Security Act of 1947 • Executive Order (EO) 12333, as amended • EO 13526, as amended • Intelligence Community Policy Guidance (ICPG) 107.1 • Intelligence Community Directive (ICD) 107 • ICD 112, Annex A (Dissemination of Congressional Identity Information) • Presidential Memorandum for the Director of National Intelligence (DNI) (January 8, 2018) • Guidelines for Access, Retention, Use, and Dissemination by the National Counterterrorism Center and Other Agencies of Information in Datasets Containing Non- Terrorism Information (March 22, 2012) 2. Purpose The purpose of this policy directive (PO) is to establish guidance for responding to requests for the identities of United States persons (USPER) in Federal Bureau of Investigation (FBI)-disseminated intelligence reports, per ICPG 107.1. 1 UNCLASSIFIED UNCLASSIFIED 3. Scope This POapplies to all FBI personnel responsible for responding to requests (hereinafter "unmasking requests") submitted to the FBI from requesting entities for nonpublic identity information of known, unconsenting USPERsoriginally masked in FBI-disseminated intelligence information reports (IIR) and BLUEGEM(BLG) intelligence reports. This policy only applies to raw intelligence reports. Requests for unmasking nonpublic USPERidentity information contained in finished intelligence products will be addressed by subjecting the IIRs and BLGs upon which the finished intelligence products are based to the guidelines in Section 5 of this policy.
    [Show full text]
  • TEACHER NOTES Introduction to U.S. Intelligence and National Security Studies
    Introduction to U.S. Intelligence and National Security Studies Teacher Notes for the Georgia Standards of Excellence in Social Studies The Teacher Notes were developed to help teachers understand the depth and breadth of the standards. In some cases, information provided in this document goes beyond the scope of the standards and can be used for background and enrichment information. Please remember that the goal of social studies is not to have students memorize laundry lists of facts, but rather to help them understand the world around them so they can analyze issues, solve problems, think critically, and become informed citizens. TEACHER NOTES Introduction to U.S. Intelligence and National Security Studies Verbatim from Standards of Excellence: Introduction to U.S. Intelligence and National Security Studies provides a basic and broad overview of the career field of Intelligence, the authorized activities of an intelligence professional, the composition of the United States Government Intelligence Community (IC), the various functions of each of the member agencies, the limits and capabilities of Intelligence and how Intelligence plays a role in the decision-making process of the government. This course is also designed to apply critical analysis to the field of U.S. Intelligence. SSIUSINS1 – Examine the development of the field of U.S. Intelligence. a. Explore the history of U.S. Intelligence efforts from the American Revolution through the Civil War. It is imperative to debunk the common perception that the intelligence field is full of individuals like the fictional characters James Bond, Jason Bourne, Lorraine Broughton, and Ethan Hunt. Intelligence is a process (e.g., the intelligence cycle) and a product (e.g., the national intelligence estimate).
    [Show full text]
  • FBINAA Conference Schedule
    Conference Training Schedule Saturday, July 20 8:00 AM - 11:30 AM Extended Breakout Session What You Do Matters: Lessons from the Holocaust Sheila Polk, Yavapai County Attorney; Chair, Arizona Prosecuting Attorneys’ Advisory Council 8:30 AM - 11:30 AM Extended Breakout Session Officer Safety and Wellness Instructor Training Dr. Michael Genovese, Chief Medical Officer, Acadia Healthcare Col. Randy Richert, Vice President, Gordon Thomas Honeywell Governmental Affairs; U.S. Congressman (Ret); Sheriff, King County (WA) (Ret); FBINAA Member (Session 186) William “Bill” Mazur, Strategic Account Manager-Public Safety Liaison, Treatment Placement Specialists; FBINAA Member (Session 256) Officer Robert Wandrie, Two Rivers PD (WI) Undersheriff Tim Braniff, Thurston County Sheriff’s Office (WA); FBINAA Member (Session 226) 12:30 PM - 3:30 PM Extended Breakout Session Media Issues: Effective Leveraging of Social Media to Support Investigations Gail Pennybacker, Senior Instructor of Communications, Executive Programs Instruction Unit, FBI Academy Ken White, Senior Instructor of Communications, Executive Programs Instruction Unit, FBI Academy 12:30 PM - 3:30 PM Extended Breakout Session Surviving the Unthinkable: Violently Injured Police Officers Detective Mario Oliveira, (Ret) Somerville PD (MA); Co-Founder, Violently Injured Police Officers (VIPO); New England State Police Information Network (NESPIN) Officer Robert DeNapoli, (Ret) Woburn PD (MA); Co-Founder, Violently Injured Police Officers (VIPO) 5/7/2019 2019 FBINAA Conference Training Schedule
    [Show full text]
  • Federal Bureau of Investigation (FBI), and the Director of the U.S
    U.S. Department of Justice Federal Bureau of Investigation FY 2018 Authorization and Budget Request to Congress May 2017 Table of Contents Page No. I. Overview........................................................................................................................... 1-1 II. Summary of Program Changes .................................................................................... 2-1 III. Appropriations Language and Analysis of Appropriations Language ................... 3-1 IV. Decision Unit Justification ........................................................................................... 4-1 A. Intelligence Decision Unit ............................................................................................... 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies B. Counterterrorism/Counterintelligence Decision Unit .................................................... 4-11 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies C. Criminal Enterprises Federal Crimes Decision Unit ...................................................... 4-22 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies D. Criminal Justice Services Decision Unit ....................................................................... 4-35 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies V. Program Increases by Item ..........................................................................................
    [Show full text]
  • US Intelligence Community Elements
    Updated June 27, 2018 U.S. Intelligence Community Elements: Establishment Provisions The concept of a U.S. Intelligence Community (IC) of Table 1 summarizes dates and directives for the integrated component departments and agencies began to establishment of each of the 17 IC component take shape after World War II, in part through the organizations. In some cases, such as the Navy’s Office of establishment of the Central Intelligence Agency. Prior to Naval Intelligence, the intelligence organization predates that time, U.S. intelligence organizations existed within the the IC concept. Although not included in statute as a part of military services and largely operated independently of one the IC, the establishment of the position of Under Secretary another. References to an Intelligence Community first of Defense (Intelligence) (USD(I)) is included in this listing appear in the mid-1950s. The components of the IC were in reflection of the leadership the USD(I) exercises over first specified in statute by the Intelligence Organization Department of Defense intelligence programs in Act of 1992 (Title VII of P.L. 102-496). The IC has since coordination with the Director of National Intelligence. evolved into a federated community of 17 components spread across 2 independent agencies and 6 separate departments of the federal government. Table 1. U.S. Intelligence Community Elements: Establishment Dates and Mechanisms Elementa Establishment Date Mechanism of Establishment Established by Statute Central Intelligence Agency (CIA) September 18, 1947 50 U.S.C. §3035. See also P.L. 80-253 §102 (National Security Act of 1947). Department of Energy, Office of August 4, 1977 42 U.S.C.
    [Show full text]
  • The Bureaucratic Politics of the Federal Bureau of Investigation
    University of Arkansas, Fayetteville ScholarWorks@UARK Political Science Undergraduate Honors Theses Political Science 12-2019 The Bureaucratic Politics of the Federal Bureau of Investigation Cooper Hearn Follow this and additional works at: https://scholarworks.uark.edu/plscuht Part of the Defense and Security Studies Commons, Policy History, Theory, and Methods Commons, and the Public Administration Commons Citation Hearn, C. (2019). The Bureaucratic Politics of the Federal Bureau of Investigation. Political Science Undergraduate Honors Theses Retrieved from https://scholarworks.uark.edu/plscuht/8 This Thesis is brought to you for free and open access by the Political Science at ScholarWorks@UARK. It has been accepted for inclusion in Political Science Undergraduate Honors Theses by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected]. The Bureaucratic Politics of the Federal Bureau of Investigation By Cooper Hearn Fulbright Honors Thesis, Fall 2019 Thesis Advisor: Dr. William Schreckhise Submitted in partial fulfillment of the requirements for the degree of Bachelor of Arts in Political Science in the Fulbright College of Arts and Sciences, the University of Arkansas, 2019 Abstract This is a comprehensive study of how the administrative powers of the Federal Bureau of Investigation (FBI) have evolved in response to external political forces. To analyze the changes made to FBI administrative powers, this project will assess theories of public administration, bureaucratic politics, various congressional statutes, court rulings, and executive policies that have affected the bureau’s capacity to perform investigations and intelligence operations. Acknowledgements First and foremost, I would like to thank my thesis director, Dr. William Schreckhise.
    [Show full text]
  • Selected Homeland Security Issues in the 116Th Congress
    Selected Homeland Security Issues in the 116th Congress Updated November 26, 2019 Congressional Research Service https://crsreports.congress.gov R45701 SUMMARY R45701 Selected Homeland Security Issues in the November 26, 2019 116th Congress William L. Painter, In 2001, in the wake of the terrorist attacks of September 11, “homeland security” went from Coordinator being a concept discussed among a relatively small cadre of policymakers and strategic thinkers Specialist in Homeland to one broadly discussed among policymakers, including a broad swath of those in Congress. Security and Debates over how to implement coordinated homeland security policy led to the passage of the Appropriations Homeland Security Act of 2002 (P.L. 107-296), the establishment of the Department of Homeland Security (DHS), and extensive legislative activity in the ensuing years. Initially, homeland security was largely seen as counterterrorism activities. Today, homeland security is a broad and complex network of interrelated issues, in policymaking terms. For example, in its executive summary, the Quadrennial Homeland Security Review issued in 2014 delineated the missions of the homeland security enterprise as follows: prevent terrorism and enhance security; secure and manage the borders; enforce and administer immigration laws; safeguard and secure cyberspace; and strengthen national preparedness and resilience. This report compiles a series of Insights by CRS experts across an array of homeland security issues that may come before the 116th Congress. Several homeland security topics are also covered in CRS Report R45500, Transportation Security: Issues for the 116th Congress. The information contained in the Insights only scratches the surface of these selected issues. Congressional clients may obtain more detailed information on these topic and others by contacting the relevant CRS expert listed in CRS Report R45684, Selected Homeland Security Issues in the 116th Congress: CRS Experts.
    [Show full text]
  • Selected Homeland Security Issues in the 116Th Congress
    Selected Homeland Security Issues in the 116th Congress Updated November 26, 2019 Congressional Research Service https://crsreports.congress.gov R45701 SUMMARY R45701 Selected Homeland Security Issues in the 116th November 26, 2019 Congress William L. Painter, In 2001, in the wake of the terrorist attacks of September 11, “homeland security” went from Coordinator being a concept discussed among a relatively small cadre of policymakers and strategic thinkers Specialist in Homeland to one broadly discussed among policymakers, including a broad swath of those in Congress. Security and Debates over how to implement coordinated homeland security policy led to the passage of the Appropriations Homeland Security Act of 2002 (P.L. 107-296), the establishment of the Department of Homeland Security (DHS), and extensive legislative activity in the ensuing years. Initially, homeland security was largely seen as counterterrorism activities. Today, homeland security is a broad and complex network of interrelated issues, in policymaking terms. For example, in its executive summary, the Quadrennial Homeland Security Review issued in 2014 delineated the missions of the homeland security enterprise as follows: prevent terrorism and enhance security; secure and manage the borders; enforce and administer immigration laws; safeguard and secure cyberspace; and strengthen national preparedness and resilience. This report compiles a series of Insights by CRS experts across an array of homeland security issues that may come before the 116th Congress. Several homeland security topics are also covered in CRS Report R45500, Transportation Security: Issues for the 116th Congress. The information contained in the Insights only scratches the surface of these selected issues. Congressional clients may obtain more detailed information on these topic and others by contacting the relevant CRS expert listed in CRS Report R45684, Selected Homeland Security Issues in the 116th Congress: CRS Experts.
    [Show full text]