National Cyber Defense Center

Total Page:16

File Type:pdf, Size:1020Kb

National Cyber Defense Center NATIONAL CYBER DEFENSE CENTER A Key Next Step toward a Whole-of-Nation Approach to Cybersecurity National Security Perspective James N. Miller | Robert J. Butler NATIONAL CYBER DEFENSE CENTER A Key Next Step toward a Whole-of-Nation Approach to Cybersecurity James N. Miller Robert J. Butler Copyright © 2021 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved. This National Security Perspective contains the best opinion of the author(s) at time of issue. It does not necessarily represent the opinion of JHU/APL sponsors. The views expressed are solely those of the authors and not of any US governmental agencies or departments. NSAD-R-21-003 NATIONAL CYBER DEFENSE CENTEr iii Contents Figures .........................................................................................................................................................................................v Tables ...........................................................................................................................................................................................v Summary ..................................................................................................................................................................................vii Cyber Threats to US National Security ........................................................................................................... 1 Cyber Threats below the Level of Armed Conflict ................................................................................................2 Cyber Attacks in Crisis or Conflict ...............................................................................................................................4 Linkages between Cyber Threats above and below the Threshold of Armed Conflict ..........................5 US Cyber Defense Strategy .............................................................................................................................. 7 What an NCDC Would Do ...............................................................................................................................11 Cyber Deterrence .......................................................................................................................................................... 12 Active Cyber Defense................................................................................................................................................... 14 Offensive Cyber Actions in Support of Cyber Defense .................................................................................... 15 Cyber Incident Response ............................................................................................................................................ 16 Preparing for and Conducting Coordinated Cyber Defense in Crisis or Conflict ................................... 18 Prioritizing Engagement with Key Partners ........................................................................................................ 19 Identifying Escalation Risks That Could Arise in Day-to-Day Execution of Campaign Plans ............. 19 Prioritizing Key Private Sector and International Partner Engagements .................................................. 19 NCDC Supporting Function: Provide a Continuous Net Assessment Process ........................................ 24 Accelerating Technology Insertion ......................................................................................................................... 26 What an NCDC Would Not Do .......................................................................................................................26 NCDC Organizational Relationships, Structure, and Staffing .................................................................27 NCDC in the ONCD ....................................................................................................................................................... 27 Organizational Structure of an NCDC .................................................................................................................... 27 Leadership and Staffing of an NCDC ...................................................................................................................... 29 Creating a National Cyber Cadre ............................................................................................................................. 31 NCDC Relationships with the NSC and DHS ........................................................................................................ 31 Organizational Placement and Physical Location ............................................................................................. 35 iv THE JOHNS HOPKINS UNIVERSITY APPLIED PHYSICS LABORATORY How an NCDC Would Operate .......................................................................................................................35 Process Flow for Routine NCDC Requests ............................................................................................................ 36 Process Flow for Time-Urgent NCDC Proposals ................................................................................................. 37 Setting Conditions for Success ................................................................................................................................. 39 Conclusion ........................................................................................................................................................39 Appendix A The Evolution of US Cyber Defense Strategy ................................................................................. 41 Appendix B Alternative Models for a Whole-of-Nation Approach to Cyber Defense .............................. 53 Bibliography ........................................................................................................................................................................... 67 Acknowledgments ............................................................................................................................................................... 77 About the Authors ............................................................................................................................................................... 77 Figures Tables NATIONAL CYBER DEFENSE CENTEr v Figures Figure 1. Private Sector Active Cyber Defense in the Gray Zone ....................................................................... 22 Figure 2. Potential Organizational Structure of NCDC ........................................................................................... 29 Figure 3. NCDC Proposal Requiring NSC Review and Presidential Approval ................................................ 37 Figure 4. Time-Urgent NCDC Proposal Requiring Approval Only of FBI Director ........................................ 38 Figure B-1. Organizational Relationships between NCDC and NSC ................................................................. 64 Tables Table 1. ONCD’s Statutory Responsibilities Relevant to NCDC ........................................................................... 27 NATIONAL CYBER DEFENSE CENTEr vii Summary A National Cyber Defense Center (NCDC) would plan and coordinate US government cyber defense operations below the threshold of armed conflict while also conducting contingency planning, and if necessary coordinating national cyber defense operations in the event of armed conflict.T he center would plan and coordinate across four key lines of operation, which are essential both below the level of armed conflict and in crisis or war: cyber deterrence, active cyber defense, offensive cyber operations in support of defense, and cyber incident management. To be most effective, the NCDC should be placed in the Office of the National Cyber Director (ONCD), which was established by Congress in late 2020 as a new element of the Executive Office of the President. Serious and Growing Cyber Threats to US National Security Both state and nonstate adversaries are conducting sustained cyber-enabled campaigns that aim to advance those adversaries’ interests and undermine the interests of the United States. The fabric of American society and the US political system are under attack in cyberspace, as Russia and other countries are conducting cyber-enabled disinformation attacks to sow domestic discord and undermine democracy in the United States. China’s cyber-enabled theft of US intellectual property has been estimated to cost the United States 1–2 percent of its gross domestic product annually. The US government and private sector are also vulnerable to disruptive and destructive cyber attacks, as exemplified by Iran’s distributed denial-of-service (DDoS) attacks on Wall Street from 2012 to 2013 and North Korea’s 2014 cyber attack on Sony Entertainment and its WannaCry ransomware attacks of 2017. Cyber crime costs US firms hundreds of billions of dollars per year; cyber ransomware attacks threaten business operations, and those targeting the health care industry have disrupted hospitals and put patients at risk. The failure to stem cyber intrusions, as exemplified by Russia’s massive SolarWinds hack discovered in late 2020 and the hack of Microsoft Exchange discovered in early 2021 (and attributed by many to China), poses incalculable risks to American security. In addition to the day-to-day challenges from malicious cyber activity below
Recommended publications
  • Secure Communities FY 2011 Budget in Brief
    FY 2011 Budget in Brief ICE FOIA 10-2674.000473 Budget-in-Brief Fiscal Year 2011 Homeland Security www.dhs.gov ICE FOIA 10-2674.000474 ICE FOIA 10-2674.000475 “As a nation, we will do everything in our power to protect our country. As Americans, we will never give in to fear or division. We will be guided by our hopes, our unity, and our deeply held values. That's who we are as Americans … And we will continue to do everything that we can to keep America safe in the new year and beyond.” President Barack Obama December 28, 2009 ICE FOIA 10-2674.000476 ICE FOIA 10-2674.000477 Table of Contents I. Department of Homeland Security (DHS) Vision and Mission.......................................................... 1 II. Fiscal Year 2011 Overview................................................................................................................. 3 DHS Total Budget Authority by Funding: Fiscal Years 2009–2011............................................... 13 FY 2011 Percent of Total Budget Authority by Organization .......................................................... 15 Total Budget Authority by Organization: Fiscal Years 2009–2011................................................. 17 III. Efficiency Review & Progress ……………………………………………………………………. 19 IV. Accomplishments …………………………………………………………………………………..21 V. Summary Information by Organization ............................................................................................ 29 Departmental Management and Operations ....................................................................................
    [Show full text]
  • Acronyms Abbreviations &Terms
    Acronyms Abbreviations &Terms A Capability Assurance Job Aid FEMA P-524 / July 2009 FEMA Acronyms Abbreviations and Terms Produced by the National Preparedness Directorate, National Integration Center, Incident Management Systems Integration Division Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm U.S. Department of Homeland Security Federal Emergency Management Agency The FEMA Acronyms, Abbreviations & Terms (FAAT) List is not designed to be an authoritative source, merely a handy reference and a living document subject to periodic updating. Inclusion recognizes terminology existence, not legitimacy. Entries known to be obsolete (see new “Obsolete or Replaced” section near end of this document) are included because they may still appear in extant publications and correspondence. Your comments and recommendations are welcome. Please electronically forward your input or direct your questions to: [email protected] Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm 2SR Second Stage Review ABEL Agent Based Economic Laboratory 4Wd Four Wheel Drive ABF Automatic Broadcast Feed A 1) Activity of Isotope ABHS Alcohol Based Hand Sanitizer 2) Ampere ABI Automated Broker Interface 3) Atomic Mass ABIH American Board of Industrial Hygiene A&E Architectural and Engineering ABIS see IDENT A&FM Aviation and Fire Management ABM Anti-Ballistic Missile
    [Show full text]
  • FEMA Acronyms Abbreviations and Terms
    ERT N RC RAMP C N US&R R I P CS EAS JFO AcronymsND MS Abbreviations & Terms A Capability Assurance Job Aid FEMA-524 / March 2005 U.S. Department of Homeland Security Federal Emergency Management Agency The FAAT List is not designed to be an authoritative source, merely a handy reference. Inclusion recognizes terminology existence, not legitimacy. Entries known to be obsolete are included because they may still appear in extant publications and correspondence. Your comments and recommendations are welcome. Please electronically forward your input or direct your questions to: [email protected] FEMA Acronyms Abbreviations and Terms Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm A Atomic Mass/Ampere/Activity of Isotope 1) Affirmative Action 2) Allocation Advice AA 3) Applicant Assistance 4) Approval Authority 5) Atomic Absorption 1) Agriculture Adjustment Administration AAA 2) American Automobile Association AAAE American Association of Airport Executives 1) Activity Address Code AAC 2) Applicant Assistance Center AACS Automated Access Control System AAD Assistant Associate Director AADR Age-Adjusted Death Rate AAEI American Association for Exporters and Importers AAER Average Annual Erosion Rate AAFB Andrews Air Force Base Automated Acquisition Management System AAMS (ProTrac / ProDoc) American Association of Motor Vehicle AAMVA Administration AAPA American Association of Port Authorities 1) After-Action Report AAR 2) After action Review
    [Show full text]
  • Homeland Security and R&D in the United States
    A2003:014 Homeland Security and R&D in the United States Magnus Karlsson Homeland Security and R&D in the United States Magnus Karlsson, Science & Technology Attaché Swedish Institute for Growth Policy Studies Embassy of Sweden, Washington DC ITPS, Swedish Institute for Growth Policy Studies Studentplan 3, SE-831 40 Östersund, Sweden Telephone: +46 (0)63 16 66 00 Fax: +46 (0)63 16 66 01 E-mail [email protected] www.itps.se ISSN 1652-0483 Elanders Gotab, Stockholm 2003 For further information, please contact Magnus Karlsson Telephone +1 202 467 2654 E-mail [email protected] HOMELAND SECURITY AND R&D IN THE UNITED STATES Foreword Since the terrorist attacks in September 2001, the concern for homeland security in the United States has defined a market with a significant growth potential. Both public and private investments in science and technology are increasing, and new institutions and policies are emerging in the area of homeland security. These developments will have an impact on researchers, firms and policy-makers also in Sweden, creating opportunities for collaboration, business and information sharing. The purpose of this report is to create an overview of the structure and funding of homeland security R&D in the United States. The report is relevant for the Swedish science and technology, and security communities and can serve as a basis for further collaboration between Sweden and the United States. The report has been sponsored by the Swedish Emergency Management Agency, the Swedish Agency for Innovation Systems and the Swedish Foundation for Strategic Research. Stockholm, December 2003 Sture Öberg 3 HOMELAND SECURITY AND R&D IN THE UNITED STATES Contents Executive Summary..........................................................................................................
    [Show full text]
  • Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra 
    SPECIAL REPORT No. 175 | JANUARY 3, 2017 Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra SR-175 About the Author David Inserra is a Policy Analyst for Homeland Security and Cyber Security in the Douglas and Sarah Allison Center for Foreign and National Security Policy, of the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, at The Heritage Foundation. This paper, in its entirety, can be found at: http://report.heritage.org/sr175 The Heritage Foundation 214 Massachusetts Avenue, NE Washington, DC 20002 (202) 546-4400 | heritage.org Nothing written here is to be construed as necessarily reflecting the views of The Heritage Foundation or as an attempt to aid or hinder the passage of any bill before Congress. SPECIAL REPORT | NO. 175 JANUARY 3, 2017 Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra Abstract: In 2014, the Department of Homeland Security (DHS) had a total budget authority of $60.4 billion—which grew to $66.8 billion in 2016. This budget funds a diverse set of agencies that are responsible for a wide range of issues: counterterrorism, transportation security, immigration and border control, cybersecurity, and disaster response. Yet, DHS management of these issues is highly flawed, both in the finer details of its operations and in its broader priorities. Such failure has provoked a small chorus of critics to question the value of DHS as a whole, and wheth- er the U.S.
    [Show full text]
  • Department of Homeland Security Appropriations for Fiscal Year 2014
    S. HRG. 113–689 DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2014 HEARINGS BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION ON H.R. 2217 AN ACT MAKING APPROPRIATIONS FOR THE DEPARTMENT OF HOME- LAND SECURITY FOR THE FISCAL YEAR ENDING SEPTEMBER 30, 2014, AND FOR OTHER PURPOSES Department of Homeland Security Nondepartmental Witness Printed for the use of the Committee on Appropriations ( Available via the World Wide Web: http://www.gpo.gov/fdsys/browse/ committee.action?chamber=senate&committee=appropriations U.S. GOVERNMENT PUBLISHING OFFICE 78–057 PDF WASHINGTON : 2015 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON APPROPRIATIONS BARBARA A. MIKULSKI, Maryland, Chairwoman PATRICK J. LEAHY, Vermont RICHARD C. SHELBY, Alabama, Vice TOM HARKIN, Iowa Chairman PATTY MURRAY, Washington THAD COCHRAN, Mississippi DIANNE FEINSTEIN, California MITCH MCCONNELL, Kentucky RICHARD J. DURBIN, Illinois LAMAR ALEXANDER, Tennessee TIM JOHNSON, South Dakota SUSAN M. COLLINS, Maine MARY L. LANDRIEU, Louisiana LISA MURKOWSKI, Alaska JACK REED, Rhode Island LINDSEY GRAHAM, South Carolina FRANK R. LAUTENBERG, New Jersey MARK KIRK, Illinois MARK L. PRYOR, Arkansas DANIEL COATS, Indiana JON TESTER, Montana ROY BLUNT, Missouri TOM UDALL, New Mexico JERRY MORAN, Kansas JEANNE SHAHEEN, New Hampshire JOHN HOEVEN, North Dakota JEFF MERKLEY, Oregon MIKE JOHANNS, Nebraska MARK BEGICH, Alaska JOHN BOOZMAN, Arkansas CHARLES E. KIEFFER, Staff Director WILLIAM D. DUHNKE III, Minority Staff Director SUBCOMMITTEE ON THE DEPARTMENT OF HOMELAND SECURITY MARY L.
    [Show full text]
  • Case 3:19-Cv-00290-EMC Document 134-3 Filed 06/10/21 Page 1 of 106
    Case 3:19-cv-00290-EMC Document 134-3 Filed 06/10/21 Page 1 of 106 Exhibit C Case 3:19-cv-00290-EMC Document 134-3 Filed 06/10/21 Page 2 of 106 FOR OFFICIAL USE ONLY U.S. D1:parhmint orI lomrlaml Scrnril)' Wa~hingwn. DC 20528 Homeland Security APRO 1 2016 INFORMATION MEMORANDUM FOR THE SECRETARY THROUGH: Alejandro Mayorkas Deputy Secretary FROM: Francis X. Taylor ~~~ /4-,~~ Under Secretary for Intelligence and Analysis 0 ,.[; c I) r l },,__~•~L.-- Le6n Rodrfguez CA_o-«-~ ,-:) t:;____.d_),,<u.__, rt:L l 1 Director, U.S. Citizenship and Immigration Services SUBJECT: U.S. Citizenship and Immigration Services!Rcfugee!Social Media Vetting Expansion Purpose: To update you on U.S. Citizenship and Immigration Services' (USCJS) efforts to expand social media vetting filrelugeesl Summary: On February 11, 2016, you directed the further expansion of social media use al DHS consistent with the law and appropriately protecting civil rights, civil liberties, and privacy. To that end, on December 15, 2015, you and the Deputy Secretary asked the Under Secretary for Intelligence and Analysis, Frank Taylor, to lead a Social Media Task Force to review the Department's current use of social media and identify options to optimize its use across the Department. The Task Force determined that the first priority, and an immediate operational imperative, was to expand USCIS' ability to use social media to screen and vet applicants for immigration benefits by building upon existing capabilities that USCJS has piloted and deployed since 2014. In December 2015, USCIS and the Science and Technology Directorate (S&T) initiated additional pilots to screen !K-1 Adjustment bpplicants and certain Iraqi and Syrian refugees.
    [Show full text]
  • Department of Homeland Security, Science and Technology Directorate, FY19 Congressional Budget Justification
    Department of Homeland Security Science and Technology Directorate Department of Homeland Security Science and Technology Directorate Budget Overview Fiscal Year 2019 Congressional Justification S&T - 1 Department of Homeland Security Science and Technology Directorate Table of Contents Science and Technology Directorate ..................................................................................................................................................................................1 Appropriation Organization Structure............................................................................................................................................................................3 Strategic Context ................................................................................................................................................................................................................4 Budget Comparison and Adjustments .............................................................................................................................................................................8 Personnel Compensation and Benefits ...........................................................................................................................................................................11 Non Pay Budget Exhibits.................................................................................................................................................................................................12
    [Show full text]
  • National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat
    UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat National Protection and Programs Directorate Office of Infrastructure Protection Integrated Analysis Task Force Homeland Infrastructure Threat and Risk Analysis Center December 2013 UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY This page intentionally left blank. i UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY Executive Summary The Department of Homeland Security’s (DHS) Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) produced this National Risk Estimate (NRE) to provide an authoritative, coordinated, risk-informed assessment of the key security issues faced by the Nation’s infrastructure protection community from malicious insiders. DHS used subject matter expert elicitations and tabletop exercises to project the effect of historic trends on risks over the next 3 to 5 years. In addition, DHS used alternative futures analysis to examine possible futures involving insider threats to critical infrastructure over the next 20 years. The results are intended to provide owners and operators a better understanding of the scope of the threat and can inform mitigation plans, policies, and programs, particularly those focused on high-impact attacks. The malicious insider threat is complex and dynamic, and it affects the public and private domains of all 16 critical infrastructure sectors. Owners and operators responsible for protecting our nationally-critical assets must recognize the nuances and breadth of this threat in order to develop appropriate risk-based mitigation strategies. Current Risk Assessment Understanding and mitigating insider threat are complicated by factors such as technological advances, globalization, and outsourcing.
    [Show full text]
  • Grants Process, As Are an Staff Untold Number of Private-Sector Businesses, Companies, and Conglom- Martin Masiuk Erates
    Business Office Editor’s Notes 517 Benfield Road, Suite 303 By James D. Hessman, Editor in Chief Severna Park, MD 21146 USA www.DomesticPreparedness.com Many federal, state, and local agencies, organizations, and foundations (410) 518-6900 are deeply involved, in various ways, in the grants process, as are an Staff untold number of private-sector businesses, companies, and conglom- Martin Masiuk erates. As the 18 authors who contributed to this special “Grants Issue” Publisher of the DomPrep Journal point out, grants of one type or another, and of [email protected] varying amounts, have already been awarded to thousands of success- James D. Hessman ful grant applicants. Editor in Chief [email protected] Regardless of whether grant funding is increasing or decreasing, there are four key John Morton concepts to keep in mind. Strategic Advisor [email protected] (1) Plan – Before applying for grants or developing a grant program, the priorities of Susan Collins a federal, state, or local entity must be to review internal goals and necessities. Decide Creative Director what is needed now or in the future and develop a plan on how to achieve those goals. [email protected] Catherine Feinman (2) Manage – Grant funds received must be spent wisely. Managing those funds as well Customer Service Representative as non-grant funds will help sustain current operating procedures and keep the public [email protected] safe under many adverse conditions. Carole Parker Database Manager (3) Think – Nobody knows what the future holds. Every agency and organization must [email protected] think about its own resiliency plans and try to make the best possible decisions, not just for itself, but for all citizens throughout the community who rely on the organization to Advertisers in This Issue: keep them safe.
    [Show full text]
  • Senate Hearings Before the Committee on Appropriations
    S. HRG. 108–705 Senate Hearings Before the Committee on Appropriations Department of Homeland Security Fiscal Year 2005 108th CONGRESS, SECOND SESSION H.R. 4567/S. 2537 DEPARTMENT OF HOMELAND SECURITY NONDEPARTMENTAL WITNESSES Department of Homeland Security, 2005 (H.R. 4567/S. 2537) S. HRG. 108–705 DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2005 HEARINGS BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS SECOND SESSION ON H.R. 4567/S. 2537 AN ACT MAKING APPROPRIATIONS FOR THE DEPARTMENT OF HOME- LAND SECURITY FOR THE FISCAL YEAR ENDING SEPTEMBER 30, 2005, AND FOR OTHER PURPOSES Department of Homeland Security Nondepartmental witnesses Printed for the use of the Committee on Appropriations ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 92–149 PDF WASHINGTON : 2004 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON APPROPRIATIONS TED STEVENS, Alaska, Chairman THAD COCHRAN, Mississippi ROBERT C. BYRD, West Virginia ARLEN SPECTER, Pennsylvania DANIEL K. INOUYE, Hawaii PETE V. DOMENICI, New Mexico ERNEST F. HOLLINGS, South Carolina CHRISTOPHER S. BOND, Missouri PATRICK J. LEAHY, Vermont MITCH MCCONNELL, Kentucky TOM HARKIN, Iowa CONRAD BURNS, Montana BARBARA A. MIKULSKI, Maryland RICHARD C. SHELBY, Alabama HARRY REID, Nevada JUDD GREGG, New Hampshire HERB KOHL, Wisconsin ROBERT F. BENNETT, Utah PATTY MURRAY, Washington BEN NIGHTHORSE CAMPBELL, Colorado BYRON L. DORGAN, North Dakota LARRY CRAIG, Idaho DIANNE FEINSTEIN, California KAY BAILEY HUTCHISON, Texas RICHARD J.
    [Show full text]
  • Union Calendar No. 550
    1 Union Calendar No. 550 113TH CONGRESS " ! REPORT 2d Session HOUSE OF REPRESENTATIVES 113–719 REPORT ON LEGISLATIVE AND OVERSIGHT ACTIVITIES OF THE HOUSE COMMITTEE ON HOMELAND SECURITY ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION (Pursuant to House Rule XI, 1(d)) DECEMBER 30, 2014.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00001 Fmt 6012 Sfmt 6012 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS E:\Seals\Congress.#13 REPORT ON LEGISLATIVE AND OVERSIGHT ACTIVITIES OF THE COMMITTEE ON HOMELAND SECURITY VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS with DSK3SPTVN1PROD on tkelley 1 Union Calendar No. 550 113TH CONGRESS " ! REPORT 2d Session HOUSE OF REPRESENTATIVES 113–719 REPORT ON LEGISLATIVE AND OVERSIGHT ACTIVITIES OF THE HOUSE COMMITTEE ON HOMELAND SECURITY ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION (Pursuant to House Rule XI, 1(d)) DECEMBER 30, 2014.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 91–986 WASHINGTON : 2014 VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00003 Fmt 4012 Sfmt 4012 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS E:\Seals\Congress.#13 VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00004 Fmt 4012 Sfmt 4012 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS LETTER OF SUBMITTAL HOUSE OF REPRESENTATIVES, COMMITTEE ON HOMELAND SECURITY, Washington, DC, December 30, 2014.
    [Show full text]