National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat

Total Page:16

File Type:pdf, Size:1020Kb

National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat National Protection and Programs Directorate Office of Infrastructure Protection Integrated Analysis Task Force Homeland Infrastructure Threat and Risk Analysis Center December 2013 UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY This page intentionally left blank. i UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY Executive Summary The Department of Homeland Security’s (DHS) Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) produced this National Risk Estimate (NRE) to provide an authoritative, coordinated, risk-informed assessment of the key security issues faced by the Nation’s infrastructure protection community from malicious insiders. DHS used subject matter expert elicitations and tabletop exercises to project the effect of historic trends on risks over the next 3 to 5 years. In addition, DHS used alternative futures analysis to examine possible futures involving insider threats to critical infrastructure over the next 20 years. The results are intended to provide owners and operators a better understanding of the scope of the threat and can inform mitigation plans, policies, and programs, particularly those focused on high-impact attacks. The malicious insider threat is complex and dynamic, and it affects the public and private domains of all 16 critical infrastructure sectors. Owners and operators responsible for protecting our nationally-critical assets must recognize the nuances and breadth of this threat in order to develop appropriate risk-based mitigation strategies. Current Risk Assessment Understanding and mitigating insider threat are complicated by factors such as technological advances, globalization, and outsourcing. These factors increasingly blur the line between traditional insiders and external adversaries such as terrorists, organized crime groups, and foreign nation-states, who may collude with or exploit physical insiders as vectors to do harm to a targeted asset or system. The threat of supply chain sabotage by third-party vendors and contractors was a recurring theme that subject matter experts discussed during the NRE workshops and tabletop exercises. All agreed that the third-party insiders constitute an underestimated threat to U.S. critical infrastructure, particularly when their organizations are foreign-owned or are working under the auspices of foreign intelligence services. The common feature of all malicious insiders is tactical advantage. Sometimes the insiders are organizational vulnerabilities—adversarial force multipliers—who can operate relatively unfettered. Malicious insiders are not only aware of an organization’s vulnerabilities; they also may have purposefully created the very vulnerabilities they intend to exploit. Although the importance of understanding and mitigating the insider threat is clear, two major factors complicate current efforts to assess the likelihood of malicious insider attacks: . The challenge of identifying and predicting the stressors or triggers that can cause a trusted employee to become a malicious actor; and . The lack of detailed and reliable empirical data on insider breaches and attacks that can be shared across the full spectrum of critical infrastructure owners and operators. The available data do not characterize in detail the full scope of insider threat to U.S. critical infrastructure and do little to explain why the United States has not experienced a significant increase in insider attacks, particularly those that could result in high-to-catastrophic consequences. They do, however, provide a starting point from which to create a baseline threat profile that can be used to assess insider threats across the 16 critical infrastructure sectors. ii UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY KEY FINDINGS AND RECOMMENDATIONS The Threat: Malicious Insiders . Access and specialized knowledge give insiders tactical advantages over security efforts. Technological advances, globalization, and outsourcing increasingly blur the line between traditional insiders and external adversaries. Insiders who combine advanced technological understanding with traditional espionage/terrorist skills have a significantly increased asymmetric capability to cause physical damage through cyber means. The Vulnerabilities: Expanding Organizational Security Boundaries . Even sectors with relatively robust preventative programs and guidelines in place face a dynamic and expanding threat that cannot be eliminated altogether. Some organizations are likely underestimating the threat from third-party insiders such as vendors and contractors. Industrial control systems in critical infrastructure are attractive insider targets for remote sabotage in an increasingly networked world. Without credible and sector-specific insider risk information, critical infrastructure owners and operators are likely to underestimate the scope of the malicious insider threat and make insufficient or misdirected investments in security. The Consequences: Asymmetric Impacts . If the goal of malicious insider activity is exploitation rather than destruction of assets, it will be more difficult to detect, potentially resulting in serious cumulative consequences. The impacts of a cyberattack that is designed to cause physical damage to critical infrastructure could be much more severe than those of a conventional cyberattack. Recommendations . The Government and private sector should work to develop comprehensive and scalable insider threat program standards that incorporate long-term employee monitoring policies, including background checks and re-investigations, employee training and termination of access at separation. Effective prevention and mitigation programs must be driven by better understanding the insider’s definition of success against a particular sector. Organizations should establish workforce behavioral and access baselines, including an understanding of hiring, oversight, access, and security policies, in order to identify anomalies. Employees used as a monitoring force may be the best way to identify malicious insiders, and they must have access to recurring training to do so effectively. Public and private organizations must consider how to balance the best risk-based security procedures against the myriad of policy, legal, and employees’ rights issues associated with obtaining and analyzing relevant threat data in the workplace, especially data derived from social media and behavioral monitoring. iii UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY Exploring Alternative Futures In addition to the work done with this NRE, DHS also hosted a one-day workshop specifically to elicit subject matter expert judgment on four alternative futures that could present challenges and opportunities related to malicious insider threats to U.S. critical infrastructure over the next 20 years. The alternative futures are not intended to predict the future but to examine plausible combinations of uncertainties and contributing factors that tell a series of compelling stories about the nature and mitigation of the insider threat. Participants selected two major uncertainties, governance and insider capabilities, as the drivers for the alternative futures related to insider risk to the 16 U.S critical infrastructure sectors. Two of the resulting scenarios, designated Advantage Good Guys (Traditional Insider Capabilities—Effective Governance) and Mission Impossible (Technologically-Enhanced Insider Capabilities—Haphazard Governance), present the most compelling challenges for U.S. critical infrastructure stakeholders in the combination of uncertainties and variables highlighted. In the Advantage Good Guys future, the traditional insider must work hard and risk exposure to identify and target what is not guarded in his or her domain to be successful. Effective governance creates a higher probability of detection, greatly reducing the overall risk of an insider attack. In this world, insider collusion may become an imperative to overcome layered defenses with more physical and cyber threat mitigation controls in place. In the Mission Impossible scenario, the insider is more capable with enhanced tradecraft than ever before, making effective risk management more difficult, if not impossible. A non-standardized culture of governance sets the scene for repeatable and systemic attacks by insiders using technologically enhanced techniques to launch targeted and potentially widespread attacks from one or multiple vectors with minimal risk of attribution. Insiders who have worked their way up the company chain may have played a role in building the haphazard governance and infrastructure they seek to exploit. Outsourcing continually broadens the field of potential adversaries in the U.S. critical infrastructure virtual supply chain. The “high-tech” insiders have a significantly enhanced asymmetric capability to create widespread kinetic impact though cyber means. Perhaps more highly destructive is their ability to conduct widespread cyber exploitation attacks, the effects of which cannot be seen before potentially catastrophic consequences result. Key trends that will affect the future insider threat landscape over the next 20 years include the continued viability of traditional, “low-tech” insider techniques to
Recommended publications
  • Secure Communities FY 2011 Budget in Brief
    FY 2011 Budget in Brief ICE FOIA 10-2674.000473 Budget-in-Brief Fiscal Year 2011 Homeland Security www.dhs.gov ICE FOIA 10-2674.000474 ICE FOIA 10-2674.000475 “As a nation, we will do everything in our power to protect our country. As Americans, we will never give in to fear or division. We will be guided by our hopes, our unity, and our deeply held values. That's who we are as Americans … And we will continue to do everything that we can to keep America safe in the new year and beyond.” President Barack Obama December 28, 2009 ICE FOIA 10-2674.000476 ICE FOIA 10-2674.000477 Table of Contents I. Department of Homeland Security (DHS) Vision and Mission.......................................................... 1 II. Fiscal Year 2011 Overview................................................................................................................. 3 DHS Total Budget Authority by Funding: Fiscal Years 2009–2011............................................... 13 FY 2011 Percent of Total Budget Authority by Organization .......................................................... 15 Total Budget Authority by Organization: Fiscal Years 2009–2011................................................. 17 III. Efficiency Review & Progress ……………………………………………………………………. 19 IV. Accomplishments …………………………………………………………………………………..21 V. Summary Information by Organization ............................................................................................ 29 Departmental Management and Operations ....................................................................................
    [Show full text]
  • Acronyms Abbreviations &Terms
    Acronyms Abbreviations &Terms A Capability Assurance Job Aid FEMA P-524 / July 2009 FEMA Acronyms Abbreviations and Terms Produced by the National Preparedness Directorate, National Integration Center, Incident Management Systems Integration Division Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm U.S. Department of Homeland Security Federal Emergency Management Agency The FEMA Acronyms, Abbreviations & Terms (FAAT) List is not designed to be an authoritative source, merely a handy reference and a living document subject to periodic updating. Inclusion recognizes terminology existence, not legitimacy. Entries known to be obsolete (see new “Obsolete or Replaced” section near end of this document) are included because they may still appear in extant publications and correspondence. Your comments and recommendations are welcome. Please electronically forward your input or direct your questions to: [email protected] Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm 2SR Second Stage Review ABEL Agent Based Economic Laboratory 4Wd Four Wheel Drive ABF Automatic Broadcast Feed A 1) Activity of Isotope ABHS Alcohol Based Hand Sanitizer 2) Ampere ABI Automated Broker Interface 3) Atomic Mass ABIH American Board of Industrial Hygiene A&E Architectural and Engineering ABIS see IDENT A&FM Aviation and Fire Management ABM Anti-Ballistic Missile
    [Show full text]
  • FEMA Acronyms Abbreviations and Terms
    ERT N RC RAMP C N US&R R I P CS EAS JFO AcronymsND MS Abbreviations & Terms A Capability Assurance Job Aid FEMA-524 / March 2005 U.S. Department of Homeland Security Federal Emergency Management Agency The FAAT List is not designed to be an authoritative source, merely a handy reference. Inclusion recognizes terminology existence, not legitimacy. Entries known to be obsolete are included because they may still appear in extant publications and correspondence. Your comments and recommendations are welcome. Please electronically forward your input or direct your questions to: [email protected] FEMA Acronyms Abbreviations and Terms Please direct requests for additional copies to: FEMA Publications (800) 480-2520 Or download the document from the Web: www.fema.gov/plan/prepare/faat.shtm A Atomic Mass/Ampere/Activity of Isotope 1) Affirmative Action 2) Allocation Advice AA 3) Applicant Assistance 4) Approval Authority 5) Atomic Absorption 1) Agriculture Adjustment Administration AAA 2) American Automobile Association AAAE American Association of Airport Executives 1) Activity Address Code AAC 2) Applicant Assistance Center AACS Automated Access Control System AAD Assistant Associate Director AADR Age-Adjusted Death Rate AAEI American Association for Exporters and Importers AAER Average Annual Erosion Rate AAFB Andrews Air Force Base Automated Acquisition Management System AAMS (ProTrac / ProDoc) American Association of Motor Vehicle AAMVA Administration AAPA American Association of Port Authorities 1) After-Action Report AAR 2) After action Review
    [Show full text]
  • Homeland Security and R&D in the United States
    A2003:014 Homeland Security and R&D in the United States Magnus Karlsson Homeland Security and R&D in the United States Magnus Karlsson, Science & Technology Attaché Swedish Institute for Growth Policy Studies Embassy of Sweden, Washington DC ITPS, Swedish Institute for Growth Policy Studies Studentplan 3, SE-831 40 Östersund, Sweden Telephone: +46 (0)63 16 66 00 Fax: +46 (0)63 16 66 01 E-mail [email protected] www.itps.se ISSN 1652-0483 Elanders Gotab, Stockholm 2003 For further information, please contact Magnus Karlsson Telephone +1 202 467 2654 E-mail [email protected] HOMELAND SECURITY AND R&D IN THE UNITED STATES Foreword Since the terrorist attacks in September 2001, the concern for homeland security in the United States has defined a market with a significant growth potential. Both public and private investments in science and technology are increasing, and new institutions and policies are emerging in the area of homeland security. These developments will have an impact on researchers, firms and policy-makers also in Sweden, creating opportunities for collaboration, business and information sharing. The purpose of this report is to create an overview of the structure and funding of homeland security R&D in the United States. The report is relevant for the Swedish science and technology, and security communities and can serve as a basis for further collaboration between Sweden and the United States. The report has been sponsored by the Swedish Emergency Management Agency, the Swedish Agency for Innovation Systems and the Swedish Foundation for Strategic Research. Stockholm, December 2003 Sture Öberg 3 HOMELAND SECURITY AND R&D IN THE UNITED STATES Contents Executive Summary..........................................................................................................
    [Show full text]
  • National Cyber Defense Center
    NATIONAL CYBER DEFENSE CENTER A Key Next Step toward a Whole-of-Nation Approach to Cybersecurity National Security Perspective James N. Miller | Robert J. Butler NATIONAL CYBER DEFENSE CENTER A Key Next Step toward a Whole-of-Nation Approach to Cybersecurity James N. Miller Robert J. Butler Copyright © 2021 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved. This National Security Perspective contains the best opinion of the author(s) at time of issue. It does not necessarily represent the opinion of JHU/APL sponsors. The views expressed are solely those of the authors and not of any US governmental agencies or departments. NSAD-R-21-003 NATIONAL CYBER DEFENSE CENTEr iii Contents Figures .........................................................................................................................................................................................v Tables ...........................................................................................................................................................................................v Summary ..................................................................................................................................................................................vii Cyber Threats to US National Security ........................................................................................................... 1 Cyber Threats below the Level of Armed Conflict ................................................................................................2
    [Show full text]
  • Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra 
    SPECIAL REPORT No. 175 | JANUARY 3, 2017 Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra SR-175 About the Author David Inserra is a Policy Analyst for Homeland Security and Cyber Security in the Douglas and Sarah Allison Center for Foreign and National Security Policy, of the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, at The Heritage Foundation. This paper, in its entirety, can be found at: http://report.heritage.org/sr175 The Heritage Foundation 214 Massachusetts Avenue, NE Washington, DC 20002 (202) 546-4400 | heritage.org Nothing written here is to be construed as necessarily reflecting the views of The Heritage Foundation or as an attempt to aid or hinder the passage of any bill before Congress. SPECIAL REPORT | NO. 175 JANUARY 3, 2017 Congress Must Re-Set Department of Homeland Security Priorities: American Lives Depend on It David Inserra Abstract: In 2014, the Department of Homeland Security (DHS) had a total budget authority of $60.4 billion—which grew to $66.8 billion in 2016. This budget funds a diverse set of agencies that are responsible for a wide range of issues: counterterrorism, transportation security, immigration and border control, cybersecurity, and disaster response. Yet, DHS management of these issues is highly flawed, both in the finer details of its operations and in its broader priorities. Such failure has provoked a small chorus of critics to question the value of DHS as a whole, and wheth- er the U.S.
    [Show full text]
  • Department of Homeland Security Appropriations for Fiscal Year 2014
    S. HRG. 113–689 DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2014 HEARINGS BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION ON H.R. 2217 AN ACT MAKING APPROPRIATIONS FOR THE DEPARTMENT OF HOME- LAND SECURITY FOR THE FISCAL YEAR ENDING SEPTEMBER 30, 2014, AND FOR OTHER PURPOSES Department of Homeland Security Nondepartmental Witness Printed for the use of the Committee on Appropriations ( Available via the World Wide Web: http://www.gpo.gov/fdsys/browse/ committee.action?chamber=senate&committee=appropriations U.S. GOVERNMENT PUBLISHING OFFICE 78–057 PDF WASHINGTON : 2015 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON APPROPRIATIONS BARBARA A. MIKULSKI, Maryland, Chairwoman PATRICK J. LEAHY, Vermont RICHARD C. SHELBY, Alabama, Vice TOM HARKIN, Iowa Chairman PATTY MURRAY, Washington THAD COCHRAN, Mississippi DIANNE FEINSTEIN, California MITCH MCCONNELL, Kentucky RICHARD J. DURBIN, Illinois LAMAR ALEXANDER, Tennessee TIM JOHNSON, South Dakota SUSAN M. COLLINS, Maine MARY L. LANDRIEU, Louisiana LISA MURKOWSKI, Alaska JACK REED, Rhode Island LINDSEY GRAHAM, South Carolina FRANK R. LAUTENBERG, New Jersey MARK KIRK, Illinois MARK L. PRYOR, Arkansas DANIEL COATS, Indiana JON TESTER, Montana ROY BLUNT, Missouri TOM UDALL, New Mexico JERRY MORAN, Kansas JEANNE SHAHEEN, New Hampshire JOHN HOEVEN, North Dakota JEFF MERKLEY, Oregon MIKE JOHANNS, Nebraska MARK BEGICH, Alaska JOHN BOOZMAN, Arkansas CHARLES E. KIEFFER, Staff Director WILLIAM D. DUHNKE III, Minority Staff Director SUBCOMMITTEE ON THE DEPARTMENT OF HOMELAND SECURITY MARY L.
    [Show full text]
  • Case 3:19-Cv-00290-EMC Document 134-3 Filed 06/10/21 Page 1 of 106
    Case 3:19-cv-00290-EMC Document 134-3 Filed 06/10/21 Page 1 of 106 Exhibit C Case 3:19-cv-00290-EMC Document 134-3 Filed 06/10/21 Page 2 of 106 FOR OFFICIAL USE ONLY U.S. D1:parhmint orI lomrlaml Scrnril)' Wa~hingwn. DC 20528 Homeland Security APRO 1 2016 INFORMATION MEMORANDUM FOR THE SECRETARY THROUGH: Alejandro Mayorkas Deputy Secretary FROM: Francis X. Taylor ~~~ /4-,~~ Under Secretary for Intelligence and Analysis 0 ,.[; c I) r l },,__~•~L.-- Le6n Rodrfguez CA_o-«-~ ,-:) t:;____.d_),,<u.__, rt:L l 1 Director, U.S. Citizenship and Immigration Services SUBJECT: U.S. Citizenship and Immigration Services!Rcfugee!Social Media Vetting Expansion Purpose: To update you on U.S. Citizenship and Immigration Services' (USCJS) efforts to expand social media vetting filrelugeesl Summary: On February 11, 2016, you directed the further expansion of social media use al DHS consistent with the law and appropriately protecting civil rights, civil liberties, and privacy. To that end, on December 15, 2015, you and the Deputy Secretary asked the Under Secretary for Intelligence and Analysis, Frank Taylor, to lead a Social Media Task Force to review the Department's current use of social media and identify options to optimize its use across the Department. The Task Force determined that the first priority, and an immediate operational imperative, was to expand USCIS' ability to use social media to screen and vet applicants for immigration benefits by building upon existing capabilities that USCJS has piloted and deployed since 2014. In December 2015, USCIS and the Science and Technology Directorate (S&T) initiated additional pilots to screen !K-1 Adjustment bpplicants and certain Iraqi and Syrian refugees.
    [Show full text]
  • Department of Homeland Security, Science and Technology Directorate, FY19 Congressional Budget Justification
    Department of Homeland Security Science and Technology Directorate Department of Homeland Security Science and Technology Directorate Budget Overview Fiscal Year 2019 Congressional Justification S&T - 1 Department of Homeland Security Science and Technology Directorate Table of Contents Science and Technology Directorate ..................................................................................................................................................................................1 Appropriation Organization Structure............................................................................................................................................................................3 Strategic Context ................................................................................................................................................................................................................4 Budget Comparison and Adjustments .............................................................................................................................................................................8 Personnel Compensation and Benefits ...........................................................................................................................................................................11 Non Pay Budget Exhibits.................................................................................................................................................................................................12
    [Show full text]
  • Grants Process, As Are an Staff Untold Number of Private-Sector Businesses, Companies, and Conglom- Martin Masiuk Erates
    Business Office Editor’s Notes 517 Benfield Road, Suite 303 By James D. Hessman, Editor in Chief Severna Park, MD 21146 USA www.DomesticPreparedness.com Many federal, state, and local agencies, organizations, and foundations (410) 518-6900 are deeply involved, in various ways, in the grants process, as are an Staff untold number of private-sector businesses, companies, and conglom- Martin Masiuk erates. As the 18 authors who contributed to this special “Grants Issue” Publisher of the DomPrep Journal point out, grants of one type or another, and of [email protected] varying amounts, have already been awarded to thousands of success- James D. Hessman ful grant applicants. Editor in Chief [email protected] Regardless of whether grant funding is increasing or decreasing, there are four key John Morton concepts to keep in mind. Strategic Advisor [email protected] (1) Plan – Before applying for grants or developing a grant program, the priorities of Susan Collins a federal, state, or local entity must be to review internal goals and necessities. Decide Creative Director what is needed now or in the future and develop a plan on how to achieve those goals. [email protected] Catherine Feinman (2) Manage – Grant funds received must be spent wisely. Managing those funds as well Customer Service Representative as non-grant funds will help sustain current operating procedures and keep the public [email protected] safe under many adverse conditions. Carole Parker Database Manager (3) Think – Nobody knows what the future holds. Every agency and organization must [email protected] think about its own resiliency plans and try to make the best possible decisions, not just for itself, but for all citizens throughout the community who rely on the organization to Advertisers in This Issue: keep them safe.
    [Show full text]
  • Senate Hearings Before the Committee on Appropriations
    S. HRG. 108–705 Senate Hearings Before the Committee on Appropriations Department of Homeland Security Fiscal Year 2005 108th CONGRESS, SECOND SESSION H.R. 4567/S. 2537 DEPARTMENT OF HOMELAND SECURITY NONDEPARTMENTAL WITNESSES Department of Homeland Security, 2005 (H.R. 4567/S. 2537) S. HRG. 108–705 DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2005 HEARINGS BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS SECOND SESSION ON H.R. 4567/S. 2537 AN ACT MAKING APPROPRIATIONS FOR THE DEPARTMENT OF HOME- LAND SECURITY FOR THE FISCAL YEAR ENDING SEPTEMBER 30, 2005, AND FOR OTHER PURPOSES Department of Homeland Security Nondepartmental witnesses Printed for the use of the Committee on Appropriations ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 92–149 PDF WASHINGTON : 2004 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON APPROPRIATIONS TED STEVENS, Alaska, Chairman THAD COCHRAN, Mississippi ROBERT C. BYRD, West Virginia ARLEN SPECTER, Pennsylvania DANIEL K. INOUYE, Hawaii PETE V. DOMENICI, New Mexico ERNEST F. HOLLINGS, South Carolina CHRISTOPHER S. BOND, Missouri PATRICK J. LEAHY, Vermont MITCH MCCONNELL, Kentucky TOM HARKIN, Iowa CONRAD BURNS, Montana BARBARA A. MIKULSKI, Maryland RICHARD C. SHELBY, Alabama HARRY REID, Nevada JUDD GREGG, New Hampshire HERB KOHL, Wisconsin ROBERT F. BENNETT, Utah PATTY MURRAY, Washington BEN NIGHTHORSE CAMPBELL, Colorado BYRON L. DORGAN, North Dakota LARRY CRAIG, Idaho DIANNE FEINSTEIN, California KAY BAILEY HUTCHISON, Texas RICHARD J.
    [Show full text]
  • Union Calendar No. 550
    1 Union Calendar No. 550 113TH CONGRESS " ! REPORT 2d Session HOUSE OF REPRESENTATIVES 113–719 REPORT ON LEGISLATIVE AND OVERSIGHT ACTIVITIES OF THE HOUSE COMMITTEE ON HOMELAND SECURITY ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION (Pursuant to House Rule XI, 1(d)) DECEMBER 30, 2014.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00001 Fmt 6012 Sfmt 6012 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS E:\Seals\Congress.#13 REPORT ON LEGISLATIVE AND OVERSIGHT ACTIVITIES OF THE COMMITTEE ON HOMELAND SECURITY VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS with DSK3SPTVN1PROD on tkelley 1 Union Calendar No. 550 113TH CONGRESS " ! REPORT 2d Session HOUSE OF REPRESENTATIVES 113–719 REPORT ON LEGISLATIVE AND OVERSIGHT ACTIVITIES OF THE HOUSE COMMITTEE ON HOMELAND SECURITY ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION (Pursuant to House Rule XI, 1(d)) DECEMBER 30, 2014.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 91–986 WASHINGTON : 2014 VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00003 Fmt 4012 Sfmt 4012 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS E:\Seals\Congress.#13 VerDate Sep 11 2014 20:05 Jan 05, 2015 Jkt 049006 PO 00000 Frm 00004 Fmt 4012 Sfmt 4012 E:\HR\OC\HR719.XXX HR719 tkelley on DSK3SPTVN1PROD with REPORTS LETTER OF SUBMITTAL HOUSE OF REPRESENTATIVES, COMMITTEE ON HOMELAND SECURITY, Washington, DC, December 30, 2014.
    [Show full text]