Maritime Commerce Security Plan

Total Page:16

File Type:pdf, Size:1020Kb

Maritime Commerce Security Plan MARITIME COMMERCE SECURITY PLAN FOR THE NATIONAL STRATEGY FOR MARITIME SECURITY OCTOBER 2005 FOREWORD By signing National Security Presidential Directive 41/Homeland Security Presidential Directive 13 (NSPD-41/HSPD-13) President Bush underscored the importance of securing the Maritime Domain, which is defined as "All areas and things of, on, under, relating to, adjacent to, or bordering on a sea, ocean, or other navigable waterway, including all maritime-related activities, infrastructure, people, cargo, and vessels and other conveyances.” NSPD-41/HSPD- 13 established a Maritime Security Policy Coordinating Committee (MSPCC)—the first coordinating committee specifically tasked to address this issue—to oversee the development of a National Strategy for Maritime Security (NSMS) and eight supporting implementation plans: • The National Plan to Achieve Maritime Domain Awareness lays the foundation for an effective understanding of anything associated with the Maritime Domain and identifying threats as early and as distant from our shores as possible. • The Global Maritime Intelligence Integration Plan uses existing capabilities to integrate all available intelligence regarding potential threats to U.S. interests in the Maritime Domain. • The Maritime Operational Threat Response Plan facilitates coordinated U.S. government response to threats against the United States and its interests in the Maritime Domain by establishing roles and responsibilities, which enable the government to respond quickly and decisively. • The International Outreach and Coordination Strategy provides a framework to coordinate all maritime security initiatives undertaken with foreign governments and international organizations, and solicits international support for enhanced maritime security. • Maritime Infrastructure Recovery Plan recommends procedures and standards for the recovery of the maritime infrastructure following attack or similar disruption. • Maritime Transportation System Security Plan responds to the President’s call for recommendations to improve the national and international regulatory framework regarding the maritime domain. • Maritime Commerce Security Plan establishes a comprehensive plan to secure the maritime supply chain. • The Domestic Outreach Plan engages non-Federal input to assist with the development and implementation of maritime security policies resulting from NSPD-41/HSPD-13. Although these plans address different aspects of maritime security, they are mutually linked and reinforce each other. Together, NSMS and its supporting plans represent the beginning of a comprehensive national effort to promote global economic stability and protect legitimate activities, while preventing hostile or illegal acts within the Maritime Domain. National Strategy for Maritime Security: Maritime Commerce Security Plan i TABLE OF CONTENTS FOREWORD .................................................................................................................................................I TABLE OF CONTENTS ............................................................................................................................ II I. INTRODUCTION ............................................................................................................................. 1 II. OVERVIEW OF MARITIME COMMERCE SECURITY........................................................... 2 BACKGROUND ...................................................................................................................................... 2 THE CHALLENGE .................................................................................................................................. 2 III. THE MARITIME COMMERCE SECURITY PLAN ................................................................... 5 THE GOAL ............................................................................................................................................ 5 THE END STATE.................................................................................................................................... 5 SCOPE................................................................................................................................................... 5 ROLES AND RESPONSIBILITIES ............................................................................................................. 6 STRATEGIC REQUIREMENTS ................................................................................................................. 7 THE FRAMEWORK................................................................................................................................. 7 THE RISK MANAGEMENT APPROACH ................................................................................................... 8 CURRENT INITIATIVES .......................................................................................................................... 9 Advance Electronic Cargo Information........................................................................................ 9 The Automated Targeting System ................................................................................................. 9 Non-Intrusive Inspection Equipment .......................................................................................... 10 Container Security Initiative....................................................................................................... 10 Megaports Initiative.................................................................................................................... 10 Customs-Trade Partnership against Terrorism.......................................................................... 11 Operation Safe Commerce.......................................................................................................... 11 INTERNATIONAL COOPERATION.......................................................................................................... 11 IV. THE WAY FORWARD .................................................................................................................. 13 RECOMMENDATIONS .......................................................................................................................... 14 Accurate Data............................................................................................................................. 14 Secure Cargo .............................................................................................................................. 15 Secure Vessels/Ports................................................................................................................... 16 Secure Transit............................................................................................................................. 17 International Standards and Regulations ................................................................................... 19 PERFORMANCE MEASURES ................................................................................................................. 19 V. CONCLUSION ................................................................................................................................ 21 National Strategy for Maritime Security: Maritime Commerce Security Plan ii I. INTRODUCTION “A strong world economy enhances our national security by advancing prosperity and freedom in the rest of the world. Economic growth supported by free trade and free markets creates new jobs and higher incomes. It allows people to lift their lives out of poverty, spurs economic and legal reform, and the fight against corruption, and it reinforces the habits of liberty.” National Security Strategy of the United States of America September, 2002 The Maritime Commerce Security Plan contains recommendations to promote international supply chain security. The Maritime Commerce Security Plan is a component of the National Strategy for Maritime Security. The National Strategy for Maritime Security was produced in response to National Security Presidential Directive NSPD-41/ Homeland Security Presidential Directive HSPD-13 (“Maritime Security Policy” December 21, 2004). This plan also supports the National Security Strategy, the National Strategy for Homeland Security, and the National Strategy for Combating Terrorism. The Maritime Commerce Security Plan was developed in conjunction with the other component plans of the National Strategy for Maritime Security. In particular, the development of the Maritime Transportation System Security Plan and the Maritime Infrastructure Recovery Plan was closely coordinated with this plan. The Maritime Transportation System Security Plan addresses the security of the maritime transportation system as a system including vessels, facilities and ports that contribute so greatly to cargo security and, in this way, complements this plan. The Maritime Infrastructure Recovery Plan also supports this plan because it enhances our ability to minimize the economic impact of an attack or other disruption of the maritime transportation system. This includes effective communication so that private sector organizations have the appropriate information to implement their contingency plans quickly. This is a risk management plan. As such, it is dependent on reliable information and intelligence to evaluate threats and assess risk. For this reason, the National Plan to Achieve Maritime Domain Awareness and the Global Maritime Intelligence Integration Plan are very
Recommended publications
  • Maritime Terrorism
    1 Maritime terrorism naval bases, offshore oil and gas facilities, other By Emilio Bonagiunta, Maritime Security Consultant critical infrastructure, or the maritime trade itself.ii Operations of this kind are reportedly part of Al-Qaeda's maritime strategy.iii Past here are two main forms in which attacks against oil facilities and tankers in Saudi terrorist groups benefit from the Arabia and Yemen demonstrate that terrorist T vastness and lawlessness of the sea: by networks in the region have ambitions to conducting attacks against sea-based targets and severely disrupt energy supplies from the by using the sea to transport weapons, militants Arabian Peninsula. A successful series of large- and other support means from one place to the scale attacks against the oil industry would have i other. In both cases, the low level of control and tremendous impacts on international energy law enforcement provides a beneficial markets and the global economy. It is from this environment for preparation and conduction perspective that Al-Qaeda poses a serious threat terrorist operations in the maritime domain, against maritime trade.iv unthinkable of on the ground. Yet, the fact that these fears have not Along with this, offshore assets and critical materialized can be attributed to a variety of infrastructure on the coast are seen as high-value factors: greater vigilance and measures adopted targets for terrorist groups. Operations against by sea-users and maritime security providers, the USS Cole (2000) and the tanker Limburg lack of confidence by terrorist groups in the (2002), attributed to Al-Qaeda, are good success of major attacks against sea-based examples of maritime terrorism in the Arabian targets due to insufficient expertise and Peninsula, where small crafts laden with experienced militants for conducting such explosives have proven successful in causing operations.
    [Show full text]
  • Floating Armories: a Legal Grey Area in Arms Trade and the Law of the Sea
    FLOATING ARMORIES: A LEGAL GREY AREA IN ARMS TRADE AND THE LAW OF THE SEA BY ALEXIS WILPON* ABSTRACT In response to maritime piracy concerns, shippers often hire armed guards to protect their ships. However, due to national and international laws regarding arms trade, ships are often unable to dock in foreign ports with weapons and ammunition. As a response, floating armories operate as weapons and ammuni­ tion storage facilities in international waters. By operating solely in interna­ tional waters, floating armories avoid national and international laws regard­ ing arms trade. However, there is a significant lack of regulations governing floating armories, and this leads to serious safety concerns including lack of standardized weapon storage, lack of records documenting the transfer of weapons and ammunitions, and lack of regulation from flags of convenience. Further, there is no publically available registry of floating armories and so the number of floating armories operating alongside the quantity of arms and ammunition on board is unknown. This Note suggests several solutions that will increase the transparency and safety of floating armories. Such solutions include requirements that floating armory operators register their vessels only to states in which a legitimate relationship exists, minimum standards that operators must follow, and the creation of a publically available registry. Finally, it concludes by providing alternative mechanisms by which states may exercise jurisdiction over foreign vessels operating in the High Seas. I. INTRODUCTION .................................... 874 II. THE PROBLEM OF MARITIME PIRACY ..................... 877 III. HOW FLOATING ARMORIES OPERATE..................... 878 IV. FLOATING ARMORIES AND THE LEGAL GRAY AREA............ 880 A. The Lack of Laws and Regulations .................
    [Show full text]
  • Maritime Security in the Asia-Pacific
    Asia Programme Meeting Summary Maritime Security in the Asia-Pacific 12 February 2015 The views expressed in this document are the sole responsibility of the speaker(s) and participants do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author(s)/ speaker(s) and Chatham House should be credited, preferably with the date of the publication or details of the event. Where this document refers to or reports statements made by speakers at an event every effort has been made to provide a fair representation of their views and opinions. The published text of speeches and presentations may differ from delivery. 10 St James’s Square, London SW1Y 4LE T +44 (0)20 7957 5700 F +44 (0)20 7957 5710 www.chathamhouse.org Patron: Her Majesty The Queen Chairman: Stuart Popham QC Director: Dr Robin Niblett Charity Registration Number: 208223 2 Maritime Security in the Asia-Pacific This is a summary of an event held at Chatham House on 12 February 2015, made up of a keynote speech by Ambassador Yoshiji Nogami and three sessions. At the first session, James Przystup, Ryo Sahashi and Sam Bateman discussed the main security challenges – traditional and non-traditional – in the Asia- Pacific. At the second session, Masayuki Masuda, Thang Nguyen Dang and Douglas Guilfoyle spoke about the rule of law in the region and how it can be upheld; and at the third session, Ren Xiao, Ambassador Rakesh Sood, Sir Anthony Dymock and Alessio Patalano extended the dialogue to beyond the Asia-Pacific.
    [Show full text]
  • 1 James Kraska
    C URRICULUM V ITAE James Kraska Stockton Center for the Study of International Law United States Naval War College 686 Cushing Rd. Newport, RI 02841 (401) 841-1536 [email protected] Education S.J.D. University of Virginia School of Law LL.M. University of Virginia School of Law J.D. Indiana University Maurer School of Law M.A.I.S. School of Politics and Economic, Claremont Graduate School B.A. Mississippi State University, summa cum laude Professional Experience Present Chairman and Howard S. Levie Professor (Full professor with tenure) Stockton Center for the Study of International Law, U.S. Naval War College Fall 2017 Visiting Professor of Law and John Harvey Gregory Lecturer on World Organization, Harvard Law School 2013-14 Mary Derrickson McCurdy Visiting Scholar, Nicholas School of the Environment, Duke University 2008-13 Professor of Law, Stockton Center for the Study of International Law, U.S. Naval War College Fall 2012 Visiting Professor of Law, University of Maine School of Law 2007-08 Director, International Negotiations Division, Global Security Affairs, Joint Staff, Pentagon 2005-07 Oceans Law and Policy Adviser, Joint Staff, Pentagon 2002-05 Deputy Legal Adviser, Deputy Chief of Naval Operations for Plans, Policy and Operations, Pentagon 2001-02 International Law Adviser, Office of the Navy Judge Advocate General, Pentagon 1999-01 Legal Adviser, Expeditionary Strike Group Seven/Task Force 76, Japan 1996-99 Legal Adviser, Dep’t of Defense Joint Interagency Task Force West 1993-96 Criminal Trial Litigator, U.S. Naval Legal Service Office, Japan 1992-93 Post-Doctoral Fellow, Marine Policy Center, Woods Hole Oceanographic Institution * 1993-2013, Judge Advocate General’s Corps, U.S.
    [Show full text]
  • VAOIG-15-04673-333.Pdf
    Veterans Health Administration Review of the Implementation of the Veterans Choice Program OFFICE OF AUDITS AND EVALUATIONS VA Office of Inspector General January 30, 2017 15-04673-333 ACRONYMS CBO Chief Business Office FY Fiscal Year NVC Non-VA Care OIG Office of Inspector General PC3 Patient-Centered Community Care TPA Third-Party Administrator VA Department of Veterans Affairs VACAA Veterans Access, Choice, and Accountability Act of 2014 VCL Veterans Choice List VHA Veterans Health Administration VISN Veterans Integrated Service Network To report suspected wrongdoing in VA programs and operations, contact the VA OIG Hotline: Website: www.va.gov/oig/hotline Email: [email protected] Telephone: 1-800-488-8244 Executive Summary Why We Did This Review The Department of Veterans Affairs (VA) Office of Inspector General (OIG) conducted this review at the request of U.S. Senator Johnny Isakson, Chairman of the Senate Committee on Veterans’ Affairs, who expressed concerns about the implementation of the Veterans Choice Program (Choice) and, more specifically, about the barriers facing veterans trying to access it. Thus, our review focused on determining whether veterans were experiencing barriers accessing Choice during its first year of implementation, taking into account that this program, as noted by the Under Secretary for Health in his comments attached to this report, has evolved since that time. We will continue our oversight of Choice in FY 2017 and our assessment of the efficacy of VA’s actions to improve the program’s overall effectiveness; as well, we will seek to identify significant program risks delivering these vital health car e services.
    [Show full text]
  • Teaching Immigration with the Immigrant Stories Project LESSON PLANS
    Teaching Immigration with the Immigrant Stories Project LESSON PLANS 1 Acknowledgments The Immigration History Research Center and The Advocates for Human Rights would like to thank the many people who contributed to these lesson plans. Lead Editor: Madeline Lohman Contributors: Elizabeth Venditto, Erika Lee, and Saengmany Ratsabout Design: Emily Farell and Brittany Lynk Volunteers and Interns: Biftu Bussa, Halimat Alawode, Hannah Mangen, Josefina Abdullah, Kristi Herman Hill, and Meredith Rambo. Archival Assistance and Photo Permissions: Daniel Necas A special thank you to the Immigration History Research Center Archives for permitting the reproduction of several archival photos. The lessons would not have been possible without the generous support of a Joan Aldous Diversity Grant from the University of Minnesota’s College of Liberal Arts. Immigrant Stories is a project of the Immigration History Research Center at the University of Minnesota. This work has been made possible through generous funding from the Digital Public Library of America Digital Hubs Pilot Project, the John S. and James L. Knight Foundation, and the National Endowment for the Humanities. About the Immigration History Research Center Founded in 1965, the University of Minnesota's Immigration History Research Center (IHRC) aims to transform how we understand immigration in the past and present. Along with its partner, the IHRC Archives, it is North America's oldest and largest interdisciplinary research center and archives devoted to preserving and understanding immigrant and refugee life. The IHRC promotes interdisciplinary research on migration, race, and ethnicity in the United States and the world. It connects U.S. immigration history research to contemporary immigrant and refugee communities through its Immigrant Stories project.
    [Show full text]
  • Maritime Security: Potential Terrorist Attacks and Protection Priorities
    Order Code RL33787 Maritime Security: Potential Terrorist Attacks and Protection Priorities Updated May 14, 2007 Paul W. Parfomak and John Frittelli Resources, Science, and Industry Division Maritime Security: Potential Terrorist Attacks and Protection Priorities Summary A key challenge for U.S. policy makers is prioritizing the nation’s maritime security activities among a virtually unlimited number of potential attack scenarios. While individual scenarios have distinct features, they may be characterized along five common dimensions: perpetrators, objectives, locations, targets, and tactics. In many cases, such scenarios have been identified as part of security preparedness exercises, security assessments, security grant administration, and policy debate. There are far more potential attack scenarios than likely ones, and far more than could be meaningfully addressed with limited counter-terrorism resources. There are a number of logical approaches to prioritizing maritime security activities. One approach is to emphasize diversity, devoting available counter- terrorism resources to a broadly representative sample of credible scenarios. Another approach is to focus counter-terrorism resources on only the scenarios of greatest concern based on overall risk, potential consequence, likelihood, or related metrics. U.S. maritime security agencies appear to have followed policies consistent with one or the other of these approaches in federally-supported port security exercises and grant programs. Legislators often appear to focus attention on a small number of potentially catastrophic scenarios. Clear perspectives on the nature and likelihood of specific types of maritime terrorist attacks are essential for prioritizing the nation’s maritime anti-terrorism activities. In practice, however, there has been considerable public debate about the likelihood of scenarios frequently given high priority by federal policy makers, such as nuclear or “dirty” bombs smuggled in shipping containers, liquefied natural gas (LNG) tanker attacks, and attacks on passenger ferries.
    [Show full text]
  • Cyber-Attacks: a Digital Threat Reality Affecting the Maritime Industry
    World Maritime University The Maritime Commons: Digital Repository of the World Maritime University World Maritime University Dissertations Dissertations 11-4-2018 Cyber-attacks: a digital threat reality affecting the maritime industry David Miranda Silgado Follow this and additional works at: https://commons.wmu.se/all_dissertations Part of the Transportation Commons Recommended Citation Miranda Silgado, David, "Cyber-attacks: a digital threat reality affecting the maritime industry" (2018). World Maritime University Dissertations. 663. https://commons.wmu.se/all_dissertations/663 This Dissertation is brought to you courtesy of Maritime Commons. Open Access items may be downloaded for non-commercial, fair use academic purposes. No items may be hosted on another server or web site without express written permission from the World Maritime University. For more information, please contact [email protected]. WORLD MARITIME UNIVERSITY Malmö, Sweden CYBER-ATTACKS; A DIGITAL THREAT REALITY AFFECTING THE MARITIME INDUSTRY By DAVID MIRANDA SILGADO Republic of Panamá A dissertation submitted to the World Maritime University in partial fulfilment of the requirements for the award of the degree of MASTER OF SCIENCE In MARITIME AFFAIRS (MARITIME SAFETY AND ENVIRONMENTAL ADMINISTRATION) 2018 © Copyright David Miranda Silgado, 2018 DECLARATION I certify that all the material in this dissertation that is not my own work has been identified, and that no material is included for which a degree has previously been conferred on me. The contents of this dissertation
    [Show full text]
  • Maritime Security: Perspectives for a Comprehensive Approach
    ISPSW Strategy Series: Focus on Defense and International Security Issue Maritime Security – Perspectives for a Comprehensive Approach No. 222 Lutz Feldt, Dr. Peter Roell, Ralph D. Thiele Apr 2013 Maritime Security – Perspectives for a Comprehensive Approach Lutz Feldt, Dr. Peter Roell, Ralph D. Thiele April 2013 Abstract Challenges to “Maritime Security” have many faces – piracy and armed robbery, maritime terrorism, illicit traf- ficking by sea, i.e. narcotics trafficking, small arms and light weapons trafficking, human trafficking, global cli- mate change, cargo theft etc. These challenges keep evolving and may be hybrid in nature: an interconnected and unpredictable mix of traditional and irregular warfare, terrorism, and/or organized crime. In our study we focus on piracy, armed robbery and maritime terrorism. Starting with principle observations regarding Maritime Security and the threat situation, we have a look at operational requirements and maritime collaboration featuring Maritime Domain Awareness. Finally, we give recommendations for political, military and business decision makers. ISPSW The Institute for Strategic, Political, Security and Economic Consultancy (ISPSW) is a private institute for research and consultancy. The ISPSW is objective and task oriented and is above party politics. In an ever more complex international environment of globalized economic processes and worldwide political, ecological, social and cultural change, bringing major opportunities but also risks, decision-makers in enter- prises and politics depend more than ever before on the advice of highly qualified experts. ISPSW offers a range of services, including strategic analyses, security consultancy, executive coaching and intercultural competency. ISPSW publications examine a wide range of topics connected with politics, econo- my, international relations, and security/ defense.
    [Show full text]
  • The Choice of Law Against Terrorism
    The Choice of Law Against Terrorism Mary Ellen O’Connell* On December 25, 2009, a 23-year-old Nigerian, Umar Farouk Abdulmuttalab, took Northwest Airlines Flight 253 from Amsterdam to Detroit, Michigan. Shortly before landing, he allegedly attempted to set off an explosive device. Abdulmuttalab was immediately arrested by police and within a few days was charged by U.S. federal prosecutors with six terrorism-related criminal counts.1 By early January 2010, Senators Joseph Lieberman and Susan Collins, among others, were calling for Abdulmuttalab to be charged as an enemy combatant under the law of armed conflict rather than as a criminal suspect.2 Those critical of the criminal charges generally expressed the view that as a combatant, Abdulmuttalab could be interrogated without the protections provided to a criminal suspect during questioning, especially the right to have a lawyer present.3 Attorney General Eric Holder said that he had considered charging Abdulmuttalab under the law of armed conflict but decided to follow past precedent and policy and charge him under anti-terrorism laws.4 A similar debate was already underway regarding Khalid Sheik Mohammed, the alleged mastermind of the 9/11 attacks. Khalid Sheik Mohammed was originally captured in Pakistan, far from any on-going hostilities. He was subsequently held in secret CIA prisons, where he was waterboarded 183 times, then transferred to the prison at the U.S. Naval base at Guantánamo Bay.5 Attorney General Eric Holder announced that Khalid Sheik Mohammed would be tried in a civilian court on criminal charges of terrorism, but politicians of both major U.S.
    [Show full text]
  • Testimony of SOPHIA COPE Staff Attorney/Ron Plesser Fellow, Center for Democracy & Technology
    Testimony of SOPHIA COPE Staff Attorney/Ron Plesser Fellow, Center for Democracy & Technology Before the Senate Committee on Homeland Security and Governmental Affairs, Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia On “The Impact of Implementation: A Review of the REAL ID Act and the Western Hemisphere Travel Initiative” Tuesday, April 29, 2008 Chairman Akaka, Ranking Member Voinovich, and Members of the Subcommittee: On behalf of the Center for Democracy & Technology,1 I am honored to have been asked to testify before the Subcommittee on the personal privacy and security risks of “vicinity” radio- frequency identification (RFID) technology in travel documents issued in compliance with the Western Hemisphere Travel Initiative (WHTI), specifically the State Department’s passport card and the state-issued “enhanced driver’s license” (EDL). Because this hearing also focuses on REAL ID, I attach as an Appendix CDT’s REAL ID memo from February 1, 2008, analyzing the personal privacy and security risks of the REAL ID Act and the Department of Homeland Security’s (DHS) final regulations, and proposing legislative options for Congress.2 However, my written testimony below focuses on WHTI, as will my oral testimony. INTRODUCTION From warrantless electronic spying, to expanded DHS funding of closed circuit television (CCTV) video camera surveillance systems without privacy standards, to numerous data breaches at federal agencies, the federal government does not have a good track record of protecting personal privacy. The use of insecure vicinity RFID technology in border crossing identification documents is no exception: With no proven benefit to the nation’s security, the Executive Branch has chosen a technology that jeopardizes privacy.
    [Show full text]
  • The Veterans Choice Program (VCP): Program Implementation
    The Veterans Choice Program (VCP): Program Implementation Sidath Viranga Panangala Specialist in Veterans Policy Updated September 19, 2018 Congressional Research Service 7-5700 www.crs.gov R44562 The Veterans Choice Program (VCP): Program Implementation Summary Authorized under Section 101 of the Veterans Access, Choice, and Accountability Act of 2014 (VACAA), the Veterans Choice Program (VCP) is a temporary program that enables eligible veterans to receive medical care in the community. Since the program was first established by VACAA, it has been amended and funded several times. More recently, P.L. 115-26 eliminated the August 7, 2017, expiration date for the VCP and allowed the program to continue until the initial $10 billion deposited in the Veterans Choice Fund (VCF) was expended. P.L. 115-46 authorized and appropriated an additional $2.1 billion to continue the VCP until funds were expended, and when these funds were also nearing their end, Division D of P.L. 115-96 appropriated an additional $2.1 billion to continue the VCP until funds were expended. Lastly, Section 510 of the VA MISSION Act (P.L. 115-182), signed into law on June 6, 2018, authorized and appropriated $5.2 billion for VCP without fiscal year limitation, and Section 143 of this same act imposed a sunset date that is one year after the date of enactment (June 6, 2018) of the VA MISSION Act (i.e., June 6, 2019). Title 101 of the VA MISSION Act also authorized a permanent program known as the Veterans Community Care Program (VCCP), which is to replace VCP when VCCP is established by the Department of Veterans Affairs (VA) around June 2019 (when regulations are published by the VA no later than one year after the date of enactment [June 6, 2018] of the VA MISSION Act; that is, June 6, 2019, or when the VA determines that 75% of the amounts deposited in the VCF have been exhausted).
    [Show full text]