o n H o m e l a n d S e c u r i t y

Size: px
Start display at page:

Download "o n H o m e l a n d S e c u r i t y"

Transcription

1 H o u s e C o m m i t t e e o n H o m e l a n d S e c u r i t y I n t e l l i g e n c e G a t h e r i n g R e f o r m D i r e c t o r : M a r i n a S h u t y

2 2008 Institute for Domestic & International Affairs, Inc. (IDIA) This document is solely for use in preparation for Rutgers Model Congress Use for other purposes is not permitted without the express written consent of IDIA. For more information, please write us at

3 Policy Dilemma 1 Chronology Actors and Interests 6 Intelligence Community 6 Local Law Enforcement Authorities 7 American Civil Liberties Union 8 9/11 Commission Panel 9 Congressional Appropriations 10 Possible Causes 12 Insufficient Funding 12 Disorganized Agencies 13 Poor Communication with Local Law Enforcement 14 Explanation and Analysis of Causes 15 Issue Linkages 15 Projections and Implications 16 Conclusion 17 Discussion Questions 19 For Further Reading 20 Works Cited 22 Works Consulted 25

4 R u t g e r s Mo d e l C o n g r e s s 1 Policy Dilemma After the attacks of terror on 11 September 2001, the 9/11 Commission, formally titled the National Commission on Terrorist Attacks Upon the United States, was established. The purpose of this task force was to examine what mistakes took place that allowed the attacks to occur, as well as what could be done to prevent them in the future. The task force examined and made recommendations in reference to the operations of government agencies such as the Federal Bureau of Investigations (FBI), Central Government Agency (CIA). It also examined what information was actually available to the U.S. government prior to the 11 September 2001 attacks, and how the government utilized the information. The commission published a report with its findings on what led to the events, as well as preventative measures for the future. Specifically, the commission recommended significant reforms for the intelligence community. The publishing of this report resulted in backlash from various government officials as well as the media and individuals. Many cited inconsistencies and inaccuracies in the report. In addition, numerous people have stated that some recommendations made by the Commission would not be beneficial in preventing future acts of terror, and that a different body should supervise those tasks. Others maintain that while the suggestions made by the 9/11 Commission are beneficial, however because the federal government has not enacted them, they still render the Commission ineffective. Still, proponents of the 9/11 Commission maintain that the Commission as well as its findings in reference to intel were crucial to the safety and homeland security of the United States. The effectiveness of 9/11 Commission report on intelligence impacts several actors. First, it affects the general population and United States community, as it directly influences their safety and security on a daily basis. It also influences government agencies such as the FBI and the CIA, since the Commission recommended several changes to their organization and structure. The 9/11 Commission recommendation on intelligence reform affects the foreign policy of the United States, and the relationship between the U.S. and the international community as well. The 9/11 Commission report

5 R u t g e r s Mo d e l C o n g r e s s 2 also made recommendation on the relationship between intelligence and states such as Pakistan, Saudi Arabia, Iraq, Iran and others played in the attacks on 11 September As such, it could negatively affect relations with those countries. Determining the effectiveness of the 9/11 Commission recommendations on intelligence reform is important for the security of the United States. If it is determined that the 9/11 Commission findings were accurate and the recommendations are sound, then a question forms as to how to implement these findings. It has been debated that the U.S. government currently does not have enough funding to re-organize government bodies such as the FBI and CIA, as well as some of the other recommendations by the 9/11 Commission. On the other hand, if the report is deemed inaccurate and the recommendations unnecessary, then policy-makers would need to decide what actions should in fact be taken in order to prevent acts of terror within the United States, and to determine what occurred in the steps leading up to the attacks on 11 September While many conspiracy theories and other documents have been published trying to answer many of the mysteries surrounding the 11 September 2001 attacks, the 9/11 Commission Report has thus far been the primary U.S. document in reference to this event. Of the solutions discussed, the first, which is to disregard the 9/11 Commission report, is pushed forth by opponents to the task force and the report. Instead, they recommend utilizing other task forces and evidence in order to determine the proper course of action. Proponents of the 9/11 Commission report suggest that its recommendations be followed and implemented. These recommendations include the appointment of a director for the intelligence community, the creation of information networking systems, the strengthening of Congressional oversight, as well as other more broad recommendations.

6 R u t g e r s Mo d e l C o n g r e s s 3 Chronology The first spy service in the U.S. was the Office of Naval Intelligence, established in Then, in 1908, the government officially christened a force of Special Agents as the Federal Bureau of Investigation (FBI) after President Theodore Roosevelt spoke to a Commission who boasted successful law reform. The purpose of this organization was to conduct criminal investigations. 2 These events were significant, as they set forth foundation for the establishment of an intelligence community in the U.S In June of 1942, President Roosevelt established the Office of Strategic Services (OSS) to gather intelligence for policymaking. 3 Many organizations, such as Army and Navy intelligence and the FBI, argued against the permanent establishment of such an agency. 4 This was an example of the federal government and intelligence agencies not seeing eye-to-eye on organizational structure, an issue that continues to exist In January 1946, Truman established the Central Intelligence Group (CIG), giving it the authority to coordinate intelligence gathered by existing departments and agencies. The National Intelligence Authority supervised CIG, which consisted of the president and the Secretaries of State, War, and Navy. 5 This was significant because it was one of the precedents to the director of national intelligence, a controversial position established as a result of the 9/11 Commission recommendations. 1 Mary H. Cooper, Reforming the CIA. CQ Researcher, 6, 2 February History of the FBI 3 Ibid 4 Ibid 5 United States Intelligence, History. History.html

7 R u t g e r s Mo d e l C o n g r e s s In 1947, Congress passed the National Security Act of 1947, which established the Central Intelligence Agency (CIA). Congress created the CIA to collect, analyze and distribute foreign intelligence to government officials. The director of the CIA also oversaw the agencies in the intelligence community. 6 The 1947 Act also set up the National Security Council (NSC) to oversee all intelligence activities. 7 This Act relates to the issue of who oversees whom within the intelligence community, a modern issue debated by both critics and members of the intelligence community In November of 1952, President Truman signed a memorandum founding the National Security Agency (NSA). The NSA was to be an organization under the Department of Defense. 8 The intent of creating this organization was to protect information systems through electronic surveillance. One of the duties intended for the NSA was to coordinate and direct intelligence activities. This coordination, however, never occurred and the necessity of this coordination continues to plague the current Intel community. The NSA is a communication and technology body, which has grown to be one of the largest intelligence agencies in the U.S In the 1975, Congress established several committees for the purpose of created CIA abuses after various accusations that the intelligence community was abusing its domestic police powers. More specifically, the Church Committee published a report in 1976, which showed inappropriate behavior in the CIA. As a result, Congress established oversight committees, which would monitor the CIA s budget and activities. 10 These developments in the legislature tie in with the issue of Congressional oversight, debating 6 Brian Hansen, Intelligence Reforms. CQ Researcher, 12, 25 January Mary H. Cooper, Reforming the CIA. CQ Researcher, 6, 2 February Introduction to history. 9 Introduction to NCA/CSS Brian Hansen, Intelligence Reforms. CQ Researcher, 12, 25 January 2002.

8 R u t g e r s Mo d e l C o n g r e s s 5 as to whom, if anyone should be monitoring the intelligence community, and to what degree After the Cold War in 1989, the U.S. intelligence shifted its forces from containing communism to combating terrorism. 11 In 1995, President Clinton organized the Brown Commission to present recommendations on the intelligence community. 12 Due to a mid 1990s CIA scandal in Guatemala, Deutch, the new director of the CIA, set forth new rules known as the Deutch Guidelines. These guidelines required that field agents get permission from the CIA headquarters prior to hiring questionable sources. Civil-rights groups have complained that these guidelines prevent the type of intelligence-gathering necessary, and have had a chilling effect on the recruiting efforts of field agents. 13 This was also an example of distrust in the intelligence community, and a step towards reforming guidelines and procedures In 2002, the 9/11 Commission began to look into what possibly led to the 11 September attacks, and what could be done to prevent this from happening in the future. It made several recommendations, including creating a position director of national intelligence, re-structuring of domestic intelligence agencies, review of the intelligencegathering standards and guidelines in reference to civil rights, a reformed budget, as well as several other recommendations In December 2004, President Bush signed the Terrorism Prevention Act into law. This law made several intelligence reforms, including the creation of the director of 11 Brian Hansen, Intelligence Reforms. CQ Researcher, 12, 25January Mary H. Cooper, Reforming the CIA. CQ Researcher, 6, 2 February Brian Hansen, Intelligence Reforms. CQ Researcher, 12, 25 January Mary Jacoby, Intelligence overhaul necessary, panel says. St. Petersburg Times, 12 December 2002.

9 R u t g e r s Mo d e l C o n g r e s s 6 national intelligence position, and a new national counter terrorism center to coordinate intelligence gathering and analyses In 2005, the 9/11 Commission released an updated version of the report, with updates on progress made, grading the security of the U.S. as well as the intel community. This report card included five Fs, twelve Ds, as well as two incompletes. The report cited that there had been little progress in forcing federal agencies to share intelligence In 2007, both the Director of National Intelligence and Deputy Director of National Intelligence announced their plans to move on to other positions. 17 The turnover of these positions has made it more difficult for the intelligence community to coordinate the gathering of information, the purpose of the two positions. Actors and Interests Intelligence Community Several organizations comprise the intelligence community These include the Central Intelligence Agency (CIA), the Federal Bureau of Investigations (FBI), the National Security Agency (NSA), as well as several other organizations, which use intel in order to protect the U.S. and keep it secure. These organizations have all come forth with their own ideas on reform, as well as responses to recommended policies. The intelligence community has stated that they are in favor of some of the reforms suggested, however they worry about relinquishing power, and believe that doing so would impede on the intelligence gathering process. The intelligence community organizations have all appeared to be in favor of the already-implemented director of 15 Bush signs intelligence reform bill. Homeland Security & Defense, 22December Dan Eggen, U.S. is given failing grades by 9/11 panel. Washington Post, 6 December Mark Mazzetti and David E. Sanger, U.S. intelligence Chief asked for a new post. International Herald Tribune, 5 January 2007.

10 R u t g e r s Mo d e l C o n g r e s s 7 national intelligence. Representatives have stated though, that while such a director is necessary, it is crucial that this director not be directly responsible for the conduct of operations, and rather to ensure that appropriate activities and operations are conducted by the constituent elements of the intelligence community. 18 Ideally, the intelligence community would like to see intelligence reform, which provides transparency and examination of credible Intel sources. They also value an operational chain of command, and hope to protect the civil liberties of those in the United States. In addition, the intelligence community wants to enact methods, which provide the highest and most efficient amount of intel to protect the American people. 19 Motivation for the intelligence community derives from the desire to perform their job properly and as independently as possible while maintaining efficiency and urgency. Another source of motivation is the desire to receive funding and appropriations to their various programs in order to improve technologies, and as a result, improve intelligence. The general areas for compromise and negotiation for the intelligence has been in the leadership of the community. Since it has been agreed that a leader is necessary and one has been implemented, the discussion on the leaders role is the only issue with this reform matter that is still up for debate. The intelligence community is not willing to compromise on issues such as organizational autonomy. Local Law Enforcement Authorities Local police authorities in various districts, as well as police organizations and unions, which represent police officers, have come forth as an important actor in the intelligence reform debate. Intelligence reform affects police outfits across the country because they must now fill out an application process in order to access intelligence community files on local threats. Police authorities have complained that this process is too long and intrusive. As part of the recommendations of the 9/11 Commission, the intelligence community has 18 Statement of Robert S. Mueller III, Director, Federal Bureau of Investigation. United States Senate Committee on Governmental Affairs. 4 September Ibid

11 R u t g e r s Mo d e l C o n g r e s s 8 been reformed in order to streamline federal information to local authorities. In the past, local police issued statements, which said that they need access to intelligence community files in order to identify dangers in their community. While authorities have still gained access to intelligence through this application system, police authorities maintain that the process does not finish in a timely matter, and requires an unnecessarily large amount of information from applicants. 20 Optimally, local police authorities see intelligence reform as something that will help them efficiently and quickly receive information about those that pose potential threats in their individual communities. They hope to access this information from intelligence community organizations such as the FBI without long application processes. Local police authorities strive to protect the citizens and residents of their communities. They may compromise in areas, which allow this process to be undergone as quickly as possible, such as providing a large amount of information, if possible in an expedient manner. American Civil Liberties Union The American Civil Liberties Union (ACLU) is a liberal based interest group, which seeks to ensure individual rights and civil liberties. 21 The ACLU maintains various locations throughout the U.S. and is a vocal activist for intelligence reform, specifically in reference to civil rights. The ACLU has stated that they do not agree with the current methods of intelligence gathering and questioning used by organizations such as the FBI, CIA, and U.S. federal government. They believe that all intelligence gathering must take into consideration first and foremost the civil liberties and rights that each American citizen, as well as resident, guest, or others, have while present in the U.S. The policy preference 20 Kevin Johnson, Police Infuriated Over FBI Program. USA TODAY, August About us.

12 R u t g e r s Mo d e l C o n g r e s s 9 of the ACLU is the reformation of the intelligence community, as well as U.S. legislation, to follow certain rules and standards that ensure the protection of all civil liberties. 22 The ACLU, as well as other similar interest groups see an optimal outcome as one in which absolutely no civil rights or liberties of humans are violated in the questioning of suspects or through any other methods of intelligence gathering. Optimally, the ACLU would be in favor of stringent rules and punishment for those who violate them and who do not protect civil rights. 23 The ACLU works to get their interests accounted for in federal policy, as well as in individual cases and incidents. As previously mentioned its basic motivations are the protection of all civil liberties and rights. These include complete protection of all amendments in the U.S. constitution, right to equal protection under the law, right to due process, and the right to privacy. The ACLU is also motivated by the right to protect the minority voice, which they believe is often not represented. 24 Because of the way that the ACLU presents its goals, there is very little room for compromise and negotiations when it comes to intelligence reform. The ACLU has not stated that they will budge on the type of questioning suspects can undergo, and strongly oppose government listening to citizen communication for intelligence fathering. As such, the ACLU is one of the lesser flexible actors in the intelligence reform debate. 9/11 Commission Panel The 9/11 Commission was established in late 2002 by President George W. Bush in order to compile report on what led the to the attacks on 11 September 2001, as well as what measures need to be taken in order to prevent such an attack from ever occurring again. The Commission is a bi-partisan body, which published its initial report in 2004, and followed the report with several updates on progress as it has been made Testimony of ACLU Legislative Counsel Timothy Edgar, "Securing the Freedom of the Nation: Collecting Intelligence Under the Law. "House Permanent Select Committee on Intelligence, 9 April About us Ibid 25 About the Commission.

13 R u t g e r s Mo d e l C o n g r e s s 10 The 9/11 Commission has stated that its policy preference is a significant reform of the intelligence community. This includes a complete reorganization of the intelligence community, with a director of National Intelligence to coordinate the activities of each intelligence organization. It also includes a better system of information sharing between the agencies, as well as between the agencies and local governments. A better information system means one that is transparent and is able to share information most quickly and efficiently. 26 Ideally, the 9/11 Commission would like to create an efficient intelligence community, in which all organizations can work with one another, compare data and information, and bolster the national and international community confidence in the U.S intelligence. In an optimal setting, the 9/11 Commission would prefer if each one of its recommendations were implemented, and done so in a timely matter. The 9/11 Commission is motivated by the desire to understand what cause the attacks of 11 September 2001, and to prevent these attacks from ever occurring again. This is the purpose for which this body was assembled, and as such it is motivated by the need to complete its goals. The 9/11 Commission was purposely not overly specific in its recommendations in its report. As time has gone on, however, the Commission has examined the implementation of its recommendations, and seen that many of them have not been taken into consideration or implemented properly. As such, while the Commission was originally more flexible in what it would compromise, because of the Commissions dissatisfaction with the implementation of its recommendations, it has become more hesitant to negotiate its original recommendations. Congressional Appropriations Many members of Congress have proposed various pieces of legislations on intelligence reform, in addition and in conjunction with the recommendations of the 9/11 Commission. However, funding for many of these reforms comes from the 26 Recommendations, The 9/11 Commission Report.

14 R u t g e r s Mo d e l C o n g r e s s 11 Appropriations Committee on Congress. As the name indicates, the Appropriations Committee in Congress appropriates monies to various programs. 27 As such, the Appropriations Committee is an important actor in the debate over intelligence reform. Members of Congress have been very vocal both orally and through the form of legislation when it comes to appropriating to the intelligence community. Although individual members of Congress each have different views as to how the intelligence community should be reformed, if at all, in terms of appropriations they all have the policy preference that whatever funds are allocated to the intelligence community are used appropriately and efficiently. Members of Congress have thus far been very displeased with the way that the intelligence community has used funds allocated to them, and as such prefer a policy in which money appropriated to in the intelligence community is carefully monitored and assed. 28 Optimally, the Appropriations Committee would like to appropriate the least amount of funds possible in order for the intelligence community to be able to complete all projects necessary, function smoothly and efficiently, and for it not to be necessary that the Appropriations committee constantly monitors and has to re-evaluate the budget of the intelligence community and intelligence organizations. 29 The Appropriations Committee in Congress wants to fund government programs and legislation. Each individual member of Congress wants public approval for their work in order to stay as a member on the Appropriations Committee, as well as to be reelected within their own district or state. As such, when intelligence organizations misuse funds, this prohibits the Appropriations Committee from completing the task they actively want to complete Sandy Streeter, The Congressional Appropriations Process: An Introduction. Committee on Appropriations. 8 September Alan Levin and Kevin Johnson, 9/11 panel chiefs: FBI lags on promised improvements. USA Today, 18 August Resolution to Create an Select Intelligence Oversight Panel of the Committee on Appropriations, as passed by the House.110th CONGRESS, 1st Session, 5 January Sandy Streeter, The Congressional Appropriations Process: An Introduction. Committee on Appropriations. 8 September 2006

15 R u t g e r s Mo d e l C o n g r e s s 12 As an actor, the Appropriations Committee may be willing to compromise on the amount of funding given to intelligence organizations, pending the access they have to monitor the whereabouts of these funds, and are able to change the budget if they see fit. They may also be willing to compromise on the amount of monitoring and transparency that goes on in reference to finance, pending the good behavior and efficiency of intelligence organizations over time. Possible Causes There may be several possible causes for the inability of the intelligence community to gather and coordinate Intel in a sufficient manner. This inability to gather intel has led to various crimes, acts of terror, and disrespect by the international community. Different actors including the 9/11 commission, Members of Congress, and government agencies such as the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and other organizations have attributed various factors to the causes of this poor intelligence gathering and coordination. Insufficient Funding Organizations such as the CIA, FBI, NSA and others have attributed much of the inability to gather information failure to insufficient funding. Representatives from these organizations claim that poor federal funding has stunted the growth of any programs, advanced technologies and intelligence gathering initiatives proposed. Insufficient funding is also a cause for the need for the inability to gather information as cited by the 9/11 Commission. The 9/11 Commission however, holds a different view as to why insufficient funding has caused failure in the intelligence community. According to the 9/11 commission, whereas funding has been provided to agencies to improve certain programs and intelligence gathering, often times these monies go to inappropriate areas, and are wasted rather than being spent on the allocated areas. One report provides evidence, citing that CIA officials moved counter-terrorism money to other parts of the

16 R u t g e r s Mo d e l C o n g r e s s 13 agency to cover other needs that had little or nothing to do with combating terrorism. 31 The report continued to state that counter-terrorism managers still did not spend all of the funding provided to them, even after diverting funding to other programs. According to the findings of the 9/11 commission, because of this wasteful spending, Congress sees the funds provided to these agencies as unnecessary and pork barreling. Because funding provided to agencies by homeland security is not allocated wisely, funds instead spread to similar revenue-sharing projects. This creates a scenario for the inefficient and wasteful spending of already scarce funding. 32 The commission adds that Congress has not designated funding for many of the costly initiatives, and has instead provided finances for impractical projects. 33 As such, when it comes time to appropriate monies, Congress does not provide a large amount for the intelligence community. This leads to a cycle in which organizations in the intelligence community issues complaints of receiving inadequate funding for their projects and improvements, which may contribute to why they may not be able to gather intelligence to the best of their ability. Disorganized Agencies As cited by the 9/11 Commission as well as Members of Congress, the inability of intelligence agencies to work with one another and share information has led to a lot of failure of properly gathering and coordinating intel, and contributed to the attacks on 11 September Because of the large amount of bureaucracy within organizations such as the FBI, it becomes difficult for them to share the intelligence they have gathered with other agencies. This leads to a lack of comprehensive information and fact gathering, and can lead to acts of terror and other instances of crime. In addition, the chairmen of the 9/11 Commission have stated that the FBI has failed in preventing terrorist attacks because of its incompatibility with other agencies, and the high rate of employee 31 Greg Miller and Josh Meyer, Systemic breakdown at CIA before Sept 11. Los Angeles Times, 22 August Thomas H. Kean and Lee H. Hamilton, Unfinished Job of Safety. The Boston Globe, 1 September Alan Levin and Kevin Johnson, 9/11 panel chiefs: FBI lags on promised improvements. USA Today, 18 August 2006.

17 R u t g e r s Mo d e l C o n g r e s s 14 turnover, particularly among senior staff. A staff that is not cohesive and constantly learning from each other and building on existing knowledge is one that cannot provide a stable and efficient intelligence system. This prohibits the FBI, and other agencies with similar problems to obtain the ability to develop sources to fight terrorism and improve intel. Despite criticisms of the FBI in the past, the organization has not made an effort to take to the suggestions that were made to improve its disorganization. 34 Disorganization and poor information sharing between agencies also creates inter-agency disagreements that can prove disastrous for efficiency. An example of this is the dispute between the CIA and the NSA in reference to their respective responsibilities in targeting Al Qaeda. 35 Because it was not clear which agency should take on which task, a poor job was done, and this contributed the attacks on 11 September Poor Communication with Local Law Enforcement Another potential cause for the poor ability to gather and analyze intelligence information is the poor communication and information sharing between federal intelligence agencies and local law enforcement such as police authorities in individual states and towns. According to Thomas Kean, chairperson of the 9/11 Commission, police and firefighters lack communicate systems, which would allow them to share information efficiently during an emergency. 36 Such an issue was the exact problem during the 11 September 2001 attacks, when New York Public Safety Workers were attempting to put together an emergency plan of action. Because of poor communication systems and inefficient information sharing with federal agencies, states and localities do not have adequate emergency response plans. In addition to the attacks on 11 September 2001, the reaction of local authorities during the events of Hurricane Katrina Alan Levin and Kevin Johnson, 9/11 panel chiefs: FBI lags on promised improvements. USA Today, 18 August Greg Miller and Josh Meyer, Systemic breakdown at CIA before Sept 11. Los Angeles Times, 22 August Chris Mondics, 9/11 panel assails scandalous failure of the nation s antiterrorism efforts. The Philadelphia Inquirer, 6 December Thomas H. Kean and Lee H. Hamilton, Unfinished Job of Safety. The Boston Globe, 1 September 2006.

18 R u t g e r s Mo d e l C o n g r e s s 15 Explanation and Analysis of Causes While all of the causes, which may all lead to the inability of the intelligence community to sufficiently gather, coordinate, and analyze intel, are unique in their contributions, they also all impact and influence one another. The most similarities exist in the causes of disorganized agencies and poor communication with local law enforcement. In addition to each of these causes leading to intelligence gathering failure, one also leads to another. Because federal agencies are heavily bureaucratic and disorganized in intelligence sharing with one another, this leads to poor intelligence sharing with local law enforcement authorities as well. As a result, these local authorities have a difficult time establishing their own intelligence bases and proper emergency plans. In addition, insufficient funding to federal agencies may contribute to the reason why these organizations cannot organize themselves better, and cannot complete the reform promises they made because of previous criticisms. Insufficient funding also trickles to local law enforcement agencies. Many state and municipal authorities also receive limited funds, and as such, they cannot expand their communication systems and intelligence gathering methods. These three causes are also similar because the same actors are involved in each cause. The 9/11 Commission, Congress, as well as the individual agencies have all been extremely vocal on intelligence reform, and the causes, which have led to it, and continue to contribute to its need. Issue Linkages Intelligence reform connects to various issues including homeland security, foreign relations in the Middle East and with counter-proliferation, immigration policy, civil rights, and the War in Iraq. Intelligence reform is linked to homeland security because any reforms impact the level of safety within the U.S. If intel on an important matter is missed, this can lead to an act of terror or crimes. 38 In terms of foreign relations with the Middle East, intelligence mistakes can affect relations in the long-term. For 38 Mark Mazzetti, Report Faults Pace of Intelligence Overhaul. The New York Times, 28 July 2006.

19 R u t g e r s Mo d e l C o n g r e s s 16 instance, when the intelligence community made a false assessment on the Pakistani nuclear test, this made foreign relations with the Middle East more difficult. 39 Keeping this example in mind, if intelligence was improved, counter-proliferation would not be as large of a problem, as the U.S. could more easily prevent the spread of nuclear weapons with knowledge as to who possesses them. Intelligence reform also impacts immigration policy, because when the intelligence community finds or does not find certain information about regions or countries, it makes recommendations about immigration to and from them to the federal government. Civil rights are also connected to intelligence reform. Interest groups and Members of Congress have claimed that methods of intelligence gathering such as phone or monitoring are a violation of civil rights. 40 Many have also questioned the ethics and legitimacy of detaining suspects at Guantanamo Bay without granting them basic rights. 41 Intelligence reform also links to the war in Iraq. A 2002 National Intelligence Estimate was given that Iraq possessed weapons of mass destruction. These findings, which provided the incentive to begin the War in Iraq, turned out to be false, and the intelligence community deemed the reports as a monumental failure. 42 According to State Department Intelligence official, the war in Iraq has damaged the perception of reliability of U.S. intelligence. 43 Projections and Implications If the issue of intelligence reform is not dealt with, and none of the 9/11 Commissions are met with, they may be several implications. According to Colin Powell, a potential projection of lack of action is difficulty in gathering intel on foreign countries on various issues such as internal and external conflicts, oil issues, and the War on Terrorism. As such, this will potentially sour foreign relations. In addition, if the 39 Ron Marks. Of Systems and Security: Intelligence Reform Needed Now. Washington Times, 13 May Intelligence and Civil Rights. The New York Times, 14 December Karen DeYoung, Spy Agencies Say Iraq war Hurting U.S. Terror Fight. The Washington Post, 24 September Stephen Fidler and Demestri Sevastopulo, The spies who lost it. Financial Times (London) 12 May 2006,

20 R u t g e r s Mo d e l C o n g r e s s 17 intelligence community is not able share information between agencies, parts of the government such as the Department of Defense, will not be able to do their jobs properly. 44 Representatives from the 9/11 Commission have projected that if the intelligence community is not reformed to more efficiently and quickly gather intel, there could potentially be another terrorist attack. They continue to say that crime rates may also go up, endangering the welfare of the citizens of the United States. 45 Members of the intelligence community believe that budget cuts for intelligence will come if no the government does not institute any reform. These budget cuts would impede the types of procedures and technologies that are necessary for safety of U.S. citizens. Various interest groups also support intelligence reform, but for other reasons such as civil rights violations. For instance, groups such as the ACLU state that if the intelligence community does not reform the way that it currently operates and gathers intelligence, human civil rights will continue be violated on an escalated level. Civil rights and government watchdog groups maintain that intelligence gathering methods in that hold interrogated persons for an undetermined period are unacceptable. 46 The ACLU also claims that without reform to make the intelligence community more transparent in its information sharing will lead to a government that is secretive and elitist, not looking for the best interest of its people. 47 Conclusion The issue of intelligence reform as recommended by the 9/11 Commission is an important one, because it poses a paradoxical question between what is necessary in order to keep an effective and safe system, and violations of civil rights and misused funding. From the history of conflict in the U.S., the government has continuously amended and 44 Secretary Colin L. Powell. Intelligence Reform. Opening Remarks before the Senate Governmental Affairs Committee, Washington, DC, 13 September Thomas H. Kean and Lee H. Hamilton, Unfinished Job of Safety. The Boston Globe, 1 September Intelligence Reform: Oppose Repressive Measures Promoted as "Reform 30 May ACLU s Top Lobbyist Urges Congress to Protect Freedom of Information Act, Says Government Transparency Vital to American Democracy 14 February 2007

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing

More information

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 28 - JUDICIARY AND JUDICIAL PROCEDURE PART II - DEPARTMENT OF JUSTICE CHAPTER 33 - FEDERAL BUREAU OF INVESTIGATION 532. Director of the Federal Bureau of Investigation The Attorney General may appoint

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 6. Homeland Security Congress should monitor closely the implementation of the new Department of Homeland Security

More information

JOHN DAVIDSON WOODWARD, JR.

JOHN DAVIDSON WOODWARD, JR. JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: jdwjr@bu.edu

More information

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007).

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007). Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law 110 53 (August 3, 2007). These materials are not official evidence of the laws set forth

More information

A Policy Forum on the Use of Big Data in Homeland Security

A Policy Forum on the Use of Big Data in Homeland Security National Security Program Homeland Security Project A Policy Forum on the Use of Big Data in Homeland Security Meeting Proceedings On October 30, 2013, the Bipartisan Policy Center and Intel Corporation

More information

The War on Terror in Classrooms and Clinics: An Inventory

The War on Terror in Classrooms and Clinics: An Inventory 480 Journal of Legal Education The War on Terror in Classrooms and Clinics: An Inventory Editors Note: As part of this symposium issue on the impact of the war on terror on legal education, the Journal

More information

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified CYBER THREATS AND RESPONSE Continuity Insights Conference Chicago June 18-19, 2013 Unclassified OBJECTIVES Why it is important Threats, players, and response FBI s Next Generation Cyber Government and

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference

More information

Government in America People, Politics, and Policy 16th Edition, AP Edition 2014

Government in America People, Politics, and Policy 16th Edition, AP Edition 2014 A Correlation of 16th Edition, AP Edition 2014 Advanced Placement U.S. Government and Politics AP is a trademark registered and/or owned by the College Board, which was not involved in the production of,

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION

MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION Introduced by: Co on Calendar By r&uest of I Maga 'la hen Guhhan in accordance with the Organic Act of Guam. AN ACT TO ESTABLISH THE

More information

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE

More information

Homeland Security. April 27, 2015. The Honorable Charles E. Grassley Chairman Committee on the Judiciary United States Senate Washington, DC 20510

Homeland Security. April 27, 2015. The Honorable Charles E. Grassley Chairman Committee on the Judiciary United States Senate Washington, DC 20510 Secretary U.S. Department of Homeland Security Washington, DC 20528 Homeland Security April 27, 2015 The Honorable Charles E. Grassley Chairman Committee on the Judiciary United States Senate Washington,

More information

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence Blinking Red Book Review March 2014 Reviewed by Roger Z. George The far-reaching intelligence

More information

The Structure and Function of the Legislative Branch Notes. Section 1: The Senate and the House of Representatives

The Structure and Function of the Legislative Branch Notes. Section 1: The Senate and the House of Representatives Attachment A The Structure and Function of the Legislative Branch Notes Section 1: The Senate and the House of Representatives The Role of Congress Congress is the lawmaking or legislative body of our

More information

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT

More information

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Preservation of longstanding, roles and missions of civilian and intelligence agencies Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto

More information

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development 7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

The Need to Share: The U.S. Intelligence Community and Law Enforcement

The Need to Share: The U.S. Intelligence Community and Law Enforcement The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need

More information

A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE)

A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE) A BRIEF HISTORY OF THE INFORMATION SHARING ENVIRONMENT (ISE) As the nation enters the second decade following the terrorist attacks of September 11, 2001, our information sharing challenges are maturing.

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

Brief Documentary History of the Department of Homeland Security

Brief Documentary History of the Department of Homeland Security Brief Documentary History of the Department of Homeland Security 2001 2008 History Office Table of Contents Introductory Note... 2 Homeland Security Before September 11... 3 The Office of Homeland Security...

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 7050.06 April 17, 2015 IG DoD SUBJECT: Military Whistleblower Protection References: See Enclosure 1 1. PURPOSE. This directive reissues DoD Directive (DoDD) 7050.06

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

Psychological Services & Holistic Health, Inc.

Psychological Services & Holistic Health, Inc. Psychological Services & Holistic Health, Inc. 626 Wilshire Boulevard, Suite 910 3990 Westerly Place, Suite 160 Los Angeles, CA 90017 Newport Beach, CA 92660 Phone: (213) 622-0633 Fax: (213) 622-5633 NOTICE

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

UNITED STATES SENATE COMMITTEE ON THE JUDICIARY. Testimony of Stephen M. Kohn 1

UNITED STATES SENATE COMMITTEE ON THE JUDICIARY. Testimony of Stephen M. Kohn 1 UNITED STATES SENATE COMMITTEE ON THE JUDICIARY Whistleblower Retaliation at the FBI: Improving Protections and Oversight Testimony of Stephen M. Kohn 1 Executive Director, National Whistleblower Center

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

The Ethics of Information Sharing Between the FBI and CIA

The Ethics of Information Sharing Between the FBI and CIA The Ethics of Information Sharing Between the FBI and CIA Nicholas Jones, Lauren Mallik, William McLaughlin, Dustin Toy Introduction Prior to the 9/11 attacks, the CIA was aware of the presence of two

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

4.7: Checks on Presidential Power AP U. S. Government

4.7: Checks on Presidential Power AP U. S. Government 4.7: Checks on Presidential Power AP U. S. Government Formal Checks Found in U. S. Constitution Presidential or Executive Power Appoint Cabinet Officers, Federal Judges, and Ambassadors But, had to be

More information

The Committee of Seventy s 2015 INTEGRITY AGENDA PHILADELPHIA CITY COUNCIL

The Committee of Seventy s 2015 INTEGRITY AGENDA PHILADELPHIA CITY COUNCIL The Committee of Seventy s 2015 INTEGRITY AGENDA PHILADELPHIA CITY COUNCIL City Council At-Large Candidate Dan Tinney The Committee of Seventy is asking you and the other declared candidates for Philadelphia

More information

TITLE I GENERAL PROVISIONS

TITLE I GENERAL PROVISIONS Public Law 101-576 November 15, 1990 Chief Financial Officers Act of 1990 One Hundred First Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday,

More information

To: The Assembly Judiciary Committee Date: February 4, 2015 Re: Support for AB 10, Funding Indigent Defense

To: The Assembly Judiciary Committee Date: February 4, 2015 Re: Support for AB 10, Funding Indigent Defense To: The Assembly Judiciary Committee Date: February 4, 2015 Re: Support for AB 10, Funding Indigent Defense Dear Chairman Hansen and Members of the Assembly Judiciary Committee: The ACLU of Nevada supports

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Title V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions

Title V Preventing Fraud and Abuse. Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Title V Preventing Fraud and Abuse Subtitle A- Establishment of New Health and Human Services and Department of Justice Health Care Fraud Positions Sec. 501. Health and Human Services Senior Advisor There

More information

NASA Security: Assessing the Agency s Efforts to Protect Sensitive Information

NASA Security: Assessing the Agency s Efforts to Protect Sensitive Information Testimony before the Subcommittee on Space Committee on Science, Space, and Technology United States House of Representatives For Release on Delivery expected at 10:00 a.m. on June 20, 2014 NASA Security:

More information

ADVANCED INTEGRATIVE REHABILITATION AND PAIN CENTER David P. Sniezek, DC, MD, MBA, FAAIM NOTICE OF PRIVACY PRACTICES

ADVANCED INTEGRATIVE REHABILITATION AND PAIN CENTER David P. Sniezek, DC, MD, MBA, FAAIM NOTICE OF PRIVACY PRACTICES ADVANCED INTEGRATIVE REHABILITATION AND PAIN CENTER David P. Sniezek, DC, MD, MBA, FAAIM NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

S Korea's National Security Law

S Korea's National Security Law Page 1 S Korea's National Security Law Editor's note: This is an unofficial translation of the National Security Law (see below for the original document). The sole purpose of this translation is to make

More information

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the

More information

GAO DEPARTMENT OF HOMELAND SECURITY. Actions Taken Toward Management Integration, but a Comprehensive Strategy Is Still Needed

GAO DEPARTMENT OF HOMELAND SECURITY. Actions Taken Toward Management Integration, but a Comprehensive Strategy Is Still Needed GAO November 2009 United States Government Accountability Office Report to the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland

More information

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR

CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR July 28, 2015 The Senate is expected to consider the Cybersecurity Information Sharing Act (CISA, S. 754 1 ) on the Senate floor soon. The bill was marked

More information

Senate Subcommittee Hearing and Report Regarding Online Advertising and Hidden Hazards to Consumer Security and Data Privacy

Senate Subcommittee Hearing and Report Regarding Online Advertising and Hidden Hazards to Consumer Security and Data Privacy MORRISON & FOERSTER LLP MEMORANDUM TO: FROM: ESPC Reed Freeman Patrick Bernhardt DATE: May 16, 2014 RE: Senate Subcommittee Hearing and Report Regarding Online Advertising and Hidden Hazards to Consumer

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Government Experience

Government Experience Government Experience UNITED STATES GOVERNMENT Executive Branch The White House White House Counsel (1987-1989) Member, President's Foreign Intelligence Advisory Board (2006-2009) Member, Intelligence

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 13. National ID Cards and Military Tribunals Congress should resist the establishment of a national identification

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

May 2 1,2009. Re: DHS Data Privacy and Integrity Advisory Committee White Paper on DHS Information Sharing and Access Agreements

May 2 1,2009. Re: DHS Data Privacy and Integrity Advisory Committee White Paper on DHS Information Sharing and Access Agreements J. Howard Beales Chair, DHS Data Privacy and Integrity Advisory Committee Via Hand Delivery Secretary Janet Napolitano Department of Homeland Security Washington, DC 20528 Ms. Mary Ellen Callahan Chief

More information

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)

More information

Five-Year Strategic Plan

Five-Year Strategic Plan U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations

More information

Reforming criminal laws in any state is a time-consuming, intensive, and laborious

Reforming criminal laws in any state is a time-consuming, intensive, and laborious 23 Chapter 4 Guiding Principles for the Criminal Law Reform Process Reforming criminal laws in any state is a time-consuming, intensive, and laborious process, requiring institutions and individuals with

More information

Public Law 108 330 108th Congress An Act

Public Law 108 330 108th Congress An Act PUBLIC LAW 108 330 OCT. 16, 2004 118 STAT. 1275 Public Law 108 330 108th Congress An Act To amend title 31, United States Code, to improve the financial accountability requirements applicable to the Department

More information

DHS Department of Homeland Security

DHS Department of Homeland Security Page 1 of 5 Fact Sheet: Homeland Security Operations Center (HSOC) The Homeland Security Operations Center (HSOC) serves as the nation s nerve center for information sharing and domestic incident management

More information

CFIUS and Network Security Agreements 1

CFIUS and Network Security Agreements 1 CFIUS and Network Security Agreements 1 Mark E. Plotkin 2 David M. Marchick 3 David N. Fagan 4 This memorandum provides an overview of the principal U.S. government national security considerations and

More information

STATE OF MARYLAND Strategy for Homeland Security

STATE OF MARYLAND Strategy for Homeland Security STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

STATEMENT OF JENNIFER SHASKY SENIOR COUNSEL TO THE DEPUTY ATTORNEY GENERAL BEFORE THE

STATEMENT OF JENNIFER SHASKY SENIOR COUNSEL TO THE DEPUTY ATTORNEY GENERAL BEFORE THE STATEMENT OF JENNIFER SHASKY SENIOR COUNSEL TO THE DEPUTY ATTORNEY GENERAL BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ENTITLED BUSINESS FORMATION AND FINANCIAL

More information

2015 STATE OF THE FIRST AMENDMENT SURVEY A Project Sponsored by the Newseum Institute

2015 STATE OF THE FIRST AMENDMENT SURVEY A Project Sponsored by the Newseum Institute 2015 STATE OF THE FIRST AMENDMENT SURVEY A Project Sponsored by the Newseum Institute The Newseum Institute has supported an annual national survey of American attitudes about the First Amendment since

More information

STATUS AND INDEPENDENCE OF ACTING INSPECTORS GENERAL

STATUS AND INDEPENDENCE OF ACTING INSPECTORS GENERAL OFFICE OF INSPECTOR GENERAL DEPARTMENT OF VETERANS AFFAIRS STATEMENT FOR THE RECORD SENATE HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS COMMITTEE HEARING WATCHDOGS NEEDED: TOP GOVERNMENT INVESTIGATORS LEFT

More information

Characteristics of Public Budgets in 5 Latin American Countries

Characteristics of Public Budgets in 5 Latin American Countries Characteristics of Public Budgets in 5 Latin American Countries The Latin American Network for Legislative Transparency is a network of civil society organizations in Latin America that promote transparency,

More information

Immigration Law Enforcement by State and Local Police

Immigration Law Enforcement by State and Local Police To embrace and uphold our tradition as a nation of immigrants. Immigration Law Enforcement by State and Local Police With the failure of the 110th Congress to reform our immigration laws, America continues

More information

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General Department of Homeland Security Office of Inspector General Management Advisory Report: FEMA's Housing Strategy for Future Disasters OIG-09-111 September 2009 Office of Inspector General U.S. Department

More information

The Interagency Security Committee and Security Standards for Federal Buildings

The Interagency Security Committee and Security Standards for Federal Buildings Order Code RS22121 Updated November 23, 2007 The Interagency Security Committee and Security Standards for Federal Buildings Summary Stephanie Smith Analyst in American National Government Government and

More information

Intelligence Analysis for Homeland Security RPAD 557

Intelligence Analysis for Homeland Security RPAD 557 Intelligence Analysis for Homeland Security RPAD 557 Instructor: Dr. James E. Steiner Public Service Professor Rockefeller College SUNY Albany 518-708-4183 Office hours: by appointment 423 State Street

More information

GAO COMBATING TERRORISM. Comments on Counterterrorism Leadership and National Strategy. Testimony

GAO COMBATING TERRORISM. Comments on Counterterrorism Leadership and National Strategy. Testimony GAO United States General Accounting Office Testimony Before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on Government Reform, House of Representatives

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

The Design of an Undergraduate Program In Homeland Security

The Design of an Undergraduate Program In Homeland Security VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department

More information

CITIZEN ADVOCACY CENTER

CITIZEN ADVOCACY CENTER CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

Key Concepts Chart (The United States after the Cold War)

Key Concepts Chart (The United States after the Cold War) Unit 10, Activity 1, Key Concepts Chart Key Concepts Chart (The United States after the Cold War) Key Concept +? - Explanation Extra Information NAFTA Presidents George H.W. Bush and Bill Clinton both

More information

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy By: Dan Arnaudo Copyright 2013, ASA Institute for Risk & Innovation Keywords: Congress, CISPA, Critical Infrastructure,

More information

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President 004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive

More information

Crete-Monee Middle School U.S. Constitution Test Study Guide Answers 2010-2011

Crete-Monee Middle School U.S. Constitution Test Study Guide Answers 2010-2011 Crete-Monee Middle School U.S. Constitution Test Study Guide Answers 2010-2011 1. What is the more common name for the first ten amendments to the constitution? Bill of Rights 2. The introduction to the

More information

A Review of Intelligence Oversight Failure: NSA Programs that Affected Americans

A Review of Intelligence Oversight Failure: NSA Programs that Affected Americans A Review of Intelligence Oversight Failure: NSA Programs that Affected Americans by Major Dave Owen The views and opinions expressed here are those of the author and do not necessarily reflect the official

More information