Skip to Main ContentCounter-Terrorism Training and Resources for Law Enforcement
FAQsSite MapContact UsSite Updates
Mission
Training and Technical Assistance
Conferences
Funding
Research and Statistics
Equipment
Planning and Risk Assessment
Publications
Legislation
Victim Assistance
Community Preparedness
Start of Main Content
Publications

National Strategy

2007 Data Mining Report: DHS Privacy Office Response to House Report 109-699 (PDF)
U.S. Department of Homeland Security, July 6, 2007
This second report by the DHS Privacy Office to Congress on data mining describes activities that meet the definition of data mining in House Report No. 109-699, Making Appropriations for the Department of Homeland Security for the Fiscal Year Ending September 30, 2007, and for Other Purposes. The report also provides an update on implementation of the recommendations outlined in the first report on data mining, Data Mining Report: DHS Privacy Office Response to House Report 108-774, issued July 6, 2006.

2007 International Narcotics Control Strategy Report
U.S. Department of State, Bureau of International Narcotics and Law Enforcement Affairs, March 2007
The annual report to Congress by the U.S. Department of State, prepared in accordance with the Foreign Assistance Act, describes the efforts of key countries to attack all aspects of the international drug trade in calendar year 2006. Volume I discusses drug and chemical control activities; Volume II covers money laundering and other financial crimes.

9/11 Commission Recommendations: Implementation Status (PDF)
Congressional Research Service, December 4, 2006
This report reviews recommendations made by the 9/11 Commission and the status of their implementation at the end of the 109th Congress.

9/11 Commission Report: Reorganization, Transformation, and Information Sharing (PDF)
U.S. Government Accountability Office, August 2004
This document contains the statement of Honorable David M. Walker, Comptroller General of the United States, before the House Committee on Government Reform. The testimony covers four major topics: improvement of information sharing and analysis and suggestions for ways to achieve positive results; organizational approaches to improve performance; strategic human capital management as the centerpiece of efforts to transform the cultures of government agencies; and the importance of results-oriented strategic planning and implementation.

9/11 Five Years Later: Successes and Challenges
National Security Council, September 2006
This publication describes recent advances in democracy, and discusses preventing the proliferation of weapons of mass destruction and issues surrounding the denial of sanctuary and support from rogue states.

2002 National Money Laundering Strategy
U.S. Department of the Treasury, July 2002
This report presents a national strategy to attack the financial underpinnings of crime, including the financing of terrorist groups. The strategy directs government resources against money launderers and those who finance terrorist activities and individuals.

2003 National Money Laundering Strategy (PDF)
U.S. Department of the Treasury, November 2003
The 2003 version of the National Money Laundering Strategy continues to expand the framework for identifying, disrupting, and dismantling global terrorist financing and money laundering operations. It emphasizes the ongoing need for cooperation between the intelligence and law enforcement communities to achieve the common goal of closing off the financial conduits that threaten national security.

2006 INCSR: International Narcotics Control Strategy Report
U.S. Department of State, Bureau for International Narcotics and Law Enforcement Affairs, March 1, 2006
The 2006 INCSR is an annual report by the Department of State to Congress prepared in accordance with the Foreign Assistance Act. It describes the efforts of key countries to attack all aspects of the international drug trade in calendar year 2005. Volume I covers drug- and chemical-control activities. Volume II covers money laundering and financial crimes.

Access to Government Information in the United States (PDF)
H.C. Relyea, Congressional Research Service, January 7, 2005
This report explains public access to information held by the U.S. government in the context of the Freedom of Information Act, the Federal Advisory Committee Act, the Privacy Act, and the Government in the Sunshine Act.

All Jurisdictions Meet Initial REAL ID Requirements
U.S. Department of Homeland Security, April 2, 2008
DHS has granted REAL ID extensions to all 56 U.S. jurisdictions, ensuring that driver's licenses and identification cards throughout the country will achieve a higher security standard, and that all will continue to be acceptable for official purposes after the May 11, 2008 deadline mandated by Congress in the REAL ID Act of 2005.

America's National Interests: A Report From the Commission on America's National Interests, 2000 America's National Interests: A Report From the Commission on America's National Interests, 2000
Commission on America's National Interests, July 2000
This report presents criteria for identifying U.S. national interests, including vital, extremely important, and secondary interests. The authors suggest that ambiguity regarding true national interests has resulted in an unfocused foreign policy. The report concludes by exploring challenges to and opportunities for America's national interests in the next decade.

Analysis of Strategy and Strategies of Analysis (PDF)
RAND Corporation, 2008
This report tries to find a way to estimate the costs of national defense strategy. Analyzing how large complex corporations use their operating units to help them estimate costs, the report suggests that the combatant commands and central military services can work together to adapt in changing conditions while making best use of core strengths.

Annual Report to Congress on Combating Terrorism (PDF)
Office of Management and Budget (OMB), 2001
OMB's Annual Report examines the Administration's progress in building a strong defense against emerging terrorist threats. The report provides funding and programmatic information on the Federal Government's efforts to combat terrorism and protect critical infrastructures.

The Annual Report of the Postmaster General and the Impact of Terrorist Attacks on Postal Operations (PDF)
U.S. Congress, Senate Subcommittee on International Security, Proliferation and Federal Services, 2001
This congressional hearing reports on the actions of the U.S. Postal Service in the immediate aftermath of the September 11, 2001 terrorist attacks.

Arizona Border Control Initiative—Phase II
U.S. Department of Homeland Security, March 2005
On March 30, 2005, the Department of Homeland Security (DHS) announced the second phase of the Arizona Border Control Initiative, a massive federal law enforcement effort to gain greater operational control of the Arizona border. Phase II builds on the results of the 2004 Arizona Border Control Initiative and directly supports DHS' priority anti-terrorism mission—preventing terrorists and terrorist weapons from entering the United States—by reducing the flow of illegal aliens and disrupting smuggling operations.

Armed Vigilante Activities in Arizona
ADL Law Enforcement Agency Resource Network, April 21, 2005
This article reviews the activities of extremist anti-immigration groups in Arizona, such as patrolling the border using weapons and surveillance technology. New groups are forming and activity overall is expanding. Several people have been arrested on weapons charges, and white supremacist and antigovernment groups have expressed interest and are taking part in organized patrols of the border.

Arrest and Detention of Material Witnesses: Federal Law In Brief and Section 12 of the USA PATRIOT and Terrorism Prevention Reauthorization Act (H.R. 3199) (PDF)
Congressional Research Service, September 2005
This report discusses "the law under the federal material witness statute which authorizes the arrest of material witnesses, permits their release under essentially the same bail laws that apply to federal criminal defendants, but favors their release after their depositions have [been] taken."

Assessing the Foreign Language Needs of the Department of Homeland Security
Journal of Homeland Security, June 2006
It is important for DHS to join the governmentwide effort to improve foreign language capabilities. An assessment of the department's many agencies' current capabilities, policies, procedures, and needs would enable DHS to employ specific strategies to build its foreign language capacity.

Aviation Security: TSA's Change to Its Prohibited Items List Has Not Resulted in Any Reported Security Incidents, but the Impact of the Change on Screening Operations Is Inconclusive (PDF)
U.S. Government Accountability Office, April 25, 2007
The Transportation Security Administration (TSA) prohibits individuals from carrying items that it deems threatening to the aircraft and its passengers onboard an aircraft to protect the civil aviation system from improvised explosive devices. For the traveling public and the transportation security officers who conduct passenger screenings, TSA maintains a list of prohibited items. This report identifies changes made to this list in December 2005 and examines their impact.

Balancing Scientific Publication and National Security Concerns: Issues for Congress (PDF)
Congressional Research Service, December 16, 2004
Post-9/11, concerns have increased regarding whether publication of the results of some federally funded research could threaten national security. This report discusses past and current mechanisms used to classify and limit dissemination of certain research information and reviews proposals to further safeguard the nation while not impeding researchers' progress in their fields.

Beyond al-Qaeda Part 1, The Global Jihadist Movement (PDF)
RAND Corporation, 2006
Five years after September 11, 2001, al-Qaeda and other terrorist groups continue to threaten the security of the United States and our allies. This study first examines how al-Qaeda has changed since September 11, 2001 and then analyzes the broader global Jihadist movement.

Border Security: Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process (PDF)
U.S. General Accounting Office (GAO), July 2004
This report evaluates the visa revocation process, which is currently being used as an anti-terrorism tool, and whether the U.S. Department of Homeland Security (DHS) has addressed weaknesses identified by GAO in June 2003. This analysis concludes that DHS, in conjunction with the U.S. Departments of State and Justice, must develop a written governmentwide policy that defines roles and responsibilities and sets performance standards for the process.

Border Security : Security of New Passports and Visas Enhanced, but More Needs to Be Done to Prevent Their Fraudulent Use (PDF)
U.S. Government Accountability Office, July 31, 2007
Travel documents are often used fraudulently in attempts to enter the United States. The integrity of U.S. passports and visas depends on well-designed security features and solid issuance and inspection processes. This report describes the features of U.S. passports and visas and how information on these features is shared; the integrity of the issuance process for these documents; and how these documents are inspected at U.S. ports of entry.

Border Security: Strengthened Visa Process Would Benefit from Improvements in Staffing and Information Sharing (PDF)
U.S. Government Accountability Office, 2005
This report indicates that further improvements in training and fraud prevention regarding the visa process are needed, and that additional information from FBI criminal history files would allow consular officers to help facilitate efficient visa adjudication.

Border Security: Stronger Actions Needed to Assess and Mitigate Risks of the Visa Waiver Program (PDF)
U.S. Government Accountability Office, September 2006
The Visa Waiver Program enables citizens of 27 countries to travel to the United States for tourism or business for up to 90 days without obtaining a visa. After the attacks on September 11, 2001, the risk that terrorists would exploit the program to enter the United States became more of a concern. This testimony describes the Visa Waiver Program's benefits and risks, examines the U.S. government's process for assessing potential risks, and assesses the actions taken to mitigate these risks.

Border Security: US-VISIT Program Faces Strategic, Operational, and Technological Challenges at Land Ports of Entry(PDF)
Government Accountability Office, December 6, 2006
The Department of Homeland Security (DHS) established the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) program to collect, maintain, and share data on selected foreign nationals entering and exiting the United States at air, sea, and land points of entry. These data, including biometric identifiers such as digital fingerprints, are to be used to screen persons against watch lists, verify visitors' identities, and record arrival and departure. In this report, the Government Accountability Office analyzes efforts to implement US-VISIT entry and exit capabilities and DHS's efforts to define how US-VISIT fits with other emerging border security initiatives.

Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies (PDF)
RAND Corporation, February 7, 2007
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. Technology systems play a key role within a larger, integrated strategy to target terrorist group efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts.

Building Private Security/Public Policing Partnerships to Prevent and Respond to Terrorism and Public Disorder
Ohlhausen Research, International Association of Chiefs of Police (IACP) and Office of Community Oriented Policing Services (COPS), 2004
Despite similar interests in protecting the nation, law enforcement agencies and private security organizations have rarely collaborated in efforts to protect persons, property, and information or in homeland security efforts to protect the country from internal or external threats. This report, an outgrowth of a national policy summit, outlines a strategy to strengthen existing partnerships between private security and public law enforcement agencies and to assist in creating new ones.

Coast Guard Efforts to Improve Management and Address Operational Challenges in the Deepwater Program (PDF)
U.S. Government Accountability Office, February 14, 2007
This report reviews the Coast Guard's Deepwater project—a $24 billion endeavor to replace or modernize the Coast Guard's fleet of vessels and aircraft. Although it is widely agreed upon that the aging assets need replacement or renovation, concerns exist about the acquisition approach adopted in launching the Deepwater program.

Catastrophe Insurance Risks: Status of Efforts to Securitize Natural Catastrophe and Terrorism Risk (PDF)
U.S. General Accounting Office, September 2003
This report updates a 2002 report on catastrophic bonds and assesses the progress of transferring natural catastrophe risks to capital markets, factors that may affect their issuance by insurance companies, investment in catastrophic bonds by market consumers, and the potential for and challenges associated with securitizing terrorism-related bonds.

Catastrophic Terrorism—Local Response to a National Threat
Frank Keating, August 2001
In this article by Oklahoma Governor Frank Keating, the author shares lessons learned from the rescue and recovery efforts following the April 1995 bombing of the Alfred P. Murrah Federal Office Building in Oklahoma City, providing guidance in establishing a national protocol for responding to terrorism.

Combating Chemical, Biological, Radiological, and Nuclear Terrorism: A Comprehensive Strategy (PDF)
Center for Strategic and International Studies, December 2000
This report lays out near-term and long-term priorities to marshal federal, state, local, private sector, and nongovernmental resources for defending the U.S. homeland against chemical, biological, radiological, and nuclear terrorism.

Combating Money Laundering: Opportunities Exist to Improve the National Strategy (PDF)
U.S. General Accounting Office, September 2003
This report examines issues associated with the reauthorization of the national strategy annual issuance requirement provided by the Money Laundering and Financial Crimes Strategy Act of 1998.

Combating Nuclear Terrorism: Federal Efforts to Respond to Nuclear and Radiological Threats and to Protect Emergency Response Capabilities Could Be Strengthened (PDF)
U.S. Government Accountability Office, September 21, 2006
The U.S. Department of Energy (DOE) maintains an emergency response capability to quickly respond to potential nuclear and radiological threats in the United States. This report discusses the capabilities and assets available to prevent and respond to potential nuclear and radiological attacks in the United States; the physical security measures in place at two key DOE emergency response facilities and whether they are consistent with DOE guidance; and the benefits of using DOE aerial background radiation surveys to enhance emergency response capabilities.

Combating Terrorism: Evaluation of Selected Characteristics in National Strategies Related to Terrorism (PDF)
U.S. General Accounting Office, February 2004
Following the events of September 11, the U.S. government published seven national strategies related to terrorism and homeland security. This report identifies characteristics central to an effective national strategy and evaluates whether the national strategies related to terrorism address those characteristics.

Combating Terrorism: Federal Agencies Face Continuing Challenges in Addressing Terrorist Financing and Money Laundering (PDF)
U.S. General Accounting Office (GAO), March 4, 2004
In this testimony, GAO addressed U.S. government challenges to deterring terrorists' use of alternate financial mechanisms, the status of the FBI/ICE memorandum of understanding regarding investigation of terrorist financing, and whether the National Money Laundering Strategy has been useful in coordinating federal efforts.

Combating Terrorism: Guidance for State Department's Antiterrorism Assistance Program Is Limited and State Does Not Systematically Assess Outcomes [Testimony] (PDF)
U.S. Government Accountability Office, June 4, 2008
The Department of State's Antiterrorism Assistance (ATA) program provides partner nations with counter-terrorism training and equipment and strives to improve bilateral ties and increase respect for human rights. The Government Accountability Office assessed how the department determines ATA priorities, coordinates ATA with other counter-terrorism programs, establishes ATA program goals and measures, and reports on U.S. counter-terrorism assistance. This statement is based on a February 2008 report titled Combating Terrorism: State Department's Antiterrorism Program Needs Improved Guidance and More Systematic Assessments of Outcomes (PDF).

Combating Terrorism: Intergovernmental Cooperation in the Development of a National Strategy to Enhance State and Local Preparedness (PDF)
U.S. General Accounting Office, April 2002
This report presents testimony before the House Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations on development of a national strategy to improve national preparedness and enhance partnerships between federal, state, and local governments to guard against terrorist attacks.

Combating Terrorism: Issues in Managing Counterterrorist Programs (PDF)
U.S. General Accounting Office, April 2000
This document contains a summary of testimony given before the House of Representatives' Subcommittee on Oversight, Investigations, and Emergency Management (Committee on Transportation and Infrastructure) covering federal efforts to prepare and respond to terrorist attacks involving chemical, biological, radiological, and nuclear weapons. The report notes that most federal efforts are based on vulnerabilities rather than an analysis of credible terrorist threats.

Combating Terrorism: Observations on National Strategies Related to Terrorism (PDF)
U.S. General Accounting Office, March 2003
This testimony before the Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives, discusses national strategies related to terrorism. The testimony addresses two major topics: (1) whether the new national strategies form a framework that is cohesive and comprehensive and (2) whether the strategies will facilitate the implementation of programs that are strategy-driven, integrated, and effective.

Combating Terrorism: State Department's Antiterrorism Program Needs Improved Guidance and More Systematic Assessments of Outcomes (PDF)
Government Accountability Office, February 29, 2008
The U.S. Department of State's Antiterrorism Assistance (ATA) program objectives are to provide partner nations with counter-terrorism training and equipment, improve bilateral ties, and increase respect for human rights. GAO assessed (1) the department's guidance for determining ATA priorities, (2) how it coordinates ATA with other counter-terrorism programs, (3) the extent to which it establishes ATA program goals and measures, and (4) its reporting on U.S. international counter-terrorism assistance.

Combating Terrorism: The Challenge of Measuring Effectiveness (PDF)
Congressional Research Service, November 2005
This report is designed to help Congress better understand the characteristics, importance, and dynamics of measuring counter-terrorism activities, and what would generally be required from government and nongovernmental entities tasked with establishing and evaluating measures of effectiveness. It also provides added tools and insights to support Congress in its efforts to coordinate, fund, and oversee the nation's antiterrorism activities.

Combating Terrorism: The United States Lacks Comprehensive Plan to Destroy the Terrorist Threat and Close the Safe Haven in Pakistan's Federally Administered Tribal Areas (PDF)
Government Accountability Office, April 17, 2008
Since 2002, destroying the terrorist threat and closing terrorist safe havens have been key national security goals. Pakistan's Federally Administered Tribal Areas (FATA), which border Afghanistan, are vast unpoliced regions attractive to extremists and terrorists seeking a safe haven. The report assesses progress in meeting U.S. national security goals for Pakistan's FATA and in developing a comprehensive plan for it.

Compilation of Intelligence Laws and Related Laws and Executive Orders of Interest to the National Intelligence Community, As Amended Through June 2003
U.S. Government Printing Office, August 2003
This collection contains appropriations and other acts relating to the Central Intelligence Agency, the National Security Council, and other federal intelligence agencies. It includes the U.S.A. Patriot Act and Title 2 of the Homeland Security Act of 2002. It can be purchased through the U.S. Government Online Bookstore.

CONPLAN: U.S. Government Interagency Domestic Terrorism Concept of Operations PlanCONPLAN: U.S. Government Interagency Domestic Terrorism Concept of Operations Plan (PDF)
January 2001
The CONPLAN is designed to provide overall guidance to federal, state, and local agencies on the Federal Government response to a potential or actual terrorist threat or incident that occurs in the United States, particularly one involving weapons of mass destruction.

Continuity of Government: Current Federal Arrangements and the Future (PDF)
Congressional Research Service, Updated August 5, 2005
Arrangements for continuing to operate the federal government if a national emergency or catastrophe occurs are specified in law, policy, and plans, some of which are not publicly available because of their sensitive, contingent status. This report reviews the public record concerning federal continuity of government arrangements.

Cooperative Threat Reduction Annual Report for FY 2005: Briefing to the Staffs of the Armed Services Committees (PDF)
U.S. General Accounting Office (GAO), April 29, 2004
This document analyzes the fiscal year 2005 annual report of the Cooperative Threat Reduction Program. It determines whether the 5-year plan and accountability section address legislative requirements and present accurate information and whether past GAO recommendations have been adopted.

Countering the New Terrorism
RAND, 1999
This report traces the recent evolution of international terrorism against civilian and U.S. military targets, discusses the future of terrorism, and assesses how it might be contained. The authors also propose strategies to combat domestic terrorism.

Counterterrorism and the Integration of Islam in Europe
Jytte Klausen, Watch on the West, a newsletter of the Foreign Policy Research Institute, July 2006
This article is based on Dr. Klausen's presentation at the History Institute for Teachers: Islam, Islamism, and Democratic Values, sponsored by the Foreign Policy Research Institute, May 6–7, 2006.

Country Reports on Terrorism 2005 (PDF)
Office of the Coordinator for Counterterrorism, U.S. Department of State, April 2006
U.S. law requires the Secretary of State to provide to Congress, by April 30 of each year, a complete report on terrorism regarding those countries and groups that meet the criteria set forth in legislation.

Critical Infrastructure and Key Assets: Definition and Identification (PDF)
Congressional Research Service, October 1, 2004
This report seeks to clarify and identify critical infrastructure in terms of evolving public policy and homeland security.

Cuba: U.S. Restrictions on Travel and Remittances (PDF)
Congressional Research Service, Updated May 10, 2005
Restrictions on travel and monetary remittances to Cuba have been a key and often contentious component in U.S. efforts to isolate the communist government of Fidel Castro. This report discusses these restrictions, why they were implemented, and recent developments surrounding them.

Dealing with Foreign Students and Scholars in an Age of Terrorism: Visa Backlogs and Tracking Systems (PDF)
U.S. Congress, House of Representatives Committee on Science, March 2003
This document follows a hearing before the House Committee on Science that discussed the enhanced security measures faced by foreign students and scholars in science, mathematics, and engineering who apply for visas and subsequently enroll in academic or exchange programs in the United States. The hearing explored the development and implementation of enhanced visa adjudication and monitoring systems and their impact on individuals, universities, and research collaborations.

Defending America in the 21st Century: New Challenges, New Organizations, and New Policies: Executive Summary of Four CSIS Working Group Reports on Homeland Defense (PDF)
Center for Strategic and International Studies, 2000
This summary report characterizes homeland defense as the most essential function of our government, analyzes the ever-increasing body of threats to homeland security, and makes recommendations to improve policy, programs, and organization—in the federal, state, local, and private sectors alike—for homeland defense against diverse threats.

Defending America's Cyberspace: National Plan for Information Systems Protection (PDF)
Critical Infrastructure Assurance Office, 2000
This national plan to protect and defend America against cyber disruptions calls for partnerships between the government and private sector to create the safeguards necessary to protect critical sectors of our economy, national security, public health, and safety.

Defending the American Homeland (PDF)
Heritage Foundation Homeland Security Task Force, January 2002
This report provides recommendations for action at all levels of government to protect critical infrastructures, boost civil defense, and increase intelligence and military structures to prevent future terrorist attacks and limit the effects should one occur.

Defense Infrastructure: Actions Needed to Guide DOD's Efforts to Identify, Prioritize, and Assess Its Critical Infrastructure (PDF)
U.S. Government Accountability Office, May 24, 2007
The U.S. Department of Defense (DOD) relies on a network of infrastructure assets in the United States and abroad. The unavailability of these assets affects DOD's ability to project, support, and sustain its operations worldwide. DOD established the Defense Critical Infrastructure Program (DCIP) to identify and assure the availability of such mission-critical infrastructure. This report analyzes the extent to which DOD has developed a comprehensive management plan to implement DCIP and identified, prioritized, and assessed its critical infrastructure.

Department of Homeland Security: A Comprehensive and Sustained Approach Needed to Achieve Management Integration
Government Accountability Office, March 2005
In this report, the Government Accountability Office (GAO) examines the Department of Homeland Security (DHS), whose creation merged 22 individual agencies. GAO assessed DHS's management integration efforts against three of nine key practices consistently found with successful mergers and transformations: setting implementation goals and a timeline to build momentum and show progress, dedicating an implementation team to manage the transformation, and ensuring that top leadership drives it.

Department of Homeland Security: Addressing Management Challenges That Face Immigration Enforcement Agencies (PDF)
U.S. Government Accountability Office, May 5, 2005
This report focuses on testimony concerning two bureaus of the U.S. Department of Homeland Security that deal with immigration enforcement. The report addresses management challenges present in both bureaus, including the possibility of combining the bureaus as a remedy.

Department of Homeland Security: Billions Invested in Major Programs Lack Appropriate Oversight (PDF)
Government Accountability Office, November 2008
This report makes recommendations to help the U.S. Department of Homeland Security fully implement and adhere to its own investment review process, including tracking major investments and better integrating oversight results with budget decisions.

Department of Homeland Security: Observations on GAO Access to Information on Programs and Activities (PDF)
U.S. Government Accountability Office, April 25, 2007
In February 2007, the U.S. Government Accountability Office (GAO) questioned whether management and operational decisions made by the U.S. Department of Homeland Security (DHS) made effective, efficient, and economic use of DHS funds. This testimony describes the scope of GAO's investigation, protocols for accessing agency information, accessibility of DHS records, and steps GAO has taken to address these issues.

Department of Homeland Security: Ongoing Challenges in Creating an Effective Acquisition Organization (PDF)
U.S. Government Accountability Office, June 8, 2007
In fiscal year 2006, the U.S. Department of Homeland Security (DHS) allocated $15.6 billion to support the integration of 22 separate federal agencies and organizations into one cabinet-level acquisition organization while addressing its ongoing mission requirements and responding to natural disasters and other emergencies. This testimony discusses some of the challenges DHS has faced in creating an integrated acquisition function, the investment review process, and the agency's reliance on contracting for critical needs.

Department of Homeland Security: Progress and Challenges in Implementing the Department's Acquisition Oversight Plan (PDF)
U.S. Government Accountability Office, June 13, 2007
This report documents the Government Accountability Office's evaluation of actions the U.S. Department of Homeland Security and its components have taken to implement the acquisition oversight plan established in December 2005, and identifies challenges to its implementation.

Deterrence: From Cold War to Long War: Lessons from Six Decades of RAND Research
RAND Corporation, 2008
The 2002 U.S. national security strategy proclaimed the irrelevance of deterrence for most future threats to national security, but the 2006 version of the strategy recognized that deterrence will be as indispensable for the “long war” as it was for the Cold War. This book examines six decades of research for lessons relevant to the current and future challenges, and it concludes that deterrence remains relevant to most of the threats the United States is likely to face, including many from terrorist organizations.

DHS 2.0: Rethinking the Department of Homeland Security
The Heritage Foundation, December 2004
This report presents the conclusions of a task force that examined the organization and operation of the U.S. Department of Homeland Security (DHS). The task force, established by the Center for Strategic and International Studies and the Heritage Foundation, evaluated DHS's capacity to fulfill its mandate as described in the Homeland Security Act of 2002 based on four criteria: management, roles and missions, authorities, and resources.

DHS Multi-Agency Operation Centers Would Benefit from Taking Further Steps to Enhance Collaboration and Coordination (PDF)
U.S. Government Accountability Office, April 5, 2007
This report addresses the conference report to H.R. 5441 and Senate Report 109-273, which directed the Government Accountability Office to analyze the role of the Department of Homeland Security's National Operations Center and component operations centers and make recommendations regarding the operation and coordination of these centers.

Director of National Intelligence: Statutory Authorities
R.A. Best, A. Cumming, and T. Masse, Congressional Research Service, April 2005
In this bulletin, the Congressional Research Service concludes that the position of Director of National Intelligence, established by the Intelligence Reform and Terrorism Prevention Act of 2004, will have more authority than that of the former Director of Central Intelligence. The bulletin also explores the position's legislative management authority and other factors that will determine whether this position will be able to successfully implement the reforms mandated by the Act.

Disaster Preparedness: Better Planning Would Improve OSHA's Efforts to Protect Workers' Safety and Health in Disasters (PDF)
Government Accountability Office, March 2007
This report addresses concerns regarding the safety and health of volunteers and workers exposed to contaminated floodwaters and injured by debris while responding to the needs of Hurricane Katrina victims. The U.S. Department of Labor's Occupational Safety and Health Administration (OSHA) is responsible for coordinating federal efforts to protect the safety and health of workers involved in the response to large national disasters. The Government Accountability Office reviewed reports; analyzed data; interviewed federal, state, and local officials; and conducted site visits to determine what is known about the number of response and recovery workers deployed to the Gulf Coast in response to Hurricane Katrina; the extent to which OSHA tracked injuries and illnesses sustained by these workers; and OSHA's ability to meet the safety and health needs of these workers.

Dissuading Terror: Strategic Influence and the Struggle Against Terrorism (PDF)
Rand Corporation, 2005
U.S. government decisionmakers face a number of challenges as they attempt to form policies that aim to dissuade terrorists from attacking the United States, divert youths from joining terrorist groups, and persuade the leaders of states and nongovernmental institutions to withhold support for terrorists. The successes or failures of such policies and campaigns have long-lasting effects.

DoD Roles and Missions in Homeland Security
Defense Science Board
Among other issues, these reports look at the overlap between civilian and military homeland security and the importance of information sharing. The documents review obstacles to sharing information and proposed solutions, including increased reliance on "sensitive but unclassified" networks. Volume I evaluates the role of the Department of Defense (DoD) in homeland security and makes recommendations on how DoD can accomplish this mission. Volume II, part A and Volume II, part B are a compilation of four subpanel reports on emergency response, technology and systems, national guard roles and missions, and information sharing and analysis.

Does Our Counter-Terrorism Strategy Match the Threat? (PDF)
Rand Corporation, September, 2005
This document presents the testimony of Dr. Bruce Hoffman, RAND Corporation, before the Committee on International Relations, Subcommittee on International Terrorism and Nonproliferation, U.S. House of Representatives.

Draft National Infrastructure Protection Plan (PDF)
U.S Department of Homeland Security, November 2, 2005
This document is provided solely to effect the extensive coordination needed among federal departments and agencies; state, territorial, tribal, and local government entities; regional initiatives; and the private sector for the development of the National Infrastructure Protection Plan.

Economic Perspectives: The Global War on Terrorist Finance
U.S. Department of State, September 2004
Law enforcement authorities have achieved significant success in the mission to bankrupt the financial underpinnings of terrorism. Raising and moving money is now harder, costlier, and riskier for terrorist groups. This issue of Economic Perspectives highlights U.S. efforts to counter terrorist financing in the global war on terrorism.

Electronic Access Available to Criminal Case Files
The Third Branch, U.S. Courts, October 2004
Beginning November 1, 2004, all criminal case file documents available to the public at a courthouse will also be available remotely through the court's electronic access system. Remote electronic access to civil and bankruptcy case files has been available since 2001. Similar access in criminal cases was delayed while a pilot project involving 10 federal district courts and 1 court of appeals was conducted.

Emergency Communications: The Emergency Alert System (EAS) and All-Hazard Warnings (PDF)
Linda K. Moore, Congressional Research Service, Updated November 12, 2004
The Emergency Alert System (EAS) is built on a structure conceived in the 1950s when over-the-air broadcasting was the best available technology for widely disseminating emergency alerts. Among its weaknesses are insufficient coordination, dependence on a limited set of technologies, and diffused administration. This report summarizes EAS technology and administration, the NOAA/NWS all-hazard network, and some key proposals for change.

Emergency Preparedness and Continuity of Operations Planning (COOP) in the Federal Judiciary (PDF)
Congressional Research Service, Updated September 8, 2005
This report discusses actions taken by the Administrative Office of the United States Courts in light of the September 11, 2001 terrorist attacks, anthrax incidents that briefly affected the United States Supreme Court, and warnings of natural and manmade incursions that could interrupt court operations. It describes expectations for emergency preparedness and continuity of operations planning in the judiciary.

Fact Sheet—Progress in the Global War on Terrorism
The White House, July 1, 2003
This fact sheet discusses progress made in the U.S. war on terrorism, including Operations Enduring Freedom and Iraqi Freedom, the pursuit of a global terror network, and terrorist tracking and threat integration.

Fact Sheet: Real Progress in Reforming Intelligence (PDF)
Office of the Director of National Intelligence, January 2007
This fact sheet addresses the significant reformation and strengthening of the U.S. Intelligence Community following the appointment of the Director of National Intelligence (ODNI)—a position created by the Intelligence Reform and Terrorism Prevention Act of 2004.

Fact Sheet: Secure Border Initiative
Department of Homeland Security, November 2005
The Secure Border Initiative (SBI) is a comprehensive multiyear plan to secure America's borders and reduce illegal migration.

Fact Sheet: The Terrorist Threat to the U.S. Homeland
The White House, July 17, 2007
This National Intelligence Estimate provides a broad, strategic, and coordinated framework for understanding the terrorist threat to the United States over the next 3 years.  It lays out the intelligence community's baseline judgments to help policymakers develop and prioritize the government's response.

Fair and Secure Immigration Reform (Fact Sheet)
The White House, January 7, 2004
This fact sheet outlines the proposed temporary worker program that will match willing foreign workers with U.S. employers when no Americans can be found to fill jobs. It also explains the basis for the proposal.

FBI Responds to the Final Report of the 9/11 Commission Recommendations
Federal Bureau of Investigation, December 5, 2005
Federal Bureau of Investigation Assistant Director John Miller issued this statement regarding the 9/11 Commission Final Report.

Federal Counter-Terrorism Training: Issues for Congressional Oversight (PDF)
Congressional Research Service, May 16, 2005
This report reviews major training activities and facilities of the federal departments and agencies that provide counter-terrorism training. It also identifies some of the issues associated with that training, such as possible duplication of programs, determination of the U.S. Department of Homeland Security's (DHS) counter-terrorism priorities, and possible redundancy and coordination of DHS counter-terrorism programs.

Federal Law Enforcement: Results of Surveys of Federal Civilian Law Enforcement Components, an E-Supplement to GAO-07-121
Government Accountability Office, December 19, 2006
This document presents selected results of surveys conducted by the Government Accountability Office of 104 federal civilian components that employ law enforcement officers. A law enforcement officer was defined as a federal employee who is authorized to perform any of four specific functions: conduct criminal investigations, execute search warrants, make arrests, or carry firearms.

Federal Law Enforcement: Survey of Federal Civilian Law Enforcement Functions and Authorities, GAO-07-121 (PDF)
Government Accountability Office, December 19, 2006
This report describes the number of law enforcement officers that federal civilian law enforcement components employed as of June 30, 2006 ; the federal job series classifications used to employ them; and the sources of their primary legal authorities.

Federal Response Plan (PDF)
Federal Emergency Management Agency, April 1999
This response plan outlines how the Federal Government will assist state and local governments when a major disaster or emergency overwhelms their ability to respond effectively to save lives; protect public health, safety, and property; and restore their communities. Resulting from a signed agreement among 27 federal departments and agencies (including the American Red Cross), the plan describes the policies, planning assumptions, concept of operations, response and recovery actions, and responsibilities of each department and agency.

Federal Secrecy After September 11 and the Future of the Information Society
I/S: A Journal of Law and Policy for the Information Society, Volume 2, Issue 1, 2006
In a new issue of the journal I/S, leading scholars consider how, 5 years later, the terrorist attack has affected government secrecy, privacy policy, democratic discourse, and the use of technology.

Field Manual (FM) 3-19.15: Civil Disturbance Operations (PDF)
U.S. Department of the Army, April 18, 2005
This U.S. Army field manual sets forth military policy for dealing with civil unrest abroad and in the United States, specifically addressing the military's role in assisting civil authorities.

Force Structure: DOD Needs to Integrate Data into Its Force Identification Process and Examine Options to Meet Requirements for High-Demand Support Forces (PDF)
U.S. Government Accountability Office, September 2006
This report assesses the combat support and combat service support skills that are in high demand in Iraq and Afghanistan, the extent to which U.S. Department of Defense (DOD) officials have visibility over personnel who are available for future deployment, and the extent to which DOD has conducted a comprehensive, data-driven analysis of alternatives for providing the skills needed.

The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions (PDF)
Congressional Research Service, Updated April 21, 2005
This report examines the detailed statutory structure provided by the Foreign Intelligence Surveillance Act, other public laws, and recent court decisions. It also discusses the U.S. Foreign Intelligence Surveillance Court and the U.S. Foreign Intelligence Surveillance Court of Review.

Foreign Intelligence Surveillance Act: Annual Reports
Office of Legislative Affairs, U.S. Department of Justice
These letters, documenting applications made to the Foreign Intelligence Surveillance Court for electronic and physical searches, are submitted annually by the U.S. Department of Justice pursuant to the Foreign Intelligence Surveillance Act of 1978.

Global War on Terrorism: DOD Needs to Take Action to Encourage Fiscal Discipline and Optimize the Use of Tools Intended to Improve GWOT Cost Reporting (PDF)
Government Accountability Office, November 6, 2007
Since the September 2001 terrorist attacks, Congress has provided about $543 billion to the U.S. Department of Defense (DOD) for the Global War on Terrorism (GWOT). Prior Government Accountability Office (GAO) reports have found DOD's reported GWOT obligation data unreliable and uncovered problems with transparency over certain costs. In response, DOD changed its reporting procedures and now requires components to perform a monthly variance analysis on obligation data and to include affirmation statements attesting to the accuracy of cost data. Under the comptroller general's authority to conduct evaluations on his own initiative, GAO assessed (1) the outlook of DOD's reported GWOT obligations for FY 2007 and funding requests for FY 2008, (2) the effect of changes in DOD's GWOT funding guidance, and (3) DOD's progress in implementing variance analysis and affirmation statements. In doing this, GAO also analyzed FY 2007 GWOT-related appropriations and reported obligations, as well as DOD's corrective actions.

The Hawala Alternative Remittance System and Its Role in Money Laundering
Interpol General Secretariat, Lyon, France, January 2000
This paper presents a description of the hawala (also referred to as “hundi”) alternative remittance system. Hawala is an ancient system originating in South Asia that is used worldwide today to conduct legitimate remittances. Like any other remittance system, hawala can and does play a role in money laundering. In addition to serving as a tutorial on hawala transactions, this paper discusses how hawala is used to facilitate money laundering.

Heads We Win: The Cognitive Side of Counterinsurgency (COIN) (PDF)
RAND Corporation, March 2007
Current U.S. counterinsurgency (COIN) strategy relies heavily on the use of force against Islamist insurgents. This report addresses the need for stronger cognitive capabilities that will enable more effective COIN against the elusive, decentralized, and highly motivated Islamic insurgency by encompassing comprehension, reasoning, and decisionmaking as the components that are most effective against an enemy that is quick to adapt, transform, and regenerate.

High-Risk Series: An Update (PDF)
U.S. Government Accountability Office, January 2005
Since 1990, the Government Accountability Office (GAO) has periodically reported on federal programs and operations that it has classified as high risk due to their vulnerabilities to fraud, waste, abuse, and mismanagement. In this update, GAO identified four new areas, the first of which is establishing appropriate and effective information-sharing mechanisms to improve homeland security.

Homeland Security (PDF)
Department of Defense, August 2005
This report provides the joint doctrine that guides the U.S. Armed Forces in conducting homeland security operations. It describes the homeland security framework, mission areas, and missions and related supporting operations. It also discusses legal authorities; joint force, multinational, and interagency relationships; command and control; planning and execution; and training and resource considerations.

Homeland Security: A Competitive Strategies Approach Homeland Security: A Competitive Strategies Approach (PDF)
Center for Defense Information, 2002
This paper provides a unique and comprehensive framework for thinking about homeland security. The strategic evaluation proposed by the study examines three fundamental elements: the context in which the strategy is operative, the capabilities of potential adversaries, and the anticipated interaction of alternative strategies.

Homeland Security: Actions Needed to Better Protect National Icons and Federal Office Buildings From Terrorism (PDF)
U.S. Government Accountability Office, June 2005
This report discusses the challenges that the Department of the Interior and the General Services Administration face in protecting national icons and monuments from terrorism.

Homeland Security: A Framework for Addressing the Nation's Efforts (PDF)
U.S. General Accounting Office, September 2001
This report presents testimony before the Senate Committee on Governmental Affairs regarding U.S. security threats and countermeasures. It outlines the structure for the proposed homeland security program.

Homeland Security: Agency Plans, Implementation, and Challenges Regarding the National Strategy for Homeland Security (PDF)
U.S. Government Accountability Office, January 2005
This report reviews the National Strategy for Homeland Security and its implementation initiatives to determine whether they are being addressed by key departments' strategic planning activities.

Homeland Security: Assessment of the National Capital Region Strategic Plan (PDF)
U.S. Government Accountability Office, September 28, 2006
The Office of National Capital Region Coordination is responsible for coordinating efforts within the National Capital Region (NCR) to ensure successful execution of domestic preparedness activities. In May 2004, the U.S. Government Accountability Office (GAO) recommended that NCR develop a strategic plan to establish and monitor the achievement of regional goals and priorities for emergency preparedness and response. This testimony discusses GAO's assessment of the recently completed NCR homeland security strategic plan and the extent to which the new plan includes desirable strategic plan characteristics.

Homeland Security: Challenges and Strategies in Addressing Short- and Long-Term National Needs (PDF)
U.S. General Accounting Office, November 2001
This report presents testimony before the House Committee on the Budget that suggests that the recent establishment of the Office of Homeland Security is a good first step, but points out that questions remain about how this office will be structured, what authority the director will have, and how this effort can be institutionalized and sustained over time.

Homeland Security: Challenges Facing the Department of Homeland Security in Balancing its Border Security and Trade Facilitation Missions (PDF)
U.S. General Accounting Office, June 2003
This testimony before the U.S. House Subcommittee on Infrastructure and Border Security discusses the challenges faced by the Bureau of Customs and Border Patrol in balancing national security needs with commercial needs.

Homeland Security: DHS Is Addressing Security at Chemical Facilities, but Additional Authority Is Needed (PDF)
U.S. Government Accountability Office, June 2006
This report discusses the U.S. Department of Homeland Security's actions to develop a strategy for protecting chemical plants, assisting with the industry's security efforts, and coordinating with other federal agencies; industry security initiatives; the need for additional security legislation; and stakeholders' views on requirements to use safer technologies.

Homeland Security: DHS Privacy Office Has Made Progress but Faces Continuing Challenges (PDF)
U.S. Government Accountability Office, July 24, 2007
The Department of Homeland Security (DHS) Privacy Office was established with the appointment of the first Chief Privacy Officer in April 2003, as required by the Homeland Security Act of 2002. The Privacy Office's major responsibilities include reviewing and approving privacy impact assessments, integrating privacy considerations into the DHS decisionmaking process and ensuring compliance with the Privacy Act of 1974, and preparing and issuing reports on key privacy concerns. This report examines progress made by the DHS Privacy Office in carrying out its statutory responsibilities.

Homeland Security: Efforts to Improve Information Sharing Need to Be Strengthened (PDF)
U.S. General Accounting Office, August 2003
Since September 11, 2001, federal, state, and city governments have established initiatives to improve the sharing of information to prevent terrorism. Many of these initiatives were implemented, but not necessarily coordinated with other sharing initiatives, including those by federal agencies such as the U.S. Department of Homeland Security. This report examines (1) what initiatives have been undertaken to improve information sharing and (2) whether federal, state, and city officials believe that the current information-sharing process is effective.

Homeland Security: Establishment and Implementation of the United States Northern Command (PDF)
Congressional Research Service, February 10, 2005
The U.S. Department of Defense established the U.S. Northern Command (NORTHCOM) to fight terrorism at home. Significant organizational and procedural progress has been made in setting up NORTHCOM; however, questions remain concerning interagency relationships and information sharing. This report, to be updated as events dictate, outlines the organization of NORTHCOM and those questions yet to be resolved.

Homeland Security: Federal Efforts Are Helping to Address Some Challenges Faced by State and Local Fusion Centers (PDF)
Government Accountability Office, April 17, 2008
Following the September 11 terrorist attacks, state and local governments formed fusion centers, collaborative efforts to prevent, detect, and respond to criminal or terrorist activity. This report of the Government Accountability Office (GAO) focuses on the characteristics of fusion centers and on federal efforts to help alleviate challenges that centers have identified. The report follows upon GAO's October 2007 report and upon information GAO obtained in March 2008 by reviewing plans for selected federal efforts and by attending the second annual national fusion center conference.

Homeland Security: The Federal Protective Service Faces Several Challenges That Raise Concerns About Protection of Federal Facilities (PDF)
Government Accountability Office, June 19, 2008
The Federal Protective Service (FPS) is responsible for providing physical security and law enforcement services to about 9,000 General Services Administration facilities. This report discusses FPS's operational challenges and actions it has taken to address them, funding challenges, and how FPS measures the effectiveness of its efforts to protect the facilities.

Homeland Security: Further Actions Needed to Coordinate Federal Agencies' Facility Protection Efforts and Promote Key Practices (PDF)
U.S. Government Accountability Office, November 30, 2004
This report reviews the status of physical security of federal facilities, including development of protection standards, identification of key protection practices, and identification of obstacles to implementing some of these practices.

Homeland Security: Information Sharing Responsibilities, Challenges, and Key Management Issues (PDF)
U.S. General Accounting Office, September 2003
This report summarizes findings and recommendations related to the U.S. Department of Homeland Security's (DHS) information sharing efforts. Overall, DHS will need to develop effective information-sharing systems and mechanisms; address organizational and information architecture challenges; and create effective working relationships, cooperation, and trust with other federal agencies, state and local governments, and the private sector.

Homeland Security: Management Challenges Facing Federal Leadership (PDF)
U.S. General Accounting Office, 2002
Presented by the U.S. General Accounting Office (GAO), this report presents findings from a study that analyzed the Federal Government's response to terrorism and homeland security. The report presents two principal conclusions: (1) homeland security efforts are underway but still evolving; (2) efforts to improve homeland security will require a results-oriented approach to ensure accountability and sustainability over time.

Homeland Security: Observations on DHS and FEMA Efforts to Prepare for and Respond to Major and Catastrophic Disasters and Address Related Recommendations and Legislation (PDF)
U.S. Government Accountability Office, July 31, 2007
The Federal Emergency Management Agency (FEMA) must simultaneously prepare for hurricane season and implement the reorganization requested by the Post-Katrina Emergency Management Reform Act of 2006. The act stipulates that FEMA make major changes to enhance its preparedness for and response to disasters. FEMA also faces continued challenges, such as clearly defining leadership roles and responsibilities, developing better disaster response capabilities, and establishing accountability systems to protect against waste, fraud, and abuse. This testimony summarizes FEMA's efforts to address these challenges and discusses several disaster management issues that need continued congressional attention.

Homeland Security: Preparing for and Responding to Disasters (PDF)
Government Accountability Office, March 2007
The Post-Katrina Emergency Management Reform Act of 2006 stipulates major changes to the Federal Emergency Management Agency (FEMA) to improve the agency's preparedness for and response to catastrophic disasters. This testimony discusses the extent to which the U.S. Department of Homeland Security has taken steps to overcome the challenges of clearly defining leadership roles and responsibilities, developing necessary disaster response capabilities, and establishing accountability systems that will provide effective response while also protecting against waste, fraud, and abuse. This testimony summarizes earlier reports on leadership, response capabilities, and accountability controls; organizational changes provided for in the Post-Katrina Reform Act; and disaster management issues for continued congressional attention.

Homeland Security: Progress Has Been Made to Address the Vulnerabilities Exposed by 9/11, but Continued Federal Action Is Needed to Further Mitigate Security Risks (PDF)
Government Accountability Office, January 24, 2007
This report discusses the post-September 11, 2001 enhancement of commercial aviation security; visa-related policies and programs to help screen out potential terrorists; federal border security initiatives to hinder terrorists trying to enter the country through legal checkpoints; and how the U.S. Department of Homeland Security and other agencies are addressing several major strategic challenges.

Homeland Security: Observations on the National Strategies Related to Terrorism (PDF)
U.S. Government Accountability Office, September 2004
This report features the statement of Norman J. Rabkin, the Managing Director of the Government Accountability Office, before the House Committee on Government Reform. His testimony covers three major topics: the alignment of recommendations issued by the 9/11 Commission with the National Strategy for Homeland Security and the National Strategy for Combating Terrorism, key department responsibilities and actions for implementing the homeland security strategy, and challenges faced by departments assessing their progress toward achieving homeland security objectives.

Homeland Security Budget in Brief: Fiscal Year 2005 (PDF)
U.S. Department of Homeland Security, 2004
This summary presents key themes and funding recommendations from the U.S. Department of Homeland Security's proposed fiscal year 2005 budget.

Homeland Security Centers of Excellence: Partnering with the Nation's Universities
U.S. Department of Homeland Security, January 2005
Through the Homeland Security Centers of Excellence program, the Department of Homeland Security is investing in university-based partnerships to develop centers of multidisciplinary research that will analyze important fields of inquiry and develop, debate, and share best practices. The centers bring together the nation's best experts and focus its most talented researchers on various topics, including explosives, cyberterrorism, the behavioral aspects of terrorism, and agricultural, chemical, biological, nuclear, and radiological threats.

Homeland Security Report, No. 168
Memorial Institute for the Prevention of Terrorism, December 2006
This issue of the Homeland Security Report is geared toward keeping industry and law enforcement professionals informed of homeland security issues. It revisits the Boyd Cycle discussion and addresses homeland security operations centers.

Homeland Security Report No. 166 (PDF)
The Homeland Security Group, October 2006
This issue of the Homeland Security Report is geared toward informing industry and law enforcement professionals of homeland security issues. It includes the conclusion of the Boyd Cycle discussion, discusses the Coast Guard's takeover of air intercept operations for the National Capital Region, and discusses border security, and search and seizure.

Homeland Security Report No. 164 (PDF)
Homeland Security Group, August 2006
Geared toward keeping industry and law enforcement professionals informed of homeland security issues, this report discusses a security system that can be used in passenger trains; Homeland Security Secretary Michael Chertoff's plan to control the nation's borders; protecting the nation's cyber and telecommunications infrastructure; and a new maritime security strategy for the U.S. Coast Guard.

Global War on Terrorism: Reported Obligations for the Department of Defense (PDF)
U.S. Government Accountability Office, July 26, 2007
Since 2001, Congress has provided the Department of Defense (DOD) with billions of dollars in supplemental and annual appropriations for military operations in support of the Global War on Terrorism (GWOT). DOD's reported annual costs for GWOT have steadily increased from about $0.2 billion in fiscal year 2001 to about $161.8 billion in fiscal year 2007. To continue its GWOT operations, DOD has requested $141.7 billion in appropriations for fiscal year 2008. This report is one of monthly supplemental and cost of war execution reports issued by DOD.

Immigration Benefits and Terrorism: Moving Beyond the 9/11 Staff Report on Terrorist Travel (PDF)
Center for Immigration Studies, September 2005
This report by Janice Kephart, former counsel to the September 11 Commission, discusses the immigration histories of 94 terrorists who operated in the United States between the early 1990s and 2004, including the September 11 hijackers.

Immigration Enforcement: DHS Has Incorporated Immigration Enforcement Objects and Is Addressing Future Planning Requirements (PDF)
U.S. Government Accountability Office, October 2004
This report reviews how the Bureau of Immigration and Customs Enforcement, U.S. Department of Homeland Security, integrated the five nonborder-related enforcement functions of the former Immigration and Naturalization Service.

Immigration Enforcement Within the United States (PDF)
Congressional Research Service, April 6, 2006
An estimated 11 million unauthorized aliens live in the United States, and estimates indicate that this population increases by 500,000 annually. Each year, approximately 1 million aliens are apprehended trying to enter the United States illegally. Although most of these aliens “enter without inspection” for economic opportunities, to join their families, or to avoid civil strife and political unrest in their home countries, some are criminals, and some may be terrorists. This report provides an overview of issues affecting interior and border enforcement of the nation's immigration laws.

Immigration: S Visas for Criminal and Terrorist Informants (PDF)
Congressional Research Service, Updated January 19, 2005
In response to the terrorist acts of September 11, 2001, legislation amending the Immigration and Nationality Act was passed that allows aliens with critical information on criminal or terrorist organizations to enter the United States on “S” visas to provide information to law enforcement. Up to 200 criminal and 50 terrorist informants may be admitted annually. This report provides background information and the current status of “S” visa immigrants

In the Name of National Security: U.S. Counterterrorist Measures, 1960-2000
Executive Session on Domestic Preparedness, August 2001
This report discusses U.S. measures to counter conventional, chemical, biological, nuclear, and radiological terrorism, examines the development of America's counter-terrorism strategy, and considers factors that have shaped the American response.

Information and the War Against Terrorism
American Society for Information Science and Technology, 2002
This series of bulletins purports that information and information theory are the most important factors in the U.S. war against terrorism. The author examines information as a war tool and explains the legal and political authority for its covert use.
Part I. Information and the War Against Terrorism.
Part II. Were American Intelligence and Law Enforcement Effectively Positioned to Protect the Public?
Part III. New Information-Related Laws and the Impact on Civil Liberties.
Part IV. Civil Liberties Versus Security in the Age of Terrorism.
Updates in the War Against Terrorism.
Part V. The Business Implications.

Information Security: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US–VISIT Program (PDF)
U.S. Government Accountability Office, July 13, 2007
The United States Visitor and Immigrant Status Indicator Technology (US–VISIT) program is intended to enhance the security of U.S. citizens and visitors and encompasses the pre-entry, entry, departure, and status management of foreign national travelers who enter and leave the country at 285 air, sea, and land ports of entry. This report discusses whether the U.S. Department of Homeland Security has implemented appropriate controls to protect the confidentiality, integrity, and availability of the information and systems used to support the US–VISIT program.

Information Security: Sustained Progress Needed to Strengthen Controls at the Securities and Exchange Commission (PDF)
Government Accountability Office, March 2007
The Securities and Exchange Commission (SEC) relies extensively on computerized systems to ensure that securities markets are fair, orderly, and efficiently maintained. Integrating effective information security controls into a layered control strategy is essential to ensure that SEC's financial and sensitive information are protected from inadvertent or deliberate misuse, disclosure, or destruction. This report assesses the SEC's actions to correct previously reported information security weaknesses, and the effectiveness of controls for ensuring the confidentiality, integrity, and availability of SEC's information systems and information.

Information Sharing for Homeland Security: A Brief Overview (PDF)
H.C. Relyea and J.W. Seifert, Congressional Research Service, January 10, 2005
This report reviews some of the principal existing and projected homeland security information sharing arrangements and discusses related policy, evaluations, and proposed legislation.

Inside ICE
Bureau of Immigration and Customs Enforcement, U.S. Department of Homeland Security
This monthly electronic newsletter reports on activities of the Bureau of Immigration and Customs Enforcement (ICE), including arrest and interdiction information in immigration-related terrorism cases. ICE is the largest investigative arm of the Department of Homeland Security.

Intelligence Issues for Congress (PDF)
Congressional Research Service, July 12, 2006
This report analyzes the most recent developments, proposed and implemented, in handling U.S. intelligence matters, including the effects of recommendations by the 9/11 Commission, international terrorism, intelligence support to military operations, and recently passed legislation.

Intelligence Reform and Terrorism Prevention Act of 2004: "Lone Wolf" Amendment to the Foreign Intelligence Surveillance Act (PDF)
E. Bazan, Congressional Research Service, December 29, 2004
This paper explains the "Lone Wolf Amendment," noting what has and has not changed regarding this newly defined category of individuals now penalized under the Foreign Intelligence Surveillance Act (FISA). A lone wolf is a non-United States person who engages in international terrorism or prepares for international terrorist activities and is deemed to be an "agent of a foreign power" under FISA.

Intelligence Reform and Terrorism Prevention Act of 2004: National Standards for Drivers' Licenses, Social Security Cards, and Birth Certificates (PDF)
Congressional Research Service, January 6, 2005
Identification fraud is no longer simply a matter of theft; it now complicates the government's ability to adequately ensure public safety at vulnerable facilities. This report considers provisions regarding national standards for personal identification that were codified in the Intelligence Reform and Terrorism Prevention Act of 2004, pros and cons that were discussed by the legislators, and provisions that may be revisited in the future.

Interim National Preparedness Goal (PDF)
U.S. Department of Homeland Security, March 2005
This report summarizes the initial results of Homeland Security Presidential Directive 8: National Preparedness (SPD-8), which transformed how the federal government proposes to strengthen the preparedness of the United States to prevent, protect against, respond to, and recover from terrorist attacks, major disasters, and other emergencies.

The Internal Effects of the Federal Bureau of Investigation's Reprioritization (PDF)
Office of the Inspector General, U.S. Department of Justice, September 2004
This report proposes that in light of the FBI's post-9/11 shift of a significant number of agents from traditional criminal investigation to counter-terrorism and counter-intelligence, other federal, state, and local law enforcement agencies may be able to take on increased responsibilities for certain non-terrorism-related investigations.

International Affairs: Information on U.S. Agencies' Efforts to Address Islamic Extremism (PDF)
U.S. Government Accountability Office, September 16, 2005
U.S. government and other experts have reported that Islamic extremism is on the rise and that its propagation is the preeminent threat facing the United States. In addition, various sources have alleged that Saudi Arabia is one source that has supported and funded the spread of Islamic extremism globally. This report documents the findings of the U.S. Government Accountability Office (GAO), which was asked to identify efforts that U.S. government agencies are implementing to identify, monitor, and counter the support and funding of the global spread of Islamic terrorism, with a particular focus on Saudi sources (i.e., private entities, individuals, Saudi government organizations, or entities originating in other countries). GAO also addresses efforts the government of Saudi Arabia has taken to staunch Islamic extremism.

International Financial Crime: Treasury's Roles and Responsibilities Relating to Selected Provisions of the USA PATRIOT Act (PDF)
U.S. Government Accountability Office, May 2006
The U.S. Department of the Treasury and its Financial Crimes Enforcement Network (FinCen) take an active role in combating money laundering and terrorist financing, as laid out in Section 330 of the USA PATRIOT Act, which encourages the federal government to negotiate with foreign countries to ensure that their financial institutions maintain adequate records to combat these crimes. In this report to the House of Representatives' Committee on the Judiciary, the U.S. Government Accountability Office describes (1) how the Treasury Department has approached these negotiations, (2) how FinCEN has helped establish and enhance financial intelligence units in foreign countries, and (3) what actions FinCEN is taking to maximize its performance as a global partner.

Investigating Money Laundering and Terrorist Financing: Federal Law Enforcement Agencies Face Continuing Coordination Challenges (PDF)
U.S. General Accounting Office, May 2004
This document examines whether the nation's annual National Money Laundering Strategy has been useful for guiding federal law enforcement efforts to combat money laundering and terrorist financing. It also reports on the FBI's and U.S. Immigration and Customs Enforcement's implementation of recommendations made in a May 2003 memorandum of agreement signed by the Attorney General and the Secretary of Homeland Security.

Islam and the West: Searching for Common Ground—The Terrorist Threat and the Counter-Terrorism Effort (PDF)
RAND Corporation, testimony presented to the Senate Foreign Relations Committee, July 2006
In the fight against terrorism, how can we best ensure that our own assessments and analyses are anchored firmly to sound empirical judgment and not blinded by conjecture, mirror-imaging, politically partisan prisms, or wishful thinking? How can we ensure that our counter-terrorism policy is sufficiently comprehensive, well-crafted, and effectively directed? This testimony addresses these questions and more.

Journalism, Security and the Public Interest: Best Practices for Reporting in Unpredictable Times
Adam Clymer, Aspen Institute, 2003
A symposium at the Aspen Institute Conference on Journalism and Society in June 2003 yielded this set of best practices for journalists, editors, and media executives to consider when reporting on a story with national security implications. Officials who deal with sensitive information but who must also address the media may find this publication of interest.

Journalists' Privilege to Withhold Information in Judicial and Other Proceedings: State Shield Statutes
H. Cohen and C. Lening., Congressional Research Service, Posted by the U.S. Department of State, Foreign Press Center, March 2005
This report provides an overview of general trends among states' individual statutes regarding journalist “shield laws” and sets forth the full text of state shield statutes. According to the Congressional Research Service, absent a statutory or constitutional recognition of journalistic privilege, a reporter may be compelled to testify in legal, administrative, or other governmental proceedings. To date, 31 states and the District of Columbia have recognized a journalist's privilege by enacting press “shield laws,” which protect the relationships between reporters and their sources, and at times, the information that may be communicated in those relationships. The privilege vests only with the journalist, however, not with the journalist's source of information.

Keeping Extremists Out: The History of Ideological Exclusion, and the Need for Its Revival (PDF)
Center for Immigration Studies, September 2005
This report discusses the exclusion and deportation of immigrants in general and the history of ideological exclusion, including the McCarran-Walter ideological exclusion and its demise in 1990. It also examines parallels between previous exclusionary policies, particularly those of the Cold War, and today's heightened concerns with Islamic fascism after the September 11 attacks. It also offers recommendations for today's immigration policy.

The Lasting Challenge: A Strategy for Counterterrorism and Asymmetric Warfare (PDF)
Center for Strategic and International Studies, November 2001
This report discusses the broad forces at work in terrorism and asymmetric warfare, how to minimize the risk of future terrorist attacks and implement effective U.S. or international strategies, and how best to deal with acts of terrorism if they occur.

Latin America: Terrorism Issues (PDF)
M. Sullivan, Congressional Research Service, January 14, 2005
This report summarizes U.S. concerns about terrorism issues in Latin America, including the tri-border area between Argentina, Brazil, and Paraguay. It also details how Latin American countries have acted to decrease the likelihood of terrorist activity or attacks inside their borders.

Laws and Regulations Governing the Protection of Sensitive but Unclassified Information (PDF)
Federal Research Division, Library of Congress, September 2004
Although there is growing concern in the post-9/11 environment that guidelines for protecting sensitive but unclassified information are needed, a uniform legal definition or set of procedures that apply to all federal agencies does not exist. This report sets forth the body of statutes, regulations, and executive branch directives that currently define and govern access to sensitive but unclassified information. New regulations are being developed by the U.S. Department of Homeland Security.

Legislative Initiatives to Temporarily Relocate Federal Courts Interrupted by Natural or Man-Made Disasters, 109th Congress (PDF)
Congressional Research Service, September 8, 2005
This report considers the issues involved in legislation that might authorize courts affected by natural or manmade disasters to meet outside the geographic boundaries of their circuits or districts. It provides information on pending legislation and will be updated as events warrant.

Major Management Challenges and Program Risks: Department of Homeland Security (PDF)
U.S. General Accounting Office, January 2003
The U.S. Department of Homeland Security (DHS), expected to be the Federal Government's third largest government agency, was formed to address the following issues: border and transportation security; emergency preparedness and response; chemical, biological, radiological, and nuclear countermeasures; and information analysis and infrastructure protection. The information presented in this report is intended to focus congressional and departmental attention on the challenges faced by DHS.

Major Management Challenges Facing the Department of Homeland Security (PDF)
Office of Inspector General, December 2005
This report discusses major management challenges facing the Department of Homeland Security. It is one of a series of audit, inspection, and special reports prepared to promote economy, effectiveness, and efficiency within the department.

Mapping the Jihadist Threat: The War on Terror Since 9/11 (PDF)
The Aspen Institute, 2006
This collection of papers covers various aspects of the jihadist threat, including terrorists' use of modern technologies—such as the Internet—as weapons and recruitment tools; a potential Sunni/Shiite break in the Middle East as a result of the war in Iraq; the spread of Islamist fundamentalism around the world; and the political and military strategies available to the United States and its allies in this ongoing struggle.

Maritime Security: National Strategy and Supporting Plans Were Generally Well-Developed and Are Being Implemented (PDF)
Government Accountability Office, June 2008
The safety and economic security of the United States depends on the secure use of the world's seaports and waterways. The U.S. Department of Homeland Security has been directed to develop and implement a National Strategy for Maritime Security. This report discusses the extent to which the strategy and its supporting plans contain desirable characteristics of an effective national strategy and the reported status of the implementation of these plans.

Maritime Security: Public Safety Consequences of a Terrorist Attack on a Tanker Carrying Liquefied Natural Gas (PDF)
Government Accountability Office, March 2007
The United States imports natural gas by pipeline from Canada and by tanker as liquefied natural gas (LNG)—a super cooled form of natural gas—from overseas. The Department of Energy expects that by the year 2030 LNG will account for approximately 17 percent of the total U.S. natural gas supply. This report addresses concerns about whether this increase in LNG tankers will make them more susceptible to a terrorist attack, which could cause the LNG cargo to spill and catch on fire, and potentially to explode.

Martial Law and National Emergency (PDF)
H.C. Relyea, Congressional Research Service, January 7, 2005
This report reviews the concept of, exercise of, and authority underlying martial law.

Meeting the Challenges of Establishing a New Department of Homeland Security (PDF)
Center for Strategic and International Studies, 2002
This white paper examines considerations for decisionmakers building a homeland security strategy and provides recommendations to form and strengthen the Department of Homeland Security, facilitate more effective intelligence sharing and analysis, forge links between the Department of Homeland Security and other government departments and agencies, establish close private sector ties, and foster better communication with the American people.

Meeting the Homeland Security Challenge: A Principled Strategy for a Balanced and Practical Response
U.S. Coast Guard, September 2001
This article examines the challenge of homeland security and identifies four principles essential to crafting an effective and affordable response to problems of national security.

Memorandum for the Heads of Executive Departments and Agencies
The White House, May 9, 2008
This memorandum establishes a standard framework to facilitate and enhance the sharing of Controlled Unclassified Information.

The Middle East: The Changing Strategic Environment (PDF)
RAND Corporation, June 2006
This publication summarizes “The Middle East: Changing Strategic Environment” conference held in Gstaad, Switzerland in June 2006 by the Geneva Centre for Security Policy and the RAND Center for Middle East Public Policy. Attendees discussed democracy and stability in Syria, Jordan, Lebanon, Turkey, Palestine, and Israel; Iran's nuclear program; the roles of the United States, the European Union, and the United Nations Security Council in promoting stability and change in the region; strategies for countering Islamic terrorism; and developments in Saudi Arabia and Egypt.

The MIPT Terrorism Annual 2006 (PDF)
National Memorial Institute for the Prevention of Terrorism, 2006
The MIPT Terrorism Annual contains articles from some of the world's foremost experts on terrorism, such as Peter Chalk, Brian A. Jackson, Rollie Lal, William Rosenau, and Farhana Ali. Topics include change and continuity in terrorist tactics over the past 25 years; profiles of female suicide bombers; maritime terrorism in the contemporary era; and the role of subversion in terrorism. This volume also features essential terrorism statistics for 2005.

Military Commission Instruction: Crimes and Elements for Trials by Military Commission (DRAFT) (PDF)
U.S. Department of Defense, February 2003
This document identifies crimes that may be tried by military commissions. The crimes and elements described in the document derive from the law of armed conflict, a body of law that is sometimes referred to as the law of war.

Military Support of Civil Authorities: A New Focus For a New Millennium
Major General Bruce M. Lawlor, September 2001
This article by the first commanding general of Joint Task Force Civil Support (JTF-CS) discusses military support to civil authorities during emergency response efforts. The JTF-CS mission is to provide military support within the United States, its possessions, and territories.

Misfortunes of War: Press and Public Reactions to Civilian Deaths in Wartime (PDF)
RAND Corporation, February 15, 2007
This monograph analyzes media and public reactions to civilian casualty incidents and whether these incidents affect media reporting or public support for military operations. Among the incidents analyzed in this report are the February 1991 bombing of the Al Firdos bunker in the Gulf War; the April–May 1999 attacks on the Djakovica convoy and Chinese embassy during the war in Kosovo; and the March 2003 Baghdad marketplace explosion.

Mutual Aid: Multijurisdictional Partnerships for Meeting Regional Threats (PDF)
Bureau of Justice Assistance, 2005
This monograph presents numerous examples of the efforts regions throughout the country have made to work in collaborative partnerships across jurisdictions. One of four Promising Practices Reviews from the Post-9/11 Policing Project, this monograph provides agencies interested in taking a more regional approach to terrorism prevention, preparedness, and response with varied initiatives on which to base proposals for mutual aid agreements.

National Applications Office Certification Review (PDF)
Government Accountability Office, November 6, 2008
The National Applications Office (NAO) makes available information derived from intelligence community sources (mostly government satellites) to civil domestic users and to homeland security and law enforcement agencies. This report makes recommendations for the improvement of NAO's legal review process and privacy controls.

The National Biodefense Analysis and Countermeasures Center: Issues for Congress (PDF)
Congressional Research Service, April 25, 2005
The construction of the planned National Biodefense Analysis and Countermeasures Center will be the first U.S. Department of Homeland Security (DHS) laboratory specifically focused on biodefense. This brief discusses pending policy issues regarding the lab, including construction funding, transparency of research activities to be conducted, and potential for duplication of efforts between DHS and other federal entities.

National Border Patrol Strategy (PDF)
U.S. Customs and Border Protection, August 21, 2007
This strategy provides the necessary goal, objectives, strategies, and measures for Border Patrol planning and operations and will be used as the basis for management decisions and resource deployment. This strategy specifically addresses three of the U.S. Customs and Border Protection's strategic goals—preventing terrorism, strengthening control of the United States  borders, and protecting America and its citizens.

National Criminal Intelligence Sharing Plan (PDF)
U.S. Department of Justice, Office of Justice Programs, October 2003
The National Criminal Justice Intelligence Sharing Plan is a formal intelligence sharing initiative that securely links local, state, tribal, and federal law enforcement agencies, facilitating the exchange of critical intelligence information. It contains model policies and standards and describes a nationwide communications capability that will link all levels of law enforcement personnel.

National Incident Management System (NIMS) (PDF)
U.S. Department of Homeland Security, March 1, 2004
NIMS is the nation's first standardized management approach that unifies federal, state, and local lines of government to prevent, prepare for, respond to, and recover from domestic incidents, regardless of cause, size, or complexity. This report establishes the basic elements of NIMS and provides mechanisms for future development and refinement.

National Infrastructure Protection Plan (PDF)
U.S. Department of Homeland Security, June 2006
The goal of the National Infrastructure Protection Plan is to build a safer, more secure, and more resilient America by better protecting its critical infrastructure to prevent, deter, neutralize, or mitigate the effects of terrorist efforts to destroy, incapacitate, or exploit this infrastructure. The plan also seeks to strengthen national preparedness, timely response, and rapid recovery in the event of an attack, natural disaster, or other emergency.

National Institute of Justice 2005 Annual Report
National Institute of Justice, U.S. Department of Justice, December 2006
This report recounts the National Institute of Justice's yearly accomplishments in law enforcement, crime prevention, and interven­tion strategies, including breakthroughs in technology research and development, particularly those involving DNA analysis, biometrics, and less-lethal technologies. Complementary social science research assessing the impact of technological change is also included.

The National Intelligence Strategy of the United States (PDF)
Office of the Director of National Intelligence, October 26, 2005
This document outlines the strategic objectives of mission and enterprise, and sets forth the framework for a more unified, coordinated, and effective intelligence community.

National Policy Summit: Building Private Security/Public Policing Partnerships To Prevent and Respond to Terrorism and Public Disorder
International Association of Chiefs of Police and Office of Community Oriented Policing Services, September 2004
This publication reports on a meeting of leaders in law enforcement and private security to discuss the level of partnership between public policing and private security.

National Preparedness: Integration of Federal, State, Local, and Private Sector Efforts Is Critical to an Effective National Strategy for Homeland Security (PDF)
U.S. General Accounting Office, April 2002
This report presents testimony before the House Subcommittee on Economic Development, Public Buildings, and Emergency Management on the interests, capacity, and challenges facing government policymakers when addressing national security at federal, state, and local levels. The text examines terrorism and emergency preparedness, integrated response, policy options for the design of federal assistance, and previous studies and reports on these topics.

National Response Plan (PDF)
U.S. Department of Homeland Security, December 2004
The National Response Plan establishes a single, comprehensive framework for managing domestic incidents. The plan ties together a complete spectrum of incident management activities such as preventing, preparing for, responding to, and recovering from terrorism, major national disasters, and other major emergencies. It provides structure and a mechanism for coordinating federal support to state, local, and tribal incident managers and for exercising direct federal authorities and responsibilities. A brochure, fact sheet, and online training are also available.

National Security Education Program: Background and Issues (PDF)
J.J. Kuenzi, Congressional Research Service, January 21, 2005
Since the terrorist attacks of September 11, Congress has become increasingly interested in the National Security Education Program (NSEP) and other federal programs that aid critical foreign language and area studies. This report provides background information on NSEP and an analysis of related issues, including the yet-to-be-established Intelligence Community Scholarship Program.

National Security Space Launch Report (PDF)
RAND Corporation, August 2006
In 1994, the National Space Transportation Policy laid the framework for appropriate government agencies to maintain strong launch systems and infrastructure while modernizing space transportation capabilities and encouraging cost reductions. In 2004, Congress directed a panel of experts with extensive space launch and operations backgrounds to address the future National Security Space Launch requirements and the means for meeting them. This report analyzes the panel's findings and recommendations.

The National Security Strategy of the United States of America (PDF)
The White House, September 2002
This publication provides an overview of the national strategy to defend and preserve peace, promote global security, and resist aggression and threats to national security.

National Security Whistleblowers
Congressional Research Service, December 2005
This report describes the power struggle between the executive branch and Congress that has lasted for several decades.

National Special Security Events (PDF)
Congressional Research Service, March 19, 2008
National Special Security Events (NSSEs) are designated by the President or the Secretary of the U.S. Department of Homeland Security, and have included Presidential inaugurations, Presidential nominating conventions, major sports events, and major international meetings. The U.S. Secret Service is by law the lead federal agency responsible for coordinating, planning, exercising, and implementing security for such occasions. This report reviews the Secret Service's authority over these events and NSSE funding and training.

The National Strategy for Aviation Security (PDF)
The White House, March 26, 2007
The security and economic prosperity of the United States depends significantly on the secure operation of its aviation system and use of the world's airspace. Terrorists, criminals, and hostile nation-states have long viewed aviation as a target for attack and exploitation. This strategy aligns federal government aviation security programs and initiatives into a comprehensive and cohesive national effort involving appropriate local, state, federal, and tribal governments, as well as the private sector, to provide active, layered aviation security for the United States.

National Strategy for Combating Terrorism (PDF)
The White House, September 2006
Substantial progress has been made since September 11, 2001 in degrading the al Qaeda network, killing or capturing key lieutenants, eliminating safe havens, and disrupting existing lines of support. This updated strategy is built directly from the National Security Strategy issued in March 2006 as well as the February 2003 National Strategy for Combating Terrorism, and incorporates increased understanding of our enemies in the War on Terror.

National Strategy for Homeland Security (PDF)
Office of Homeland Security, July 2002
This report presents the Administration's national strategy for homeland security—a comprehensive plan for using America's talents and resources to enhance our protection from and reduce our vulnerability to terrorist attacks.

National Strategy for Maritime Security (PDF)
Office of the President, 2005
Maritime security is best achieved by blending public and private maritime security activities on a global scale into an integrated effort that addresses all maritime threats. The new National Strategy for Maritime Security aligns all federal government maritime security programs and initiatives into a comprehensive and cohesive national effort involving the appropriate federal, state, local, and private-sector entities.

National Strategy to Combat Terrorist Travel (PDF)
National Counterterrorism Center, May 2, 2006
The director of the National Counterterrorism Center has submitted to Congress the National Strategy to Combat Terrorist Travel report. This unclassified report follows the classified version, which was submitted to Congress in February 2006. Both were prepared pursuant to Section 7201 of the Intelligence Reform and Terrorism Prevention Act of 2004. The strategy contains an overview of the many U.S. government initiatives currently underway to address the terrorist travel problem. In addition, the strategy describes continuing challenges the nation faces in restricting terrorist mobility.

New Challenges, New Tools for Defense Decisionmaking
RAND, 2003
The collapse of the Soviet Union and the end of the Cold War—compounded by the terrorist attacks of September 11, 2001—transformed the task of U.S. foreign and defense policymaking. This book outlines the dimensions of that transformation and identifies tools for dealing with new policy challenges.

A New National Priority: Enhancing Public Safety and Health Through Domestic Preparedness
Executive Session on Domestic Preparedness, March 2001
This Perspectives on Preparedness bulletin analyzes risk associated with weapons of mass destruction and assesses the U.S. domestic preparedness program. It discusses seven key challenges to building interagency and interjurisdictional cooperation to achieve national security and public safety.

A New National Security Strategy in an Age of Terrorists, Tyrants, and Weapons of Mass Destruction: Three Options Presented as Presidential Speeches (PDF)
Council on Foreign Relations, June 2003
This report features three speeches advocating potential national security strategies for addressing foreign relations in a post-September 11 era.

NIMS Online.com
Emergency Management and Command International
Though not affiliated with the U.S. Department of Homeland Security or any other federal, state, or local governmental agency, this portal web site was created to support federal, state, tribal, and local efforts to implement the National Incident Management System (NIMS). It provides NIMS news and access to open-source documents. In essence, it is as an information guide for the developing NIMS community.

No Need for the CLEAR Act: Building Capacity for Immigration Counterterrorism Investigations
James Jay Carafano, The Heritage Foundation, April 21, 2004
The proposed Clear Law Enforcement for Criminal Alien Removal (CLEAR) Act will require state and local law enforcement agencies to enforce federal civil immigration laws. This paper (also available in PDF format) examines the impact that CLEAR will have on state and local law enforcement agencies, describes potential flaws in the act, and recommends other ways to enhance counter-terrorism efforts.

Office of Air and Marine Operations Moved to U.S. Customs and Border Protection
U.S. Department of Homeland Security, November 2, 2004
The Office of Air and Marine Operations has been transferred from the U.S. Bureau of Immigration and Customs Enforcement to the U.S. Bureau of Customs and Border Protection. This planned move helps integrate air and marine law enforcement personnel, missions, and assets and is consistent with congressional action outlined in the FY 2005 Department of Homeland Security appropriations bill.

The Office for Domestic Preparedness Guidelines for Homeland Security: Prevention and Deterrence (PDF)
U.S. Department of Homeland Security, Office for Domestic Preparedness, June 2003
This booklet contains guidelines for homeland security that represent a set of general activities, objectives, and elements that organizations, as well as those in command positions within the organizations, should consider in the development of prevention plans. The guidelines are divided into the functional categories of collaboration, information sharing, threat recognition, risk management, and intervention.

Oklahoma City Bombing: Was There A Foreign Connection? (PDF)
Memorial Institute for the Prevention of Terrorism , December 2006
This report examining the investigation of the Oklahoma City Bombing presents findings, conclusions, and discoveries related to the possibility of a foreign terror connection.

On "Other War": Lessons from Five Decades of RAND Counterinsurgency Research (PDF)
RAND Corporation, August 2006
Although Operations Enduring Freedom and Iraqi Freedom have showcased the technological capability and professional prowess of the U.S. military in conventional operations, the insurgency and instability in both Afghanistan and Iraq have proved much more difficult to surmount for both the military and civilian agencies. This difficulty may embolden future opponents to embrace insurgency in combating the United States. This study makes recommendations for improving counterinsurgency operations based on a decades-long study.

Operation Liberty Shield (Fact Sheet)
Federal Emergency Management Agency, March 2003
This fact sheet describes Operation Liberty Shield, a comprehensive national plan designed to increase protections for America’s citizens and infrastructure while maintaining the flow of goods and people across U.S. borders with minimal disruption to the economy and citizens’ way of life. Operation Liberty Shield is a multidepartment, multiagency, national team effort.

Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning (PDF)
Government Accountability Office, March 2007
This testimony discusses the level of security provided by U.S. forces for Iraqi conventional munitions storage sites, and actions taken by the U.S. Department of Defense to mitigate risks associated with an adversary's conventional munitions storage sites for future operations based on lessons learned from the March 2003 Operation Iraqi Freedom invasion.

Organizing for Homeland Security (PDF)
RAND, 2002
This issue paper discusses the critical issues involved in designing the homeland security organization and in achieving its goals. It compares existing coordinating organizations responsible for national security, economics, intelligence, and drug control and presents the restructuring recommendations of three commissions and a nongovernmental group.

Organization and Mission of the Emergency Preparedness and Response Directorate: Issues and Options for the 109th Congress (PDF)
Congressional Research Service, September 2005
This report covers U.S. Department of Homeland Security Secretary Michael Chertoff's assessment of department functions known as the second-stage review and recommendations to dismantle the Emergency Preparedness Response Directorate, also referred to as the Federal Emergency Management Agency (FEMA).

Posthearing Questions from the September 17, 2003, Hearing on "Implications of Power Blackouts for the Nation's Cybersecurity and Critical Infrastructure Protection: The Electric Grid, Critical Interdependencies, Vulnerabilities, and Readiness" (PDF)
U.S. General Accounting Office (GAO), December 8, 2003
In this letter report, GAO responds to questions from the House Select Committee on Homeland Security about an August 2003 GAO report that discusses challenges the U.S. Department of Homeland Security faces in integrating its information gathering and sharing functions, particularly those related to critical infrastructure protection.

Preliminary Observations on the Use and Oversight of U.S. Coalition Support Funds Provided to Pakistan (PDF)
Government Accountability Office, May 6, 2008
U.S. Coalition Support Funds reimburse coalition countries for logistical and military support provided to United States military operations in the global war on terror. The Pakistani government receives reimbursements for attacking terrorist networks in its Federally Administered Tribal Areas and for stabilizing its border areas. This report provides an initial assessment of how the reimbursements have been used to meet U.S. goals in Pakistan, and what controls exist to ensure that reimbursements are for legitimate claims.

Preventing Terror Attacks in the Homeland: A New Mission for State and Local Police (PDF)
Cathy L. Lanier, Naval Postgraduate School, September 2005
This thesis by Washington, D.C. Police Commander Cathy Lanier, "proposes the creation of a National Law Enforcement Network made up of the state, local and tribal law enforcement agencies throughout the country."

Profile: Abu Musab al-Zarqawi
L.H. Teslik, Council on Foreign Relations, February 15, 2006
This “Background Q&A” provides a profile of the terrorist Abu Musab al-Zarqawi, the man responsible for coordinating suicide bombings in Amman and Madrid, multiple attacks on Iraqi Shiites and Shiite mosques, and the highly publicized beheading of American Nicholas Berg.

Progress in Developing the National Asset Database (PDF)
Office of Inspector General, U.S. Department of Homeland Security, June 6, 2006
This report assesses the actions that the U.S. Department of Homeland Security has taken to identify and organize the nation's critical infrastructure and key resources in the National Asset Database. It is based on interviews with employees and officials of relevant agencies and institutions, direct observations, and a review of applicable documents.

Project Responder: National Technology Plan for Emergency Response to Catastrophic Terrorism (PDF)
National Memorial Institute for the Prevention of Terrorism, April 2004
This report serves as a technology roadmap for federal planners and emergency responders to improve emergency responders' capability against weapons of mass destruction.

Project Responder Interim Report: Emergency Responders' Needs, Goals, and Priorities (PDF)
National Memorial Institute for the Prevention of Terrorism, March 2003
This report provides federal planners with emergency responders' views of their operational needs, shortfalls, and priorities; helps planners formulate choices; and frames guidance for technology initiatives and planning to meet the needs of responders.

Protection of Classified Information by Congress: Practices and Proposals (PDF)
Congressional Research Service, Updated April 5, 2006
The protection of classified national security and other information is of concern not only to the executive branch, but also to Congress, which uses the information to fulfill its constitutional responsibilities. Congress has established mechanisms to safeguard controlled information in its custody, although these arrangements vary between the two chambers and among panels in each. Proposals for change usually seek to set uniform standards or increase requirements for access.

REAL ID Implementation Plan (PDF)
U.S. Department of Homeland Security, June 18, 2007
This report responds to the Senate and House Appropriations Committees' request for an implementation plan for the U.S. Department of Homeland Security's responsibilities under the REAL ID Act of 2005, including proposed uses for grant funding. The REAL ID implementation plan is designed to identify and effectively manage the challenges faced in ensuring the security and integrity of drivers' licenses and other identification documents issued by 56 jurisdictions to fulfill Congress's intent as expressed in the act.

Reducing Terrorism Risk at Shopping Centers: An Analysis of Potential Security Options (PDF)
RAND Corporation, February 12, 2007
More than 60 shopping centers in 21 countries have been the site of terror attacks since 1998. Shopping center operators are beginning to explore and implement increased security efforts to combat terrorism. This report offers qualitative and quantitative modeling approaches to help shopping center operators evaluate candidate security options for their effectiveness at reducing terrorism risk.

Remarks Before the National Commission on Terrorist Attacks Upon the United States
RAND, 2003
This link features the written testimony presented on April 1, 2003 to the National Commission on Terrorist Attacks Upon the United States.

Report from the Field: The USA PATRIOT Act at Work (PDF)
U.S. Department of Justice, July 2004
This report provides a comprehensive review with case examples demonstrating how the USA PATRIOT Act has bolstered law enforcement efforts in fighting terrorism-related crime.

Report to Congress on Implementation of Section 705 of the Homeland Security Act and the Establishment of the Office for Civil Rights and Civil Liberties (PDF)
U.S. Department of Homeland Security, June 2004
As required by Section 705(b) of the Homeland Security Act of 2002, this report was prepared by the Office for Civil Rights and Civil Liberties detailing the creation of that office and the work that it has undertaken.

Report to Congress on Implementation of Section 1000 of the USA PATRIOT Act (PDF)
Office of the Inspector General, U.S. Department of Justice, September 13, 2004
The Office of the Inspector General (OIG) produced this mandated semiannual report, the fifth since enactment of the USA PATRIOT Act, to brief Congress on the OIG's activities and responsibilities required by the act. Section 1001 of that legislation obliges the OIG to review information and receive complaints alleging abuses of civil rights and liberties by Department of Justice officials, to make public information about contacting the proper OIG official to make such complaints, and to submit a report to Congress that describes the use of funds in carrying out this subsection.

Report on the Status of 9/11 Commission Recommendations—Part II: Reforming the Institutions of Government (PDF)
9/11 Public Discourse Project, October 2005
This report discusses the status of the 9/11 Commission recommendations for reforming the institutions of government.

Requirements for Linguists in Government Agencies (PDF)
Congressional Research Service, September 2, 2004
This report acknowledges the growing need of U.S. national security agencies, and other agencies, for personnel with foreign language proficiencies. It addresses many of the problems facing governmental linguists and their agencies and serves as a background document on the issue.

Rethinking Border Security (PDF)
Institute for Homeland Security, 2005
This paper examines the role border protection plays in securing the American homeland, provides analysis of the threat and current programs, and recommends a new approach to provide a better return on investments. It does not address the issues of immigration or illegal aliens, but instead focuses on the U.S. Department of Homeland Security and Customs and Border Protection's objective of preventing terrorist weapons from entering the United States.

Review of 2006 for the Department of Homeland Security and Priorities for 2007
U.S. Department of State, December 20, 2006
This written transcript and audio briefing by the U.S. Department of Homeland Security's (DHS) Counselor to the Assistant Secretary for the Policy and Acting Assistant Secretary for International Affairs reviews fiscal year 2006 DHS security programs and sets new priorities for 2007.

Road Map for National Security: Imperative for Change Road Map for National Security: Imperative for Change (PDF)
U.S. Commission on National Security, January 2001
This report offers a blueprint for transforming U.S. national security structures and processes to meet today's security challenges. The authors discuss organizational change in the context of homeland security, science and education, the executive branch of government, the federal personnel system, and Congress' role in national security.

Safeguarding Sensitive but Unclassified Information (PDF)
U.S. Department of Homeland Security (DHS), May 11, 2004
This directive establishes DHS policy regarding the identification and safeguarding of sensitive but unclassified information that originates within the Department. It also applies to sensitive but unclassified information that DHS receives from other government and nongovernmental activities.

Satellite Surveillance: Domestic Issues (PDF)
Congressional Research Service, March 21, 2008
This report reviews the development of intelligence satellites and the roles various agencies play in their management and use. It discusses current policy, proposed changes, and legal considerations, and concludes by suggesting policy issues for Congress to consider as it deliberates the potential advantages and pitfalls in expanding the role of satellite intelligence for homeland security.

Securing, Stabilizing, and Reconstructing Afghanistan: Key Issues for Congressional Oversight (PDF)
Government Accountability Office, May 24, 2007
More than 50 nations and multilateral organizations are currently engaged in securing, stabilizing, and reconstructing Afghanistan. Since 2001, the United States has appropriated more than $15 billion to this cause. In February 2007, the Administration requested an additional $12.3 billion in funding to accelerate these efforts. Progress has been made in areas such as economic growth, infrastructure development, and training of the Afghan army and police, but the overall security situation in this poor and ethnically diverse country has not improved and, moreover, has deteriorated significantly in the past year.

Securing Tyrants or Fostering Reform? U.S. Internal Security Assistance to Repressive and Transitioning Regimes (PDF)
RAND Corporation, January 2007
The United States has provided assistance to the security forces of a number of repressive states that do not share its political ideals. This study examines the results of U.S. assistance to El Salvador, Uzbekistan, Afghanistan, and Pakistan, and discusses the relationship between improving security and improving accountability and human rights. It also addresses whether U.S. assistance has improved the effectiveness of internal security forces in countering security threats or the accountability and human rights records of these forces.

Security Controls on Scientific Information and the Conduct of Scientific Research: A White Paper of the Commission on Scientific Communication and National Security (PDF)
Homeland Security Program, Center for Strategic and International Studies, June 2005
This white paper examines the balance between research institutions' need for open communication and the post-9/11 desire for national security limitations. It endorses longstanding policy which reasons that although denying or limiting access to applications of military or dual-use technology is important to U.S. national security, the appropriate way to do so is via traditional security classification.

Seeking a National Strategy: A Concert for Preserving Security and Promoting Freedom (PDF)
U.S. Commission on National Security, 2000
A second-phase report on a U.S. national security strategy for the 21st century, this document suggests strategic precepts to guide the formulation of U.S. strategy and examines national interests and priority objectives. The report is intended to contribute to a new consensus on national security strategy.

Sensitive Security Information and Transportation Security: Issues and Congressional Options (PDF)
Mitchel A. Sollenberger, Congressional Research Service, June 9, 2004
The report presents findings of a review of how the Transportation Security Administration handles sensitive security information (SSI) regarding U.S. transportation vulnerabilities. It assesses what level of risk resulting from public access to SSI might be reasonable from a civil liberties and safety standpoint.

Small Vessel Security Strategy (PDF)
U.S. Department of Homeland Security, April 2008
This strategy addresses the risk that small water vessels could be used to smuggle terrorists and weapons of mass destruction into the United States as a standoff weapons' platform, or as a means of a direct attack with a waterborne improvised explosive device.

Special Operations Forces Posture Statement 2006
U.S. Special Operations Forces, 2006
This report explores the mission, organization, unique capabilities, and role of U.S. Special Operations Forces in meeting today's security challenges.

State and Local Homeland Security: Unresolved Issues for the 109th Congress (PDF)
Congressional Research Service, June 9, 2005
This report details important state and local homeland security policy issues not addressed by the 109th Congress. These issues include the needs of emergency responders, reduction in federal homeland security assistance, determination of state and local homeland security risk assessment factors, and official security clearances at the state and local levels.

State and Local Intelligence in the War on Terrorism (PDF)
RAND Corporation, December 2005
This report examines how state and local law enforcement agencies conducted and supported counter-terrorism intelligence activities after 9/11. It analyzes data from a 2002 survey of law enforcement preparedness in the context of intelligence and reports the results of case studies showing how eight local law enforcement agencies handle intelligence operations. This report also suggests ways that the task of gathering and analyzing intelligence might best be shared among federal, state, and local agencies.

Status of Key Recommendations GAO Has Made to DHS and Its Legacy Agencies (PDF)
U.S. General Accounting Office, July 2, 2004
This letter responds to a request from the House Select Committee on Homeland Security for status information on key recommendations that the U.S. General Accounting Office made to the U.S. Department of Homeland Security and its legacy agencies.

Status of FEMA's FY03 Pre-Disaster Mitigation Program (PDF)
U.S. General Accounting Office, April 28, 2004
This report reviews the processes, awarding criteria, and overall status of the Federal Emergency Management Agency's fiscal year 2003 Pre-Disaster Mitigation Program. The program provides competitive and noncompetitive funding to states, tribal governments, and local communities for mitigation activities and technical assistance before disasters occur.

Strategic Plan for Homeland Security (PDF)
U.S. Environmental Protection Agency (EPA), September 2002
This plan serves as a blueprint for improving EPA's capabilities to detect, prepare for, prevent, respond to, and recover from terrorist incidents. The plan identifies goals and tactics in four categories: critical infrastructure protection; preparedness, response, and recovery; communication and information; and protection of EPA personnel and infrastructure.

Strategies for Homeland Defense
Senate Foreign Relations Committee, September 2001
This report presents executive summaries and key excerpts from previously published reports on emerging threats to U.S. national security; together the documents form a valuable resource for decisionmakers planning counter-terrorism strategies.

Strategy for Homeland Defense and Civil Support (PDF)
U.S. Department of Defense, June 2005
This report discusses the U.S. Department of Defense's plans for transforming itself from protecting the United States primarily by focusing its power overseas to an increased emphasis on protecting against attacks on U.S. soil. These efforts to improve homeland defense and civil support capabilities in the United States will include developing advanced information and communications technology and nonlethal weaponry.

Sudan: Humanitarian Crisis, Peace Talks, Terrorism, and U.S. Policy (PDF)
Congressional Research Service, Updated April 12, 2006
Relations between the United States and Sudan are poor in part because of the Khartoum government's human rights violations, its war policy in its southern section, and its support of international terrorism. In addition, in 2004, the U.S.Congress and the Bush administration declared the atrocities of the Darfur region to be genocide. This brief contains a historical review and updates on current issues, including Sudan's persecution of its own people and its status as a “rogue state.”

Taming the Tamil Tigers From Here in the U.S.
Federal Bureau of Investigation, January 10, 2008
The Liberation Tigers of Tamil Eelam (LTTE), or Tamil Tigers, are among the most dangerous and deadly extremists in the world, with central operations located in and focused on Sri Lanka. This article discusses the group's fundraising efforts and connection to the United States.

Terrorism: Threat Assessment, Countermeasures, and Policy (PDF)
U.S. Department of State, November 2001
This issue of U.S. Foreign Policy Agenda (an electronic journal) presents several articles written by U.S. leaders, including Secretary of State Colin Powell, that assess terrorism threats, countermeasures, and policies in the United States. The issue includes fact sheets on terrorism and a guide to additional readings.

Terrorism and the Law of War: Trying Terrorists as War Criminals Before Military Commissions (PDF)
Jennifer Elsea, December 2001
This study seeks to identify some of the legal bases and practical implications of treating terrorist acts as war crimes and applying the law of war, rather than criminal statutes, to the prosecution of alleged perpetrators.

Terrorism in Southeast Asia (PDF)
Congressional Research Service, February 7, 2005
This report discusses U.S. concerns with radical Islamic groups in Southeast Asia, particularly those in the Philippines, Indonesia, Malaysia, Thailand, and Singapore, that are known to have ties to Al Qaeda.

Terrorist Financing and Money Laundering Investigations: Who Investigates and How Effective are They
Testimony of Michael F.A. Morehart, Section Chief, Terrorist Financing Operations Section, Counterterrorism Division, May 11, 2004
This testimony by Michael Morehart discusses the combined efforts of the FBI and its partners in law enforcement in investigating money laundering and terrorist financing matters. It highlights efforts relating to the FBI's Terrorist Financing Operations Section, which conducts full financial analyses of terrorist suspects and their financial support structures, and Joint Terrorism Task Forces, which partner FBI personnel with hundreds of investigators from various federal, state and local agencies.

Third Annual Report to the President and the Congress to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction (PDF)
The Gilmore Commission, December 2001
This third annual report to Congress and the President of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction recommends fighting terrorism through improved health and medical capabilities, immigration and border control, cyber security, state and local preparedness, and clarity on the use of the military. The recommendations build on those described in the Commission's first (PDF) and second (PDF) annual reports.

Toward a Theory of Intelligence (PDF)
RAND Corporation, 2006
This report summarizes the results of a workshop held in June 2005 by RAND Corporation and the Office of the Director of National Intelligence. Issues discussed include whether intelligence should be defined narrowly, as secret state activity, or broadly, as information for decisionmaking; whether there is a uniquely American theory or practice of intelligence, in its technology, militarization, and congressional oversight; whether closer relationships between intelligence officers and policymakers leads to politicization; and how to devise metrics for assessing the performance of intelligence.

Trade-Offs Among Alternative Government Interventions in the Market for Terrorism Insurance (PDF)
RAND Corporation, June 2007
This documented briefing presents interim findings from a RAND Center for Terrorism Risk Management Policy project that seeks to inform the debate about extending the Terrorism Risk Insurance Act of 2002, as modified in 2005. To assess three alternative government interventions in the market for terrorism insurance, the study uses analytical tools for identifying and assessing key trade-offs among strategies under conditions with considerable uncertainty.

Transforming Defense: National Security in the 21st Century (PDF)
National Defense Panel, December 1997
This report describes the long-term issues facing U.S. defense and national security. The authors identify changes needed to ensure U.S. leadership in the world and the security and prosperity of the American people in the 21st century.

Transforming the FBI: Progress and Challenges (PDF)
National Academy of Public Administration, January 2005
This report focuses on the three principal areas of concern for the Federal Bureau of Investigation: counter-terrorism, intelligence, and security. Commissioned by Congress, the report also examines the findings of the congressional intelligence committees and the 9/11 Commission.

Transforming the National Guard and Reserves Into a 21st-Century Operational Force—Final Report Executive Summary (PDF)
Commission on the National Guard and Reserves, January 31, 2008
This report offers an analysis of and specific recommendations for the continued evolution of the National Guard and Reserves from a strategic force, designed to meet threats from nation-states, to a post-Cold War operational force, available for emergencies at home and abroad.

Treasury Employs USA PATRIOT Act Authorities to Designate Two Foreign Banks as "Primary Money Laundering Concerns"
U.S. Department of the Treasury, Office of Terrorism and Financial Intelligence, August 24, 2004
To protect the integrity of the U.S. financial system and identify rogue financial institutions, the U.S. Department of the Treasury designated two foreign banks—First Merchant Bank of the "Turkish Republic of Northern Cyprus" and Infobank of Belarus—as financial institutions of "primary money laundering concern" pursuant to section 311 of the USA PATRIOT Act.

Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves (PDF)
RAND Corporation, August 2006
Author Brian Michael Jenkins, an internationally renowned authority on terrorism, presents a clear-sighted and sobering analysis of where we are today in the struggle against terrorism; distills the jihads' operational code; and outlines a ferociously pragmatic but principled approach that goes beyond attacking terrorist networks and operational capabilities to defeating their entire missionary enterprise by deterring recruitment and encouraging defections.

The United Nations and the Fight Against Terrorism (PDF)
Committee on International Relations, 2005
This hearing and briefing before the Subcommittee on International Terrorism and Nonproliferation discusses what the United Nations is doing, how well it is doing it, and what it should be doing to meet the challenge of international terrorism. It also discusses whether the United Nations is worth reform efforts in this area.

United States Initiatives to Prevent Proliferation
U.S. Department of State, May 2005
This fact sheet identifies the proliferation of weapons of mass destruction by rogue states and terrorist organizations as one of the greatest threats to international security.

U.S. Armed Forces and Homeland Defense: The Legal Framework (PDF)
Center for Strategic and International Studies, October 2001
This report examines the nature and extent of the President's authority under the Constitution and other relevant U.S. laws to entrust the U.S. Department of Defense with a role in domestic defense. In particular, the report provides a framework within which to consider fundamental legal considerations that arise in the context of the military's involvement in homeland defense.

The U.S. Army and the New National Security Strategy
RAND, 2003
This book examines the U.S. Army's role in the war on terrorism; the Army's homeland security needs; the implications of increased emphasis on Asia; the Army's role in coalition operations; the unfinished business of jointness—the lessons learned from operations and how to prepare for the future; the Army's deployability, logistical, and personnel challenges; and whether the Army can afford its transformation.

U.S.-China Counter-Terrorism Cooperation: Issues for U.S. Policy (PDF)
Congressional Research Service, Updated May 12, 2005
This brief discusses issues related to or affected by the United States obtaining China's full support of U.S. counter-terrorism efforts, including law enforcement cooperation, designations of terrorist organizations, weapons nonproliferation, and the Container Security Initiative.

U.S. Counterterrorism Strategy Must Address Ideological and Political Factors at the Global and Local Levels (PDF)
RAND Corporation, November 2006
This research briefly summarizes both global and local threats to the United States from terrorist and other extremist organizations, and describes the three key elements of U.S. strategies to counter them.

U.S. Counterterrorism Strategy Update (PDF)
Testimony of Ambassador Henry A. Crumpton, Coordinator for Counterterrorism, House International Relations Committee, Subcommittee on International Terrorism and Nonproliferation, October 27, 2005
In this testimony, the Honorable Henry A. Crumpton outlines three strategic objectives for cutting Al Qaeda's links to material and ideological support that have allowed it to subvert local conflicts for its own benefit. In addition, Crumpton discusses the overall U.S. strategy to delegitimize terrorism by encouraging mainstream efforts in the Islamic world in areas such as educational reform and women's rights advocacy.

USA Patriot Act Sunset: Provisions That Expire on December 31, 2005 (PDF)
Charles Doyle, Congressional Research Service, June 10, 2004 (update)
This report discusses and explains variable sunset consequences of sections of Title II of the USA PATRIOT Act that relate to enhanced foreign intelligence and law enforcement surveillance authority.

U.S. Progress in the Global War on Terrorism
U.S. Department of State, January 22, 2004
This online fact sheet released by the White House uses the proposed fiscal year 2005 homeland security budget as a background in detailing the U.S. programs and initiatives in the war on terrorism that are in need of funding.

The Use of Federal Troops for Disaster Assistance: Legal Issues (PDF)
Congressional Research Service, September 16, 2005
The Stafford Act authorizes the use of the military for disaster relief operations at the request of the state governor, but does not authorize the use of the military to perform law enforcement functions, ordinarily prohibited by the Posse Comitatus Act. However, the President may invoke other authorities, such as the Insurrection Act, to use federal troops to help enforce the law. This report summarizes the possible constitutional and statutory authorities and constraints relevant to the use of armed forces, including National Guard units in federal service, to assist states when a disaster impedes the operations of state and local police. Although the aftermath of Hurricane Katrina was an impetus for this report, these issues are relevant to both natural and manmade disaster situations.

Visitor and Immigrant Status Program Operating, but Management Improvements Are Still Needed (PDF)
U.S. Government Accountability Office, January 2006
This report outlines the U.S. Government Accountability Office's (GAO) testimony on the status of the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT), and the U.S. Department of Homeland Security's progress in implementing recommendations that GAO made as part of its prior reviews of US-VISIT's plans for annual expenditures.

What Is the Future of Striking First in U.S. National Security Strategy? (PDF)
RAND Corporation, November 2006
Despite U.S. national security policies that emphasize striking enemies before they attack, large-scale first strikes are likely to remain infrequent. This study examines the conditions under which a preemptive or preventive attack is worth considering or pursuing as a response to a perceived security threat; the role that such strategies may play in future U.S. national security policy; and the effects of designing military capabilities and strategies to deal with national security threats.

Wiretap Reports
Administrative Office of the United States Courts
The Administrative Office of the U.S. Courts is required to report to Congress the number and nature of federal and state applications for orders authorizing or approving the interception of wire, oral, or electronic communications.

World Drug Report 2008
United Nations Office on Drugs and Crime, 2008
This publication provides detailed estimates and trends on production, trafficking, and consumption in the opium-heroin, coca-cocaine, cannabis, and stimulants markets. It assesses positively the status of international drug control, but warns of the notable increase in both opium-poppy and coca cultivation in 2007, some growth in consumption in developing countries, and some development of new trafficking patterns. This year's report also presents a historical review of the development of the international drug control system.

Zarqawi Group Formally Designated Terrorists by State Department
U.S. Department of State, October 15, 2004
According to this press release, the Secretary of State formally designated Abu Mu'sab al-Zarqawi's group as a foreign terrorist organization and specially designated global terrorist. Jama'at al-Tawhid wa'al-Jihad (also known as The Monotheism and Jihad Group, the al-Zarqawi network, and al-Tawhid) has links to al-Qaida; because of those links, the United States and others asked the United Nations (U.N.) 1267 Sanctions Committee to add the group to its list of terrorist organizations subject to international sanctions on October 14. These actions will result in asset freezes, travel bans, and arms embargoes against the group, as well as prohibitions on citizens of U.N. member states providing any funds or other resources to the group.