Site map
If you don't see what you are looking for in the links below, try using the site search. You may also check our directories:
Left Menu
- Topics
- Academic Engagement
- Border Security
- Citizenship and Immigration Services
- Overview
- Results
- Providing Immigration Benefits & Information
- E-Verify
- CIS Ombudsman
- About the Ombudsman
- Annual Report to Congress
- Case Assistance
- Contact the Ombudsman
- Federal Change of Address Procedures
- Ombudsman Updates
- Adjudication of Applications for Refugee Status
- Advance Parole Tips
- Change of Address with USCIS
- Contacting the USCIS Contact Center
- H-2B Petition Requests For Evidence
- Have You Not Received a USCIS Document or Card?
- Survivor Benefits for Widows & Widowers of U.S. Citizens
- USCIS Processing of Waivers of Inadmissibility
- Public Engagement
- Public Webinar Series
- Best Practices on Filing USCIS Forms
- Overview of USCIS and CIS Ombudsman Joint Engagements on USCIS’ Fiscal Challenges (Session One)
- USCIS H-1B Registration Process
- USCIS and CIS Ombudsman Joint Engagements on USCIS’ Current (Session Two)
- USCIS and CIS Ombudsman Joint Engagements on USCIS’ Current State of Operations
- USCIS and CIS Ombudsman Joint Engagements on USCIS’ Fiscal Challenges
- USCIS’ Processing of Forms N-400 and I-751
- Recommendations
- Improve the Petitioner Information Management Service (PIMS)
- Improve the Quality in Extraordinary Ability and Other Employment-based Adjudications
- Office of the Citizenship and Immigration Services Ombudsman Recommendation: Improving the Process for Removal of Conditions on Residence for Spouses and Children
- Processing of Waivers of Inadmissibility
- Recommendations Archive
- Special Immigrant Juvenile Adjudications
- USCIS Deferred Action Processing
- Resources
- Tips and Checklist
- Types of Cases the Ombudsman Can Assist With
- Civil Rights and Civil Liberties
- Overview
- Results and Reports
- Make a Civil Rights Complaint
- CRCL Privacy Protections
- DHS Statement on Safety and Enforcement During Disasters and Emergencies
- Disability Access
- Emergencies and Disasters
- Language Access
- Law and Policy
- Onsite Investigation Close Memos
- Resources for Recipients of DHS Financial Assistance
- Transparency in Civil Rights Investigations
- CRCL Newsletter
- CRCL Spotlight
- CRCL Facebook
- Critical Infrastructure Security
- Cybersecurity
- Disasters
- Economic Security
- Election Security
- Emergency Communications
- Homeland Security Careers
- Homeland Security Enterprise
- Overview
- Information Sharing
- DHS Center for Faith and Opportunity Initiatives
- Financial Assistance
- Homeland Security Information Network (HSIN)
- Grant Program Guidance
- HSIN Videos
- Bryan Costigan and HSIN Connect
- Chuck McNeal Shares HSIN’s Operational Impact in Louisiana
- Cyber Security
- Daily Operations
- Georgia Uses HSIN’s Capabilities to Support Daily Operations
- HSIN Celebrates 10 Years!
- HSIN Enables Information Sharing across U.S. States and Territories
- HSIN Exchange
- HSIN Exchange provides a Secure RFI Solution
- HSIN Plays Important Role in Securing the Texas Border
- HSIN Plays Vital Role in Keeping the Nation Safe
- HSIN enables Critical Infrastructure Professionals to Share Information Securely
- HSIN helps Analysts Detect Drug Trafficking on Domestic Highways
- HSIN helps Support Special Events in the National Capital Region
- HSIN is used for Florida’s Multi-State Facial Recognition Program
- Incident Response
- Local Coordination
- Maryland uses HSIN to Coordinate Gulf Cooperation Council Meeting
- Orange County recommends HSIN for Support during Statewide Exercises
- Overcoming Communication Barriers at Super Bowl XLIX using HSIN
- Real-Time Information Sharing
- Special Events
- The Albuquerque Fire Department uses HSIN to Support Large-Scale Events
- What is HSIN?
- How to Join HSIN
- HSIN Annual Report
- Critical Infrastructure
- Emergency Services
- Intelligence
- Law Enforcement
- U.S. Strategy on Women, Peace, and Security
- Veterans and Homeland Security
- Human Trafficking
- Immigration and Customs Enforcement
- Intelligence & Analysis
- The Intelligence Enterprise
- Mission Centers
- Other Intelligence Elements
- Fusion Centers
- Building Law Enforcement and DHS Partnerships
- Coordinating Federal Support for Fusion Centers
- Deployed Intelligence Officers and Protective Security Advisors
- Fact Sheet
- Fusion Center Foundational Guidance
- Fusion Center Performance Program
- Fusion Centers Handout
- Locations and Contact Information
- P/CRCL for Fusion Centers
- Resources for Fusion Centers
- Support of National Strategies and Guidance
- The Office of Intelligence and Analysis FY 2020-2024 Strategic Plan
- News & Updates
- International Engagement
- Law Enforcement Partnerships
- Preventing Terrorism
- Overview
- Results
- If You See Something, Say Something
- Targeted Violence and Terrorism Prevention
- CVE Grant Webinars
- CVEAS Portal
- FY 2016 Countering Violent Extremism Grant Program
- Improvised Explosive Devices
- National Terrorism Advisory System
- REAL ID
- Weapons of Mass Destruction
- Targeted Violence and Terrorism Prevention Grant Program
- Privacy
- Resilience
- Science and Technology
- Transportation Security
- News
- Blog
- Data
- Annual Employee Survey
- Data Governance Council
- Immigration Data and Statistics
- Yearbook of Immigration Statistics
- Yearbook 2019
- Table 1
- Table 2
- Table 3
- Table 4
- Table 5
- Table 6
- Table 7
- Table 8
- Table 9
- Table 10
- Table 11
- Table 12
- Table 13
- Table 14
- Table 15
- Table 16
- Table 17
- Table 18
- Table 19
- Table 20
- Table 21
- Table 22
- Table 23
- Table 24
- Table 25
- Table 26
- Table 27
- Table 28
- Table 29
- Table 30
- Table 31
- Table 32
- Table 33
- Table 34
- Table 35
- Table 36
- Table 37
- Table 38
- Table 39
- Table 40
- Table 41
- Yearbook 2018
- Table 1
- Table 2
- Table 3
- Table 4
- Table 5
- Table 6
- Table 7
- Table 8
- Table 9
- Table 10
- Table 11
- Table 12
- Table 13
- Table 14
- Table 15
- Table 16
- Table 17
- Table 18
- Table 19
- Table 20
- Table 21
- Table 22
- Table 23
- Table 24
- Table 25
- Table 26
- Table 27
- Table 28
- Table 29
- Table 30
- Table 31
- Table 32
- Table 33
- Table 34
- Table 35
- Table 36
- Table 37
- Table 38
- Table 39
- Table 40
- Table 41
- Yearbook 2017
- Table 1
- Table 2
- Table 3
- Table 4
- Table 5
- Table 6
- Table 7
- Table 8
- Table 9
- Table 10
- Table 11
- Table 12
- Table 13
- Table 14
- Table 15
- Table 16
- Table 17
- Table 18
- Table 19
- Table 20
- Table 21
- Table 22
- Table 23
- Table 24
- Table 25
- Table 26
- Table 27
- Table 28
- Table 29
- Table 30
- Table 31
- Table 32
- Table 33
- Table 34
- Table 35
- Table 36
- Table 37
- Table 38
- Table 39
- Table 40
- Table 41
- Yearbook 2016
- Table 1
- Table 2
- Table 3
- Table 4
- Table 5
- Table 6
- Table 7
- Table 8
- Table 9
- Table 10
- Table 11
- Table 12
- Table 13
- Table 14
- Table 15
- Table 16
- Table 17
- Table 18
- Table 19
- Table 20
- Table 21
- Table 22
- Table 23
- Table 24
- Table 25
- Table 26
- Table 27
- Table 28
- Table 29
- Table 30
- Table 31
- Table 32
- Table 33
- Table 34
- Table 35
- Table 36
- Table 37
- Table 38
- Table 39
- Table 40
- Table 41
- Yearbook 2015
- Table 1
- Table 2
- Table 3
- Table 4
- Table 5
- Table 6
- Table 7
- Table 8
- Table 9
- Table 10
- Table 11
- Table 12
- Table 13
- Table 14
- Table 15
- Table 16
- Table 17
- Table 18
- Table 19
- Table 20
- Table 21
- Table 22
- Table 23
- Table 24
- Table 25
- Table 26
- Table 27
- Table 28
- Table 29
- Table 30
- Table 31
- Table 32
- Table 33
- Table 34
- Table 35
- Table 36
- Table 37
- Table 38
- Table 39
- Table 40
- Table 41
- Yearbook 2014
- Table 1
- Table 2
- Table 3
- Table 4
- Table 5
- Table 6
- Table 7
- Table 8
- Table 9
- Table 10
- Table 11
- Table 12
- Table 13
- Table 14
- Table 15
- Table 16
- Table 17
- Table 18
- Table 19
- Table 20
- Table 21
- Table 22
- Table 23
- Table 24
- Table 25
- Table 26
- Table 27
- Table 28
- Table 29
- Table 30
- Table 31
- Table 32
- Table 33
- Table 34
- Table 35
- Table 36
- Table 37
- Table 38
- Table 39
- Table 40
- Table 41
- Yearbook 2013
- Yearbook 2012
- Yearbook 2011
- Yearbook 2010
- Yearbook 2009
- Yearbook 2008
- Yearbook 2006
- Yearbook 2007
- Yearbook 2005
- Yearbook 2004
- Yearbook 2003
- Yearbook 2002
- Yearbook 2001
- Yearbook 2000
- Yearbook 1996 to 1999
- Yearbook 2019
- Lawful Permanent Residents
- Immigrant Classes of Admission
- Profiles on Lawful Permanent Residents
- Refugees and Asylees
- Naturalizations
- Profiles on Naturalized Citizens
- Nonimmigrant Admissions
- Immigration Enforcement Actions
- Population Estimates
- Infographics
- Fact Sheets
- Border Security
- Special Reports
- Reading Room
- Research Library
- Historical Library
- Data Standards and Definitions
- Frequently Asked Questions (FAQ)
- Data Directory
- Yearbook of Immigration Statistics
- Intellectual Property Rights
- Maritime Information Exchange
- Events
- Fact Sheets
- Homeland Security LIVE
- In Focus
- Media Contacts
- Multimedia
- National Terrorism Advisory System
- Podcasts
- Press Releases
- Publications Library
- Academic Engagement
- Border Security
- Citizenship and Immigration Services
- Civil Rights and Civil Liberties
- Critical Infrastructure Security
- Cybersecurity
- Disasters
- Economic Security
- Election Security
- Emergency Communications
- Homeland Security Careers
- Homeland Security Enterprise
- Human Trafficking
- Immigration and Customs Enforcement
- Intelligence and Analysis
- International Engagement
- Law Enforcement Partnerships
- Legal Immigration and Adjustment of Status Report
- Preventing Terrorism
- Privacy
- Resilience
- Science and Technology
- Transportation Security
- Social Hub
- Social Media
- Speeches
- Testimony
- News Archive
- Comunicados de Prensa
- In Focus
- Coronavirus (COVID-19)
- Overview of DHS Response
- Message from the Acting Secretary
- Coordinating the Federal Response
- Protecting Air Travelers and the American Public
- Keeping Threats Out of the Country
- Cybersecurity and Critical Infrastructure
- Early Engagement
- Directly Supporting HHS and CDC
- The President's Biodefense Strategy
- Protecting the DHS Workforce
- Coronavirus News & Updates
- Frequently Asked Questions
- Coronavirus.gov
- Coronavirus Disease 2019 (COVID-19)
- What the U.S. Government is Doing
- Deferred Action for Childhood Arrivals
- Executive Orders on Protecting the Homeland
- Opioids
- Stopping Illegal Immigration and Securing the Border
- Coronavirus (COVID-19)
- How Do I?
- Alphabetical Listing
- At DHS
- For Businesses
- For Travelers
- For the Public
- Adopt a Child Internationally
- Become a Citizen
- Check Immigration Case Status
- Check the National Terrorism Advisory System
- File a Civil Rights Complaint
- Find Citizenship Resources
- Find Flood Maps & Insurance
- Get a Green Card
- Get a Homeland Security Job
- Move to the United States
- Practice Boating Safety
- Prepare My Family for a Disaster
- Report Suspicious Activity
- Submit a FOIA Request
- Use the Coronavirus Calculators
- Verify Employment Eligibility
- Get Involved
- About DHS
- Mission
- Core Values
- Guiding Principles
- Strategic Planning
- Counter Terrorism and Homeland Security Threats
- Secure U.S. Borders and Approaches
- Secure Cyberspace and Critical Infrastructure
- Preserve and Uphold the Nation's Prosperity and Economic Security
- Strengthen Preparedness and Resilience
- Champion the DHS Workforce and Strengthen the Department
- Today DHS will…
- We Are DHS
- Ready to Rise
- Organization
- Operational and Support Components
- USCIS
- Coast Guard
- CBP
- CISA
- FEMA
- FLETC
- ICE
- Secret Service
- TSA
- Management Directorate
- Chief Financial Officer
- Chief Procurement Officer
- DHS Canine and Equine Governance Board
- Federal Protective Service
- Homeland Security Presidential Directive 12
- National Environmental Policy Act
- Office of Accessible Systems & Technology
- Office of Biometric Identity Management
- Office of the Chief Information Officer
- Office of the Chief Security Officer
- Personnel Security & Reference Materials
- Sustainability and Environmental Programs
- Biometrics
- Science and Technology Directorate
- Countering Weapons of Mass Destruction Office
- Office of Intelligence and Analysis
- Office of Operations Coordination
- Office of the Secretary
- Civil Rights and Civil Liberties
- Committee Management Office
- Executive Secretary
- General Counsel
- Joint Requirements Council
- Legislative Affairs
- Military Advisor
- Office of Strategy, Policy, and Plans
- Partnership and Engagement
- Privacy Office
- Public Affairs
- Organizational Chart
- Advisory Panels & Committees
- Operational and Support Components
- Leadership
- Budget & Performance
- 2009 DHS Efficiency Review
- Congressional Appropriations Reports
- DHS Budget
- Federal Program Inventory
- GAO High-Risk Management
- Hiring Excellence at DHS
- Joint IT and Software Cost Forum 2020
- Open Government
- Performance & Financial Reports
- Previous Performance & Accountability Reports
- 2011 Progress
- By the Numbers
- Combating Cybercrimes
- Combating Human Smuggling and Trafficking
- Community Engagement
- Countering Chemical, Biological, Radiological, and Nuclear Threats
- Critical Infrastructure Protection
- Enhancing Partnerships with State & Local Law Enforcement
- Ensuring Resilience to Disasters
- Facilitating Legal Immigration
- Fulfilling 9/11 Commission Recommendations
- Identity Verification
- Intellectual Property Rights
- Interoperability
- Maritime Security
- Maturing & Strengthening the Department & the Homeland Security Enterprise
- Northern Border
- Providing Essential Support to National & Economic Security
- Risk-Based Approach to Transportation Security
- Screening and Vetting
- Smart and Effective Enforcement
- Southwest Border
- Strengthening Cybersecurity
- Strengthening International Partnerships
- Trusted Traveler, Expedited Clearance & Other Partnerships
- 2011 Progress
- Previous Performance & Accountability Reports
- Careers
- Do Business with DHS
- Accessibility Requirements
- Acquisition Innovations in Motion
- Acquisition Policy
- Acquisition Policy Resources
- Advance Acquisition Planning: Forecast of Contract Opportunities
- Business Contacts
- Business Opportunities
- CPOblog
- DHS Industry-Government Activity Calendar
- DHS Security and Training Requirements for Contractors
- DHS Strategic Sourcing
- Financial Assistance
- Forecast of Contract Opportunities
- Marketing Tips
- Prime Contractors
- Procurement Events
- Procurement Innovation Lab
- Small Business Assistance
- Unsolicited Proposals
- Laws & Regulations
- History
- Contact Us
- Employee Resources
- Mission
- Site Links
- A-Z Index
- Comment Policy
- DHS Apps
- DHS Websites
- En Español
- Frequently Requested Pages
- Notices
- Plugins
- Privacy Policy
- Keywords
- Site Map
- Subscribe
- Archive
- DHS Acronyms & Terms
- DHS Developer Community
- Freedom of Information Act (FOIA)
- How To Submit a Request
- Submit a Request
- Check Status of Request
- Library
- Component Libraries
- Contact Information
- Accessing DHS Records through FOIA
- Exemptions
- FOIA Appeals Mediation
- FOIA and the Privacy Act
- Major Information Systems
- Office of Inspector General FOIA Requests
- Top FOIA Requests by Topic
- eFOIA Mobile App
- Statutes & Resources
- Subscribe to Library Notifications
- Widgets
- Initiatives
- Be Cyber Smart
- Blue Campaign
- Countering Violent Extremism Task Force
- Task Force
- What is CVE?
- Resources
- CVE Grants
- Research & Evaluation on Radicalization to Violent Extremism
- [CLOSED] 2016 - Countering Violent Extremism Grants
- [CLOSED] 2016 - S&T Center of Excellence for Homeland Security Quantitative Analysis
- [CLOSED] 2016 - National Training Program (HSNTP) – Continuing Training Grants (CTG)
- [CLOSED] 2016 - Homeland Security Grant Program (HSGP)
- [CLOSED] 2016 - Research & Evaluation on Domestic Radicalization to Violent Extremism: Prevention and Intervention Demonstration Programs
- Other Grants
- Minority Youth Violence Prevention II
- Research Grants for Preventing Violence and Violence Related Injury
- Refugee Career Pathways Program
- [CLOSED] 2016 - Vision 21: Law Enforcement and the Communities They Serve
- [CLOSED] 2016 - Community Policing Development
- [CLOSED] 2016 - Research on Bias Crimes
- [CLOSED] 2016 - Violent Gang and Gun Crime Reduction Program
- [CLOSED] 2016 - Performance Partnership Pilots
- [CLOSED] 2016 - OJJDP FY 16 Safe and Thriving Communities
- [CLOSED] 2016 - Faith & Community-Based Youth Violence Prevention Training & Technical Assistance Initiative
- CVE Grants
- Get Involved / Contact
- Employee Resources
- My Family
- Divorce
- Elder Care
- Financial Resources
- Kids' Corner
- What Does DHS Do?
- DHS Jobs
- Customs and Border Protection (CBP)
- Cybersecurity and Infrastructure Security Agency (CISA)
- Federal Emergency Management Agency (FEMA)
- Federal Law Enforcement Training Center (FLETC)
- Federal Protective Services (FPS)
- Immigration and Customs Enforcement (ICE)
- Transportation Security Administration (TSA)
- U.S. Citizenship and Immigration Services (USCIS)
- U.S. Secret Service (USSS)
- United States Coast Guard (USCG)
- Marriage
- Parenting & Child Care
- Retirement
- Supporting Your Spouse
- Survivor Benefits & Support
- My Benefits
- My Career
- My Work-Life
- My Health
- My Quick Links
- Employee Blog
- My Family
- Homeland Security Careers
- Work at DHS
- Component Careers
- Students & Grads
- Veterans
- Individuals with Disabilities
- Inclusive Diversity
- If You See Something, Say Something®
- What is Suspicious Activity?
- How to Report Suspicious Activity
- Reporting Suspicious Activity in Alabama
- Reporting Suspicious Activity in Arizona
- Reporting Suspicious Activity in Arkansas
- Reporting Suspicious Activity in California - Orange County Intelligence Assessment Center (OCIAC)
- Reporting Suspicious Activity in California - Region-1-SacRTAC
- Reporting Suspicious Activity in California - Region-3-JRIC
- Reporting Suspicious Activity in California - Region-4-San Diego LECC
- Reporting Suspicious Activity in California
- Reporting Suspicious Activity in California Region-2-NCRIC
- Reporting Suspicious Activity in California – Los Angeles (City)
- Reporting Suspicious Activity in Chicago Cook County
- Reporting Suspicious Activity in Colorado
- Reporting Suspicious Activity in Connecticut
- Reporting Suspicious Activity in Dallas
- Reporting Suspicious Activity in Delaware
- Reporting Suspicious Activity in Denver
- Reporting Suspicious Activity in Florida
- Reporting Suspicious Activity in Georgia
- Reporting Suspicious Activity in Guam
- Reporting Suspicious Activity in Hawaii
- Reporting Suspicious Activity in Houston
- Reporting Suspicious Activity in Idaho
- Reporting Suspicious Activity in Illinois
- Reporting Suspicious Activity in Indiana
- Reporting Suspicious Activity in Iowa
- Reporting Suspicious Activity in Kansas
- Reporting Suspicious Activity in Kentucky
- Reporting Suspicious Activity in Louisiana
- Reporting Suspicious Activity in Louisville
- Reporting Suspicious Activity in Maine
- Reporting Suspicious Activity in Maryland
- Reporting Suspicious Activity in Massachusetts
- Reporting Suspicious Activity in Memphis
- Reporting Suspicious Activity in Miami-Dade County
- Reporting Suspicious Activity in Michigan
- Reporting Suspicious Activity in Minnesota
- Reporting Suspicious Activity in Mississippi
- Reporting Suspicious Activity in Missouri
- Reporting Suspicious Activity in Montana
- Reporting Suspicious Activity in Nebraska
- Reporting Suspicious Activity in Nevada
- Reporting Suspicious Activity in New Hampshire
- Reporting Suspicious Activity in New Jersey
- Reporting Suspicious Activity in New Mexico
- Reporting Suspicious Activity in New York
- Reporting Suspicious Activity in New York City
- Reporting Suspicious Activity in North Carolina
- Reporting Suspicious Activity in North Dakota
- Reporting Suspicious Activity in Ohio
- Reporting Suspicious Activity in Oklahoma
- Reporting Suspicious Activity in Oklahoma City
- Reporting Suspicious Activity in Oregon
- Reporting Suspicious Activity in Pennsylvania
- Reporting Suspicious Activity in Philadelphia
- Reporting Suspicious Activity in Rhode Island
- Reporting Suspicious Activity in San Antonio
- Reporting Suspicious Activity in Seattle
- Reporting Suspicious Activity in South Carolina
- Reporting Suspicious Activity in South Dakota
- Reporting Suspicious Activity in Tampa
- Reporting Suspicious Activity in Tennessee
- Reporting Suspicious Activity in Texas
- Reporting Suspicious Activity in Utah
- Reporting Suspicious Activity in Vermont
- Reporting Suspicious Activity in Virgin Islands
- Reporting Suspicious Activity in Virginia
- Reporting Suspicious Activity in Washington
- Reporting Suspicious Activity in West Virginia
- Reporting Suspicious Activity in Wisconsin
- Reporting Suspicious Activity in Wyoming
- Suspicious Activity Reporting: Alaska
- How to Report Suspicious Activity
- Recognize the Signs
- Play a Role
- Partnership and Campaign Materials
- Anuncio de Servicio Público de Béisbol
- Anuncio de Servicio Público de Fútbol
- Anuncio de Servicio Público de Fútbol Americano
- Anuncio de Servicio Público de la Asociación Nacional de Baloncesto
- Anuncio de Servicio Público de la Liga Nacional de Hockey
- Anuncio de Servicio Público: La Bolsa
- Baseball PSA
- Basketball PSA
- Football PSA
- Help Keep Colorado Safe
- Help Keep Dallas Safe
- Help Keep Florida Safe
- Help Keep Ohio Safe
- Help Keep San Antonio Safe
- Hockey PSA
- Hospitality PSA
- Let's Talk about SeeSay
- NCAA PSA
- Officials PSA
- Protect Your Every Day PSA
- Si Ve Algo, Diga Algo Funcionarios de Deportes
- Soccer PSA
- Take the Challenge
- Why I SeeSay PSA
- About the Campaign
- What is Suspicious Activity?
- Nationwide SAR Initiative
- About the NSI
- NSI Partners
- NSI Resources
- Online SAR Training
- Science and Technology
- Our Work
- Borders and Maritime Security and Port of Entry Screening
- Centers of Excellence and Academia
- Chemical and Biological Defense
- Critical Infrastructure and Resilience
- Cybersecurity
- Anonymous Networks and Currencies
- Application Security Threat and Attack Modeling (ASTAM)
- Application of Network Measurement Science
- Blockchain & Distributed Ledger Technologies
- Critical Infrastructure Design and Adaptive Resilient Systems (CIDARS)
- Cyber Physical Systems Security (CPSSEC)
- Cyber Risk Economics (CYRIE)
- Cybersecurity Competitions
- Cybersecurity Forensics
- NIST CFTT Reports
- Deleted File Recovery and Active File Listing
- Digital Data Acquisition
- Disk Imaging
- Forensic Media Preparation
- Graphic File Carving
- Hardware Write Block
- Mobile Device Acquisition
- Software Write Block
- String Search Tool
- Test Results for Binary Image JTAG, Chip-Off Decoding and Analysis Tool Paraben’s Electronic Evidence Examiner
- Video File Carving
- Windows Registry Forensic Tool
- Write-Protected Drive
- NIST CFTT Reports
- Cybersecurity Resources
- Cyber Risk Economics Capability Gaps Research Strategy
- Cybersecurity Portfolio Guide
- Cybersecurity Technology Guide
- Mobile App Security Study: Securing Mobile Applications for First Responders
- Mobile Security R&D Program Guide, Volume 3
- Open Source Software in Government: Challenges and Opportunities
- The Menlo Companion Report
- The Menlo Report
- Cybersecurity for the Oil and Gas Sector (COGS)
- Data Privacy
- Defense Technology Experimental Research (DETER)
- Distributed Denial of Service Defense (DDoSD)
- Distributed Environment for Critical Infrastructure Decision-making Exercises (DECIDE)
- Federated Security
- Homeland Open Security Technology (HOST)
- Identity Management
- Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT)
- Insider Threat
- Linking the Oil and Gas Industry to Improve Cyber Security (LOGIIC)
- Mobile App Security
- Mobile Device Security
- Mobile Security R&D
- Next Generation Cyber Infrastructure (NGCI)
- Smart Cities
- Software Assurance Marketplace (SWAMP)
- Software Quality Assurance (SQA)
- Static Analysis Tools Modernization Project (STAMP)
- Developing Tests, Evaluations, Standards and Systems Engineering
- Explosives Detection and Aviation Screening
- First Responders
- COVID-19 Information for First Responders
- Commercialized Technologies
- Enhanced Dynamic Geo-Social Environment (EDGE)
- Grants & Training
- Identity, Credential, and Access Management (ICAM)
- Information Sharing Assessment Tool (ISAT)
- Next Generation First Responder (NGFR)
- Project 25 Compliance Assessment Program (P25 CAP)
- Publications
- Shaken Fury
- Smart City Internet of Things Innovation (SCITI) Labs
- Social Media Working Group (SMWG) for Emergency Services and Disaster Management
- System Assessment and Validation for Emergency Responders (SAVER)
- Terrorism Prevention
- Voice, Video, and Data for Public Safety
- Support to the COVID-19 Response
- Unmanned Aerial Systems
- Welcome to the S&T Impact Series!
- Work with S&T
- S&T News
- S&T Blog
- S&T Newsroom
- S&T Events
- S&T News Archives
- 2015 Snapshot Archives
- 2014 Snapshot Archives
- 2013 Snapshot Archives
- 2012 Snapshot Archives
- 2011 Snapshot Archives
- 2010 Snapshot Archives
- 2009 Snapshot Archives
- 2008 Snapshot Archives
- 2007 Snapshot Articles
- 2015 Press Release Archives
- 2014 Press Release Archives
- 2013 Press Release Archives
- 2012 Press Release Archives
- 2011 Press Release Archives
- S&T Privacy Policy
- S&T Videos
- S&T Publications
- S&T Website Terms of Use
- About S&T
- Office of Enterprise Services
- Office of Innovation and Collaboration
- Office of Mission and Capability Support
- Office of Science and Engineering
- About Technology Clearinghouse
- Operations and Requirements Analysis
- Technology Centers
- Biometric and Identity Technology Center
- Data Analytics Technology Center
- Hazard Awareness & Characterization Technology Center
- Modeling and Simulation Technology Center
- Office for Interoperability and Compatibility Technology Center
- Sensors and Platforms Technology Center
- Social Science Technology Center
- Technology Center FAQs
- Technology Center Fact Sheets
- Systems Engineering and Standards
- Test and Evaluation
- Integrated Product Teams
- Technology Scouting
- Operational Experimentation
- Office of the Chief Scientist
- S&T Careers
- S&T Organizational Chart
- S&T Strategic Plan
- HSSTAC
- Leadership
- Our Work
- Blog