Sie sind auf Seite 1von 70

DHS State and Local Law

Enforcement Resource
Volume V
April 2017
Intentional blank page. Please continue to the next page.

Letter from the Office for State and Local Law
April 11, 2017

Dear Law Enforcement Partners:

Homeland security begins with hometown security. To achieve this security, the Department of
Homeland Security (DHS) strives to provide its state, local, and tribal law enforcement partners
with the latest tools, information, and resources. With the release of the DHS State and Local
Law Enforcement Resource Catalog, Volume V, we are pleased to continue assisting the brave
men and women serving in state, local, and tribal law enforcement agencies across the country.

The DHS State and Local Law Enforcement Resource Catalog is a one-stop shop for non-federal
law enforcement. This document summarizes and provides links to training, publications,
newsletters, programs, and services available from the offices and components across the
Department (e.g., U.S. Immigration and Customs Enforcement, Transportation Security
Administration, etc.) to our law enforcement partners.

At DHS, we are continually developing new programs and resources to assist state, local, and
tribal law enforcement. If you cannot find what you are searching for in this catalog, please do
not hesitate to contact the Office for State and Local Law Enforcement for additional assistance.

The Office for State and Local Law Enforcement endeavors to enhance the support that DHS
provides to our law enforcement partners. We hope this catalog will assist you in your efforts to
keep our communities safe, secure, and resilient.


Office for State and Local Law Enforcement

Department of Homeland Security

Office for State Responsibilities
and Local Law Serve as the primary Department
liaison to state, local, tribal, and
Enforcement territorial law enforcement;
Advise the Secretary on the
issues, concerns, and
recommendations of state, local,
Overview tribal, and territorial law
On the recommendation of the 9/11 Keep the law enforcement
Commission, Congress created the Office for community informed about
State and Local Law Enforcement (OSLLE) in Department-wide activities and
2007 to lead the coordination of DHS-wide initiatives such as If You See
Something, Say Something, the
policies related to state, local, tribal, and
Blue Campaign, Nationwide
territorial law enforcements role in Suspicious Activity Reporting
preventing, preparing for, protecting against, (SAR) Initiative (NSI), and the
and responding to natural disasters, acts of Departments efforts in
terrorism, and other man-made disasters Countering Violent Extremism;
within the United States. Identify and respond to law
enforcement challenges that
affect homeland security;
Coordinate with the Office of
Intelligence and Analysis to
ensure timely coordination and
distribution of intelligence and
Contact OSLLE strategic information to state,
local, tribal, and territorial law
enforcement; and
Phone: 202-282-9545
Work with the Federal Emergency
Management Agency to ensure
Email: that law enforcement and
terrorism-focused grants to state,
local, tribal, and territorial law
Website: enforcement agencies are
and-local-law-enforcement-oslle appropriately focused on
terrorism prevention activities.

Helping to Build a Safe, Secure, and Resilient Nation

Table of Contents
Letter from the Office for State and Local Law Enforcement.............. 3
The Office for State and Local Law Enforcement ................................. 4
Department of Homeland Security Resources ....................................... 6
Department-wide Resources .................................................................... 6
U.S. Citizenship and Immigration Services (USCIS) ............................... 9
Office of the Citizenship and Immigration Services Ombudsman (CIS
Ombudsman) .......................................................................................... 11
Office for Civil Rights and Civil Liberties (CRCL) ............................... 11
U.S. Coast Guard (USCG) ..................................................................... 13
Office for Community Partnerships (OCP) ............................................ 15
U.S. Customs and Border Protection (CBP) .......................................... 15
Domestic Nuclear Detection Office (DNDO) ....................................... 17
Federal Emergency Management Agency (FEMA) ............................... 20
Federal Law Enforcement Training Centers (FLETC) .......................... 24
Office of Health Affairs (OHA) ............................................................. 25
U.S. Immigration and Customs Enforcement (ICE) ............................... 26
Office of Intelligence and Analysis (I&A) ............................................. 35
National Protection and Programs Directorate (NPPD) ......................... 37
Privacy Office (PRIV) ........................................................................... 52
Science and Technology Directorate (S&T) .......................................... 53
U.S. Secret Service (USSS) ................................................................... 58
Transportation Security Administration (TSA) ..................................... 61

Department-Wide gain knowledge and skills (CVE) and Active Shooter Web
Resources necessary to mitigate the Portal provides a forum to share
loss of their life or the life Unclassified For Official Use
Active Shooter Preparedness of another while in an active Only (FOUO), Sensitive but
Resources. The Department of threat environment. The Unclassified (SBU), and Law
Homeland Security offers a skills will address treating Enforcement Sensitive (LES)
number of resources to state and life threatening injuries in information with anyone who is
local law enforcement for an austere environment with a sworn, full-time, salaried, law
responding to active shooter limited equipment, lack of enforcement officer (federal,
incidents. medically trained personnel state, or local); federal
and prolonged time to employee affiliated with the
Active Shooter Preparedness evacuation. criminal justice system or
resources include a desk Tactical Medical First intelligence communities;
reference guide; a poster; and a Responder (8 hour) military personnel; and
pocket-size reference card to Training Program (TMFR). governmental agencies
address how employees, associated with infrastructure
managers, training staff, and These training programs are protection of the United States.
human resources personnel can designed to provide law The Portal also shares
mitigate the risk of, and enforcement officers with the Unclassified FOUO or SBU
appropriately react in the event threat awareness, analytical information with private sector
of an active shooter situation. knowledge, tactical skills, and partners, civilian security
To access all of these resources, emergency first aid skills which personnel, corporate executives,
visit are needed to successfully serve academic institution employees,
shooter-preparedness. as a law enforcement first first responders (including
Materials are also available in responder in an active firefighters and EMS),
Spanish. shooter/threat situation. They international partners, religious
are conducted at selected leaders, and other state and
The Federal Law Enforcement venues throughout the country, local partners that are not law
Training Centers (FLETC) offer hosted by a local law enforcement personnel, as
tuition-free or low-cost training enforcement agency or at one of appropriate. The portal
courses, including an Active FLETCs training delivery provides users and training
Shooter Threat Training points which are located in practitioners with accurate,
Portfolio that includes the Artesia, NM; Charleston, SC; appropriate, and relevant CVE
following training programs: Cheltenham, MD; and Glynco, and Active Shooter training
GA. To learn more about development resources, subject
Active Shooter Threat FLETC training courses matter expert information, and
Training Program (ASTTP) available to state, local, and outreach initiatives. It also has
covers fundamental/basic tribal law enforcement and for forums to provide feedback,
skills; contact information, visit products useful to others, and
Active Shooter Threat allows participants to ask
Instructor Training local-tribal or contact questions concerning CVE or
Program (ASTITP) the Active Shooter Program.
instructor level, train-the- Persons with a job-related duty,
trainer program; Within the Homeland Security public service interest, or who
Basic Tactical Medical Information Network (HSIN), support a CVE and/or Active
Instructor Training the Joint DHS and Federal Shooter program can request
Program (BTMITP) the Bureau of Investigation (FBI) access into this Portal. Work-
law enforcement officer will Countering Violent Extremism related information is needed to

ensure members are provided organizations, the Blue Human trafficking
the appropriate accesses and Campaign strives to promote awareness posters and
their work activities justify a the basic right of freedom so public service
need to know. This information that those who exploit human announcements.
is used to nominate the user into lives can be brought to justice.
HSIN. The user will then Increased awareness and To access these and other
receive an email to validate training will lead to more tips to products, visit
their information. To request law enforcement, which results
access, email: in more victims being campaign. identified. We cannot do this
Provide the following alone so please join us in the DHS Common Operating
information in the body of the fight to end human trafficking. Picture (COP) provides
email: Visit the Blue Campaign government and private sector
Full Name; website to learn about how we Homeland Security Enterprise
Place of Employment; can work together and to find professionals with enhanced
Job Title; out about available training, situational awareness;
Work Email Address; outreach materials, and victim facilitating timely decision
Work Phone Number; assistance. To learn more, visit support prior to or in the
Short Job Description as it aftermath of a natural disaster,
Relates to CVE or Active campaign or contact act of terrorism, or man-made
Shooter. disaster. The DHS COP
architecture coupled with data
In 2017, the CVE/AS portal will You can also report tips to the from Homeland Security
transition into two new portals. ICE Tip line at 866-DHS-2- partners and Homeland Security
The active shooter materials, ICE, or 866-347-2423. Information Network (HSIN),
which are currently combined provides actionable
with the CVE materials, will be Specific Blue Campaign information, enhanced
separated into its own HSIN training products include: contextual understanding, and
Portal. All current HSIN Web-based training about geospatial awareness. This
memberships to the current the indicators of human enables government and private
CVE/AS portal will be extended trafficking; sector leaders to make timely
to both new portals. Roll call videos explaining and informed decisions, and
how available immigration identify courses of action during
Blue Campaign to Fight relief for foreign victims an event or threat situation. The
Human Trafficking. DHS is provide a benefit to law DHS COP provides users with a
responsible for investigating enforcement; broad set of capabilities based
human trafficking, arresting Scenario-based videos on best-in-class technologies
traffickers, and protecting depicting indicators of sex that deliver a rich, end user
victims. The Department also trafficking and labor experience through a web-
provides immigration relief to trafficking; accessible interface. Access
victims of human trafficking. Printed educational and through the link to the DHS
The Blue Campaign is the reference materials for law COP is on the top right side of
unified voice for the DHS enforcement, non- the HSIN home page.
efforts to combat human governmental organizations,
trafficking. Working in judicial officials, first Homeland Security
collaboration with law responders, school staff, and Information Network (HSIN)
enforcement, government, non- victims or potential victims; is a national, secure, and trusted
governmental, and private and web-based portal for

information sharing and terrorism-related crime, and to
collaboration between federal, emphasize the importance of As defined by law, the term
state, local, tribal, territorial, reporting suspicious activity to situational awareness means
private sector, and international the proper local law information gathered from a
partners engaged in the enforcement authorities. The variety of sources that, when
homeland security mission. campaign was originally used communicated to emergency
Using a single login credential, by New York's Metropolitan managers and decision makers,
HSIN provides secure access Transportation Authority, which can form the basis for incident
from multiple networks such as has licensed the use of the management decision making.
LEEP, RISSnet, Intelink, and slogan to DHS for anti-
Tripwire. HSIN is made up of terrorism and anti-terrorism National Terrorism Advisory
growing network of crime related efforts. For more System (NTAS) has replaced
communities, called information about the initiative, the Homeland Security
Communities of Interest (COI). visit Advisory System as nations
COIs are organized by state something-say-something. primary domestic terrorism
organizations, federal alerting resource. This system
organizations, or mission areas National Operations Center more effectively communicates
such as emergency (NOC). In accordance with 6 information about terrorist
management, law enforcement, U.S.C. 321(d), the National threats by providing timely,
critical sectors, and intelligence. Operations Center serves as the detailed information to the
Users can securely share within principal operations center for public, government agencies,
their communities or reach out the Department and shall: first responders, airports and
to other communities as needed. other transportation hubs, and
HSIN provides secure, real-time Provide situational the private sector. It recognizes
collaboration tools, including a awareness and a Common that Americans all share
virtual meeting space, instant Operating Picture for the responsibility for the nations
messaging, and document entire Federal Government;, security, and should always be
sharing. HSIN allows partners and for State, local, tribal, aware of the heightened risk of
to work together instantly, and territorial governments;, terrorist attack in the U.S. and
regardless of their location, the private sector;, and what they should do. After
communicate, collaborate, and international partners as reviewing the available
coordinate. This enables appropriate, for events, information, the Secretary of
government and private sector threats, and incidents Homeland Security will decide,
leaders to make timely and involving a natural disasters, in coordination with other
informed decisions, and identify acts of terrorism, or other federal entities, whether an
courses of action during an man-made disasters; NTAS Alert should be issued.
event or threat situation. For Ensure that critical terrorism For more information, visit
more information, visit and disaster-related information reaches terrorism-advisory-system.
government decision-
"If You See Something, Say makers; and
Something". The Enter into agreements with
nationwide "If You See other Federal operations
Something, Say Something" centers and other homeland
public awareness campaign is a security partners, as
simple and effective program to appropriate, to facilitate
raise public awareness of information the sharing of
indicators of terrorism and information.
U.S. Citizenship and programs sponsored by law is necessary for the successful
Immigration Services enforcement agencies, such as prosecution of criminal activity.
Joint Terrorism Task Forces The S-6 visa is available to
(USCIS) (JTTFs), Document and Benefit aliens possessing "critical
Fraud Task Forces (DBFTFs), reliable information" regarding
USCIS is the government and state and local fusion terrorist activity. State and
agency that oversees lawful centers. Immigration officers federal law enforcement
immigration to the United participation in these programs authorities (including federal or
States. USCIS will secure may be full-time, part-time, or state courts and U.S. attorneys)
Americas promise as a nation virtual support. Immigration can initiate a request under the
of immigrants by providing officers conduct administrative "S" category. Requests for S
accurate and useful information site visits and provide general status are processed through the
to our customers, granting or case-specific immigration requesting agency, the
immigration and citizenship information to law enforcement Department of Justice, and
benefits, promoting an agencies under DHS guidance. ultimately USCIS FDNS.
awareness and understanding of Currently there are more than
citizenship, and ensuring the 70 immigration officers in the Notional immigration
integrity of our immigration JTTF Program and 25 documents are genuine
system. Read the full mission immigration officers in most of immigration documents issued
statement at the 21 ICE-led DBFTFs. In to individuals who do not addition, designated possess the associated
immigration officers in all 26 immigration status. These
Avoid Scams is a webpage for District Offices have made documents are issued in
the public to find information positive contact with a point-of- furtherance of law enforcement
about how to recognize and contact at state and local fusion investigations in order to create
report immigration scams and centers. For more information, the appearance that an
the unauthorized practice of please contact individual possesses or has been
immigration law, and how to USCISFODFDNSOps@uscis.d approved for a particular
find authorized help with immigration status. Law
immigration services. To learn enforcement requests for
more, visit Law Enforcement Support notional documents are Operation Unit. USCISs submitted to U.S. Immigration
scams, or FDNS Directorate has and Customs Enforcement developed a centralized (ICE), which reviews the
stafas in Spanish. operation to administer the S notional document request to
Visa Program and facilitate the ensure that documents are being
Fraud Detection and National issuance of notional (cover) requested for a legitimate
Security Directorate (FDNS). immigration documents. investigative purpose. If ICE
FDNS is embedded within believes the document request is
USCIS offices across the The S Visa Program is available appropriate, USCIS will
country, and is staffed with for aliens who possess critical consider production of the
immigration officers who are reliable information concerning requested document. For more
well-versed in immigration- a criminal organization or information, visit
related fraud and national enterprise, and who are willing
security issues. Immigration to share or have shared their card/other-ways-get-green-
officers not only provide information with a U.S. law card/green-card-informant-s-
support to adjudicators of enforcement agency or court nonimmigrant.
immigration benefit and whose presence in the U.S.
applications, but also support
USCIS Public Engagement trafficking, and who meet other information about U and T
Division (PED) seeks to focus requirements. The U visa is visa requirements, the law
on open, candid, and generally available for victims enforcement certification
constructive collaboration with of certain qualifying crimes process, and answers to
community stakeholders at all who have been, are being, or are frequently asked questions
levels. PED is dedicated to likely to be helpful to law from law enforcement
coordinating and directing enforcement in the investigation agencies to support
agency-wide dialogue with or prosecution of the crime, and investigations and
external stakeholders to actively who meet other requirements. prosecutions involving
collaborate and maintain open Federal, state, local, tribal or victims of human trafficking
and transparent communication territorial law enforcement and other crimes. Included
and to seek feedback regarding agencies may sign a law in the guide is a selection of
policies, priorities, and enforcement certification for the best practices and a
organizational performance victim detailing the crime and frequently asked questions
reviews. For more information, the victims cooperation in the section that draws upon
visit investigation or prosecution. U questions received by state visa petitioners are required to and local law enforcement.
or contact submit this law enforcement The guide is available
Public.Engagement@uscis.dhs. certification with their Form I- electronically at
gov. 918, Petition for U
Nonimmigrant Status, and T ation/u-visa-law-
USCIS Resources is a webpage visa applicants may submit a enforcement-certification-
with links to a variety of law enforcement certification resource-guide.
publications and other materials with their Form I-914,
for USCIS customers, the Application for T Information for Law
organizations that serve them, Nonimmigrant Status. The Enforcement Agencies and
and the public. For more investigating or prosecuting law Judges. USCIS has a
information, visit enforcement agency does not webpage for law apply to USCIS for a T or U enforcement agencies and
USCIS provides the latest visa on the victims behalf. judges that explains the
version of its applications and Law Enforcement Agencies are different types of benefits
petitions on its website. All never required to sign a available for victims of
forms are free and available at certification, and are not human trafficking and other responsible for determining crimes. It also describes
For more information, contact eligibility for a T or U visa. procedures for law The victim applies to USCIS for enforcement, including a list
a T or U visa and USCIS of Important Things to
T and U Nonimmigrant reviews the application and all Remember. Other
Status (T Visas and U submitted evidence, including materials include roll call
Visas) for Victims of Human any law enforcement videos, information about
Trafficking and Other certifications, to determine continued presence (a
Qualifying Crimes. The T visa eligibility. Related resources temporary immigration
is generally available for include: status administered by ICE
victims of human trafficking for victims of human
who have complied with any The U and T Visa Law trafficking), and links to the
reasonable request for Enforcement Resource T visa declaration form and
assistance in the investigation or Guide provides law U visa certification form.
prosecution of the human enforcement officials Both of these forms are

completed by the Send Your Recommendations programs, or policies by DHS
investigating or prosecuting to the CIS Ombudsman. The employees, leading to
agency but submitted to CIS Ombudsman is dedicated to recommendations to fix
USCIS by the victim. For identifying systemic issues in identified problems and help
more information, visit the immigration benefits DHS safeguard the Nation process and preparing while preserving individual
resources/information-law- recommendations for liberty, fairness, and equality
enforcement-agencies-and- submission to USCIS for under the law.
judges. For law process changes. Send
enforcement inquiries, examples of identified issues CRCL is also responsible for
contact and suggestions to assuring that the Departments
LawEnforcement_UTVAW federally-assisted programs comply with various civil rights
Submit a Request for Case laws, including but not limited
In-Person and Web-Based Assistance to the CIS to Title VI of the Civil Rights
Training. USCIS offers in Ombudsman. If you, or Act of 1964, as amended; Title
person and web-based someone you are working with, IX of the Education
presentations for law are experiencing problems Amendments of 1972, as
enforcement on T and U during the adjudication of an amended; Section 504 and the
visas. If interested, contact immigration benefit with Rehabilitation Act of 1973, as
USCIS at USCIS, you can submit an amended; Age Discrimination
T_U_VAWATraining@usci electronic DHS Form 7001 Act of 1975, as amended (Age through the Ombudsman Online Act); and DHS regulation 6
Case Assistance system. To C.F.R. Part 19,
submit a request for assistance Nondiscrimination in Matters
Office of the Citizenship on behalf of another, follow the Pertaining to Faith-based
and Immigration Services form instructions to ensure the Organizations.
appropriate party consents to
Ombudsman (CIS your submission. For more Civil Rights Requirements in
Ombudsman) information, visit Federally-Assisted Programs. CRCL provides resources,
The CIS Ombudsman is assistance. guidance, and technical
available to help law assistance to recipients of DHS
enforcement with issues or financial assistance on
concerns they have regarding complying with Title VI of the
Office for Civil Rights and
their interactions with USCIS. Civil Rights Act of 1964 (Title
The CIS Ombudsman is an Civil Liberties
VI), Section 504 of the
independent, impartial, and (CRCL) Rehabilitation Act of 1973, 6
confidential office within DHS C.F.R., part 19, and related
Headquarters that helps DHS CRCL is available to help
requirements. Information for
individuals and employers law enforcement with issues
recipients on meeting their
resolve problems with USCIS relating to the DHS mission and
nondiscrimination requirements
applications and petitions. The the protection of civil rights and
under Title VI is available on
office also makes civil liberties. CRCL works
CRCLs website,
recommendations to fix with other DHS offices and
systemic problems and improve components to develop policies,
the overall delivery of services programs, and training material.
provided by USCIS. It also investigates complaints
alleging violation of rights,
DHS also published guidance to demographic communities ongoing and upcoming projects;
help those who carry out together with federal, state, and opportunities to offer
Department-supported activities local, tribal, and territorial comments and feedback.
to understand and implement government representatives. Newsletters are distributed via
their obligations under Title VI Issues discussed range from an email list to thousands of
to provide meaningful access immigration and border issues non-governmental
for people with limited English to civil rights issues in aviation organizations, community
proficiency security. CRCL also conducts members, and government
( roundtables with young leaders partners, and made available to
published-help-department- of diverse communities. For community groups for
supported-organizations- more information, contact redistribution. For more
provide-meaningful-access- communityengagement@hq.dhs information, visit
people-limited). For more .gov.
information, contact n/crcl-newsletter. Countering Violent
Extremism (CVE) Training How to File and Submit a
Common Muslim American Guidance and Best Practices. Complaint. Under 6 U.S.C.
Head Coverings and Common This written guidance provides 345 and 42 U.S.C. 2000ee-1,
Sikh American Head best practices for federal, state, CRCL reviews and assesses
Coverings Posters. CRCL and local government and law information concerning abuses
provides guidance to enforcement officials of civil rights, civil liberties,
Department personnel on the organizing CVE, cultural and profiling on the basis of
appropriate ways in which to awareness, and counterterrorism race, ethnicity, or religion, by
screen and, if necessary, search training. For more information, employees and officials of
Muslim or Sikh individuals visit DHS. Complaints are accepted
wearing various types of rights-and-civil-liberties- in languages other than English.
religious head coverings. institute. For more information, visit
Although these posters are
primarily designed for DHS DHS Complaint Avenues civil-rights-and-civil-liberties.
personnel, they are available to Guide. DHS has many avenues
state and local law enforcement. for the public to make complaints I Speak Language
For more information, visit involving DHS employees or Identification Pocket Guides programs, alleged violations of and Posters. CRCL has
civil-liberties-institute. civil rights and civil liberties, created a set of three tools (I
immigration filing, travel redress, Speak poster, pocket guide,
Educational posters in and other types of grievances. and job aid) for use by state and
customizable digital and hard CRCL developed a guide which local law enforcement officers
copy form can be ordered from brings together information about who work directly with the
the DHS CRCL by emailing these avenues. For more public and who may need to information, visit identify the language of the
person with whom they are
Community Roundtables. interacting. These tools support
CRCL leads, or plays a the Language Access Plans that
significant role in regular many sheriffs offices have put
The CRCL Newsletter is
roundtable meetings across the in place to meet the
distributed monthly to inform
country in over 15 U.S. cities. requirements of Title VI of the
stakeholders and the public
These roundtables bring Civil Rights Act of 1964, as
about office activities, including
exceptionally diverse amended. The I Speak format
how to make complaints;
includes 75 of the most First Amendment issues in the United States Coast Guard
frequently encountered information sharing (USCG)
languages, as well as 13 of the environment (covers
indigenous languages of considerations when fusion USCG has a wide array of
Mexico and Central America. centers may encounter surface, air, and specialized
For more information, digital constitutionally protected assets and capabilities available
copies, or samples, email activities, such as freedom of for multiple levels of response, speech, demonstrations, patrol, and mission specific
petitions for redress, etc.). tasks.
Privacy, Civil Rights & Civil Fusion centers and their liaison
Liberties Fusion Center officer networks have the option Surface platforms consist of
Training Program. The of choosing additional topics to boats and cutters. Vessels
Implementing create a customized agenda. under 65 feet in length are
Recommendations of the 9/11 For more information, email classified as boats and usually
Commission Act requires that FusionCenterTraining@hq.dhs. operate near shore, on inland
DHS support fusion centers by gov. waterways, and from cutters.
providing training on privacy, Craft include: Motor Lifeboats;
civil rights, and civil liberties. Note on Current Status: While Medium and Small Response
As a result, CRCL and the DHS this program does not currently Boats; special purpose response
Privacy Office have partnered provide on-site training due to boats; port security boats; Aids
with the DHS Office of lack of funding, extensive to Navigation boats; and a
Intelligence & Analysis and the materials and technical variety of smaller, non-standard
DOJ Bureau of Justice assistance is available. boats including rigid hull
Assistance to deliver this inflatable boats. Sizes range
training program. The program Web Portal for Privacy and from 64-foot in length down to
has included: A website Civil Rights & Civil Liberties 12-foot. Cutters are
resource center Officers. This portal provides commissioned USCG vessels training materials and video 65 feet in length or greater,
iberty; a training of resources for state and local having adequate
Privacy/Civil Liberties Officers personnel and trainers on accommodations for crew to
program; a technical assistance privacy, civil rights, and civil live onboard. Cutters usually
program; and an on-site training liberties issues encountered by have one or more rigid hull
program. Topics covered fusion centers and justice inflatable boats onboard. Polar
include: civil rights and civil entities. The recently updated Class icebreakers also carry an
liberties basics and red flags web portal includes over 30 Arctic Survey Boat and Landing
(how to spot potential issues pages of new content Craft. The USCG cutter fleet
and incorporate safeguards into specifically geared toward ranges from a 420-foot
your procedures); privacy privacy and civil rights and civil Icebreaker to a 65-foot harbor
fundamentals (how to integrate liberties officers. The portal tug, however, the most
your privacy policy and was developed as a result of a commonly recognized and
recognize and respond to a partnership between CRCL, widely utilized are National
privacy incident); cultural Privacy Officers, and the DHS Security Cutters, High and
tactics for intelligence and law Office of Intelligence and Medium Endurance Cutters
enforcement professionals Analysis. This is available at: (418-foot, 378-foot, 270-foot,
(covers frequently encountered and 210-foot) and our smaller
misconceptions and stereotypes iberty. 87-foot Marine Protector Class,
and addresses policies against 110-foot Island Class, and 154-
racial or ethnic profiling); and

foot Sentinel Class patrol Nuclear and Enhanced
vessels. Conventional Weapons or call 703-313-5900.
(CBRNE) Detection and
There are a total of 201 aircraft Identification; Disaster USCG Sector Command
in Coast Guard inventory, a Response; Environmental Centers. Given USCG mission
figure that will fluctuate due to Response; Deployable Incident diversity, asset readiness status
operational and maintenance Management; Advanced and ongoing operations, the
schedules. Major Missions Planning; and multiple main avenue for proper and
consist of Search/Rescue, Law supporting capabilities. expeditious USCG asset
Enforcement, Environmental mobilization requests are
Response, Ice Operations, and Americas Waterways Watch through USCG Sector
Air Interdiction. Fixed-wing is a combined effort of the Command Centers. There are
aircraft (C-130 Hercules, C-27 USCG and its Reserve and 37 USCG Sectors.
Spartan, C-144 Ocean Sentry, Auxiliary components to enlist
and C-37 Gulfstream) operate the active participation of those Commands throughout the
from large and small Air who live, work, or play around U.S. and U.S. territories:
Stations. Rotary wing aircraft America's waterfront areas. For Sector Command Centers
(H-65 Dolphin and H-60 more information, contact Sector Name
Anchorage, AK
24/7 Contact
Jayhawk helicopters) operate or visit Baltimore Baltimore, MD 410-576-2693
Boston Boston, MA 617-223-5757
from flight-deck equipped http://americaswaterwaywatch.u Buffalo Buffalo, NY 716-843-9527
Cutters, Air Stations, and Air To report suspicious Charleston Charleston, SC 843-740-7050
Columbia River Warrenton, OR 503-861-6211
Facilities. activity call 877-24WATCH Corpus Christi
Corpus Christi,
(877-249-2824). Delaware Bay Philadelphia, PA 215-271-4940
USCG Deployable Specialized Detroit Detroit, MI 313-568-9560
Guam Santa Rita, Guam 671-355-4824
Forces (DSF) provides USCG Maritime Information Hampton Roads Portsmouth, VA 757-668-5555
additional teams and resources Exchange (CGMIX) makes Honolulu
Honolulu, HI 808-842-2600
Houston, TX 281-464-4854
such as Maritime Safety and USCG maritime information Galveston
Security Teams (11), Port available to the public on the Humboldt Bay

Security Units (8), Tactical Law internet in the form of Jacksonville

Atlantic Beach,
Enforcement Teams (2), searchable databases. Much of Juneau Juneau, AK 907-463-2980
Key West Key West, FL 305-292-8727
Maritime Security Response the information on the CGMIX Lake Michigan Milwaukee, WI 414-747-7182
Team (1), National Strike Force website comes from the LA-Long Beach San Pedro, CA 310-521-3600
and Regional Dive Lockers (2). USCGs Marine Information for Mississippi
Memphis, TN 901-521-4822
Long Island New Haven, CT 800-774-8724
DSF teams are capable of Safety and Law Enforcement Miami Miami Beach, FL 305-535-4472
worldwide deployment via air, (MISLE) information system. Mobile Mobile, AL 251-411-6211
New Orleans New Orleans, LA 800-874-2153
ground or sea transportation in For more information, visit New York Staten Island, NY 718-354-4120
response to changing threat North Bend
North Carolina
North Bend, OR
Wilmington, NC
conditions and evolving Northern New South Portland,
England ME
Maritime Homeland Security USCG Navigation Center Ohio Valley Louisville, KY 502-779-5400
mission requirements. Core supports safe and efficient Puget Sound Seattle, WA 206-217-6001
San Diego San Diego, CA 619-278-7000
capabilities include: Enhanced maritime transportation by San Francisco
San Francisco,
Law Enforcement Boarding; delivering accurate and timely San Juan San Juan, PR 787-289-2041
Waterside Security/Force maritime information services Sault Ste. Marie
Sault Ste. Marie,
Protection; Landside and Global Positioning System Southeastern
Woods Hole, MA 508-457-3211
New England
Security/Force Protection; Port (GPS) augmentation signals that St. Petersburg St. Petersburg, FL 727-824-7506
Security; Subsurface permit high-precision Upper
St. Louis, MO 314-269-2500
Operations; Chemical, positioning and navigation. For
Biological, Radiological, more information, visit

Office for Community and law enforcement develop international trade and travel
Partnerships (OCP) the necessary understanding of while enforcing hundreds of
al-Qaida, al-Shabaab, Islamic U.S. laws and regulations,
In 2017, DHS relaunched its State of Iraq and the Levant including immigration and
Countering Violent Extremism (ISIL), and related affiliates customs laws. For more
(CVE) public webpage, which recruitment tactics and explore information, visit
will undergo further revision ways to collectively and or contact 202-344-1700.
this year. On the webpage, holistically address these threats
individuals can find information before they become a challenge The Carrier Liaison Program
about the Departments CVE at the local level. Due to the provides standardized training
approach, as well as resources increased number of Western- and assistance to international
such as a CVE tool-kit, based fighters traveling to air carriers related to
information on building foreign war conflicts, such as admissibility and fraudulent
community partnerships, the Syria and Somalia, the CAB document detection in order to
DHS CVE Grants Program, and now includes information encourage carrier compliance
several frameworks and models relating to the foreign fighter with U.S. immigration laws.
for CVE program recruitment narrative by al- For more information about the
development. The website is Shabaab and ISIL, and the Carrier Liaison Program, visit
currently being updated with myths versus realities of the
training resources and relevant situation in Syria and Somalia. industry-personnel/carrier-
links. For more information, liaison-prog or contact
visit In addition to the CAB, a newly or 202-621- developed CVE Law 7817.
-violent-extremism#. Enforcement Awareness
Briefing (LAB) will become CBP Border Community
Enhanced Engagement and available in the near future. The Liaison Program. Border
Training Resources. LAB will focus on the unique Community Liaisons focus on
The Community Awareness roles and issues that law outreach to community
Briefings (CAB) enforcement officers face when stakeholders and provide fact-
To enhance engagement efforts they deal with issues relating to based information regarding the
and provide awareness training countering violent extremism. CBP mission, functions,
in regards to CVE, DHS, in authorities, and responsibilities.
partnership with the National To learn more about the CAB For more information about
Counterterrorism Center and LAB please email Border Community Liaisons
(NCTC), developed and is nationwide please email Maria
delivering the CAB. This E. Ibanez at Maria.E.
briefing has been conducted in
cities across the country to U.S. Customs and Border
communities and state, local, Protection (CBP) The CBP Information Center
and federal law enforcement. (CIC) serves as the primary
CBP is one of the DHS largest CBP liaison to the general
The CAB is designed to share and most complex components, public, enabling legitimate trade
unclassified information with a priority mission of and travel by providing accurate
regarding the threat of violent keeping terrorists and their and timely information
extremism. The CAB has been weapons out of the United regarding CBP regulations,
conducted in 14 U.S. cities over States. It also has a processes, procedures, and
the past few years. It is responsibility for securing the trusted traveler programs. The
designed to help communities border and facilitating lawful CIC also serves as the conduit

for the public to ask questions te-enganes or contact Laurel
or submit compliments and rts. Smith at
complaints regarding the or 202-344-1582.
agency. The CIC can be Intergovernmental Public
reached at 877-CBP-5511 or Liaison (IPL). The Port of Entry Information.
202-325-8000. Intergovernmental and Public CBP enforces the import and
Liaison is CBPs liaison to export laws and regulations of
CBP Laboratories and state, local, tribal, and territorial the U.S. Federal Government,
Scientific Services coordinates governments and non- processes international
technical and scientific support governmental organizations. passengers and cargo, and
to all CBP and DHS-wide trade IPL facilitates communication performs agriculture inspections
and border protection activities between the agency and these at ports of entry. Port personnel
including laboratory analysis stakeholders regarding CBP are the face at the border for
for trade enforcement and initiatives and policies. most cargo and persons entering
product safety, forensic services the United States. For a list of
for criminal investigations, and IPL serves the dual role of ports, visit
24/7 telephonic access to representing the
scientific resources for technical intergovernmental and external rts.
case adjudication for perspective in the federal
radiation/nuclear materials and policymaking process as well as Preventing International Non-
other potential weapons of mass clarifying the federal Custodial Parental Child
effect. For more information, perspective to Abduction. CBP partners with
visit intergovernmental officials and the Department of States external stakeholders. IPL aims (DOS) Office of Childrens
-scientific-svcs. to enhance communication and Issues to prevent the
partnerships with local, state, international abduction of
Intellectual Property Rights tribal, and territorial children involved in custody
(IPR) Help Desk. CBPs IPR governments as well as the disputes or otherwise against
Help Desk provides information general public, and a variety of the published order of the court.
on IPR border enforcement external partners such as, If you are concerned about the
procedures and receives academia, private sector and international travel of a child,
allegations of IPR infringement. not-for profit groups, and please contact the DOS Office
Questions regarding IPR national organizations. of Childrens Issues at
enforcement at U.S. borders and Questions for IPL can be or
information on IPR infringing directed to CBP- the 24 hour hotline 888-407-
goods that may be entering the INTERGOVERNMENTAL- 4747.
U.S. can be directed to the IPR PUBLIC-
Help Desk at 562-980-3119 ext. or 202- Suspicious Aircraft or Boats.
252, or via email at 325-0775. The CBP Air and Marine Operations Center (AMOC) is
No Te Engaes (Dont be responsible for securing the
Missing or Late International Fooled) is the CBP outreach airspace at and beyond our
Travelers. Information campaign to raise awareness of Nations borders through
regarding reported missing or human trafficking among detection, monitoring, sorting
late international travelers can potential migrants. For more and interdiction of general
be obtained from the nearest information, visit aviation and maritime threats.
port of entry. For a list of ports, Suspicious air or maritime
visit security/human-trafficking/no- activity to include low flying

aircraft and drug or human contact effectiveness of detection
smuggling activity should be systems such as: radiation
directed to AMOC at 1-866- isotope identification devices
AIRBUST. The Data Mining, Analysis, (RIIDs), personal radiation
and Modeling Cell (DMAMC) detectors (PRDs), backpacks,
Tip Line. Suspicious activity is a team of subject matter and mobile systems (vehicle-
regarding international travel experts from the radiation mounted, boat-mounted, and
and trade can be reported to detection community aerial-mounted).
CBP at 1-800-BE-ALERT. responsible for leveraging
existing data and analysis When completed and available
Visa Waiver Program (VWP) methods to answer scientific for release, DNDO publishes
enables citizens and nationals and technical questions posed them in the weekly newsletter,
from 38 countries to travel to by DNDO stakeholders related The Source. To be added to the
and enter the U.S. for business to the radiological detection distribution list for The Source,
or visitor purposes for up to 90 mission. For more information simply email a request to
days without obtaining a visa. contact the DMAMC at
For more information about the
Visa Waiver Program, visit The GRaDER Program. Equipment Test Results. GRaDER provides objective
national-visitors/visa-waiver- Federal, state, local, tribal, and and reliable performance testing
program. territorial agencies intending to information to federal, state,
purchase R/N detection and local stakeholders for R/N
equipment are strongly detection equipment tested
Domestic Nuclear encouraged to consider against consensus and technical
Detection Office instruments that have been capability standards to assist in
independently tested by making informed R/N detection
(DNDO) accredited laboratories and have equipment procurements. For
demonstrated conformity with more information, visit
DNDO is a jointly staffed office the applicable American
within DHS. DNDO is the National Standards Institute/ grader-program or email
primary entity in the U.S. Institute of Electrical and GRaDER.questions@hq.dhs.go
government for implementing Electronics Engineers v.
domestic radiological and (ANSI/IEEE) N42 standards.
nuclear (R/N) detection efforts Manufacturers offering new Joint Analysis Center (JAC).
for a managed and coordinated equipment for consideration The JAC, located within
response to R/N threats, as well should be asked to provide DNDO, provides awareness of
as integration of federal nuclear evidence of independent testing the Global Nuclear Detection
forensics programs. DNDO is for compliance with these Architecture (GNDA) and
charged with coordinating the standards. DNDO has provides technical support for
development of the global resources that are available to federal, state, local, tribal, and
nuclear detection and reporting assist federal, state, local, tribal, territorial authorities. Utilizing
architecture, with partners from and territorial entities in the Joint Analysis Center
federal, state, local, tribal, selecting the right R/N detection Collaborative Information
territorial, and international equipment to meet their System (JACCIS), the JAC
governments and the private operational needs. facilitates R/N alarm
sector. For more information, adjudication from detection
visit DNDO equipment test events and consolidates and campaigns evaluate the
nuclear-detection-office or
shares information and threats. The MDDU was version of one of the sponsored
databases. designed to supplement standards is
radiological and nuclear
JACCIS provides federal, state, detection capabilities in support et/.
local, tribal, and territorial of national and special security
stakeholders adjudication events, or in response to an Radiological/Nuclear
connectivity, a detector intelligence-driven event. Detection and Adjudication
database, and status information Capability Development
regarding the events and MDDUs are mobile trailer Framework (CDF). The
activities relating to R/N packages containing radiation Capability Development
detection and nuclear forensics detection equipment for up to Framework (CDF) provides
at the Unclassified//For 40 public safety guidance to federal, state, local,
Official Use Only level. In professionals. MDDU packages tribal, and territorial
this capacity, JACCIS maintains are prepositioned across the stakeholders to assist
awareness of the GNDA, which United States. The equipment jurisdictions in identifying gaps
involves facilitating alarm includes PRDs, portable and developing recommended
adjudication and monitoring backpack radiation detection levels of R/N detection
global efforts in R/N detection. units, high and low-resolution capability based on risk factors
JACCIS is completely web radiation identification hand- and the likelihood of
enabled so connectivity is held instruments, mobile encountering illicit R/N
possible anywhere in the radiation detection systems, and material. The CDF output
country in real-time and utilizes interoperable communications supports the Screening, Search,
an agile development process to and tracking equipment. Each and Detection Core Capability
release updates every quarter. MDDU is accompanied by and can be leveraged to support
technical support staff to train investment justifications. The
For alarm adjudication, call federal, state, local, tribal, and CDF and supporting resources
877-363-6522 or e-mail territorial personnel on the use are available on the Homeland For of the specific MDDU Security Information Network
the JAC information line, call equipment, and to help integrate PRND Community of Interest
866-789-8304 or e-mail these capabilities into existing (COI) web portal or by For operations. contacting
more information, visit Federal, state, local, tribal, and
nuclear-detection-office. territorial agencies may request Radiological and Nuclear
an MDDU by contacting Detection Exercises. DNDOs
Mobile Detection Deployment DNDO at Exercises Program provides
Units (MDDU). Collaboration DNDO_MDDU_Request@hq.d support in developing,
between federal, state, local, designing, and conducting
tribal, and territorial law discussion or operational-based
enforcement and public safety Open Access to American R/N detection exercises that are
agencies is crucial to a layered National Standards Institute compliant with the Homeland
approach to radiological and (ANSI) N42 Series Standards. Security Exercise and
nuclear security. DNDO DNDO sponsors the IEEE to Evaluation Program
developed the MDDU as a provide copies of the ANSI N42 methodology, at no cost to
surge asset to assist federal, Radiation Detection Standards stakeholders. Exercises provide
state; local, tribal, and territorial free of charge to anyone who valuable hands-on experience
agencies detect and report wants a copy. The website to for federal, state, and local
radiological and nuclear obtain the latest published personnel performing R/N

detection missions and assist Radiological/Nuclear sharing of lessons learned and
decision makers in integrating Detection National Incident best practices.
the R/N detection mission into Management System (NIMS)
their daily operations. Resource Types. DNDO The program goal is to prevent
Additional information about coordinated the development of the use of an R/N terrorist
R/N detection exercises is R/N detection resource types in weapon against the interior or
available by contacting DNDO partnership with federal, state, maritime portion of the United
at local, tribal, and territorial States. National Program subject matter experts to Development seeks to establish
support planning and sustainable R/N Detection
Radiological and Nuclear organization, and increases capabilities among federal,
Detection Community of efficiency and effectiveness for state, local, tribal, and territorial
Interest (COI). DNDOs R/N sharing R/N detection resources agencies and emergency
Detection COI is a site located through the Emergency responders to detect and report
on the Homeland Security Management Assistance unauthorized R/N materials out
Information Network that Compact and other mutual aid of regulatory control within
provides a repository of useful mechanisms. The NIMS-typed their jurisdictions/regions. To
information on DNDO, R/N teams, equipment, and job titles request assistance or for more
detection, the GNDA, and other provide a common information on DNDO National
nuclear detection related categorization of R/N detection Program Development, contact
activities that can be accessed resources. FEMA is currently
by external users. It is also a conducting a review to include
forum where nuclear detection these as national level tier one Radiological and Nuclear
community stakeholders can resources. The latest resource Detection Training. DNDOs
securely collaborate and share type definitions can be obtained Training Program provides
best practices and lessons by contacting quality products to support,
learned. State, local, tribal, and develop, enhance and expand
territorial law enforcement, fire, R/N detection capabilities in
emergency management and Radiological and Nuclear support of the GNDA.
radiation health Detection National Program Together with other federal
personnel, federal agencies, Development. DNDO works partners, the DNDO Training
federally-funded research and with federal, state, local, tribal, Program provides instructional
development centers, and and territorial government courses in basic, intermediate,
academia directly supporting policy makers, program advanced, and train-the-trainer
nuclear detection capability managers, and operational R/N detection tactics,
development at all levels of administrators to design, techniques, and procedures.
government are encouraged to implement, and sustain an R/N The DNDO Training Program
join the site with other GNDA detection program. DNDOs conducts technical review,
community stakeholders. To R/N Detection National evaluation, and continual
join the R/N Detection COI, Program Development includes developmental improvement of
submit a request by email to the development of concepts of the R/N detection training
DNDO with a message subject operation, standard operating curriculum. These reviews
line of: DNDO PRND COI procedures, multiyear Training increase the operational
HSIN Access Request to the and Exercise Plans, Sustainment detection capabilities of federal,
address: Plans, table top exercises state, local, tribal, and territorial (coordinated through the agencies to detect and interdict
Exercises Program), and the R/N materials and/or devices.
The program seeks to develop

and implement protocols and used as a weapon within high- through alarm adjudication and
training standards for effective threat/high-density Urban Area subject matter expertise and
use of R/N detection equipment Security Initiative (UASI) areas. provides advice on long-term
and the associated alarm Urban Areas are selected training, exercise, and other
reporting and resolution through a competitive program support. State and
processes. application process. The local participants will maintain
program assists these and continue to improve their
R/N detection training courses jurisdictions by using developed capabilities to
are available courses and cooperative agreements to support the GNDA using local
curricula are available both enhance regional capabilities to funds or other Federal
online and in the classroom detect, identify, and interdict Government grant funds. For
through DNDO and its nuclear materials that are out of more information, email
partnered training providers. regulatory control, guide the
For more information e-mail coordination of federal, state, local, tribal, and territorial
Courses are also available entities in their roles defined by Federal Emergency
through the FEMA Federal the GNDA and encourage Management Agency
Sponsored Course catalog. participants to sustain their
nuclear detection program over
Radiological/Nuclear Threat time. There are three phases to
FEMAs mission is to support
and Hazard Identification and the program. In Phase I, STC
our citizens and first responders
Risk Assessment (THIRA) assists state and local
to ensure that as a nation we
Technical Assistance. DNDO stakeholders in developing an
work together to build, sustain,
offers support to SLTT agencies initial operating capability to
and improve our capability to
interested in including R/N detect and report the presence
prepare for, protect against,
scenarios in their THIRAs for of nuclear materials that are out
respond to, recover from, and
the first time, or to enhance R/N of regulatory control. The
mitigate all hazards.
scenarios under development. initial regional capabilities are
DNDOs assistance is mutually supportive through
All-Hazards Emergency
structured around the DHS cooperative agreements, region
Planning Guides. In
Comprehensive Preparedness specific operations,
accordance with Now is the
Guide 201 (CPG 201), 2nd interoperable equipment,
Time: The Presidents Plan to
edition. More information on collective training, and
Protect Our Children and Our
DNDOs THIRA Technical progressive exercise planning.
Communities by Reducing Gun
Assistance can be obtained by In Phase II, STC provides
Violence, FEMA along with
contacting additional resources to enhance
DHS, and the Departments of detection, analysis,
Health and Human Services,
communication, and
Justice, and Education,
Securing the Cities (STC) coordination to better integrate
collaboratively designed and
Program. The STC Program state and local capabilities with
published revised all-hazards
assists state, local, tribal, and Federal government activities
emergency management
territorial stakeholders to design and the GNDA beyond Phase I.
planning guides that include
and implement or enhance Finally, in Phase III, STC
sections that speak to the
existing architectures for provides indirect support to
importance of preparing for,
coordinated and integrated sustain the program. DNDO
preventing, protecting against,
detection and interdiction of works with regional partners to
mitigating, responding to, and
nuclear materials out of maintain connectivity with the
recovering from an active
regulatory control that may be established local architecture
shooter or mass casualty
incident. This joint federal collaboration with the IAB on
effort has resulted in the the items and relevant library/assets/documents/25970.
development of three guides information that is maintained
designed for Houses of on the AEL. The AEL has an First Responder Training.
Worship, Institutions of Higher interactive version which allows Center for Domestic
Education, and Schools for grantees to search for items by Preparedness (CDP), is DHSs
Kindergarten through Twelfth keyword, equipment category, only federally-chartered
Grade. For more information or item number. Each item Weapons of Mass Destruction
and for electronic copies of the page includes the specific grant (WMD) training center
guides visit, program(s) for which the item is committed to having an allowable; a description of the emergency response community
item; and SEL data including prepared for and capable of
The Authorized Equipment operating considerations, item responding to all-hazards
List (AEL) published and standards, and training events. The interdisciplinary
maintained by the FEMA Grant information. For more resident and nonresident
Programs Directorate (GPD), is information, visit training courses at CDP
a tool used by grantees to promote a greater understanding
determine allowability of d-equipment-list. among these diverse responder
equipment types for FEMAs disciplines:
Preparedness Grant Programs. Comprehensive Preparedness
The AEL is used to facilitate Guide 502: Considerations Agricultural Safety,
more effective and efficient for Fusion Center and Citizen/Community Volunteer,
procurement of items under Emergency Operations Education, Emergency
specific FEMA Preparedness Center Coordination provides Management, Emergency
Grants by informing grantees of state and major urban area Medical Services, Fire Service,
relevant standards, operating fusion center and emergency Governmental Administrative,
considerations and operations center (EOC) Hazardous Materials,
programmatic considerations officials with guidance for the Healthcare, Information
associated with each equipment coordination between fusion Technology, Law Enforcement,
item. The AEL consists of 21 centers and EOCs. It outlines Public Health, Public Safety
equipment categories, ranging the roles of fusion centers and Communications, and Public
from Personal Protective EOCs and provides steps by Works, Search and Rescue,
Equipment (PPE) to Medical which these entities can work Security and Safety, and
Supplies to Terrorism Incident together to share information Transportation.
Prevention Equipment. The and intelligence on an ongoing
AEL exists with considerable basis. CPG 502 supports the Emergency Management
overlap with the Standard implementation of the Baseline Institute (EMI) serves as the
Equipment List (SEL), a Capabilities for State and national focal point for the
comprehensive list of first Major Urban Area Fusion development and delivery of
responder equipment Centers, and likewise, assists emergency management
maintained by the IAB, an inter- EOCs to fulfill their missions in training to enhance the
governmental group with both steady state and active capabilities of state, local,
representation from multiple state emergency operations. tribal, and territorial
federal agencies and the first CPG 502 provides guidance on government officials;
responder community, and the broad capability volunteer organizations;
strong connections to subject requirements of an EOC. An FEMAs disaster workforce;
matter experts in all equipment electronic version of the guide other federal agencies; and
areas. GPD works in close is available at the public and private
sectors to minimize the
impact of disasters and exercises, modeling and and seminars), and web-
emergencies on the simulation, drills, functional based. Instructor-led
American public. Visit EMI exercises, and full-scale courses are offered in
and access training through exercises. All of which may residence (i.e., at a training be sponsored by facility) or through mobile
organizations from any level programs, in which courses
National Exercise Program of government, non- are brought to state and
(NEP) serves as the governmental and private local jurisdictions that
principal mechanism for sector, and the whole request the training.
examining the preparedness community.
and readiness of the United Integrated Emergency
States across the entire National Training and Management Course (IEMC):
homeland security and Education Division (NTED) Preparing Communities for a
management enterprise. serves the nation's first Complex Coordinated Attack
The purpose of the NEP is responder community, is a four day course designed to
to design, coordinate, offering more than 150 improve the ability of local
conduct, and evaluate courses to help build critical jurisdictions to prepare for,
exercises that rigorously test skills that responders need protect against, and respond to
the Nations ability to to function effectively in complex coordinated attacks.
perform missions and mass consequence events. The course focuses on engaging
functions that prevent, NTED primarily serves participants from multiple
protect against, respond to, state, local, territorial, and disciplines in a discussion and
recover from, and mitigate tribal entities in 18 analysis of local, state, regional
all hazards. As a professional disciplines. and Federal capabilities
component of the National Instruction is offered at the required to respond to a
Preparedness System, the awareness, performance, coordinated attack against
NEP provides a consistent and management and multiple targets. Through
method to examine and planning levels. Students briefings, case studies,
validate federal and whole attend NTED courses to facilitated discussions, and
community partner core learn how to apply the basic planning workshops,
capabilities, which in turn skills of their profession in participants work through a
indicate the Nations the context of preparing, community-specific attack
progress in reaching the preventing, deterring, scenario to identify gaps in their
National Preparedness Goal responding to, and current plans as well as
(Goal). recovering from acts of mitigation strategies. Similar to
terrorism and catastrophic JCTAWS, the course utilizes
Each Program cycle consists events. Course subjects breakout groups and facilitation
of a two-year, progressive range from weapons of mass to assist the community in
schedule of exercises that destruction terrorism, identifying these gaps. IEMC
are selected based on their cybersecurity, and agro- was developed for second tier
support to the Goal, and the terrorism to citizen metropolitan areas which may
Programs Principals preparedness and public have fewer resources and less
Objectives. The types of works. NTED training experience with
exercises selected into the includes multiple delivery counterterrorism operations.
program may include methods: instructor-led Seven more are scheduled in
facilitated policy (direct deliveries), train-the- 2017. After the course, the self-
discussions, seminars and trainers (indirect deliveries), identified gaps along with
workshops, tabletop customized (conferences potential mitigation strategies

and a list of available resources d-public-alert-warning-system Large-scale Aviation Accident
are presented to the community or contact Response Workshop Series
in a Summary Report. (LsAARS) aims to improve the
ability of communities to
The Integrated Public Alert Joint Counterterrorism provide a coordinated response
and Warning System Awareness Workshop Series to large-scale aviation accidents
(IPAWS) is a national FEMA- (JCTAWS). The Joint occurring beyond airport
managed system that public Counterterrorism Awareness boundaries. The series
safety officials can use to send Workshop Series (JCTAWS) is examines the coordination and
public information and warning a nationwide initiative designed delivery of response capabilities
messages to people in a specific to improve the ability of local across multiple jurisdictions to
geographic area. IPAWS jurisdictions to detect, prevent, affected communities in the
connects authorities at the and disrupt terrorist activities. aftermath. LsAARS have been
federal, state, local, tribal, and JCTAWS have been held more held in 9 mid-sized cities across
territorial levels and enables than 16 major cities across the the United States, bringing
sending of Wireless Emergency U.S., bringing together Federal, together public safety and
Alert (WEA) messages to cell state, and local participants emergency response
phones, Emergency Alert from across the law stakeholders at the city, county,
System (EAS) broadcasts to enforcement, fire, emergency state, and tribal levels; non-
radio and TV, non-weather response, medical services, and governmental and private sector
emergency message broadcasts private sector communities to organizations (including
over NOAA All-Hazards include hospital and medical airlines); medical community
Weather Radio, and internet personnel. The workshops, partners; federal departments
applications and websites that emphasizing the state and local and agencies; and other
support alert and warning response, delve into the stakeholders, as appropriate.
distribution. IPAWS provides challenges presented by both Four more are scheduled in
emergency information to the operational and medical 2017. The one-day event
people without an responses, and aim to review features training sessions from
understanding of the English existing preparedness, response the National Transportation
language and facilitates delivery and interdiction plans, policies, Safety Board and the FBI,
of emergency information to and procedures related to a followed by a FEMA and
people with access and complex terrorist attack; community-led facilitated
functional needs. IPAWS is identify gaps in plans, scenario-driven tabletop
also connected with the operational capabilities, workshop. Workshop breakout
Canadian Multi-Agency response resources, and group discussions focus on four
Situational Awareness System authorities; examine healthcare areas: Evolving Response
to enable sharing of alert, system challenges unique to a Organization; Debris
warning, and incident complex attack; strategize about Management and Evidence
information across borders to community and bystander Preservation; Patient Tracking
improve response coordination assistance to the wounded and and Fatality Management; and
during binational disasters. consider providing medical Family Assistance and Public
Additional information and management nearer to the attack Communications. The breakout
inquiries about IPAWS and site; and identify federal, state, groups provide outbriefs at the
requirements for becoming an and local resourcesincluding final plenary session, addressing
IPAWS user can be directed to grants, training, exercises, and the priorities, challenges, and
the IPAWS Program Office. technical assistanceavailable potential solutions identified for
For more information, visit to address potential gaps in their assigned topics. A capabilities. Summary of Conclusions

document is produced for each doctrine that reaches federal Federal Law Enforcement
workshop addressing key state, local, tribal, and territorial Training Centers
discussion points, noted emergency management
strengths, best practices and communities, as well as non- (FLETC)
innovations, and potential areas government entities and the
of improvement. private sector. The guidance Contact Information:
and doctrine includes the Federal Law Enforcement
Office of the Law National Preparedness Goal and Training Centers
Enforcement Advisor. The National Preparedness System, Address: 1131 Chapel
mission and role of FEMAs National Incident Management Crossing Road, Bldg. 2200,
Senior Law Enforcement System, and National Planning Glynco, GA 31524
Advisor is to enhance Frameworks.
communication and
Web Site:
coordination between FEMA Within its National
and the law enforcement Preparedness Directorate,
community and provide the the National Integration
Administrator and Agency with Center examines emerging
a law enforcement perspective technologies, develops state E-mail:
on plans and policies to support and local planning guidance,
the agencys integration of law provides technical
enforcement, public security, assistance, and supports The FLETC offers advanced
and emergency management resource typing and the and specialized law
communities. credentialing of emergency enforcement training in a
response personnel. variety of topics through the
Preparedness (Non-Disaster) Within its National State, Local, and Tribal
Grant funding in the form of Continuity Programs, Division (SLTD), to state, local,
formula and competitive grants FEMA provides guidance and tribal law enforcement
to enhance the capacity of state, and tools for continuity at officers throughout the U.S. and
local, tribal, territorial, and all levels of government and Indian country/jurisdictions.
private sector emergency provides an array of The programs SLTD delivers
responders to prevent, protect continuity communications are developed with the advice,
against, respond to, and recover capabilities to key partners. assistance, and support of
from a weapon of mass Continuity of Operations federal, state, local, and tribal
destruction, terrorism incident ensures an individual law enforcement agencies and
involving chemical, biological, organization can continue to are updated to ensure relevance
radiological, nuclear, explosive perform its essential to todays issues. They are
devices, and cyber-attacks as functions, provide essential conducted at selected venues
well as other disasters. For services, and deliver core throughout the country hosted
more information on how to capabilities during a by a local law enforcement
find and apply for grants visit disruption to normal agency or at one of FLETCs operations. training delivery points which
ess-non-disaster-grants or are located in Artesia, NM; Charleston, SC; Cheltenham,
MD; and Glynco, GA. Tuition,
Protection and National lodging, and meals assistance
Preparedness contributes to the may be available to state, local,
development and and tribal officers, but
implementation of preparedness attendance is on a space-
available basis. To learn more
about FLETC training courses principal advisor to the program while state and local
available to state, local, and Secretary and the Federal agencies operate the system in
tribal law enforcement and for Emergency Management their jurisdictions. BioWatch is
contact information visit Agency (FEMA) Administrator a collaborative effort of on medical and public health multidisciplinary partners at the
local-tribal or contact issues. OHA leads the federal, state, and local level, Departments workforce health including public health,
protection and medical laboratory, environmental
The FLETC Online Campus oversight activities. The office agencies, emergency
is a secure, online Academic also leads and coordinates the management, and law
Learning Management System Departments biological and enforcement. Jurisdictional
(ALMS) developed by the chemical defense activities and preparedness and response
FLETC in support of the law provides medical and scientific planning efforts related to the
enforcement learning expertise to support the BioWatch program are
environment. The Online Departments preparedness and developed through these
Campus currently offers over response efforts. partnerships. BioWatch
133 professionally developed partnerships bring experts at
interactive online courses that OHA has four strategic goals every level of government
are available for U.S. sworn and that coincide with the strategic together to enhance resilience.
vetted law enforcement officers goals of the Department:
and agents. The Online The First Responder
Campus registration and access Provide expert health and Guidance for Improving
to course materials is provided medical advice to DHS Survivability in Improvised
through the HSIN account leadership; Explosive Device (IED) and/or
access or the Regional Build national resilience Active Shooter Incidents was
Information Sharing System against health incidents; developed at the request of the
(RISS), law enforcement Enhance national and DHS National Security Councils
officers and agents are required medical first responder working group on IED
to complete the RISS capabilities; and situations and in response to
Automated Trusted Information Protect the DHS workforce first responders who have
Exchange Application against health threats. encountered mass casualties
(ATIX) application. For more from IEDs and/or active shooter
information, visit For more information on OHA incidents. Led by OHA resources for support to state Medical First Responder
online-campus. and local law enforcement, Coordination Branch, the guide
please send an e-mail to was developed in coordination, or with the Departments of
Office of Health Affairs Defense, Health and Human
(OHA) Services, Justice, and
BioWatch is a nationwide Transportation. The Guide is
OHA serves as DHSs principal biosurveillance monitoring available electronically at
authority for all medical and system operating in more than
health issues. OHA provides 30 metropolitan areas across the n/iedactive-shooter-guidance-
medical, public health, and country that is designed to first-responders.
scientific expertise in support of detect the release of select
the DHS mission to prepare for, aerosolized biological agents.
respond to, and recover from all OHA provides program
threats. OHA serves as the oversight for the BioWatch
The National Biosurveillance U.S. Immigration and authority to grant CP to victims
Integration Center (NBIC) Customs Enforcement of severe forms of human
integrates and analyzes trafficking who are potential
information about biological
(ICE) witnesses in the investigation or
threats to human, animal, plant prosecution. CP is a
and environmental health to ICEs primary mission is to discretionary law enforcement
help ensure the nations promote homeland security and tool utilized on a case-by-case
responses are well-informed, public safety through the basis as warranted and
save lives, and minimize criminal and civil enforcement appropriate. For trafficking
economic impact. NBIC works of federal laws governing victim who filed a civil action
in partnership with federal, border control, customs, trade, under 18 U.S.C. 1595 and
state, local, territorial, tribal, and immigration. The agency meets these requirements, DHS
and private sector partners to has an annual budget of shall grant or extend CP, subject
synthesize and analyze approximately $6 billion to certain exceptions. CP may
information collected from dollars, primarily devoted to its be requested by any law
across the spectrum of these two operational directorates enforcement agency. However,
organizations to provide more ICE Homeland Security submissions by state and local
rapid identification of and Investigations (HSI) and ICE law enforcement agencies must
response to biological threats. Enforcement and Removal be sponsored by a federal law
NBIC shares this information Operations (ERO). enforcement agency.
with stakeholders via the DHS
Common Operating Picture Continued Presence. Toolkit for Prosecutors. To
(COP), providing a ICE may submit Continued demonstrate its commitment to
comprehensive electronic Presence (CP) applications on strengthening coordination with
picture with assessments of behalf of state or local law state and local prosecutor
current biological events, enforcement in cases where the partners, ICE developed the
trends, and their potential victimization meets the federal Toolkit for Prosecutors. This
impacts on the Nations definition of trafficking as Toolkit is aimed at helping
homeland security. found in the Trafficking prosecutors navigate situations
Additionally, access to state and Victims Protection Act and at where important witnesses,
local NBIC Biosurveillance 22 U.S.C. 7102. When state victims, or defendants may face
Reports are available on the or local law enforcement removal because they are
Homeland Security Information officials identify a victim of illegally present in the United
Network (HSIN) and direct human trafficking, they should States. For more information,
email distribution, by request, to coordinate with their federal visit
public health, health care, law enforcement partners to
agriculture, environment, and submit an application for CP. ut/offices/osltc/pdf/tool-kit-for-
law enforcement personnel For more information, visit prosecutors.pdf.
across the country at all levels
of government. To request an-trafficking/pdf/continued-
NBIC Reports via direct email presence.pdf. Victim Assistance Program
distribution or to request access (VAP) provides information
to HSIN-NBIC-SL, contact CP allows victims of a severe and assistance to victims of form of trafficking to remain in federal crimes, including human
the United States for up to two trafficking, child exploitation,
years, with the possibility of human rights abuses, and white
extension, in order to facilitate collar crime. VAP also
the investigation or prosecution provides information to victims
of the trafficker. ICE has the on post-correctional releases or
removal of criminal aliens from The Criminal Alien Program responsibility-specific slides to
ICE custody. VAP has (CAP) provides ICE-wide accompany the overall ICE
developed informational direction and support in the ERO 101 in order to provide a
brochures on human trafficking biometric and biographic more focused look at ICE ERO
victim assistance, crime identification, arrest, and in the local area. To find the
victims rights, white collar removal of priority aliens who nearest field office, visit
crime, and the victim are incarcerated within federal,
notification program. For state, and local prisons and jails,
further information, please as well as at-large criminal ICE ERO Most Wanted
contact VAP at aliens that have circumvented Program is managed by the identification. The National Fugitive Operations
or 866-872-4973. identification and processing of Program (NFOP) as a vital tool
incarcerated criminal aliens, to support ICE ERO's efforts in
before release from jails and the location and arrest of the
ICE ENFORCEMENT AND prisons, decreases or eliminates most dangerous fugitives and
REMOVAL OPERATIONS the time spent in ICE custody at-large criminal aliens. The
(ERO) and reduces the overall cost to Most Wanted Program serves as
the Federal Government. a force multiplier by focusing
The 287(g) Program allows a Additionally, ICE ERO, in additional resources on the most
state or local law enforcement conjunction with the Offices of egregious offenders, develops
entity to enter into a partnership the United States Attorneys, community support by
with ICE, under a joint actively pursues criminal providing visibility and
Memorandum of Agreement prosecutions upon the discovery fostering awareness of ICE
(MOA), in order to receive of offenses of the Nation's EROs public safety mission,
delegated authority for criminal code and immigration and builds cooperative
immigration enforcement within laws. This further enhances relationships with law
their jurisdictions. In many public safety and provides a enforcement partners though the
cases, criminal activity is most significant deterrent to exchange of mutually beneficial
effectively combated through a recidivism. For more information aimed at removing
multi-agency/multi-authority information, visit these threats from local
approach that brings together communities. For more
the skills and expertise of alien-program. information, visit
federal, state, and local
resources. State and local law ICE Enforcement and operations and
enforcement agencies play a Removal Operations 101
critical role in protecting our (ERO 101) is a PowerPoint wanted.
national security because the presentation compiled to
vast majority of criminals are introduce ICE ERO and its ICE-INTERPOL Fugitive
taken into custody under their program offices. Though the Alien Removal (FAR)
jurisdiction. The 287(g) Fact slides themselves are not Initiative. The FAR Initiative
Sheet provides information accessible to the public, the seeks to locate, arrest, and
regarding the 287(g) program. presentation can be delivered by remove foreign fugitive aliens
For more information, visit any field office upon request. at-large in the United States. A ICE ERO 101 is a condensed "foreign fugitive" is a
287g-reform. overview of ICE ERO programs removable alien with an arrest
and initiatives and is updated warrant from a foreign country
quarterly. In addition, each for an offense which is also
field office has area of considered a crime in the
United States. ICE Liaisons at Law Enforcement generated in two ways; either
INTERPOL assist in confirming Information Sharing by an automated biometric
criminal wants and warrants Initiative (LEISI) facilitates (fingerprints) submission or by
from foreign countries, the sharing of DHS sensitive a biographic submission,
developing investigative leads, but unclassified law initiated by utilizing the
and sharing information with enforcement information with International Justice and Public
law enforcement partners across other federal, tribal, state, local, Safety Network (Nlets),
borders. The ICE Liaisons at and international law message key IAQ at
the INTERPOL Alien/Fugitive enforcement agencies. LEISI VTICE0900. Direct contact can
Division can be contacted at provides the electronic Law also be made via the Law
202-532-4297 or 202-616-2416. Enforcement Information Enforcement Hotline at 1-802-
The INTERPOL Operations and Sharing Service (LEIS Service) 872-6020. For additional
Command Center can be that other law enforcement information, visit
reached at 202-616-3900 or agencies can utilize to query
INTERPOL.ALIENFUGITIVE records pertaining to ICE criminal subjects and ICE and National Criminal Analysis
CBP immigration violators. For and Targeting Center
Joint Effort Initiative. The more information, contact DHS- (NCATC). As part of ICE
Joint Effort Initiative combines EROs Targeting Operations
the resources and expertise of Division, the NCATC analyzes
ICE ERO with local law Law Enforcement Support data and develops lead and
enforcement agencies to help Center (LESC), administered information referrals for law
make communities safer. The by ICE ERO, is a critical point enforcement. The information
purpose of this initiative is to of contact for the national law is used to locate and arrest
promote community safety enforcement community, criminal and other priority
through the arrest and removal providing a wide range of aliens who pose a threat to our
of criminal aliens and members information services to officers nations communities. By
of transnational street gangs. and investigators at federal, leveraging technology and
Working in a support role to state, and local levels. The partnerships with domestic and
local law enforcement, ICE LESC operates 24 hours a day; international law enforcement,
ERO responds to situations 365 days a year to provide regulatory, and intelligence
where there is believed to be a timely, accurate and real-time agencies, the NCATC provides
criminal and immigration assistance to law enforcement a specialized law enforcement
nexus, and provides agencies that are in need of the workforce that analyzes the
investigative and enforcement immigration status and nature and characteristics of the
support with the goal of identities of a foreign national removable alien population.
reducing crime. Individual ICE who has been encountered, The NCATC, in coordination
ERO officers or a Fugitive arrested or is under with other ICE ERO and ICE
Operations Team can embed in investigation for criminal enforcement entities, serves as
a state or local law enforcement activity. an operational component of
agency on a part-time basis or ICE's cooperative and
in a full-time capacity. For To support these law community safety-based
more information, visit enforcement efforts, the most concept. efficient method to request and
operations. receive immigration National Fugitive Operations
information is by submitting an Program (NFOP) was
Immigrant Alien Query (IAQ) established to locate and arrest
to the LESC. The IAQ is removable aliens who are at-
large within the United States. country of birth. For more intelligence is disseminated to
The 129 Fugitive Operations information, visit field offices in the form of
Teams (FOTs) across the actionable leads associated with
Nation prioritize their criminal aliens in
investigations on national federal/state/local custody and
security cases and transnational Probation and Parole at-large aliens. In addition, the
gang members, convicted Enforcement entails the PERC provides critical
criminals and sex offenders, identification and arrest of information to INTERPOL,
visa violators, and aliens with foreign born nationals who have Joint Terrorism Task Forces,
removal orders who have failed been convicted of crimes and and other federal law
to depart the United States. released from incarceration enforcement partners in
FOT members work together (paroled), or have been placed furtherance of shared public
with law enforcement partners on probation without safety and national security
and on interagency task forces incarceration and released into missions. The PERC can be
to offer immigration the community under contacted directly 24/7 by
enforcement expertise and supervision. This is an essential calling the Law Enforcement
pursue a common public safety immigration enforcement Line at 949-360-4500.
strategy. For more information, function of ICE in carrying out
visit its public safety mission. ERO Officers and Fugitive ICE HOMELAND SECURITY
operations. Operations Teams work closely INVESTIGATIONS (HSI)
with probation and parole
Online Detainee Locator agencies to serve as a force Border Enforcement Security
System (ODLS) is a public multiplier, provide an open Task Force (BEST).
system available online at exchange of information, and The primary mission of the ICE that fulfill common community HSI BEST is to combat
allows family members, legal safety objectives. emerging and existing
representatives, and members of Transnational Criminal
the public to locate immigration The Pacific Enforcement Organizations (TCO) by
detainees who are in ICE Response Center (PERC) employing the full range of
detention. As part of detention federal, state, local, tribal, and
provides 24/7 mission critical
reform, ICE deployed the international law enforcement
support to ICE field offices by
ODLS so that family members resources in the fight to
delivering near real-time
and attorneys can locate identify, investigate, disrupt and
detainer issuance, intelligence
detainees more easily online, 24 support, and proactive and risk- dismantle these organizations at
hours a day, seven days a week. every level of operation along
based targeting of removable
The system is available in eight U.S. international borders (air,
criminal aliens. This is
different languages, with more land, and international airports).
accomplished through
languages to come. The ODLS To date, there are currently 44
interoperability and the
can be searched in two ways: 1) BESTs positioned along U.S.
information sharing capabilities
by Alien Registration number international borders (air,
of the PERC, the LESC, and the
(or A-number, the nine-digit maritime, and international
FBIs Next Generation
identification number assigned airports) located across 20 states
Initiative (NGI) fingerprint
to a person who applies for and Puerto Rico, in which
database. The PERCs
immigration benefits or is special agents, task force
proactive targeting focuses on
subject to immigration officers, and task force
removable criminal aliens who
enforcement proceedings); or 2) personnel investigate a wide
pose a threat to national security
by last name, first name, and range of criminal activity with a
and public safety. Real-time
nexus to the border, to include countries around the world and main contact point for
drug trafficking, arms facilitates the repatriation of coordinating the agencys cyber
trafficking, human trafficking these objects to their rightful strategy as it relates to
and smuggling, gangs, child owners. United States federal cybercrime and computer
exploitation, money laundering importation laws regarding forensics. ICE HSIs main
and bulk cash smuggling, smuggling and trafficking strategy for cybercrime is to
maritime smuggling, illicit provide ICE HSI special agents combat transnational
tunnels, and commercial fraud. the authority, jurisdiction, and cybercrime threats and the
These BESTs are comprised of responsibility to take the criminal exploitation of the
approximately 1,000 members leading role in criminal Internet by investigating,
representing more than 150 investigations that involve the disrupting, and dismantling
federal, state, local, tribal, and illicit importation and transnational criminal
international law enforcement distribution of stolen or looted organizations and other
agencies that have jointly cultural property and malicious actors engaged in
committed to investigate prosecuting those responsible high-impact or far-reaching
transnational criminal activity. for these crimes. When cybercrime, as well as
For more information, visit contacting ICE HSI to report providing training, guidance, instances of illicit importation and assistance to ICE HSI
and distribution of cultural offices located throughout the
Counter-Proliferation property, please provide as world.
Investigations Program (CPI) much detailed information and
oversees a broad range of supporting documentation as C3 is comprised of the Cyber
investigations related to export possible, including the Crimes Unit (CCU), the Child
law violations. CPI targets the following: a detailed description Exploitation Investigation Unit
trafficking and illegal export of of the artifact and location (CEIU), and the Computer
conventional military (pictures if possible); a full Forensics Unit (CFU). This
equipment, firearms, controlled statement of the reasons for the state-of-the-art center offers
dual use equipment and belief that the artifact may be or cyber-crime support and
technology, and materials used has been imported into the training to federal, state, local,
to manufacture weapons of United States due to the illicit and international law
mass destruction, including importation from (1) country of enforcement agencies. C3 also
chemical, biological, origin (if known) or (2) includes a fully equipped
radiological, and nuclear distribution from an computer forensics laboratory,
materials. ICE HSI Special archeological site in the United which specializes in digital
Agents enforce all U.S. export States (if known). For more evidence recovery. For more
laws involving military items information, visit information, visit
and controlled dual-use goods,
as well as products going to art-investigations. Reports may crimes.
sanctioned or embargoed be sent to
countries. For more HSIculturalproperty@ice.dhs.g Document and Benefit Fraud
information, visit ov. Task Forces (DBFTF). ICE HSI leads 24 interagency
Cyber Crimes Center (C3), a DBFTFs across the United
Cultural Property, Art and component of ICE HSI, was States. Individual task forces
Antiquities Program (CPAA) established in 1997 for the are comprised of federal, state,
oversees investigations purpose of combating crimes and/or local law enforcement
involving the illicit trafficking committed on, or facilitated by, partners working together to
of cultural property from the Internet. C3 is ICE HSIs combat immigration document

and benefit fraud, as well as Forced Labor Program. ICE these abuses of human rights
related criminal violations. HSI investigates allegations of may contact the center at
DBFTF locations include forced labor in violation of the For
Atlanta, Baltimore, Boston, Tariff Act of 1930 (Title 19 additional information, visit
Buffalo, Chicago, Dallas, USC 1307), relating to the
Denver, Detroit, El Paso, illegal importation of goods rights-violators-war-crimes-
Harlingen, Houston, Honolulu, mined, manufactured, or unit.
Los Angeles, Miami, New produced, wholly or in part,
York, Newark, Orlando, through the use of forced labor, The DHS Human Smuggling
Philadelphia, Sacramento, Salt prison labor, and/or indentured Cell (HSC) was established on
Lake City, San Francisco, San labor under penal sanctions. October 1, 2014, in accordance
Juan, St. Paul, and Washington, When contacting ICE to report with the White House National
D.C. Through collaboration instances of forced labor, please Security Councils mandate that
and partnership with multiple provide as much detailed law enforcement and the
federal, state, and local information and supporting intelligence community
agencies, the DBFTFs documentation as possible, collaborate and share
maximize resources, eliminate including the following: a full intelligence and other
duplication of efforts, and statement of the reasons for the information regarding human
produce a strong law belief that the product was smuggling. The HSC is
enforcement presence. They produced by forced labor and comprised of analytic and
combine ICE HSIs unique that it may be or has been operational groups which
criminal and administrative imported into the United States; collaborate to operationalize
authorities with a variety of a detailed description of the intelligence leading to the
other law enforcement product; and all pertinent facts identification and disruption of
agencies tools and authorities known regarding the production human smuggling
to achieve focused, high-impact of the product abroad. Reports organizations, and also to
criminal prosecutions and may be emailed to provide strategic oversight on
financial seizures. Partners illegal migration trends. The
include U.S. Citizenship and HSC provides leadership and
Immigration Services, Fraud Human Rights Violators and guidance to a number of
Detection and National War Crimes Center initiatives in an effort to thwart
Security; U.S. Department of (HRVWCC) is a multi-agency the illegal movement of Special
State, Diplomatic Security; U.S. program directed by ICE HSI Interest Aliens. Among those is
Department of Labor, Office of with partners from the FBI, the Extraterritorial Criminal
the Inspector General; U.S. Department of State, USCIS Travel (ECT) Program. The
Social Security Administration, and ICEs Human Rights Law ECT Program was created in
Office of the Inspector General; Section. HRVWCC June 2006 as a joint partnership
U.S. Postal Inspection Service; conducts investigations focused between ICE HSI and the U.S.
U.S. Secret Service and on human rights violations in an Department of Justice, Criminal
numerous state and local law effort to prevent the United Division, Human Rights and
enforcement agencies. States from becoming a safe Special Prosecutions Section to
Supporting these task forces are haven to those individuals who address U.S. security risks
the ICE HSI Forensic engage in the commission of posed by transnational human
Laboratory and the ICE HSI war crimes, genocide, torture smuggling organizations.
Cyber Crimes Center (C3). For and other forms of serious
more information, visit human rights abuses from conflicts around the globe.
benefit-fraud. Individuals seeking to report

ICE HSI Department of (ASCLD/LAB). Forensic United States; (3) Build on
Motor Vehicles (DMV) disciplines include questioned international partnerships and
Outreach was developed to document and fingerprint increase foreign capacity
raise awareness about examination. Additionally, the through outreach and training.
corruption at DMV facilities. A ICE HSI-FL provides
principal component of the intelligence alerts, reference To locate or contact an ICE HSI
campaign is to alert DMV material on travel and identity International Offices, visit
employees, law enforcement, documents, and fraudulent
and the public to the seriousness document detection training. -international-ops.
of fraud schemes perpetrated at The ICE HSI-FL manages the
DMV facilities. By adding ICE HSI Polygraph Program You may also go through the
education and outreach and oversees the ICE HSI ICE HSI domestic office in
components, ICE HSI and its Evidence Recovery Team your jurisdiction or the 24/7
partners work together to deter Program. For more hotline at 866- 347-2423 (from
the crime from happening, information, visit U.S. and Canada) or 802-872-
encourage people to report the 6199 (from any country in the
crime, and ensure that their world).
investigations are ICE HSI International
comprehensive and more Operations Overseas Offices ICE HSI Tip Line is an
efficient. Outreach materials, represent DHSs largest internationally accessible venue
including posters, brochures, investigative law enforcement through which the public, as
and short videos were presence overseas. ICE HSI well as federal, state, and local
developed by ICE HSI to deploys more than 240 special law enforcement agencies, can
support the outreach and are agents and 156 Foreign Service report suspected violations of
utilized by nearly every U.S. nationals to 65 attach offices in ICE HSI-investigated
jurisdictional (state) and 46 countries in addition to immigration and customs laws.
territorial DMV in employee liaison officers assigned to the 8 Special agents and intelligence
new-hire and refresher ethics Department of Defense research specialists assigned to
training. The materials provide Combatant Commands. These the Tip Line take reports 24
guidance to DMV employees by agents enforce U.S. customs hours a day, 365 days a year,
promoting accountability and and immigration laws to protect and have the capability to
vigilance in an effort to reduce the United States and its customize questions to meet the
corruption and preserve the interests from terrorism and needs of national enforcement
integrity of the DMV process. illicit trade, travel, and finance priorities. Phone toll free 866-
For more information, email by conducting international law 347-2423 from the U.S. and enforcement operations and Canada, or from any country in
removals. the world phone 802-372-
ICE HSI Forensic Laboratory 199. For more information,
(ICE HSI-FL) provides The mission of ICE HSI visit
forensic, intelligence, and International Operations is
investigative support to ICE threefold: (1) Support domestic si-tip-form.
HSI, DHS, and many other U.S. operations by conducting and
and foreign law enforcement coordinating investigations with The International Organized
agencies. The ICE HSI-FL is foreign counterparts; (2) Crime Intelligence and
accredited by the American Disrupt transnational criminal Operations Center (IOC-2)
Society of Crime Laboratory organizations before they can supports member agency efforts
Directors / Laboratory bring illicit products, people, to disrupt and dismantle
Accreditation Board and proceeds into or out of the transnational criminal

organizations (TCO) posing the through the examination and These task forces enable the
greatest threat to the United exploitation of evidence IPR Center to leverage the
States. This mission is obtained at our borders, during resources, skills, and authorities
accomplished through the traffic interdictions, and other of each partner, and they
deconfliction of member agency law enforcement encounters. provide a comprehensive
investigative endeavors; The BCSC targets transnational response to intellectual property
dissemination of leads and criminal organizations who seek theft. For more information,
intelligence; coordination of to avoid traditional financial visit
multi-agency and multi-national institutions by repatriating illicit For additional information on
law enforcement operations, proceeds through an array of available training opportunities,
investigations, prosecutions, methods including commercial contact
and forfeiture proceedings; and and private aircraft, passenger
the provision of operational and commercial vehicles, Operation Community Shield
funding. IOC-2 focuses maritime vessels, and pedestrian is the ICE HSI anti-gang
primarily on TCOs involved in crossings at our U.S. land initiative that combines ICEs
non-drug centric crime, such as borders. For more information, expansive statutory and
money laundering, credit card visit administrative enforcement
fraud, weapons trafficking, cash-smuggling-center or authorities to combat the growth
identity theft, fraud scams, contact or 866- and proliferation of
cybercrime, and human 981-5332. transnational criminal street
smuggling/trafficking. To gangs, prison gangs, and outlaw
facilitate its efforts, the IOC-2 National Intellectual Property motorcycle gangs throughout
leverages the resources of its Rights Coordination Center the United States in cooperation
ten member agencies, the (IPR Center) stands at the with our federal, state, local,
OCDETF Fusion Center, the forefront of the U.S. tribal, and foreign law
Special Operations Division, government's response to global enforcement partners. With our
and other domestic and intellectual property theft and partners, ICE HSI enhances
international resources. IOC-2 enforcement of its international intelligence gathering and
is limited to providing support trade laws. The IPR Center information sharing, exploits
to member agencies only; helps ensure national security 21st century law enforcement
however, state and local law by protecting the public's health technology, and capitalizes on
enforcement officers assigned and safety, the U.S. economy our worldwide presence to
to task forces operated by and U.S. warfighters by combat these global criminal
member agencies can utilize its stopping predatory and unfair networks and mitigate the
capabilities. trade practices that threaten the threats they pose to the public
global economy. The IPR safety and national security of
National Bulk Cash Center is led by an ICE HSI the United States and other
Smuggling Center (BCSC) is a director, along with deputy countries. For more
24/7 operations and intelligence directors from ICE HSI, the FBI information, visit
facility providing real-time and CBP. The center brings
tactical intelligence and together 23 partner agencies in gang-unit.
investigative support to the a task force structure consisting
federal, state, and local officers of 19 key federal agencies,
involved in enforcement and Interpol, Europol, and the The Organized Crime Drug
interdiction of bulk cash governments of Canada and Enforcement Task Force
smuggling and the Mexico. Fusion Center (OFC) fosters
transportation of illicit increased communication,
proceeds. This is accomplished cooperation, and coordination
between member agencies
through the provision of target contraband and have assisted collectively enhance joint
deconfliction and direct law enforcement with the investigations of contraband
intelligence support to ongoing investigation of kidnappings, smuggling, money laundering,
HSI investigations. The OFC the deaths of illegal aliens, and fraud-related activities that
utilizes a consolidated database sexual assaults, missing disrupt and dismantle criminal
consisting of over 700 million children, and any reports of organizations threatening this
law enforcement, regulatory, border violence. The Shadow countrys borders. With this
and immigration records to Wolves have traveled to the authority, Title 19 cross-
generate intelligence products Blackfeet Indian Reservation designated officers have the
for field exploitation. OFC is and the Bay Mills Chippewa ability to execute and serve
limited to providing support to Indian Reservation to share arrest warrants, subpoenas, and
member agencies only; their expertise. Additionally, summonses in compliance with
however, state and local law the Shadow Wolves have customs laws as well as carry
enforcement officers assigned conducted training with the U.S. firearms in compliance with
to task forces operated by Department of Defense in ICE HSI firearms policy. For
member agencies can utilize its several of the former Soviet more information on the Title
capabilities. Republics to teach the ancient 19 Program Directive, please
art of tracking to combat contact 800-973-2867 to speak
Parole and Law Enforcement nuclear proliferation from the with the Unit Chief for the ICE
Programs Unit (PLEPU) former Soviet Republics. For HSI Contraband Smuggling and
serves as the clearinghouse for additional information, please Gang Unit in Washington,
all Significant Public Benefit contact 800-973-2867 and ask D.C., or email the unit at
Parole (SPBP) applications to to speak with the Unit Chief for For
ICE from federal, state, and the ICE HSI Contraband additional information, visit
local law enforcement Smuggling Unit in Washington,
agencies. SPBP is a mechanism D.C. For more information, cross-designation.
that allows otherwise visit
inadmissible aliens to come to Trade Transparency Unit
the United States for law hadow-wolves. (TTU) is a key component in
enforcement purposes. For ICE HSIs strategic efforts to
more information on the SPBP Title 19 Cross-Designation. combat and prevent
program, please call 800-973- Title 19, section 1401 of the Transnational Criminal
2867. U.S. Code provides a Organizations (TCOs) from
mechanism for ICE HSI to exploiting international trade
Shadow Wolves. The ICE HSI designate federal, state, local, and financial systems to
Shadow Wolves are Native tribal, and foreign law disguise, move, and launder
American Tactical Officers enforcement officers as illicit funds and proceeds, a
assigned to the Tohono Customs Officers. The scheme commonly known as
Oodham Nation in Arizona to unique resources and subject trade-based money laundering
enforce immigration and matter expertise of these (TBML). The TTU uses ICE
customs laws and regulations. officers complement ICE HSI HSIs unique authorities to
This reservation contains 2.8 investigations to effectively access financial and
million acres of land and combat transnational crime. international trade data to
includes a 75-mile-long stretch Law enforcement officers cross- identify financial irregularities
of the U.S. border with Mexico. designated under 19 U.S.C. and international trade
The Shadow Wolves use their 1401(i) harness their anomalies indicative of TBML,
unique language and tracking invaluable experience with this customs fraud, contraband
skills to interdict and investigate unique federal authority to smuggling and other financial

crimes. For more information, sharing efforts. I&A works to representatives will be
visit solidify productive and responsible for coordinating
transparency. collaborative relationships with with their local FBI
its partners to enhance counterparts and promoting the
information sharing. This event to their state, local, tribal,
Office of Intelligence and collaboration and coordination and territorial counterparts; as
Analysis is bolstered by the assignment well as to other DHS
of I&A field personnel at state representatives.
(I&A) and major urban area fusion
centers, as well as other DHS Open Source Enterprise
I&A is a member of the national
strategic locations, providing Daily Intelligence Reports.
Intelligence Community (IC)
direct intelligence support to These daily and weekly reports
and ensures that information
key state, local, tribal, and provide priority intelligence
related to homeland security
territorial partners, and private requirements on multiple topics
threats is collected, analyzed,
sector partners. These services of interest to facilitate a greater
and disseminated to the full
include engagement and understanding of the nature and
spectrum of homeland security
intelligence and information scope of threats and hazards to
partners in the Department, at
sharing support, intelligence the homeland. They are
federal, state, local, tribal, and
analysis, and intelligence provided to federal, state, local,
territorial levels, in the private
collection and reporting. tribal, territorial, and private
sector, and in the IC.
sector officials to aid in the
Counterintelligence identification and development
I&A works closely with
Fundamentals Workshop of appropriate actions, priorities
Department Component
(CIFWS) is a training initiative and follow-on measures. These
intelligence organizations as
offered by the DHS reports may be accessed via the
well as state, local, tribal,
Counterintelligence Division HSIN. To access or sign-up for
territorial, and private sector
(CIPD) to provide a one-day, HSIN, visit
entities to ensure non-traditional
on-site workshop to fusion
streams of information are fused
centers as a means of promoting security-information-network-
with traditional IC sources to
counterintelligence awareness hsin.
provide a complete assessment
to fusion centers personnel.
of threats to the homeland.
The CIFWS program is DHS-Single Point of Service
intended to familiarize students (DHS-SPS) serves as DHS
The Under Secretary for
with the potential intelligence Headquarters central ingest
Intelligence and Analysis, in the
collection threat directed point for receiving, tracking,
capacity of Chief Intelligence
against their facility, and state, and facilitating Operational and
Officer for DHS, implements a
local, tribal, and territorial Intelligence Requests For
mandate to integrate the
officials. This training also Information (RFIs) to and from
Departments intelligence
equips attendees with the ability federal, state, local, tribal, and
components and functionsthe
to recognize an elicitation territorial partners. This
DHS Intelligence Enterprise
attempt or recruitment pitch. processundertaken by I&A
by driving a common
Prior to the training, CIPD and the Office of Operations
intelligence mission.
notifies the I&A field Coordination and Planningis
representative assigned to the not a replacement for existing
I&A is the Executive Agent for
fusion center of training intent, lines of communication; rather,
coordinating federal support for
potential training dates, and it serves as a resource to
state and major urban area
logistic requirements for this facilitate validated RFIs with an
fusion centers. It also leads the
effort. I&A field organization capable of
Departments information
providing a response. Before I&A; the Office of the Director and a number of Department of
submitting an RFI to SPS, of National Intelligence Defense sites including
Federal and DHS Component (ODNI); the Office of the cybersecurity, counterterrorism,
partners should route their RFIs Program Manager, Information intelligence, and
through their respective Sharing Environment (PM- counternarcotics information.
headquarters to ensure they ISE); the FBI; and experts from
have visibility. State and local the state and local community The DHS Intelligence
partners should work through including the Global Justice Training Academy (ITA)
their fusion center(s) (via their Information Sharing Initiative, develops and delivers homeland
deployed I&A Staff) to verify the Criminal Intelligence security intelligence training
all local resources have been Coordinating Counciland will programs supporting the DHS
exhausted. DHS-SPS be delivered by subject-matter intelligence enterprise, as well
representatives can be contacted experts with experience in the as the greater homeland security
at: development and operation of enterprise. The ITA is located in
fusion centers. Fourteen Washington, D.C. and also
Phone services are offered to support deploys mobile training teams
Open/STE: 202-282-9555 the implementation of the in support of state, local, tribal,
NSTS: 766-0888 Fusion Center Guidelines, the and territorial partners. The ITA
Information Sharing is fully accredited by the
Email Environment (ISE) Federal Law Enforcement
Implementation Plan, and the Training Accreditation Board.
Baseline Capabilities for State To learn more, obtain a copy of
HSDN: DHS-SPS- and Major Urban Area Fusion the ITA Catalog, or to request Centers to facilitate the training, contact IA-
JWICS: DHS-SPS- nationwide development and/or enhancement of the fusion
process. To learn more or to The Nationwide Suspicious
Fusion Process Technical apply for assistance, visit Activity Reporting (SAR)
Assistance Program. Effective Initiative (NSI) was established
prevention efforts depend on the to enhance the abilities of
ability of all levels and sectors HSDN Resources for State fusion centers and law
of government, as well as and Local Partners. enforcement to easily share
private industry, to collect, Appropriately-cleared state and specific potential indicators of
analyze, disseminate, and use local personnel assigned to terrorist activity in order to
homeland security and crime- fusion centers are granted prevent terrorist threats. The
related information and access to Secret-level network NSI training strategy is
intelligence. Accordingly, the resources via the Homeland designed to increase the
establishment of a network of Secure Data Network (HSDN). effectiveness of state, local,
fusion centers to facilitate These resources include tribal, and territorial law
effective nationwide intelligence products from I&A enforcement and homeland
information sharing has been a that are hosted on HSDN, as security professionals in
top priority. To assist in the well as a range of other identifying, reporting,
development of this capability, resources such as access to the evaluating, and sharing pre-
DHS and DOJ partnered in National Counterterrorism incident terrorism indicators to
2007 to offer a series of fusion Center Current portal for identify and prevent acts of
center technical assistance counter-terrorism information, terrorism. The NSI offers a
services. These services have the DEA portal for host of customized online
been developed based on the counternarcotics intelligence, training for law enforcement
input and guidance from the
and several other specific OBIM Biometric Support COUNTER-IMPROVISED
partner sectors. The training is Center (BSC) provides expert EXPLOSIVE DEVICE (IED)
designed to illustrate the fingerprint identification PROGRAMS AND
importance of reporting services in support of DHSs RESOURCES
suspicious activity linked to Automated Biometric
pre-operational behaviors that Identification System, which Counter-IED & Risk
are indicative of terrorist contains the fingerprints of Mitigation Training. To
activity, the attendant privacy more than 200 million reduce risk to the Nations
protections, practical case individuals. The BSC performs critical infrastructure, DHSs
examples, and directions on manual fingerprint comparisons Office for Bombing Prevention
how to report SAR. NSI to identify both known and (OBP) develops and delivers a
resources and training may be unknown individuals (e.g. diverse portfolio of counter-IED
accessed by visiting its website deceased subjects, cold cases). awareness solutions and
at The BSC operates 24 hours a training courses to build
day/7 days a week. For nationwide counter-IED
additional information, contact capabilities and enhance
National Protection and awareness of IED threats.
Programs Directorate Coordinated through DHS
CHEMICAL SECURITY Protective Security Advisors,
(NPPD) State Homeland Security
Chemical Facility Anti- Officials and training offices,
NPPD leads the national effort
Terrorism Standards OBP courses educate federal,
to protect and enhance the
(CFATS). The CFATS state, local, tribal, and territorial
resilience of the nation's
program is the Department's participants such as municipal
physical and cyber
regulatory program focused officials and emergency
specifically on security at high- managers, state and local law
risk chemical facilities not enforcement and other
located on navigable emergency services, critical
waterways. The program infrastructure owners and
identifies and regulates high- operators, and security staff on
Office of Biometric Identity
risk chemical facilities to ensure strategies to prevent, protect
Management (OBIM)
they have security measures in against, respond to, and mitigate
Automated Biometric
place to reduce the risks bombing incidents. Available
Identification System
associated with these chemicals. courses are listed below. For
(IDENT). The IDENT system
DHS chemical security more information, visit
matches, stores, and shares
inspectors work in all 50 states
fingerprints of more than 200
to help ensure facilities have prevention-training. To request
million unique identities for
security measures in place to training, contact your local
immigration, border
meet security risk-based Protective Security Advisor
management, law enforcement,
performance standards. For (PSA) or contact
credentialing, and national
more information, contact
security purposes. IDENT is
interoperable with the FBIs
Direct Delivery In-Person
Next Generation Identification
(NGI) system and provides
Bomb Threat Management
state, local, tribal, and territorial
Planning Course
law enforcement with access to
IDENT information via NGI. Bombing Prevention
Awareness Course
IED Search Procedures vigilant and informed private responsibilities, capability gaps,
Course sector partners who serve as the and how to optimize limited
Protective Measures Course Nations counter-IED eyes- resources within a multi-
Surveillance Detection and-ears as the first line of jurisdictional planning area.
Course for Law defense in providing early OBP works closely with
Enforcement and Security detection of the sale of HME communities to provide
Professionals precursor chemicals. expertise on planning and
Vehicle Borne IED operational requirements for
(VBIED) Detection Course Counter-IED Awareness IED incident preparedness in
Products. The following alignment with the National
Virtual Instructor Led Training products are made available Preparedness Goal and Core
(VILT). from OBP and can be found at Capabilities. For more
Homemade Explosives information, contact
(HME) and Precursor prevention-training.
Awareness Course
Counter-IED Awareness The National Counter-IED
Introduction to the Terrorist Cards & Posters Capabilities Analysis
Attack Cycle Course
DHS-DOJ Bomb Threat Database (NCCAD) is an
IED Construction and Guidance Brochure assessment program that uses a
Classification Course
DHS Bomb Threat consistent and repeatable
IED Explosive Effects Procedures Checklist analytical methodology to
Mitigation Course
DHS-DOJ Bomb Threat assess and analyze the
Protective Measures Stand-off Card capabilities of bomb squads,
Awareness Course
FiRST Smartphone explosives detection canine,
Response to Suspicious Application dive, and SWAT teams
Behaviors and Items Course
Incident Management throughout the United States.
Preparedness and NCCAD assessments measure
Computer-based Training. the capability elements of
Coordination Toolkit
IED Awareness and Safety personnel, equipment, and
Protective Measures training required for effective
Homemade Explosives and prevention, protection, and
Precursor Chemicals
VBIED Identification response to IED threats. This
Awareness for Public Safety integrated information provides
Guide: Parked Vehicles
Interactive Scenarios for a snapshot of unit, state,
Vehicle Inspection Guide
Public Safety Responders regional, and national counter-
(VIG) & Video
Training IED preparedness that informs
The Multi-Jurisdiction decision makers on policy
Bomb-Making Materials decisions, resource allocation
Improvised Explosive Device
Awareness Program (BMAP) for capability enhancement, and
Security Planning (MJIEDSP)
is a national outreach program, crisis management. For more
program is a systematic process
sponsored by DHS in information, contact
that fuses counter-IED
partnership with the FBI,
capability analysis, training, and
designed to increase public and
planning to enhance urban area
private sector awareness of the Technical Resource for
IED prevention, protection,
potential illicit use of HME Incident Prevention
mitigation, and response
precursor chemicals, explosive (TRIPwire) is the DHS secure,
capabilities. The MJIEDSP
powders, and IED components. online, collaborative
assists with collectively
Through increased awareness, information and resource-
identifying roles,
BMAP builds a network of
sharing portal for the Nations and defensive measures to CDM BPA via the delegated
security and emergency services partners. All federal and non- procurement authority, GSA
professionals across the federal, federal entities, as well as Federal Systems Integration and
state, local, and tribal sectors to foreign government and Management Center (FEDSIM).
increase awareness of evolving foreign private-sector entities, For specific ordering options,
terrorist IED tactics, techniques, may participate in the AIS visit GSAs 2013 CDM/CMaaS
and procedures, as well as initiative. For more Ordering Guide at
incident lessons learned and information, visit
counter-IED preparedness ent/177883.
information. Developed and
maintained by OBP, the system The Continuous Diagnostics For more information about
combines expert analyses and and Mitigation (CDM) CDM, visit:
reports with relevant Program enables federal, state, for
documents, images, and videos local, and tribal governments to ordering information.
gathered directly from terrorist obtain the risk-based, cost- for
sources to help users anticipate, effective tools and capabilities operational information.
identify, and prevent IED they need to fortify their IT for the
incidents. TRIPwire is systems and government CDM public website.
available at no cost to registered networks. CDM allows system
subscribers and features a administrators to know the state The CDM Program also offers a
publicly accessible homepage of their respective network at secure community of interest
with valuable preparedness any given time, and identify for stakeholders, hosted on the
information for the entire flaws for priority resolution at HSIN. To request membership,
bombing prevention community near-network speed, resulting in email the CDM Program at
at For lower operational
additional information, contact risk/exploitation. Cyber Resiliency Review
DHS, in partnership with the (CRR) is an assessment that the
CYBERSECURITY General Services Cyber Security Evaluation
Administration (GSA), Program offers to measure and
Automated Indicator Sharing established a government-wide enhance the implementation of
(AIS) program is a machine- acquisition vehicle for CDM key cybersecurity capacities and
to-machine capability that the CDM Tools and Continuous capabilities of critical
receives, processes, and Monitoring as a Service infrastructure. The purpose of
disseminates cyber threat (CMaaS) blanket purchase the CRR is to gather
indicators and defensive agreement (BPA)which is information regarding
measures in real time to federal available to federal, state, local, cybersecurity performance from
and non-federal partners. and tribal government entities. specific critical infrastructure in
BPA participants achieve cost order to gain an understanding
AIS enables the National savings through tiered-price and of the relationships and impacts
Cybersecurity & task order discounts, enabling of infrastructure performance in
Communications Integration more efficient use of financial protecting critical infrastructure
Center to receive indicators and resources. operations. The results can be
remove personally identifiable used to evaluate a provider
information and other sensitive State and local governments independent of other
information not directly related may use the Direct Order/Direct assessments, used with regional
to the cybersecurity threat, and Bill option to procure studies to build a common
to share cyber threat indicators products/services from the perspective on resiliency, and
used to examine systems-of- Cyber Protective Visits: On- list and access to cybersecurity
systems (i.e., large and diverse site meetings with your information products, visit
operating and organizing organization to answer
models). The key goal of the questions, exchange
CRR is to ensure that core information, and address and
process-based capabilities exist, concerns about
are measureable, and are cybersecurity;
meaningful as predictors for an Educational and Awareness Cybersecurity Information
organizations ability to manage Briefings: Community-of- Sharing and Collaboration
cyber risk to national critical interest, symposium, and Program (CISCP) is a
infrastructure. For more conference-focused voluntary information-sharing
information about the CRR, briefings and workshops to and collaboration program with
contact the Cybersecurity help improve your and among critical
Evaluation Program (CSEP) at cybersecurity awareness and infrastructure partners and the posture, while providing federal government to leverage
timely and relevant trust for enhanced information
Cyber Security Advisors information on DHS and sharing and collaboration.
(CSAs). regional programs and
NPPD created the Cyber activities; CISCP hosts analyst-to-analyst
Security Advisor (CSA) Assessments; technical threat exchanges and
Program in recognition of how Cyber Resilience Review analyst training events that
a regional and national focused (CRR); include government and
cybersecurity presence is Cyber Infrastructure Survey industry partners sharing details
essential to protect critical Tool (C-IST): An expert- of cyber threat activity,
infrastructure. CSAs offer led, interview-based mitigation recommendations,
immediate and sustained assessment focusing on over and mitigation strategies. For
assistance to prepare and protect 80 cybersecurity controls; more information, contact
state, local, territorial, and tribal and
governments and private sector Incident Response: facilitate
entities. CSAs bolster the cyber incident response and Emergency Services Sector
cybersecurity preparedness, risk provide Federal Cybersecurity Initiative.
mitigation, and incident coordination for incident The Emergency Services Sector
response capabilities of these notification, containment, (ESS) Cybersecurity Initiative
entities and bring them into and recovery. is an ongoing effort to enable
closer alignment with the Please address CSA inquiries the ESS to better understand
Federal government. CSAs to: and manage cyber risks and to
represent a front-line approach coordinate the sharing of cyber
and promote resilience of key Cybersecurity Information information and tools between
cyber infrastructure throughout Products provide current subject matter experts (both
the U.S. and its territories. cybersecurity information and inside and outside the federal
CSAs are regionally located recommended security practices government) and the ESS
DHS personnel assigned to to help users understand disciplines. For more
districts throughout the U.S., cybersecurity issues and information, visit
with at least one per the 10 CSA mitigation options. This
regions, which are aligned to information enables users to -services-sector-cybersecurity-
the Federal regions. Currently, reduce their exposure and initiative or contact
the Cyber Security Advisors susceptibility to cyber-attacks
provide six types of services: and exploits. For a complete
Emergency Services Sector- (ESS-CRA), the Emergency and foster operational readiness
Cyber Risk Assessment (ESS- Services Sector Roadmap to at no cost. Courses range from
CRA). Sector-wide assessment Secure Voice and Data beginner to advanced levels and
that analyzes strategic cyber Systems, identifies and are accessible from any
risks to ESS infrastructure. The discusses proposed risk Internet-enabled computer. For
ESS-CRA results will help the mitigation measures to address more information, visit
responder community the risks identified in the ESS-
understand and manage cyber CRA. For more information,
risks, and provides a national- visit
level risk profile that ESS Industrial Control Systems
organizations can use to -services-sector-cybersecurity- Cyber Emergency Response
prioritize how they spend initiative or contact Team (ICS-CERT). The ICS-
resources and where to focus CERT focuses on control
training, education, equipment system security across all
investments, grant requests, and Enhanced Cybersecurity critical infrastructure and key
further study. For more Services (ECS) is an intrusion resource sectors. The ICS-
information, visit prevention capability that helps CERT supports asset owners U.S.-based organizations with reducing the risk of cyber-
-services-sector-cybersecurity- (including state, local, tribal, attacks by conducting outreach
initiative or contact and territorial governments) for awareness, performing protect their computer systems assessments, providing alerts
against unauthorized access, and advisories, conducting
Emergency Services Sector exploitation, and data incident response activities, and
Cybersecurity Framework exfiltration. ECS works by performing technical analysis of
Implementation Guidance. sharing sensitive and classified malware, artifacts, and
The Emergency Services Sector cyber threat information with vulnerabilities. For more
Cybersecurity Framework accredited Commercial Service information, visit https://ics-
Implementation Guidance was Providers (CSPs). These CSPs or contact ICS-
developed to help Emergency in turn use that information to CERT at
Services Sector owners and protect customer networks from
operators use the voluntary malicious activity. Groups
Framework for Improving interested in receiving ECS If an organization believes it is
Critical Infrastructure services and learning more experiencing a cyber event on
Cybersecurity released by the about the program should visit control systems/critical
National Institute of Standards or infrastructure please call 1-877-
and Technology (NIST) in contact 776-7585 or e-mail ICS-CERT
2014. For more information, at To
visit report ICS software Federal Virtual Training vulnerability visit
n/ess-cybersecurity-framework- Environment (FedVTE) is an
implementation-guidance or online, on-demand training l/report-a-vulnerability/ and fill
contact center featuring a wide range of out the Vulnerability Reporting
cybersecurity courses to Form. Please follow the
Emergency Services Sector federal, state, local, tribal, and directions to encrypt to the
Roadmap to Secure Voice and territorial government CERT Pretty Good Privacy key
Data Systems. The follow-up employees across the country. in order to protect sensitive,
to the Emergency Services FedVTE helps users increase or non-public vulnerability
Sector-Cyber Risk Assessment maintain cybersecurity expertise information.

Industrial Control System Information Technology events such as tornadoes,
Cybersecurity Standards and Sector Risk Assessment floods, hurricanes, and
References provide an provides an all-hazards risk earthquakes. To receive
extensive collection of profile that public and private information on the NCC or to
cybersecurity standards and IT Sector partners can use to be added to the NCC
reference materials as a ready inform resource allocation for distribution list, please contact
resource for the industrial research and development and the NCC Watch at 703-235-
control system stakeholder other protective measures which 5080 or e-mail
community. The collection enhance the security and
provides a one-stop location for resiliency of the critical IT
accessing papers, reports, Sector functions. For more National Cybersecurity &
references, and standards information, visit Communications Integration
associated with industrial Center (NCCIC) serves as a
control system cybersecurity. pp_it_baseline_risk_assessment centralized location where
To view the collection, visit .pdf or contact operational elements involved in cybersecurity and communications reliance are
References. For more Multi-State Information coordinated and integrated.
information, contact ics- Sharing and Analysis Center NCCIC partners include all (MS-ISAC) seeks to improve federal departments and
the overall cybersecurity agencies; state, local, tribal, and
Industrial Control Systems posture of state, local, tribal, territorial governments; the
Cybersecurity Training. ICS- and territorial partners. private sector; and international
CERT performs outreach Collaboration and information entities. The centers activities
activities and assists the control sharing among members, include providing greater
systems community to improve private sector partners, and understanding of cybersecurity
their cybersecurity preparedness DHS are the keys to success. and communications situation
through various cybersecurity State, local, tribal, and awareness vulnerabilities,
training courses. For more territorial government intrusions, incidents, mitigation,
information, visit https://ics- representatives who believe and recovery actions. they are experiencing a cyber Stakeholders can report
Available-Through-ICS-CERT. event of any kind, please call 1- cybersecurity incidents
866-787-4722 for the 24/7 MS- (including unexplained network
Information Technology ISAC Security Operations failures), the discovery of
Government Coordinating Center, or visit malicious code, and
Council provides a forum for vulnerability information at
interagency coordination, and ut/incidents/ and click on the
partnership among DHS, Report an Incident button. Contact the NCCIC Operations
National Cyber Security Center at
Division, federal, state, local, National Coordinating Center or 888-282-0870.
tribal, and territorial for Communications (NCC)
governments with a role in continuously monitors national The Hunt and Incident
protecting the IT Sector. For and international incidents and Response Team (HIRT)
more information, visit events that may impact national supports NCCICs mission security and emergency by serving as its primary
n-technology-sector. preparedness communications. operations arm, executing
Incidents include not only acts the asset response mission
of terrorism, but also natural delegated to DHS in PPD-

41. HIRT is the front line agencies and critical vulnerabilities within
when responding to cyber infrastructure asset owner stakeholder networks and
incidents and proactively operators. To learn more provide risk analysis reports
hunting for malicious cyber about HIRTs services, or to with actionable remediation
activity in government or request assistance, please recommendations. These
private sector enterprise and contact critical services enable
industrial control systems NCCICServiceDesk@hq.dh proactive mitigation to
(ICS) networks. HIRT or call (888) 282- exploitable risks and include
leverages world-class 0870. network (wired and wireless)
expertise to lead response, mapping and system
containment, remediation, The National characterization, vulnerability
and asset recovery efforts Cybersecurity & scanning and validation, threat
with its constituents and Communications identification and evaluation,
partners. Additionally, its Integration Centers social engineering, application,
proactive hunt capability (NCCIC) Portal, hosted on database, and operating system
focuses on identifying the HSIN, is a web-based configuration review, and
threats from sophisticated information sharing portal incident response testing.
threat actors that are often that enables members to To learn more about NCATS or
left undetected using exchange actionable request information about their
traditional cyber security cybersecurity information services, contact
tools and techniques. with other practitioners.
NCCICs operational
To enable these two branches, including the National Cyber Exercise and
functions, HIRT manages, United States Computer Planning Program (NCEPP)
equips and trains incident Emergency Readiness Team increases the cyber
response analysts and (US-CERT), share cyber preparedness and resilience of
engagement leads within an threat indicators, alert, and the Nation through the conduct
organizational culture that warning information, and and development of cyber
promotes technical analytical findings through exercises and planning
excellence and dynamic structured compartments templates for and with public,
mission assignments. with registered public and private, and international
Analysts can perform private sector users, stakeholders. As part of the
anomaly detection and including state, local, tribal, National Cybersecurity &
trending within network and territorial government Communications Integration
traffic, analyze memory and representatives. For more Centers, NCEPP works with
process frequency across information and to request state, local, tribal, and territorial
thousands of workstations access, contact info@us- partners to provide direct cyber
on a network, or replicate exercise support as a service or
attack activity within a through participation in the
sandbox environment. The National Cybersecurity Departments flagship biennial
HIRT helps protect the Assessments and Technical national-level cyber exercise
Nations key assets by Services Team (NCATS) series: Cyber Storm.
preventing and mitigating supports the National Additionally, NCEPP works
advanced cyber threats Cybersecurity & with a range of stakeholders to
through remote or onsite Communications Integration develop and deliver planning
advanced technical Centers mission by offering templates, such as the Cyber
assistance to Federal cybersecurity scanning and Capabilities Framework and
Government civilian testing services that identify state, local, tribal, and territorial

Cyber Incident Annex State, Local, Tribal, and The Stop.Think.Connect.
Template. NCEPPs cyber Territorial Cybersecurity Campaign is a national public
planning and exercise offerings Engagement Program fosters awareness campaign aimed at
are available at no cost to the the relationships that protect our increasing the understanding of
state, local, tribal, and territorial Nations critical infrastructure cyber threats and empowering
community. For additional and facilitates access to no-cost the American public to be safer
information, contact programs, resources, and and more secure online. services for state, local, tribal, Initiated by the prior
and territorial governments. administrations Cyberspace
National Cyber Security Governors and other appointed Policy Review, DHS leads the
Awareness Month (NCSAM) and elected state, local, tribal, Campaign in partnership with
is an annual campaign held each and territorial government the National Cyber Security
October to raise awareness officials receive cybersecurity Alliance and the Anti-Phishing
about cyber security among all risk briefings and information Working Group. Law
Americans, with law on available resources. More enforcement agencies and other
enforcement across the country importantly, these officials look organizations can receive free
participating. NCSAM, the to the program to identify cybersecurity materials
capstone event of the cybersecurity initiatives and (including tip sheets,
nationally-known partnership opportunities with presentations, and more) and
Stop.Think.Connect. Campaign, federal agencies, as well as state collaborate with other members,
is designed to engage and and local associations, that will including the International
educate public and private help protect their citizens Association of Chiefs of Police
sector partners through events online. For more information, and the Department of Justice,
and initiatives with the goal of contact by joining the Cyber Awareness
raising awareness about Coalition of government
cybersecurity as well as agencies or the National
increasing the resiliency of the The Fusion Center Cyber Network of non-profit groups.
nation in the event of a cyber Pilot was a one-year pilot for For more information, visit
incident. The campaign works developing a framework for all
closely with members of its fusion centers on how to onnect. or contact
Cyber Awareness Coalition integrate cyber security into
(comprised of federal agencies their area of
and state, local, tribal, and responsibility. Under the United States Computer
territorial governments) and its guidance of a multi-agency Emergency Readiness Team
national network (national-level review board, DHS, MS-ISAC, (US-CERT) US-CERT, an
non-profit organizations). To and others worked with six incident remediation team with
learn more about NCSAM and fusion centers to develop the expertise in federal network and
find out how to get involved, resulting Cyber Integration for critical infrastructure computer
contact Fusion Centers, An Appendix to security, issues alerts, bulletins, or the Baseline Capabilities for tips, and advisories to inform of
visit State and Major Urban Area threats and heighten awareness. Fusion Centers. This document Alerts provide timely
cyber-security-awareness- is accompanied by a Cyber information about current
month. Toolkit for fusion centers to use security issues, including
in building or improving their exploits. Bulletins provide
cyber programs. For more weekly summaries on newly
information, contact identified vulnerabilities and include patch information, when

available. Technical documents Vulnerability Notes Database security planning; federal
that include in-depth Internet and National Vulnerability facility security assessments;
security issues are also posted Database (NVD) provide stakeholder engagement; law
on the US-CERT website for timely information about enforcement and information
cybersecurity practitioners. software vulnerabilities, sharing services; and law
including associated impact, enforcement and security
Guidance for federal and non- solutions and workarounds, and incident response.
federal entities to use when lists of affected vendors.
submitting an incident For more information, visit The Explosive Detector
notification can be found at, Canine (EDC) Program is a critical element of FPSs uln/search, contact info@us- comprehensive security
guidelines. To report an, or call 888-282-0870. measures and supports strategic
incident, malware, phishing, or detection activities to clear
vulnerabilities, visit The Critical Infrastructure identified areas of interest of Cyber Community (C) explosive threats. The EDC Voluntary Program teams provide mobile and
(pronounced C-Cubed) is a effective capabilities for the
US-CERT shares actionable public-private partnership protection of life and property
information through its public- aligning business enterprises as through the provision of a
facing website, secure portal, well as federal, state, local, strong, visible, and
and National Cyber Awareness tribal, and territorial psychological deterrence
System. Learn more about US- governments to existing against criminal and terrorist
CERTs products and services resources that will assist their threats. EDC teams are the
at and efforts to use the National most effective countermeasure
by contacting 888-282-0870 or Institute of Standards and available today for detection of Technology (NIST) explosives. The EDC teams,
Cybersecurity Framework to each comprised of a dog and a
US-CERT National Cyber manage their cyber risks as part handler with law enforcement
Awareness System (NCAS) of an all-hazards approach to authority, conduct searches for
offers subscriptions to a variety enterprise risk management. a variety of explosive materials
of cybersecurity information for For more information, visit on or near building exteriors,
users with varied technical parking lots, office areas,
expertise. NCAS products vehicles, materials, packages
include Alerts, Bulletins, Tips, and persons in and around
and Current Activity updates. FEDERAL PROTECTIVE federal facilities. They also
A subscription to any or all SERVICE RESOURCES provide immediate and
NCAS products ensures access specialized response to bomb
to timely information about The Federal Protective Service threats and unattended packages
security topics and threats. To (FPS) protects federal facilities or other such dangerous items
learn more or subscribe, visit and their occupants and visitors that may present a hazard to a by providing law enforcement, federal facility. For more protective intelligence and information contact the Chief of
This page includes information security services, leveraging the the Canine Operations Branch
about how to use US-CERTs information resources of our Uniformed Operations Division
syndicated feeds. For network of federal, state, local, at 703-235-6080 or
additional information, contact tribal, territorial and private sector partners. FPS provides

The Mobile Command Vehicle management for situational INFRASTRUCTURE
(MCV) Program supports awareness and common SECURITY AND
FPSs mission through the operating picture development. RESILIENCE TRAINING
provision of mobile, on-site AND RESOURCES
platforms for command, FPS has eight MCVs located at
control, and communications regional offices around the Critical Infrastructure
during terrorist attacks, natural country, as well as four SUV- Security and Resilience
disasters, National Special based mobile communications Training includes web-based
Security Events, and other vehicles, known as Rabbits. independent study and
similar occurrences. The The Rabbits provide most of the classroom training and
MCVs can rapidly deploy to same communications materials that address a variety
any location in the continental capabilities as the MCVs, but of topics relevant to law
U.S. (and can be transported by lack the command and control enforcement that are designed
air and sea assets if necessary) space and workstations. The to promote the knowledge and
where the communications Rabbits afford a rapid skills needed to implement
infrastructure is inadequate or deployment capability, as well critical infrastructure protection
has been disrupted, or where as the ability to navigate tight and resilience activities. The
enhanced interoperability spaces and unimproved roads, Independent Study courses
among law enforcement which allows for the projection developed by the Office of
agencies is needed. Incident of communications services into Infrastructure Protection are
management in the nations areas that would otherwise be available free of charge through
current threat environment inaccessible. The Rabbits are the FEMA Emergency
requires mobility, designed to extend their Management Institute. More
interoperability among public electronic footprint into information about infrastructure
safety agencies, reliability, and buildings of opportunity so that protection training programs is
cost effectiveness. FPS MCVs they can be rapidly converted available at
meet this need. MCVs can into command posts with the
support daily operations as well full communications services. ing-programs-infrastructure-
as special deployments of the Strategic locations around the partners.
FPS Rapid Protection Force and country ensure that each vehicle
other organizational elements. has a 750 mile first due Critical Infrastructure
These highly specialized response radius and that any Protection: Achieving
vehicles augment the area of the continental U.S. can Results through Partnership
capabilities of the FPS dispatch be provided with service within and Collaboration (IS-913)
and call centers, known as one day. For more information, provides an overview of the
MegaCenters, by allowing them contact the Chief of the Critical elements and processes that
to remotely dispatch units and Incident Management Branch, develop and sustain
link different radio systems Operations Fusion Division at successful critical
together without the need to 703-235-6080 or infrastructure protection
actually send personnel to the partnerships and
scene. Each MCV also collaborations. For more
provides an environmentally information, visit
controlled platform for on-scene
command and control functions, courseoverview.aspx?COD
with small conferencing areas, E=IS-913.a.
video-teleconferencing, data Implementing Critical
analysis and processing, and Infrastructure Protection
information acquisition and Programs (IS-921.a)
addresses processes for Insider Threats (IS-915) provides training for a broad
informing partnerships, provides guidance to critical audience recognizing threats
sharing information, infrastructure employees and improving security in
managing risk, and ensuring and service providers on the workplace. For more
continuous improvement. how to identify and take information, visit
For more information, visit action against insider threats to critical infrastructure. It IWeb/IS/IS906.asp.
courseoverview.aspx?code= is designed for all personnel
IS-921.a and service providers who These courses can be used by
Active Shooter: What You are associated with critical law enforcement to educate
Can Do (IS-907) uses infrastructure. For more members of their community.
interactive scenarios and information, visit The Workplace Security and
videos to illustrate what Active Shooter courses are
actions managers and courseoverview.aspx?code= supplemented by classroom
employees can take when IS-915. materials (instructor guides,
confronted with an active Retail Security Awareness: student manuals, and visuals)
shooter situation, and what to Understanding the Hidden that can be downloaded from
expect when law Hazards (IS-912), which is the website.
enforcement arrives. For designed to make persons
more information, visit involved in commercial Homeland Security retail operations aware of Information Network
courseoverview.aspx?code= the actions they can take to Critical Infrastructure
IS-907. identify and report (HSIN-CI) provides secure
Critical Infrastructure suspicious purchases or networked information sharing
Security: Theft and thefts of products that actors covering the full range of
Diversion What You Can could use in terrorist or critical infrastructure interests.
Do (IS-916) is designed for other criminal activities. Validated critical infrastructure
critical infrastructure For more information, visit partners are eligible for HSIN-
employees and stakeholders, CI access. The National
and provides information ourseoverview.aspx?code=I Infrastructure Coordinating
and resources available to S-912. Center (NICC) posts content
identify threats and Surveillance Awareness: from a variety of internal and
vulnerabilities to critical What You Can Do (IS-914) external sources that is available
infrastructure from theft and provides training on actions to all critical infrastructure
diversion of critical that can be taken to detect, partners, including incident
resources, raw materials, deter, and report suspicious situation reports, threat reports,
and products that can be activities associated with impact modeling and analysis,
used for criminal or terrorist adversarial surveillance. It is common vulnerabilities,
activities. The course also designed for individuals potential indicators, and
identifies actions that can be with little to no physical or protective measures. The NICC
taken to reduce or prevent operations security combines current high-interest
theft and diversion. For experience. For more incidents and events on the
more information, visit information, visit HSIN-CI front page to enable easy access to relevant
courseoverview.aspx?code= IWeb/IS/ information. Individual sectors
IS-916. px?code=is-914. and sub-sectors self-manage
Protecting Critical Workplace Security more specific portals within
Infrastructure Against Awareness (IS-906) which HSIN-CI where smaller

communities of participants resilience workshops, training, Highlights of the IP Gateway
receive and share relevant research, and subject matter include the ability to access:
information for their particular expertise to critical a selection of physical and
information needs. HSIN-CI infrastructure partners to cyber vulnerability tools and
also includes capabilities to support investment in and security surveys;
facilitate multiple types of implementation of solutions for a consolidated library of
information sharing and enhancing critical infrastructure critical infrastructure data,
coordination, including resilience. IDR also provides assessments and reports;
suspicious activity reporting, post-disaster recovery integrated data visualization
webinars, shared calendars, etc. assistance to communities and mapping tools to
To ensure broad sharing of impacted by disaster. It does support complex data
essential information, the NICC this by deploying infrastructure analysis; and
also receives and provides recovery experts to impacted situational awareness tools
information via other HSIN communities who offer to support special event and
portals. To request HSIN-CI technical assistance and incident planning and
access, submit the following to analysis to inform the response activities. prioritization of reconstitution
and investment decisions, and For more information, contact
Name assist with short and long-term or 1-
Employer infrastructure recovery efforts. 866-844-8163.
Title For more information regarding
Business email the capabilities available The National Infrastructure
Brief written justification through the IDR program, Coordinating Center (NICC)
contact serves as a clearinghouse to
For questions regarding HSIN- receive and synthesize critical
CI access, contact Infrastructure Protection infrastructure information and or 202282 Gateway (IP Gateway) serves provide that information back to
9201. as the single interface through decision makers at all levels
which DHS mission partners inside and outside of
Infrastructure Development can access a large range of government to enable rapid,
and Recovery (IDR) Program integrated IP tools and data to informed decisions in steady
develops, coordinates, and conduct comprehensive state, heightened alert, and
supports the implementation of vulnerability assessments and during incident response. The
integrated infrastructure data analysis. This, in turn, NICC serves as the national
security and resilience solutions enables homeland security focal point for critical
across the infrastructure partners to quickly identify infrastructure partners to obtain
community. It does this by relevant vulnerability and situational awareness and
providing decision support consequence data in support of integrated actionable
tools, information, and event planning and response information to protect physical
resources to public and private efforts. The IP Gateway critical infrastructure. The
sector partners that inform provides various data collection, mission of the NICC is to
infrastructure investment, analysis, and response tools into provide 24/7 situational
planning, design, construction, one system, streamlining access awareness, information sharing,
maintenance, and emergency to IPs tools and datasets by and unity of effort to ensure the
management decisions. IDR leveraging a single user protection and resilience of the
provides decision support tools, registration, management, and Nations critical infrastructure.
a centralized clearinghouse of authentication process. When an incident or event
resources, community-focused impacting critical infrastructure
occurs that requires FusionCenterSupport@hq.dhs.g or at 1-866-
coordination between DHS and ov. For questions or requests, 844-8163.
the owners and operators of contact
critical infrastructure, the NICC Protective Security Advisors
serves as a national Protected Critical (PSAs) are security subject
coordination hub to support the Infrastructure Information matter experts who engage on
protection and resilience of (PCII) Program. protective measures and
physical critical infrastructure Are you finding it difficult to resilience planning with state,
assets. Establishing and obtain the vital critical local, tribal, and territorial
maintaining relationships with infrastructure information (CII) government mission partners
critical infrastructure partners needed to support your critical and members of the private
both within and outside the infrastructure initiatives? Are sector stakeholder community
federal government is at the private industry partners to protect the Nations critical
core of the NICCs ability to reluctant to share their data with infrastructure. As part of their
execute its functions. The you, out of fear that it could mission supporting critical
NICC collaborates with federal expose potentially sensitive infrastructure protection, the
departments and agencies and and/or proprietary information PSAs plan, coordinate, and
private sector partners to to the public? If so, the PCII conduct security surveys and
monitor potential, developing, Program offers a way for assessments; plan and conduct
and current regional and homeland security analysts to assistance visits; support
national operations of the access vital CII, while offering National Special Security
Nations critical infrastructure assurances to facility Events and Special Event
sectors. For more information, owners/operators that their Activity Rating events; respond
contact or information is protected from to incidents; and plan,
2022829201. public disclosure. Created by coordinate, and conduct training
Congress in the Critical to include coordinate IED
The Office of Cyber and Infrastructure Information Act awareness and IED risk
Infrastructure Analysis of 2002, the PCII Program mitigation training. For more
(OCIA) provides infrastructure ensures that PCII in the information or to contact your
consequence analysis and governments hands is protected local PSA, contact
prioritization capabilities to from disclosure, from use in
DHS, government, and private civil litigation; or for regulatory
sector stakeholders. OCIA purposes. By integrating PCII PUBLIC SAFETY AND
experts analyze the effects of protections into the data- EMERGENCY
risk mitigation actions in many collection process, homeland COMMUNICATIONS
forms, including strategic threat security analysts are better
and risk analysis; modeling and positioned to obtain and protect All-Hazards Communications
simulation; and analytic support the critical business sensitive Unit Leader (COML) Course
to Department decision makers information needed to assess is an NPPDs Office of
and security partners before, and understand the risk Emergency Communications
during, and after incidents. landscape, and provide leading (OEC) technical assistance
OCIA, the Office of indicators for emerging cyber course that familiarizes
Intelligence and Analysis, and security threats, and communications professionals
FEMA also provide risk vulnerabilities to critical with the role and
analysis tradecraft training to infrastructure. To find out responsibilities of a COML
fusion centers. For access to how the PCII Program can under the National Incident
risk analysis training contact support your programmatic Management System Incident
202-282-8866 or needs, contact pcii- Command System (NIMS ICS)

and provides exercises that designed for amateur radio National Emergency
reinforce the lecture materials. operators or groups who work Communications Plan
OEC offers this course jointly with public safety and cross- (NECP) sets goals and
with FEMA/EMI, as "E-969, disciplinary emergency identifies key national priorities
NIMS ICS All Hazards response professionals. This to enhance governance,
Communications Unit Leader. workshop is available to state planning, technology, and
This course is available to state and local public safety training and exercises to
and local law enforcement personnel as part of OECs improve disaster
agencies as part of OEC Technical Assistance Program. communications
Technical Assistance. For more For more information, contact capabilities. Originally
information, contact published in 2008, the NECP was revised in 2014 to address
Emergency Communications the rapidly evolving emergency
All-Hazards Communications Guidance Documents and communications landscape,
Unit Technician (COMT) Methodologies are stakeholder- specifically the increased
Course introduces public safety driven guidance documents and adoption of IP-based
professionals and support staff methodologies to support technologies. While the 2014
to various communications emergency responders across NECP continues to focus on the
concepts and technologies the Nation as they plan for and maintenance and operation of
including interoperable implement emergency Land Mobile Radio (LMR)
communications solutions, land communications initiatives. systems, it urges state and local
mobile radio (LMR) These resources identify and jurisdictions to plan and prepare
communications, satellite, promote best practices for for the adoption and integration
telephone, data, and computer improving statewide of broadband technology into
technologies during an incident governance, developing emergency communications,
response and for planned standard operating procedures, including the Nationwide Public
events. The course is taught by managing technology, Safety Broadband Network
OEC/ICTAP instructors who supporting training and (NPSBN). Continued
have both practitioner and exercises, and encouraging use collaboration between public
Communications Unit of interoperable and private sector entities is
experience and is designed for communications. Each is vital as the 2014 NECP begins
state, territory, tribal, and urban available publicly and is to be implemented
emergency response personnel updated as needed. Examples nationwide. For more
in all disciplines who have a include the Public Safety information, visit
technical communications Communications Evolution
background. For more Brochure, Establishing emergency-communications-
information, contact Governance to Achieve plan or contact Statewide Communications
Interoperability, and the Formal
Agreement and Standard OEC Interoperable
Auxiliary Communications Operating Procedure Template
workshop is designed for Communications Technical
Suite. For more information, Assistance (TA) Program
auxiliary communicators and contact or visit
volunteers who provide provides technical assistance at
http://www.publicsafetytools.inf no cost to all levels of state,
emergency backup radio o/.
communications support to local, and tribal law
public safety agencies for enforcement to support
planned or unplanned events at interoperable communications
state and local levels. It is solutions and practices. This
assistance is offered annually handbooks are designed to installation of critical voice
through Statewide assist agencies evaluate their and data circuits in many
Interoperability Coordinators organizations connectivity and situations. An initiation fee
(SWICs) based on risk and suggest mitigation solutions to and nominal monthly cost
capabilities, and it supports all increase route diversity. For are associated with this
lanes of the SAFECOM more information, contact service.
Interoperability Continuum.
There are 72 TA services are For more information, please
offered through the OEC TA Priority Telecommunications visit the following websites:
Catalog that can be viewed on Services (PTS) programs
the PSTools site at: provide national security and nt-emergency-
http://www.publicsafetytools.inf emergency preparedness telecommunications-service-
o/. These offerings are at no- (NS/EP), public safety and first gets;
cost and can be requested responders, and Critical
through Statewide Infrastructure Key Resources priority-service-wps; and
Interoperability Coordinators. (CIKR) industries the ability to
The services provided range communicate on unications-service-priority-tsp.
from communications-focused telecommunications networks
exercises, NIMS ICS during times of The SAFECOM Program
communications training to congestion. This is works to improve multi-
developments in broadband for accomplished through the jurisdictional and
public safety, dispatch following three services: intergovernmental
operations and NG9-1-1- communications
implementation. For more Government Emergency interoperability. Its
information, contact Telecommunications membership includes more than Service (GETS) provides 70 members representing state,
priority access to the local, and tribal emergency
OEC Route Diversity Project landline networks when responders, and major
(RDP) assists agencies on abnormal call volumes exist, intergovernmental and national
increasing the continuity of providing enhanced call public safety associations, who
their local access networks. completion for critical provide input on the challenges,
The local access network is the personnel. needs, and best practices
last mile connection between Wireless Priority Service involving emergency
an agencys on-site (WPS) provides priority communications. The
communications voice access to the cellular SAFECOM website provides
infrastructure and the service networks when abnormal members of the emergency
providers Central Office call volumes exist, response community and other
(CO) or Point of Presence providing enhanced call constituents with information
(POP). In the event of an completion for critical and resources to help them meet
undesirable situation, such as a public safety personnel. An their communications and
cable cut, flood, or damage to initiation fee and nominal interoperability needs. For
the service providers facility, monthly cost are associated more information, visit
the local access network may be with this service through,
entirely lost, leaving the agency your selected or contact
unable to perform mission- telecommunications carrier. SAFECOMGovernance@dhs.g
essential functions. The RDP Telecommunications ov.
methodologies, tools, and Service Priority (TSP)
provides priority repair and
SAFECOM Guidance on Statewide Communication enhance privacy protections by
Emergency Communications Interoperability Plans (SCIPs) assessing the nature and
Grants provides are locally-driven, multi- purpose for all personally
recommendations to grantees jurisdictional, and multi- identifiable information (PII)
seeking funding for disciplinary statewide strategic collected to fulfill the
interoperable emergency plans to enhance emergency Department's mission.
communications projects, communications. The SCIP
including allowable costs, items provides strategic direction and PRIV makes much of its work
to consider when funding alignment for those responsible publically accessible via
emergency communications for interoperable
projects, grants management communications at the state, cy to share its experience and
best practices for emergency regional, local, and tribal levels. work products with DHSs
communications grants, and These strategic plans outline partners and the public.
information on standards that and define the current and
ensure greater interoperability. future vision for PRIV is always available to
The guidance is intended to communications support our state and local
ensure that federally-funded interoperability within the state partners. Please feel free to
investments are compatible and or territory. They also align contact us at 202-343-1717 or
support national goals and emergency response agencies
objectives for improving with the goals, objectives, and
interoperability nationwide. For initiatives for achieving that The following materials may be
more information, visit vision. SCIPs are living of particular interest to state and documents that are typically local law enforcement offices,
or contact updated on an annual basis, or programs, and IT systems.
as frequently as needed. For
The Southwest Border more information, visit Privacy Compliance Reviews.
Communications Working PRIV issues privacy policies
Group (SWBCWG) serves as a communication- and conducts Privacy Impact
forum for federal, state, local, interoperability-plans. Assessments (PIAs) to
and tribal agencies in Arizona, implement those policies.
California, New Mexico, and Later, PRIV revisits the results
Texas to share information on DHS Privacy Office of these efforts to evaluate
common issues, collaborate on (PRIV) performance according to its
existing and planned activities, guidance principles and
and facilitate federal PRIV protects individuals by standards. For more
involvement in multi-agency embedding and enforcing information, visit
projects within the Southwest privacy protections and
Border Region. The SWBCWG transparency in all DHS ons-reviews.
aims to enhance activities. PRIV works with
communications operability and every DHS component and Privacy Compliance program,
interoperability, effectively use program to ensure that privacy guidance, and templates.
the regions available critical considerations are addressed PRIV operates a robust privacy
communications infrastructure when planning or updating any compliance program, using the
resources, and ensure that program, system, or initiative. Privacy Impact Assessments
programs continue to meet the (PIAs) and other tools to assess
stakeholders needs. For more PRIV uses the DHS Fair and document the integration of
information, contact Information Practice Principles rules into the Departments as the policy framework to programs and IT systems. To

foster public trust through created a formal approach to The Centers of Excellence
transparency, DHS publishes its preparing for and responding to (COE) network is an extended
PIAs, as well as the templates privacy incidents. For more consortium of hundreds of
and guides used to create those information, visit universities generating ground-
PIAs, directly to the public. For breaking ideas for new
more information, visit sets/privacy/privacy_guide_pih technologies and critical g.pdf. knowledge, while also relying
e. on each other's capabilities to
Privacy Outreach & serve the Department's many
Policy Establishing the Fair Education. PRIV shares its mission needs.
Information Practice experience directly with the
Principles as a matter of public and its partners in the Managed through S&Ts Office
Department procedure. DHS public, private, and academic of University Programs, the
believes in a set of privacy sectors. For more information, COEs organize leading experts
principles that guide all DHS visit and researchers to conduct
strategies, programs, and IT multidisciplinary homeland
systems. DHS uses these events. security research and education.
principles as the foundation for All COEs work closely with
new initiatives and Privacy PRIV issues tailored academia, industry, Department
Impact Assessments (PIAs) of educational materials to support components, and first-
existing programs. DHS its government and commercial responders to develop
memorialized these principles colleagues, for example: The customer-driven research
as department policy. For more Handbook for Safeguarding solutions to 'on the ground'
information, visit Sensitive Personally Identifiable challenges as well as provide Information. For more essential training to the next
sets/privacy/privacy_policyguid information, visit generation of homeland security
e_2008-01.pdf. experts.
Policy Establishing the handbookforsafeguardingsensiti Each center is university-led or
Privacy Impact Assessment vePII_march_2012_webversion co-led in collaboration with
(PIA) as a standardized .pdf. partners from other institutions,
government privacy agencies, national laboratories,
compliance process. PRIV think tanks, and the private
uses a structured approach to Science and Technology sector. The research portfolio is
build privacy protections into Directorate (S&T) a mix of applied research
specific programs: DHS addressing both short and long-
formally established the PIA The S&T Directorate's mission term needs. The COE extended
requirement as a matter of is to improve homeland security network is also available for
policy. For more information, by providing to customers state- rapid response efforts. For
visit of-the-art technology that helps more information, visit achieve their missions. S&T
sets/privacy/privacy_policyguid customers include the operating and-technology/centers-
e_2008-02.pdf. components of the Department, excellence.
and state, local, tribal, and
Privacy Incident Handling territorial emergency responders Datacasting Technology has
Guidance. All organizations and officials. been developed to address
face the risk of privacy breaches information sharing challenges
and other incidents. PRIV faced by the public safety

community. Datacasting uses that allows users to develop identifying cues that indicate
the public television spectrum training scenarios and employ movement in a given area) can
to allow public safety users to their training tactics, be vastly different. S&T
quickly and securely share data, techniques, and procedures to developed a comprehensive,
including videos, images, and respond; it also has a strategic video-based training package
text that they may not be able to component requiring responders for enhancing sign cutting
using traditional networks. This to establish unified command to perceptual and analysis skills.
provides users with reliable manage complex cross- S&T created and transitioned
access to timely mission critical discipline events. EDGEs 3D video training materials to
information from practically three-dimensional (3-D) the U.S. Border Patrol. For
any location, enhancing environment features accurate more information contact
communication and situational avatars, equipment, and
awareness to make informed simulations of individuals and
decisions on the job. The First crowds. S&T piloted its initial Eye-dentify/ScreenADAPT
Responders Group conducted EDGE system with emergency is a visual search training
several successful pilots, tests, response agencies in platform that uses eye tracking
and experiments on this Sacramento, CA, and it is now technology to examine visual
technology in 2015 and 2016 in available at no cost to response search performance in real time.
Houston, TX; Chicago, IL; agencies nationwide. A second ScreenADAPTs Eye-dentify
Washington, DC; and Boston, S&T-developed school-based component is a Windows based
MA. The pilots demonstrated active shooter capability will be software platform that measures
datacastings ability to support available to first responders in eye movement patterns to
public safety communications mid-2017. Agencies will be evaluate search performance in
in an operational environment. able to customize the EDGE real time on facial images. Eye
Since the successful testing, platform to create additional tracking is utilized while
datacasting has been used and response scenarios to further trainees examine image pairs to
will continue to be used by meet their training needs. To determine whether they match
Houston during multiple large learn more about simulation (i.e., should be cleared) or do
scale events such as the tools for first responders, not match (i.e., are an
Republican Presidential contact imposter). Students and
Candidates Debate, the NCAA instructors are shown
Mens Final Four Basketball immediate feedback after each
Tournament, the Chevron Expert Tracker Training image pair; they not only learn
Marathon, and Super Bowl LV supports the U.S. Border whether the student's decision
and other incidents such as Patrols mission which relies on was correct, but also can review
flooding due to heavy storms in U.S. Border Patrol agents and the thoroughness of visual scan
the city. The First Responders their highly specialized skills to pattern performance on images.
Group is now working with track and apprehend aliens and Eye-dentify was built as an
partners on a strategy to make smugglers by identifying and innovative and adaptive training
this technology available tracking movement of personnel module that utilizes eye
nationwide. For more within a given area. Border tracking to capture visual search
information, contact Patrol training focused on process measures in addition to identification of potential behavioral responses. Eye-
movement of personnel via foot dentify makes the unobservable
The Enhanced Dynamic Geo- traffic across borders or within observable, allowing trainees
Social Environment (EDGE) unauthorized areas is and instructors to see how a
Virtual Training provides a standardized, but performance given image pair was searched,
virtual environment platform of tracking (i.e., sign cutting; and provides feedback on

whether key features were Homeland Security and the end users. Reflecting
missed. S&T plans to transition government officials, academic, S&Ts focus on transition, First
eight Eye-dentify systems to non-profit, and volunteers Responders Group has worked
CBP in 2017. For more sponsored by the DHS S&Ts to ensure that technologies
information, contact First Responder Technologies developed in coordination with program. Registered members S&T are available to first
of this professional network responder communities has share information, ideas, and nationwide; S&Ts technologies
transitioned to best practices, enabling them to are included in the Federal more efficiently and effectively Emergency Management
and-technology/first- prepare for all hazards. To date, Agencys Authorized
responders, and remains a First Responder Communities Equipment List (AEL) that
website that enables federal, of Practice has more than 8,300 public safety agencies are
state, local, tribal, and territorial active members and over 200 authorized to purchase from
first responders to easily access active communities based on with their federal grant dollars.
and leverage federal resources diverse interests and disciplines. For more information, visit
on products, standards, testing For more information, visit
and evaluation, grants and https://communities.firstrespond and-technology/first-responders
training, and best practices to or email
develop or deploy technologies
to enhance homeland security. The First Responders Group
The website provides original is focused on fostering, through International Forum to
content through Responder research and development Advance First Responder
News articles and videos, which (R&D), a first responder Innovation (Forum)
highlight federal programs, community that is connected, The Forum is an organization of
initiatives, webinars, and informed, and equipped to international government
research. The respond and protect the leaders focused on enhancing homeland. The First and expanding the development
site also provides a user Responders Group identifies, of affordable, innovative
feedback mechanism via email validates, and helps close first technology for first responders
at:, responder capability gaps worldwide. Representation to
and opportunities to engage via through existing and emerging the Forum is comprised of
DHS social media platforms technologies, knowledge members from Australia,
linked to the site (Facebook, products, and the acceleration Canada, the European
Twitter, Instagram, Flickr, and of standards. Commission, Finland,
Instagram). Visit Germany, Israel, Japan, Projects in the First Responders Mexico, The Netherlands, New
and-technology/first- Groups strategic priority areas Zealand, Singapore, Spain,
responders. communications, data sharing, Sweden, United Kingdom, and
first responder safety and the United States. As the
First Responder Communities effectiveness, emerging threats Forum grows, it will serve as a
of Practice is an online (i.e., violent extremism, GPS mechanism to discuss shared
network, sponsored by the First vulnerability, unmanned aerial first responder capability gaps,
Responders Group, for vetted systems), and provide a platform for
active and retired first radiological/nuclear response collaboration on R&D
responders, emergency response and recovery research and initiatives and solutions,
professionals; federal, state, development result directly characterize global first
local, tribal, and territorial from close collaboration with responder markets, and educate

first responders about available mitigate, respond to, and (SEL) and the FEMA
technology. A clearly defined recover from homeland security Authorized Equipment List
list of common capability gaps, threats and events. NUSTL (AEL) for the law enforcement
along with a true understanding uniquely provides independent communitys needs. In
of the global market will technology evaluations and addition, the Office works with
provide the international first assessments for first responders, the National Institute of Justice
responder community a greater thereby enabling informed (NIJ) and the National Institute
voice and will help motivate acquisition and deployment of Standards and Technology
industry to create advanced decisions, and helping to ensure (NIST) to promote the
technologies for first responders that responders have the best development and availability of
and deliver them at affordable technology available to use in relevant standards and
prices. The Forum will increase homeland security missions. associated conformity
the effectiveness of making More specifically, the Lab is assessment programs for
affordable, innovative mission ready to support the products and equipment listed
technology available to first national first responder in FEMA AEL. The Office has
responders. Participating community by: Conducting test also entered into agreement
countries will have an and evaluation of First with ASTM International to
opportunity to pool resources Responder technologies and facilitate the procurement
for addressing and resolving systems; advising first actions of the responder and law
responder technological responders on homeland enforcement community by
challenges, allowing for more security-related technology making standards available to
R&D to be accomplished in a solutions and use; and state and local law enforcement
shorter period of time. Sponsoring and conducting and responder organizations at
Additionally, aggregating the R&D for science and no cost. The Office is currently
user base of first responders technology-based solutions to involved in developing
across the globe gives new respond and recover from a standards for emergency
critical mass to the market. radiological/nuclear incident. response robots, personal
Together, Forum members will For more information, visit protective equipment, urban
help to improve the search and rescue robots,
effectiveness, efficiency, and and-technology/national-urban- communications equipment,
safety of first responders around security-technology-laboratory chemical and biological
the globe, resulting in improved or contact detectors, and others that
security for all nations and directly address needs
citizens. To learn more, contact expressed by the law The Office of Standards, enforcement community. For
within the Capability more information, contact
The National Urban Security Development Support Group
Technology Laboratory facilitates the development and
(NUSTL), located in New York integration of standards across Project 25 Compliance
City, is the only national the entire spectrum from Assessment Program (P25
laboratory focused exclusively innovation to operations. The CAP) ) was established when
on supporting state and local Office works closely with S&T partnered with the
first responders capabilities to federal, state, and local law Department of Commerce
address the homeland security enforcement partners to Public Safety Research program
mission. The Lab provides First identify, develop, and to provide a process for
Responders the necessary promulgate standards through ensuring that first responder
services, products, and tools to InterAgency Boards (IAB) communications equipment
prevent, protect against, Standardized Equipment List complies with P25 standards,

meets performance The Responder Technology Response and Defeat
requirements, and is capable of Alliance (RTA) was Operations (REDOPS)
interoperating across established by the First program works in cooperation
manufacturers. P25 is a suite of Responders Group to reframe with the FBIs Counter-
standards that enable the discussion among first Improvised Explosive Device
interoperability among digital responders, industry and (IED) Unit, the National Bomb
two-way land mobile radio investment community, and Squad Commanders Advisory
communications products other research and development Board, and state and local
created by and for public safety organizations to address current public safety bomb squads to
professionals, with the end goal and future emerging enhance the Nations ability to
of radios in the hands of technologies. The goal of the render IEDs safe. Through its
responders that can interoperate program is to leverage resources series of test beds, REDOPS
regardless of manufacturer. and expertise to deliver assesses emerging counter-IED
P25 CAP allows emergency integrated responder solutions technologies in areas ranging
responders to confidently at market speed. RTA is from robotics and materials
purchase and use P25-compliant designed to bring a diverse set handling to render-safe tools
products, and the program of stakeholders together to and evaluates the safety and
represents a critical step toward explore innovative technology efficacy of IED response
allowing responders to solutions, standards procedures. The programs
communicate with their own formulation, and Micro R&D effort gathers
equipment. In 2009, the first commercialization approaches innovative ideas from bomb
eight laboratories were to improve responder health, technicians across the country,
officially recognized by DHS as safety, and effectiveness. RTA validates them and helps
part of the P25 CAP. All focus areas are: (1) Body-Worn develop them into affordable,
equipment suppliers that Electronic Systems; (2) effective solutions that bomb
participate in the P25 CAP must Integrated Voice and Data squads throughout the country
use DHS-recognized Communications; (3) Multiple can implement. Several
laboratories to conduct Hazard Personal Protective technologies and procedures
performance, conformance, and Clothing and Equipment (PPE); that REDOPS has evaluated are
interoperability tests on their and (4) Advance Sensors and now included in the curriculum
products. Upon completion of Information Technologies. of the FBI Hazardous Devices
product testing, equipment RTAs goal is to work with School in Huntsville, AL, which
suppliers must submit summary industry to change the dynamic trains and certifies all public
test reports (STR) and from first responder R&D safety bomb technicians in the
suppliers declaration of efforts that are short-term and United States. For more
compliance (SDoC) for any P25 incremental with fragmented information, contact
equipment for DHS S&T solutions often resulting in
review. The SDoC and STR marginal, incremental
document reviews assess the improvements to operations and The State & Local First
documents' completeness and interoperability, to solutions Responder Incident
accuracy in accordance with the that are innovative, well Management sub-IPT, or
current P25 CAP processes. integrated and make the First Responder Resource
For more information, visit Nations first responders safer. Group (FRRG), generates its To learn more, contact recommendations through the
and-technology/p25-cap. Project Responder series, the
most recent being Project
Responder 4, published in July
2014. The FRRG serves as a

mechanism for continuous then tested and evaluated by community. For more
dialogue and the coordination of responders themselves in information, contact
research, development, and realistic operational
delivery of technology solutions environments. SAVER may
to first responders and the also perform tests to verify
emergency preparedness and manufacturer claims. United States Secret
response community at the SAVER reports are free to Service
federal, state, local, tribal, and download and searchable by
territorial levels. More than 130 Authorized Equipment List
responders from around the (AEL) category to facilitate the The mission of the Secret
country are engaged throughout need to align grant funds to Service is to safeguard the
S&Ts established solution AEL equipment. The goal of nations financial infrastructure
development process to SAVER is to provide cost and and payment systems to
identify, validate, and facilitate time savings to federal, state, preserve the integrity of the
the fulfillment of first responder and local responders as they economy, and to protect
needs through the use of decide which equipment to national leaders, visiting heads
existing and emerging purchase. of state and government,
technologies, knowledge The SAVER Program is designated sites, and National
products, and standards. The managed and executed by the Special Security Events.
group meets annually in person National Urban Security
and virtually throughout the Technology Laboratory CERT at Carnegie Mellon. In
year. The FRRG remains (NUSTL). For more August 2000, the Secret Service
unique within the IPT process information, visit and the Software Engineering
because its stakeholders and Institute, a federally-funded
customers are at the state, local, and-technology/saver. research and development
tribal, and territorial levels center located at Carnegie
rather than within DHS Video Quality in Public Safety Mellon University, instituted
Components. Integration of (VQiPS) Working Group was the Secret Service CERT
first responder priorities into the formed to focus on the major Liaison Program. This program
overall DHS R&D budget policy, technology, and positions the Secret Service to
process thus allows for the practical uses and challenges of meet emerging cyber security
exchange of technical solutions public safety video systems. threats as part of the agencys
across levels of government. The working group is investigative and protective
To learn more, contact comprised of emergency missions. The agents assigned responders across all levels of to the CERT Liaison Program
government, academia, federal lead Secret Service-sponsored
System Assessment and partners, and industry. The research and development as
Validation for Emergency VQiPS Working Group creates well as direct technical support
Responders (SAVER) Program knowledge products, fosters a for investigative and protective
assists emergency responders knowledge-sharing operations. The agents assigned
making procurement decisions environment, and supports to the CERT Liaison Program
by providing Assessment research, development, testing, work closely with the Software
Reports, Market Surveys, and evaluation for enhanced Engineering Institute and
TechNotes, and other types of video quality through Carnegie Mellon University to
unbiased comparative measurable, objective, and identify and implement
assessments of commercially standards-based solutions across advanced technology in support
available tools and equipment. the full spectrum of video-use of the full spectrum of Secret
The equipment is selected, and cases for the public safety Service operations. CERT does
distribute forensic tools officers, financial institution state, or local law enforcement
developed at the university to investigators, academic upon request. For more
state and local law enforcement partners, and commercial information, please contact your
agencies. For more partners of the Secret Service. local Secret Service Field
information, visit The site contains two tools: the Office at eLibrary, a unique collection of
intelligence/index.cfm. resource databases which ontact/field-offices/.
allows authorized users from
Cyber Intelligence Section throughout the law enforcement Electronic Crimes Task Force
(CIS) collects, analyzes, and community to obtain (ECTF). The USA PATRIOT
disseminates data in support of information on a range of Act of 2001 mandated the
Secret Service investigations sensitive topics including Secret Service to establish
worldwide and generates new counterfeit corporate checks, nationwide Electronic Crimes
investigative leads based upon credit card issuing bank Task Forces to combine the
this intelligence. CIS leverages information, and recovered resources of academia; the
digital equipment and skimming devices; and the U.S. private sector; and local, state,
information obtained through Dollars Counterfeit Note and federal law enforcement
private partnerships to monitor Search, a site that provides the agencies to prevent, detect and
developing technologies and user with the ability to conduct investigate various forms of
trends in the financial payments a search of the Secret Service electronic crimes, including
industry. This information is counterfeit note database. For potential terrorist attacks
used to enhance the Secret more information, visit against critical infrastructure
Services capabilities to prevent https://www.einformation.usss. and financial payment
and mitigate attacks against the gov/eInformation/home.seam. systems. There are currently
financial and critical 39 Secret Service ECTFs, to
infrastructures. CIS has Electronic Crimes Special include London, England and
developed an operational Agent Program (ECSAP). Rome, Italy. Membership in
investigative unit, which ECSAP trained specialists the Secret Service ECTFs
targets, pursues, and arrests conduct forensic examinations include approximately 350
international cyber criminals of computers, mobile devices, academic partners; over 2,500
involved in cyber intrusions, and other electronic media. international, federal, state, and
identity theft, credit card fraud, These agents possess the local law enforcement partners;
bank fraud, and other computer- required expertise to collect and and over 4,000 private sector
related crimes. CIS provides process digital evidence to partners. Financial Crimes
crucial information and support computer related Enforcement Network
coordination to facilitate the investigations in the field. They (FinCEN), a bureau within the
successful dismantling of also provide expertise in the Department of Treasury,
international criminal investigations of network provides financial transaction
organizations. Requests for intrusions and database thefts. information to law enforcement
investigative assistance should The program provides a venue at the federal, state, local, and
be facilitated through your local that establishes and maintains international level. FinCEN
Secret Service Field Office at relationships with the private enhances the integrity of sector in order to sustain and financial systems by facilitating
ontact/field-offices/. continually improve its the detection and deterrence of
knowledge of emerging trends financial crime, by receiving
eInformation Network. The in the cyber industry. ECSAP and maintaining financial
Secret Services eInformation agents conduct forensic transactions data; analyzing and
Network is available for free examinations for other federal, disseminating that data for law
to authorized law enforcement
enforcement purposes; and include terrorist financing, International Organized
building global cooperation money laundering, and other Crime Intelligence and
with counterpart organizations illicit activity. For more Operations Center (IOC-2).
in other countries and with information, please contact your The U.S. Department of
international bodies. local Secret Service Field Justices IOC-2 marshals the
FinCEN utilizes numerous Office at resources and information of
databases to provide nine U.S. law enforcement
intelligence and analytical ntact/field-offices/. agencies, as well as federal
support to law enforcement prosecutors, to collectively
investigators protecting the U.S. Financial Crimes Task Forces combat the threats posed by
financial system from the (FCTF). The Secret Service international criminal
abuses of criminal activities to through years of collaboration organizations to domestic safety
include terrorist financing, on investigative endeavors and security. The Secret
money laundering, and other established unique partnerships Service IOC-2 detailee serves as
illicit activity. For more with state, local, and other the liaison between the Secret
information, please contact your Federal law enforcement Service and the IOC-2 acting as
local Secret Service Field agencies. Leveraging those a conduit for information and
Office at partnerships with the agencies requests in support of field long-standing cooperation with agents. For more information,
ntact/field-offices/. the private sector, the Secret please contact your local Secret
Service established a national Service Field Office at
Financial Crimes network of Financial Crimes
Enforcement Network Task Forces (FCTFs). The ntact/field-offices/.
(FinCEN), a bureau within the FCTFs combine the resources
Department of Treasury, of the private sector and other Mobile Device Forensic
provides financial transaction law enforcement agencies in an Facility. The Mobile Device
information to law enforcement organized effort to combat Forensic Facility in Tulsa, OK
at the federal, state, local, and threats to our financial payment was created in 2008 to meet the
international level. FinCEN systems and critical challenges associated with the
enhances the integrity of infrastructures. The multi- forensic extraction of data from
financial systems by facilitating agency components are well mobile devices. The Secret
the detection and deterrence of suited to conduct complex, in- Service established a
financial crime, by receiving depth, multi-jurisdictional partnership with the University
and maintaining financial investigations. Through their of Tulsa, Digital Forensic
transactions data; analyzing and membership in a FCTF, local Laboratory Center of
disseminating that data for law and state law enforcement Information Security to create
enforcement purposes; and entities may access and co-locate the Mobile
building global cooperation investigative resources to Device Forensic Facility at the
with counterpart organizations include FinCEN, INTERPOL, University. The facility
in other countries and with and IOC-2 databases. For more provides training and conducts
international bodies. information, please contact your forensic examinations and
FinCEN utilizes numerous local Secret Service Field research on mobile devices.
databases to provide Office at The ongoing research into these
intelligence and analytical new devices, operating systems
support to law enforcement ntact/field-offices/. and mobile device technologies
investigators protecting the U.S. provides valuable tools in the
financial system from the Secret Services fight against
abuses of criminal activities to cybercrime. Requests for

investigative assistance should Basic Computer Evidence with local, state, and federal law
be facilitated through your local Recovery Training, Advanced enforcement authorities, as well
Secret Service Field Office at Forensics Training, Basic as coordinate activities taking Network Investigation Training, place within their assigned
ontact/field-offices/. Network Intrusion Response transportation domain, on
Program, Basic Mac behalf of TSAs Office of Law
National Center for Missing Investigation Training, Basic Enforcement/Federal Air
and Exploited Children. The Mobile Device Investigations, Marshal Service.
Secret Service supports the Mobile Device Examiner,
National Center for Missing and Advance Mobile Device Typical liaison contacts for the
Exploited Children and local Examiner, Online Social AFSDs-LE may include airport
law enforcement with its Networking, Computer police authority, Transportation
expertise in forensic analysis to Forensics in Court Security Officers, ICE, the Joint
include crime scene, Prosecutors, Computer Terrorism Task Force, CBP, the
handwriting, document Forensics in Court Judges, TSA Office of Inspection, and
authentication, ink analysis, Mobile Devices in Court any other local, state, and/or
fingerprints and photography, Prosecutors and Mac Forensics federal agencies whose
graphic design, video Training. NCFI provides investigative interests may have
productions, audio/image funding for all travel expenses, a nexus to the transportation
enhancement and speaker as well as hotel and per diem system within TSAs area of
recognition services. for state and local law responsibility. For more
Specialized polygraph and enforcement officers. information on TSAs AFSD-
crime scene services are Additionally, all NCFI LE program, visit
evaluated upon request. For graduates receive hardware, or contact your OLE/FAMS
more information, visit software and licenses necessary Supervisory Air Marshal in to conduct forensic computer Charge (SAC) or FSD.
ontact/field-offices/ and and network intrusion examinations. For more Commercial Vehicle Counter-
nvestigation/. information, visit Terrorism Training. Created under commission by TSA, the
National Computer Forensics DHS Federal Law Enforcement
Institute (NCFI) Hoover, Training Center (FLETC)
AL. The NCFI was established Transportation Security worked directly with state,
in 2007 through a partnership Administration federal, and municipal law
initiative between DHS, the enforcement agencies to
(TSA) identify the most effective ways
Secret Service, and the
Alabama District Attorneys for on-site officers to identify
TSA protects the nations
Association. The NCFI offers and intercept commercial
transportation systems to ensure
state and local law enforcement vehicle-borne terrorist threats.
freedom of movement for
officers, prosecutors, and judges Training at FLETC facilities or
people and commerce.
a variety of cyber-related to law enforcement units at their
training courses based on the home stations has been certified
Assistant Federal Security
Secret Service electronic crimes as eligible for DHS
Directors for Law
training model. NCFI offers the reimbursement through state
Enforcement (AFSDs-LE)
following 15 courses: Basic assistance programs. Visit the
The AFSD-LE, working under
Investigation of Computer and FLETC website for more
the direction of the Federal
Electronic Crimes Program, information:
Security Director (FSD), works
Basic Scripting Techniques,
to establish and maintain liaison
program/commercial-vehicle- security. For more information various transportation modes, I-
counterterrorism-training- and to order your training STEP provides a variety of
program or contact the FLETC materials, visit products and services that
Glynco office at 912-267-3587. enable security partners to
industry/surface-transportation. enhance security capabilities by
Counter-Terrorist Guides. participating in and conducting
Pocket-sized publications First Observer Plus exercises and training that
directed to surface Domain Awareness Training. strengthens security plans, test
transportation providers in Available online at, emergency procedures, and
highway, mass transit, training modules speak directly sharpen skills in incident
passenger and freight rail, and to transportation professionals management. I-STEP builds
pipeline modes identify terrorist to enhance their understanding partnerships by collaborating
techniques, motivation and of terrorist techniques and with modal partners, law
opportunities to disrupt threats, providing a message of enforcement personnel, first
potential threats. These colorful Observe, Assess, Report. responders, medical
guides have become many of Modules are currently available professionals, government
the TSA Surface Divisions for highway-related professions. leaders, and industry
most popular publications. For A new generation of messages representatives to address
more information visit similarly created will focus on challenges in transportation those working in mass transit, security. For more information,
industry/surface-transportation passenger and freight rail, and contact 571-227-5150 or
or contact TSA- pipeline modes. More than 96,000 civilian transportation
workers have been trained to Managed by the I-STEP, the
DVD Training Protecting date and TSAs domain Exercise Information
Pipeline Infrastructure: The awareness programs have been System (EXIS) is the only
Law Enforcement directly credited with disrupting exercise tool specifically
Role. Identifying a gap in the two terrorist events. To learn tailored to the transportation
existing training materials, TSA more, contact sector. EXIS takes a step-
developed this DVD training or by-step approach as it
program to enhance the visit guides users though exercise
understanding of pipeline industry/firstobserver. planning. First, it directs
systems and their security issues users to identify the exercise
by law enforcement Intermodal Security Training planning schedule and
officials. This DVD provides a and Exercise Program (I- sector focus; next it enables
basic understanding of how STEP) provides exercise, users to select specific
pipeline systems function, the training, and security planning objectives and scenario
principal products they tools and services to the elements; and finally, it
transport, as well as a transportation community. I- allows users to plan
description of the threats to, and STEP is the only federal evaluation criteria, share
vulnerabilities of, exercise program to focus on best practices and lessons-
pipelines. Law enforcement the security nexus of the learned, and create post-
officials will achieve a better intermodal transportation exercise reports. EXIS
understanding of the usual environment. As a result, it not communities facilitate
measures taken to protect only reduces risk to individual information sharing among
pipelines, and actions they can systems, but the entire users. Users can create
take to assist in this effort transportation network. private communities and
during times of heightened Working in partnership with the sub-communities to design

operator-specific exercises pursuant to the Aviation and nationwide in an effort to
and to delegate tasks to Transportation Security Act. identify and define potential
other planning team SAS conducts JVAs in order to launch areas, areas that are rated
members. EXIS is provided identify vulnerabilities and on the basis of seven specific
at no cost by the TSA as an recommends options to mitigate characteristics. A multi-
integral part of I-STEP. To those vulnerabilities. SAS dimensional approach is
become an EXIS member, conducts JVA training as designed to detect, deter, and
visit needed and it can be made defeat a MANPADS threat available to local law against civil aviation. SAS also
ult.aspx. For more enforcement and security provides oversight and guidance
information, contact personnel upon request. on the development and For more information, contact implementation of MANPADS mitigation plans at the
Joint Vulnerability commercial airports.
Assessment (JVA) Training. Law Enforcement Officer
The Security Assessments (LEO) Reimbursement SAS provides a MVA Basic
Section (SAS), under the Office Program provides partial Training Program (MVABTP)
of Law Enforcement/Federal reimbursement to state, local, or course that provides field
Air Marshal Service, Security other public institutions or personnel with the basics on
Services and Assessments organizations responsible for how to conduct a MVA and the
Division conducts JVAs in commercial airport operations requirements for the MMP. In
partnership with the FBI for the within their jurisdiction, as addition, it will provide
purpose of assessing current and specified in U.S. statute or TSA knowledge on how to identify
potential threats to commercial program guidance documents areas of concern for other stand-
air transportation facilities and regulations. Funding is off weapons threats. Report
within the United States. The intended to help defray the cost templates, reference, and
assessment process is a direct of providing highly visible law briefing material will be
result of the increasing threat to enforcement presence and provided to all trainees.
aviation, a threat which support of passenger screening
prompted Congress to pass activities at U.S. commercial SAS provides MANPADS
Section 310 of the Federal airports. For more information, awareness training and outreach
Aviation Reauthorization Act of contact LEO.Reimbursements to local law enforcement and
1996, requiring the Federal other first responders. The Law
Aviation Administration (FAA) Enforcement MANPADS
and the FBI to conduct joint Man-Portable Air Defense Awareness Training Program
threat and vulnerability Systems (MANPADS) (LEMATP) provides law
assessments of security at U.S. Awareness Training. enforcement and other first
airports. In response to this MANPADS are portable responders with the basic
mandate, during Fiscal Years surface to air guided missile knowledge on how to mitigate
(FY) 1999, 2000, and 2001, systems designed to be carried an attack. The course includes
FAA and FBI prepared three- by an individual. The SAS, MANPADS capabilities, SAS
part assessments addressing the under the Office of Law MVA methodology and
vulnerability, criminal activity, Enforcement/Federal Air selection of sites, the
and terrorist threat at selected Marshal Service, Security requirements for a MMP,
airports nationwide. In Fiscal Services and Assessments patrol/security techniques, law
Year 2002, TSA took on the Division, conducts MANPADS enforcement response to a
responsibility of conducting Vulnerability Assessments MANPADS attack, and
assessments from the FAA (MVA) at commercial airports investigative tips after a
MANPADS attack. TSA also the public. TSAs Internal hour block of instruction that is
provides MANPADS pocket Affairs Division (IAD) is comprised of a structured lesson
identification cards and posters responsible for conducting plan, slide presentation, FAQs,
to law enforcement and first criminal and administrative NLETS procedures, and
responders to assist in the investigations of employees applicable codes of Federal
identification of MANPADS who are alleged to have regulation. This material is
and their components. committed misconduct, provided to federal, state, local,
For more information, contact including identifying and territorial, tribal, and approved investigating potential workers railroad law enforcement
compensation fraud by TSA agencies and departments to
Sensitive Security employees. If a person properly instruct their officers
Information (SSI) Program. suspects that a TSA employee is on the subject of flying on
SSI is information obtained or engaging in misconduct or board commercial aircraft while
developed which, if released fraud, they are asked to contact armed. The training includes
publicly, would be detrimental TSAInspectionHotline@tsa.dhs. protocols in the handling of
to transportation security, and is gov and provide the name of the prohibited items, prisoner
defined at 49 CFR Part employee suspected for alleged transport, and dealing with an
1520. SSI is not authorized for misconduct and an explanation act of criminal violence aboard
public disclosure and is subject of the issue, including date(s) an aircraft. The program
to handling and safeguarding and time(s). They are also training materials may be
restrictions. asked to provide their name and requested on TSAs website,
contact information for
The TSA SSI Program, the appropriate follow-up. enforcement. The request will
central SSI authority for all of Employees should provide their be sent to the TSA Office of
DHS, develops SSI guidance name even if they choose to Training and Development,
and training materials to assist remain anonymous throughout Training Centers Division.
state and local law enforcement the process. The public may Questions regarding the
partners in the recognition and also report security-related LEOFA training materials may
safeguarding of SSI. The SSI incidents to TCC, and may be sent to
Program also develops SSI request follow up information
policies and procedures, on the status of those reports from an agency email address.
analyzes and reviews records through TCC.
for SSI content, and coordinates To receive this training material
with stakeholders, other TSA Law Enforcement you must:
government agencies and Officer (LEO) Flying Armed Be a full-time law
Congress on SSI-related issues. Training Program. The TSA enforcement officer meeting
Office of Training and the instructor qualification
For more information about SSI Development, Training Centers standards of the agency,
or for assistance in identifying Division is responsible for academy, or department in
SSI, visit oversight of the TSA LEO which you are employed; Flying Armed Training Select/click the Request
industry/sensitive-security- Program, which is mandatory Training Materials tab on
information or contact 571-227- for all law enforcement officers the TSA website and
3513 or flying armed under the Code of requested information will
Federal Regulation 1544.219, be prompted through a
The TSA Contact Center Carriage of Accessible fillable form, then include
(TCC) is responsible for Weapons. The LEO Flying the following: (1) Your
fielding incident reports from Armed training is a 1.5 to 2 name and contact
information (Enter an conducts VIPR operations that jointly with local authorities.
agency email address); (2) promote confidence in and An operation can include
Your departments name protect all modes of Federal Air Marshals,
and address; (3) Your transportation through targeted Transportation Security
supervisors name and deployment of integrated TSA Officers, Behavior Detection
contact information; a (4) assets, coming from TSAs Officers, Transportation
Brief narrative detailing Offices of Law Enforcement Security Inspectors, and
your operational need to fly and Security Operations. Transportation Security
armed; and (5) additional The VIPR Program has a Specialists Specialists-
information for processing nationwide footprint. Applying Explosives. TSAs VIPR teams
purposes. a risk-based planning process, deploy law enforcement and
TSA conducts VIPR operations screening capabilities, including
If you are not a qualified with state and local personnel explosive trace detection and
instructor, please request a on a random, unpredictable Preventative
member of your training staff to basis. VIPR operations are Radiological/Nuclear Detection
contact us by email. For time conducted in all modes of technologies.
sensitive training requests, aviation and surface
please call (855) 359-5367 transportation. Teams may also For more information on TSAs
between the core business hours be deployed to provide VIPR resources, visit
of 8:00 am to 4:00 pm EST. additional law enforcement or or contact your
security presence at OLE/FAMS Supervisory Air
transportation venues during Marshal in Charge (SAC) or
Visible Intermodal Prevention
specific alert periods or in Federal Security Director
and Response (VIPR)
support of special events. (FSD).
Program. Focusing on
deterrence and detection of
The exact makeup of a VIPR
terrorist activities, TSA
operation team is determined


ACAMS Automated Critical Asset Management DSF Deployable Special Forces

System ECSAP Electronic Crimes Special Agent Program
AEL Authorized Equipment List ECTF Electronic Crimes Task Force
AMOC Air and Marine Operations Center EDCT Explosive Detection Canine Team
ANSI American National Standard Institute EDD Explosive Detector Dog
BCOT Building Communities of Trust EDGE Enhanced Dynamic Geo-Social
BCSC National Bulk Cash Smuggling Center Environment
BEST Border Enforcement Security Task Force EMI Emergency Management Institute
BMAP Bomb-making Material Awareness Program EOC Emergency Operations Center
BPA Blanket Purchase Agreement ERO ICE Enforcement and Removal Operations
BSC Biometric Support Center ESS Emergency Sector Services
C3 Cyber Crime Center ESS-CRA Emergency Sector Services-Cyber Risk
CAB Community Awareness Briefing Assessment
CAP Criminal Alien Program EXIS Exercise Information System
CBP U.S. Customs and Border Protection FAA Federal Aviation Administration
CBRNE Chemical, Biological, Radiological, Nuclear FAR Fugitive Alien Removal
and Enhanced Conventional Weapons FBI Federal Bureau of Investigation
CCU Cyber Crimes Unit FCTF Financial Crimes Task Force
CDF Capability Development Framework FDNS Fraud Detection and National Security
CDM Continuous Diagnostics and Mitigation FEDSIM Federal Systems Integration and
CDP Center for Domestic Preparedness Management Center
CEIU Child Exploitation Investigation Unit FEMA Federal Emergency Management Agency
CERT Computer Emergency Response Team FinCEN Financial Crimes Enforcement Network
CFATS Chemical Facility Anti-Terrorism Standards FiRST First Responder Support Tool
CFU Computer Forensics Unit FLETC Federal Law Enforcement Training Centers
CGMIX USCG Maritime Information eXchange FOT Fugitive Operations Teams
CI Critical Infrastructure FOUO For Official Use Only
CIFW Counterintelligence Fundamental Workshop FPS Federal Protective Services
CIPD Counterintelligence Division FRG First Responders Group
CIS Cyber Intelligence Section FRRG First Responder Resource Group
CMaaS Continuous Monitoring as a Service FSCC Federal Sponsored Course Catalog
COE Centers of Excellence FSLTT Federal, State, Local, Tribal, Territorial
COI Community(ies) of Interest FY Fiscal Year
COML Communications Unit Leader GNDA Global Nuclear Detection Architecture
COMT Communications Unit Technician GPD Grant Programs Directorate
COP Common Operating Picture GPS Global Position System
CP Continued Presence GSA General Services Administration
CPAA Cultural Property, Art, and Antiquities HAZMAT Hazardous Materials
CRCL Office for Civil Rights and Civil Liberties HME Homemade Explosives
CRR Cyber Resiliency Review HITRAC Homeland Infrastructure Threat and Risk
CSEP Cybersecurity Evaluation Program Analysis Center
CVE Countering Violent Extremism HSDN Homeland Security Data Network
CVEC Countering Violent Extremism Coordinator HSI ICE Homeland Security Investigations
DARTTS Data Analysis & Research for Trade HSIN Homeland Security Information Network
Transparency Systems I&A Office of Intelligence and Analysis
DBFTF Document and Benefit Fraud Task Force IAB Interagency Board
DEA Drug Enforcement Administration IAD Internal Affairs Division
DHS Department of Homeland Security IAQ Immigration Alien Query
DHS-SPS DHS Single Point of Service IC Intelligence Community
DMV Department of Motor Vehicles IED Improvised Explosive Device
DNDO Domestic Nuclear Detention Office IEEE Institute of Electrical and Electronics
DOE Department of Energy Engineers
DOJ Department of Justice ICE U.S. Immigration and Customs Enforcement
DOS Department of State
ICS-CERT Industrial Control Systems Cyber NCCIC National Cybersecurity and
Emergency Response Team Communications Integration Center
ICTAP OEC Interoperable Communications NCEPP National Cyber Exercise and Planning
Technical Assistance Program Program
IDENT Automated Biometric NCFI National Computer Forensics Institute
Identification System NCSAM National Cybersecurity Awareness Month
IMAGE ICE Mutual Agreement between NCTC National Counterterrorism Center
Government and Employers NECP National Emergency Communications Plan
IMPACT Incident Management Preparedness and NEDCTP National Explosives Detection Canine Team
Coordination Toolkit Program
INTERPOL International Criminal Police Organization NFOP National Fugitive Operations Program
IOC-2 International Organized Crime Intelligence NGI Next Generation Identification
and Operations Center NGO Nongovernmental Organization
IP Intellectual Property NICC National Infrastructure Coordination Center
IPAWS Integrated Public Alert and Warning System NIMS National Incident Management System
IPR Intellectual Property Rights NIMS ICS NIMS Incident Command System
IPR Center National Intellectual Property Rights NIPP National Infrastructure Protection Plan
Coordination Center NIST National Institute of Standards and
I-STEP Intermodal Security Training and Exercise Technology
Program NPPD National Protection and Program Directorate
ISIL Islamic State of Iraq and the Levant NPSBN Nationwide Public Safety Broadband
ITA Intelligence Training Academy Network
JAC Joint Analysis Center NSI Nationwide Suspicious Activity Reporting
JACCIS JAC Collaborative Information System (SAR) Initiative
JACTAWS Joint Counterterrorism Awareness NTAS National Terrorism Advisory System
Workshop Series NTED National Training and Education Division
JVA Joint Vulnerability Assessment NUSTL National Urban Security Technology
LEO Law Enforcement Officer Laboratory
LESC ICE Law Enforcement Support Center OBIM Office of Biometric Identity Management
LEISI Law Enforcement Information Sharing OBP Office of Bombing Prevention
Initiative OCIA Office of Cyber and Infrastructure Analysis
LEIS Service Law Enforcement Information Sharing OCP Office of Community Partnerships
Service OCSTF Operation Community Shield Task Forces
LEMATP Law Enforcement MANPADS Awareness ODLS Online Detainee Locator System
Training Program OEC Office of Emergency Communications
LES Law Enforcement Sensitive OHA Office of Health Affairs
LESC Law Enforcement Support Center OIG Office of Inspector General
LMR Land Mobile Radio OSLLE Office for State and Local Law Enforcement
LMS Learning Management System OSLTC ICE Office of State, Local, and Tribal
MANPADS Man-Portable Air Defense Systems Coordination
MCV Mobile Command Vehicle P25 CAP Project 25 Compliance Assessment Program
MDDP Mobile Detection Deployment Program PED UCSIS Public Engagement Division
MDDU Mobile Detection Deployment Unit PERC Pacific Enforcement Response Center
MISLE Marine Information for Safety and Law PIA Privacy Impact Assessment
Enforcement PII Personally Identifiable Information
MJIEDSP Multi-Jurisdictional Improvised Explosive PLEPU Parole and Law Enforcement Programs Unit
Device Security Planning PM Program Management
MS-ISAC Multi-State Information Sharing Center PPE Personal Protective Equipment
MVA MANPADS Vulnerability Assessments PRIV DHS Office of Privacy
MVABTP MANPADS Vulnerability Assessments PRND Preventative Radiological/Nuclear Detection
Basic Training Program PRD Personal Radiation Detector
NBIC National Biosurveillance Integration Center PSA Protective Security Advisors
NCAS National Cyber Awareness System R&D Research and Development
NCATS National Cybersecurity Assessment and RAAS Report Analysis and Archive System
Technical Services Teams RD Regional Directors
NCC National Coordination Center RFI Request for Information
NCCAD National Counter-IED Capabilities Analysis RKB Response Knowledge Base
Database RIID Radiation Isotope Identification Device

RISS Regional Information Sharing System
R/N Radiological and Nuclear
RTA Responder Technology Alliance
S&T Science and Technology Directorate
SAS Security Assessment Section
SBU Sensitive but Unclassified
SCIP Statewide Communication Interoperability Plan
SEL Standard Equipment List
SEVP Student Exchange Visitor Program
SLT CBP State, Local, Tribal, Liaison
SLTD State, Local, and Tribal Division
SLTT State, local, tribal, and territorial
SPBP Significant Public Benefit Parole
SSI Sensitive Security Information
STC Securing the Cities
SWBCWG Southwest Border Communications Working Grp.
SWIC Statewide Interoperability Coordinator
TA Technical Assistance
TBML Trade-Based Money Laundering
TCC TSA Contact Center
TCO Transnational Criminal Organization
TRIPwire Technical Resource for Incident Prevention
TSA Transportation Security Administration
TTU Trade Transparency Unit
UASI Urban Area Security Initiative
US-CERT U.S. Computer Emergency Readiness Team
USCG U.S. Coast Guard
USCIS U.S. Citizenship and Immigration Services
USSS United States Secret Service
VAP Victims Assistance Program
VAWA Violence Against Women Act
VBIED Vehicle-borne Improvised Explosive Device
VIG Vehicle Inspection Guide
VIPR Visible Intermodal Prevention and Response Program
VQiPS Video Quality in Public Safety
VWP Visa Waiver Program
WMD Weapons of Mass Destruction


# Drug Trafficking 30

287(g) 27 E

A Electronic Crimes 59, 61

Emergency Communications 49, 50, 51, 52
Active Shooter 6, 20, 25, 47, 54 Emergency Management Institute 21, 46
Americas Waterways Watch 14 Emergency Management Training 21
Authorized Equipment List 21, 55, 56, 58 Emergency Operations Center 21
Aviation 12, 16, 23, 63, 65 Emergency Management Planning Guides 20
Enforcement and Removal Operations 27
B Equipment Testing (Radiological and Nuclear) 17
Explosives 25, 37, 38, 39, 45, 57, 65
Biometric 28, 37 Explosive Detection (Canines) 45
Biosurveillance 25, 26 Exercises 18, 19, 22, 43, 50, 62
Blue Campaign 7
Border Community Liaison Program (CBP) 15 F
Border Enforcement Security Task Force (BEST) 29
Bulk Cash Smuggling 30, 33 Federal Emergency Management Agency 20
Federal Law Enforcement Training Centers 24
C Federal Protective Service 45
Financial Crimes 34, 59, 60
Canine 38, 45 55
Carrier Liaison Program (CBP) 15 Flying-Armed Training Program 64
CBP Information Center 15 Forced Labor 31
CBP Laboratory 16 Forensics (Computers) 30, 61
Center for Domestic Preparedness 21 Forensics (Laboratory) 31
Centers of Excellence 53 Forensics (Mobile Devices) 59, 60, 61
Chemical Facility Anti-Terrorism Standards (CFATS) 37 Fugitive Aliens 27, 28
Chemical Security 37 Fusion Centers 9, 13, 21, 33, 35, 36, 37, 44, 49
Child Abduction (International) 16
Citizenship and Immigration Services 9 G
Citizenship and Immigration Services Ombudsman Office
11 Gangs 28, 30, 33
Civil Rights and Civil Liberties (Office of) 11 Grants 15, 21, 23, 24, 52, 55
Coast Guard (United States) 13
Community Awareness Briefing 15 H
Community Partnerships (Office for) 15
Continued Presence 10, 26 Health Affairs (Office of) 25
Continuity of Operations 24 Homeland Security Data Network (HSDN) 36
Counterfeit 59 Homeland Security Information Network (HSIN) 6, 7, 8,
Countering Violent Extremism 6, 12, 15 19, 25, 26, 35, 39, 43, 47, 48
Counterintelligence 35 Homeland Security Investigations (HIS) 29
Counterterrorism 12, 15, 22, 23, 36, 62 Human Trafficking 7, 10, 16, 26
Criminal Alien Program 267
Critical Infrastructure 46, 47, 48, 49 I
Cultural Property, Art, and Antiquities 30 If You See Something, Say Something 8
Customs and Border Protection 15 Immigrant Alien Query 28
Cyber Crimes 30, 31 Immigration and Customs Enforcement 26
Cybersecurity 39, 40, 41, 42, 43, 44, 45 Immigration Document and Benefit Fraud 30
Immigration Services 9, 11, 31
D Improvised Explosive Device 25, 37, 38, 39, 49, 57
Information Technology 21, 42
Department of Motor Vehicle Fraud 32 Infrastructure Protection 46, 47, 48, 49
Detainee Locator (Online) 29 Intellectual Property Rights 16, 33
Domestic Nuclear Detection Office 17 Intelligence and Analysis (Office of) 35

Intelligence Reports (Daily) 35 R
Intermodal Security 62, 65
International Non-Custodial Parental Child Abduction 16 Race (Profiling) 11
International Office (HSI) 32 Radiological Detection 17, 18, 19, 20
International Travel and Trade 17 Retail Security 47
INTERPOL 27, 28, 29, 33, 60
Joint Counterterrorism Awareness Workshop Series 23 S Visa Program 9
SAFECOM 51, 52
L Science and Technology Directorate (S&T) 53
Secret Service 58
Language Identification Pocket Guide 12 Securing the Cities Program 20
Law Enforcement Information Sharing Initiative 28 Sensitive Security Information (Safeguarding) 64
Law Enforcement Support Center 28 Shadow Wolves 34
Limited English Proficiency 11 Stop.Think.Connect 44
Suspicious Activity Reporting 36
M Suspicious Aircraft or Boats 16

Man-Portable Air Defense Systems (MANPADS) 63 T

Maritime Information Exchange 14
Missing and Exploited Children 61 Tip Line 7, 17, 32
Missing or Late International Travelers 16 Title 19 CrossDesignation 31, 34
Mobile Command Vehicles 46 Title VI 11, 12
Money Laundering 30, 33, 34, 60 Training 6, 7, 11, 12, 13, 15, 19, 20, 21, 22, 23, 24, 25, 30,
Most Wanted (ERO) 27 32, 33, 34, 35, 36, 37, 38, 40, 41, 42, 46, 47, 49, 50, 54, 61,
Multi-State Information Sharing and Analysis Center 42 62, 63, 64, 65
Transportation Security Administration 61
N TRIPwire 8, 28, 39
TSA Contact Center 64
National Cybersecurity and Communications Integration T Visa 10
Center (NCCIC) 42, 43
National Exercise Program 22 U
National Incident Management System 19, 24, 49
National Protection and Programs Directorate 37 USCG Sector Command Centers 14
National Terrorism Advisory System 8 USCIS Resources 10
National Training and Education Division (NTED) 22 U Visa 10
Nationwide Suspicious Activity Reporting Initiative 36
Nuclear Detection 17, 18, 19, 20 V

O Vehicle-borne Improvised Explosive Device 38

Victim Assistance 7, 26
Organized Crime 32. 33, 60 Visible Intermodal Prevention and Response (VIPR) Program
P Visa Waiver Program 17
Visas for Victims of Human Trafficking and Other Qualifying
Pacific Enforcement Response Center 29 Crimes 10
Pipelines (Safeguarding) 62
Port of Entry 16 W
Preparedness (Non-Disaster) Grants 24
Privacy 13, 37, 52, 53 War Crimes 31
Privacy Office 52 Workplace Security 47
Probation and Parole 29
Protective Security Advisors 37, 49
Prosecutions (Toolkit) 26