1 / 33

Conference 2004 Homeland Security

Conference 2004 Homeland Security. St. Petersburg Beach – August 29th  September 2nd. Department Of Homeland Security. The Department of Homeland Security was created with one single overriding responsibility: to make America more secure.

floria
Télécharger la présentation

Conference 2004 Homeland Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Conference 2004 Homeland Security St. Petersburg Beach – August 29th  September 2nd

  2. Department Of Homeland Security • The Department of Homeland Security was created with one single overriding responsibility: to make America more secure. • Along with the sweeping transformation within the FBI, the establishment of the Department of Defense's U.S. Northern Command, and the creation of the multi-agency Terrorist Threat Integration Center and Terrorist Screening Center, America is better prepared to prevent, disrupt, and respond to terrorist attacks than ever before. CISCO Conference 2004 - Homeland Security

  3. The USA Patriot Act • By breaking down unnecessary barriers between intelligence and law enforcement officers, the PATRIOT Act is helping to ensure that the best available information about terrorist threats is provided to the people who need it most. • Permits disclosure of foreign intelligence information to any domestic or law enforcement intelligence operation • Permits foreign intelligence techniques to be used for criminal justice purposes, and maintains the secrecy of the intelligence apparatus (the Mitchell Doctrine) as well CISCO Conference 2004 - Homeland Security

  4. Replaces probable cause with a showing of need for an ongoing terrorism investigation, and goes a step further by placing a gag order on any person served with the warrant • This individual can not notify the real target of the investigation, or in any way disclose what information law enforcement was seeking CISCO Conference 2004 - Homeland Security

  5. Government Databases Related to Homeland Security • AFIS- Fingerprint system to identify citizens • CCD- Consolidated Consular Database; records of non-immigrant visa entries and exits • CLASS - Consular Lookout and Support System; program for running background checks for visas • CODIS - Combined DNA Index System used for solving crimes • IBIS- Interagency Border Inspection System; immigration program used at ports of entry • IDENT- Fingerprint system to identify aliens • JITF-TC- Joint Intelligence Task Force Combating Terrorism; DIA database • LEO - Law Enforcement Online; VPN with exclusive interactive briefings, alerts, and discussions • NAILS- National Automated Immigration Lookout System • NCIC- Contains criminal justice arrest records, fugitives, stolen property, and missing persons and items • NDPIX- National Drug Pointer Index, DEA records of common targets in investigations CISCO Conference 2004 - Homeland Security

  6. NIBIN - National Integrated Ballistics Information Network; unified ATF and FBI database, but mostly ATF   • NDSI- National Spatial Data Infrastructure; geomapping records with meta-data tags • NLETS- National Law Enforcement Telecommunication System; interstate license and registration records • NSEERS - National Security Entry-Exit Registration System • SEVIS- Student Exchange Visitor Information System; monitors foreign students • TECS- Treasury Enforcement Communications System; for suspicious individuals and businesses • TIPOFF- State Department program which searches for known and suspected terrorists • TIPS- Terrorist Information and Prevention System; for anonymous tips • TSC - Terrorist Screening Center; a consolidation of terrorist watch lists CISCO Conference 2004 - Homeland Security

  7. Grants & Funding • The Federal Government has provided more than $13 billionto equip and train local officials such as firefighters, police officers, and EMS workers to respond to terrorism and other emergencies and created a National Incident Management system. • Over 500,000 responders have been trained in weapons of mass destruction awareness and response since September 11, 2001. CISCO Conference 2004 - Homeland Security

  8. Since its creation, Homeland Security has provided states and localities with over $8.2 billion in State Homeland Security Grants for the purchase of specialized equipment to enhance the capability of state and local agencies to prevent and respond to incidents of terrorism involving the use of chemical, biological, radiological, nuclear, or explosive (CBRNE) weapons; • For the protection of critical infrastructure and prevention of terrorist incidents; • For the development, conduct and evaluation of state CBRNE exercises and training programs; and • For costs associated with updating and implementing each states' Homeland Security Strategy. CISCO Conference 2004 - Homeland Security

  9. The Urban Area Security Initiative (UASI) has provided a total of $1.4 billion to address the unique equipment, training, planning and exercise needs of large, high-threat urban areas, and to assist them in building an enhanced and sustainable capacity to prevent, respond to, and recover from threats or acts of terrorism. • By the end of FY 2004, $2 billion will have been distributed to more than 20,000 local fire departments through the Assistance to Fire Fighters Grant program. In FY 2004, $750 million will be awarded to thousands of fire departments across America to meet their preparedness needs. CISCO Conference 2004 - Homeland Security

  10. What Does This Mean For You? • Funds can be used to purchase equipment, software, and related technology directly related to public safety and homeland security. • Grant information can be obtained atwww.dhs.gov/grants CISCO Conference 2004 - Homeland Security

  11. DHS ORGANIZATIONThe Five Major Divisions, or “Directorates” • Border and Transportation Security (BTS): BTS is led by Under Secretary Asa Hutchinson, and is responsible for maintaining the security of our nation's borders and transportation systems. The largest of the Directorates, it is home to agencies such as the Transportation Security Administration, the former U.S. Customs Service, the border security functions of the former Immigration and Naturalization Service,  Animal & Plant Health Inspection Service, and the Federal Law Enforcement Training Center. • Emergency Preparedness and Response (EPR): This Directorate, which is headed up by Under Secretary Mike Brown, ensures that our nation is prepared for, and able to recover from, terrorist attacks and natural disasters. CISCO Conference 2004 - Homeland Security

  12. Science and Technology (S&T): Under the direction of Under Secretary Dr. Charles McQueary, this Directorate coordinates the Department's efforts in research and development, including preparing for and responding to the full range of terrorist threats involving weapons of mass destruction. • Information Analysis and Infrastructure Protection (IAIP): IAIP merges the capability to identify and assess a broad range of intelligence information concerning threats to the homeland under one roof, issue timely warnings, and take appropriate preventive and protective action. • Under Secretary of Management:  The Under Secretary of Management, Janet Hale, is responsible for budget, management and personnel issues in DHS.   CISCO Conference 2004 - Homeland Security

  13. How Can CISCO’s Intel System Help Your Department? CISCO Conference 2004 - Homeland Security

  14. Personal Information All Related Information Accessible On One Screen By Tabs Video Capability CISCO Conference 2004 - Homeland Security

  15. Tattoos Coded Tattoos are Searchable CISCO Conference 2004 - Homeland Security

  16. Appearance Information Track Appearance Information – These Fields Are Searchable through our query builder CISCO Conference 2004 - Homeland Security

  17. Premise Information TRACK INFORMATION ON THE METHOD OF OPERATION CISCO Conference 2004 - Homeland Security

  18. Alias Information Multiple Aliases Can Be Added CISCO Conference 2004 - Homeland Security

  19. Drug Information Track Drug Seizures and Add Photos CISCO Conference 2004 - Homeland Security

  20. Gang Information Track Gang affiliation & Enter Known Gang Members CISCO Conference 2004 - Homeland Security

  21. Accomplice Information Track Known Accomplices CISCO Conference 2004 - Homeland Security

  22. Vehicle Information Track Known Associated Vehicles and Attach Vehicle Pictures. CISCO Conference 2004 - Homeland Security

  23. Boat Information Track Known Vessels and Add Photos CISCO Conference 2004 - Homeland Security

  24. Aircraft Information Track Known Aircraft and Add Photos CISCO Conference 2004 - Homeland Security

  25. Sources Information Photo & Payment information Track the accuracy of the informant’s information CISCO Conference 2004 - Homeland Security

  26. Intel’s Query Builder • Create Your Own Search Criteria • Choose Which Files and Fields To Use For Your Search • Records Must Match ALL Criteria • Create A Report With The Results CISCO Conference 2004 - Homeland Security

  27. For Each Criteria In Your Search, Choose The File You Would Like The Data To Pull From CISCO Conference 2004 - Homeland Security

  28. Choose The Field You Would Like The Data To Pull From CISCO Conference 2004 - Homeland Security

  29. Choose The Criteria Relation That The Data Needs To Match CISCO Conference 2004 - Homeland Security

  30. Enter The Match Criterion. If The Field You Have Chosen Pulls From A Code Table, You May Use The “?” To View And Pick The Codes CISCO Conference 2004 - Homeland Security

  31. When Finished, Enter Will Drop The Criteria Into The Query Builder Box The user may continue to enter criteria in the same manner. Remember that this search will return only records that match all entered criteria. When finished, click “ok”. You may also name and save the search criteria for later use. CISCO Conference 2004 - Homeland Security

  32. The Results Will Show Records Which Match All Criteria. Users May Double Click Or Choose The Entry To View The Physical Record User’s have the option of creating a report from the results of the search CISCO Conference 2004 - Homeland Security

  33. Thanks for Attending! CISCO Conference 2004 - Homeland Security

More Related