Presented by: Presented by: Ellen Murray & Ellen Murray & Larry E. McLeod, Jr.Larry E. McLeod, Jr.
Conference 2004 Conference 2004 Homeland SecurityHomeland Security
St. Petersburg Beach – August 29th September 2ndSt. Petersburg Beach – August 29th September 2nd
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 22
Department Of Homeland SecurityDepartment Of Homeland Security
The Department of Homeland Security was The Department of Homeland Security was created with one single overriding responsibility: created with one single overriding responsibility: to make America more secure.to make America more secure.
Along with the sweeping transformation within the Along with the sweeping transformation within the FBI, the establishment of the Department of FBI, the establishment of the Department of Defense's U.S. Northern Command, and the Defense's U.S. Northern Command, and the creation of the multi-agency Terrorist Threat creation of the multi-agency Terrorist Threat Integration Center and Terrorist Screening Center, Integration Center and Terrorist Screening Center, America is better prepared to prevent, disrupt, and America is better prepared to prevent, disrupt, and respond to terrorist attacks than ever before. respond to terrorist attacks than ever before.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 33
The USA Patriot ActThe USA Patriot Act
By breaking down unnecessary barriers between By breaking down unnecessary barriers between intelligence and law enforcement officers, the intelligence and law enforcement officers, the PATRIOT Act is helping to ensure that the best PATRIOT Act is helping to ensure that the best available information about terrorist threats is available information about terrorist threats is provided to the people who need it most. provided to the people who need it most.
Permits disclosure of foreign intelligence Permits disclosure of foreign intelligence information to any domestic or law enforcement information to any domestic or law enforcement intelligence operationintelligence operation
Permits foreign intelligence techniques to be used Permits foreign intelligence techniques to be used for criminal justice purposes, and maintains the for criminal justice purposes, and maintains the secrecy of the intelligence apparatus (the Mitchell secrecy of the intelligence apparatus (the Mitchell Doctrine) as wellDoctrine) as well
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 44
Replaces probable cause with a showing of Replaces probable cause with a showing of need for an ongoing terrorism need for an ongoing terrorism investigation, and goes a step further by investigation, and goes a step further by placing a gag order on any person served placing a gag order on any person served with the warrantwith the warrant
This individual can not notify the real This individual can not notify the real target of the investigation, or in any way target of the investigation, or in any way disclose what information law enforcement disclose what information law enforcement was seekingwas seeking
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 55
Government Databases Related to Homeland Government Databases Related to Homeland SecuritySecurity
AFISAFIS - Fingerprint system to identify citizens- Fingerprint system to identify citizens CCDCCD - Consolidated Consular Database; records of non-immigrant visa - Consolidated Consular Database; records of non-immigrant visa
entries and exitsentries and exits CLASSCLASS - Consular Lookout and Support System; program for running - Consular Lookout and Support System; program for running
background checks for visasbackground checks for visas CODIS CODIS - Combined DNA Index System used for solving crimes- Combined DNA Index System used for solving crimes IBISIBIS - Interagency Border Inspection System; immigration program - Interagency Border Inspection System; immigration program
used at ports of entryused at ports of entry IDENTIDENT - Fingerprint system to identify aliens- Fingerprint system to identify aliens JITF-TCJITF-TC - Joint Intelligence Task Force Combating Terrorism; DIA - Joint Intelligence Task Force Combating Terrorism; DIA
database database LEO LEO - Law Enforcement Online; VPN with exclusive interactive - Law Enforcement Online; VPN with exclusive interactive
briefings, alerts, and discussionsbriefings, alerts, and discussions NAILSNAILS - National Automated Immigration Lookout System- National Automated Immigration Lookout System NCICNCIC - Contains criminal justice arrest records, fugitives, stolen - Contains criminal justice arrest records, fugitives, stolen
property, and missing persons and itemsproperty, and missing persons and items NDPIXNDPIX - National Drug Pointer Index, DEA records of common targets - National Drug Pointer Index, DEA records of common targets
in investigationsin investigations
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 66
NIBINNIBIN - National Integrated Ballistics Information Network; unified - National Integrated Ballistics Information Network; unified ATF and FBI database, but mostly ATF ATF and FBI database, but mostly ATF
NDSINDSI - National Spatial Data Infrastructure; geomapping records with - National Spatial Data Infrastructure; geomapping records with meta-data tagsmeta-data tags
NLETSNLETS - National Law Enforcement Telecommunication System; - National Law Enforcement Telecommunication System; interstate license and registration recordsinterstate license and registration records
NSEERS NSEERS - National Security Entry-Exit Registration System- National Security Entry-Exit Registration System SEVISSEVIS - Student Exchange Visitor Information System; monitors - Student Exchange Visitor Information System; monitors
foreign studentsforeign students TECSTECS - Treasury Enforcement Communications System; for suspicious - Treasury Enforcement Communications System; for suspicious
individuals and businessesindividuals and businesses TIPOFFTIPOFF - State Department program which searches for known and - State Department program which searches for known and
suspected terroristssuspected terrorists TIPSTIPS - Terrorist Information and Prevention System; for anonymous - Terrorist Information and Prevention System; for anonymous
tipstips TSC TSC - Terrorist Screening Center; a consolidation of terrorist watch - Terrorist Screening Center; a consolidation of terrorist watch
listslists
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 77
Grants & FundingGrants & Funding
The Federal Government has provided more than The Federal Government has provided more than $13 billion$13 billion to equip and train local officials such to equip and train local officials such as firefighters, police officers, and EMS workersas firefighters, police officers, and EMS workers to respond to terrorism and other emergencies and to respond to terrorism and other emergencies and created a National Incident Management system. created a National Incident Management system.
Over 500,000 responders have been trained in Over 500,000 responders have been trained in weapons of mass destruction awareness and weapons of mass destruction awareness and response since September 11, 2001.response since September 11, 2001.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 88
Since its creation, Homeland Security has provided Since its creation, Homeland Security has provided states and localities with states and localities with over $8.2 billionover $8.2 billion in State in State Homeland Security Grants for the purchase of Homeland Security Grants for the purchase of specialized equipment to enhance the capability of state specialized equipment to enhance the capability of state and local agencies to prevent and respond to incidents and local agencies to prevent and respond to incidents of terrorism involving the use of chemical, biological, of terrorism involving the use of chemical, biological, radiological, nuclear, or explosive (CBRNE) weapons; radiological, nuclear, or explosive (CBRNE) weapons;
For the protection of critical infrastructure and For the protection of critical infrastructure and prevention of terrorist incidents; prevention of terrorist incidents;
For the development, conduct and evaluation of state For the development, conduct and evaluation of state CBRNE exercises and training programs; and CBRNE exercises and training programs; and
For costs associated with updating and implementing For costs associated with updating and implementing each states' Homeland Security Strategy. each states' Homeland Security Strategy.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 99
The Urban Area Security Initiative (UASI) has provided The Urban Area Security Initiative (UASI) has provided a total of a total of $1.4 billion$1.4 billion to address the unique equipment, to address the unique equipment, training, planning and exercise needs of large, high-threat training, planning and exercise needs of large, high-threat urban areas, and to assist them in building an enhanced urban areas, and to assist them in building an enhanced and sustainable capacity to prevent, respond to, and and sustainable capacity to prevent, respond to, and recover from threats or acts of terrorism. recover from threats or acts of terrorism.
By the end of FY 2004, By the end of FY 2004, $2 billion$2 billion will have been will have been distributed to more than 20,000 local fire departments distributed to more than 20,000 local fire departments through the Assistance to Fire Fighters Grant program. through the Assistance to Fire Fighters Grant program. In In FY 2004, $750 million will be awarded to thousands of FY 2004, $750 million will be awarded to thousands of fire departments across America to meet their fire departments across America to meet their preparedness needs. preparedness needs.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1010
What Does This Mean For What Does This Mean For You?You?
Funds can be used to purchase equipment, Funds can be used to purchase equipment, software, and related technology directly related software, and related technology directly related to public safety and homeland security.to public safety and homeland security.
Grant information can be obtained atGrant information can be obtained at www.dhs.gov/grantswww.dhs.gov/grants
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1111
DHS ORGANIZATIONDHS ORGANIZATIONThe Five Major Divisions, or “Directorates”The Five Major Divisions, or “Directorates”
Border and Transportation Security (BTS)Border and Transportation Security (BTS):: BTS is led by BTS is led by Under Secretary Asa Hutchinson, and is responsible for Under Secretary Asa Hutchinson, and is responsible for maintaining the security of our nation's borders and maintaining the security of our nation's borders and transportation systems. The largest of the Directorates, it is transportation systems. The largest of the Directorates, it is home to agencies such as the Transportation Security home to agencies such as the Transportation Security Administration, the former U.S. Customs Service, the border Administration, the former U.S. Customs Service, the border security functions of the former Immigration and security functions of the former Immigration and Naturalization Service, Animal & Plant Health Inspection Naturalization Service, Animal & Plant Health Inspection Service, and the Federal Law Enforcement Training Center.Service, and the Federal Law Enforcement Training Center.
Emergency Preparedness and Response (EPR):Emergency Preparedness and Response (EPR): This This Directorate, which is headed up by Under Secretary Mike Directorate, which is headed up by Under Secretary Mike Brown, ensures that our nation is prepared for, and able to Brown, ensures that our nation is prepared for, and able to recover from, terrorist attacks and natural disasters.recover from, terrorist attacks and natural disasters.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1212
Science and Technology (S&T)Science and Technology (S&T):: Under the direction of Under the direction of Under Secretary Dr. Charles McQueary, this Directorate Under Secretary Dr. Charles McQueary, this Directorate coordinates the Department's efforts in research and coordinates the Department's efforts in research and development, including preparing for and responding to the development, including preparing for and responding to the full range of terrorist threats involving weapons of mass full range of terrorist threats involving weapons of mass destruction.destruction.
Information Analysis and Infrastructure Protection Information Analysis and Infrastructure Protection (IAIP)(IAIP):: IAIP merges the capability to identify and assess a IAIP merges the capability to identify and assess a broad range of intelligence information concerning threats to broad range of intelligence information concerning threats to the homeland under one roof, issue timely warnings, and the homeland under one roof, issue timely warnings, and take appropriate preventive and protective action. take appropriate preventive and protective action.
Under Secretary of ManagementUnder Secretary of Management: The Under Secretary of : The Under Secretary of Management, Janet Hale, is responsible for budget, Management, Janet Hale, is responsible for budget, management and personnel issues in DHS. management and personnel issues in DHS.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1313
How Can CISCO’s Intel System Help Your How Can CISCO’s Intel System Help Your Department?Department?
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1414
Personal InformationPersonal Information
Video CapabilityVideo Capability
All Related All Related Information Information
Accessible On One Accessible On One Screen By TabsScreen By Tabs
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1515
TattoosTattoos
Coded Tattoos are Coded Tattoos are SearchableSearchable
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1616
Appearance InformationAppearance Information
Track Appearance Information – These Fields Are Searchable Track Appearance Information – These Fields Are Searchable through our query builderthrough our query builder
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1717
Premise InformationPremise Information
TRACK INFORMATION ON THE TRACK INFORMATION ON THE METHOD OF OPERATIONMETHOD OF OPERATION
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1818
Alias InformationAlias Information
Multiple Aliases Can Be AddedMultiple Aliases Can Be Added
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 1919
Drug InformationDrug Information
Track Drug Track Drug Seizures and Seizures and Add PhotosAdd Photos
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2020
Gang InformationGang Information
Track Gang affiliation &Track Gang affiliation &
Enter Known Gang MembersEnter Known Gang Members
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2121
Accomplice InformationAccomplice Information
Track Known AccomplicesTrack Known Accomplices
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2222
Vehicle InformationVehicle Information
Track Known Track Known Associated Associated
Vehicles and Vehicles and Attach Vehicle Attach Vehicle
Pictures.Pictures.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2323
Boat InformationBoat Information
Track Known Track Known Vessels and Vessels and Add PhotosAdd Photos
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2424
Aircraft InformationAircraft Information
Track Known Track Known Aircraft and Add Aircraft and Add
PhotosPhotos
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2525
Sources InformationSources Information
Track the accuracy of the Track the accuracy of the informant’s informationinformant’s information
PhotoPhoto
&&
Payment informationPayment information
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2626
Intel’s Query BuilderIntel’s Query Builder
Create Your Own Search CriteriaCreate Your Own Search Criteria Choose Which Files and Fields To Choose Which Files and Fields To
Use For Your SearchUse For Your Search Records Must Match ALL CriteriaRecords Must Match ALL Criteria Create A Report With The ResultsCreate A Report With The Results
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2727
For Each Criteria In Your Search, Choose The For Each Criteria In Your Search, Choose The File You Would Like The Data To Pull FromFile You Would Like The Data To Pull From
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2828
Choose The Field You Would Like The Choose The Field You Would Like The Data To Pull FromData To Pull From
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 2929
Choose The Criteria Relation That The Data Choose The Criteria Relation That The Data Needs To MatchNeeds To Match
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 3030
Enter The Match Criterion. If The Field You Have Enter The Match Criterion. If The Field You Have Chosen Pulls From A Code Table, You May Use The Chosen Pulls From A Code Table, You May Use The
““??” To View And Pick The Codes” To View And Pick The Codes
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 3131
When Finished, Enter Will Drop The Criteria When Finished, Enter Will Drop The Criteria Into The Query Builder BoxInto The Query Builder Box
The user may continue to enter criteria in the same The user may continue to enter criteria in the same manner. Remember that this search will return only manner. Remember that this search will return only
records that match all entered criteria. When finished, records that match all entered criteria. When finished, click “ok”. You may also name and save the search click “ok”. You may also name and save the search
criteria for later use.criteria for later use.
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 3232
The Results Will Show Records Which Match All The Results Will Show Records Which Match All Criteria. Users May Double Click Or Choose The Criteria. Users May Double Click Or Choose The
Entry To View The Physical RecordEntry To View The Physical Record
User’s have the option of creating a report from the User’s have the option of creating a report from the results of the searchresults of the search
CISCO Conference 2004 - Homeland SecurityCISCO Conference 2004 - Homeland Security Page: Page: 3333
Thanks forThanks forAttending!Attending!