Section 215 is designed to enable the FBI to acquire records that a business has in its possession, as part of an FBI investigation, when those records are relevant to the investigation. Yet the operation of the NSA’s bulk telephone records program bears almost no resemblance to that description. While the Board believes that this program has been conducted in good faith to vigorously pursue the government’s counterterrorism mission and appreciates the government’s efforts to bring the program under the oversight of the FISA court, the Board concludes that Section 215 does not provide an adequate legal basis to support the program. There are four grounds upon which we find that the telephone records program fails to comply with Section 215. First, the telephone records acquired under the program have no connection to any specific FBI investigation at the time of their collection. Second, because the records are collected in bulk — potentially encompassing all telephone calling records across the nation — they cannot be regarded as “relevant” to any FBI investigation as required by the statute without redefining the word relevant in a manner that is circular, unlimited in scope, and out of step with the case law from analogous legal contexts involving the production of records. Third, the program operates by putting telephone companies under an obligation to furnish new calling records on a daily basis as they are generated (instead of turning over records already in their possession) — an approach lacking foundation in the statute and one that is inconsistent with FISA as a whole. Fourth, the statute permits only the FBI to obtain items for use in its investigations; it does not authorize the NSA to collect anything.
A report produced by the National Security Council Study Group headed by Paul Nitze in 1950. NSC-68 is considered to be one of the most significant documents in the history of the U.S. national security apparatus, defining goals, values, and functions of U.S. national security policy throughout the Cold War and beyond. Historian Michael J. Hogan, scholar of U.S. foreign policy and former fellow at the Harry S. Truman Presidential Library, has described the document as the “bible of American national security policy.”
The Hemisphere Project is coordinated from the Los Angeles Clearinghouse and is funded by ONDCP and DEA. Hemisphere provides electronic call detail records (CDRs) in response to federal, state, and local administrative/grand jury subpoenas. The Hemisphere database contains CDRs for any telephone carrier that uses an AT&T switch to process a telephone call. Hemisphere is an unclassified program. Hemisphere provides de-confliction within the Hemisphere database. 4 billion CDRs populate the Hemisphere database on a daily basis.
The Administration is focused on protecting the innovation that drives the American economy and supports jobs in the United States. As a Nation, we create products and services that improve the world’s ability to communicate, to learn, to understand diverse cultures and beliefs, to be mobile, to live better and longer lives, to produce and consume energy efficiently and to secure food, nourishment and safety. Most of the value of this work is intangible—it lies in America’s entrepreneurial spirit, our creativity, ingenuity and insistence on progress and in creating a better life for our communities and for communities around the world. These intangible assets are often captured as intellectual property—copyrights, patents, trademarks and trade secrets, and reflect America’s advantage in the global economy.
Our national security depends on our ability to share the right information, with the right people, at the right time. This information sharing mandate requires sustained and responsible collaboration between Federal, state, local, tribal, territorial, private sector, and foreign partners. Over the last few years, we have successfully streamlined policies and processes, overcome cultural barriers, and better integrated information systems to enable information sharing. Today’s dynamic operating environment, however, challenges us to continue improving information sharing and safeguarding processes and capabilities. While innovation has enhanced our ability to share, increased sharing has created the potential for vulnerabilities requiring strengthened safeguarding practices. The 2012 National Strategy for Information Sharing and Safeguarding provides guidance for effective development, integration, and implementation of policies, processes, standards, and technologies to promote secure and responsible information sharing.
Law enforcement and government officials for decades have understood the critical importance of building relationships, based on trust, with the communities they serve. Partnerships are vital to address a range of challenges and must have as their foundation a genuine commitment on the part of law enforcement and government to address community needs and concerns, including protecting rights and public safety. In our efforts to counter violent extremism, we will rely on existing partnerships that communities have forged with Federal, State, and local government agencies. This reliance, however, must not change the nature or purpose of existing relationships. In many instances, our partnerships and related activities were not created for national security purposes but nonetheless have an indirect impact on countering violent extremism (CVE).
This order directs structural reforms to ensure responsible sharing and safeguarding of classified information on computer networks that shall be consistent with appropriate protections for privacy and civil liberties. Agencies bear the primary responsibility for meeting these twin goals. These structural reforms will ensure coordinated interagency development and reliable implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and minimum standards for sharing classified information both within and outside the Federal Government. These policies and minimum standards will address all agencies that operate or access classified computer networks, all users of classified computer networks (including contractors and others who operate or access classified computer networks controlled by the Federal Government), and all classified information on those networks.
Emails and documents related to the ongoing investigation of the Bureau of Alcohol, Tobacco, Firearms and Explosives’ “Fast and Furious”/Project Gun Runner program leaked to CBS. Includes a map of distribution routes for weapons involved in the program leading to locations throughout Mexico.
Presidential Policy Directive-2 (PPD-2) Implementing National Strategy for Countering Biological Threats
Presidential Policy Directive 2 is one of a number that have not previously been released. It was publicly posted to a collaboration server for U.S. military personnel complete with its National Security Council coversheet intact, providing a rare look at dissemination guidelines utilized in high-level documentation.
Throughout history, violent extremists—individuals who support or commit ideologically-motivated violence to further political goals—have promoted messages of divisiveness and justified the killing of innocents. The United States Constitution recognizes freedom of expression, even for individuals who espouse unpopular or even hateful views. But when individuals or groups choose to further their grievances or ideologies through violence, by engaging in violence themselves or by recruiting and encouraging others to do so, it becomes the collective responsibility of the U.S. Government and the American people to take a stand. In recent history, our country has faced plots by neo-Nazis and other anti-Semitic hate groups, racial supremacists, and international and domestic terrorist groups; and since the September 11 attacks, we have faced an expanded range of plots and attacks in the United States inspired or directed by al-Qa’ida and its affiliates and adherents as well as other violent extremists. Supporters of these groups and their associated ideologies come from different socioeconomic backgrounds, ethnic and religious communities, and areas of the country, making it difficult to predict where violent extremist narratives will resonate. And as history has shown, the prevalence of particular violent extremist ideologies changes over time, and new threats will undoubtedly arise in the future.
Transnational organized crime refers to those self-perpetuating associations of individuals who operate transnationally for the purpose of obtaining power, influence, monetary and/or commercial gains, wholly or in part by illegal means, while protecting their activities through a pattern of corruption and/or violence, or while protecting their illegal activities through a transnational organizational structure and the exploitation of transnational commerce or communication mechanisms. There is no single structure under which transnational organized criminals operate; they vary from hierarchies to clans, networks, and cells, and may evolve to other structures.
In his address to the nation on Libya on March 28, 2011, President Obama presented a comprehensive explanation for why he authorized military action as part of an international coalition to protect the people of Libya and to enforce U.N. Security Council Resolution (UNSCR) 1973. In the intervening weeks and months, coalition efforts have been effective in protecting the Libyan population. The regime has suffered numerous defeats, cities and towns across Libya have been liberated from brutal sieges, strong sanctions are in place, and the regime is encountering serious difficulties raising revenues through oil sales or other means. All these actions and outcomes are consistent with UNSCR 1973.
Digital infrastructure is increasingly the backbone of prosperous economies, vigorous research communities, strong militaries, transparent governments, and free societies. As never before, information technology is fostering transnational dialogue and facilitating the global flow of goods and services. These social and trade links have become indispensable to our daily lives. Critical life-sustaining infrastructures that deliver electricity and water, control air traffic, and support our financial system all depend on networked information systems. Governments are now able to streamline the provision of essential services through eGovernment initiatives. Social and political movements rely on the Internet to enable new and more expansive forms of organization and action. The reach of networked technology is pervasive and global. For all nations, the underlying digital infrastructure is or will soon become a national asset.
A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses. “Our digital infrastructure, therefore, is a strategic national asset, and protecting it—while safeguarding privacy and civil liberties—is a national security priority” and an economic necessity. By addressing threats in this environment, we will help individuals protect themselves in cyberspace and enable both the private sector and government to offer more services online. As a Nation, we are addressing many of the technical and policy shortcomings that have led to insecurity in cyberspace Among these shortcomings is the online authentication of people and devices: the President’s Cyberspace Policy Review established trusted identities as a cornerstone of improved cybersecurity.
A copy of Barack Obama’s long-form birth certificate released April 27, 2011 by the White House.
On June 22, 2010, the U.S. Intellectual Property Enforcement Coordinator (IPEC) issued the Administration’s first Joint Strategic Plan on Intellectual Property Enforcement (Strategy), which was developed in coordination with many Federal agencies, including the Departments of Commerce, Health and Human Services, Homeland Security (DHS), Justice (DOJ), and State, and the U.S. Trade Representative. As part of the Strategy, the Administration undertook to review existing laws to ensure that they were effective and to identify deficiencies that could hinder enforcement. Based on that review, this White Paper identifies specific recommended legislative changes, designed to increase the effectiveness of U.S. enforcement efforts. We will, of course, continue to assess existing legislation and recommend any further changes to the law as the need arises.
Our national defense requires that sensitive information be maintained in confidence to protect our citizens, our democratic institutions, and our homeland. Protecting information critical to our nation’s security is the responsibility of each individual who is granted access to classified information. Any unauthorized disclosure of classified information is a violation of our law and compromises our national security. The recent irresponsible disclosure by WikiLeaks has resulted in significant damage to our national security. Any failure by agencies to safeguard classified information pursuant to relevant laws, including but not limited to Executive Order 13526, Classified National Security Information (December 29, 2009), is unacceptable and will not be tolerated.
The National Security Act of 1947 and title 10 of the United States Code (U.S.C.) provide the basis for the establishment of combatant commands. The Unified Command Plan (UCP) establishes the missions, responsibilities, and geographic areas of responsibility (AORs) for commanders of combatant commands (“combatant commanders”). A “geographic combatant commander” is a commander of a combatant command that includes a geographic AOR. A “functional combatant commander” is a commander of a combatant command with transregional responsibilities. Command of combatant commands will be exercised as provided for herein and as otherwise directed by the Secretary of Defense (the “Secretary”).
This Presidential Report from the National Council on Radiation Protection and Measurements (NCRP) has been prepared at the request of the Food and Drug Administration (FDA). FDA has the responsibility for regulating the manufacture of electronic products that emit ionizing and nonionizing radiation and is working with the Transportation Security Administration (TSA), which has the responsibility of providing security measures for transportation activities. The FDA asked the NCRP for advice on radiation protection issues concerning exposure to ionizing radiation from radiation-producing devices used for non-medical security purposes. These devices, particularly x-ray scanning systems, are being evaluated by various agencies (e.g., U.S. Customs Service and TSA) for use in security screening of humans. The use of such scanning devices involves a broad societal decision that needs to be made through appropriate procedures by the authorities utilizing the x-ray producing electronic products (and other types of ionizing radiation producing systems) as a security device for screening humans. This report provides an evaluation of radiation levels, radiation risk, and radiation protection measures that should be taken into consideration by implementing authorities. However, the NCRP cannot render an opinion of the net benefit of using these devices based on the ionizing radiation aspects alone.
To prevent acts of terrorism on American soil, we must enlist all of our intelligence, law enforcement, and homeland security capabilities. We will continue to integrate and leverage state and major urban area fusion centers that have the capability to share classified information; establish a nationwide framework for reporting suspicious activity; and implement an integrated approach to our counterterrorism information systems to ensure that the analysts, agents, and officers who protect us have access to all relevant intelligence throughout the government. We are improving information sharing and cooperation by linking networks to facilitate Federal, state, and local capabilities to seamlessly exchange messages and information, conduct searches, and collaborate. We are coordinating better with foreign partners to identify, track, limit access to funding, and prevent terrorist travel. Recognizing the inextricable link between domestic and transnational security, we will collaborate bilaterally, regionally, and through international institutions to promote global efforts to prevent terrorist attacks.
Sec. 2. Functions. The Council shall meet at the call of the Secretary of Defense or the Co-Chairs of the Council to exchange views, information, or advice with the Secretary of Defense; the Secretary of Homeland Security; the Assistant to the President for Homeland Security and Counterterrorism; the Assistant to the President for Intergovernmental Affairs and Public Engagement; the Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs; the Commander,United States Northern Command; the Chief, National Guard Bureau; the Commandant of the Coast Guard; and other appropriate officials of the Department of Homeland Security and the Department of Defense, and appropriate officials of other executive departments or agencies as may be designated by the Secretary of Defense or the Secretary of Homeland Security.Such views, information, or advice shall concern:
(a) matters involving the National Guard of the various States;
(b) homeland defense;
(c) civil support;
(d) synchronization and integration of State and Federal military activities in the United States; and
(e) other matters of mutual interest pertaining toNational Guard, homeland defense, and civil support activities.
Abraham, Yohannes A. Employee 40,000.00 Per Annum LEGISLATIVE ASSISTANT AND ASSISTANT TO THE HOUSE LIAISON
Abrams, Adam W. Employee 65,000.00 Per Annum WESTERN REGIONAL COMMUNICATIONS DIRECTOR
Adams, Ian H. Employee 36,000.00 Per Annum EXECUTIVE ASSISTANT TO THE DIRECTOR OF SCHEDULING AND ADVANCE
Agnew, David P. Employee 92,000.00 Per Annum DEPUTY DIRECTOR OF INTERGOVERNMENTAL AFFAIRS
Ahrens, Rebecca A. Employee 42,800.00 Per Annum OPERATOR
By the authority vested in me as President by the Constitution and the laws of the United States of America, including section 361(b) of the Public Health Service Act (42 U.S.C. 264(b)), it is hereby ordered as follows Based upon the recommendation of the Secretary of Health and Human Services, in consultation with the Surgeon General, and for the purpose set forth in section 1 of Executive Order 13295 of April 4, 2003, section 1 of such order is amended by adding at the end thereof the following new subsection: (c) Influenza caused by novel or reemergent influenza viruses that are causing, or have the potential to cause, a pandemic.
The President directed a 60-day, comprehensive, “clean-slate” review to assess U.S. policies and structures for cybersecurity. Cybersecurity policy includes strategy, policy, and standards regarding the security of and operations in cyberspace, and encompasses the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure. The scope does not include other information and communications policy unrelated to national security or securing the infrastructure. The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties and privacy communities, State governments, international partners, and the Legislative and Executive Branches. This paper summarizes the review team’s conclusions and outlines the beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future.