By the authority vested in me as President by the Constitution and the laws of the United States of America, including section 361(b) of the Public Health Service Act (42 U.S.C. 264(b)), it is hereby ordered as follows Based upon the recommendation of the Secretary of Health and Human Services, in consultation with the Surgeon General, and for the purpose set forth in section 1 of Executive Order 13295 of April 4, 2003, section 1 of such order is amended by adding at the end thereof the following new subsection: (c) Influenza caused by novel or reemergent influenza viruses that are causing, or have the potential to cause, a pandemic.
Title III of the Foreign Intelligence Surveillance Act Amendments Act of 2008 required the Inspectors General (IGs) of the elements of the Intelligence Community that participated in the President’s Surveillance Program (PSP) to conduct a comprehensive review of the program. The IGs of the Department of Justice, the Department of Defense, the Central Intelligence Agency, the National Security Agency, and the Office of the Director of National Intelligence participated in the review required under the Act. The Act required the IGs to submit a comprehensive report on the review to the Senate Select Committee on Intelligence, the Senate Committee on the Judiciary, the House Permanent Select Committee on Intelligence, and the House Committee on the Judiciary.
The National Cyber Security Division (NCSD) United States Computer Emergency Readiness Team (US-CERT) is a partnership between the Department of Homeland Security (DHS) and the public and private sectors. Established in 2003 to protect the nation’s internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation. The organization interacts with federal agencies, state and local governments, industry professionals, and others to improve information sharing and incident response coordination and to reduce cyber threats and vulnerabilities.
As of Monday, 04 May 09, 698 schools in 33 States were closed due to confirmed and probable cases of H1N1 Flu. The closures impacted over 358,220 students and 20,684 teachers. Centers for Disease Control and Prevention (CDC): Reports 403 confirmed cases of H1N1 Flu in 38 States; 702 probable cases of H1N1 Flu in 41 States and the District of Columbia. Number of deaths remains at 1 (Texas). A state-by-state breakdown is listed in Table 1.
USNORTHCOM has been assigned the Force Protection (FP) mission and AT Program responsibility for the USNORTHCOM AOR. The purpose of the FP mission is to defend, detect, and mitigate against terrorist attacks directed at DoD personnel, infrastructure, resources, and information to ensure DoD’s continued warfighting capability. The scope of this mission extends to all DoD Elements and personnel in the USNORTHCOM AOR, whether assigned or unassigned to USNORTHCOM. While the FP mission supports USNORTHCOM’s primary missions of Homeland Defense (HLD) and Civil Support (CS), it is a separate task assigned in the Unified Command Plan (UCP) (ref. a.) and is executed through a different chain of command from the specified USNORTHCOM missions of HLD and CS. The successful execution of the USNORTHCOM FP mission enables the USNORTHCOM HLD and CS missions, and assures availability of DoD assets in support of other Combatant Command-assigned missions.
Preliminary Results Show Federal Protective Service’s Ability to Protect Federal Facilities Is Hampered By Weaknesses in Its Contract Security Guard Program
FPS does not fully ensure that its contract security guards have the training and certifications required to be deployed to a federal facility. FPS requires that all prospective guards complete about 128 hours of training including 8 hours of x-ray and magnetometer training. However, in one region, FPS has not provided the x-ray or magnetometer training to its 1,500 guards since 2004. Nonetheless, these guards are assigned to posts at federal facilities. X-ray training is critical because guards control access points at facilities. Insufficient x-ray and magnetometer training may have contributed to several incidents where guards were negligent in carrying out their responsibilities. For example, at a level IV facility, an infant in a carrier was sent through an xray machine due to a guard’s negligence. Moreover, GAO found that FPS does not have a fully reliable system for monitoring and verifying guard training and certification requirements. GAO reviewed 663 randomly selected guard records and found that 62 percent of the guards had at least one expired certification including a declaration that guards have not been convicted of domestic violence, which make them ineligible to carry firearms.
This product may contain copyrighted material; authorized use is for national security purposes of the United States Government only. Any reproduction, dissemination, or use is subject to the OSC usage policy and the original copyright.
1.1. Reissues Reference (a) to update policies and guidance on the United States Security Authority for North Atlantic Treaty Organization (NATO) Affairs (USSAN).
1.2. Outlines the method for transmitting NATO security policies within the Department of Defense and assigns responsibilities for maintaining NATO security worldwide.
We have audited the accompanying consolidated statement of financial condition of Maiden Lane LLC (a Special Purpose Vehicle consolidated by the Federal Reserve Bank of New York) and subsidiaries (the “LLC”) as of December 31, 2008, and the related consolidated statements of income and cash flows for the period from March 14, 2008 to December 31, 2008. These financial statements are the responsibility of the LLC’s management. Our responsibility is to express an opinion on these financial statements based on our audit.
This agreement, made as of the 25th day of November, 2008, by and among the Federal Reserve Bank of New York (“FRB-NY”), BlackRock Financial Management, Inc. (the “Manager”) and Maiden Lane III LLC (the “Borrower”), sets forth the terms under which the Manager shall provide investment management services to FRB-NY (the “Agreement”).
Sweeping social and economic changes triggered by more than two decades of reform in China have led to equally sweeping changes in China’s vast, state-controlled media environment, particularly in the quantity and diversity of media sources and the development of the Internet. The Communist Party of China (CPC) not only tolerates much greater diversity in the media, but has strongly encouraged greater efforts to provide media content that resonates with the lives and interests of the population. Despite these changes, however, all pertinent information continues to be filtered through party censors to ensure that it is consistent with official policy. The party exercises especially tight control over the core mainstream media which deliver domestic and international news along with politically sensitive information. These media constitute the main vehicle for conveying the policy preferences and decisions of the central leadership.
Iraq has had two political transitions over the past year, taking steps toward a constitutionally-elected government. Nevertheless, the country faces a violent insurgency that is impeding reconstruction and economic recovery. Immediate challenges are to restore rule of law, establish political legitimacy, and begin to build credible and inclusive institutions. The ability of the Iraqi Transitional Government to include ethnic and religious groups in the political process over the coming months will be important in determining whether a future constitutionally-elected government will improve security and stability, which are preconditions for successful reconstruction.
As of March 27, 2009, Treasury had disbursed $303.4 billion of the $700 billion in TARP funds. Most of the funds (about $199 billion) went to purchase preferred shares of 532 financial institutions under the Capital Purchase Program (CPP)—Treasury’s primary vehicle under TARP for stabilizing financial markets. Treasury has continued to take significant steps to address all of the recommendations from our December 2008 and January 2009 reports. In particular, Treasury has recently expanded the scope of the monthly CPP surveys of the largest institutions to include all institutions participating in the program, which is intended to provide Treasury with information necessary to begin to track the effectiveness of the program. Treasury also continued to make progress in several other areas, including requiring firms participating in certain new programs to show how assistance will expand lending. These requirements will better enable Treasury to determine what institutions plan to do with any capital infusions and to track the resulting lending activity of participating institutions on a regular basis. In addition, we specifically found that though Treasury is now receiving dividends from the investments it has made in CPP and certain other programs, it has not publicly reported these receipts, which totaled almost $2.9 billion through March 20, 2009. We recommended that Treasury could improve transparency pertaining to TARP program activities by reporting publicly the monies, such as dividends, paid to Treasury by TARP participants.
In May 2009, Supreme Court Justice David Souter announced his intention to retire from the Supreme Court. Several weeks later, President Obama nominated Judge Sonia Sotomayor, who currently serves on the U.S. Court of Appeals for the Second Circuit, to fill his seat. To fulfill its constitutional “advice and consent” function, the Senate will consider Judge Sotomayor’s extensive record – compiled from years as a lawyer, prosecutor, district court judge, and appellate court judge – to better understand her legal approaches and judicial philosophy.
This directive is issued pursuant to the authorities and responsibilities of the Director of Central Intelligence under the National Security Act of 1947, as amended, Executive Order 12333, Executive Order 12958, and other applicable authorities to protect intelligence sources, methods, and related information and activities from unauthorized disclosure, ensure programs are developed by the Intelligence Community to protect such information and activities, and to keep the President and Congress fully and currently informed of intelligence activities, including any significant intelligence failure. Applicable provisions cited in DCID 1/1 (19 November 1998) are included by reference. This directive rescinds DCID 3/18P.
Uruguay is currently in the midst of a dual transition. First, there is an economic transition from the 2002 crisis towards a path of equitable and sustainable development, as the economy continues to recover strongly. Second, there is a political transition, as the victory of the Frente Amplio – Encuentro Progresista – Nueva Mayoría coalition in the October 2004 elections marked a new phase in the country’s political history.
The FY03-05 CAS and the FY06-07 ISN were aligned around Nicaragua’s first Poverty Reduction Strategy Paper (PRSP) which was later revised and renamed the National Development Plan in 2005. Although Nicaragua’s core objective to reduce extreme poverty was not achieved to the extent desirable, achievements were made across the program with considerable progress in promoting a stable macroeconomic environment, reducing the fiscal deficit significantly, and lowering external debt to sustainable levels by achieving the HIPC Completion Point and obtaining further debt reduction through the Multilateral Debt Relief Initiative (MDRI). Growth has been modest averaging around 3.2 percent per year since 2002, and exports have doubled. Though the Bank was instrumental in the increase of poverty spending from 9.6 percent of GDP in 2002 to 13.6 percent in 2006, greater expenditure has yet to translate into significant gains in poverty reduction.
Since 2005, GAO has reported that DHS has yet to comprehensively satisfy its key cybersecurity responsibilities, including those related to establishing effective partnerships with the private sector. Shortcomings exist in key areas that are essential for DHS to address in order to fully implement its cybersecurity responsibilities (see table). DHS has since developed and implemented certain capabilities, but still has not fully satisfied aspects of these responsibilities and needs to take further action to enhance the public/private partnerships needed to adequately protect cyber critical infrastructure. GAO has also previously reported on significant security weaknesses in systems supporting two of the department’s programs, one that tracks foreign nationals entering and exiting the United States, and one for matching airline passenger information against terrorist watch-list records. DHS has corrected information security weaknesses for systems supporting the terrorist watch-list, but needs to take additional actions to mitigate vulnerabilities associated with systems tracking foreign nationals.
The Headquarters of the National Security Agency is located on Route 32 just south of the Baltimore/Washington Parkway, on Fort Meade. No formal means of visiting the NSA headquarters exists, but a look at the historic side of code breaking is provided at the neighboring National Cryptologic Museum located north of the headquarters on Route 32.
The President directed a 60-day, comprehensive, “clean-slate” review to assess U.S. policies and structures for cybersecurity. Cybersecurity policy includes strategy, policy, and standards regarding the security of and operations in cyberspace, and encompasses the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure. The scope does not include other information and communications policy unrelated to national security or securing the infrastructure. The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties and privacy communities, State governments, international partners, and the Legislative and Executive Branches. This paper summarizes the review team’s conclusions and outlines the beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future.
Cyberspace and its associated technologies offer unprecedented opportunities to the United States and are vital to our Nation’s security and, by extension, to all aspects of military operations. Yet our increasing dependency on cyberspace, alongside a growing array of cyber threats and vulnerabilities, adds a new element of risk to our national security. To address this risk effectively and to sccure freedom of action in cyberspace, the Department of Defense requires a command that posscsses the required technical capability and remains fbcused on the integration or cyberspace operations. Further, this command must be capable or synchronizing wartIghting effects across the global security environment as well as providing support to civil authorities and intemnational partners.
The Office of the Director of National Intelligence (ODNI) is pleased to provide to Congress its second report pursuant to the Data Mining Reporting Act. The Data Mining Reporting Act requires “the head of each departrnent or agency of the Federal Government” that is engaged in an activity to use or develop “data mining,” as defined by the Act, to report annually on such activities to the Congress.
This product characterizes the risk of the currently circulating new H1N1 influenza virus to U.S. forces. It is written primarily for the use of military commanders, medical officers, and operational planners.
The 11 Star Memo, signed in 2005 By CGs FORSCOM, AMC and TRADOC also addressed this gap with specific recommendations to “Realign CONUS DOIMS from IMA to NETCOM for a more unified support similar to OCONUS; optimize C2 for IT management; provide central oversight for IT resources and support; provide MACOMs single POC; and provide adequate investment in DOIM operations” CSA has specifically directed that “ protecting the Army’s networks is not just G6 or G3 business, but rather it is Cdr’s business at all levels (MSG 161304Z Aug 04). Yet, there is no single commander responsible for security and quality of service ensuring CONUS LWN capabilities are prioritized and available to support warfighting, business, and intelligence domains. And, no one is responsible to represent the Information Needs of the Unit and User through all Operational Phases and ensure access to the global collaborative environment.
Working from the province by province breakdowns of the 2009 and 2005 results, released by the Iranian Ministry of Interior, and from the 2006 census as published by the official Statistical Centre of Iran, the following observations about the official data and the debates surrounding it can be made.