SlideShare a Scribd company logo
1 of 1560
DEPARTMENT OF HOMELAND SECURITY
PROGRESS IN IMPLEMENTING
9/11 COMMISSION RECOMMENDATIONS
JULY 2010 UPDATE
GUARDING AGAINST TERRORISM AND ENSURING
TRANSPORTATION SECURITY
RECOMMENDATION: Develop a Risk-Based Plan for
Transportation Security
Transportation Sector Security Risk Assessment
In June 2010, the Transportation Security Administration (TSA)
provided to Congress the
Transportation Sector Security Risk Assessment (TSSRA)
report, a nationwide risk assessment that
examines the potential threat, vulnerabilities, and consequences
of a terrorist attack involving the
Nation’s transportation system. This report will inform the
risk-based development and maintenance
of risk mitigation strategies and actions that include the
development of security standards, grants,
programs, countermeasures, and resource allocations.
Freight Railroad Security Risk Assessment
In June 2010, TSA submitted to Congress the Freight Railroad
Security Risk Assessment and
National Strategy report as required by the 9/11 Act. This
report provides the results of a
comprehensive assessment of the risk of a terrorist attack
involving the Nation’s freight railroad
transportation system. The report also includes a national
strategy for railroad transportation.
Threat Assessment of the Risk of Terrorist Attack on the
Nation’s School Bus System
In early 2010, TSA submitted to Congress the Threat
Assessment of the Risk of Terrorist Attack on
the Nation’s School Bus System, as required by the 9/11 Act.
This report was developed in
conjunction with school transportation and school security
leaders nationwide, outlining the threats
and vulnerabilities this system faces and an analysis of
strategies to mitigate risk.
Transportation Security Funding
To support transportation infrastructure and security, the
Department of Homeland Security (DHS)
provided the following resources to state and local jurisdictions
based on risk and threats in Fiscal
Year (FY) 2010 and through the American Recovery and
Reinvestment Act (ARRA):
o $403 million for the Transit Security Grant Program to protect
critical transit infrastructure
from terrorism, including capital projects, such as
improvements to high-risk, high-density
tunnels, stations, and bridges and law enforcement officers at
transit systems across the
country. ($150 million ARRA/ $253 million FY2010 funding)
o $1.76 billion for state-of-the-art in-line explosive detection
systems to streamline checked
baggage screening at airports throughout the U.S. ($734 million
ARRA/ $1.028 billion
FY2010 funding)
o $14.5 million for the Freight Rail Security Grant Program to
protect critical freight rail
systems infrastructure from acts of terrorism resulting from
railroad cars transporting toxic
inhalation hazardous materials.
o $20 million for Intercity Passenger Rail (Amtrak) to protect
critical surface transportation
infrastructure and the traveling public from terrorism within the
Amtrak rail system.
1
Additionally, DHS spent $394 million for the passenger
screening through Advanced Technology X-
Ray machines, Advanced Imaging Technology machines, bottle
liquid scanners, Explosive Trace
Detection machines, and other enhanced threat-detection
equipment. ($266 million ARRA/ $128
million FY2010 funding)
Aviation Security
Fulfilling a key recommendation of the 9/11 Commission
Report, TSA implemented Secure Flight for
100 percent of passengers flying domestically and
internationally on U.S. airlines in June of 2010.
TSA expects all international carriers with direct flights to the
United States to be using Secure Flight
by the end of 2010. Under Secure Flight, TSA prescreens
passengers directly against government
watchlists, a function previously performed by individual air
carriers. In addition to facilitating
secure travel for all passengers, Secure Flight helps prevent the
misidentification of passengers who
have names similar to individuals on government watchlists.
Since the attempted terrorist attack on December 25, 2009,
Secretary Napolitano, in conjunction with
the International Civil Aviation Organization (ICAO), has been
leading a global initiative to
strengthen the international aviation system against the evolving
threats posed by terrorists, working
in multilateral and bilateral contexts with governments as well
as industry. Over the past six months,
Secretary Napolitano has participated in regional aviation
security summits around the world, forging
historic consensus with her international colleagues to
strengthen the civil aviation system through
enhanced information analysis and sharing, cooperation on
technological development and
modernized aviation security standards. These meetings will
culminate in the ICAO Triennial
Assembly in September where DHS expects member states will
affirm new standards, key measures,
and proposals for increasing aviation security worldwide.
Domestically, DHS has bolstered security measures at all of our
airports, by implementing a variety
of security measures to further improve an enhanced, risk-
based, layered approach to security. DHS
and TSA deploy the most effective technologies available to
counter evolving threats, including next
generation Explosive Trace Detection units, Advanced Imaging
Technology, and next generation
Bottled Liquids Scanners. The deployment of over 50,000
trained Transportation Security Officers,
Transportation Security Inspectors, and Behavior Detection
Officers and 730 canine teams in the
transportation sector add additional layers of security to support
the technology at the checkpoints
DHS has also strengthened partnerships across the federal
government, working with the Department
of Justice (DOJ) on a number of initiatives to enhance risk-
based aviation security countermeasures
and collaborating with the Department of Energy (DOE) and its
National Laboratories to leverage
their expertise in building risk-based technology solutions to
key aviation security challenges.
Further, each year, DHS/TSA conducts international aviation
security training for countries around
the world focusing on risk-based security strategies, including
cargo security, screening technologies,
and airport security management, among other topics. TSA has
also successfully negotiated
agreements with various foreign governments permitting
Federal Air Marshal deployments on
international U.S. carrier flights, based on risk.
Additionally, air cargo carried on passenger aircraft has never
been more secure. Currently, 100
percent of identified high risk internatio nal inbound cargo and
100 percent of total cargo on more
than 95 percent of all flights originating from U.S. airports are
now screened. TSA is on track to meet
2
the Congressionally-mandated 100 percent screening
requirement for all air cargo on domestic
passenger aircraft by August 2010.
The FY 2011 DHS budget request strengthens several aviation
security programs by allowing
increased Federal Air Marshal coverage on international flights
and through the deployment of
additional canine teams, Behavior Detection Officers, Explosive
Trace Detection machines and
Advanced Imaging Technology units to increase the
Department’s ability to detect metallic and non-
metallic explosives and other threats at airports across the
country.
Surface Transportation Protection
Recognizing that the risk from terrorism and other hazards for
surface transportation demands a
coordinated approach involving all sector partners and
stakeholders, the Administration initiated a
thorough review of existing U.S. surface transportation security
efforts across all modes of surface
transportation in 2009. The resulting Surface Transportation
Security Priority Assessment, released
on April 2, 2010, identified interagency priorities for the next
four years and provided concrete
recommendations on how to enhance security efforts, maximize
the use of partnerships to optimize
public safety, facilitate commerce and strengthen the resiliency
of our surface transportation system.
DHS has completed risk-based implementation plans for each of
the 20 consensus recommendations
of the Surface Transportation Security Priority Assessment
addressing the potential risks to the
surface transportation system and its four subsectors (mass
transit, highways, freight rail, and
pipelines), and initiatives are underway.
The Baseline Assessment for Security Enhancement (BASE)
program for mass transit provides a
comprehensive assessment of the security programming in
critical transit systems around the country
in order to identify security concerns and drive program
priorities and resource allocations.
Additionally, TSA has many programs designed to bolster
surface transportation security, including
the deployment of Visible Intermodal Prevention and Response
(VIPR) Teams, comprised of Federal
Air Marshals, surface/aviation transportation security
inspectors, Behavioral Detection Officers,
Transportation Security Officers, local law enforcement and
security personnel, and canine teams,
which enhance the protection of surface transportation, provide
deterrent and detection capabilities,
and introduce an element of unpredictability in security
practices and procedures in order to prevent
or disrupt potential terrorist planning activities.
Maritime Transportation Security
In January 2010, Customs and Border Protection (CBP) began
enforcement of the Importer Security
Filing and Additional Carrier Requirements interim final rule—
also known as the “10 + 2 rule”—
increasing the scope and accuracy of information gathered on
shipments of cargo arriving by sea into
the United States and bolstering DHS' layered enforcement
strategy to protect against terrorism and
other crimes at U.S. ports of entry.
In FY 2010, DHS provided $288 million in grants for the Port
Security Grant Program—awarded
based on risk—to protect critical port infrastructure from
terrorism, enhance maritime domain
awareness and risk management capabilities, and support the
implementation of the Transportation
Worker Identification Credential, and an additional $150
million in Recovery Act funding.
3
The United States Coast Guard (USCG) has many risk-based
initiatives in place that strengthen
maritime transportation security. For example, Operation
Neptune Shield, which includes waterborne
and aerial patrols as well as armed escorts of hazardous cargos
and passenger vessels, helps to reduce
the risk of terrorism to the maritime transportation system,
critical infrastructure and key resources.
The USCG also has developed Advanced Interdiction
capabilities in order to interdict identified
threats, including chemical, biological, radiological, nuclear,
and explosives threats, before they reach
the United States. The USCG conducts intelligence-informed,
risk-based Security Boardings to verify
the identity of crew members and to ascertain if a vessel poses a
threat to the port and whether it
should be permitted or denied entry.
The USCG also utilizes the Maritime Security Risk Analysis
Model, known as MSRAM, to assess
threat, vulnerability, and consequence factors for various
potential terrorist attack scenarios. This
information allows for increased efficiency in the allocation of
maritime security resources to reduce
security risks at a port. Finally, the USCG’s International Port
Security Program (PSP) assesses the
effectiveness of anti-terrorism measures in foreign ports that
conduct maritime trade with the United
States and assists in measuring the risk posed by vessels who
have visited international ports prior to
coming to the United States.
RECOMMENDATION: Improve airline passenger pre-screening
New, More Flexible Screening Measures
On April 8, 2010, DHS began implementing new enhanced
security measures for all air carriers with
international flights to the United States to strengthen the safety
and security of all passengers. These
new measures, which cover 100 percent of passengers traveling
by air to the United States, utilize
real-time, threat-based intelligence along with multiple layers
of security, both seen and unseen, to
more effectively mitigate evolving terrorist threats.
Secure Flight
Fulfilling a key 9/11 Commission recommendation, in June
2010, TSA implemented Secure Flight
for 100 percent of passengers flying domestically and
internationally on U.S. airlines, meaning that
TSA, not the air carriers, vets passengers against government
watchlists using passenger name, date
of birth, and gender before a boarding pass is issued. This
accounts for over 90 percent of all travel
to, from, and within the United States. TSA expects to convert
all international carriers to Secure
Flight by December 2010.
Identifying High-Risk Travelers
To identify high-risk travelers and facilitate legitimate travel,
DHS requires airlines flying to the
United States from foreign countries to provide Advance
Passenger Information (API), which
includes basic information such as name, date of birth,
citizenship/nationality and passport number,
and Passenger Name Records (PNR), which includes the
information that travelers provide to airlines
when booking their flights, such as itinerary, address, and
check-in information.
DHS analysis of passenger data played a critical role in the
recent counterterrorism cases against
Najibullah Zazi, who pled guilty to plotting to bomb New York
subways, David Headley, who pled
guilty for his role in the 2008 Mumbai terrorist attacks, and
Times Square bombing suspect Faisal
Shahzad.
4
Trusted Traveler Programs
In order to facilitate legitimate travel and effectively deploy
screening and security resources, CBP
has vetted and enrolled over 780,000 travelers from over 100
countries in four Trusted Traveler
Programs: NEXUS, the Secure Electronic Network for Travelers
Rapid Inspection (SENTRI), the
Free and Secure Trade (FAST) program, and Global Entry.
These programs expedite travel for
members who voluntarily apply, provide biometric
identification, pass extensive vetting, pay a fee,
and provide comprehensive data to CBP for rigorous security
threat assessment checks.
Pre-clearance Agreements
DHS has five pre-clearance agreements (with Aruba, Bahamas,
Bermuda, Canada and Ireland),
allowing DHS to screen travelers before takeoff through the
same process a traveler would undergo
upon arrival at a U.S. port of entry to better target and prevent
threats while streamlining legitimate
travel. The preclearance agreements with Aruba, Bermuda and
Ireland have been expanded to apply
to private aircraft traveling directly to the U.S.
Immigration Advisory Program
DHS has also implemented 9 Immigration Advisory Program
(IAP) arrangements in 7 countries,
which enable CBP officers posted at foreign airports to use
advanced targeting and passenger analysis
information to identify high-risk travelers at foreign airports
before they board U.S.-bound flights. In
2010, DHS signed agreements to establish similar programs at
Mexico City International Airport and
Paris/de Gaulle International Airport.
RECOMMENDATION: Improve airline passenger explosive
screening
TSA continually assesses intelligence and develops
countermeasures to enhance its multiple layers of
security at airports and onboard aircraft in order to anticipate
and mitigate the constantly evolving
threats to aviation security. TSA has deployed more than 50,000
Transportation Security Officers,
Transportation Security Inspectors, and Behavior Detection
Officers across the U.S. and all officers
receive extensive advanced explosive training. TSA has also
deployed explosive detection
technology, including Advanced Technology X-Ray Machines
(which enhance the detection
capabilities of carry-on bag screening), next-generation
Explosives Trace Detection Machines (which
improve explosives detection capabilities at airports) and
Advanced Imaging Technology Machines
(which allow for increased detection of both metallic and non-
metallic threats) to airports across the
country to detect potential threats.
As noted above, the Recovery Act provided $266 million, the
FY2010 budget provided $128.7
million, and the President’s FY2011 budget request included
$769 million for passenger screening
technologies.
RECOMMENDATION: Improve checked bag and cargo
screening
Checked Baggage
TSA screens 100 percent of all checked and carry-on baggage
for explosives. As noted above, the
Recovery Act provided $734 million and the FY2010 budget
provided $1.028 billion in funding for
new, state-of-the-art in-line explosives detection systems and
other technology to streamline checked
5
baggage screening at airports throughout the U.S. and hundreds
of next generation explosives trace
detection units.
Cargo Screening
Air cargo on passenger aircraft has never been more secure.
Currently, 100 percent of identified high
risk international inbound cargo and 100 percent of total cargo
on more than 95 percent of all flights
originating from U.S. airports are now being screened.
TSA is on track to meet the Congressionally-mandated 100
percent screening requirement for all air
cargo on domestic passenger aircraft by August 2010. Effective
May 1, 2010, 75 percent of cargo on
passenger aircraft departing from U.S. locations are screened
under TSA security programs, largely
through the Certified Cargo Screening Program, which permits
entities who have undergone rigorous
inspection and certification processes throughout the air cargo
supply chain to screen cargo.
Currently, there are over 1.5 million shippers in TSA’s Known
Shipper Management System that that
have been certified as meeting specific security standards.
Port Security
CBP has deployed Radiation Portal Monitors and other radiation
detection technologies to seaports,
land border ports, and mail facilities around the world. These
systems scan 100 percent of all
containerized cargo arriving in the U.S., including 100 percent
of vehicles arriving through our
southern border ports, over 99 percent of arriving sea
containers, 100 percent of trucks and 100
percent of personal vehicles arriving at our northern border
ports.
DHS has also implemented the Secure Freight Initiative to scan
U.S.-bound maritime containers for
nuclear material overseas and the Container Security Initiative
to ensure that all U.S.-bound maritime
containers that pose a potential risk are identified and inspected
before they are placed on vessels
destined for the U.S.
Canine Teams
Canine teams are an integral part of DHS’s layered approach to
baggage and cargo security and are
deployed by TSA, CBP and USCG in their respective
environments. CBP deploys canine detection
teams at and between ports of entry, expediting inspections
along the border to combat terrorist
threats and interrupt the illegal smuggling of drugs, currency,
firearms, humans, and agricultural
products. TSA deploys canine teams to screen air cargo at the
nation’s highest cargo volume airports
and provide explosives detection capabilities in the aviation,
mass transit, and maritime transportation
sectors. Finally, USCG deploys canine explosive detection
teams to strategic U.S. ports to enhance
security throughout the maritime transportation sector. The
Recovery Act provided $150 million for
the Transportation Security Grant Program, of which $78
million is being used by transit agencies to
hire new law enforcement officers and by police departments
with dedicated transit bureaus to hire
anti-terrorism personnel, purchase anti-terrorism equipment,
and obtain and train explosive detection
canines.
Nuclear Detection
DHS’s Domestic Nuclear Detection Office (DNDO) works to
improve the Nation’s capability to
detect and report unauthorized attempts to import, develop, or
transport nuclear or radiological
material for use against the U.S. DNDO has worked with intra-
and inter-agency partners to develop
strategies for improving the probability of detecting and
interdicting radiological and nuclear
threats. Since its inception, DNDO has launched more than 250
research and development projects
6
with National Laboratory, academic, and industrial partners,
aimed at advancing detection
technologies. DNDO has also made radiological and nuclear
detection training available to over
15,000 state and local officers and first responders. In order to
meet the challenge of the global
helium 3 shortage, DNDO is aggressively bringing alternative
technologies for helium 3 from
concept to product through a rapid acquisition process,
expediting new and innovative detection
technology.
DNDO works across DHS to develop nuclear detection
capabilities throughout the transportation
sectors. TSA’s VIPR Program is currently working in
conjunction with DNDO and DOE and has the
capability to deploy preventative radiological and nuclear
detection equipment to the field. CBP has
deployed hundreds of Radiation Portal Monitors to ports of
entry, airports and seaports to screen cars,
trucks, and other conveyances for the presence of radioactive
and nuclear materials. Finally, all
USCG teams are now equipped with radiation detection
capabilities, including USCG personnel
specifically trained to board and search vessels.
In March 2010, DHS renewed a Project Arrangement
“Concerning the Detection of Illicit Movement
of Radiological and Nuclear Materials” with the U.K. to address
information and data sharing
between the countries in the development of radiation and
nuclear detection equipment and
technology.
RECOMMENDATION: Vigorously track and disrupt terrorist
financing
Disrupting terrorist financing is one of a number of tools that
the U.S. Government employs to
counter terrorism. The Secret Service has expanded its
Electronic Crimes Task Force (ECTF)
program across the country and internationally, with its first
international ECTF in Rome, Italy. These
task forces are designed to prevent, detect, and investigate
various forms of electronic crimes,
including potential terrorist attacks against critical
infrastructure and financial payment systems.
Additionally, the Secret Service has Special Agents assigned to
all Joint Terrorism Task Forces
around the country. These locally-based facilities partner
federal, state and local law enforcement and
intelligence agencies to target and prevent terrorist activities.
Furthermore, Immigration and Customs Enforcement (ICE) has
a lead role in combating bulk cash
smuggling, a common strategy used by criminals seeking to
move illicit proceeds across transnational
borders. ICE’s Operation Firewall, a bulk-cash smuggling
initiative that intercepts currency
smuggling en route to the border, has led to more than hundreds
of arrests and the seizure of more
than $316 million, including $116 million seized overseas. ICE
has provided outreach and training on
the interdiction and investigation of bulk currency violations to
more than 2,500 law enforcement,
financial, and government officials in more than 85 countries .
ICE also developed the Cornerstone Initiative to detect and
close gaps within U.S. financial, trade,
and transportation sectors that can be exploited by criminal
networks, and ICE’s Trade Transparency
Units target money laundering and illegal trade transactions.
These Trade Transparency Units have
launched over 600 trade-based money laundering investigations,
seizing more than $180 million
since 2004.
7
SECURING OUR BORDERS
RECOMMENDATION: Standardize secure identification
DHS strongly supports national standards for identification
documents to strengthen security while
enhancing privacy safeguards. Over the past several years, DHS
has taken numerous steps to
implement this recommendation to help prevent terrorism,
reduce fraud, and improve the reliability
and accuracy of personal identification documents.
Western Hemisphere Travel Initiative (WHTI)
In June 2009, DHS successfully implemented the Western
Hemisphere Travel Initiative (WHTI) for
land and sea travel to the U.S., increasing border security while
facilitating legitimate travel and trade
by requiring that U.S. and Canadian citizens present a passport
or other secure travel document that
denotes identity and citizenship when crossing the border.
In response to WHTI, CBP is working with tribes across the
country on the development of Enhanced
Tribal Cards (ETC)—WHTI compliant documents that formally
recognize tribal membership and
U.S./Canadian citizenship for the purpose of border crossing.
To date, CBP has signed Memorandum
of Agreements for the development of ETCs with the Kootenai
Tribe of Idaho, the Pascua Yaqui of
Arizona, the Tohono O’Odham of Arizona, the Seneca Nation of
New York, and the Coquille of
Idaho, and is working with additional tribes on the ETC
initiative.
Drivers License Security
Under DHS’s Driver’s License Grant Security Grant Program,
states have made substantial progress
in improving the security and integrity of their driver’s licenses
and issuance processes. Over the past
3 years, this program has provided $176.4 million to states to
assist with implementing these security
procedures.
DHS continues to work with states and territories, congressional
allies, and the National Governors
Association to enhance the security of driver’s licenses while
reforming and resolving many of the
concerns in the REAL ID Act through legislation.
Transportation Worker Identity Credential (TWIC) Program
DHS has enrolled over 1.6 million port workers and merchant
mariners in the Transportati on Worker
Identity Credential (TWIC) program, a tamper-resistant
biometric credential issued to those who
require unescorted access to secure areas of ports and vessels.
Citizenship and Immigration Documents
In May 2010, U.S. Citizenship and Immigrati on Services
(USCIS) launched a new card
personalization system with state-of-the-art technology that
enhances the verification and sharing of
electronic records. USCIS redesigned all of its secure identity
documents to comport with the latest
DHS and International Civil Aviation Organization (ICAO)
standards, as well as best practices in
industry and government.
The new Permanent Resident Card (“green card”) includes a
radio frequency identification tag that
allows CBP to quickly access the electronic records of travelers
seeking to enter the United States and
includes new security features that reduce the risks of
counterfeiting, tampering, and fraud.
Additionally, USCIS updated the Employment Authorization
Document by adding a machine-
8
readable zone that for the first time allows USCIS to share data
through these work authorization
cards with CBP and U.S. Visitor and Immigrant Status Indicator
Technology (US-VISIT).
RECOMMENDATION: Integrate border security into larger
network of screening points that
includes the transportation system and access to vital facilities
Biometric Entry-Exit Screening System
The US-VISIT biometric identity and verification process
collects digital fingerprints and a
photograph from international travelers at U.S. visa-issuing post
and ports of entry to help
immigration officers determine whether a person is eligible to
receive a visa or enter the United
States. US-VISIT also supports the Department’s ability to
identify international travelers who have
remained in the United States beyond their period of admission.
To date, DHS has achieved ten-
fingerprint collection at entry for 98 percent of inbound
travelers.
Visa Waiver Program and Lost and Stolen Passport Screening
The Visa Waiver Program (VWP) enables nationals of 36
participating countries to travel to the
United States for tourism or business for stays of 90 days or
less without obtaining a visa. DHS
implemented the Electronic System for Travel Authorization
(ESTA) to screen VWP applicants prior
to travel to the United States and, as a result, has virtually
eliminated the paper arrival/departure form
(Form I-94W) for authorized travelers from nations
participating in the VWP.
DHS—in cooperation with the Departments of State and
Justice—has made substantial progress in
bringing VWP countries into compliance with the information
sharing requirements of the 9/11 Act.
The 9/11 Act requires VWP countries to enter into an agreement
with the United States to report lost
and stolen passport data to the United States so that it can be
screened against INTERPOL’s Stolen
and Lost Travel Document database, which contains the lost and
stolen passport records of more than
120 countries. To date, 32 of the 36 VWP countries have
reached such agreements.
In addition, DHS, in collaboration with the Departments of
Justice and State, has signed Preventing
and Combating Serious Crime (PCSC) Agreements with 14
VWP countries to share information to
better identify known terrorists and criminals during
investigations and other law enforcement
activities.
Visa Security Program (VSP)
DHS is expanding the Visa Security Program (VSP) to U.S.
Embassies and Consulates identified by
the Departments of State and Homeland Security as having the
highest risk from a terrorism
perspective, subject to appropriations and Departmental
approval. DHS provides expert advice and
training to consular officers regarding specific security threats
relating to the adjudication of
individual visa applications; reviews applications; and conducts
investigations with respect to
consular matters under the jurisdiction of DHS.
Southwest Border
Southwest Border Initiative
In March 2009, the Obama Administration announced the
Southwest Border Initiative—a series of
unprecedented steps to crack down on Mexican drug cartels by
deploying additional personnel and
9
technology, increasing information sharing, working closely
with the Mexican government, and
improving federal coordination with state, local and tribal law
enforcement authorities.
Over the past sixteen months, DHS has dedicated unprecedented
personnel, technology, and
resources to the Southwest border. Today, the Border Patrol is
better staffed than at any time in its
85-year history, having nearly doubled the number of agents
from approximately 10,000 in 2004 to
more than 20,000 today. Since March 2009, DHS has doubled
the number of personnel assigned to
Border Enforcement Security Task Forces; tripled the number of
ICE intelligence analysts working
along the U.S.-Mexico border; quadrupled deployments of
Border Liaison Officers; and begun
screening 100 percent of southbound rail shipments for illegal
weapons, drugs, and cash – for the first
time ever. DHS has also deployed additional canine teams
trained to detect drugs and weapons and
non-intrusive inspection technology that help identify anomalies
in passenger vehicles at the
Southwest Border.
CBP has also worked closely with the Federal Aviation
Administration (FAA) to obtain Certificates
of Authorization (COA) to operate Unmanned Aerial Systems
(UAS), extending surveillance
capability to personnel on the ground. The latest COA approvals
have increased the miles of airspace
available for UAS operations above Texas, enabling CBP to
deploy its unmanned aircraft from the
eastern tip of California, across the land borders of Arizona,
New Mexico, and Texas, and into the
maritime border just short of the Texas and Louisiana border.
These initiatives and investments have yielded impressive
results. Seizures of contraband along the
Southwest border have increased across the board and illegal
crossings continue to decline. In 2009,
DHS seized over $39.2 million in southbound illegal currency—
an increase of more than $29.4
million compared to 2008. In total, DHS seized more than $103
million, 1.7 million kilograms of
drugs, and 1,400 firearms in 2009—an increase of more than
$47 million, 450,000 kilograms of
drugs, and 300 firearms, respectively, compared to 2008.
Additionally, overall apprehensions of
illegal aliens decreased from 723,825 in FY2008 to 556,041 in
FY2009, a 23 percent reduction,
indicating that fewer people are attempting to illegally cross the
border.
To continue to bolster these efforts, President Obama recently
requested $600 million in supplemental
funds for enhanced border protection and law enforcement
activities, and announced the deployment
of up to 1,200 National Guard Troops to the Southwest border
to contribute additional capabilities
and capacity to assist law enforcement agencies.
Interagency Efforts
In June 2009, the Obama Administration released its Southwest
Border Counternarcotics Strategy,
which provides the Administration’s overarching framework to
address the threats posed by the illicit
narcotics trade along the Southwest border. DHS has also
forged historic agreements with DOJ,
increasing coordination between ICE and the Bureau of
Alcohol, Tobacco, Firearms and Explosives
(ATF) and the Drug Enforcement Administration (DEA) on
important Southwest border issues such
as combating arms trafficking, bolstering information sharing
and providing ICE agents the authority
to work on important drug trafficking cases.
DHS and the Office of National Drug Control Policy (ONDCP)
are also partnering to develop and
implement Project Roadrunner, an integrated license plate
reader recognition system which will target
both north- and southbound drug trafficking and associated
illegal activity along the Southwest
10
border. Under this partnership, ONDCP will provide DHS with
previously-purchased fixed and
mobile cameras—expanding DHS’ existing capabilities at
minimal cost.
Collaboration with State and Local Law Enforcement
The federal government has worked closely with state and local
law enforcement along the border—
leveraging the resources and capabilities of over 50 law
enforcement agencies to crack down on
transnational criminal organizations.
DHS has increased the funding state and local law enforcement
can use to combat border-related
crime through Operation Stonegarden—a DHS grant program
designed to support state, local, and
tribal law enforcement efforts along the border. Based on risk,
cross-border traffic and border-related
threat intelligence, nearly 83 percent of 2009 and 2010
Operation Stonegarden funding went to
Southwest border states.
DHS is also forging a new partnership with major law
enforcement associations to create the
“Southwest Border Law Enforcement Compact”—designed to
boost law enforcement at the border
by enabling non-border state and local law enforcement
agencies to detail officers to Southwest
border state and local law enforcement agencies to focus on
criminal networks operating along the
border.
Further, ICE is expanding the Joint Criminal Alien Removal
Task Forces, comprised of ICE officers
and local law enforcement agents who work together to identify
and arrest convicted criminal aliens
and deploying additional officers to work with state and local
jails that are within 100 miles of the
Southwest border to ensure the identification of all removable
convicted criminal aliens who pose a
danger to public safety.
Additionally, DHS is strengthening the analytic capability of
fusion centers across the Southwest
border to receive and share threat information, and is working
with DOJ to create a new system that
will link the information systems of all state, local and tribal
law enforcement entities operating along
the Southwest border, as appropriate, with federal law
enforcement.
Finally, DHS is establishing a suspicious activities reporting
program for the Southwest border. This
will help local law enforcement officers on the front lines
recognize and track incidents related to
criminal activity by drug traffickers, integrate disparate
information from across the border to identify
trends and utilize this information for targeted law enforcement
operations on both sides of the
border.
Increased Cooperation with Mexico
Reflecting their unprecedented collaboration, Secretary
Napolitano and her Mexican counterparts
have signed numerous bilateral agreements and declarations to
bolster cooperation in the areas of
enforcement, planning, information and intelligence sharing,
joint operations and trade facilitation
along the Southwest border.
For the first time in history, U.S. Border Patrol agents are
coordinating joint operations along the
Southwest border with Mexican Federal Police, and working
together to prosecute human trafficking
cases. In addition, the Department is increasing joint training
programs with Mexican law
enforcement agencies—focusing on money laundering and
human trafficking investigations. ICE will
11
begin training Mexican customs investigators in August 2010,
enabling Mexican Customs to support
ICE investigations.
To increase information sharing, the United States and Mexico
are establishing a new cross-border
communications network, which will improve incident response
and coordination among
participating federal, state, local, and tribal law enforcement
and public safety personnel along the
border. Additionally, ICE and the Government of Mexico have
entered into a Criminal History
Information Sharing Agreement in which ICE provides serious
felony conviction information on
Mexican nationals being repatriated to Mexico.
In October 2009, ICE launched the Illegal Drug Program in
Nogales, Arizona to refer narcotics
smuggling cases declined for prosecution in the United States to
the Mexican Office of the Attorney
General for prosecution. In April 2010, ICE expanded this
program to El Paso, Texas. DHS is
expanding the program to four additional Southwest border
ports of entry—for a total of six
locations.
In order to help define and ultimately disrupt the movement of
criminal proceeds from the United
States to Mexico, the Office of Counternarcotics Enforcement,
ICE, and the Government of Mexico
for the first time ever collaborated in April 2009 on the Bi -
National Criminal Proceeds Study, which
describes the criminal proceeds supply chain and quantifies
important indicators of this illegal
financial network.
Northern Border and Increased Cooperation with Canada
DHS has made critical security improvements along the
Northern border, investing in additional
Border Patrol agents, technology, and infrastructure. By the end
of 2010, DHS will have more than
2,200 agents on the Northern border, a 700 percent increase
since 9/11. DHS is also deploying
technology, including thermal camera systems, Mobile
Surveillance Systems, and a Remote Video
Surveillance System, to the Northern border, and is using
Recovery Act funds to modernize 29 CBP-
owned land ports of entry along the Northern border to meet the
security and operational standards of
our post-9/11 world.
In May 2009, Secretary Napolitano signed the Shiprider
Agreement with Canada to make joint law
enforcement teams permanent along the international maritime
border. In November 2009, Secretary
Napolitano and Public Safety Canada Minister Peter Van Loan
agreed on a series of initiatives to
combat common threats, including measures to streamline
border shipping, assist one another during
emergencies, and recognize NEXUS and FAST trusted traveler
program cards at all land and sea
border ports of entry. Additionally, investigators and
intelligence analysts from DHS, the Canada
Border Services Agency, and the Royal Canadian Mounted
Police share information and analysis
through Integrated Border Enforcement Teams and Border
Enforcement Security Teams along the
border.
In July 2010, Secretary Napolitano and Canadian Minister of
Public Safety Vic Toews announced the
first-ever U.S.-Canada Joint Critical Infrastructure Action Plan,
enabling both countries to more
effectively address a range of cross border critical infrastructure
issues and work together to share
information, identify interdependencies and conduct exercises.
They also announced the ICE, CBP,
and Canada Border Services Agency currency seizure
Memorandum of Understanding, which will
help law enforcement officials and border services officers
better identify potential threats and assist
in money-laundering and terrorist-financing investigations and
prosecutions. They also announced a
12
joint border threat and risk assessment to ensure a common
understanding of the threats and
challenges, which will enable a coordinated approach to
addressing them.
STRENGTHENING PREPAREDNESS EFFORTS
RECOMMENDATION: Allocate homeland security funds based
on risk
DHS uses risk-based methodology to identify areas eligible for
homeland security grants, accounting
for threats, population, economic output, and prevalence of
critical infrastructure. In FY2010, DHS
awarded the following security grants to assist state, local, and
tribal governments and the private
sector in strengthening preparedness for acts of terrorism, major
disasters, and other emergencies
based on risk:
o $842 million for the State Homeland Security Program to
build and strengthen
preparedness capabilities at all levels through planning,
equipment, and readiness.
o $832 million for the Urban Areas Security Initiative to
enhance urban preparedness
capabilities in 64 high-threat, high-density areas, with the seven
highest risk areas (Tier 1)
receiving 61 percent of available funds.
o $541 million and an additional $300 million in Recovery Act
funds for Port and Transit
Security Grant Programs to create a sustainable, risk-based
effort to protect critical
infrastructure from terrorism.
o $48 million for the Interoperable Emergency Communications
Grant Program for
planning, training, exercises and equipment to states, territories,
and local and tribal
governments to carry out initiatives identified in Statewide
Communication
Interoperability Plans.
o $60 million for the Operation Stonegarden Grant Program to
enhance law enforcement
preparedness and operational readiness along the border. Based
on risk, cross-border
traffic and border-related threat intelligence, nearly 80 percent
of the funding went to the
Southwest border states.
In addition to these grant programs, the Science and Technology
Directorate published the 2010
Bioterrorism Risk Assessment (classified) in January of 2010 to
inform all federal decision-making
about resource allocation and risk manage ment regarding
homeland security, infrastructure
protection, detectors (such as BioWatch sensors)
countermeasures, response plans, and overall
consequence management capabilities.
RECOMMENDATION: Improve interoperable communications
at all levels of government
DHS has implemented multiple programs to improve
interoperable communications across the
Department. As noted above, DHS awarded $48 million through
the Interoperable Emergency
Communication Grant Program in FY 2010 to fund state and
local activities that assist in the
implementation of the National Emergency Communications
Plan and the Statewide Communication
Interoperability Plans.
The Science and Technology Directorate (S&T) is in the final
stages of testing the Multi-Band Radio,
a portable radio that enables emergency responders to
communicate with partner agencies regardless
of radio band.
13
USCG is in the process of establishing Interagency Operations
Centers throughout the nation’s ports
by deploying the Rescue 21 coastal command, control, and
communications system and the
Watchkeeper information sharing and operational planning and
coordination system. The USCG has
also developed Mobile Command Center capability, which
consists of two Enhanced Mobile Incident
Command Posts positioned on each coast, providing robust,
interoperable communications anywhere
in the world.
As mentioned above, as part of the effort to improve
international interoperable communications, the
United States and Mexico are establishing a new cross-border
communications network, which will
improve incident response and coordination among participating
federal, state, local, and tribal law
enforcement and public safety personnel along the border.
Additionally, the Federal Emergency
Management Agency (FEMA) is currently developing the
nation’s next-generation infrastructure of
alert and warning capabilities, the Integrated Public Alert and
Warning System, which will expand to
new mediums of communication.
RECOMMENDATION: Establish a unified incident command
system
DHS has incorporated the Incident Command System and
National Response Framework into the
National Incident Management System, which provides
nationwide guidelines to clarify the roles of
federal, state and local governments, nongovernmental
organizations, and the private sector in
protecting against, responding to and recovering from disasters.
The response to the BP Deepwater
Horizon Oil Spill—which spans all levels of government and
includes the private sector— is an
example of the implementation of this program, as it has been
organized according to the Incident
Command System to allow a unified, coordinated response
under the leadership of the Department
with the Coast Guard as the lead agency. DHS also developed
the Unified Incident Command and
Decision Project to share information and enhance multi-agency
incident command systems and
coordination.
RECOMMENDATION: Prioritize private sector preparedness
As part of our commitment to increase private sector
preparedness, in June 2010, DHS announced the
adoption of the final standards for the Voluntary Private Sector
Preparedness Accreditation and
Certification Program (PS-Prep)—a major milestone in DHS's
implementation the 9/11
Commission’s recommendation to create a program to improve
private sector preparedness for
disasters and emergencies.
RECOMMENDATION: Assess critical infrastructure and
readiness
In 2009, DHS revised the National Infrastructure Protection
Plan (NIPP), to integrate the concepts of
resiliency and protection, and broaden the focus of NIPP-related
programs and activities to an all-
hazards environment. In FY2010, DHS has provided the
following Infrastructure Protection Program
grants:
14
o $541 million and an additional $300 million in Recovery Act
funds for Port and Transit
Security Grant Programs to create a sustainable, risk-based
effort to protect critical
infrastructure from terrorism.
o $48 million for the Buffer Zone Protection Program to
increase prevention and protection
capabilities of law enforcement agencies responsible for
safeguarding critical
infrastructure such as chemical facilities and nuclear power
plants.
o $11 million for the Intercity Bus Security Grant Program to
support security plans, facility
security upgrades, and vehicle and driver protection.
DHS is also implementing the Chemical Facility Anti-Terrorism
Standards to regulate national
security at high-risk chemical facilities. To date, over 38,000
facilities have submitted data on their
chemical holdings, and approximately 7,000 have been assessed
for risk. The Department has also
deployed Protective Security Advisors to all 50 states and
Puerto Rico to support state, local, tribal
and territorial officials and the private sector with critical
infrastructure security efforts and to
maintain effective information sharing and situational
awareness. Additionally, USCG’s Maritime
Security Risk Analysis Model has assessed over 22,000
potential terrorist targets spanning 13 critical
infrastructure sectors.
DHS also develops an annual National Risk Profile that
provides an all-hazards assessment of risks
facing critical infrastructure, including terrorist threats, cyber
risks, and natural disasters.
In November 2009, DHS launched a new Web site—
dhs.gov/criticalinfrastructure—to inform the
public about the Department’s critical infrastructure protection,
readiness and resiliency efforts, part
of an increased effort to heighten awareness about the
importance of protecting America’s vital
assets, systems and networks.
PROTECTING PRIVACY AND CIVIL LIBERTIES
RECOMMENDATION: Safeguard Individual Privacy When
Sharing Information
DHS involves its Office for Civil Rights and Civil Liberties and
the Privacy Office from the outset of
the policymaking process, building in rights and liberties
protections to new security measures from
the beginning. The DHS Privacy Office works to ensure privacy
is protected when personally
identifiable information is collected, used, shared, or
maintained by the Department, and supports
U.S. Government-wide policy initiatives governing information
sharing by conducting Privacy
Impact Assessments of information sharing systems.
The Office for Civil Rights and Civil Liberties and the Privacy
Office provide training on civil rights
and civil liberties and privacy to intelligence analysts and state
and local fusion center personnel. The
DHS Privacy Office also supports the Fusion Center Program by
reviewing fusion center privacy
policies to ensure they adhere to the Information Sharing
Environment Privacy Guidelines,
participating in the creation of the DHS Joint Fusion Center
Program Management Office, and
providing training to the Interagency Threat Assessment and
Coordination Group.
15
RECOMMENDATION: Maintain Civil Liberties While
Protecting Security
As noted above, DHS involves the Office for Civil Rights and
Civil Liberties from the outset of the
policymaking process, building in protections to new security
measures through collaboration with
communities and stakeholders across the country. The DHS
Office for Civil Rights and Liberties
created a Civil Liberties Impact Assessment process to review
Departmental programs, and conduct
regular outreach with American Arab, Muslim, Sikh, South
Asian, and Somali community leaders,
elected officials, and NGOs across the country. Recently, DHS
has consulted with privacy, civil
rights, and civil liberties advocates about how to build privacy
and civil liberties protections into
Advanced Imaging Technology, and its operating policies.
DHS is working with communities across the country on
preventing violent crime motivated by
ideology and on leveraging successful models like community
policing. In Summer 2010, DHS and
DOJ will launch the “Building Communities of Trust” initiative
to enhance local efforts to understand
and mitigate the threats facing communities.
These efforts include a public education element through the
expansion of the “See Something Say
Something” campaign—a simple and effective program to raise
public awareness of indicators of
terrorism, crime and other threats and emphasize the importance
of reporting suspicious activity to
the proper transportation and law enforcement authorities. This
program was originally implemented
by New York City's Metropolitan Transit Authority and was
funded, in part, by $13 million from
DHS' Transit Security Grant Program.
IMPROVING COLLABORATION AND INFORMATION
SHARING
RECOMMENDATION: Provide Incentives for Information
Sharing
Cybersecurity
In October 2009, DHS opened the new National Cybersecurity
and Communications Integration
Center—a 24-hour, DHS-led coordinated watch and warning
center to improve national efforts to
address threats and incidents affecting the nation's critical
information technology and cyber
infrastructure.
Tailoring Information Sharing to State, Local, Tribal and
Territorial Customers
DHS, working closely with the FBI, has re-focused its
information sharing and production efforts to
better address the needs of state, local, tribal, and territorial
governments. DHS continually works
with senior law enforcement officials from the largest
metropolitan areas, the directors of fusion
centers, and State Homeland Security Advisors to tailor the
Department’s efforts, particularly
information sharing initiatives, to better support the efforts of
state, local, tribal, and territorial law
enforcement to protect local communities.
State and Major Urban Area Fusion Centers
DHS supports state and major urban area fusion centers across
the country, which share information
and intelligence within their jurisdictions as well as with the
federal government. To date, 72 state
and major urban area analytic centers have been designated as
fusion centers by state and local
authorities throughout the country. DHS has deployed
Homeland Security Data Network (HSDN)
systems to the state and major urban area fusion centers,
enabling the federal government to share
16
information and intelligence – including classified terrorism-
related threat information – with state,
local, tribal, and territorial partners. DHS has also placed
federal Intelligence Officers at state and
major urban area fusion centers, who act as the primary liai son
between the federal governments and
state, local, tribal, and territorial partners.
Nationwide Suspicious Activities Reporting Initiative
DHS, in conjunction with DOJ, is also working to implement
the Nationwide Suspicious Activities
Reporting Initiative (NSI) across the nation. The NSI provides
the foundation for state and local
efforts to identify and mitigate emerging terrorism related
threats through training, reporting and
analysis while ensuring privacy and civil liberties are protected.
Currently, NSI capability exists in
three states (New York, Florida, and Virginia), and nine major
cities (Boston, District of Columbia,
Chicago, Los Angeles, Las Vegas, Houston, Phoenix, Seattle,
and Miami-Dade). Twelve additional
states are expected to implement NSI by Fall 2010.
These efforts include a public education element through the
expansion of the “See Something Say
Something” campaign—a simple and effective program to raise
public awareness of indicators of
terrorism, crime and other threats, and emphasize the
importance of reporting suspicious activity to
the proper transportation and law enforcement authorities. The
program was originally implemented
by New York City's Metropolitan Transit Authority and was
funded, in part, by $13 million from
DHS' Transit Security Grant Program.
Improved Analysis of Travel-Related Data
DHS, in partnership with the National Counterterrorism Center
and other federal entities, has
expanded efforts to analyze travel related data in order to better
understand the travel patterns of
known and suspected terrorists. Leveraging threat-related
intelligence, travel-related data has been
essential in identifying, targeting, and interdicting known and
suspected terrorists prior to entering the
United States or boarding a flight bound for the United States.
First Responders Community of Practice
In April 2010, DHS launched the First Responders Community
of Practice, which allows law
enforcement, emergency medical services, and emergency
management personnel to share best
practices and solutions with other professionals, enabling them
to more efficiently and effectively
prepare for disasters.
QHSR AND THE BOTTOM UP REVIEW
In February 2010, the Department of Homeland Security
published our Nation’s first ever
comprehensive review of America’s strategy for homeland
security—the Quadrennial Homeland
Security Review (QHSR). The QHSR was the first step in
setting the strategic path forward to guide
the activities of the homeland security enterprise toward a
common end: a homeland that is safe,
secure, and resilient against terrorism and other hazards. The
QHSR identified five core mission
areas of homeland security—preventing terrorism and enhancing
security, securing and managing our
borders, enforcing and administering our immigration laws,
safeguarding and securing cyberspace,
and ensuring resilience to disasters.
A bottom-up review (BUR) of the Department of Homeland
Security was initiated in November 2009
as an immediate follow-on and complement to the QHSR. The
BUR resulted in a comprehensive
17
catalogue of DHS activities across the homeland security
missions. The BUR Report distills the
results of this analysis, describing the alignment of the
Department and setting forth the Department’s
priority initiatives and enhancements to increase mission
performance, improve Departmental
management, and increase accountability over the next four
years.
The Department’s FY 2012 budget request will begin the
process of implementing the BUR
initiatives and enhancements, and the corresponding FY 2012-
2016 Future Years Homeland Security
Program will set forth the budget plan required to provide
sufficient resources to successfully execute
the Department’s responsibilities across the full range of
homeland security missions as described in
the QHSR, with a priority placed on the initiatives and
enhancements set forth in the BUR Report.
###
18
THE 9/11
COMMISSION
REPORT
Final FM.1pp 7/17/04 5:25 PM Page i
List of Illustrations and Tables ix
Member List xi
Staff List xiii–xiv
Preface xv
1. “WE HAVE SOME PLANES” 1
1.1 Inside the Four Flights 1
1.2 Improvising a Homeland Defense 14
1.3 National Crisis Management 35
2. THE FOUNDATION OF THE NEW TERRORISM 47
2.1 A Declaration of War 47
2.2 Bin Ladin’s Appeal in the Islamic World 48
2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55
2.4 Building an Organization, Declaring
War on the United States (1992–1996) 59
2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63
3. COUNTERTERRORISM EVOLVES 71
3.1 From the Old Terrorism to the New:
The First World Trade Center Bombing 71
3.2 Adaptation—and Nonadaptation—
. . . in the Law Enforcement Community 73
3.3 . . . and in the Federal Aviation Administration 82
3.4 . . . and in the Intelligence Community 86
CONTENTS
v
Final FM.1pp 7/17/04 5:25 PM Page v
3.5 . . . and in the State Department and the Defense
Department 93
3.6 . . . and in the White House 98
3.7 . . . and in the Congress 102
4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108
4.1 Before the Bombings in Kenya and Tanzania 108
4.2 Crisis: August 1998 115
4.3 Diplomacy 121
4.4 Covert Action 126
4.5 Searching for Fresh Options 134
5. AL QAEDA AIMS AT THE AMERICAN HOMELAND 145
5.1 Terrorist Entrepreneurs 145
5.2 The “Planes Operation” 153
5.3 The Hamburg Contingent 160
5.4 A Money Trail? 169
6. FROM THREAT TO THREAT 174
6.1 The Millennium Crisis 174
6.2 Post-Crisis Reflection: Agenda for 2000 182
6.3 The Attack on the USS Cole 190
6.4 Change and Continuity 198
6.5 The New Administration’s Approach 203
7. THE ATTACK LOOMS 215
7.1 First Arrivals in California 215
7.2 The 9/11 Pilots in the United States 223
7.3 Assembling the Teams 231
7.4 Final Strategies and Tactics 241
8. “THE SYSTEM WAS BLINKING RED” 254
8.1 The Summer of Threat 254
8.2 Late Leads—Mihdhar, Moussaoui, and KSM 266
9. HEROISM AND HORROR 278
9.1 Preparedness as of September 11 278
9.2 September 11, 2001 285
9.3 Emergency Response at the Pentagon 311
9.4 Analysis 315
vi
Final FM.1pp 7/17/04 5:25 PM Page vi
10. WARTIME 325
10.1 Immediate Responses at Home 326
10.2 Planning for War 330
10.3 “Phase Two” and the Question of Iraq 334
11. FORESIGHT—AND HINDSIGHT 339
11.1 Imagination 339
11.2 Policy 348
11.3 Capabilities 350
11.4 Management 353
12. WHAT TO DO? A GLOBAL STRATEGY 361
12.1 Reflecting on a Generational Challenge 361
12.2 Attack Terrorists and Their Organizatio ns 365
12.3 Prevent the Continued Growth of Islamist Terrorism 374
12.4 Protect against and Prepare for Terrorist Attacks 383
13. HOW TO DO IT? A DIFFERENT WAY OF
ORGANIZING THE GOVERNMENT 399
13.1 Unity of Effort across the Foreign-Domestic Divide 400
13.2 Unity of Effort in the Intelligence Community 407
13.3 Unity of Effort in Sharing Information 416
13.4 Unity of Effort in the Congress 419
13.5 Organizing America’s Defenses in the United States 423
Appendix A: Common Abbreviations 429
Appendix B:Table of Names 431
Appendix C: Commission Hearings 439
Notes 449
vii
Final FM.1pp 7/17/04 5:25 PM Page vii
Final FM.1pp 7/17/04 5:25 PM Page viii
p. 15 FAA Air Traffic Control Centers
p. 15 Reporting structure, Northeast Air Defense Sector
p. 32–33 Flight paths and timelines
p. 49 Usama Bin Ladin
p. 64 Map of Afghanistan
p. 148 Khalid Sheikh Mohammed
p. 238–239 The 9/11 hijackers
p. 279 The World Trade Center Complex as of 9/11
p. 284 The World Trade Center radio repeater system
p. 288 The World Trade Center North Tower stairwell with
deviations
p. 312 The Twin Towers following the impact of American
Airlines
Flight 11 and United Airlines Flight 175
p. 313 The Pentagon after being struck by American Airlines
Flight 77
p. 313 American Airlines Flight 93 crash site, Shanksville,
Pennsylvania
p. 413 Unity of effort in managing intelligence
LIST OF ILLUSTRATIONS
AND TABLES
ix
Final FM.1pp 7/17/04 5:25 PM Page ix
Final FM.1pp 7/17/04 5:25 PM Page x
Thomas H. Kean
chair
Richard Ben-Veniste
Fred F. Fielding
Jamie S. Gorelick
Slade Gorton
Lee H. Hamilton
vice chair
Bob Kerrey
John F. Lehman
Timothy J. Roemer
James R.Thompson
COMMISSION
MEMBERS
Final FM.1pp 7/17/04 5:25 PM Page xi
Final FM.1pp 7/17/04 5:25 PM Page xii
Joanne M. Accolla
Staff Assistant
Alexis Albion
Professional Staff Member
Scott H. Allan, Jr.
Counsel
John A. Azzarello
Counsel
Caroline Barnes
Professional Staff Member
Warren Bass
Professional Staff Member
Ann M. Bennett
Information Control Officer
Mark S. Bittinger
Professional Staff Member
Madeleine Blot
Counsel
Antwion M. Blount
Systems Engineer
Sam Brinkley
Professional Staff Member
Geoffrey Scott Brown
Research Assistant
Daniel Byman
Professional Staff Member
Dianna Campagna
Manager of Operations
Samuel M.W. Caspersen
Counsel
Melissa A. Coffey
Staff Assistant
Lance Cole
Consultant
Marquittia L. Coleman
Staff Assistant
Marco A. Cordero
Professional Staff Member
Rajesh De
Counsel
George W. Delgrosso
Investigator
Gerald L. Dillingham
Professional Staff Member
Thomas E. Dowling
Professional Staff Member
Steven M. Dunne
Deputy General Counsel
Thomas R. Eldridge
Counsel
Alice Falk
Editor
John J. Farmer, Jr.
Senior Counsel & Team Leader
Alvin S. Felzenberg
Deputy for Communications
COMMISSION
STAFF
xiii
Philip Zelikow, Executive Director
Christopher A. Kojm, Deputy Executive Director
Daniel Marcus, General Counsel
Final FM.1pp 7/17/04 5:25 PM Page xiii
Lorry M. Fenner
Professional Staff Member
Susan Ginsburg
Senior Counsel & Team Leader
T. Graham Giusti
Security Officer
Nicole Marie Grandrimo
Professional Staff Member
Douglas N. Greenburg
Counsel
Barbara A. Grewe
Senior Counsel, Special Projects
Elinore Flynn Hartz
Family Liaison
Leonard R. Hawley
Professional Staff Member
L. Christine Healey
Senior Counsel & Team Leader
Karen Heitkotter
Executive Secretary
Walter T. Hempel II
Professional Staff Member
C. Michael Hurley
Senior Counsel & Team Leader
Dana J. Hyde
Counsel
John W. Ivicic
Security Officer
Michael N. Jacobson
Counsel
Hunter W. Jamerson
Intern
Bonnie D. Jenkins
Counsel
Reginald F. Johnson
Staff Assistant
R.William Johnstone
Professional Staff Member
Stephanie L. Kaplan
Special Assistant & Managing Editor
Miles L. Kara, Sr.
Professional Staff Member
Janice L. Kephart
Counsel
Hyon Kim
Counsel
Katarzyna Kozaczuk
Financial Assistant
Gordon Nathaniel Lederman
Counsel
Daniel J. Leopold
Staff Assistant
Sarah Webb Linden
Professional Staff Member
Douglas J. MacEachin
Professional Staff Member & Team Leader
Ernest R. May
Senior Adviser
Joseph McBride
Intern
James Miller
Professional Staff Member
Kelly Moore
Professional Staff Member
Charles M. Pereira
Professional Staff Member
John Raidt
Professional Staff Member
John Roth
Senior Counsel & Team Leader
Peter Rundlet
Counsel
Lloyd D. Salvetti
Professional Staff Member
Kevin J. Scheid
Professional Staff Member & Team Leader
Kevin Shaeffer
Professional Staff Member
Tracy J. Shycoff
Deputy for Administration & Finance
Dietrich L. Snell
Senior Counsel & Team Leader
Jonathan DeWees Stull
Communications Assistant
Lisa Marie Sullivan
Staff Assistant
Quinn John Tamm, Jr.
Professional Staff Member
Catharine S.Taylor
Staff Assistant
Yoel Tobin
Counsel
Emily Landis Walker
Professional Staff Member & Family Liaison
Garth Wermter
Senior IT Consultant
Serena B.Wille
Counsel
Peter Yerkes
Public Affairs Assistant
xiv COMMISSION STAFF
xiv
Final FM.1pp 7/17/04 5:26 PM Page xiv
We p re se nt th e narrat ive of this report and the
recommendations
that flow from it to the President of the United States, the
United States
Congress, and the American people for their consideration. Ten
Commissioners—five Republicans and five Democrats chosen
by elected
leaders from our nation’s capital at a time of great partisan
division—have
come together to present this report without dissent.
We have come together with a unity of purpose because our
nation
demands it. September 11, 2001, was a day of unprecedented
shock and suf-
fering in the history of the United States.The nation was
unprepared. How
did this happen, and how can we avoid such tragedy again?
To answer these questions, the Congress and the President
created the
National Commission on Terrorist Attacks Upon the United
States (Public
Law 107-306, November 27, 2002).
Our mandate was sweeping.The law directed us to investigate
“facts and
circumstances relating to the terrorist attacks of September 11,
2001,” includ-
ing those relating to intelligence agencies, law enforcement
agencies, diplo-
macy, immigration issues and border control, the flow of assets
to terrorist
organizations, commercial aviation, the role of congressional
oversight and
resource allocation, and other areas determined relevant by the
Commission.
In pursuing our mandate, we have reviewed more than 2.5
million pages
of documents and interviewed more than 1,200 individuals in
ten countries.
This included nearly every senior official from the current and
previous
administrations who had responsibility for topics covered in our
mandate.
We have sought to be independent, impartial, thorough, and
nonpartisan.
From the outset, we have been committed to share as much of
our investi-
gation as we can with the American people.To that end, we held
19 days of
hearings and took public testimony from 160 witnesses.
PREFACE
xv
Final FM.1pp 7/17/04 5:26 PM Page xv
Our aim has not been to assign individual blame. Our aim has
been to
provide the fullest possible account of the events surrounding
9/11 and to
identify lessons learned.
We learned about an enemy who is sophisticated, patient,
disciplined,
and lethal.The enemy rallies broad support in the Arab and
Muslim world
by demanding redress of political grievances, but its hostility
toward us and
our values is limitless. Its purpose is to rid the world of
religious and polit-
ical pluralism, the plebiscite, and equal rights for women. It
makes no dis-
tinction between military and civilian targets. Collateral damage
is not in its
lexicon.
We learned that the institutions charged with protecting our
borders,
civil aviation, and national security did not understand how
grave this threat
could be, and did not adjust their policies, plans, and practices
to deter or
defeat it.We learned of fault lines within our government —
between foreign
and domestic intelligence, and between and within agenci es.We
learned of
the pervasive problems of managing and sharing information
across a large
and unwieldy government that had been built in a different era
to confront
different dangers.
At the outset of our work, we said we were looking backward in
order
to look forward. We hope that the terrible losses chronicled in
this report
can create something positive—an America that is safer,
stronger, and wiser.
That September day, we came together as a nation. The test
before us is to
sustain that unity of purpose and meet the challenges now
confronting us.
We need to design a balanced strategy for the long haul, to
attack terror-
ists and prevent their ranks from swelling while at the same
time protecting
our country against future attacks. We have been forced to think
about the
way our government is organized. The massive departments and
agencies
that prevailed in the great struggles of the twentieth century
must work
together in new ways, so that all the instruments of national
power can be
combined. Congress needs dramatic change as well to
strengthen oversight
and focus accountability.
As we complete our final report, we want to begin by thanking
our fel-
low Commissioners, whose dedication to this task has been
profound. We
have reasoned together over every page, and the report has
benefited from
this remarkable dialogue. We want to express our considerable
respect for
the intellect and judgment of our colleagues, as well as our
great affection
for them.
We want to thank the Commission staff.The dedicated
professional staff,
headed by Philip Zelikow, has contributed innumerable hours to
the com-
pletion of this report, setting aside other important endeavors to
take on this
xvi PREFACE
Final FM.1pp 7/17/04 5:26 PM Page xvi
all-consuming assignment. They have conducted the exacting
investigative
work upon which the Commission has built.They have given
good advice,
and faithfully carried out our guidance.They have been superb.
We thank the Congress and the President. Executive branch
agencies
have searched records and produced a multitude of documents
for us. We
thank officials, past and present, who were generous with their
time and
provided us with insight. The PENTTBOM team at the FBI, the
Director’s Review Group at the CIA, and Inspectors General at
the
Department of Justice and the CIA provided great assistance.
We owe a
huge debt to their investigative labors, painstaking attention to
detail, and
readiness to share what they have learned. We have built on the
work of
several previous Commissions, and we thank the Congressional
Joint
Inquiry, whose fine work helped us get started.We thank the
City of New
York for assistance with documents and witnesses, and the
Government
Printing Office and W.W. Norton & Company for helping to get
this
report to the broad public.
We conclude this list of thanks by coming full circle:We thank
the fam-
ilies of 9/11, whose persistence and dedication helped create the
Commission. They have been with us each step of the way, as
partners and
witnesses.They know better than any of us the importance of the
work we
have undertaken.
We want to note what we have done, and not done.We have
endeavored
to provide the most complete account we can of the events of
September
11, what happened and why.This final report is only a summary
of what we
have done, citing only a fraction of the sources we have
consulted. But in
an event of this scale, touching so many issues and
organizations, we are
conscious of our limits.We have not interviewed every
knowledgeable per-
son or found every relevant piece of paper. New information
inevitably will
come to light. We present this report as a foundation for a better
under-
standing of a landmark in the history of our nation.
We have listened to scores of overwhelming personal tragedies
and
astounding acts of heroism and bravery. We have examined the
staggering
impact of the events of 9/11 on the American people and their
amazing
resilience and courage as they fought back.We have admired
their determi-
nation to do their best to prevent another tragedy while
preparing to
respond if it becomes necessary. We emerge from this
investigation with
enormous sympathy for the victims and their loved ones, and
with
enhanced respect for the American people. We recognize the
formidable
challenges that lie ahead.
We also approach the task of recommendations with humility.
We have
PREFACE xvii
Final FM.1pp 7/17/04 5:26 PM Page xvii
made a limited number of them. We decided consciously to
focus on rec-
ommendations we believe to be most important, whose
implementation
can make the greatest difference. We came into this process
with strong
opinions about what would work. All of us have had to pause,
reflect, and
sometimes change our minds as we studied these problems and
considered
the views of others.We hope our report will encourage our
fellow citizens
to study, reflect—and act.
xviii PREFACE
Thomas H. Kean
chair
Lee H. Hamilton
vice chair
Final FM.1pp 7/17/04 5:26 PM Page xviii
THE 9/11
COMMISSION
REPORT
Final FM.1pp 7/17/04 5:26 PM Page xix
Final FM.1pp 7/17/04 5:26 PM Page xx
1
“WE HAVE
SOME PLANES”
1
Tue sday, S e p te m b e r 11, 2 0 01, dawned temperate and
nearly cloudless in
the eastern United States. Millions of men and women readied
themselves for
work. Some made their way to the Twin Towers, the signature
structures of the
World Trade Center complex in New York City. Others went to
Arlington,Vir-
ginia, to the Pentagon. Across the Potomac River, the United
States Congress
was back in session. At the other end of Pennsylvania Avenue,
people began to
line up for a White House tour. In Sarasota, Florida, President
George W. Bush
went for an early morning run.
For those heading to an airport, weather conditions could not
have been
better for a safe and pleasant journey.Among the travelers were
Mohamed Atta
and Abdul Aziz al Omari, who arrived at the airport in Portland,
Maine.
1.1 INSIDE THE FOUR FLIGHTS
Boarding the Flights
Boston:American 11 and United 175. Atta and Omari boarded a
6:00 A.M.
flight from Portland to Boston’s Logan International Airport.1
When he checked in for his flight to Boston, Atta was selected
by a com-
puterized prescreening system known as CAPPS (Computer
Assisted Passen-
ger Prescreening System), created to identify passengers who
should be
subject to special security measures. Under security rules in
place at the time,
the only consequence of Atta’s selection by CAPPS was that his
checked bags
were held off the plane until it was confirmed that he had
boarded the air-
craft. This did not hinder Atta’s plans.2
Atta and Omari arrived in Boston at 6:45. Seven minutes later,
Atta appar-
ently took a call from Marwan al Shehhi, a longtime colleague
who was at
another terminal at Logan Airport.They spoke for three
minutes.3 It would be
their final conversation.
Final1-4.4pp 7/17/04 9:12 AM Page 1
Between 6:45 and 7:40, Atta and Omari, along with Satam al
Suqami,Wail
al Shehri, and Waleed al Shehri, checked in and boarded
American Airlines
Flight 11, bound for Los Angeles.The flight was scheduled to
depart at 7:45.4
In another Logan terminal, Shehhi, joined by Fayez
Banihammad, Mohand
al Shehri, Ahmed al Ghamdi, and Hamza al Ghamdi, checked in
for United
Airlines Flight 175, also bound for Los Angeles.A couple of
Shehhi’s colleagues
were obviously unused to travel; according to the United ticket
agent, they had
trouble understanding the standard security questions, and she
had to go over
them slowly until they gave the routine, reassuring answers.5
Their flight was
scheduled to depart at 8:00.
The security checkpoints through which passengers, including
Atta and his
colleagues, gained access to the American 11 gate were
operated by Globe
Security under a contract with American Airlines. In a different
terminal, the
single checkpoint through which passengers for United 175
passed was con-
trolled by United Airlines, which had contracted with Huntleigh
USA to per-
form the screening.6
In passing through these checkpoints, each of the hijackers
would have been
screened by a walk-through metal detector calibrated to detect
items with at
least the metal content of a .22-caliber handgun. Anyone who
might have set
off that detector would have been screened with a hand wand—a
procedure
requiring the screener to identify the metal item or items that
caused the alarm.
In addition, an X-ray machine would have screened the
hijackers’ carry-on
belongings.The screening was in place to identify and
confiscate weapons and
other items prohibited from being carried onto a commercial
flight.7 None of
the checkpoint supervisors recalled the hijackers or reported
anything suspi-
cious regarding their screening.8
While Atta had been selected by CAPPS in Portland, three
members of his
hijacking team—Suqami,Wail al Shehri, and Waleed al Shehri—
were selected
in Boston.Their selection affected only the handling of their
checked bags, not
their screening at the checkpoint. All five men cleared the
checkpoint and
made their way to the gate for American 11. Atta, Omari, and
Suqami took
their seats in business class (seats 8D, 8G, and 10B,
respectively). The Shehri
brothers had adjacent seats in row 2 (Wail in 2A, Waleed in
2B), in the first-
class cabin. They boarded American 11 between 7:31 and 7:40.
The aircraft
pushed back from the gate at 7:40.9
Shehhi and his team, none of whom had been selected by
CAPPS, boarded
United 175 between 7:23 and 7:28 (Banihammad in 2A, Shehri
in 2B, Shehhi
in 6C, Hamza al Ghamdi in 9C, and Ahmed al Ghamdi in
9D).Their aircraft
pushed back from the gate just before 8:00.10
Washington Dulles:American 77. Hundreds of miles southwest
of Boston,
at Dulles International Airport in the Virginia suburbs of
Washington, D.C.,
five more men were preparing to take their early morning
flight.At 7:15, a pair
2 THE 9/11 COMMISSION REPORT
Final1-4.4pp 7/17/04 9:12 AM Page 2
of them, Khalid al Mihdhar and Majed Moqed, checked in at the
American
Airlines ticket counter for Flight 77, bound for Los
Angeles.Within the next
20 minutes, they would be followed by Hani Hanjour and two
brothers, Nawaf
al Hazmi and Salem al Hazmi.11
Hani Hanjour, Khalid al Mihdhar, and Majed Moqed were
flagged by
CAPPS.The Hazmi brothers were also selected for extra
scrutiny by the air-
line’s customer service representative at the check-in counter.
He did so
because one of the brothers did not have photo identification
nor could he
understand English, and because the agent found both of the
passengers to
be suspicious.The only consequence of their selection was that
their checked
bags were held off the plane until it was confirmed that they
had boarded
the aircraft.12
All five hijackers passed through the Main Terminal’s west
security screen-
ing checkpoint; United Airlines, which was the responsible air
carrier, had
contracted out the work to Argenbright Security.13 The
checkpoint featured
closed-circuit television that recorded all passengers, including
the hijackers,
as they were screened. At 7:18, Mihdhar and Moqed entered the
security
checkpoint.
Mihdhar and Moqed placed their carry-on bags on the belt of
the X-ray
machine and proceeded through the first metal detector. Both
set off the alarm,
and they were directed to a second metal detector. Mihdhar did
not trigger the
alarm and was permitted through the checkpoint. After Moqed
set it off, a
screener wanded him. He passed this inspection.14
About 20 minutes later, at 7:35, another passenger for Flight 77,
Hani Han-
jour, placed two carry-on bags on the X-ray belt in the Main
Terminal’s west
checkpoint, and proceeded, without alarm, through the metal
detector. A short
time later, Nawaf and Salem al Hazmi entered the same
checkpoint. Salem al
Hazmi cleared the metal detector and was permitted through;
Nawaf al Hazmi
set off the alarms for both the first and second metal detectors
and was then
hand-wanded before being passed. In addition, his over-the-
shoulder carry-on
bag was swiped by an explosive trace detector and then passed.
The video
footage indicates that he was carrying an unidentified item in
his back pocket,
clipped to its rim.15
When the local civil aviation security office of the Federal
Aviation Admin-
istration (FAA) later investigated these security screening
operations, the
screeners recalled nothing out of the ordinary.They could not
recall that any
of the passengers they screened were CAPPS selectees. We
asked a screening
expert to review the videotape of the hand-wanding, and he
found the qual-
ity of the screener’s work to have been “marginal at best.” The
screener should
have “resolved” what set off the alarm; and in the case of both
Moqed and
Hazmi, it was clear that he did not.16
At 7:50, Majed Moqed and Khalid al Mihdhar boarded the flight
and were
seated in 12A and 12B in coach. Hani Hanjour, assigned to seat
1B (first class),
“WE HAVE SOME PLANES” 3
Final1-4.4pp 7/17/04 9:12 AM Page 3
soon followed.The Hazmi brothers, sitting in 5E and 5F, joined
Hanjour in the
first-class cabin.17
Newark: United 93. Between 7:03 and 7:39, Saeed al Ghamdi,
Ahmed al
Nami, Ahmad al Haznawi, and Ziad Jarrah checked in at the
United Airlines
ticket counter for Flight 93, going to Los Angeles.Two checked
bags; two did
not. Haznawi was selected by CAPPS. His checked bag was
screened for explo-
sives and then loaded on the plane.18
The four men passed through the security checkpoint, owned by
United
Airlines and operated under contract by Argenbright Security.
Like the check-
points in Boston, it lacked closed-circuit television surveillance
so there is no
documentary evidence to indicate when the hijackers passed
through the
checkpoint, what alarms may have been triggered, or what
security procedures
were administered.The FAA interviewed the screeners later;
none recalled any-
thing unusual or suspicious.19
The four men boarded the plane between 7:39 and 7:48. All four
had seats
in the first-class cabin; their plane had no business-class
section. Jarrah was in
seat 1B, closest to the cockpit; Nami was in 3C, Ghamdi in 3D,
and Haznawi
in 6B.20
The 19 men were aboard four transcontinental flights.21 They
were plan-
ning to hijack these planes and turn them into large guided
missiles, loaded
with up to 11,400 gallons of jet fuel. By 8:00 A.M. on the
morning of Tuesday,
September 11, 2001, they had defeated all the security layers
that America’s civil
aviation security system then had in place to prevent a
hijacking.
The Hijacking of American 11
American Airlines Flight 11 provided nonstop service from
Boston to Los
Angeles. On September 11, Captain John Ogonowski and First
Officer
Thomas McGuinness piloted the Boeing 767. It carried its full
capacity of nine
flight attendants. Eighty-one passengers boarded the flight with
them (includ-
ing the five terrorists).22
The plane took off at 7:59. Just before 8:14, it had climbed to
26,000 feet,
not quite its initial assigned cruising altitude of 29,000 feet.All
communications
and flight profile data were normal. About this time the “Fasten
Seatbelt” sign
would usually have been turned off and the flight attendants
would have begun
preparing for cabin service.23
At that same time, American 11 had its last routine
communication with
the ground when it acknowledged navigational instructions from
the FAA’s
air traffic control (ATC) center in Boston. Sixteen seconds after
that transmis-
sion,ATC instructed the aircraft’s pilots to climb to 35,000
feet.That message
and all subsequent attempts to contact the flight were not
acknowledged.
From this and other evidence, we believe the hijacking began at
8:14 or
shortly thereafter.24
4 THE 9/11 COMMISSION REPORT
Final1-4.4pp 7/17/04 9:12 AM Page 4
Reports from two flight attendants in the coach cabin, Betty
Ong and
Madeline “Amy” Sweeney, tell us most of what we know about
how the
hijacking happened. As it began, some of the hijackers—most
likely Wail al
Shehri and Waleed al Shehri, who were seated in row 2 in first
class—stabbed
the two unarmed flight attendants who would have been
preparing for cabin
service.25
We do not know exactly how the hijackers gained access to the
cockpit;
FAA rules required that the doors remain closed and locked
during flight. Ong
speculated that they had “jammed their way” in. Perhaps the
terrorists stabbed
the flight attendants to get a cockpit key, to force one of them
to open the cock-
pit door, or to lure the captain or first officer out of the cockpit.
Or the flight
attendants may just have been in their way.26
At the same time or shortly thereafter, Atta—the only terrorist
on board
trained to fly a jet—would have moved to the cockpit from his
business-class
seat, possibly accompanied by Omari.As this was happening,
passenger Daniel
Lewin, who was seated in the row just behind Atta and Omari,
was stabbed by
one of the hijackers—probably Satam al Suqami, who was
seated directly
behind Lewin. Lewin had served four years as an officer in the
Israeli military.
He may have made an attempt to stop the hijackers in front of
him, not real-
izing that another was sitting behind him.27
The hijackers quickly gained control and sprayed Mace, pepper
spray, or
some other irritant in the first-class cabin, in order to force the
passengers and
flight attendants toward the rear of the plane.They claimed they
had a bomb.28
About five minutes after the hijacking began, Betty Ong
contacted the
American Airlines Southeastern Reservations Office in Cary,
North Carolina,
via an AT&T airphone to report an emergency aboard the
flight.This was the
first of several occasions on 9/11 when flight attendants took
action outside
the scope of their training, which emphasized that in a
hijacking, they were to
communicate with the cockpit crew.The emergency call lasted
approximately
25 minutes, as Ong calmly and professionally relayed
information about events
taking place aboard the airplane to authorities on the ground.29
At 8:19, Ong reported:“The cockpit is not answering,
somebody’s stabbed
in business class—and I think there’s Mace—that we can’t
breathe—I don’t
know, I think we’re getting hijacked.” She then told of the
stabbings of the two
flight attendants.30
At 8:21, one of the American employees receiving Ong’s call in
North Car-
olina, Nydia Gonzalez, alerted the American Airlines operations
center in Fort
Worth,Texas, reaching Craig Marquis, the manager on duty.
Marquis soon real-
ized this was an emergency and instructed the airline’s
dispatcher responsible
for the flight to contact the cockpit. At 8:23, the dispatcher
tried unsuccessfully
to contact the aircraft. Six minutes later, the air traffic control
specialist in Amer-
ican’s operations center contacted the FAA’s Boston Air Traffic
Control Center
about the flight. The center was already aware of the
problem.31
“WE HAVE SOME PLANES” 5
Final1-4.4pp 7/17/04 9:12 AM Page 5
Boston Center knew of a problem on the flight in part because
just before
8:25 the hijackers had attempted to communicate with the
passengers. The
microphone was keyed, and immediately one of the hijackers
said, “Nobody
move. Everything will be okay. If you try to make any moves,
you’ll endanger
yourself and the airplane. Just stay quiet.”Air traffic controllers
heard the trans-
mission; Ong did not.The hijackers probably did not know how
to operate the
cockpit radio communication system correctly, and thus
inadvertently broad-
cast their message over the air traffic control channel instead of
the cabin
public-address channel. Also at 8:25, and again at 8:29, Amy
Sweeney got
through to the American Flight Services Office in Boston but
was cut off after
she reported someone was hurt aboard the flight.Three minutes
later, Sweeney
was reconnected to the office and began relaying updates to the
manager,
Michael Woodward.32
At 8:26, Ong reported that the plane was “flying erratically.”A
minute later,
Flight 11 turned south. American also began getting
identifications of the
hijackers, as Ong and then Sweeney passed on some of the seat
numbers of
those who had gained unauthorized access to the cockpit.33
Sweeney calmly reported on her line that the plane had been
hijacked; a
man in first class had his throat slashed; two flight attendants
had been
stabbed—one was seriously hurt and was on oxygen while the
other’s wounds
seemed minor; a doctor had been requested; the flight attendants
were unable
to contact the cockpit; and there was a bomb in the cockpit.
Sweeney told
Woodward that she and Ong were trying to relay as much
information as they
could to people on the ground.34
At 8:38, Ong told Gonzalez that the plane was flying erratically
again.
Around this time Sweeney told Woodward that the hijackers
were Middle East-
erners, naming three of their seat numbers. One spoke very little
English and
one spoke excellent English.The hijackers had gained entry to
the cockpit, and
she did not know how.The aircraft was in a rapid descent.35
At 8:41, Sweeney told Woodward that passengers in coach were
under the
impression that there was a routine medical emergency in first
class. Other
flight attendants were busy at duties such as getting medical
supplies while Ong
and Sweeney were reporting the events.36
At 8:41, in American’s operations center, a colleague told
Marquis that the
air traffic controllers declared Flight 11 a hijacking and “think
he’s [American
11] headed toward Kennedy [airport in New York City].They’re
moving every-
body out of the way.They seem to have him on a primary
radar.They seem to
think that he is descending.”37
At 8:44, Gonzalez reported losing phone contact with Ong.
About this
same time Sweeney reported to Woodward,“Something is
wrong.We are in a
rapid descent . . . we are all over the place.”Woodward asked
Sweeney to look
out the window to see if she could determine where they were.
Sweeney
responded:“We are flying low. We are flying very, very low.
We are flying way
6 THE 9/11 COMMISSION REPORT
Final1-4.4pp 7/17/04 9:12 AM Page 6
too low.” Seconds later she said,“Oh my God we are way too
low.” The phone
call ended.38
At 8:46:40, American 11 crashed into the North Tower of the
World Trade
Center in New York City.39 All on board, along with an
unknown number of
people in the tower, were killed instantly.
The Hijacking of United 175
United Airlines Flight 175 was scheduled to depart for Los
Angeles at 8:00. Cap-
tain Victor Saracini and First Officer Michael Horrocks piloted
the Boeing 767,
which had seven flight attendants. Fifty-six passengers boarded
the flight.40
United 175 pushed back from its gate at 7:58 and departed
Logan Airport
at 8:14. By 8:33, it had reached its assigned cruising altitude of
31,000 feet.The
flight attendants would have begun their cabin service.41
The flight had taken off just as American 11 was being
hijacked, and at 8:42
the United 175 flight crew completed their report on a
“suspicious transmis-
sion” overheard from another plane (which turned out to have
been Flight 11)
just after takeoff. This was United 175’s last communication
with the ground.42
The hijackers attacked sometime between 8:42 and 8:46.They
used knives
(as reported by two passengers and a flight attendant), Mace
(reported by one
passenger), and the threat of a bomb (reported by the same
passenger). They
stabbed members of the flight crew (reported by a flight
attendant and one pas-
senger). Both pilots had been killed (reported by one flight
attendant).The eye-
witness accounts came from calls made from the rear of the
plane, from
passengers originally seated further forward in the cabin, a sign
that passengers
and perhaps crew had been moved to the back of the aircraft.
Given similari-
ties to American 11 in hijacker seating and in eyewitness
reports of tactics and
weapons, as well as the contact between the presumed team
leaders, Atta and
Shehhi, we believe the tactics were similar on both flights.43
The first operational evidence that something was abnormal on
United
175 came at 8:47, when the aircraft changed beacon codes twice
within a
minute. At 8:51, the flight deviated from its assigned altitude,
and a minute
later New York air traffic controllers began repeatedly and
unsuccessfully try-
ing to contact it.44
At 8:52, in Easton, Connecticut, a man named Lee Hanson
received a
phone call from his son Peter, a passenger on United 175. His
son told him:
“I think they’ve taken over the cockpit—An attendant has been
stabbed—
and someone else up front may have been killed. The plane is
making
strange moves. Call United Airlines—Tell them it’s Flight 175,
Boston to LA.”
Lee Hanson then called the Easton Police Department and
relayed what he
had heard.45
Also at 8:52, a male flight attendant called a United office in
San Francisco,
reaching Marc Policastro.The flight attendant reported that the
flight had been
hijacked, both pilots had been killed, a flight attendant had been
stabbed, and
“WE HAVE SOME PLANES” 7
Final1-4.4pp 7/17/04 9:12 AM Page 7
the hijackers were probably flying the plane.The call lasted
about two minutes,
after which Policastro and a colleague tried unsuccessfully to
contact the
flight.46
At 8:58, the flight took a heading toward New York City.47
At 8:59, Flight 175 passenger Brian David Sweeney tried to call
his wife,
Julie. He left a message on their home answering machine that
the plane had
been hijacked. He then called his mother, Louise Sweeney, told
her the flight
had been hijacked, and added that the passengers were thinking
about storm-
ing the cockpit to take control of the plane away from the
hijackers.48
At 9:00, Lee Hanson received a second call from his son Peter:
It’s getting bad, Dad—A stewardess was stabbed—They seem to
have
knives and Mace—They said they have a bomb—It’s getting
very bad
on the plane—Passengers are throwing up and getting sick—The
plane is making jerky movements —I don’t think the pilot is
flying the
plane—I think we are going down—I think they intend to go to
Chicago or someplace and fly into a building—Don’t worry,
Dad—
If it happens, it’ll be very fast—My God, my God.49
The call ended abruptly. Lee Hanson had heard a woman scream
just before
it cut off. He turned on a television, and in her home so did
Louise Sweeney.
Both then saw the second aircraft hit the World Trade Center.50
At 9:03:11, United Airlines Flight 175 struck the South Tower
of the World
Trade Center.51 All on board, along with an unknown number
of people in
the tower, were killed instantly.
The Hijacking of American 77
American Airlines Flight 77 was scheduled to depart from
Washington Dulles
for Los Angeles at 8:10. The aircraft was a Boeing 757 piloted
by Captain
Charles F. Burlingame and First Officer David Charlebois.
There were four
flight attendants. On September 11, the flight carried 58
passengers.52
American 77 pushed back from its gate at 8:09 and took off at
8:20. At 8:46,
the flight reached its assigned cruising altitude of 35,000 feet.
Cabin service
would have begun. At 8:51, American 77 transmitted its last
routine radio com-
munication.The hijacking began between 8:51 and 8:54. As on
American 11
and United 175, the hijackers used knives (reported by one
passenger) and
moved all the passengers (and possibly crew) to the rear of the
aircraft (reported
by one flight attendant and one passenger). Unlike the earlier
flights, the Flight
77 hijackers were reported by a passenger to have box cutters.
Finally, a pas-
senger reported that an announcement had been made by the
“pilot” that the
plane had been hijacked. Neither of the firsthand accounts
mentioned any stab-
bings or the threat or use of either a bomb or Mace,though both
witnesses began
the flight in the first-class cabin.53
8 THE 9/11 COMMISSION REPORT
Final1-4.4pp 7/17/04 9:12 AM Page 8
At 8:54, the aircraft deviated from its assigned course, turning
south. Two
minutes later the transponder was turned off and even primary
radar contact
with the aircraft was lost.The Indianapolis Air Traffic Control
Center repeat-
edly tried and failed to contact the aircraft. American Airlines
dispatchers also
tried, without success.54
At 9:00, American Airlines Executive Vice President Gerard
Arpey learned
that communications had been lost with American 77.This was
now the sec-
ond American aircraft in trouble. He ordered all American
Airlines flights in
the Northeast that had not taken off to remain on the ground.
Shortly before
9:10, suspecting that American 77 had been hijacked, American
headquarters
concluded that the second aircraft to hit the World Trade Center
might have
been Flight 77. After learning that United Airlines was missing
a plane,Amer-
ican Airlines headquarters extended the ground stop
nationwide.55
At 9:12, Renee May called her mother, Nancy May, in Las
Vegas. She said
her flight was being hijacked by six individuals who had moved
them to the
rear of the plane. She asked her mother to alert American
Airlines. Nancy May
and her husband promptly did so.56
At some point between 9:16 and 9:26, Barbara Olson called her
husband,
Ted Olson, the solicitor general of the United States. She
reported that the
flight had been hijacked, and the hijackers had knives and box
cutters. She fur-
ther indicated that the hijackers were not aware of her phone
call, and that they
had put all the passengers in the back of the plane. About a
minute into the
conversation, the call was cut off. Solicitor General Olson tried
unsuccessfully
to reach Attorney General John Ashcroft.57
Shortly after the first call, Barbara Olson reached her husband
again. She
reported that the pilot had announced that the flight had been
hijacked, and
she asked her husband what she should tell the captain to
do.Ted Olson asked
for her location and she replied that the aircraft was then flying
over houses.
Another passenger told her they were traveling northeast.The
Solicitor Gen-
eral then informed his wife of the two previous hijackings and
crashes. She did
not display signs of panic and did not indicate any awareness of
an impending
crash. At that point, the second call was cut off.58
At 9:29, the autopilot on American 77 was disengaged; the
aircraft was at
7,000 feet and approximately 38 miles west of the Pentagon.59
At 9:32, con-
trollers at the Dulles Terminal Radar Approach Control
“observed a primary
radar target tracking eastbound at a high rate of speed.” This
was later deter-
mined to have been Flight 77.
At 9:34, Ronald Reagan Washington National Airport advised
the Secret Ser-
vice of an unknown aircraft heading in the direction of the
White House.Amer-
ican 77 was then 5 miles west-southwest of the Pentagon and
began a
330-degree turn. At the end of the turn, it was descending
through 2,200 feet,
pointed toward the Pentagon and downtown Washington.The
hijacker pilot then
advanced the throttles to maximum power and dove toward the
Pentagon.60
“WE HAVE SOME PLANES” 9
Final1-4.4pp 7/17/04 9:12 AM Page 9
At 9:37:46, American Airlines Flight 77 crashed into the
Pentagon, travel-
ing at approximately 530 miles per hour.61 All on board, as
well as many civil-
ian and military personnel in the building, were killed.
The Battle for United 93
At 8:42, United Airlines Flight 93 took off from Newark (New
Jersey) Liberty
International Airport bound for San Francisco.The aircraft was
piloted by Cap-
tain Jason Dahl and First Officer Leroy Homer, and there were
five flight atten-
dants. Thirty-seven passengers, including the hijackers, boarded
the plane.
Scheduled to depart the gate at 8:00, the Boeing 757’s takeoff
was delayed
because of the airport’s typically heavy morning traffic.62
The hijackers had planned to take flights scheduled to depart at
7:45 (Amer-
ican 11), 8:00 (United 175 and United 93), and 8:10 (American
77). Three of
the flights had actually taken off within 10 to 15 minutes of
their planned
departure times. United 93 would ordinarily have taken off
about 15 minutes
after pulling away from the gate.When it left the ground at 8:42,
the flight was
running more than 25 minutes late.63
As United 93 left Newark, the flight’s crew members were
unaware of the
hijacking of American 11. Around 9:00, the FAA, American,
and United were
facing the staggering realization of apparent multiple
hijackings. At 9:03, they
would see another aircraft strike the World Trade Center. Crisis
managers at
the FAA and the airlines did not yet act to warn other
aircraft.64 At the same
time, Boston Center realized that a message transmitted just
before 8:25 by the
hijacker pilot of American 11 included the phrase,“We have
some planes.”65
No one at the FAA or the airlines that day had ever dealt w ith
multiple
hijackings. Such a plot had not been carried out anywhere in the
world in more
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING

More Related Content

Similar to DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING

Audit Report: TSA's Screening of Passengers by ObservationTechniques
Audit Report: TSA's Screening of Passengers by ObservationTechniquesAudit Report: TSA's Screening of Passengers by ObservationTechniques
Audit Report: TSA's Screening of Passengers by ObservationTechniquesRafat Ali
 
12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous drivingZiaullah Mirza
 
A Comprehensive Literature Review On Transportation System Risk Analysis
A Comprehensive Literature Review On Transportation System Risk AnalysisA Comprehensive Literature Review On Transportation System Risk Analysis
A Comprehensive Literature Review On Transportation System Risk AnalysisLori Moore
 
Chapter 10Air CargoThis chapter examines issu
 Chapter 10Air CargoThis chapter examines issu Chapter 10Air CargoThis chapter examines issu
Chapter 10Air CargoThis chapter examines issuMargaritoWhitt221
 
2011 National ITS Update - 2 25-11 public version
2011 National ITS Update - 2 25-11 public version2011 National ITS Update - 2 25-11 public version
2011 National ITS Update - 2 25-11 public versionraymurphy9533
 
Orlando Airport Gets Dhs Funding
Orlando Airport Gets Dhs FundingOrlando Airport Gets Dhs Funding
Orlando Airport Gets Dhs FundingCliff Veale
 
Eurocontrol on just culture
Eurocontrol on just cultureEurocontrol on just culture
Eurocontrol on just cultureDigitalPower
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Community Protection Forum
 
Basics of Transport Diplomacy bu Juliette Passer, Esq.
Basics of Transport Diplomacy bu Juliette Passer, Esq.Basics of Transport Diplomacy bu Juliette Passer, Esq.
Basics of Transport Diplomacy bu Juliette Passer, Esq.Juliette Passer
 
MWL2016_Brochure_web
MWL2016_Brochure_webMWL2016_Brochure_web
MWL2016_Brochure_webBrady Marcus
 
Gabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docxGabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docxhanneloremccaffery
 
GROUP-6_Transporation-Engineering/.com.ptx
GROUP-6_Transporation-Engineering/.com.ptxGROUP-6_Transporation-Engineering/.com.ptx
GROUP-6_Transporation-Engineering/.com.ptxMelianRebamontan
 
The Real World of Connected Vehicles
The Real World of Connected VehiclesThe Real World of Connected Vehicles
The Real World of Connected VehiclesMike Pina
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )Kelley Hunter
 
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12raymurphy9533
 

Similar to DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING (20)

Cargo security
Cargo securityCargo security
Cargo security
 
Audit Report: TSA's Screening of Passengers by ObservationTechniques
Audit Report: TSA's Screening of Passengers by ObservationTechniquesAudit Report: TSA's Screening of Passengers by ObservationTechniques
Audit Report: TSA's Screening of Passengers by ObservationTechniques
 
12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving
 
A Comprehensive Literature Review On Transportation System Risk Analysis
A Comprehensive Literature Review On Transportation System Risk AnalysisA Comprehensive Literature Review On Transportation System Risk Analysis
A Comprehensive Literature Review On Transportation System Risk Analysis
 
Chapter 10Air CargoThis chapter examines issu
 Chapter 10Air CargoThis chapter examines issu Chapter 10Air CargoThis chapter examines issu
Chapter 10Air CargoThis chapter examines issu
 
2011 National ITS Update - 2 25-11 public version
2011 National ITS Update - 2 25-11 public version2011 National ITS Update - 2 25-11 public version
2011 National ITS Update - 2 25-11 public version
 
Orlando Airport Gets Dhs Funding
Orlando Airport Gets Dhs FundingOrlando Airport Gets Dhs Funding
Orlando Airport Gets Dhs Funding
 
TTI Aviation Research and Planning
TTI Aviation Research and PlanningTTI Aviation Research and Planning
TTI Aviation Research and Planning
 
Eurocontrol on just culture
Eurocontrol on just cultureEurocontrol on just culture
Eurocontrol on just culture
 
403 1
403 1403 1
403 1
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...
 
Basics of Transport Diplomacy bu Juliette Passer, Esq.
Basics of Transport Diplomacy bu Juliette Passer, Esq.Basics of Transport Diplomacy bu Juliette Passer, Esq.
Basics of Transport Diplomacy bu Juliette Passer, Esq.
 
MWL2016_Brochure_web
MWL2016_Brochure_webMWL2016_Brochure_web
MWL2016_Brochure_web
 
Gabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docxGabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docx
 
GROUP-6_Transporation-Engineering/.com.ptx
GROUP-6_Transporation-Engineering/.com.ptxGROUP-6_Transporation-Engineering/.com.ptx
GROUP-6_Transporation-Engineering/.com.ptx
 
Key Issues to Address Road Safety
Key Issues to Address Road SafetyKey Issues to Address Road Safety
Key Issues to Address Road Safety
 
The Real World of Connected Vehicles
The Real World of Connected VehiclesThe Real World of Connected Vehicles
The Real World of Connected Vehicles
 
TTI Overview Brochure
TTI Overview BrochureTTI Overview Brochure
TTI Overview Brochure
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )
 
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
 

More from LinaCovington707

ESSAY #4In contrast to thinking of poor people as deserving of bei.docx
ESSAY #4In contrast to thinking of poor people as deserving of bei.docxESSAY #4In contrast to thinking of poor people as deserving of bei.docx
ESSAY #4In contrast to thinking of poor people as deserving of bei.docxLinaCovington707
 
Essay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docxEssay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docxLinaCovington707
 
Essay 1 What is the role of the millennial servant leader on Capito.docx
Essay 1 What is the role of the millennial servant leader on Capito.docxEssay 1 What is the role of the millennial servant leader on Capito.docx
Essay 1 What is the role of the millennial servant leader on Capito.docxLinaCovington707
 
ESSAY #6Over the course of the quarter, you have learned to apply .docx
ESSAY #6Over the course of the quarter, you have learned to apply .docxESSAY #6Over the course of the quarter, you have learned to apply .docx
ESSAY #6Over the course of the quarter, you have learned to apply .docxLinaCovington707
 
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docxErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docxLinaCovington707
 
Epidemiological ApplicationsDescribe how the concept of multifacto.docx
Epidemiological ApplicationsDescribe how the concept of multifacto.docxEpidemiological ApplicationsDescribe how the concept of multifacto.docx
Epidemiological ApplicationsDescribe how the concept of multifacto.docxLinaCovington707
 
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docxEpidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docxLinaCovington707
 
ENVIRONMENTShould the US support initiatives that restrict carbo.docx
ENVIRONMENTShould the US support initiatives that restrict carbo.docxENVIRONMENTShould the US support initiatives that restrict carbo.docx
ENVIRONMENTShould the US support initiatives that restrict carbo.docxLinaCovington707
 
ePortfolio CompletionResourcesDiscussion Participation Scoring.docx
ePortfolio CompletionResourcesDiscussion Participation Scoring.docxePortfolio CompletionResourcesDiscussion Participation Scoring.docx
ePortfolio CompletionResourcesDiscussion Participation Scoring.docxLinaCovington707
 
eproduction and Animal BehaviorReproduction Explain why asexually.docx
eproduction and Animal BehaviorReproduction Explain why asexually.docxeproduction and Animal BehaviorReproduction Explain why asexually.docx
eproduction and Animal BehaviorReproduction Explain why asexually.docxLinaCovington707
 
Envisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docxEnvisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docxLinaCovington707
 
EnvironmentOur environment is really important. We need to under.docx
EnvironmentOur environment is really important. We need to under.docxEnvironmentOur environment is really important. We need to under.docx
EnvironmentOur environment is really important. We need to under.docxLinaCovington707
 
Environmental Awareness and Organizational Sustainability  Please .docx
Environmental Awareness and Organizational Sustainability  Please .docxEnvironmental Awareness and Organizational Sustainability  Please .docx
Environmental Awareness and Organizational Sustainability  Please .docxLinaCovington707
 
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docxEnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docxLinaCovington707
 
Ensuring your local region is prepared for any emergency is a comp.docx
Ensuring your local region is prepared for any emergency is a comp.docxEnsuring your local region is prepared for any emergency is a comp.docx
Ensuring your local region is prepared for any emergency is a comp.docxLinaCovington707
 
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docxENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docxLinaCovington707
 
English EssayMLA format500 words or moreThis is Caue types of .docx
English EssayMLA format500 words or moreThis is Caue types of .docxEnglish EssayMLA format500 words or moreThis is Caue types of .docx
English EssayMLA format500 words or moreThis is Caue types of .docxLinaCovington707
 
Eng 2480 British Literature after 1790NameApplying Wilde .docx
Eng 2480 British Literature after 1790NameApplying Wilde .docxEng 2480 British Literature after 1790NameApplying Wilde .docx
Eng 2480 British Literature after 1790NameApplying Wilde .docxLinaCovington707
 
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docxEnglish 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docxLinaCovington707
 
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docxENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docxLinaCovington707
 

More from LinaCovington707 (20)

ESSAY #4In contrast to thinking of poor people as deserving of bei.docx
ESSAY #4In contrast to thinking of poor people as deserving of bei.docxESSAY #4In contrast to thinking of poor people as deserving of bei.docx
ESSAY #4In contrast to thinking of poor people as deserving of bei.docx
 
Essay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docxEssay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docx
 
Essay 1 What is the role of the millennial servant leader on Capito.docx
Essay 1 What is the role of the millennial servant leader on Capito.docxEssay 1 What is the role of the millennial servant leader on Capito.docx
Essay 1 What is the role of the millennial servant leader on Capito.docx
 
ESSAY #6Over the course of the quarter, you have learned to apply .docx
ESSAY #6Over the course of the quarter, you have learned to apply .docxESSAY #6Over the course of the quarter, you have learned to apply .docx
ESSAY #6Over the course of the quarter, you have learned to apply .docx
 
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docxErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
 
Epidemiological ApplicationsDescribe how the concept of multifacto.docx
Epidemiological ApplicationsDescribe how the concept of multifacto.docxEpidemiological ApplicationsDescribe how the concept of multifacto.docx
Epidemiological ApplicationsDescribe how the concept of multifacto.docx
 
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docxEpidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
 
ENVIRONMENTShould the US support initiatives that restrict carbo.docx
ENVIRONMENTShould the US support initiatives that restrict carbo.docxENVIRONMENTShould the US support initiatives that restrict carbo.docx
ENVIRONMENTShould the US support initiatives that restrict carbo.docx
 
ePortfolio CompletionResourcesDiscussion Participation Scoring.docx
ePortfolio CompletionResourcesDiscussion Participation Scoring.docxePortfolio CompletionResourcesDiscussion Participation Scoring.docx
ePortfolio CompletionResourcesDiscussion Participation Scoring.docx
 
eproduction and Animal BehaviorReproduction Explain why asexually.docx
eproduction and Animal BehaviorReproduction Explain why asexually.docxeproduction and Animal BehaviorReproduction Explain why asexually.docx
eproduction and Animal BehaviorReproduction Explain why asexually.docx
 
Envisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docxEnvisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docx
 
EnvironmentOur environment is really important. We need to under.docx
EnvironmentOur environment is really important. We need to under.docxEnvironmentOur environment is really important. We need to under.docx
EnvironmentOur environment is really important. We need to under.docx
 
Environmental Awareness and Organizational Sustainability  Please .docx
Environmental Awareness and Organizational Sustainability  Please .docxEnvironmental Awareness and Organizational Sustainability  Please .docx
Environmental Awareness and Organizational Sustainability  Please .docx
 
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docxEnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
 
Ensuring your local region is prepared for any emergency is a comp.docx
Ensuring your local region is prepared for any emergency is a comp.docxEnsuring your local region is prepared for any emergency is a comp.docx
Ensuring your local region is prepared for any emergency is a comp.docx
 
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docxENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
 
English EssayMLA format500 words or moreThis is Caue types of .docx
English EssayMLA format500 words or moreThis is Caue types of .docxEnglish EssayMLA format500 words or moreThis is Caue types of .docx
English EssayMLA format500 words or moreThis is Caue types of .docx
 
Eng 2480 British Literature after 1790NameApplying Wilde .docx
Eng 2480 British Literature after 1790NameApplying Wilde .docxEng 2480 British Literature after 1790NameApplying Wilde .docx
Eng 2480 British Literature after 1790NameApplying Wilde .docx
 
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docxEnglish 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
 
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docxENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING

  • 1. DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING 9/11 COMMISSION RECOMMENDATIONS JULY 2010 UPDATE GUARDING AGAINST TERRORISM AND ENSURING TRANSPORTATION SECURITY RECOMMENDATION: Develop a Risk-Based Plan for Transportation Security Transportation Sector Security Risk Assessment In June 2010, the Transportation Security Administration (TSA) provided to Congress the Transportation Sector Security Risk Assessment (TSSRA) report, a nationwide risk assessment that examines the potential threat, vulnerabilities, and consequences of a terrorist attack involving the Nation’s transportation system. This report will inform the risk-based development and maintenance of risk mitigation strategies and actions that include the development of security standards, grants, programs, countermeasures, and resource allocations. Freight Railroad Security Risk Assessment In June 2010, TSA submitted to Congress the Freight Railroad Security Risk Assessment and National Strategy report as required by the 9/11 Act. This report provides the results of a comprehensive assessment of the risk of a terrorist attack involving the Nation’s freight railroad
  • 2. transportation system. The report also includes a national strategy for railroad transportation. Threat Assessment of the Risk of Terrorist Attack on the Nation’s School Bus System In early 2010, TSA submitted to Congress the Threat Assessment of the Risk of Terrorist Attack on the Nation’s School Bus System, as required by the 9/11 Act. This report was developed in conjunction with school transportation and school security leaders nationwide, outlining the threats and vulnerabilities this system faces and an analysis of strategies to mitigate risk. Transportation Security Funding To support transportation infrastructure and security, the Department of Homeland Security (DHS) provided the following resources to state and local jurisdictions based on risk and threats in Fiscal Year (FY) 2010 and through the American Recovery and Reinvestment Act (ARRA): o $403 million for the Transit Security Grant Program to protect critical transit infrastructure from terrorism, including capital projects, such as improvements to high-risk, high-density tunnels, stations, and bridges and law enforcement officers at transit systems across the country. ($150 million ARRA/ $253 million FY2010 funding) o $1.76 billion for state-of-the-art in-line explosive detection systems to streamline checked baggage screening at airports throughout the U.S. ($734 million ARRA/ $1.028 billion FY2010 funding)
  • 3. o $14.5 million for the Freight Rail Security Grant Program to protect critical freight rail systems infrastructure from acts of terrorism resulting from railroad cars transporting toxic inhalation hazardous materials. o $20 million for Intercity Passenger Rail (Amtrak) to protect critical surface transportation infrastructure and the traveling public from terrorism within the Amtrak rail system. 1 Additionally, DHS spent $394 million for the passenger screening through Advanced Technology X- Ray machines, Advanced Imaging Technology machines, bottle liquid scanners, Explosive Trace Detection machines, and other enhanced threat-detection equipment. ($266 million ARRA/ $128 million FY2010 funding) Aviation Security Fulfilling a key recommendation of the 9/11 Commission Report, TSA implemented Secure Flight for 100 percent of passengers flying domestically and internationally on U.S. airlines in June of 2010. TSA expects all international carriers with direct flights to the United States to be using Secure Flight by the end of 2010. Under Secure Flight, TSA prescreens passengers directly against government watchlists, a function previously performed by individual air carriers. In addition to facilitating secure travel for all passengers, Secure Flight helps prevent the misidentification of passengers who
  • 4. have names similar to individuals on government watchlists. Since the attempted terrorist attack on December 25, 2009, Secretary Napolitano, in conjunction with the International Civil Aviation Organization (ICAO), has been leading a global initiative to strengthen the international aviation system against the evolving threats posed by terrorists, working in multilateral and bilateral contexts with governments as well as industry. Over the past six months, Secretary Napolitano has participated in regional aviation security summits around the world, forging historic consensus with her international colleagues to strengthen the civil aviation system through enhanced information analysis and sharing, cooperation on technological development and modernized aviation security standards. These meetings will culminate in the ICAO Triennial Assembly in September where DHS expects member states will affirm new standards, key measures, and proposals for increasing aviation security worldwide. Domestically, DHS has bolstered security measures at all of our airports, by implementing a variety of security measures to further improve an enhanced, risk- based, layered approach to security. DHS and TSA deploy the most effective technologies available to counter evolving threats, including next generation Explosive Trace Detection units, Advanced Imaging Technology, and next generation Bottled Liquids Scanners. The deployment of over 50,000 trained Transportation Security Officers, Transportation Security Inspectors, and Behavior Detection Officers and 730 canine teams in the transportation sector add additional layers of security to support the technology at the checkpoints
  • 5. DHS has also strengthened partnerships across the federal government, working with the Department of Justice (DOJ) on a number of initiatives to enhance risk- based aviation security countermeasures and collaborating with the Department of Energy (DOE) and its National Laboratories to leverage their expertise in building risk-based technology solutions to key aviation security challenges. Further, each year, DHS/TSA conducts international aviation security training for countries around the world focusing on risk-based security strategies, including cargo security, screening technologies, and airport security management, among other topics. TSA has also successfully negotiated agreements with various foreign governments permitting Federal Air Marshal deployments on international U.S. carrier flights, based on risk. Additionally, air cargo carried on passenger aircraft has never been more secure. Currently, 100 percent of identified high risk internatio nal inbound cargo and 100 percent of total cargo on more than 95 percent of all flights originating from U.S. airports are now screened. TSA is on track to meet 2 the Congressionally-mandated 100 percent screening requirement for all air cargo on domestic passenger aircraft by August 2010. The FY 2011 DHS budget request strengthens several aviation
  • 6. security programs by allowing increased Federal Air Marshal coverage on international flights and through the deployment of additional canine teams, Behavior Detection Officers, Explosive Trace Detection machines and Advanced Imaging Technology units to increase the Department’s ability to detect metallic and non- metallic explosives and other threats at airports across the country. Surface Transportation Protection Recognizing that the risk from terrorism and other hazards for surface transportation demands a coordinated approach involving all sector partners and stakeholders, the Administration initiated a thorough review of existing U.S. surface transportation security efforts across all modes of surface transportation in 2009. The resulting Surface Transportation Security Priority Assessment, released on April 2, 2010, identified interagency priorities for the next four years and provided concrete recommendations on how to enhance security efforts, maximize the use of partnerships to optimize public safety, facilitate commerce and strengthen the resiliency of our surface transportation system. DHS has completed risk-based implementation plans for each of the 20 consensus recommendations of the Surface Transportation Security Priority Assessment addressing the potential risks to the surface transportation system and its four subsectors (mass transit, highways, freight rail, and pipelines), and initiatives are underway. The Baseline Assessment for Security Enhancement (BASE) program for mass transit provides a
  • 7. comprehensive assessment of the security programming in critical transit systems around the country in order to identify security concerns and drive program priorities and resource allocations. Additionally, TSA has many programs designed to bolster surface transportation security, including the deployment of Visible Intermodal Prevention and Response (VIPR) Teams, comprised of Federal Air Marshals, surface/aviation transportation security inspectors, Behavioral Detection Officers, Transportation Security Officers, local law enforcement and security personnel, and canine teams, which enhance the protection of surface transportation, provide deterrent and detection capabilities, and introduce an element of unpredictability in security practices and procedures in order to prevent or disrupt potential terrorist planning activities. Maritime Transportation Security In January 2010, Customs and Border Protection (CBP) began enforcement of the Importer Security Filing and Additional Carrier Requirements interim final rule— also known as the “10 + 2 rule”— increasing the scope and accuracy of information gathered on shipments of cargo arriving by sea into the United States and bolstering DHS' layered enforcement strategy to protect against terrorism and other crimes at U.S. ports of entry. In FY 2010, DHS provided $288 million in grants for the Port Security Grant Program—awarded based on risk—to protect critical port infrastructure from terrorism, enhance maritime domain awareness and risk management capabilities, and support the implementation of the Transportation
  • 8. Worker Identification Credential, and an additional $150 million in Recovery Act funding. 3 The United States Coast Guard (USCG) has many risk-based initiatives in place that strengthen maritime transportation security. For example, Operation Neptune Shield, which includes waterborne and aerial patrols as well as armed escorts of hazardous cargos and passenger vessels, helps to reduce the risk of terrorism to the maritime transportation system, critical infrastructure and key resources. The USCG also has developed Advanced Interdiction capabilities in order to interdict identified threats, including chemical, biological, radiological, nuclear, and explosives threats, before they reach the United States. The USCG conducts intelligence-informed, risk-based Security Boardings to verify the identity of crew members and to ascertain if a vessel poses a threat to the port and whether it should be permitted or denied entry. The USCG also utilizes the Maritime Security Risk Analysis Model, known as MSRAM, to assess threat, vulnerability, and consequence factors for various potential terrorist attack scenarios. This information allows for increased efficiency in the allocation of maritime security resources to reduce security risks at a port. Finally, the USCG’s International Port Security Program (PSP) assesses the effectiveness of anti-terrorism measures in foreign ports that conduct maritime trade with the United States and assists in measuring the risk posed by vessels who
  • 9. have visited international ports prior to coming to the United States. RECOMMENDATION: Improve airline passenger pre-screening New, More Flexible Screening Measures On April 8, 2010, DHS began implementing new enhanced security measures for all air carriers with international flights to the United States to strengthen the safety and security of all passengers. These new measures, which cover 100 percent of passengers traveling by air to the United States, utilize real-time, threat-based intelligence along with multiple layers of security, both seen and unseen, to more effectively mitigate evolving terrorist threats. Secure Flight Fulfilling a key 9/11 Commission recommendation, in June 2010, TSA implemented Secure Flight for 100 percent of passengers flying domestically and internationally on U.S. airlines, meaning that TSA, not the air carriers, vets passengers against government watchlists using passenger name, date of birth, and gender before a boarding pass is issued. This accounts for over 90 percent of all travel to, from, and within the United States. TSA expects to convert all international carriers to Secure Flight by December 2010. Identifying High-Risk Travelers To identify high-risk travelers and facilitate legitimate travel, DHS requires airlines flying to the United States from foreign countries to provide Advance Passenger Information (API), which includes basic information such as name, date of birth, citizenship/nationality and passport number,
  • 10. and Passenger Name Records (PNR), which includes the information that travelers provide to airlines when booking their flights, such as itinerary, address, and check-in information. DHS analysis of passenger data played a critical role in the recent counterterrorism cases against Najibullah Zazi, who pled guilty to plotting to bomb New York subways, David Headley, who pled guilty for his role in the 2008 Mumbai terrorist attacks, and Times Square bombing suspect Faisal Shahzad. 4 Trusted Traveler Programs In order to facilitate legitimate travel and effectively deploy screening and security resources, CBP has vetted and enrolled over 780,000 travelers from over 100 countries in four Trusted Traveler Programs: NEXUS, the Secure Electronic Network for Travelers Rapid Inspection (SENTRI), the Free and Secure Trade (FAST) program, and Global Entry. These programs expedite travel for members who voluntarily apply, provide biometric identification, pass extensive vetting, pay a fee, and provide comprehensive data to CBP for rigorous security threat assessment checks. Pre-clearance Agreements DHS has five pre-clearance agreements (with Aruba, Bahamas, Bermuda, Canada and Ireland), allowing DHS to screen travelers before takeoff through the same process a traveler would undergo
  • 11. upon arrival at a U.S. port of entry to better target and prevent threats while streamlining legitimate travel. The preclearance agreements with Aruba, Bermuda and Ireland have been expanded to apply to private aircraft traveling directly to the U.S. Immigration Advisory Program DHS has also implemented 9 Immigration Advisory Program (IAP) arrangements in 7 countries, which enable CBP officers posted at foreign airports to use advanced targeting and passenger analysis information to identify high-risk travelers at foreign airports before they board U.S.-bound flights. In 2010, DHS signed agreements to establish similar programs at Mexico City International Airport and Paris/de Gaulle International Airport. RECOMMENDATION: Improve airline passenger explosive screening TSA continually assesses intelligence and develops countermeasures to enhance its multiple layers of security at airports and onboard aircraft in order to anticipate and mitigate the constantly evolving threats to aviation security. TSA has deployed more than 50,000 Transportation Security Officers, Transportation Security Inspectors, and Behavior Detection Officers across the U.S. and all officers receive extensive advanced explosive training. TSA has also deployed explosive detection technology, including Advanced Technology X-Ray Machines (which enhance the detection capabilities of carry-on bag screening), next-generation Explosives Trace Detection Machines (which improve explosives detection capabilities at airports) and Advanced Imaging Technology Machines
  • 12. (which allow for increased detection of both metallic and non- metallic threats) to airports across the country to detect potential threats. As noted above, the Recovery Act provided $266 million, the FY2010 budget provided $128.7 million, and the President’s FY2011 budget request included $769 million for passenger screening technologies. RECOMMENDATION: Improve checked bag and cargo screening Checked Baggage TSA screens 100 percent of all checked and carry-on baggage for explosives. As noted above, the Recovery Act provided $734 million and the FY2010 budget provided $1.028 billion in funding for new, state-of-the-art in-line explosives detection systems and other technology to streamline checked 5 baggage screening at airports throughout the U.S. and hundreds of next generation explosives trace detection units. Cargo Screening Air cargo on passenger aircraft has never been more secure. Currently, 100 percent of identified high risk international inbound cargo and 100 percent of total cargo on more than 95 percent of all flights originating from U.S. airports are now being screened.
  • 13. TSA is on track to meet the Congressionally-mandated 100 percent screening requirement for all air cargo on domestic passenger aircraft by August 2010. Effective May 1, 2010, 75 percent of cargo on passenger aircraft departing from U.S. locations are screened under TSA security programs, largely through the Certified Cargo Screening Program, which permits entities who have undergone rigorous inspection and certification processes throughout the air cargo supply chain to screen cargo. Currently, there are over 1.5 million shippers in TSA’s Known Shipper Management System that that have been certified as meeting specific security standards. Port Security CBP has deployed Radiation Portal Monitors and other radiation detection technologies to seaports, land border ports, and mail facilities around the world. These systems scan 100 percent of all containerized cargo arriving in the U.S., including 100 percent of vehicles arriving through our southern border ports, over 99 percent of arriving sea containers, 100 percent of trucks and 100 percent of personal vehicles arriving at our northern border ports. DHS has also implemented the Secure Freight Initiative to scan U.S.-bound maritime containers for nuclear material overseas and the Container Security Initiative to ensure that all U.S.-bound maritime containers that pose a potential risk are identified and inspected before they are placed on vessels destined for the U.S. Canine Teams Canine teams are an integral part of DHS’s layered approach to
  • 14. baggage and cargo security and are deployed by TSA, CBP and USCG in their respective environments. CBP deploys canine detection teams at and between ports of entry, expediting inspections along the border to combat terrorist threats and interrupt the illegal smuggling of drugs, currency, firearms, humans, and agricultural products. TSA deploys canine teams to screen air cargo at the nation’s highest cargo volume airports and provide explosives detection capabilities in the aviation, mass transit, and maritime transportation sectors. Finally, USCG deploys canine explosive detection teams to strategic U.S. ports to enhance security throughout the maritime transportation sector. The Recovery Act provided $150 million for the Transportation Security Grant Program, of which $78 million is being used by transit agencies to hire new law enforcement officers and by police departments with dedicated transit bureaus to hire anti-terrorism personnel, purchase anti-terrorism equipment, and obtain and train explosive detection canines. Nuclear Detection DHS’s Domestic Nuclear Detection Office (DNDO) works to improve the Nation’s capability to detect and report unauthorized attempts to import, develop, or transport nuclear or radiological material for use against the U.S. DNDO has worked with intra- and inter-agency partners to develop strategies for improving the probability of detecting and interdicting radiological and nuclear threats. Since its inception, DNDO has launched more than 250 research and development projects 6
  • 15. with National Laboratory, academic, and industrial partners, aimed at advancing detection technologies. DNDO has also made radiological and nuclear detection training available to over 15,000 state and local officers and first responders. In order to meet the challenge of the global helium 3 shortage, DNDO is aggressively bringing alternative technologies for helium 3 from concept to product through a rapid acquisition process, expediting new and innovative detection technology. DNDO works across DHS to develop nuclear detection capabilities throughout the transportation sectors. TSA’s VIPR Program is currently working in conjunction with DNDO and DOE and has the capability to deploy preventative radiological and nuclear detection equipment to the field. CBP has deployed hundreds of Radiation Portal Monitors to ports of entry, airports and seaports to screen cars, trucks, and other conveyances for the presence of radioactive and nuclear materials. Finally, all USCG teams are now equipped with radiation detection capabilities, including USCG personnel specifically trained to board and search vessels. In March 2010, DHS renewed a Project Arrangement “Concerning the Detection of Illicit Movement of Radiological and Nuclear Materials” with the U.K. to address information and data sharing between the countries in the development of radiation and nuclear detection equipment and technology.
  • 16. RECOMMENDATION: Vigorously track and disrupt terrorist financing Disrupting terrorist financing is one of a number of tools that the U.S. Government employs to counter terrorism. The Secret Service has expanded its Electronic Crimes Task Force (ECTF) program across the country and internationally, with its first international ECTF in Rome, Italy. These task forces are designed to prevent, detect, and investigate various forms of electronic crimes, including potential terrorist attacks against critical infrastructure and financial payment systems. Additionally, the Secret Service has Special Agents assigned to all Joint Terrorism Task Forces around the country. These locally-based facilities partner federal, state and local law enforcement and intelligence agencies to target and prevent terrorist activities. Furthermore, Immigration and Customs Enforcement (ICE) has a lead role in combating bulk cash smuggling, a common strategy used by criminals seeking to move illicit proceeds across transnational borders. ICE’s Operation Firewall, a bulk-cash smuggling initiative that intercepts currency smuggling en route to the border, has led to more than hundreds of arrests and the seizure of more than $316 million, including $116 million seized overseas. ICE has provided outreach and training on the interdiction and investigation of bulk currency violations to more than 2,500 law enforcement, financial, and government officials in more than 85 countries . ICE also developed the Cornerstone Initiative to detect and close gaps within U.S. financial, trade,
  • 17. and transportation sectors that can be exploited by criminal networks, and ICE’s Trade Transparency Units target money laundering and illegal trade transactions. These Trade Transparency Units have launched over 600 trade-based money laundering investigations, seizing more than $180 million since 2004. 7 SECURING OUR BORDERS RECOMMENDATION: Standardize secure identification DHS strongly supports national standards for identification documents to strengthen security while enhancing privacy safeguards. Over the past several years, DHS has taken numerous steps to implement this recommendation to help prevent terrorism, reduce fraud, and improve the reliability and accuracy of personal identification documents. Western Hemisphere Travel Initiative (WHTI) In June 2009, DHS successfully implemented the Western Hemisphere Travel Initiative (WHTI) for land and sea travel to the U.S., increasing border security while facilitating legitimate travel and trade by requiring that U.S. and Canadian citizens present a passport or other secure travel document that denotes identity and citizenship when crossing the border. In response to WHTI, CBP is working with tribes across the country on the development of Enhanced Tribal Cards (ETC)—WHTI compliant documents that formally
  • 18. recognize tribal membership and U.S./Canadian citizenship for the purpose of border crossing. To date, CBP has signed Memorandum of Agreements for the development of ETCs with the Kootenai Tribe of Idaho, the Pascua Yaqui of Arizona, the Tohono O’Odham of Arizona, the Seneca Nation of New York, and the Coquille of Idaho, and is working with additional tribes on the ETC initiative. Drivers License Security Under DHS’s Driver’s License Grant Security Grant Program, states have made substantial progress in improving the security and integrity of their driver’s licenses and issuance processes. Over the past 3 years, this program has provided $176.4 million to states to assist with implementing these security procedures. DHS continues to work with states and territories, congressional allies, and the National Governors Association to enhance the security of driver’s licenses while reforming and resolving many of the concerns in the REAL ID Act through legislation. Transportation Worker Identity Credential (TWIC) Program DHS has enrolled over 1.6 million port workers and merchant mariners in the Transportati on Worker Identity Credential (TWIC) program, a tamper-resistant biometric credential issued to those who require unescorted access to secure areas of ports and vessels. Citizenship and Immigration Documents In May 2010, U.S. Citizenship and Immigrati on Services (USCIS) launched a new card personalization system with state-of-the-art technology that
  • 19. enhances the verification and sharing of electronic records. USCIS redesigned all of its secure identity documents to comport with the latest DHS and International Civil Aviation Organization (ICAO) standards, as well as best practices in industry and government. The new Permanent Resident Card (“green card”) includes a radio frequency identification tag that allows CBP to quickly access the electronic records of travelers seeking to enter the United States and includes new security features that reduce the risks of counterfeiting, tampering, and fraud. Additionally, USCIS updated the Employment Authorization Document by adding a machine- 8 readable zone that for the first time allows USCIS to share data through these work authorization cards with CBP and U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT). RECOMMENDATION: Integrate border security into larger network of screening points that includes the transportation system and access to vital facilities Biometric Entry-Exit Screening System The US-VISIT biometric identity and verification process collects digital fingerprints and a photograph from international travelers at U.S. visa-issuing post and ports of entry to help immigration officers determine whether a person is eligible to receive a visa or enter the United
  • 20. States. US-VISIT also supports the Department’s ability to identify international travelers who have remained in the United States beyond their period of admission. To date, DHS has achieved ten- fingerprint collection at entry for 98 percent of inbound travelers. Visa Waiver Program and Lost and Stolen Passport Screening The Visa Waiver Program (VWP) enables nationals of 36 participating countries to travel to the United States for tourism or business for stays of 90 days or less without obtaining a visa. DHS implemented the Electronic System for Travel Authorization (ESTA) to screen VWP applicants prior to travel to the United States and, as a result, has virtually eliminated the paper arrival/departure form (Form I-94W) for authorized travelers from nations participating in the VWP. DHS—in cooperation with the Departments of State and Justice—has made substantial progress in bringing VWP countries into compliance with the information sharing requirements of the 9/11 Act. The 9/11 Act requires VWP countries to enter into an agreement with the United States to report lost and stolen passport data to the United States so that it can be screened against INTERPOL’s Stolen and Lost Travel Document database, which contains the lost and stolen passport records of more than 120 countries. To date, 32 of the 36 VWP countries have reached such agreements. In addition, DHS, in collaboration with the Departments of Justice and State, has signed Preventing and Combating Serious Crime (PCSC) Agreements with 14 VWP countries to share information to
  • 21. better identify known terrorists and criminals during investigations and other law enforcement activities. Visa Security Program (VSP) DHS is expanding the Visa Security Program (VSP) to U.S. Embassies and Consulates identified by the Departments of State and Homeland Security as having the highest risk from a terrorism perspective, subject to appropriations and Departmental approval. DHS provides expert advice and training to consular officers regarding specific security threats relating to the adjudication of individual visa applications; reviews applications; and conducts investigations with respect to consular matters under the jurisdiction of DHS. Southwest Border Southwest Border Initiative In March 2009, the Obama Administration announced the Southwest Border Initiative—a series of unprecedented steps to crack down on Mexican drug cartels by deploying additional personnel and 9 technology, increasing information sharing, working closely with the Mexican government, and improving federal coordination with state, local and tribal law enforcement authorities. Over the past sixteen months, DHS has dedicated unprecedented personnel, technology, and
  • 22. resources to the Southwest border. Today, the Border Patrol is better staffed than at any time in its 85-year history, having nearly doubled the number of agents from approximately 10,000 in 2004 to more than 20,000 today. Since March 2009, DHS has doubled the number of personnel assigned to Border Enforcement Security Task Forces; tripled the number of ICE intelligence analysts working along the U.S.-Mexico border; quadrupled deployments of Border Liaison Officers; and begun screening 100 percent of southbound rail shipments for illegal weapons, drugs, and cash – for the first time ever. DHS has also deployed additional canine teams trained to detect drugs and weapons and non-intrusive inspection technology that help identify anomalies in passenger vehicles at the Southwest Border. CBP has also worked closely with the Federal Aviation Administration (FAA) to obtain Certificates of Authorization (COA) to operate Unmanned Aerial Systems (UAS), extending surveillance capability to personnel on the ground. The latest COA approvals have increased the miles of airspace available for UAS operations above Texas, enabling CBP to deploy its unmanned aircraft from the eastern tip of California, across the land borders of Arizona, New Mexico, and Texas, and into the maritime border just short of the Texas and Louisiana border. These initiatives and investments have yielded impressive results. Seizures of contraband along the Southwest border have increased across the board and illegal crossings continue to decline. In 2009, DHS seized over $39.2 million in southbound illegal currency— an increase of more than $29.4
  • 23. million compared to 2008. In total, DHS seized more than $103 million, 1.7 million kilograms of drugs, and 1,400 firearms in 2009—an increase of more than $47 million, 450,000 kilograms of drugs, and 300 firearms, respectively, compared to 2008. Additionally, overall apprehensions of illegal aliens decreased from 723,825 in FY2008 to 556,041 in FY2009, a 23 percent reduction, indicating that fewer people are attempting to illegally cross the border. To continue to bolster these efforts, President Obama recently requested $600 million in supplemental funds for enhanced border protection and law enforcement activities, and announced the deployment of up to 1,200 National Guard Troops to the Southwest border to contribute additional capabilities and capacity to assist law enforcement agencies. Interagency Efforts In June 2009, the Obama Administration released its Southwest Border Counternarcotics Strategy, which provides the Administration’s overarching framework to address the threats posed by the illicit narcotics trade along the Southwest border. DHS has also forged historic agreements with DOJ, increasing coordination between ICE and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and the Drug Enforcement Administration (DEA) on important Southwest border issues such as combating arms trafficking, bolstering information sharing and providing ICE agents the authority to work on important drug trafficking cases. DHS and the Office of National Drug Control Policy (ONDCP) are also partnering to develop and
  • 24. implement Project Roadrunner, an integrated license plate reader recognition system which will target both north- and southbound drug trafficking and associated illegal activity along the Southwest 10 border. Under this partnership, ONDCP will provide DHS with previously-purchased fixed and mobile cameras—expanding DHS’ existing capabilities at minimal cost. Collaboration with State and Local Law Enforcement The federal government has worked closely with state and local law enforcement along the border— leveraging the resources and capabilities of over 50 law enforcement agencies to crack down on transnational criminal organizations. DHS has increased the funding state and local law enforcement can use to combat border-related crime through Operation Stonegarden—a DHS grant program designed to support state, local, and tribal law enforcement efforts along the border. Based on risk, cross-border traffic and border-related threat intelligence, nearly 83 percent of 2009 and 2010 Operation Stonegarden funding went to Southwest border states. DHS is also forging a new partnership with major law enforcement associations to create the “Southwest Border Law Enforcement Compact”—designed to boost law enforcement at the border by enabling non-border state and local law enforcement
  • 25. agencies to detail officers to Southwest border state and local law enforcement agencies to focus on criminal networks operating along the border. Further, ICE is expanding the Joint Criminal Alien Removal Task Forces, comprised of ICE officers and local law enforcement agents who work together to identify and arrest convicted criminal aliens and deploying additional officers to work with state and local jails that are within 100 miles of the Southwest border to ensure the identification of all removable convicted criminal aliens who pose a danger to public safety. Additionally, DHS is strengthening the analytic capability of fusion centers across the Southwest border to receive and share threat information, and is working with DOJ to create a new system that will link the information systems of all state, local and tribal law enforcement entities operating along the Southwest border, as appropriate, with federal law enforcement. Finally, DHS is establishing a suspicious activities reporting program for the Southwest border. This will help local law enforcement officers on the front lines recognize and track incidents related to criminal activity by drug traffickers, integrate disparate information from across the border to identify trends and utilize this information for targeted law enforcement operations on both sides of the border. Increased Cooperation with Mexico Reflecting their unprecedented collaboration, Secretary
  • 26. Napolitano and her Mexican counterparts have signed numerous bilateral agreements and declarations to bolster cooperation in the areas of enforcement, planning, information and intelligence sharing, joint operations and trade facilitation along the Southwest border. For the first time in history, U.S. Border Patrol agents are coordinating joint operations along the Southwest border with Mexican Federal Police, and working together to prosecute human trafficking cases. In addition, the Department is increasing joint training programs with Mexican law enforcement agencies—focusing on money laundering and human trafficking investigations. ICE will 11 begin training Mexican customs investigators in August 2010, enabling Mexican Customs to support ICE investigations. To increase information sharing, the United States and Mexico are establishing a new cross-border communications network, which will improve incident response and coordination among participating federal, state, local, and tribal law enforcement and public safety personnel along the border. Additionally, ICE and the Government of Mexico have entered into a Criminal History Information Sharing Agreement in which ICE provides serious felony conviction information on Mexican nationals being repatriated to Mexico.
  • 27. In October 2009, ICE launched the Illegal Drug Program in Nogales, Arizona to refer narcotics smuggling cases declined for prosecution in the United States to the Mexican Office of the Attorney General for prosecution. In April 2010, ICE expanded this program to El Paso, Texas. DHS is expanding the program to four additional Southwest border ports of entry—for a total of six locations. In order to help define and ultimately disrupt the movement of criminal proceeds from the United States to Mexico, the Office of Counternarcotics Enforcement, ICE, and the Government of Mexico for the first time ever collaborated in April 2009 on the Bi - National Criminal Proceeds Study, which describes the criminal proceeds supply chain and quantifies important indicators of this illegal financial network. Northern Border and Increased Cooperation with Canada DHS has made critical security improvements along the Northern border, investing in additional Border Patrol agents, technology, and infrastructure. By the end of 2010, DHS will have more than 2,200 agents on the Northern border, a 700 percent increase since 9/11. DHS is also deploying technology, including thermal camera systems, Mobile Surveillance Systems, and a Remote Video Surveillance System, to the Northern border, and is using Recovery Act funds to modernize 29 CBP- owned land ports of entry along the Northern border to meet the security and operational standards of our post-9/11 world. In May 2009, Secretary Napolitano signed the Shiprider
  • 28. Agreement with Canada to make joint law enforcement teams permanent along the international maritime border. In November 2009, Secretary Napolitano and Public Safety Canada Minister Peter Van Loan agreed on a series of initiatives to combat common threats, including measures to streamline border shipping, assist one another during emergencies, and recognize NEXUS and FAST trusted traveler program cards at all land and sea border ports of entry. Additionally, investigators and intelligence analysts from DHS, the Canada Border Services Agency, and the Royal Canadian Mounted Police share information and analysis through Integrated Border Enforcement Teams and Border Enforcement Security Teams along the border. In July 2010, Secretary Napolitano and Canadian Minister of Public Safety Vic Toews announced the first-ever U.S.-Canada Joint Critical Infrastructure Action Plan, enabling both countries to more effectively address a range of cross border critical infrastructure issues and work together to share information, identify interdependencies and conduct exercises. They also announced the ICE, CBP, and Canada Border Services Agency currency seizure Memorandum of Understanding, which will help law enforcement officials and border services officers better identify potential threats and assist in money-laundering and terrorist-financing investigations and prosecutions. They also announced a 12
  • 29. joint border threat and risk assessment to ensure a common understanding of the threats and challenges, which will enable a coordinated approach to addressing them. STRENGTHENING PREPAREDNESS EFFORTS RECOMMENDATION: Allocate homeland security funds based on risk DHS uses risk-based methodology to identify areas eligible for homeland security grants, accounting for threats, population, economic output, and prevalence of critical infrastructure. In FY2010, DHS awarded the following security grants to assist state, local, and tribal governments and the private sector in strengthening preparedness for acts of terrorism, major disasters, and other emergencies based on risk: o $842 million for the State Homeland Security Program to build and strengthen preparedness capabilities at all levels through planning, equipment, and readiness. o $832 million for the Urban Areas Security Initiative to enhance urban preparedness capabilities in 64 high-threat, high-density areas, with the seven highest risk areas (Tier 1) receiving 61 percent of available funds. o $541 million and an additional $300 million in Recovery Act funds for Port and Transit Security Grant Programs to create a sustainable, risk-based effort to protect critical infrastructure from terrorism.
  • 30. o $48 million for the Interoperable Emergency Communications Grant Program for planning, training, exercises and equipment to states, territories, and local and tribal governments to carry out initiatives identified in Statewide Communication Interoperability Plans. o $60 million for the Operation Stonegarden Grant Program to enhance law enforcement preparedness and operational readiness along the border. Based on risk, cross-border traffic and border-related threat intelligence, nearly 80 percent of the funding went to the Southwest border states. In addition to these grant programs, the Science and Technology Directorate published the 2010 Bioterrorism Risk Assessment (classified) in January of 2010 to inform all federal decision-making about resource allocation and risk manage ment regarding homeland security, infrastructure protection, detectors (such as BioWatch sensors) countermeasures, response plans, and overall consequence management capabilities. RECOMMENDATION: Improve interoperable communications at all levels of government DHS has implemented multiple programs to improve interoperable communications across the Department. As noted above, DHS awarded $48 million through the Interoperable Emergency Communication Grant Program in FY 2010 to fund state and local activities that assist in the
  • 31. implementation of the National Emergency Communications Plan and the Statewide Communication Interoperability Plans. The Science and Technology Directorate (S&T) is in the final stages of testing the Multi-Band Radio, a portable radio that enables emergency responders to communicate with partner agencies regardless of radio band. 13 USCG is in the process of establishing Interagency Operations Centers throughout the nation’s ports by deploying the Rescue 21 coastal command, control, and communications system and the Watchkeeper information sharing and operational planning and coordination system. The USCG has also developed Mobile Command Center capability, which consists of two Enhanced Mobile Incident Command Posts positioned on each coast, providing robust, interoperable communications anywhere in the world. As mentioned above, as part of the effort to improve international interoperable communications, the United States and Mexico are establishing a new cross-border communications network, which will improve incident response and coordination among participating federal, state, local, and tribal law enforcement and public safety personnel along the border. Additionally, the Federal Emergency Management Agency (FEMA) is currently developing the nation’s next-generation infrastructure of
  • 32. alert and warning capabilities, the Integrated Public Alert and Warning System, which will expand to new mediums of communication. RECOMMENDATION: Establish a unified incident command system DHS has incorporated the Incident Command System and National Response Framework into the National Incident Management System, which provides nationwide guidelines to clarify the roles of federal, state and local governments, nongovernmental organizations, and the private sector in protecting against, responding to and recovering from disasters. The response to the BP Deepwater Horizon Oil Spill—which spans all levels of government and includes the private sector— is an example of the implementation of this program, as it has been organized according to the Incident Command System to allow a unified, coordinated response under the leadership of the Department with the Coast Guard as the lead agency. DHS also developed the Unified Incident Command and Decision Project to share information and enhance multi-agency incident command systems and coordination. RECOMMENDATION: Prioritize private sector preparedness As part of our commitment to increase private sector preparedness, in June 2010, DHS announced the adoption of the final standards for the Voluntary Private Sector Preparedness Accreditation and Certification Program (PS-Prep)—a major milestone in DHS's implementation the 9/11 Commission’s recommendation to create a program to improve
  • 33. private sector preparedness for disasters and emergencies. RECOMMENDATION: Assess critical infrastructure and readiness In 2009, DHS revised the National Infrastructure Protection Plan (NIPP), to integrate the concepts of resiliency and protection, and broaden the focus of NIPP-related programs and activities to an all- hazards environment. In FY2010, DHS has provided the following Infrastructure Protection Program grants: 14 o $541 million and an additional $300 million in Recovery Act funds for Port and Transit Security Grant Programs to create a sustainable, risk-based effort to protect critical infrastructure from terrorism. o $48 million for the Buffer Zone Protection Program to increase prevention and protection capabilities of law enforcement agencies responsible for safeguarding critical infrastructure such as chemical facilities and nuclear power plants. o $11 million for the Intercity Bus Security Grant Program to support security plans, facility security upgrades, and vehicle and driver protection. DHS is also implementing the Chemical Facility Anti-Terrorism
  • 34. Standards to regulate national security at high-risk chemical facilities. To date, over 38,000 facilities have submitted data on their chemical holdings, and approximately 7,000 have been assessed for risk. The Department has also deployed Protective Security Advisors to all 50 states and Puerto Rico to support state, local, tribal and territorial officials and the private sector with critical infrastructure security efforts and to maintain effective information sharing and situational awareness. Additionally, USCG’s Maritime Security Risk Analysis Model has assessed over 22,000 potential terrorist targets spanning 13 critical infrastructure sectors. DHS also develops an annual National Risk Profile that provides an all-hazards assessment of risks facing critical infrastructure, including terrorist threats, cyber risks, and natural disasters. In November 2009, DHS launched a new Web site— dhs.gov/criticalinfrastructure—to inform the public about the Department’s critical infrastructure protection, readiness and resiliency efforts, part of an increased effort to heighten awareness about the importance of protecting America’s vital assets, systems and networks. PROTECTING PRIVACY AND CIVIL LIBERTIES RECOMMENDATION: Safeguard Individual Privacy When Sharing Information DHS involves its Office for Civil Rights and Civil Liberties and the Privacy Office from the outset of the policymaking process, building in rights and liberties
  • 35. protections to new security measures from the beginning. The DHS Privacy Office works to ensure privacy is protected when personally identifiable information is collected, used, shared, or maintained by the Department, and supports U.S. Government-wide policy initiatives governing information sharing by conducting Privacy Impact Assessments of information sharing systems. The Office for Civil Rights and Civil Liberties and the Privacy Office provide training on civil rights and civil liberties and privacy to intelligence analysts and state and local fusion center personnel. The DHS Privacy Office also supports the Fusion Center Program by reviewing fusion center privacy policies to ensure they adhere to the Information Sharing Environment Privacy Guidelines, participating in the creation of the DHS Joint Fusion Center Program Management Office, and providing training to the Interagency Threat Assessment and Coordination Group. 15 RECOMMENDATION: Maintain Civil Liberties While Protecting Security As noted above, DHS involves the Office for Civil Rights and Civil Liberties from the outset of the policymaking process, building in protections to new security measures through collaboration with communities and stakeholders across the country. The DHS Office for Civil Rights and Liberties created a Civil Liberties Impact Assessment process to review
  • 36. Departmental programs, and conduct regular outreach with American Arab, Muslim, Sikh, South Asian, and Somali community leaders, elected officials, and NGOs across the country. Recently, DHS has consulted with privacy, civil rights, and civil liberties advocates about how to build privacy and civil liberties protections into Advanced Imaging Technology, and its operating policies. DHS is working with communities across the country on preventing violent crime motivated by ideology and on leveraging successful models like community policing. In Summer 2010, DHS and DOJ will launch the “Building Communities of Trust” initiative to enhance local efforts to understand and mitigate the threats facing communities. These efforts include a public education element through the expansion of the “See Something Say Something” campaign—a simple and effective program to raise public awareness of indicators of terrorism, crime and other threats and emphasize the importance of reporting suspicious activity to the proper transportation and law enforcement authorities. This program was originally implemented by New York City's Metropolitan Transit Authority and was funded, in part, by $13 million from DHS' Transit Security Grant Program. IMPROVING COLLABORATION AND INFORMATION SHARING RECOMMENDATION: Provide Incentives for Information Sharing
  • 37. Cybersecurity In October 2009, DHS opened the new National Cybersecurity and Communications Integration Center—a 24-hour, DHS-led coordinated watch and warning center to improve national efforts to address threats and incidents affecting the nation's critical information technology and cyber infrastructure. Tailoring Information Sharing to State, Local, Tribal and Territorial Customers DHS, working closely with the FBI, has re-focused its information sharing and production efforts to better address the needs of state, local, tribal, and territorial governments. DHS continually works with senior law enforcement officials from the largest metropolitan areas, the directors of fusion centers, and State Homeland Security Advisors to tailor the Department’s efforts, particularly information sharing initiatives, to better support the efforts of state, local, tribal, and territorial law enforcement to protect local communities. State and Major Urban Area Fusion Centers DHS supports state and major urban area fusion centers across the country, which share information and intelligence within their jurisdictions as well as with the federal government. To date, 72 state and major urban area analytic centers have been designated as fusion centers by state and local authorities throughout the country. DHS has deployed Homeland Security Data Network (HSDN) systems to the state and major urban area fusion centers, enabling the federal government to share 16
  • 38. information and intelligence – including classified terrorism- related threat information – with state, local, tribal, and territorial partners. DHS has also placed federal Intelligence Officers at state and major urban area fusion centers, who act as the primary liai son between the federal governments and state, local, tribal, and territorial partners. Nationwide Suspicious Activities Reporting Initiative DHS, in conjunction with DOJ, is also working to implement the Nationwide Suspicious Activities Reporting Initiative (NSI) across the nation. The NSI provides the foundation for state and local efforts to identify and mitigate emerging terrorism related threats through training, reporting and analysis while ensuring privacy and civil liberties are protected. Currently, NSI capability exists in three states (New York, Florida, and Virginia), and nine major cities (Boston, District of Columbia, Chicago, Los Angeles, Las Vegas, Houston, Phoenix, Seattle, and Miami-Dade). Twelve additional states are expected to implement NSI by Fall 2010. These efforts include a public education element through the expansion of the “See Something Say Something” campaign—a simple and effective program to raise public awareness of indicators of terrorism, crime and other threats, and emphasize the importance of reporting suspicious activity to the proper transportation and law enforcement authorities. The program was originally implemented by New York City's Metropolitan Transit Authority and was funded, in part, by $13 million from
  • 39. DHS' Transit Security Grant Program. Improved Analysis of Travel-Related Data DHS, in partnership with the National Counterterrorism Center and other federal entities, has expanded efforts to analyze travel related data in order to better understand the travel patterns of known and suspected terrorists. Leveraging threat-related intelligence, travel-related data has been essential in identifying, targeting, and interdicting known and suspected terrorists prior to entering the United States or boarding a flight bound for the United States. First Responders Community of Practice In April 2010, DHS launched the First Responders Community of Practice, which allows law enforcement, emergency medical services, and emergency management personnel to share best practices and solutions with other professionals, enabling them to more efficiently and effectively prepare for disasters. QHSR AND THE BOTTOM UP REVIEW In February 2010, the Department of Homeland Security published our Nation’s first ever comprehensive review of America’s strategy for homeland security—the Quadrennial Homeland Security Review (QHSR). The QHSR was the first step in setting the strategic path forward to guide the activities of the homeland security enterprise toward a common end: a homeland that is safe, secure, and resilient against terrorism and other hazards. The QHSR identified five core mission areas of homeland security—preventing terrorism and enhancing security, securing and managing our
  • 40. borders, enforcing and administering our immigration laws, safeguarding and securing cyberspace, and ensuring resilience to disasters. A bottom-up review (BUR) of the Department of Homeland Security was initiated in November 2009 as an immediate follow-on and complement to the QHSR. The BUR resulted in a comprehensive 17 catalogue of DHS activities across the homeland security missions. The BUR Report distills the results of this analysis, describing the alignment of the Department and setting forth the Department’s priority initiatives and enhancements to increase mission performance, improve Departmental management, and increase accountability over the next four years. The Department’s FY 2012 budget request will begin the process of implementing the BUR initiatives and enhancements, and the corresponding FY 2012- 2016 Future Years Homeland Security Program will set forth the budget plan required to provide sufficient resources to successfully execute the Department’s responsibilities across the full range of homeland security missions as described in the QHSR, with a priority placed on the initiatives and enhancements set forth in the BUR Report. ### 18
  • 41. THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page i List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71
  • 42. 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— . . . in the Law Enforcement Community 73 3.3 . . . and in the Federal Aviation Administration 82 3.4 . . . and in the Intelligence Community 86 CONTENTS v Final FM.1pp 7/17/04 5:25 PM Page v 3.5 . . . and in the State Department and the Defense Department 93 3.6 . . . and in the White House 98 3.7 . . . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis: August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. AL QAEDA AIMS AT THE AMERICAN HOMELAND 145 5.1 Terrorist Entrepreneurs 145 5.2 The “Planes Operation” 153 5.3 The Hamburg Contingent 160 5.4 A Money Trail? 169 6. FROM THREAT TO THREAT 174
  • 43. 6.1 The Millennium Crisis 174 6.2 Post-Crisis Reflection: Agenda for 2000 182 6.3 The Attack on the USS Cole 190 6.4 Change and Continuity 198 6.5 The New Administration’s Approach 203 7. THE ATTACK LOOMS 215 7.1 First Arrivals in California 215 7.2 The 9/11 Pilots in the United States 223 7.3 Assembling the Teams 231 7.4 Final Strategies and Tactics 241 8. “THE SYSTEM WAS BLINKING RED” 254 8.1 The Summer of Threat 254 8.2 Late Leads—Mihdhar, Moussaoui, and KSM 266 9. HEROISM AND HORROR 278 9.1 Preparedness as of September 11 278 9.2 September 11, 2001 285 9.3 Emergency Response at the Pentagon 311 9.4 Analysis 315 vi Final FM.1pp 7/17/04 5:25 PM Page vi 10. WARTIME 325 10.1 Immediate Responses at Home 326 10.2 Planning for War 330 10.3 “Phase Two” and the Question of Iraq 334 11. FORESIGHT—AND HINDSIGHT 339 11.1 Imagination 339 11.2 Policy 348
  • 44. 11.3 Capabilities 350 11.4 Management 353 12. WHAT TO DO? A GLOBAL STRATEGY 361 12.1 Reflecting on a Generational Challenge 361 12.2 Attack Terrorists and Their Organizatio ns 365 12.3 Prevent the Continued Growth of Islamist Terrorism 374 12.4 Protect against and Prepare for Terrorist Attacks 383 13. HOW TO DO IT? A DIFFERENT WAY OF ORGANIZING THE GOVERNMENT 399 13.1 Unity of Effort across the Foreign-Domestic Divide 400 13.2 Unity of Effort in the Intelligence Community 407 13.3 Unity of Effort in Sharing Information 416 13.4 Unity of Effort in the Congress 419 13.5 Organizing America’s Defenses in the United States 423 Appendix A: Common Abbreviations 429 Appendix B:Table of Names 431 Appendix C: Commission Hearings 439 Notes 449 vii Final FM.1pp 7/17/04 5:25 PM Page vii Final FM.1pp 7/17/04 5:25 PM Page viii
  • 45. p. 15 FAA Air Traffic Control Centers p. 15 Reporting structure, Northeast Air Defense Sector p. 32–33 Flight paths and timelines p. 49 Usama Bin Ladin p. 64 Map of Afghanistan p. 148 Khalid Sheikh Mohammed p. 238–239 The 9/11 hijackers p. 279 The World Trade Center Complex as of 9/11 p. 284 The World Trade Center radio repeater system p. 288 The World Trade Center North Tower stairwell with deviations p. 312 The Twin Towers following the impact of American Airlines Flight 11 and United Airlines Flight 175 p. 313 The Pentagon after being struck by American Airlines Flight 77 p. 313 American Airlines Flight 93 crash site, Shanksville, Pennsylvania p. 413 Unity of effort in managing intelligence LIST OF ILLUSTRATIONS AND TABLES ix Final FM.1pp 7/17/04 5:25 PM Page ix Final FM.1pp 7/17/04 5:25 PM Page x Thomas H. Kean chair
  • 46. Richard Ben-Veniste Fred F. Fielding Jamie S. Gorelick Slade Gorton Lee H. Hamilton vice chair Bob Kerrey John F. Lehman Timothy J. Roemer James R.Thompson COMMISSION MEMBERS Final FM.1pp 7/17/04 5:25 PM Page xi Final FM.1pp 7/17/04 5:25 PM Page xii Joanne M. Accolla Staff Assistant Alexis Albion Professional Staff Member Scott H. Allan, Jr.
  • 47. Counsel John A. Azzarello Counsel Caroline Barnes Professional Staff Member Warren Bass Professional Staff Member Ann M. Bennett Information Control Officer Mark S. Bittinger Professional Staff Member Madeleine Blot Counsel Antwion M. Blount Systems Engineer Sam Brinkley Professional Staff Member Geoffrey Scott Brown Research Assistant Daniel Byman Professional Staff Member Dianna Campagna Manager of Operations Samuel M.W. Caspersen Counsel Melissa A. Coffey Staff Assistant Lance Cole Consultant Marquittia L. Coleman Staff Assistant Marco A. Cordero Professional Staff Member Rajesh De Counsel
  • 48. George W. Delgrosso Investigator Gerald L. Dillingham Professional Staff Member Thomas E. Dowling Professional Staff Member Steven M. Dunne Deputy General Counsel Thomas R. Eldridge Counsel Alice Falk Editor John J. Farmer, Jr. Senior Counsel & Team Leader Alvin S. Felzenberg Deputy for Communications COMMISSION STAFF xiii Philip Zelikow, Executive Director Christopher A. Kojm, Deputy Executive Director Daniel Marcus, General Counsel Final FM.1pp 7/17/04 5:25 PM Page xiii Lorry M. Fenner Professional Staff Member Susan Ginsburg Senior Counsel & Team Leader T. Graham Giusti
  • 49. Security Officer Nicole Marie Grandrimo Professional Staff Member Douglas N. Greenburg Counsel Barbara A. Grewe Senior Counsel, Special Projects Elinore Flynn Hartz Family Liaison Leonard R. Hawley Professional Staff Member L. Christine Healey Senior Counsel & Team Leader Karen Heitkotter Executive Secretary Walter T. Hempel II Professional Staff Member C. Michael Hurley Senior Counsel & Team Leader Dana J. Hyde Counsel John W. Ivicic Security Officer Michael N. Jacobson Counsel Hunter W. Jamerson Intern Bonnie D. Jenkins Counsel Reginald F. Johnson Staff Assistant R.William Johnstone Professional Staff Member Stephanie L. Kaplan Special Assistant & Managing Editor Miles L. Kara, Sr.
  • 50. Professional Staff Member Janice L. Kephart Counsel Hyon Kim Counsel Katarzyna Kozaczuk Financial Assistant Gordon Nathaniel Lederman Counsel Daniel J. Leopold Staff Assistant Sarah Webb Linden Professional Staff Member Douglas J. MacEachin Professional Staff Member & Team Leader Ernest R. May Senior Adviser Joseph McBride Intern James Miller Professional Staff Member Kelly Moore Professional Staff Member Charles M. Pereira Professional Staff Member John Raidt Professional Staff Member John Roth Senior Counsel & Team Leader Peter Rundlet Counsel Lloyd D. Salvetti Professional Staff Member Kevin J. Scheid Professional Staff Member & Team Leader
  • 51. Kevin Shaeffer Professional Staff Member Tracy J. Shycoff Deputy for Administration & Finance Dietrich L. Snell Senior Counsel & Team Leader Jonathan DeWees Stull Communications Assistant Lisa Marie Sullivan Staff Assistant Quinn John Tamm, Jr. Professional Staff Member Catharine S.Taylor Staff Assistant Yoel Tobin Counsel Emily Landis Walker Professional Staff Member & Family Liaison Garth Wermter Senior IT Consultant Serena B.Wille Counsel Peter Yerkes Public Affairs Assistant xiv COMMISSION STAFF xiv Final FM.1pp 7/17/04 5:26 PM Page xiv We p re se nt th e narrat ive of this report and the recommendations that flow from it to the President of the United States, the
  • 52. United States Congress, and the American people for their consideration. Ten Commissioners—five Republicans and five Democrats chosen by elected leaders from our nation’s capital at a time of great partisan division—have come together to present this report without dissent. We have come together with a unity of purpose because our nation demands it. September 11, 2001, was a day of unprecedented shock and suf- fering in the history of the United States.The nation was unprepared. How did this happen, and how can we avoid such tragedy again? To answer these questions, the Congress and the President created the National Commission on Terrorist Attacks Upon the United States (Public Law 107-306, November 27, 2002). Our mandate was sweeping.The law directed us to investigate “facts and circumstances relating to the terrorist attacks of September 11, 2001,” includ- ing those relating to intelligence agencies, law enforcement agencies, diplo- macy, immigration issues and border control, the flow of assets to terrorist organizations, commercial aviation, the role of congressional oversight and resource allocation, and other areas determined relevant by the Commission. In pursuing our mandate, we have reviewed more than 2.5
  • 53. million pages of documents and interviewed more than 1,200 individuals in ten countries. This included nearly every senior official from the current and previous administrations who had responsibility for topics covered in our mandate. We have sought to be independent, impartial, thorough, and nonpartisan. From the outset, we have been committed to share as much of our investi- gation as we can with the American people.To that end, we held 19 days of hearings and took public testimony from 160 witnesses. PREFACE xv Final FM.1pp 7/17/04 5:26 PM Page xv Our aim has not been to assign individual blame. Our aim has been to provide the fullest possible account of the events surrounding 9/11 and to identify lessons learned. We learned about an enemy who is sophisticated, patient, disciplined, and lethal.The enemy rallies broad support in the Arab and Muslim world by demanding redress of political grievances, but its hostility toward us and
  • 54. our values is limitless. Its purpose is to rid the world of religious and polit- ical pluralism, the plebiscite, and equal rights for women. It makes no dis- tinction between military and civilian targets. Collateral damage is not in its lexicon. We learned that the institutions charged with protecting our borders, civil aviation, and national security did not understand how grave this threat could be, and did not adjust their policies, plans, and practices to deter or defeat it.We learned of fault lines within our government — between foreign and domestic intelligence, and between and within agenci es.We learned of the pervasive problems of managing and sharing information across a large and unwieldy government that had been built in a different era to confront different dangers. At the outset of our work, we said we were looking backward in order to look forward. We hope that the terrible losses chronicled in this report can create something positive—an America that is safer, stronger, and wiser. That September day, we came together as a nation. The test before us is to sustain that unity of purpose and meet the challenges now confronting us. We need to design a balanced strategy for the long haul, to
  • 55. attack terror- ists and prevent their ranks from swelling while at the same time protecting our country against future attacks. We have been forced to think about the way our government is organized. The massive departments and agencies that prevailed in the great struggles of the twentieth century must work together in new ways, so that all the instruments of national power can be combined. Congress needs dramatic change as well to strengthen oversight and focus accountability. As we complete our final report, we want to begin by thanking our fel- low Commissioners, whose dedication to this task has been profound. We have reasoned together over every page, and the report has benefited from this remarkable dialogue. We want to express our considerable respect for the intellect and judgment of our colleagues, as well as our great affection for them. We want to thank the Commission staff.The dedicated professional staff, headed by Philip Zelikow, has contributed innumerable hours to the com- pletion of this report, setting aside other important endeavors to take on this xvi PREFACE
  • 56. Final FM.1pp 7/17/04 5:26 PM Page xvi all-consuming assignment. They have conducted the exacting investigative work upon which the Commission has built.They have given good advice, and faithfully carried out our guidance.They have been superb. We thank the Congress and the President. Executive branch agencies have searched records and produced a multitude of documents for us. We thank officials, past and present, who were generous with their time and provided us with insight. The PENTTBOM team at the FBI, the Director’s Review Group at the CIA, and Inspectors General at the Department of Justice and the CIA provided great assistance. We owe a huge debt to their investigative labors, painstaking attention to detail, and readiness to share what they have learned. We have built on the work of several previous Commissions, and we thank the Congressional Joint Inquiry, whose fine work helped us get started.We thank the City of New York for assistance with documents and witnesses, and the Government Printing Office and W.W. Norton & Company for helping to get this report to the broad public. We conclude this list of thanks by coming full circle:We thank
  • 57. the fam- ilies of 9/11, whose persistence and dedication helped create the Commission. They have been with us each step of the way, as partners and witnesses.They know better than any of us the importance of the work we have undertaken. We want to note what we have done, and not done.We have endeavored to provide the most complete account we can of the events of September 11, what happened and why.This final report is only a summary of what we have done, citing only a fraction of the sources we have consulted. But in an event of this scale, touching so many issues and organizations, we are conscious of our limits.We have not interviewed every knowledgeable per- son or found every relevant piece of paper. New information inevitably will come to light. We present this report as a foundation for a better under- standing of a landmark in the history of our nation. We have listened to scores of overwhelming personal tragedies and astounding acts of heroism and bravery. We have examined the staggering impact of the events of 9/11 on the American people and their amazing resilience and courage as they fought back.We have admired their determi- nation to do their best to prevent another tragedy while preparing to
  • 58. respond if it becomes necessary. We emerge from this investigation with enormous sympathy for the victims and their loved ones, and with enhanced respect for the American people. We recognize the formidable challenges that lie ahead. We also approach the task of recommendations with humility. We have PREFACE xvii Final FM.1pp 7/17/04 5:26 PM Page xvii made a limited number of them. We decided consciously to focus on rec- ommendations we believe to be most important, whose implementation can make the greatest difference. We came into this process with strong opinions about what would work. All of us have had to pause, reflect, and sometimes change our minds as we studied these problems and considered the views of others.We hope our report will encourage our fellow citizens to study, reflect—and act. xviii PREFACE Thomas H. Kean chair
  • 59. Lee H. Hamilton vice chair Final FM.1pp 7/17/04 5:26 PM Page xviii THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:26 PM Page xix Final FM.1pp 7/17/04 5:26 PM Page xx 1 “WE HAVE SOME PLANES” 1 Tue sday, S e p te m b e r 11, 2 0 01, dawned temperate and nearly cloudless in the eastern United States. Millions of men and women readied themselves for work. Some made their way to the Twin Towers, the signature structures of the World Trade Center complex in New York City. Others went to Arlington,Vir- ginia, to the Pentagon. Across the Potomac River, the United
  • 60. States Congress was back in session. At the other end of Pennsylvania Avenue, people began to line up for a White House tour. In Sarasota, Florida, President George W. Bush went for an early morning run. For those heading to an airport, weather conditions could not have been better for a safe and pleasant journey.Among the travelers were Mohamed Atta and Abdul Aziz al Omari, who arrived at the airport in Portland, Maine. 1.1 INSIDE THE FOUR FLIGHTS Boarding the Flights Boston:American 11 and United 175. Atta and Omari boarded a 6:00 A.M. flight from Portland to Boston’s Logan International Airport.1 When he checked in for his flight to Boston, Atta was selected by a com- puterized prescreening system known as CAPPS (Computer Assisted Passen- ger Prescreening System), created to identify passengers who should be subject to special security measures. Under security rules in place at the time, the only consequence of Atta’s selection by CAPPS was that his checked bags were held off the plane until it was confirmed that he had boarded the air- craft. This did not hinder Atta’s plans.2 Atta and Omari arrived in Boston at 6:45. Seven minutes later,
  • 61. Atta appar- ently took a call from Marwan al Shehhi, a longtime colleague who was at another terminal at Logan Airport.They spoke for three minutes.3 It would be their final conversation. Final1-4.4pp 7/17/04 9:12 AM Page 1 Between 6:45 and 7:40, Atta and Omari, along with Satam al Suqami,Wail al Shehri, and Waleed al Shehri, checked in and boarded American Airlines Flight 11, bound for Los Angeles.The flight was scheduled to depart at 7:45.4 In another Logan terminal, Shehhi, joined by Fayez Banihammad, Mohand al Shehri, Ahmed al Ghamdi, and Hamza al Ghamdi, checked in for United Airlines Flight 175, also bound for Los Angeles.A couple of Shehhi’s colleagues were obviously unused to travel; according to the United ticket agent, they had trouble understanding the standard security questions, and she had to go over them slowly until they gave the routine, reassuring answers.5 Their flight was scheduled to depart at 8:00. The security checkpoints through which passengers, including Atta and his colleagues, gained access to the American 11 gate were operated by Globe
  • 62. Security under a contract with American Airlines. In a different terminal, the single checkpoint through which passengers for United 175 passed was con- trolled by United Airlines, which had contracted with Huntleigh USA to per- form the screening.6 In passing through these checkpoints, each of the hijackers would have been screened by a walk-through metal detector calibrated to detect items with at least the metal content of a .22-caliber handgun. Anyone who might have set off that detector would have been screened with a hand wand—a procedure requiring the screener to identify the metal item or items that caused the alarm. In addition, an X-ray machine would have screened the hijackers’ carry-on belongings.The screening was in place to identify and confiscate weapons and other items prohibited from being carried onto a commercial flight.7 None of the checkpoint supervisors recalled the hijackers or reported anything suspi- cious regarding their screening.8 While Atta had been selected by CAPPS in Portland, three members of his hijacking team—Suqami,Wail al Shehri, and Waleed al Shehri— were selected in Boston.Their selection affected only the handling of their checked bags, not their screening at the checkpoint. All five men cleared the checkpoint and
  • 63. made their way to the gate for American 11. Atta, Omari, and Suqami took their seats in business class (seats 8D, 8G, and 10B, respectively). The Shehri brothers had adjacent seats in row 2 (Wail in 2A, Waleed in 2B), in the first- class cabin. They boarded American 11 between 7:31 and 7:40. The aircraft pushed back from the gate at 7:40.9 Shehhi and his team, none of whom had been selected by CAPPS, boarded United 175 between 7:23 and 7:28 (Banihammad in 2A, Shehri in 2B, Shehhi in 6C, Hamza al Ghamdi in 9C, and Ahmed al Ghamdi in 9D).Their aircraft pushed back from the gate just before 8:00.10 Washington Dulles:American 77. Hundreds of miles southwest of Boston, at Dulles International Airport in the Virginia suburbs of Washington, D.C., five more men were preparing to take their early morning flight.At 7:15, a pair 2 THE 9/11 COMMISSION REPORT Final1-4.4pp 7/17/04 9:12 AM Page 2 of them, Khalid al Mihdhar and Majed Moqed, checked in at the American Airlines ticket counter for Flight 77, bound for Los Angeles.Within the next 20 minutes, they would be followed by Hani Hanjour and two
  • 64. brothers, Nawaf al Hazmi and Salem al Hazmi.11 Hani Hanjour, Khalid al Mihdhar, and Majed Moqed were flagged by CAPPS.The Hazmi brothers were also selected for extra scrutiny by the air- line’s customer service representative at the check-in counter. He did so because one of the brothers did not have photo identification nor could he understand English, and because the agent found both of the passengers to be suspicious.The only consequence of their selection was that their checked bags were held off the plane until it was confirmed that they had boarded the aircraft.12 All five hijackers passed through the Main Terminal’s west security screen- ing checkpoint; United Airlines, which was the responsible air carrier, had contracted out the work to Argenbright Security.13 The checkpoint featured closed-circuit television that recorded all passengers, including the hijackers, as they were screened. At 7:18, Mihdhar and Moqed entered the security checkpoint. Mihdhar and Moqed placed their carry-on bags on the belt of the X-ray machine and proceeded through the first metal detector. Both set off the alarm, and they were directed to a second metal detector. Mihdhar did
  • 65. not trigger the alarm and was permitted through the checkpoint. After Moqed set it off, a screener wanded him. He passed this inspection.14 About 20 minutes later, at 7:35, another passenger for Flight 77, Hani Han- jour, placed two carry-on bags on the X-ray belt in the Main Terminal’s west checkpoint, and proceeded, without alarm, through the metal detector. A short time later, Nawaf and Salem al Hazmi entered the same checkpoint. Salem al Hazmi cleared the metal detector and was permitted through; Nawaf al Hazmi set off the alarms for both the first and second metal detectors and was then hand-wanded before being passed. In addition, his over-the- shoulder carry-on bag was swiped by an explosive trace detector and then passed. The video footage indicates that he was carrying an unidentified item in his back pocket, clipped to its rim.15 When the local civil aviation security office of the Federal Aviation Admin- istration (FAA) later investigated these security screening operations, the screeners recalled nothing out of the ordinary.They could not recall that any of the passengers they screened were CAPPS selectees. We asked a screening expert to review the videotape of the hand-wanding, and he found the qual- ity of the screener’s work to have been “marginal at best.” The
  • 66. screener should have “resolved” what set off the alarm; and in the case of both Moqed and Hazmi, it was clear that he did not.16 At 7:50, Majed Moqed and Khalid al Mihdhar boarded the flight and were seated in 12A and 12B in coach. Hani Hanjour, assigned to seat 1B (first class), “WE HAVE SOME PLANES” 3 Final1-4.4pp 7/17/04 9:12 AM Page 3 soon followed.The Hazmi brothers, sitting in 5E and 5F, joined Hanjour in the first-class cabin.17 Newark: United 93. Between 7:03 and 7:39, Saeed al Ghamdi, Ahmed al Nami, Ahmad al Haznawi, and Ziad Jarrah checked in at the United Airlines ticket counter for Flight 93, going to Los Angeles.Two checked bags; two did not. Haznawi was selected by CAPPS. His checked bag was screened for explo- sives and then loaded on the plane.18 The four men passed through the security checkpoint, owned by United Airlines and operated under contract by Argenbright Security. Like the check- points in Boston, it lacked closed-circuit television surveillance so there is no
  • 67. documentary evidence to indicate when the hijackers passed through the checkpoint, what alarms may have been triggered, or what security procedures were administered.The FAA interviewed the screeners later; none recalled any- thing unusual or suspicious.19 The four men boarded the plane between 7:39 and 7:48. All four had seats in the first-class cabin; their plane had no business-class section. Jarrah was in seat 1B, closest to the cockpit; Nami was in 3C, Ghamdi in 3D, and Haznawi in 6B.20 The 19 men were aboard four transcontinental flights.21 They were plan- ning to hijack these planes and turn them into large guided missiles, loaded with up to 11,400 gallons of jet fuel. By 8:00 A.M. on the morning of Tuesday, September 11, 2001, they had defeated all the security layers that America’s civil aviation security system then had in place to prevent a hijacking. The Hijacking of American 11 American Airlines Flight 11 provided nonstop service from Boston to Los Angeles. On September 11, Captain John Ogonowski and First Officer Thomas McGuinness piloted the Boeing 767. It carried its full capacity of nine flight attendants. Eighty-one passengers boarded the flight with them (includ-
  • 68. ing the five terrorists).22 The plane took off at 7:59. Just before 8:14, it had climbed to 26,000 feet, not quite its initial assigned cruising altitude of 29,000 feet.All communications and flight profile data were normal. About this time the “Fasten Seatbelt” sign would usually have been turned off and the flight attendants would have begun preparing for cabin service.23 At that same time, American 11 had its last routine communication with the ground when it acknowledged navigational instructions from the FAA’s air traffic control (ATC) center in Boston. Sixteen seconds after that transmis- sion,ATC instructed the aircraft’s pilots to climb to 35,000 feet.That message and all subsequent attempts to contact the flight were not acknowledged. From this and other evidence, we believe the hijacking began at 8:14 or shortly thereafter.24 4 THE 9/11 COMMISSION REPORT Final1-4.4pp 7/17/04 9:12 AM Page 4 Reports from two flight attendants in the coach cabin, Betty Ong and Madeline “Amy” Sweeney, tell us most of what we know about how the
  • 69. hijacking happened. As it began, some of the hijackers—most likely Wail al Shehri and Waleed al Shehri, who were seated in row 2 in first class—stabbed the two unarmed flight attendants who would have been preparing for cabin service.25 We do not know exactly how the hijackers gained access to the cockpit; FAA rules required that the doors remain closed and locked during flight. Ong speculated that they had “jammed their way” in. Perhaps the terrorists stabbed the flight attendants to get a cockpit key, to force one of them to open the cock- pit door, or to lure the captain or first officer out of the cockpit. Or the flight attendants may just have been in their way.26 At the same time or shortly thereafter, Atta—the only terrorist on board trained to fly a jet—would have moved to the cockpit from his business-class seat, possibly accompanied by Omari.As this was happening, passenger Daniel Lewin, who was seated in the row just behind Atta and Omari, was stabbed by one of the hijackers—probably Satam al Suqami, who was seated directly behind Lewin. Lewin had served four years as an officer in the Israeli military. He may have made an attempt to stop the hijackers in front of him, not real- izing that another was sitting behind him.27
  • 70. The hijackers quickly gained control and sprayed Mace, pepper spray, or some other irritant in the first-class cabin, in order to force the passengers and flight attendants toward the rear of the plane.They claimed they had a bomb.28 About five minutes after the hijacking began, Betty Ong contacted the American Airlines Southeastern Reservations Office in Cary, North Carolina, via an AT&T airphone to report an emergency aboard the flight.This was the first of several occasions on 9/11 when flight attendants took action outside the scope of their training, which emphasized that in a hijacking, they were to communicate with the cockpit crew.The emergency call lasted approximately 25 minutes, as Ong calmly and professionally relayed information about events taking place aboard the airplane to authorities on the ground.29 At 8:19, Ong reported:“The cockpit is not answering, somebody’s stabbed in business class—and I think there’s Mace—that we can’t breathe—I don’t know, I think we’re getting hijacked.” She then told of the stabbings of the two flight attendants.30 At 8:21, one of the American employees receiving Ong’s call in North Car- olina, Nydia Gonzalez, alerted the American Airlines operations center in Fort Worth,Texas, reaching Craig Marquis, the manager on duty.
  • 71. Marquis soon real- ized this was an emergency and instructed the airline’s dispatcher responsible for the flight to contact the cockpit. At 8:23, the dispatcher tried unsuccessfully to contact the aircraft. Six minutes later, the air traffic control specialist in Amer- ican’s operations center contacted the FAA’s Boston Air Traffic Control Center about the flight. The center was already aware of the problem.31 “WE HAVE SOME PLANES” 5 Final1-4.4pp 7/17/04 9:12 AM Page 5 Boston Center knew of a problem on the flight in part because just before 8:25 the hijackers had attempted to communicate with the passengers. The microphone was keyed, and immediately one of the hijackers said, “Nobody move. Everything will be okay. If you try to make any moves, you’ll endanger yourself and the airplane. Just stay quiet.”Air traffic controllers heard the trans- mission; Ong did not.The hijackers probably did not know how to operate the cockpit radio communication system correctly, and thus inadvertently broad- cast their message over the air traffic control channel instead of the cabin public-address channel. Also at 8:25, and again at 8:29, Amy Sweeney got
  • 72. through to the American Flight Services Office in Boston but was cut off after she reported someone was hurt aboard the flight.Three minutes later, Sweeney was reconnected to the office and began relaying updates to the manager, Michael Woodward.32 At 8:26, Ong reported that the plane was “flying erratically.”A minute later, Flight 11 turned south. American also began getting identifications of the hijackers, as Ong and then Sweeney passed on some of the seat numbers of those who had gained unauthorized access to the cockpit.33 Sweeney calmly reported on her line that the plane had been hijacked; a man in first class had his throat slashed; two flight attendants had been stabbed—one was seriously hurt and was on oxygen while the other’s wounds seemed minor; a doctor had been requested; the flight attendants were unable to contact the cockpit; and there was a bomb in the cockpit. Sweeney told Woodward that she and Ong were trying to relay as much information as they could to people on the ground.34 At 8:38, Ong told Gonzalez that the plane was flying erratically again. Around this time Sweeney told Woodward that the hijackers were Middle East- erners, naming three of their seat numbers. One spoke very little English and
  • 73. one spoke excellent English.The hijackers had gained entry to the cockpit, and she did not know how.The aircraft was in a rapid descent.35 At 8:41, Sweeney told Woodward that passengers in coach were under the impression that there was a routine medical emergency in first class. Other flight attendants were busy at duties such as getting medical supplies while Ong and Sweeney were reporting the events.36 At 8:41, in American’s operations center, a colleague told Marquis that the air traffic controllers declared Flight 11 a hijacking and “think he’s [American 11] headed toward Kennedy [airport in New York City].They’re moving every- body out of the way.They seem to have him on a primary radar.They seem to think that he is descending.”37 At 8:44, Gonzalez reported losing phone contact with Ong. About this same time Sweeney reported to Woodward,“Something is wrong.We are in a rapid descent . . . we are all over the place.”Woodward asked Sweeney to look out the window to see if she could determine where they were. Sweeney responded:“We are flying low. We are flying very, very low. We are flying way 6 THE 9/11 COMMISSION REPORT Final1-4.4pp 7/17/04 9:12 AM Page 6
  • 74. too low.” Seconds later she said,“Oh my God we are way too low.” The phone call ended.38 At 8:46:40, American 11 crashed into the North Tower of the World Trade Center in New York City.39 All on board, along with an unknown number of people in the tower, were killed instantly. The Hijacking of United 175 United Airlines Flight 175 was scheduled to depart for Los Angeles at 8:00. Cap- tain Victor Saracini and First Officer Michael Horrocks piloted the Boeing 767, which had seven flight attendants. Fifty-six passengers boarded the flight.40 United 175 pushed back from its gate at 7:58 and departed Logan Airport at 8:14. By 8:33, it had reached its assigned cruising altitude of 31,000 feet.The flight attendants would have begun their cabin service.41 The flight had taken off just as American 11 was being hijacked, and at 8:42 the United 175 flight crew completed their report on a “suspicious transmis- sion” overheard from another plane (which turned out to have been Flight 11) just after takeoff. This was United 175’s last communication with the ground.42
  • 75. The hijackers attacked sometime between 8:42 and 8:46.They used knives (as reported by two passengers and a flight attendant), Mace (reported by one passenger), and the threat of a bomb (reported by the same passenger). They stabbed members of the flight crew (reported by a flight attendant and one pas- senger). Both pilots had been killed (reported by one flight attendant).The eye- witness accounts came from calls made from the rear of the plane, from passengers originally seated further forward in the cabin, a sign that passengers and perhaps crew had been moved to the back of the aircraft. Given similari- ties to American 11 in hijacker seating and in eyewitness reports of tactics and weapons, as well as the contact between the presumed team leaders, Atta and Shehhi, we believe the tactics were similar on both flights.43 The first operational evidence that something was abnormal on United 175 came at 8:47, when the aircraft changed beacon codes twice within a minute. At 8:51, the flight deviated from its assigned altitude, and a minute later New York air traffic controllers began repeatedly and unsuccessfully try- ing to contact it.44 At 8:52, in Easton, Connecticut, a man named Lee Hanson received a phone call from his son Peter, a passenger on United 175. His son told him:
  • 76. “I think they’ve taken over the cockpit—An attendant has been stabbed— and someone else up front may have been killed. The plane is making strange moves. Call United Airlines—Tell them it’s Flight 175, Boston to LA.” Lee Hanson then called the Easton Police Department and relayed what he had heard.45 Also at 8:52, a male flight attendant called a United office in San Francisco, reaching Marc Policastro.The flight attendant reported that the flight had been hijacked, both pilots had been killed, a flight attendant had been stabbed, and “WE HAVE SOME PLANES” 7 Final1-4.4pp 7/17/04 9:12 AM Page 7 the hijackers were probably flying the plane.The call lasted about two minutes, after which Policastro and a colleague tried unsuccessfully to contact the flight.46 At 8:58, the flight took a heading toward New York City.47 At 8:59, Flight 175 passenger Brian David Sweeney tried to call his wife, Julie. He left a message on their home answering machine that the plane had been hijacked. He then called his mother, Louise Sweeney, told
  • 77. her the flight had been hijacked, and added that the passengers were thinking about storm- ing the cockpit to take control of the plane away from the hijackers.48 At 9:00, Lee Hanson received a second call from his son Peter: It’s getting bad, Dad—A stewardess was stabbed—They seem to have knives and Mace—They said they have a bomb—It’s getting very bad on the plane—Passengers are throwing up and getting sick—The plane is making jerky movements —I don’t think the pilot is flying the plane—I think we are going down—I think they intend to go to Chicago or someplace and fly into a building—Don’t worry, Dad— If it happens, it’ll be very fast—My God, my God.49 The call ended abruptly. Lee Hanson had heard a woman scream just before it cut off. He turned on a television, and in her home so did Louise Sweeney. Both then saw the second aircraft hit the World Trade Center.50 At 9:03:11, United Airlines Flight 175 struck the South Tower of the World Trade Center.51 All on board, along with an unknown number of people in the tower, were killed instantly. The Hijacking of American 77 American Airlines Flight 77 was scheduled to depart from Washington Dulles for Los Angeles at 8:10. The aircraft was a Boeing 757 piloted
  • 78. by Captain Charles F. Burlingame and First Officer David Charlebois. There were four flight attendants. On September 11, the flight carried 58 passengers.52 American 77 pushed back from its gate at 8:09 and took off at 8:20. At 8:46, the flight reached its assigned cruising altitude of 35,000 feet. Cabin service would have begun. At 8:51, American 77 transmitted its last routine radio com- munication.The hijacking began between 8:51 and 8:54. As on American 11 and United 175, the hijackers used knives (reported by one passenger) and moved all the passengers (and possibly crew) to the rear of the aircraft (reported by one flight attendant and one passenger). Unlike the earlier flights, the Flight 77 hijackers were reported by a passenger to have box cutters. Finally, a pas- senger reported that an announcement had been made by the “pilot” that the plane had been hijacked. Neither of the firsthand accounts mentioned any stab- bings or the threat or use of either a bomb or Mace,though both witnesses began the flight in the first-class cabin.53 8 THE 9/11 COMMISSION REPORT Final1-4.4pp 7/17/04 9:12 AM Page 8
  • 79. At 8:54, the aircraft deviated from its assigned course, turning south. Two minutes later the transponder was turned off and even primary radar contact with the aircraft was lost.The Indianapolis Air Traffic Control Center repeat- edly tried and failed to contact the aircraft. American Airlines dispatchers also tried, without success.54 At 9:00, American Airlines Executive Vice President Gerard Arpey learned that communications had been lost with American 77.This was now the sec- ond American aircraft in trouble. He ordered all American Airlines flights in the Northeast that had not taken off to remain on the ground. Shortly before 9:10, suspecting that American 77 had been hijacked, American headquarters concluded that the second aircraft to hit the World Trade Center might have been Flight 77. After learning that United Airlines was missing a plane,Amer- ican Airlines headquarters extended the ground stop nationwide.55 At 9:12, Renee May called her mother, Nancy May, in Las Vegas. She said her flight was being hijacked by six individuals who had moved them to the rear of the plane. She asked her mother to alert American Airlines. Nancy May and her husband promptly did so.56 At some point between 9:16 and 9:26, Barbara Olson called her
  • 80. husband, Ted Olson, the solicitor general of the United States. She reported that the flight had been hijacked, and the hijackers had knives and box cutters. She fur- ther indicated that the hijackers were not aware of her phone call, and that they had put all the passengers in the back of the plane. About a minute into the conversation, the call was cut off. Solicitor General Olson tried unsuccessfully to reach Attorney General John Ashcroft.57 Shortly after the first call, Barbara Olson reached her husband again. She reported that the pilot had announced that the flight had been hijacked, and she asked her husband what she should tell the captain to do.Ted Olson asked for her location and she replied that the aircraft was then flying over houses. Another passenger told her they were traveling northeast.The Solicitor Gen- eral then informed his wife of the two previous hijackings and crashes. She did not display signs of panic and did not indicate any awareness of an impending crash. At that point, the second call was cut off.58 At 9:29, the autopilot on American 77 was disengaged; the aircraft was at 7,000 feet and approximately 38 miles west of the Pentagon.59 At 9:32, con- trollers at the Dulles Terminal Radar Approach Control “observed a primary radar target tracking eastbound at a high rate of speed.” This
  • 81. was later deter- mined to have been Flight 77. At 9:34, Ronald Reagan Washington National Airport advised the Secret Ser- vice of an unknown aircraft heading in the direction of the White House.Amer- ican 77 was then 5 miles west-southwest of the Pentagon and began a 330-degree turn. At the end of the turn, it was descending through 2,200 feet, pointed toward the Pentagon and downtown Washington.The hijacker pilot then advanced the throttles to maximum power and dove toward the Pentagon.60 “WE HAVE SOME PLANES” 9 Final1-4.4pp 7/17/04 9:12 AM Page 9 At 9:37:46, American Airlines Flight 77 crashed into the Pentagon, travel- ing at approximately 530 miles per hour.61 All on board, as well as many civil- ian and military personnel in the building, were killed. The Battle for United 93 At 8:42, United Airlines Flight 93 took off from Newark (New Jersey) Liberty International Airport bound for San Francisco.The aircraft was piloted by Cap- tain Jason Dahl and First Officer Leroy Homer, and there were five flight atten- dants. Thirty-seven passengers, including the hijackers, boarded
  • 82. the plane. Scheduled to depart the gate at 8:00, the Boeing 757’s takeoff was delayed because of the airport’s typically heavy morning traffic.62 The hijackers had planned to take flights scheduled to depart at 7:45 (Amer- ican 11), 8:00 (United 175 and United 93), and 8:10 (American 77). Three of the flights had actually taken off within 10 to 15 minutes of their planned departure times. United 93 would ordinarily have taken off about 15 minutes after pulling away from the gate.When it left the ground at 8:42, the flight was running more than 25 minutes late.63 As United 93 left Newark, the flight’s crew members were unaware of the hijacking of American 11. Around 9:00, the FAA, American, and United were facing the staggering realization of apparent multiple hijackings. At 9:03, they would see another aircraft strike the World Trade Center. Crisis managers at the FAA and the airlines did not yet act to warn other aircraft.64 At the same time, Boston Center realized that a message transmitted just before 8:25 by the hijacker pilot of American 11 included the phrase,“We have some planes.”65 No one at the FAA or the airlines that day had ever dealt w ith multiple hijackings. Such a plot had not been carried out anywhere in the world in more