The document is the 2013 Annual Report of the United States Secret Service. It provides an overview of the agency's mission to protect government leaders and secure U.S. financial infrastructure. The report summarizes key events and operations in 2013, including presidential inauguration security, foreign visits, and investigations that recovered over $156 million in counterfeit currency globally. It outlines the agency's strategic goals and introduces the director and leadership team who work to ensure the Secret Service is prepared to address threats and fulfill its responsibilities.
1) The document presents a key to decoding 29 extraterrestrial messages presented in symbols.
2) It decodes the symbols letter by letter, determining they represent numbers, logical operators, and other symbols.
3) By the end, it determines meanings for multiple symbol types, including numbers, operators for logic, equality, multiplication, exponentiation and other functions to fully decode the messages.
The document summarizes how small businesses can do business with the National Security Agency (NSA). It outlines the types of products and services NSA acquires, including signals intelligence, information assurance, and mission enablers. It provides steps for small businesses to register on relevant databases and attend bi-weekly briefings. The document also discusses NSA's acquisition methods, market research tools, contracting vehicles like AXISS and NSETS II, and programs to support small businesses such as mentoring and provisional security approval.
1) CBP's strategic goal of countering terrorism and transnational crime involves understanding the dynamic global threat environment through enhanced intelligence collection and analysis.
2) CBP will lead strategic partnerships to improve intelligence and information sharing with partners to gain a more comprehensive understanding of threats.
3) The CBP Law Enforcement Intelligence Enterprise aims to implement an enhanced intelligence and targeting strategy to detect threats beyond borders through integrated intelligence and law enforcement capabilities and stronger border-centric partnerships.
This document provides an overview of several United States federal law enforcement agencies. It includes the mission statement and areas of responsibility for each agency. The agencies covered include the Coast Guard Investigative Service, United States Mint Police, Federal Air Marshal Service, United States Border Patrol, Bureau of Alcohol, Tobacco, Firearms and Explosives, Internal Revenue Service Criminal Investigation, United States Secret Service, Drug Enforcement Administration, Federal Bureau of Investigation, United States Marshals Service, United States Postal Inspection Service, United States Capitol Police, United States Park Police, Pentagon Force Protection Agency, and Defense Criminal Investigative Service. For each agency, the mission, operations, logo/badge, and website links are provided.
Jeff Daily - Professional Security Resume 2015Jeff Daily
Jeffrey Daily is a security operations professional with over 15 years of experience in criminal investigations, counterterrorism operations, and security management domestically and internationally. He has held roles such as Investigations Manager, Security Officer for the US Air Force and Department of State, Deputy Chief of Security for the CIA in Africa, and Special Agent for the CIA. Daily has a Master's degree in Criminal Justice and multiple security and investigative certifications. He possesses strong leadership, critical thinking, and problem-solving skills and has received numerous performance awards.
Counter Narco-Terrorism and Drug Interdictionmariaidga
This document advertises and provides an agenda for the "Counter Narco-Terrorism & Drug Interdiction 2013" conference taking place September 16-18, 2013 in Miami, Florida. The conference will feature workshops and presentations on topics related to counterterrorism, drug interdiction, and combating human trafficking. Speakers will include representatives from the US Coast Guard, DEA, ICE, US Naval Forces Southern Command, and other government agencies. The document provides contact information for registration and sponsorship opportunities.
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
The intelligence community faces challenges in balancing civil liberties and national security when conducting domestic intelligence activities. They must collect information within the US to counter threats, but do not have a dedicated domestic agency and must preserve citizens' privacy. The Patriot Act expanded agencies' collection authorities after 9/11 but is criticized for potentially violating civil liberties. Intelligence aims to balance security, secrecy and transparency, but achieving the right balance through constant reform is an ongoing challenge.
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxalanfhall8953
WELCOME
To Introduction to Homeland Security
CJUS254-1504A-02
Professor Stephen E. Smith
Discussion Board: Primary Posting Due Wednesday November 4, 2015 by 11:59 PM Central Time.
Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least three paragraphs on the following:
What were the most compelling topics learned in this course?
How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
What approaches could have yielded additional valuable information?
The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.
Introduction To Homeland Security
History
On September 22, 2001 Pennsylvania Governor Tom Ridge was appointed as the first Director of the Office of Homeland Security in the White House
In June 2002, President George W. Bush proposed to create the new Department of Homeland Security that realigned various government activities into a single department whose primary mission is to protect our homeland
On 25 November 2002 Congress passed The Homeland Security Act (Public Law 107-296) which established a cabinet-level department
Introduction To Homeland Security
National Homeland Security Strategy
Guides, organizes, and unifies our Nation’s homeland security efforts
Prevents and disrupts terrorist attacks
Protect the American People, our critical infrastructure, and key resources
Respond to and recover from incidents that do occur
Continue to strengthen the foundation to ensure our long-term success
Introduction To Homeland Security
Department of Homeland Security Mission
Build A Resilient Nation
Safeguard and Secure Cyberspace
Strengthen the Security Enterprise
Administer Immigration Laws
Preventing terrorism and enhance security
Secure and Manage Borders
Introduction To Homeland Security
25 Homeland Security Presidential Directives
1. Organizational & Operation of the Homeland
Security Council
2. Combating Terrorism Through Immigration Policies
3. Homeland Security Advisory System
4. National Strategy to Combat Weapons of Mass
Destruction
5. Management of Domestic Incidents
6. Integration and Use of Screening Information to
Protect Against Terrorism
7. Critical Infrastructure Identification, Prioritization
and Protection
8. National Preparedness
9. Defense of United States Agriculture and Food
10. Biodefense for the 21st Century
11. Comprehensive Terrorist-Related Screening
Procedures
12. Policy for a Common Identification Standard for
Federal Employees and Contractors
13. Maritime Security Policy
14. Domestic Nuclear Detection
15. U.S. Strategy and Policy in the War on Terror
16. National Strategy for Aviation Security
17. Nuclear Materials Information Program
18. Medical Countermeasures Against Weapons of Mass
Destruct.
1) The document presents a key to decoding 29 extraterrestrial messages presented in symbols.
2) It decodes the symbols letter by letter, determining they represent numbers, logical operators, and other symbols.
3) By the end, it determines meanings for multiple symbol types, including numbers, operators for logic, equality, multiplication, exponentiation and other functions to fully decode the messages.
The document summarizes how small businesses can do business with the National Security Agency (NSA). It outlines the types of products and services NSA acquires, including signals intelligence, information assurance, and mission enablers. It provides steps for small businesses to register on relevant databases and attend bi-weekly briefings. The document also discusses NSA's acquisition methods, market research tools, contracting vehicles like AXISS and NSETS II, and programs to support small businesses such as mentoring and provisional security approval.
1) CBP's strategic goal of countering terrorism and transnational crime involves understanding the dynamic global threat environment through enhanced intelligence collection and analysis.
2) CBP will lead strategic partnerships to improve intelligence and information sharing with partners to gain a more comprehensive understanding of threats.
3) The CBP Law Enforcement Intelligence Enterprise aims to implement an enhanced intelligence and targeting strategy to detect threats beyond borders through integrated intelligence and law enforcement capabilities and stronger border-centric partnerships.
This document provides an overview of several United States federal law enforcement agencies. It includes the mission statement and areas of responsibility for each agency. The agencies covered include the Coast Guard Investigative Service, United States Mint Police, Federal Air Marshal Service, United States Border Patrol, Bureau of Alcohol, Tobacco, Firearms and Explosives, Internal Revenue Service Criminal Investigation, United States Secret Service, Drug Enforcement Administration, Federal Bureau of Investigation, United States Marshals Service, United States Postal Inspection Service, United States Capitol Police, United States Park Police, Pentagon Force Protection Agency, and Defense Criminal Investigative Service. For each agency, the mission, operations, logo/badge, and website links are provided.
Jeff Daily - Professional Security Resume 2015Jeff Daily
Jeffrey Daily is a security operations professional with over 15 years of experience in criminal investigations, counterterrorism operations, and security management domestically and internationally. He has held roles such as Investigations Manager, Security Officer for the US Air Force and Department of State, Deputy Chief of Security for the CIA in Africa, and Special Agent for the CIA. Daily has a Master's degree in Criminal Justice and multiple security and investigative certifications. He possesses strong leadership, critical thinking, and problem-solving skills and has received numerous performance awards.
Counter Narco-Terrorism and Drug Interdictionmariaidga
This document advertises and provides an agenda for the "Counter Narco-Terrorism & Drug Interdiction 2013" conference taking place September 16-18, 2013 in Miami, Florida. The conference will feature workshops and presentations on topics related to counterterrorism, drug interdiction, and combating human trafficking. Speakers will include representatives from the US Coast Guard, DEA, ICE, US Naval Forces Southern Command, and other government agencies. The document provides contact information for registration and sponsorship opportunities.
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
The intelligence community faces challenges in balancing civil liberties and national security when conducting domestic intelligence activities. They must collect information within the US to counter threats, but do not have a dedicated domestic agency and must preserve citizens' privacy. The Patriot Act expanded agencies' collection authorities after 9/11 but is criticized for potentially violating civil liberties. Intelligence aims to balance security, secrecy and transparency, but achieving the right balance through constant reform is an ongoing challenge.
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxalanfhall8953
WELCOME
To Introduction to Homeland Security
CJUS254-1504A-02
Professor Stephen E. Smith
Discussion Board: Primary Posting Due Wednesday November 4, 2015 by 11:59 PM Central Time.
Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least three paragraphs on the following:
What were the most compelling topics learned in this course?
How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
What approaches could have yielded additional valuable information?
The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.
Introduction To Homeland Security
History
On September 22, 2001 Pennsylvania Governor Tom Ridge was appointed as the first Director of the Office of Homeland Security in the White House
In June 2002, President George W. Bush proposed to create the new Department of Homeland Security that realigned various government activities into a single department whose primary mission is to protect our homeland
On 25 November 2002 Congress passed The Homeland Security Act (Public Law 107-296) which established a cabinet-level department
Introduction To Homeland Security
National Homeland Security Strategy
Guides, organizes, and unifies our Nation’s homeland security efforts
Prevents and disrupts terrorist attacks
Protect the American People, our critical infrastructure, and key resources
Respond to and recover from incidents that do occur
Continue to strengthen the foundation to ensure our long-term success
Introduction To Homeland Security
Department of Homeland Security Mission
Build A Resilient Nation
Safeguard and Secure Cyberspace
Strengthen the Security Enterprise
Administer Immigration Laws
Preventing terrorism and enhance security
Secure and Manage Borders
Introduction To Homeland Security
25 Homeland Security Presidential Directives
1. Organizational & Operation of the Homeland
Security Council
2. Combating Terrorism Through Immigration Policies
3. Homeland Security Advisory System
4. National Strategy to Combat Weapons of Mass
Destruction
5. Management of Domestic Incidents
6. Integration and Use of Screening Information to
Protect Against Terrorism
7. Critical Infrastructure Identification, Prioritization
and Protection
8. National Preparedness
9. Defense of United States Agriculture and Food
10. Biodefense for the 21st Century
11. Comprehensive Terrorist-Related Screening
Procedures
12. Policy for a Common Identification Standard for
Federal Employees and Contractors
13. Maritime Security Policy
14. Domestic Nuclear Detection
15. U.S. Strategy and Policy in the War on Terror
16. National Strategy for Aviation Security
17. Nuclear Materials Information Program
18. Medical Countermeasures Against Weapons of Mass
Destruct.
This document provides an overview of various federal and military law enforcement agencies and intelligence centers in the United States. It includes brief descriptions of 51 different organizations, outlining their missions and priorities. The agencies covered span multiple government departments and focus on areas such as criminal investigations, border security, counterterrorism, cybercrime, and enforcing environmental and financial laws.
This document provides information about the 7th Annual Mid-Atlantic INLETS conference on Violent Crimes & Terrorism Trends taking place from June 19-23, 2017 in Annapolis, Maryland. Over the past 6 years, the INLETS conference has provided training to over 5,000 law enforcement professionals from 500 agencies across 32 states on topics related to violent crimes and terrorism. The 2017 conference will feature general sessions and workshops led by subject matter experts over the course of the week. InfraGard National Capital Region Members Alliance hosts the conference with support from sponsors like American Military University to provide affordable, high-quality training to law enforcement.
This document provides an overview of ICE's Homeland Security Investigations (HSI) international operations. It discusses HSI's deployment of agents overseas and partnerships with foreign law enforcement through Transnational Criminal Investigative Units. These units have led to numerous arrests and seizures disrupting transnational criminal organizations. The document also outlines HSI programs focused on visa security, human smuggling/trafficking, counterterrorism, export enforcement, and targeting criminal finances.
Welcome to the March 2015 edition of our Colorado Employer Support of the Guard and Reserve (ESGR) Newsletter.
Articles:
New website, Colorado Military Veterans Events
Colorado comparative unemployment rate statistics
50 Colorado Employers nominated for the 2015 Secretary of Defense Freedom Award (see the list)
Information on our upcoming events; 9th Annual Veterans Appreciation Breakfast, MVEE (Military & Veterans Employment Expo), ESGR Annual Employer Awards Banquet
Article by ESGR Volunteer, Corissa Keuler; "Boost Your Military Recruiting Efforts With Two Simple Ingredients: Passion and Momentum"
Statements of Support and Patriot Award
Be sure to check the links and photos for links to websites located throughout the newsletter.
We hope you continue to find it informative and supportive of your role as Employers, National Guardsmen and Reservists, ESGR Volunteers and community leaders.
Please feel free to forward it on to colleagues, friends, fellow employees, company website, link to your newsletter and others in your professional network.
Be sure to check out the Colorado ESGR page at http://www.esgr.mil/colorado and on Facebook https://www.facebook.com/colorado.esgr.1
Sheriff Michael Andrews has over 30 years of experience in law enforcement with the Durham County Sheriff's Office. As Sheriff, he oversees administration of agency-wide operations and maintains productive relationships with other local law enforcement agencies through information sharing and joint task forces. Some of Sheriff Andrews' priorities include enhancing school safety through resource officers, preventing gang activity and criminal recidivism through community programs, and improving security at the new Durham County Judicial Center.
The 2015 annual report from the Fredericksburg Police Department summarizes their mission to serve and protect the community. It provides highlights of notable events from the year including upgrading computer systems, creating traffic officer positions, conducting bias training, participating in community events like Special Olympics and a youth summer program, and having officers compete and win awards at the World Police and Fire Games. The report emphasizes the department's commitment to community engagement, professionalism, and providing the highest level of law enforcement services.
The document provides an overview of the New Jersey State Police's (NJSP) adoption of an intelligence-led policing (ILP) model. It details the NJSP's four main components of ILP implementation: 1) reorganizing the Investigations Branch; 2) adopting the intelligence cycle; 3) creating a Regional Operations and Intelligence Center; and 4) using strategic planning and intelligence analysis. The guide serves to establish a common understanding of ILP and the operating environment among NJSP members. It outlines the philosophy, processes, roles and intelligence products used to improve situational awareness and inform strategic decision-making.
This report summarizes the activities of the CIA's Office of Privacy and Civil Liberties (OPCL) from January to June 2016. Some notable initiatives included revising the CIA's Executive Order and Attorney General Guidelines to incorporate privacy protections, implementing Presidential Policy Directive 28 on signals intelligence activities, providing training on privacy issues, and advising on reviews and complaints related to privacy and civil liberties. The OPCL works to ensure CIA operations and policies adequately consider privacy and civil liberties while protecting national security.
Reno Police Audit 2021 (draft version)This Is Reno
The document is a draft report from the Center for Public Safety Management analyzing police operations and data for the Reno Police Department. It provides an overview of the department's organization, staffing, call volume and response times. It examines each division and section, identifying current activities, staffing, workload and recommendations for improvements. Key recommendations include increasing staffing for patrol, investigations and dispatch to meet service demands.
PAGE
1
Kemberly Boddie, Todd Cucchiara, Rennie Vazquez : SPR15_I_MBU_630A_01 Management of Human Resources in the Federal Government, February 2015
TO: Catherine Emerson, Chief Human Capital Officer
Department of Homeland Security (DHS)
CC: Honorable Jeh Johnson, Secretary Homeland Security
FROM: TEAM CHCO
RE: A Dedicated Role for the Chief Human Capital Officer of DHS
The formation of the Department of Homeland Security (DHS) is an example of a government-wide change initiative to address concerns stemming from a traumatic event. Leading the concerns was dissatisfaction with the way in which the multitude of departments responded, communicated and coordinated their efforts on a macro scale. A lack of an integrated command system was at the heart of this dissatisfaction. The Command systems were designed to work independently, not together. Although New York City mayor, Rudolph Giulianni, instituted a plan to minimize potential conflict among responding agencies, which may have areas of overlapping expertise and responsibility at a local level, the equivalent did not exist at the federal level. The DHS is the federal equivalent to establish channels of communication necessary for smooth operation.
The purpose of this memorandum addresses the following:
· Mission - What does the organization do?
· Vision - What does the organization expect to accomplish?
· Values - What cultural and behavioral norms are established at the senior leadership level and how are they manifested at the operational levels?
· Structure - How is it organized at the senior management level, i.e. what are the executive-level departments or lines of business?
· Implementation - How are organizational Mission, Vision and Values implemented within the departments or lines of business?
· Context - What are the contextual factors (internal and external) that influence the organization's culture and performance?
· Opportunity - What opportunities exist for an HR intervention that will help advance the organizational mission?
The DHS is the collective of more than twenty federal offices. The DHS was formed in response to the terror attacks on September 11th, 2001 when a need for coordination and improved communication among the various government offices became apparent. Since its inception in November 2002, DHS seeks to unify and integrate information and activities to ensure domestic safety and prevention of future terrorist attacks. The DHS officially opened its doors in March 2003 and subsequently went through reorganization in July 2005.
1.Mission – Five Missions to Unify, Strengthen and Secure Our Domestic Borders.
The DHS has five mission areas: 1) Prevent Terrorism and Enhance Security; 2) Secure and manage our borders; 3) Enforce and Administer Our Immigration Laws; 4) Safeguard and Secure Cyberspace; and, 5) Strengthen National Preparedness and Resilience.
· Prevent Terrorism and Enhance Security: DHS will increase U.S. Government counterterrorism efforts, which i.
Gary McIntyre is seeking a criminal investigator position. He has over 15 years of experience as a federal investigator, police detective, and police officer. His experience includes interviewing and interrogating suspects, collecting and analyzing evidence, conducting investigations, and testifying in court. He has specialized skills and certifications in areas like polygraph examination, homicide investigation, and medicolegal death investigation.
This document discusses the need to establish an Integrated National Security Professional system to develop interagency national security professionals for the 21st century strategic environment. It analyzes the current system's gaps and recommends a new system with centralized management, leadership, and funding. The new system would designate National Security Professionals across government who receive integrated training and can rotate to roles outside their home agencies. It would include military, state, and local personnel and have four implementation stages. The document argues this approach is necessary for the complex problems facing the US and would improve on the current fragmented system.
The document provides information about an upcoming conference on border security hosted by Homeland Security Today. It includes the agenda with topics like private sector innovation in border security, biometric recognition for travel, contracting outlook, updates on field operations, and a view from the border. Speakers include representatives from CBP, DHS, airports, and private companies. The document promotes signing up for their weekly newsletters on related topics and provides contact information.
The document provides an overview of the Department of Homeland Security (DHS) including its mission to secure America, prevent terrorist attacks, and ensure safe borders. It summarizes the key components of DHS, including the Coast Guard, Secret Service, Transportation Security Administration, Immigration and Customs Enforcement, Federal Emergency Management Agency, and Customs and Border Protection. Biographies are provided for several DHS leadership positions.
The document provides a resume for Dana A. Chapman, who has over 23 years of experience in the United States Army as a law enforcement and security professional, including roles as an operations manager, physical security supervisor, law enforcement officer, and instructor. Chapman holds a Bachelor's degree in Homeland Security and has received numerous awards and certifications over their military career, including the Bronze Star Medal. The resume outlines Chapman's extensive leadership, management, law enforcement, and security-related experience and qualifications.
The document provides an overview of the FBI, including:
- The FBI is an intelligence-driven national security and law enforcement agency with over 35,000 employees investigating threats like terrorism, espionage, cybercrime, and other criminal threats.
- It has both intelligence and law enforcement responsibilities and works to protect communities through investigations while also collecting and sharing intelligence.
- The FBI has grown significantly over its history dating back to 1908 and continues to adapt its capabilities to address evolving threats.
The document summarizes a report on the terrorist threat to the US homeland over the next three years. It finds that:
1) The main threat comes from Islamic terrorist groups, especially al-Qaeda, driven by their continued intent to attack the US and ability to adapt.
2) Greatly increased counterterrorism efforts since 9/11 have made it harder for groups like al-Qaeda to launch attacks, but international cooperation on counterterrorism may decline over time.
3) Al-Qaeda remains the most serious terrorist threat, though homegrown violent extremists also pose a danger if inspired by al-Qaeda's ideology.
Contributi dei parlamentari del PD - Contributi L. 3/2019Partito democratico
DI SEGUITO SONO PUBBLICATI, AI SENSI DELL'ART. 11 DELLA LEGGE N. 3/2019, GLI IMPORTI RICEVUTI DALL'ENTRATA IN VIGORE DELLA SUDDETTA NORMA (31/01/2019) E FINO AL MESE SOLARE ANTECEDENTE QUELLO DELLA PUBBLICAZIONE SUL PRESENTE SITO
This document provides an overview of various federal and military law enforcement agencies and intelligence centers in the United States. It includes brief descriptions of 51 different organizations, outlining their missions and priorities. The agencies covered span multiple government departments and focus on areas such as criminal investigations, border security, counterterrorism, cybercrime, and enforcing environmental and financial laws.
This document provides information about the 7th Annual Mid-Atlantic INLETS conference on Violent Crimes & Terrorism Trends taking place from June 19-23, 2017 in Annapolis, Maryland. Over the past 6 years, the INLETS conference has provided training to over 5,000 law enforcement professionals from 500 agencies across 32 states on topics related to violent crimes and terrorism. The 2017 conference will feature general sessions and workshops led by subject matter experts over the course of the week. InfraGard National Capital Region Members Alliance hosts the conference with support from sponsors like American Military University to provide affordable, high-quality training to law enforcement.
This document provides an overview of ICE's Homeland Security Investigations (HSI) international operations. It discusses HSI's deployment of agents overseas and partnerships with foreign law enforcement through Transnational Criminal Investigative Units. These units have led to numerous arrests and seizures disrupting transnational criminal organizations. The document also outlines HSI programs focused on visa security, human smuggling/trafficking, counterterrorism, export enforcement, and targeting criminal finances.
Welcome to the March 2015 edition of our Colorado Employer Support of the Guard and Reserve (ESGR) Newsletter.
Articles:
New website, Colorado Military Veterans Events
Colorado comparative unemployment rate statistics
50 Colorado Employers nominated for the 2015 Secretary of Defense Freedom Award (see the list)
Information on our upcoming events; 9th Annual Veterans Appreciation Breakfast, MVEE (Military & Veterans Employment Expo), ESGR Annual Employer Awards Banquet
Article by ESGR Volunteer, Corissa Keuler; "Boost Your Military Recruiting Efforts With Two Simple Ingredients: Passion and Momentum"
Statements of Support and Patriot Award
Be sure to check the links and photos for links to websites located throughout the newsletter.
We hope you continue to find it informative and supportive of your role as Employers, National Guardsmen and Reservists, ESGR Volunteers and community leaders.
Please feel free to forward it on to colleagues, friends, fellow employees, company website, link to your newsletter and others in your professional network.
Be sure to check out the Colorado ESGR page at http://www.esgr.mil/colorado and on Facebook https://www.facebook.com/colorado.esgr.1
Sheriff Michael Andrews has over 30 years of experience in law enforcement with the Durham County Sheriff's Office. As Sheriff, he oversees administration of agency-wide operations and maintains productive relationships with other local law enforcement agencies through information sharing and joint task forces. Some of Sheriff Andrews' priorities include enhancing school safety through resource officers, preventing gang activity and criminal recidivism through community programs, and improving security at the new Durham County Judicial Center.
The 2015 annual report from the Fredericksburg Police Department summarizes their mission to serve and protect the community. It provides highlights of notable events from the year including upgrading computer systems, creating traffic officer positions, conducting bias training, participating in community events like Special Olympics and a youth summer program, and having officers compete and win awards at the World Police and Fire Games. The report emphasizes the department's commitment to community engagement, professionalism, and providing the highest level of law enforcement services.
The document provides an overview of the New Jersey State Police's (NJSP) adoption of an intelligence-led policing (ILP) model. It details the NJSP's four main components of ILP implementation: 1) reorganizing the Investigations Branch; 2) adopting the intelligence cycle; 3) creating a Regional Operations and Intelligence Center; and 4) using strategic planning and intelligence analysis. The guide serves to establish a common understanding of ILP and the operating environment among NJSP members. It outlines the philosophy, processes, roles and intelligence products used to improve situational awareness and inform strategic decision-making.
This report summarizes the activities of the CIA's Office of Privacy and Civil Liberties (OPCL) from January to June 2016. Some notable initiatives included revising the CIA's Executive Order and Attorney General Guidelines to incorporate privacy protections, implementing Presidential Policy Directive 28 on signals intelligence activities, providing training on privacy issues, and advising on reviews and complaints related to privacy and civil liberties. The OPCL works to ensure CIA operations and policies adequately consider privacy and civil liberties while protecting national security.
Reno Police Audit 2021 (draft version)This Is Reno
The document is a draft report from the Center for Public Safety Management analyzing police operations and data for the Reno Police Department. It provides an overview of the department's organization, staffing, call volume and response times. It examines each division and section, identifying current activities, staffing, workload and recommendations for improvements. Key recommendations include increasing staffing for patrol, investigations and dispatch to meet service demands.
PAGE
1
Kemberly Boddie, Todd Cucchiara, Rennie Vazquez : SPR15_I_MBU_630A_01 Management of Human Resources in the Federal Government, February 2015
TO: Catherine Emerson, Chief Human Capital Officer
Department of Homeland Security (DHS)
CC: Honorable Jeh Johnson, Secretary Homeland Security
FROM: TEAM CHCO
RE: A Dedicated Role for the Chief Human Capital Officer of DHS
The formation of the Department of Homeland Security (DHS) is an example of a government-wide change initiative to address concerns stemming from a traumatic event. Leading the concerns was dissatisfaction with the way in which the multitude of departments responded, communicated and coordinated their efforts on a macro scale. A lack of an integrated command system was at the heart of this dissatisfaction. The Command systems were designed to work independently, not together. Although New York City mayor, Rudolph Giulianni, instituted a plan to minimize potential conflict among responding agencies, which may have areas of overlapping expertise and responsibility at a local level, the equivalent did not exist at the federal level. The DHS is the federal equivalent to establish channels of communication necessary for smooth operation.
The purpose of this memorandum addresses the following:
· Mission - What does the organization do?
· Vision - What does the organization expect to accomplish?
· Values - What cultural and behavioral norms are established at the senior leadership level and how are they manifested at the operational levels?
· Structure - How is it organized at the senior management level, i.e. what are the executive-level departments or lines of business?
· Implementation - How are organizational Mission, Vision and Values implemented within the departments or lines of business?
· Context - What are the contextual factors (internal and external) that influence the organization's culture and performance?
· Opportunity - What opportunities exist for an HR intervention that will help advance the organizational mission?
The DHS is the collective of more than twenty federal offices. The DHS was formed in response to the terror attacks on September 11th, 2001 when a need for coordination and improved communication among the various government offices became apparent. Since its inception in November 2002, DHS seeks to unify and integrate information and activities to ensure domestic safety and prevention of future terrorist attacks. The DHS officially opened its doors in March 2003 and subsequently went through reorganization in July 2005.
1.Mission – Five Missions to Unify, Strengthen and Secure Our Domestic Borders.
The DHS has five mission areas: 1) Prevent Terrorism and Enhance Security; 2) Secure and manage our borders; 3) Enforce and Administer Our Immigration Laws; 4) Safeguard and Secure Cyberspace; and, 5) Strengthen National Preparedness and Resilience.
· Prevent Terrorism and Enhance Security: DHS will increase U.S. Government counterterrorism efforts, which i.
Gary McIntyre is seeking a criminal investigator position. He has over 15 years of experience as a federal investigator, police detective, and police officer. His experience includes interviewing and interrogating suspects, collecting and analyzing evidence, conducting investigations, and testifying in court. He has specialized skills and certifications in areas like polygraph examination, homicide investigation, and medicolegal death investigation.
This document discusses the need to establish an Integrated National Security Professional system to develop interagency national security professionals for the 21st century strategic environment. It analyzes the current system's gaps and recommends a new system with centralized management, leadership, and funding. The new system would designate National Security Professionals across government who receive integrated training and can rotate to roles outside their home agencies. It would include military, state, and local personnel and have four implementation stages. The document argues this approach is necessary for the complex problems facing the US and would improve on the current fragmented system.
The document provides information about an upcoming conference on border security hosted by Homeland Security Today. It includes the agenda with topics like private sector innovation in border security, biometric recognition for travel, contracting outlook, updates on field operations, and a view from the border. Speakers include representatives from CBP, DHS, airports, and private companies. The document promotes signing up for their weekly newsletters on related topics and provides contact information.
The document provides an overview of the Department of Homeland Security (DHS) including its mission to secure America, prevent terrorist attacks, and ensure safe borders. It summarizes the key components of DHS, including the Coast Guard, Secret Service, Transportation Security Administration, Immigration and Customs Enforcement, Federal Emergency Management Agency, and Customs and Border Protection. Biographies are provided for several DHS leadership positions.
The document provides a resume for Dana A. Chapman, who has over 23 years of experience in the United States Army as a law enforcement and security professional, including roles as an operations manager, physical security supervisor, law enforcement officer, and instructor. Chapman holds a Bachelor's degree in Homeland Security and has received numerous awards and certifications over their military career, including the Bronze Star Medal. The resume outlines Chapman's extensive leadership, management, law enforcement, and security-related experience and qualifications.
The document provides an overview of the FBI, including:
- The FBI is an intelligence-driven national security and law enforcement agency with over 35,000 employees investigating threats like terrorism, espionage, cybercrime, and other criminal threats.
- It has both intelligence and law enforcement responsibilities and works to protect communities through investigations while also collecting and sharing intelligence.
- The FBI has grown significantly over its history dating back to 1908 and continues to adapt its capabilities to address evolving threats.
The document summarizes a report on the terrorist threat to the US homeland over the next three years. It finds that:
1) The main threat comes from Islamic terrorist groups, especially al-Qaeda, driven by their continued intent to attack the US and ability to adapt.
2) Greatly increased counterterrorism efforts since 9/11 have made it harder for groups like al-Qaeda to launch attacks, but international cooperation on counterterrorism may decline over time.
3) Al-Qaeda remains the most serious terrorist threat, though homegrown violent extremists also pose a danger if inspired by al-Qaeda's ideology.
Contributi dei parlamentari del PD - Contributi L. 3/2019Partito democratico
DI SEGUITO SONO PUBBLICATI, AI SENSI DELL'ART. 11 DELLA LEGGE N. 3/2019, GLI IMPORTI RICEVUTI DALL'ENTRATA IN VIGORE DELLA SUDDETTA NORMA (31/01/2019) E FINO AL MESE SOLARE ANTECEDENTE QUELLO DELLA PUBBLICAZIONE SUL PRESENTE SITO
RFP for Reno's Community Assistance CenterThis Is Reno
Property appraisals completed in May for downtown Reno’s Community Assistance and Triage Centers (CAC) reveal that repairing the buildings to bring them back into service would cost an estimated $10.1 million—nearly four times the amount previously reported by city staff.
This report explores the significance of border towns and spaces for strengthening responses to young people on the move. In particular it explores the linkages of young people to local service centres with the aim of further developing service, protection, and support strategies for migrant children in border areas across the region. The report is based on a small-scale fieldwork study in the border towns of Chipata and Katete in Zambia conducted in July 2023. Border towns and spaces provide a rich source of information about issues related to the informal or irregular movement of young people across borders, including smuggling and trafficking. They can help build a picture of the nature and scope of the type of movement young migrants undertake and also the forms of protection available to them. Border towns and spaces also provide a lens through which we can better understand the vulnerabilities of young people on the move and, critically, the strategies they use to navigate challenges and access support.
The findings in this report highlight some of the key factors shaping the experiences and vulnerabilities of young people on the move – particularly their proximity to border spaces and how this affects the risks that they face. The report describes strategies that young people on the move employ to remain below the radar of visibility to state and non-state actors due to fear of arrest, detention, and deportation while also trying to keep themselves safe and access support in border towns. These strategies of (in)visibility provide a way to protect themselves yet at the same time also heighten some of the risks young people face as their vulnerabilities are not always recognised by those who could offer support.
In this report we show that the realities and challenges of life and migration in this region and in Zambia need to be better understood for support to be strengthened and tuned to meet the specific needs of young people on the move. This includes understanding the role of state and non-state stakeholders, the impact of laws and policies and, critically, the experiences of the young people themselves. We provide recommendations for immediate action, recommendations for programming to support young people on the move in the two towns that would reduce risk for young people in this area, and recommendations for longer term policy advocacy.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteCori Faklaris
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
UN WOD 2024 will take us on a journey of discovery through the ocean's vastness, tapping into the wisdom and expertise of global policy-makers, scientists, managers, thought leaders, and artists to awaken new depths of understanding, compassion, collaboration and commitment for the ocean and all it sustains. The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
2024: The FAR - Federal Acquisition Regulations, Part 40
Report 2013 Serviço Secreto USA
1.
2. WORTHY OF TRUST AND CONFIDENCE WORTHY OF TRUST AND CONFIDENCE
2013
3. TABLE OF
CONTENTS
2013
THE SECRET SERVICE DEFINED • 1
YEAR IN REVIEW • 6
PROTECTION • 10
INVESTIGATIONS • 20
MISSION SUPPORT • 36
HUMAN CAPITAL • 46
ACKNOWLEDGEMENTS • 57
UNITED STATES SECRET SERVICE
2013 Annual Report
4. 1
OPERATIONAL
READINESS
The Secret Service
will anticipate and
address threats
and perform its
statutory protective
and investigative
responsibilities by
properly training
and equipping all
employees and by
strengthening its
partnerships.
STRATEGIC GOALS
ADVANCED
TECHNOLOGY
The Secret Service
will build an
infrastructure
that will balance
information security
and information
accessibility, while
also expanding the
use of advanced
technology to
fulfill mission
responsibilities.
BUSINESS
PROCESSES
AND RESOURCE
MANAGEMENT
The Secret Service
will consolidate
and streamline
the planning,
programming,
budgeting, and
execution processes
by adopting new
technology that
will better track
performance metrics
and assist leadership
in making data-driven
decisions.
CORE VALUES
Each point of the Secret Service Star
represents one of the Agency’s five core
values: Duty, Justice, Courage, Honesty, and
Loyalty. These values, and the Secret Service
motto “Worthy of Trust and Confidence,”
resonate with each man and woman who has
sworn the oath to uphold them.
HUMAN
CAPITAL
The Secret Service
will focus on
forecasting hiring
needs, recruiting,
training, equipping,
and retaining
valued employees.
VISION
The vision of the Secret Service is to
uphold the tradition of excellence in
its protective and investigative mission
through a dedicated, highly trained,
and diverse workforce that promotes
professionalism and employs advanced
technologies in support of its programs
and activities.
UNITED STATES SECRET SERVICE
2013 Annual Report
WORTHY OF TRUST AND CONFIDENCE
THE
SECRET
SERVICE
DEFINED
MISSION
The mission of the Secret Service is to ensure the security of
our President, our Vice President, their families, the White
House, the Vice President’s Residence, national and visiting
world leaders, former Presidents and events of national
significance. The Secret Service also protects the integrity
of our currency and investigates crimes against our national
financial system committed by criminals around the world
and in cyberspace.
5. 2
LEADERSHIP
A Message from the Director
The Secret Service has always represented the very best of our federal government. In
1865, we became the first federal investigative agency. Today, we are the protector of the
President of the United States, our nation’s leaders, and the financial infrastructure that
drives the U.S. economy. Simply put, we are more than just a law enforcement agency.
I am extremely proud of the success our work force displayed in 2013. Our mission
requires that our employees make many sacrifices, including being away from their
families, working long hours, and operating in high stress environments. Our highly
skilled workforce is the key to our success, and I commend their steadfast commitment to
serving our country.
Ensuring we are prepared and resourced to conduct our mission is my top priority. To
that end, we have developed and implemented a variety of innovative technologies and
tactics to counteract emerging threats and evaluate daily mission performance. The
Secret Service must always operate at a 100 percent success rate. In order to maintain
that achievement, we will continue to deploy cutting edge technologies, develop
new techniques and training opportunities, and leverage the capabilities of our law
enforcement, private sector, and academic partners.
As we reflect on 2013, and build for the future, I want employees to know our history and
understand our past. Many dedicated men and women have served in this great agency
throughout the years and have left a legacy of unwavering commitment and pride. The
Secret Service’s “Honor the Oath” campaign is a reminder of our responsibility to always
be worthy of trust and confidence. The federal government has entrusted this agency with
a great responsibility and sacred trust. As a result, each of us must live up to the oath and
always be worthy of this responsibility.
It is my privilege and honor to serve as the 23rd Director of the United States Secret
Service. I look forward to our future and to supporting the U.S. Department of Homeland
Security in safeguarding our nation. On behalf of the 6,480 men and women of the
United States Secret Service, it is my pleasure to present the 2013 Annual Report.
Julia A. Pierson
UNITED STATES SECRET SERVICE
2013 Annual Report
WORTHY OF TRUST AND CONFIDENCE
A.T. Smith
Deputy Director
Faron K. Paramore
Assistant Director
Office of
Administration
Victor Erevia
Assistant Director
Office of Protective
Operations
Paul S. Morrissey
Assistant Director
Office of
Investigations
Cornelius F. Tate
Assistant Director
Office of Technical
Development &
Mission Support
Dale A. Pupillo
Assistant Director
Office of Human
Resources & Training
Gregory A. Marchio
Assistant Director
Office of Professional
Responsibility
Craig D. Magaw
Assistant Director
Office of Strategic
Intelligence &
Information
Jane P. Murphy
Assistant Director
Office of Government
& Public Affairs
Donna L. Cahill
Chief Counsel
Office of
Chief Counsel
Kevin S. Simpson
Chief
Uniformed Division
6. UNITED STATES SECRET SERVICE SECRET SERVICE BY THE NUMBERS
2013 Annual Report
100% $156M U.S. counterfeit currency
recovered globally
1.28M $1.1B
2.4M members of the
public screened
at protective
venues
$153M
$234M seized from the ZeekRewards case, the 3rd
largest Ponzi scheme in history
1,048
assets seized worldwide
asset forfeiture seizures issued
2,668counterfeit arrests
worldwide
$44.2M 1,168 1.2 petabytes of data processed
by the Electronic Crimes
Special Agent
Program
8,658
262
9,391
weapons seized at Secret Service
checkpoints
visits by foreign heads of
state/government who
received protective
measures
U.S. counterfeit currency
seized as part of Project
South America
prevented in fraud loss
travel stops made by domestic/
foreign protectees
counterfeit manufacturing
plants suppressed
success rate in safe arrivals and departures
by Secret Service protectees
pieces of mail screened at the
White House Mail Screening Facility
4 5
7. 57th
Presidential
Inauguration
January 21, 2013
The Secret Service, in cooperation
with local, state, and federal law
enforcement, public safety, and military
partners, designed and implemented
the security plan for the 2013
Presidential Inauguration.
7
YEAR IN
REVIEW
UNITED STATES SECRET SERVICE
2013 Annual Report
WORTHY OF TRUST AND CONFIDENCE
62nd
Anniversary
of a Fallen
Hero
November 1, 2012
Each year the Secret Service pays
homage to White House Police
Officer Leslie Coffelt during a
sunrise memorial service at the
Blair House. Officer Coffelt was
killed in the line of duty in 1950.
Wall of Honor
Ceremony
May 16, 2013
Each year, the Wall of Honor Ceremony
recognizes the dedication and sacrifice of
the 36 men and women who have given
their lives in the line of duty.
National
Police
Challenge
May 17, 2013
The NPC-50 is a 50-kilometer
relay competition among local,
state, and federal law enforcement
agencies that raises funds for
families of those who have been
slain in the line of duty. The
event was sponsored by the Secret
Service Employee Recreation
Association.
State of the
Union Address
February 12, 2013
The Secret Service, in cooperation with law
enforcement and public safety agencies in
the nation’s capital region, implemented the
security plan for the designated National
Special Security Event.
Presidential
Center
Dedication
April 25, 2013
The Secret Service coordinated security
efforts as all five living presidents attended
the ceremonial dedication of the George W.
Bush Presidential Center in Dallas, Texas.
The Center is home to the George W. Bush
Presidential Library and Museum and George
W. Bush Institute.
6
8. YEAR IN REVIEW
Supervisor
and Special
Agent In
Charge
Conference
June 11-13, 2013
During the Conference, the Director and
senior staff discussed strategic goals and
initiatives. The Conference also featured
specialized training related to managing
and enhancing investigations.
Unity
Day
July 24, 2013
Unity Day recognizes and celebrates
employees’ diverse backgrounds and
cultures. The celebration highlighted
“heritage, history, and harmony” with
guest speakers, displays, workshops,
presentations, and cultural demonstrations
designed to enhance cross-culture
awareness.
Association of
Former Agents
of the Secret
Service Annual
Meeting
September 7, 2013
During the meeting the Director and the
AFAUSSS President presented the Harry
E. Neal Award for meritorious service, to
three police officers, Officer Sean Collier
(posthumously), Lt. William Cederquist,
Massachusetts State Police, and Lt. William
Ridge, Boston Police, for their heroism
during the 2013 Boston Mararthon bombing
investigation.
International
Association
of Chiefs
of Police
Conference
October 19-23, 2013
Senior leaders from the Secret Service
participated in training seminars,
presentations, and the annual Law
Enforcement Exposition at the Conference
in Philadelphia, Pennsylvania.
UNITED STATES SECRET SERVICE
2013 Annual Report
March on
Washington D.C.
August 28, 2013
The Secret Service coordinated protective
security measures for three Presidents and other
notable attendees who visited the National Mall
to celebrate the 50th anniversary of Dr. Martin
Luther King, Jr.’s “I Have a Dream” speech.
68th United Nations
General Assembly
September 16-30, 2013
The Secret Service developed and executed protective security
details for 114 heads of state/government and 68 spouses in
coordination with the New York City Police Department and the
United Nations Department of Safety and Security.
9
9. UNITED STATES SECRET SERVICE
2013 Annual Report
10
PROTECTION Today, the Secret Service protects:
• The President, the Vice President and their immediate families;
• Former Presidents, their spouses, and children under 16 years of age;
• Former Vice Presidents, their spouses, and children under 16 years of age, for a
period of not more than six months after the former Vice President leaves office;
• Visiting heads of foreign states or governments, and their spouses;
• Distinguished foreign visitors to the United States;
• Official representatives of the United States performing special missions abroad
as directed by the President;
• Major Presidential and Vice Presidential candidates, and their spouses;
• Other individuals as designated by the President; and
• National Special Security Events.
How Protection
Works
The Secret Service is world-renowned for the physical protection it provides to the
nation’s highest elected leaders, visiting foreign dignitaries, facilities, and major
events the agency is mandated to safeguard. In order to ensure a secure environment
for protectees, the Secret Service integrates a variety of innovative technologies and
maintains a highly skilled and motivated workforce.
Using state-of-the-art countermeasures, the Secret Service executes security
operations that deter, minimize, and decisively respond to identified threats and
vulnerabilities. The protective environment is enhanced by specialized resources
within the Secret Service, including: the Airspace Security Branch; the Counter Sniper
Team; the Emergency Response Team; the Counter Surveillance Unit; the Counter
Assault Team; the Hazardous Agent Mitigation and Medical Emergency Response
Team; and the Magnetometer Operations Unit. Other specialized resources serve
to provide protection from threats, including chemical, biological, radiological and
nuclear materials, and explosive devices.
WORTHY OF TRUST AND CONFIDENCE
10. This is a Featured Item
Harum dit is a volores
ectioritiur sinctatin parum qui
ilibus invel et alibusc illabora
dionemporem et et faceatem.
Os experiatur a dolum aut qui
cum enecte cor acero quatur,
nonsequia vendese vitatum
reium event.
Evel explia invendi
bernatemosa id est volupictur
res dolupta tureriorrume
rererch
This is a Featured Item
Harum dit is a volores
ectioritiur sinctatin parum qui
ilibus invel et alibusc illabora
dionemporem et et faceatem.
Os experiatur a dolum aut qui
cum enecte cor acero quatur,
nonsequia vendese vitatum
reium event.
Non consequi cus voluptatque
si sunt quam, eius modi recat.
12
Protective stops are defined
as the entirety of a visit to one
geographic location. If the
President visits three sites in
New Orleans, Louisiana, the
visit is only considered one
stop, not three. As a result,
the actual Secret Service
workload within a geographic
location is typically far greater
than these numbers reflect.
Protective
Accomplishments
In Fiscal Year (FY) 2013, the Secret Service:
• Achieved a 100% success rate in safe
arrivals and departures by Secret Service
protectees;
• Provided protection during 4,160 travel
stops for domestic protectees, 444 travel
stops for candidates, and 2,750 travel
stops for visiting foreign dignitaries;
• Coordinated protective measures for
1,168 visits of heads of foreign states or
governments and their spouses;
• Prepared security plans for the 68th
Session of the United Nations General
Assembly, including protective detail
staffing for 114 heads of foreign states or
governments and 68 spouses;
• Planned and secured the Presidential and
Vice Presidential Debates, as well as the
57th Presidential Inauguration;
• Screened 1.28 million pieces of mail at
the White House Mail Screening Facility;
• X-rayed 25,583 deliveries at the White
House Remote Delivery Site and
escorted 943 vehicle deliveries to the
White House complex;
• Provided protection for former presidents
and spouses for a combined total of 1,304
stops and 2,339 days;
• Continued the development of the
Presidential Limousine Program, in
order to provide the latest security
enhancements for the President and other
protectees;
• Uniformed Division Officers completed
652 magnetometer and X-ray operations
assignments and screened 2,468,889
members of the public at 960 protective
venues; and
• Seized 9,391 weapons at magnetometer
checkpoints.
UNITED STATES SECRET SERVICE
2013 Annual Report
PROTECTION
11. National Special
Security Events
The Secret Service is mandated to lead the planning, coordination, and implementation of operational security plans at high-profile
events designated by the Secretary of Homeland Security as National Special Security Events (NSSEs). The Secret Service carries
out its responsibilities by relying on a protective strategy that leverages partnerships with all participating law enforcement, security,
military, and public safety officials.
In FY 2013, the Secret Service successfully secured two NSSEs:
57th Presidential Inauguration
January 21, 2013
The Secret Service, in coordination with its federal, state, local, and military partners, engaged in extensive security planning activities
for the inauguration, which was held in Washington, D.C.
State of the Union Address
February 12, 2013
The Secret Service provided protective details for the President and Mrs. Obama, the Vice President and Mrs. Biden, and designated
Administration officials. The Secret Service coordinated the development of a comprehensive security plan to protect those in
attendance, including the majority of the nation’s leadership from the executive, legislative, and judicial branches of government.
Protectee
Foreign Travel
PROTECTION
In FY 2013, Secret Service protectees participated in a total of 6,451 domestic and foreign stops, including 446 visits to foreign
locations and U.S. territories. In all, Secret Service foreign offices, under the Office of Investigations, conducted protective security
advances and provided other protection-related support for 354 foreign stops.
Highlights include:
Presidential Trips
• Myanmar, Cambodia, Thailand, and Japan (November 2012)
• Yakota, Japan (November 2012)
• Jerusalem, Israel (March 2013)
• Palestinian Territories (March 2013)
• Amman and Petra, Jordan (March 2013)
• Ramstein, Germany (March 2013)
• Mexico City, Mexico (May 2013)
• San Jose, Mexico (May 2013)
• Belfast and Lough Erne, Ireland (June 2013)
• Berlin, Germany (June 2013)
• Cape Town, Johannesburg, and Pretoria, South Africa (June 2013)
• Dakar, Senegal (June 2013)
• Dar es Salaam, Tanzania (July 2013)
UNITED STATES SECRET SERVICE
2013 Annual Report
Vice Presidential Trips
• Mexico City, Mexico (November 2012)
• London, England (February 2013)
• Paris, France (February 2013)
• Berlin, Landstuhl, and Munich, Germany
(February 2013)
• Rome, Italy (March 2013)
• Rio de Janeiro and Brasilia, Brazil (May 2013)
• Bogota, Colombia (May 2013)
• Port-of-Spain, Trinidad and Tobago (May 2013)
• Mexico City, Mexico (July 2013)
• Mumbai and New Dehli, India (July 2013)
• Singapore (July 2013)
12. In FY 2013, 134 foreign trips were made by former Presidents. Secret Service international field offices and protective divisions
assisted with these visits, some of which are listed below. Other Protective Initiatives:
3,600
Halloween
Event
41,106
Fall
Garden Tours
25,641
Holiday
Open Houses
23,255
Spring
Garden Tours
26,964
Easter Egg
Roll
1,700
Congressional
Picnic
3,906
Independence
Day
PROTECTION
17
UNITED STATES SECRET SERVICE
2013 Annual Report
Former President Clinton
• Haiti and Mexico (October 2012)
• Denmark, Netherlands, England, and Ireland (November 2012)
• Haiti (January 2013)
• Japan, Norway, and Netherlands (February 2013)
• Spain, Nigeria, Morocco, Liberia, and the Azores (February
2013)
• Haiti (March 2013)
• Finland and the United Arab Emirates (April 2013)
• Haiti (May 2013)
• Peru and Colombia (May 2013)
• Spain, France, Sweden, Austria, and Germany (May 2013)
• Canada (June 2013)
• England, Ireland, Scotland, Germany, and Israel (June 2013)
• Mauritania, Gabon, Zambia, Malawi, Rwanda, South Africa,
Burkina Faso, and the Azores (July-August 2013)
Former President Carter
• Israel, Jordan, Egypt, France, Netherlands, and Germany
(October 2012)
• Canada (November 2012)
• Haiti (November 2012)
• China and Japan (December 2012)
• Colombia (January 2013)
• Mexico (February 2013)
• Argentina (March 2013)
• Finland, Nepal, and Burma (March-April 2013)
• Ireland (May 2013)
• England (July 2013)
• Colombia (July 2013)
• Mongolia, Thailand, Myanmar, and South Korea (September
2013)
Former President George W. Bush
• Cayman Islands and Dominican Republic (November 2012)
• South Korea and Hong Kong (March 2013)
• Cape Verde, Zambia, Tanzania, and England (July-August
2013)
White House Mail Screening Facility / Remote Delivery Branch
• The White House Mail Screening Facility (WHMSF) screens all mail, parcels, and special gifts destined for the White House
complex and Secret Service offices in the Washington, D.C. area.
• The WHMSF features chemical, biological, and forensic laboratories, as well as management offices. The Secret Service:
manages the detection of chemical, biological, radiological, and explosive threats; monitors the air for potential hazards; maintains
daily oversight of chemical and biological laboratory analysis; and conducts research and development programs related to mail
screening.
• The WHMSF added new threat agents to the list of screened substances.
• The Remote Delivery Branch coordinates with the Uniformed Division, Federal Protective Service, and Executive Office of the
President to screen all parcels and vehicle deliveries to the White House Complex.
Presidential Limousine Program
During FY 2013, the Secret Service continued to develop new
technologies to provide the latest security enhancements for
the President and other protectees. To supplement the existing
Presidential Limousine program, the Secret Service added new
vehicles to its existing fleet and initiated the Next Generation
Presidential Parade Limousine development program.
White House Complex Major Events
In FY 2013, the White House Complex received 303,505 visitors
and 280,429 workers.
Notable FY 2013 White House Events and Visitors
13. This is a Featured Item
Harum dit is a volores
ectioritiur sinctatin parum qui
ilibus invel et alibusc illabora
dionemporem et et faceatem.
Os experiatur a dolum aut qui
cum enecte cor acero quatur,
nonsequia vendese vitatum
reium event.
Evel explia invendi
bernatemosa id est volupictur
res dolupta tureriorrume
rererch
This is a Featured Item
Harum dit is a volores
ectioritiur sinctatin parum qui
ilibus invel et alibusc illabora
dionemporem et et faceatem.
Os experiatur a dolum aut qui
cum enecte cor acero quatur,
nonsequia vendese vitatum
reium event.
Non consequi cus voluptatque
si sunt quam, eius modi recat.
UNITED STATES SECRET SERVICE
2013 Annual Report
18
Strategic Intelligence
and Information
The Office of Strategic Intelligence and Information (SII) manages the collection,
evaluation, and dissemination of operational intelligence and information affecting
the Secret Service’s protective mission. SII also plans, directs, and coordinates the
agency’s risk assessments, protective intelligence investigations, and behavioral
research.
Protective Intelligence and Assessment
The Protective Intelligence and Assessment Division (PID) engages in a multifaceted
approach to support protective operations through information analysis, threat
investigation, risk assessment, and intelligence sharing. On a daily basis, PID
analyzes and evaluates information from various sources including: the intelligence
community; the military; state, local, and federal law enforcement agencies; and the
public. Utilizing various risk assessment methodologies, PID generates interpretive
appraisals and risk assessments that are disseminated to Secret Service management
and operational components.
In FY 2013, PID conducted domestic and foreign intelligence advances for Secret
Service protectees and NSSEs. In advance of these events, PID planned and
coordinated all investigative intelligence matters and conducted critical analysis
regarding the threat environment surrounding protectees, facilities, and the event.
National Threat Assessment Center
The National Threat Assessment Center (NTAC) provides training regarding the
prevention of targeted violence and the identification of attack related behaviors.
NTAC conducts its own behavioral research, and continues to set the standard for threat
assessment and evaluating the risk an individual may pose to Secret Service protected
interests.
During FY 2013, PID:
• Reviewed approximately 772,000
classified messages;
• Produced 1,050 protective
intelligence assessments;
• Opened a state-of-the-art global
operations center; and
• Completed the integration of a
web-based, protective intelligence
information management system.
In FY 2013, NTAC representatives:
• Provided training to approximately
1,400 individuals;
• Briefed 43 internal and external
entities; and
• Contributed behavioral expertise to
a national DHS initiative instructing
school districts about pre-attack
behaviors and threat assessments.
PROTECTION
14. In 1865, the Secret Service
was created to investigate
and prevent counterfeiting.
Today the agency’s
investigative mission has
evolved from enforcing
counterfeiting laws to
safeguarding the payment
and financial systems of
the United States from a
wide range of financial and
computer-based crimes.
To combat these crimes, the
Secret Service has adopted
a proactive approach, using
advanced technologies and
capitalizing on the power of
task force partnerships. Today,
computer experts, forensic
specialists, investigative
experts, and intelligence
analysts provide rapid response
and critical information in
support of financial analysis,
infrastructure protection, and
criminal investigations.
INVESTIGATIONS
21
Criminal
Investigations
The Secret Service has evolved into an agency recognized worldwide for its
investigative expertise and for its aggressive and innovative approach to the detection,
investigation, and prevention of financial crimes.
Today, the Secret Service conducts investigations to identify, locate, and apprehend
criminal organizations and individuals targeting the nation’s critical financial
infrastructure and payment systems involved in:
• Counterfeiting of U.S. currency;
• Access device fraud (including credit and debit fraud);
• Cyber intrusion;
• Identity crimes:
• Bank fraud; and
• Illicit financing operations.
UNITED STATES SECRET SERVICE
2013 Annual Report
WORTHY OF TRUST AND CONFIDENCE
15. Electronic Crimes Special Agent Program
The Secret Service established the Electronic Crimes Special
Agent Program (ECSAP) to provide Special Agents with
advanced computer and digital media forensics training. ECSAP
training is divided into three tiers: Basic Investigation of
Computer and Electronic Crimes; Network Intrusion Responder;
and Computer Forensics. The program is comprised of 1,750
special agents, deployed in more than 100 offices throughout
the world. In FY 2013, the ECSAP processed 1.2 petabytes of
data (equivalent to more than 242,000 DVDs) on approximately
5,000 devices.
Cyber Intelligence
The Cyber Intelligence Section (CIS) serves as the collection
point for data generated through cybercrime investigations,
open source Internet content, and information relating to
hacking, identity theft, credit card fraud, bank fraud, and
computer crimes. The information and coordination provided
by CIS plays a critical role in investigating, prosecuting, and
dismantling domestic and international criminal organizations.
Electronic Crimes Task Forces
In 1995, the Secret Service created the New York Electronic
Crimes Task Force. As a result of its success, Congress
mandated the establishment of a national network to prevent,
detect, and investigate electronic crimes, including potential
terrorist attacks against critical infrastructure and financial
payment systems.
In FY 2013, the network’s footprint expanded with new
Electronic Crimes Task Forces (ECTFs) in Denver, Colorado,
and Cincinnati, Ohio. Today, the Secret Service’s 33 ECTFs
leverage the combined resources of academia, the private
sector, and local, state, and federal law enforcement. These
partnerships allow ECTFs to adopt a proactive approach and
successfully prevent cyber-attacks before they occur.
23
UNITED STATES SECRET SERVICE
2013 Annual Report
Counterfeit Investigations
The threat of counterfeit U.S. currency to the financial system
of the United States has grown in recent years. Advances in
technology, the availability of scanning and printing devices, and
the adoption of the U.S. dollar by nations as their legal tender
have exacerbated the threat.
To counter these threats, the Secret Service focuses on
strategic international investigations targeting counterfeiters
and their distribution networks. The agency has also initiated
a comprehensive international forensic counterfeit detection-training
program for bankers and law enforcement officers
overseas.
In FY 2013, the Secret Service:
• Recovered approximately $156 million in counterfeit U.S.
currency;
• Arrested 2,668 criminals as a result of counterfeit
investigations; and
• Suppressed 262 counterfeit manufacturing plants.
Cyber Operations
As a result of the amalgamation of advanced technology and the
Internet, both the quantity and sophistication of cyber crimes
targeting U.S. financial institutions and critical infrastructure
has increased. Today, criminal trends show an increased use of
phishing emails, account takeovers, malicious software, hacking
attacks, and network intrusions resulting in significant data
breaches.
To protect the nation’s financial infrastructure from cyber and
financial criminals, the Secret Service has adopted a multi-pronged
approach that includes:
• Providing computer-based training to enhance the investigative
skills of special agents through the Electronic Crimes Special
Agent Program;
• Establishing a Computer Emergency Response Team in
coordination with Carnegie Mellon University;
• Maximizing partnerships with international law enforcement
counterparts through overseas field offices;
• Providing computer-based training to state and local law
enforcement partners to enhance their investigative skills at the
National Computer Forensics Institute; and
• Collaborating through an established network of 45 Financial
Crimes Task Forces and 33 Electronic Crimes Task Forces.
INVESTIGATIONS
Project South America
Project South America is the combined oversight of Secret
Service vetted anti-counterfeit efforts in Colombia and Peru.
The goal of Project South America is to reduce the production,
sale, and distribution of counterfeit U.S. currency within
Colombia and Peru and its export to other countries. Tactics
include providing the necessary training, strategy development,
and infrastructure improvement to foreign law enforcement
partners. Since 1986, the Secret Service has recovered
approximately $630 million in South American-produced
counterfeit U.S. currency passed and seized globally.
In FY 2013, the Secret Service prevented over
$1.1 billion in fraud loss and identified more than
$235 million in actual fraud loss in cyber crime
investigations.
16. UNITED STATES SECRET SERVICE
2013 Annual Report
Critical Systems Protection
The Critical Systems Protection (CSP) Program oversees
a systematic audit and technical assessment of the critical
infrastructure and utilities that support protective visits,
events, and venues. CSP assessments identify and evaluate
computer networks, process-control systems, and remotely
controlled devices that impact an operational security plan. The
assessments result in a comprehensive situational awareness
of the cyber-security environment and a clear understanding of
the potential impacts on physical security resulting from cyber
security.
FY 2013 Highlights:
• Conducted 186 advances in support of protective visits;
• Collaborated with the Intelligence Community and private
sector to support the State of the Union Address, the George
W. Bush Presidential Center dedication, and the 68th United
Nations General Assembly;
• Conducted training on the awareness of real-time network
activity through traffic analysis and the identification of
malicious network activity; and
• Developed and deployed a remote sensing platform with the
Software Engineering Institute at Carnegie Mellon University.
INVESTIGATIONS
Financial Investigations
The Secret Service is recognized worldwide for its investigative
expertise and for its aggressive and innovative approach to the
detection, investigation, and prevention of financial crimes.
As payment methods have changed over the years – from coin
and paper currency, to checks, credit cards, and now, online
transactions – the scope of the Secret Service’s investigations
have expanded.
Financial Crimes Task Forces
Financial Crimes Task Forces (FCTFs) combine the resources
of the private sector and other law enforcement agencies in an
organized effort to combat threats to U.S. financial payment
systems and critical infrastructures. In FY 2013, the Secret
Service established three additional FCTFs: Richmond, Virginia;
Salt Lake City, Utah; and Tucson, Arizona. These task forces
bring the total number to 45 FCTFs located across the country.
Mortgage Fraud Investigations
The Secret Service has been investigating mortgage fraud for
over 15 years. In 2009, President Obama signed into law the
Fraud Enforcement and Recovery Act, which highlighted the
Secret Service’s investigative role in combatting this national
problem.
Money Laundering Investigations
The Money Laundering Section (MLS) serves as a conduit
between Secret Service investigative task forces and the U.S.
Department of Justice. On an annual basis, MLS participates
in the National Suspicious Activity Report review team and
the Bank Fraud Working Group and contributes to the annual
National Money Laundering Threat Assessment published by the
Department of the Treasury.
FY 2013 Accomplishments:
• 50 Secret Service cases involved money laundering and related
charges; and
• 12 federal, 9 state, and 35 international arrests were made.
The CSP program is critical to the overall
effectiveness of the DHS cyber security mission
and supports the Department’s goal of creating a
safe, secure, and resilient cyber environment.
17. UNITED STATES SECRET SERVICE
2013 Annual Report
Mobile Wireless Investigations
In FY 2013, the Secret Service conducted 1,300 mobile wireless
investigations. This represented a 14 percent increase from the
previous year. The Secret Service deploys this technology, after
having secured a subpoena, to assist investigative and protective
missions and to support local, state, and federal partners.
Throughout the year, 24 Special Agents received training as part
of the Mobile Wireless Investigations Basic Course.
Cell Phone Forensic Program
The U.S. Secret Service Cell Phone Forensic Facility at the
University of Tulsa investigates digital evidence from mobile
communications such as cell phones, tablets, and GPS devices.
In addition to conducting mobile device forensics, the
Facility also oversees a proactive research agenda aimed at
developing tools, processes, and technical solutions for forensic
examination.
In FY 2013:
• 1,400 field examinations were completed;
• 60 mobile and skimming device examinations were conducted;
and
• 24 USSS, ICE/HSI, and IRS Special Agents completed
advanced mobile device forensic course at the Federal Law
Enforcement Training Center in Glynco, Georgia.
National Computer Forensics Institute
The National Computer Forensics Institute (NCFI) in Hoover,
Alabama is the nation’s only federally funded training center
dedicated to instructing state and local officials in digital and
cybercrime investigations. In FY 2013, the NCFI provided
training to over 500 law enforcement investigators, prosecutors,
and judges on current cyber crime trends, investigative methods,
and prosecutorial challenges.
Since 2008, NCFI has:
• Trained more than 2,500 state and local officials;
• Trained police investigators, prosecutors, and judges from all
50 states; and
• Trained representatives from over 1,000 agencies nationwide.
Asset
Forfeiture
The Asset Forfeiture Division (AFD) manages the asset
forfeiture program and provides guidance and field support in
managing administrative, civil, judicial, and criminal forfeitures.
Forfeiture is a critical tool in disbanding money laundering,
fraud related crimes, racketeering, and other forms of organized
criminal activity.
Asset Forfeiture and Money Laundering Task Force
In FY 2013, the Secret Service created an Asset Forfeiture and
Money Laundering Task Force (AFMLTF). The Task Force
targets transnational criminal organizations, third-party payment
processors, and their laundered proceeds. In FY 2013, the
AFMLTF sent 49 investigative referrals to domestic field offices,
resulting in over $11.8 million in seizures and numerous high
impact arrests.
26
INVESTIGATIONS
Seizures Issued in FY 2013: 1,048
419 with a federal
arrest
242 with a state/
local arrest
19 with a federal
and a state/local
arrest
368 property
seizures
18. 29
UNITED STATES SECRET SERVICE
2013 Annual Report
FSD is one of approximately
400 laboratories worldwide
accredited by the American
Society of Crime Laboratory
Directors/Laboratory
Accreditation Board. It is
the only crime laboratory
within the Department
of Homeland Security to
achieve this accreditation.
Forensic
Services
The Forensic Services Division (FSD) is a multi-disciplined forensic program. Its
mission is to: provide accurate and timely forensic examinations; offer training and
consultation services; and meet visual communication requirements to support the
mission of the Secret Service. FSD is composed of four branches:
FSD Laboratory
Supports field investigations by analyzing evidence obtained
during investigations, providing crime scene assistance
and subject matter expertise during courtroom
testimony, writing reports regarding
scientific findings, and providing
training to investigators on
Polygraph
Program Branch
Recognized as one of
the premiere programs in
the world, this branch supports
protective and investigative missions,
augments the agency’s pre-employment
process, and assists in federal, state,
and local criminal investigations.
forensic analysis.
Visual
Information
Branches
Features a unique blend of
technologies that provide expertise
in forensic photography, graphic
design, multimedia operations, audio
and image enhancement, speaker
identification, and 3D modeling and
Research simulation.
Section
Coordinates science
and technology research related
to latent print development, questioned
document analysis, image and audio analysis,
remote credibility assessment, simulation modeling, and
tagging, tracking, and locating.
INVESTIGATIONS
19. 31
Special Projects
Speaker Identification Program
FSD continues to lead research in the field of Speaker
Identification. Throughout FY 2013, FSD developed methods
that allow agencies working with non-English languages to
compare known samples to unknown samples.
Simulation Training
A new Counter Sniper Simulation Training was created at
FSD’s SIMLAB. The training provides counter sniper teams an
opportunity to engage attackers and combat threats in a virtual
environment.
Thermal Ribbon Analysis
FSD continued the development and deployment of the Thermal
Ribbon Analysis Platform (TRAP) system. The TRAP device
reads and records thermal ribbon printing, a technique often
employed in the production of counterfeit documents associated
with financial fraud. Previously, no capability existed that
allowed for the automated and expeditious processing of these
ribbons.
3D Modeling Projects
FSD continued the production of 3D virtual models associated
with frequented locations by Secret Service protectees. The
development of these models increases efficiency in security
planning, briefings, and training scenarios.
National Center for Missing and Exploited Children
The Secret Service provides forensic, technical, and
investigative support to the National Center for Missing and
Exploited Children. As part of this effort, in 1997, the Secret
Service established Operation Safe Kids to promote the
safety of children by providing parents and guardians with a
document containing the child’s biographical data, a current
photograph, and a set of digitized, inkless fingerprints. In FY
2013, approximately 2,300 children were fingerprinted and
photographed across 14 states.
Investigative
Support
The Investigative Support Division (ISD)
features a 24-hour Operations Center that
provides rapid identification of assets and
background information on individuals, groups
and businesses in support of the investigative
and protective mission. In FY 2013, the
Operations Center conducted approximately
27,800 searches in support of agents in the field.
Throughout the year, ISD continued to leverage
emerging digital technologies through the
research and testing of facial recognition, social
media, and electronic storage media.
UNITED STATES SECRET SERVICE
2013 Annual Report
INVESTIGATIONS
20. 32
International Programs
• 24 International Field Offices;
• 58 Special Agents stationed abroad;
• Closed 163 counterfeiting investigations;
• Liaison point for all international training; and
• Provided Personnel Recovery Training to Special Agents.
International Office Accomplishments
• Supported 354 international protective stops in 66 countries;
• Assisted in the arrests of 952 criminal suspects implicated in currency counterfeiting,
financial crimes, and cyber cases;
• Seized over $49 million in counterfeit U.S. currency prior to its introduction into
circulation;
• Identified more than $831 million in potential losses during financial crime
investigations;
• Seized $27.9 million in counterfeit U.S. currency after its introduction into circulation,
assisted with 9 in-country arrests, and suppressed one plant in Colombia; and
• Seized $16.3 million in counterfeit U.S. currency after its introduction into circulation,
assisted with 19 in-country arrests, and suppressed three counterfeit operations in Peru.
International Law Enforcement Academies
The Secret Service’s work with International Law Enforcement Academies (ILEA)
provides an opportunity to forge new relationships and share protective and investigative
expertise with international law enforcement partners. Providing training to international
law enforcement partners has allowed the Secret Service to expand its investigative
footprint in countries where cyber crime is proliferating at an alarming rate. Today, Secret
Service maintains a robust relationship with locations in Hungary, Thailand, El Salvador,
and Botswana, as well as a regional training center in Peru. In FY 2013, IPD trained
approximately 800 international police officers from 70 countries.
Trends and Challenges
This past year saw an increase in
cyber-related criminal activity involving
Eurasian hacking groups targeting
U.S. citizens and financial institutions.
Subjects in Eastern Europe control
many of the Internet web sites buying
and selling illicitly obtained credit card
data. These sites openly advertise stolen
credit card information, compromised
bank accounts, hacking and malware
services, and counterfeit identity
documents.
Globally, FY 2013 cyber
investigations conducted by
Secret Service international
offices identified over $134
million in actual losses, and over
$1.8 billion in potential losses.
UNITED STATES SECRET SERVICE
2013 Annual Report
INTERNATIONAL HIGHLIGHTS
1
1
Lima Resident Office
Peruvian Counterfeit
Task Force Agents
seized $16.3 million
in counterfeit U.S.
currency, assisted
with the arrests of 19
Peruvian nationals,
and suppressed three
counterfeit operations.
2
2
Bogota Resident Office
Project Colombia
partners seized $27.9
million in counterfeit
U.S. currency, made 9
in-country arrests, and
suppressed one plant.
3
3
Sofia Resident Office
In coordination
with the Hellenic
National Police, five
Greek suspects were
arrested and over $6
million in counterfeit
U.S. currency was
seized as part of a
sophisticated counterfeit
manufacturing
operation.
21. UNITED STATES SECRET SERVICE DOMESTIC HIGHLIGHTS
2013 Annual Report
1
34
Sacramento Resident
Office
July 2013: Utilizing
the Secret Service
Counterfeit Tracking
Application, agents
dismantled a counterfeit
production and
distribution scheme
and seized $359,920 in
counterfeit U.S. currency.
Charlotte Field Office
August 2013: Agents
shut down the
ZeekRewards operation,
identified by the SEC
as the 3rd largest Ponzi
scheme in the world,
affecting 2.1 million
victims in 70 countries.
As of September 2013,
over $234 million had
been seized and is the
largest asset forfeiture in
Secret Service history.
6
Houston and Miami
Field Offices
June 2013: Based on an
examination conducted
by the Treasury
Obligation Section,
agents arrested Alexis
Palmer, who oversaw
an operation that passed
$3 million in counterfeit
U.S. currency.
Miami Field Office
July 2013: Agents
arrested two criminals
responsible for a
mortgage fraud scheme
that included 65
fraudulent loans and total
fraud loss in excess of
$12 million.
9
9 10
10 11
12
13
14
14
15
15
16
17 18
Forensic Services Division
7 8
11 12 13
New Orleans Field
Office
June 2013: Agents
arrested 13 criminals and
seized six computers, two
vehicles, and $146,777
in U.S. currency as part
of a tax refund scheme
responsible for over $20
million in fraud loss.
16 17 18
Norfolk Resident Office
January 2013: Hampton
Roads Financial Crimes
Task Force Agents
arrested four criminals
as part of a fraudulent
scheme involving Visa
debit cards that were
responsible for $4.5
million in total fraud
loss.
Nashville Field
Office
July 2013: Agents
arrested the perpetrators
responsible for a health
fraud scheme that
defrauded more than
17,000 victims in all 50
states and resulted in
$28 million in financial
losses.
Newark Field Office
February 2013: Agents
arrested 15 members of a
large-scale, transnational
criminal network
responsible for $185
million in fraud loss
and obtaining 25,000
fraudulent credit cards
accounts.
Detroit Field
Office
December 2012: Agents
arrested Dennis Murphy,
who oversaw a mortgage
fraud scheme involving
collusive bankers and
falsified loan applications
resulting in $2 million in
fraud loss.
New York Field Office
December 2013: New
York Electronic Crimes
Task Force Agents
arrested 10 suspects who
withdrew $2.8 million
from 750 Manhattan
ATMs as part of a
large-scale, transnational
access device fraud
operation.
Criminal Investigative Division
1
Los Angeles Field Office
April 2013: Seized 25
vehicles as part of a
transnational, trade-based
money laundering scheme
involving the exportation
of high end vehicles to
Asia.
Seized: $2,445,533.25
3
5
4
2
Asset Forfeiture Division
2
Detroit Field Office
April 2013: Seized
funding and assets
associated with
transnational, trade-based
money laundering
scheme involving stolen
cell phones.
Seized: $1,290,961.00
3
Tampa Field Office
February 2013: Seized
funding associated with
a money laundering
scheme originating in
Mexico and connected
with the Mexican drug
cartel, Los Zetas.
Seized: $3,142,287.75
4
Columbia Field Office
April 2013: Seized 60
vehicles and funding
associated with a
transnational, trade-based
money laundering
scheme involving the
exportation of vehicles.
Seized: $6,889,715.70
5
Charlotte Field Office
April 2013: Seized
funding from a merchant
account associated with
the ZeekRewards.com
Ponzi scheme, as a
result of wire fraud
violations.
Seized: $7,260,496.29
7
8
6
Oklahoma Field Office
April 2013: Assisted
local authorities in a
criminal investigation
involving child
pornography and
administered the
polygraph examination
that led to the suspect’s
confession to having
sexual contact with nine
children.
St. Louis Field Office
September 2013:
Assisted local
authorities in a
homicide investigation
by administering a
polygraph examination
that led to a suspect’s
confession.
Newark Field Office
July 2013: Assisted the
Newark Field Office in
dismantling a criminal
internet forum known
as Shadowcrew by
providing fingerprint
analysis.
22. UNITED STATES SECRET SERVICE
2013 Annual Report
37
MISSION SUPPORT
WORTHY OF TRUST AND CONFIDENCE
Technical Security
In order to provide a secure environment for Secret Service protectees, the Technical
Security Division (TSD) oversees, manages, and administers: equipment and
systems deployed to agency facilities; various technical security detection systems;
comprehensive countermeasures programs against CBRNE threats; and technical and
electronic to the White House Complex, the Vice President’s Residence, domestic and
international field offices, and other locations. Significant FY 2013 highlights and
upgrades include:
Supporting the dual mission of the
Secret Service is the responsibility
of a wide range of directorates,
divisions, and programs. Every
day, Secret Service personnel
who specialize in technology
development, test and evaluation,
information systems, strategic
planning, and administrative
operations perform a variety
of tasks that are critical to the
agency’s success.
Fixed Protective Sites
• Installed the Officer Post Messaging and Alert
System, completed the installation of Physical
Security Information Management System
monitors and enhanced White House Incident
Notification Systems that provide simultaneous
alerts;
• Continued to evaluate infrastructure technologies
that enhance situational awareness;
• Installed an uninterruptable power supply to
Access Control Systems;
• Upgraded the Under Vehicle Inspection Systems;
and
• Procured, deployed, and maintained desktop and
handheld trace explosives detection systems.
Training
• Trained employees on search methods for
explosive devices;
• Trained employees on terrorist device
familiarization; and
• Provided basic radiation safety training to Secret
Service employees working with ionizing radiation
producing devices.
Technical Capabilities
• Upgraded X-ray machines in officer booths at
protected facilities;
• Upgraded CBRN personal protective equipment;
• Enhanced GPS Blue Force Tracking System
in support of protective operations at fixed and
temporary sites; and
• Provided GPS tracking support to all protective
details during the 68th United Nations General
Assembly.
Multi-Year Efforts Initiated
• Technology assessment reviewing the functionality
and coverage of fixed site detection systems;
• Feasibility study for the future White House
Visitor Entrance Complex;
• Development of an Integrated Design Plan for
visual surveillance enhancements at protective
sites;
• Repairs and preventative maintenance upgrades to
metal detector systems; and
• Designed next-generation bollard systems used at
fixed sites.
23. MISSION SUPPORT
39
Information Resources
Management
The Information Resources Management Division (IRM) plans, develops, implements, and manages
information technology solutions for the Secret Service. IRM supports the agency’s mission by
developing and operating the network infrastructure, equipment and applications, providing voice
communications capabilities, and delivering new services and applications that support critical
protective and investigative needs. IRM is also responsible for a major infrastructure modernization
program titled Information Integration and Technology Transformation (IITT) which was initiated in FY
2010 and is scheduled to achieve full operational capability in FY 2017. In FY 2013, accomplishments
were achieved in the following organizational areas:
IRM Accomplishments
• Successfully implemented the Integrated Command Control System program. The program includes
acquisition and deployment of secure wireless systems for use by security personnel at temporary
sites;
• Converted 34 office locations from analog voice and data circuits to digital systems, providing the
Secret Service with versatile and reliable voice and data transmission capabilities;
• Completed Radio over IP upgrades at 42 office locations modernizing radio communications; and
• Deployed 250 Tri-band radios to enable interoperability within Secret Service special operations and
other federal tactical teams.
IITT Accomplishments
• Completed the IITT “stabilization phase” at all field sites. Stabilization reduces risk of system failure
until modernization is achieved by replacing antiquated, end-of-life components;
• Improved network capacity and redundancy while enhancing the Intrusion Prevention System and
network monitoring;
• Established the Cross Domain project’s email transmission capability for Top Secret and Below
Interoperability, with additional capability in Workflow Enforcement, File Drop, and Secret and Below
Interoperability;
• Deployed the Multi-Level Security project to Criminal, Protective, and Security Clearance Divisions,
providing enhanced ability to review multiple levels of intelligence information and becoming the first
DHS component to consolidate separate security domains into a single desktop; and
• Achieved full operational capability for the Protective Threat Management System project with a
web-based system that provides investigators and analysts with capabilities for advanced search of
potential threats, routing and workflow enhancements, and threat report generation.
The Information Resources
Management Division oversees
the Information Technology
platforms and communications
infrastructure that supports
Secret Service protective,
investigative, and administrative
activities.
UNITED STATES SECRET SERVICE
2013 Annual Report
24. UNITED STATES SECRET SERVICE
2013 Annual Report
MISSION SUPPORT
Administrative,
Financial, and
Management
Operations
Administration
The Office of Administration (ADM) plans, directs, and coordinates all administrative
functions and programs. During FY 2013, the Budget Staff managed the agency’s $1.6
billion dollar budget and coordinated the formulation and preparation of the budget to
DHS, the Office of Management and Budget (OMB), and Congress. In FY 2013, the
Budget Staff submitted the FY 2014 Congressional Budget, the FY 2015-2019 USSS
Resource Allocation Plan (RAP), and the FY 2015 OMB Submission to DHS.
The Enterprise Governance Council (EGC) presented the FY 2015-2019 USSS RAP
funding to the Secret Service Executive Resources Board. The EGC ensures investment
initiative decisions support the goals, objectives, and strategies identified by the Secret
Service executive leadership and in the agency’s Strategic Plan.
Business Processes
In FY 2013, the Secret Service continued to enhance and develop the Financial Repository
Enterprise Database (FRED). The database allows for the extraction of relevant fiscal
data from the agency’s financial management, acquisition, and asset management
enterprise business system. FRED users have the ability to query one of 38 pre-built
financial reports, utilize an advanced reporting tool, and conduct advanced budgetary
analysis related to the status of funds, commitment actions, and spending trend analysis.
Labor Distribution
In FY 2013, the Secret Service implemented the WebTA/Labor Distribution Modification
project. The WebTA/Labor Distribution data provides insight to senior leadership on
budget execution and financial reporting, and informs budget formulation for the out-years.
Office of the Chief Information Officer
In FY 2013, the Office of the Chief Information Officer (CIO)
supported the agency’s mission by collaborating with DHS
and the White House Military Office on matters of mutual
interest. The CIO provides executive oversight of Information
Technology policy, system security, and cyber investments.
Significant accomplishments included:
• Implemented network surveillance capabilities for continuous
monitoring;
• Conducted Quarterly IT Program Reviews;
• Achieved 90% FISMA security requirements; and
• Hosted an Information Technology Expo.
40 41
25. UNITED STATES SECRET SERVICE
2013 Annual Report
In FY 2013, the Procurement Division (PRO) issued 2,321
contracts totalling over $237 million in obligations. Throughout
the year, PRO provided training regarding initiating and
completing procurement actions. PRO also served as the
executive agent for the DHS-wide tactical communications
sourcing vehicle. The vehicle allows for the procurement of
tactical communications equipment and services, subscriber,
infrastructure and test equipment, and infrastructure, operations,
and maintenance management services.
In FY 2013, PRO supported DHS small business goals and
assisted the agency in exceeding expectations for executing
contract awards:
Contract Award Acomplishments
35% 48.1%
Procurement
Small Businesses
The mission of the Component Acquisition Executive and the
Acquisition Management Program (ACQ) is to establish and
maintain a strong acquisition governance framework and to train
and certify an acquisition workforce capable of meeting the
agency’s ongoing and emerging needs.
During FY 2013, the ACQ worked with new and existing
acquisition programs in the development of acquisition
documentation and fulfilment of acquisition practices. ACQ
worked with DHS to modify the DHS Quarterly Program
Accountability Report and provided recommendations to
enhance the DHS Comprehensive Acquisition Status Report.
ACQ identified and assisted employees whose duties required
training and certification. At the conclusion of FY 2013, 61
certifications were held by Secret Service personnel.
Small Disadvantaged Businesses
Section 8(a) Businesses
Acquisition
Service-Disabled Veteran-Owned Businesses
Non-Section 8(a) Small Disadvantaged Businesses
HUB Zone
Women-Owned Small Businesses
Goal
4% 6.7%
3% 5.7%
9% 19%
5% 12.2% 5% 15.5%
3% 9.2%
Accomplishment in FY2013
MISSION SUPPORT
Administrative Operations
In FY 2013, the Administrative Operations Division (AOD):
• Continued to implement efficiency enhancements associated
with Agency owned and leased properties;
• Completed the build-out of the Catastrophic Alternate Work
Sites;
• Continued fleet management efforts to improve efficiency and
productivity, and reduce costs associated with the agency’s
transportation fleet;
• Submitted the final version of the annual Vehicle Methodology
Allocation to DHS;
• Maintained over 200,000 independent pieces of property
valued in excess of $600,000;
• Processed approximately 160,000 pieces of incoming first
class mail and express courier packages; and
• Donated computer related items to schools and non-profit
organizations.
Management and Organization
The Management and Organization Division (MNO) supports
the agency’s core missions through informed analysis,
consultation, and decision support. In FY 2013, MNO:
• Participated in the development of the FY 2014-2018 Secret
Service Strategic Plan;
• Participated in DHS activities to develop the next Quadrennial
Homeland Security Review;
• Facilitated policy changes related to acquisition, budget,
information technology, investigations, protective operations,
and business processes; and
• Chaired the DHS Records Leadership Council.
42 43
26. UNITED STATES SECRET SERVICE
2013 Annual Report
MISSION SUPPORT
Professional Responsibility
The Office of Professional Responsibility ensures that Secret Service offices and programs comply with agency policies and federal
regulations, and helps operational mission areas continue to function efficiently and effectively. The Inspection Division and the
Mission Assurance Division collaborate in the review and assessment of USSS offices, programs, and operational practices. The
efforts of these two divisions result in a comprehensive, enterprise-wide view of the agency and its efforts to maintain high levels of
integrity, compliance, and accountability.
practices that can be leveraged to improve and standardize
operational protocols across program areas.
Types of Assessments conducted by MSN:
Operational Assessments
Designed to measure effectiveness and efficiency and conducted
with the cooperation of the operational entity or program.
Vulnerability Assessments
Target specific protective operations or missions, are narrowly
focused, and brief in duration. Conducted in a surreptitious
manner and are designed to identify and mitigate vulnerabilities.
FY 2013 Assessment highlights:
Global Positioning System Blue Force Tracking
(GPS/BFT) Program
• Examined GPS tracking programs and their impact on mobile
operations; and
• Produced operational practices and policy recommendations
aimed at developing a more robust Blue Force Tracking
program.
International Office Program
• Reviewed USSS compliance with the laws, rules, and
regulations governing USG employees stationed abroad; and
• Identified potential cost savings and improved cost projection
options.
Compliance Inspections
The Inspection Division inspects approximately one-third of
Secret Service offices on a scheduled, yearly rotation. In FY
2013, a total of 44 office inspections were conducted. In order
to ensure the inspections are comprehensive, transparent, and
fair the Secret Service has developed:
• A standard process for conducting employee interviews;
• A policy framework that allows Inspectors to ensure offices
adhere to organizational practices;
• A methodology for conducting on-site assessments of
operational offices; and
• A technique for reviewing existing levels of coordination
between operational and support offices.
Integrity Investigations
The Office of Professional Responsibility is proactive in its
efforts to communicate the ethical standards of the agency
to employees. As a result, special, fact finder, and complaint
investigations are regularly conducted to ensure that integrity
standards are maintained.
Mission Assurance
The Mission Assurance Division (MSN) conducts independent
assessments of operational activities in order to validate
effectiveness and efficiency, and identify vulnerabilities. To do
so, MSN partners with operational personnel and subject matter
experts to assess current operational procedures and protocols.
As a result, MSN produces a set of lessons learned and best
27. Secret Service employees
are our most important and
valued resource. Through
sound management practices
the agency continues to
recruit, develop, and retain a
diverse and highly qualified
workforce necessary for
meeting the challenges of the
21st century.
UNITED STATES SECRET SERVICE
2013 Annual Report
HUMAN
CAPITAL
46
The James J. Rowley
Training Center
The James J. Rowley Training Center (RTC) is the primary training academy for
the Secret Service. The nearly 500 acre complex is comprised of 36 buildings that
include: classrooms, computer labs, physical fitness facilities, and facilities designed
for mission-related tactical training. The complex also features indoor and outdoor
firearm ranges, tactical villages, and a protective operations driving pad. The RTC’s
facilities are used by both current employees and new recruits, and allow the agency
to provide collaborative training to federal, state, and local law enforcement partners.
During FY 2013, the RTC:
• Provided 413 specialized training courses to 12,709 attendees;
• Completed 12,108 weapons re-qualification courses for agency employees;
• Oversaw the completion of 104,244 online training courses in areas such as
emergency preparedness, management and leadership development, and a wide
range of regulatory and compliance topics;
• Provided 84 training courses to a total of 1,698 external students; and
• Conducted 57 official tours and briefings to law enforcement officials, public sector
officials, dignitaries, and other partners.
WORTHY OF TRUST AND CONFIDENCE
28. UNITED STATES SECRET SERVICE HUMAN CAPITAL
2013 Annual Report
49
DHS Cooperation
In order to help strengthen
ties and relationships within
DHS, RTC participated in
a variety of Departmental
Working Groups, including:
leadership; emergency
medical services; training
evaluation, assessment and
quality; distance learning; and
canine training.
RTC continued to play a key
role in developing the DHS
Training Leaders Council
Strategic Plan. The plan
serves as the blueprint for
coordinating and promoting
training, education, and
professional development
throughout DHS, state, local,
and tribal homeland security
partners.
Accreditation
In FY 2013, the Basic
Investigations of Computer
and Electronic Crime
Program Training Course
was accredited by the Federal
Law Enforcement Training
Accreditation (FLETA)
governing body. The RTC
also reaccredited the facility
itself and the Essentials of
Instruction Course.
RTC conducted multiple
external assessments for
FLETA, leveraging existing
partnerships with the Federal
Reserve System, DHS basic
and mid-level intelligence
training, and the Immigration
and Customs Enforcement
instructor and leadership
training programs.
RTC Upgrades
During FY 2013, RTC completed
the following upgrades to its
campus infrastructure:
• Replaced the roofs on three
buildings, using materials that
are eco-friendly and will extend
the life cycle of the existing
infrastructure;
• Installed a new building
management system for
campus-wide heating and
cooling to decrease the
potential for mechanical system
failure, reduce utility-related
expenditures, and lower the cost
of preventative maintenance;
and
• Renovated a firing range in
order to enhance ventilation and
sound dampening capabilities.
2013 Presidential
Inauguration
In preparation for the 2013
Presidential Inauguration,
RTC provided numerous
training courses and tabletop
exercises for both internal
entities and public and
private sector partners.
The tabletop exercises were
performed in coordination
with White House staff,
federal, state, and local law
enforcement partners, and the
private sector.
29. The Human Resources
Research and Assessment
Division supports the
agency by developing and
implementing assessments
related to personnel
selections, promotions,
career development and
organizational effectiveness.
HUMAN CAPITAL
51
UNITED STATES SECRET SERVICE
2013 Annual Report
Human Resources
Research and
Assessment
The Human Resources Research and Assessment Division (HRR) strengthens the Secret Service’s
ability to recruit, develop, and retain a highly-specialized and dedicated workforce. HRR specializes
in implementing best practices, policies, and procedures that increase efficiency and maximize
effectiveness. In FY 2013, HRR implemented the following initiatives:
Special Agent Merit Promotion Process
In January 2013, the Secret Service initiated the fifth annual system for Special Agent merit promotion.
The process includes four job-related assessment tools that measure the requisite competencies for
promotion to the GS-14 and GS-15 supervisory grade levels. In FY 2013, a total of 1,539 candidates
completed the first-level evaluation and were given consideration in the second-level that evaluates
professional accomplishments.
Special Agent Entrance Exam
As part of the agency’s approach to enhance the hiring of entry-level special agents, HRR developed
a new methodology to replace the existing Treasury Enforcement Agent Exam. The Special Agent
Entrance Exam (SAEE) measures required competencies such as written communication, problem
solving, and attention to detail. The exam was developed exclusively for Secret Service purposes
and is based on a comprehensive analysis of non-supervisory special agent functions. Overall, SAEE
offers HRR an enhanced measure of predictive ability when assessing prospective employees. Prior to
implementation, HRR conducted a validation study assessing the predictive capabilities and a pilot test
with actual applicants. SAEE was officially implemented in June 2013.
Applicant Physical Abilities Test
In FY 2013, HRR developed and validated a new pre-employment physical fitness test as an additional
means of enhancing selection and screening procedures for entry-level special agent and Uniformed
Division Officer applicants. The test evaluates an applicant’s ability to perform required physical tasks
by measuring muscular strength, endurance, and capacity.
30. The Diversity and Inclusion
Program develops and
implements strategies that
promote and maximize
the potential of a diverse
workforce. The Secret
Service is committed to
maintaining a diverse and
inclusive workplace where
all employees can have
rewarding careers.
UNITED STATES SECRET SERVICE
2013 Annual Report
52
Diversity Programs
and Outreach
The Secret Service actively promotes an organizational culture where diversity and inclusion are
recognized, appreciated, and valued. To foster this environment, the Director, members of her
Executive Staff, and select employees attended a number of events and national training conferences
sponsored by external law enforcement organizations.
Hispanic American Police Command Officers Association Conference
October 7-11, 2012 - Former Assistant Director Keith Hill delivered remarks at the opening
ceremony of this conference held in Long Beach, California.
Women in Federal Law Enforcement
June 24-27, 2013 - Director of the Equal Employment Office, Carolyn McMillon, hosted a meet and
greet with the agency’s attendees in Rancho Mirage, California.
National Asian Peace Officers Association
July 15-19, 2013 - Uniformed Division Officer Christopher Aboy instructed two defensive tactics
classes during the conference in Las Vegas, Nevada.
National Organization of Black Law Enforcement Executives
August 3-7, 2013 - Director Julia Pierson served as a distinguished member of the dais during the
opening ceremony and hosted an agency meet and greet with the attendees of the conference in
Pittsburgh, Pennsylvania.
National Native American Law Enforcement Association
September 17-19, 2013 - Senior Special Agent William Wind was sworn in as the Sergeant at Arms
for 2013-2014 during the conference in Las Vegas, Nevada.
Historically Black Colleges and Universities (HBCU)
Throughout FY 2013, the Secret Service visited 16 HBCUs and hosted events to create awareness
about employment opportunities and encourage students to pursue careers in law enforcement. The
Secret Service also established partnerships with Howard University and the Thurgood Marshall
College Fund.
HUMAN CAPITAL
31. The Recruitment Division’s
mission is to increase public
awareness about career
opportunities and recruit
a diverse, highly qualified
applicant pool capable
of achieving the agency’s
mission.
UNITED STATES SECRET SERVICE
2013 Annual Report
54
Recruitment
In order to draw a talented, dedicated, and diverse workforce, the Recruitment Division employs the
following strategies:
• Partners with professional organizations, diversity-focused associations, academic institutions, and
military communities;
• Provides information sessions at colleges and universities, military installations, and high schools;
• Provides tours at Secret Service facilities that introduce the public to the organization’s history,
provide interactive learning experiences, and allow for in-depth presentations;
• Coordinates employment skills workshops regarding resume building, special hiring authorities,
and federal government vacancy announcements; and
• Coordinates diversity-focused activities that create awareness regarding career opportunities to
groups with diverse talents and experiences.
FY 2013 Accomplishments:
• Participated in 438 recruitment outreach events;
• Posted the “Women’s Recruitment Website” on the Secret Service’s employment webpage
(www.secretservice.gov/join);
• Recognized by U.S. Veterans Magazine as “Best of the Best” among federal government and
law enforcement agencies at creating employment and business opportunities for veterans,
transitioning service members, disabled veterans, spouses, and veteran business owners;
• Recognized by Black Equal Opportunity Employment Journal and Hispanic Network Magazine
as “Best of the Best” among federal government and law enforcement agencies at promoting
diversity;
• Distributed professional work attire to over 100 veterans at the “Veterans Stand Down & Homeless
Resource Day” in Prince George’s County, Maryland; and
• In July 2013, hosted members of the National Law Enforcement Explorer Leadership Academy
and focused on the dynamics of leadership and motivating others.
HUMAN CAPITAL
32. UNITED STATES SECRET SERVICE
2013 Annual Report
56
Director’s Awards
Special Agent
of the Year
Laura Anne Hughes
Charlotte Field Office
Special Agent Hughes played a
critical role in the investigation and
dismantling of the Ponzi scheme
known as ZeekRewards. Special Agent
Hughes was also recognized for her role
as the logistics agent during the 2012
Democratic National Convention in
Charlotte, North Carolina.
Administrative, Professional,
Technical Employee of the Year
Alice C. Thomas
Forensic Services Division
Ms. Thomas provided critical assistance
to the U.S. Attorney’s Office and
enhanced a series of images recovered
during an investigation. As a result,
the U.S. Attorney’s Office obtained one
guilty plea and four convictions of the
defendants on over 170 counts.
Uniformed Division Officer
of the Year
Richard Macauley
Special Operations Branch
Sergeant Technician Macauley
was honored for his contributions
towards the modernization of the
Hazardous Agent Mitigation Medical
Emergency Response (HAMMER)
Team. Sergeant Technician Macauley
served as the Team leader and
operational coordinator for HAMMER
assets during the 2013 Presidential
Inauguration.
Acknowledgements
Director
Julia Pierson
Deputy Director
A.T. Smith
Office of Government and Public Affairs
Assistant Director
Jane Murphy
Deputy Assistant Director
Edwin Donovan
Assistant Special Agent in Charge
Max Milien
Staff Assistants
Brian Leary and George Ogilvie
Senior Editor
Doug Stone
Graphic Designer
Barbara Thacker
Photographers
Amanda Rowe and John Sokolowski
33. UNITED STATES SECRET SERVICE WORTHY OF TRUST AND CONFIDENCE
2013 Annual Report
The Office of Government and Public
Affairs gratefully acknowledges the
contributions of the Forensic Services
Division’s Visual Information Branch.
For more information about the
United States Secret Service, visit
http://www.secretservice.gov.
For questions or comments about
the 2013 Annual Report, contact
the Office of Government and
Public Affairs at 202-406-5708.