national strategy for homeland security 2007
TRANSCRIPT
-
8/14/2019 National Strategy for Homeland Security 2007
1/62
H
H 2 0 0 7
-
8/14/2019 National Strategy for Homeland Security 2007
2/62
-
8/14/2019 National Strategy for Homeland Security 2007
3/62
g f
Homelandsecurity
H o m e l a n d s e c u r i t y c o u n c i l
o c t o be r 2 0 0 7
-
8/14/2019 National Strategy for Homeland Security 2007
4/62
-
8/14/2019 National Strategy for Homeland Security 2007
5/62
M A ,
M 6 S b 11, 2001, , ,
, N , H K . A
H N b , A . TN S
H S A b .
D , . W , b , ,
A b , 6 b .
J , H K . W
, b I, A F . W KS
A , , b .
b A , b b N . A ,
S , F , -b z , b H .
T S . E b b
M , , , ,
x , x b , b .
A H , , - . W z
b . W
b .
-
8/14/2019 National Strategy for Homeland Security 2007
6/62
, N , b . S S b 11, 2001,
2002 N S H S, , b . B
b .
D , b j A b . , b N S H S ,
b , .
GEORGE W. BUSH
HE WHI E HOUSE
O b 5, 2007
-
8/14/2019 National Strategy for Homeland Security 2007
7/62
Contents
Overview of Americas National Strategy for Homeland Security
odays Realities in Homeland Security
odays Treat Environment
Our Vision and Strategy for Homeland Security
Prevent and Disrupt errorist Attacks
Protect the American People, Critical Infrastructure, and Key Resources 25
Respond to and Recover from Incidents
Ensuring Long- erm Success
Conclusion
-
8/14/2019 National Strategy for Homeland Security 2007
8/62
-
8/14/2019 National Strategy for Homeland Security 2007
9/62
N S H S
Overview of AmericasNational Strategy for Homeland Security
A
. T A ,
z q , -O N S H S z
, , - ,
.
T S , z , N . I b N
: P ; P A , , R ; C - .
W z , , , ,
T , b , H S M S
, b z , .
H q , H . OS q
b , - , z . M
b , .
T S , b N S HS J 2002,
U S , x H K
b N bj . TS b N S S M 2006 N S -
C b T s S b 2006.
O b A . TN S H S N
H , ,
-
8/14/2019 National Strategy for Homeland Security 2007
10/62
-
8/14/2019 National Strategy for Homeland Security 2007
11/62
N S H S
odays Realities in Homeland Security
volution of the Paradigm
S b 11, 2001, U , , . T
b N A .
D N b 1993 W C
1995 b b A P. M F B - O C b S -b 11 x
b . W
, ,
U S , , ,
H .
T S b 11 . I , U S
b , z
I , F , S , , b , .
O S b 1 . A W b
N H K , U b K
, b . I ,
T q b b b x , b
N bT S z
- , p s, H .
Homeland Security Defned
Homeland Security is a con-certed national e ort to preventterrorist attacks within the UnitedStates, reduce Americas vulner-ability to terrorism, and minimizethe damage and recover romattacks that do occur.
-
8/14/2019 National Strategy for Homeland Security 2007
12/62
N S H S
hared esponsibility
T , :
. F , S , , b - , , z
b b T F G
-
- q
b q . T ,
x , b ; -; , ,
(WMD). TF G b -
b , , ,
. I b
b .
A b b S
A . S , , b , b q q z ,
, , b , ,
- .
T - b ,
85 N , b b b . T
, ,
, , T - , -b N ,
A ,
I , z . F , z
b b
State and Local Governments
This Strategy de nes State to mean anyState o the United States, the District o Columbia, Puerto Rico, the Virgin Islands,Guam, American Samoa, the Common-wealth o the Northern Mariana Islands,or the trust territory o the Paci c Islands.This Strategy also de nes local govern-ment as any county, city, village, town,
district, or other political subdivision o anyState, and includes any rural community orunincorporated town or village or any otherpublic entity or which an application orassistance is made by a State or politicalsubdivision thereo .
-
8/14/2019 National Strategy for Homeland Security 2007
13/62
N S H S
.
P x b N b . I b
x , , jb . T U S
b . S b :
H .
Progress in Homeland ecurity and eyond
W z A , b b b ; , b b
. S S b 11, x , W
b . O . W S
b -Q H H . T
U S S W , - H
b , b , S , F , - , , ,
b . W b
b b .
W b A b
H S , O D N I , S C , N C C , U.S. N
D D b .
T F B I (FBI) D J (D ,
FBI N S B DOJ N S. W S , , b
. T -b F
, S , , b , b , b
-
8/14/2019 National Strategy for Homeland Security 2007
14/62
N S H S
W b . T b , b , S ,
x . W C , ,
USA PA RIO A , I R P2004, P A A 2007
b 9/11 C WMD C b . F , M C
2006, U S .
S S b 11, A C P C L b O B Ex
b
F G A z . W - , N Ex P
q
hallenges in Homeland ecurity and eyond
W A , . B , , :
T W , N .
q (WMD) U S
. O b
H . T U S z
I x . W
S b 11 b .
W b A b - ,
N . A b
, - , ,
-
8/14/2019 National Strategy for Homeland Security 2007
15/62
N S H S
z , .
A b - b , b
W F I S
b
b A . W b
b . W b b S , , b .
T C b
N .
-
8/14/2019 National Strategy for Homeland Security 2007
16/62
-
8/14/2019 National Strategy for Homeland Security 2007
17/62
N S H S
odays hreat Environment
O N x . I
,
z x b . W b b A .
errorism
D S b 11 -Q b H , U
, I .
C , b H . A
W -Q A b b S b 11 , ,
P F A b A b H .
A -Q b A , -Q I q
b b x . M ,
S -Q , H . W -Q
, q b , , .
I -Q , bj
U S . T L b H zb , U S , S b 11, b
z . H zb H U S .
T U S z I x b . T S b I x b
H b z U S . W
, ,
-
8/14/2019 National Strategy for Homeland Security 2007
18/62
N S H S0
W b M A .
T H I x b b
U S . O - , , x , - , .
atastrophic atural isasters
O N S H S z A . O N ,
, , , .
N z (
), b ,
A R S (SARS) b . O C , SARS 8
800 . T , z
q . I z . T 1918, 1957, 1968
40 , , , . A b ,
.
N , x , U.S.
H K N . W q ,
, b , . E q b z . A j b
q z , A 39 S q . A ,
q , q H
. I , 800
80 1,500 j . I , .
atastrophic ccidents and ther Hazards
W b . T
b
-
8/14/2019 National Strategy for Homeland Security 2007
19/62
N S H S
N . F x , 50
S C O A 2003 O x b b
, , . T ,
N B 2003, $6 b 265 .
-
8/14/2019 National Strategy for Homeland Security 2007
20/62
-
8/14/2019 National Strategy for Homeland Security 2007
21/62
N S H S
Our Vision and Strategy for Homeland Security
W N b b , ,
A . O
, b H , , , ,
, , C , - ,
q q
T U S , z b F , S , , b ; -
, , z H
, A .
I z , U S , , , , ,
; , , ;
. W , , , , N
T .
-
8/14/2019 National Strategy for Homeland Security 2007
22/62
-
8/14/2019 National Strategy for Homeland Security 2007
23/62
N S H S
Prevent and Disrupt errorist Attacks
I S b 11 , U S ,
b , W b
b b .
T N S C b T s, S b 2006, - W . O
b ,
(WMD) ,
, b . F b , , -
z W - b
b b .A , -
- W .
T N S H - S N S C b T -
s, b -
. I
U S , -
--
b , b b ,
- I z
x .
Preventing WMD Terrorism
The intent o our principal terrorist enemies to infictcatastrophic damage on the United States, coupledwith their demonstrated contempt or human li e, has
ueled their desire to acquire WMD. Among our mostimportant missions in denying entry to terrorists, their
weapons, and other implements o terror is to detect,disrupt, and interdict the movement o WMD-relatedmaterials into the Homeland. This is one objective inour comprehensive strategy to prevent WMD terror-ism, which is ully discussed in the National Strategy for Combating Terrorism . By integrating the opera-tional and intelligence e orts o all levels o govern-ment, the private sector, and our oreign partners, andenabled by an international ramework and domesticinstitutions supporting its implementation, our strat-egy involves simultaneous action to:
Determine terrorists intentions, capabilities, and
plans to develop or acquire WMD; Deny terrorists access to the material, expertise,
and other enabling capabilities required to developWMD;
Deter terrorists rom employing WMD;
Detect and disrupt terrorists attempted movemento WMD-related materials, weapons, and personnel;
Prevent and respond to a WMD-related terrorist at-tack; and
De ne the nature and source o a terrorist-employed
WMD device.
WMD in the hands o terrorists is one o the gravestthreats we ace, and we cannot permit the worldsmost dangerous terrorists to threaten us with theworlds most destructive weapons.
-
8/14/2019 National Strategy for Homeland Security 2007
24/62
N S H S
eny errorists, heir Weapons, and ther error- elatedaterials ntry to the Homeland
D b , b , b . B
U S , b b , ,
O N S C b T s T v , N S M S,N S Av S . W
, ,
U S ,
.T , x
b - . W
H b
, , - b
A .
Prevent terrorist exploitationo legitimate pathways into
the Homeland . C
b , ,
, - ,
, -
x . I ,
b - . A
, b
b . T W
H I
Border Security and Interior En orcement
As part o our broader e ort or comprehensive im-migration re orm, we will work to urther secure theHomeland and disrupt terrorist and other criminalactivity in the United States. This includes improv-
ing our ability to detain and remove criminal andugitive aliens and visa violators. We will continue
to hire, train, and deploy additional Border Patrolagents, Customs and Border Protection o cers,and Immigration and Customs En orcement o -cers, as well as to build on the substantial improve-ments to the in rastructure and technology de-ployed at our borders. Additionally, we will expanddetention bed space or aliens subject to detentionand removal.
At the same time, we will enhance interior en-orcement e orts, including worksite en orcement
programs. Employers should be required to veri ythe work eligibility o all employees, preventing il-legal immigrants rom obtaining jobs through raudor the use o stolen identi cation, including SocialSecurity numbers. In order to accomplish this, wemust expand the use o an electronic employmenteligibility veri cation system that is timely, accu-rate, and easy or employers to use. We also willcontinue to crack down on employers who know-ingly hire illegal immigrants by applying criminalpenalties to those who circumvent the law. Inaddition, we will continue to step up e orts to veri ythe status o non-immigrants studying in the UnitedStates through the Student and Exchange VisitorIn ormation System (SEVIS) and have appropriate
ollow-up where there may be violations. Takentogether, these e or ts will rein orce signi cantlyenhanced border and interior security and helpdeny employment to those who are present in ourcountry illegally, including criminals and potentialterrorists.
-
8/14/2019 National Strategy for Homeland Security 2007
25/62
N S H S
REAL ID A
U S . E
b , , -
-, V
W P b - . I
, , x
US-VISI b
- , -
b - b -
b , , . I
, -
-z , -, - ,
. T b S
U.S. C B P x .
B , . I b
q , b , b
x b
b , -
.
Screening People The REAL ID Act establishes Federal standards or
State-issued drivers licenses and non-drivers identi-cation cards.
Secure Flight will require airlines to submit passen-ger in ormation to DHS or fights that operate to,
rom, and within the United States, as well as thosethat fy over the continental United States.
The Student and Exchange Visitor In ormationSystem (SEVIS) is an internet-based system thatis improving Americas ability to track and monitor
oreign students and exchange visitors.
The United States Visitor and Immigrant StatusIndicator Technology (US-VISIT) program, when ullyimplemented, will create an entry and exit systemthat matches oreign travelers arrival and departurerecords using biometrics to screen applicants oradmission to the United States.
The Western Hemisphere Travel Initiative (WHTI)reduces the number o identi cation and citizenshipdocuments that may be used by persons entering orre-entering the United States, rom more than 8,000documents, to a ew dozen secure documents. Thisexpedites document review at ports o entry whilecombating raudulent documents.
The Visa Waiver Program (VWP) enables nationalso over two dozen countries to travel to the United
States or tourism or business or stays o 90 daysor less without obtaining a visa.
-
8/14/2019 National Strategy for Homeland Security 2007
26/62
-
8/14/2019 National Strategy for Homeland Security 2007
27/62
N S H S
, b . W
b b , - ,
x b .
isrupt errorists and heir apacity to peratein the nited tates
T U S . W ,
, , . LN ,
b , b
. T F G bj
b A . Identi y and locate terrorists and uncover terrorist activity . I -
b b , , , ,
, , , , b . T . F ,
b , . B
, b
. T b b . I
q . O
H , , , , b ,
b -
.
I
H -,
, ,
-
Intelligence-Led Policing
Intelligence-Led Policing (ILP) is a management andresource allocation approach to law en orcement using
data collection and intelligence analysis to set speci cpriorities or all manner o crimes, including those as-sociated with terrorism. ILP is a collaborative approachbased on improved intelligence operations and com-munity-oriented policing and problem solving, which the
eld o law en orcement has considered bene cial ormany years. Today it is being adopted by a variety o law en orcement entities.
-
8/14/2019 National Strategy for Homeland Security 2007
28/62
N S H S20
q , q ,
b . W IP b S , , b , b
, z , . W b
F G S , , b , q
z . U
I S E ( E L - S ) z
- F , S , , b , , .
Disrupt terrorists and their activitiesand networks . A
-, F , S , , b
-b , ,
-
b . T
.F , , ,
, , , ,
, . W z z ,
, . F -,
b
.
W H , . T , , x , q
, , , , b. x - b b ,
. W x -
Improvised Explosive Devices
Over the past several years, al-Qaida ourprincipal terrorist enemy has demonstratedits ability and intent to employ innovativeweapons against U.S. interests, including inthe Homeland, and our riends and allies over-seas. The disrupted 2006 U.K.-based plotto blow up multiple trans-Atlantic commercialairliners with liquid explosives is especiallynoteworthy. We remain particularly concernedabout the employment o improvised explo-sive devices (IEDs) in an attack against theHomeland, given the ready availability o IED
components and the relative technologicalease with which they can be ashioned. Inconjunction with an array o activities to denyterrorists the weapons and tools they useto kill the innocent, our National Strategy for Combating Terrorist Use of Explosives , which isbeing developed pursuant to Homeland Secu-rity Presidential Directive-19 (issued February12, 2007), will help guide our e orts.
-
8/14/2019 National Strategy for Homeland Security 2007
29/62
N S H S 2
, ,
q .
D H q , b , .
, b . WU.S. b b b -
b . W
b b b - -
.W
, ,
, - , -
.
b , -
I , x -, b ,
. - I
, b , ,
. T I b ,
q - b
. I -
I -,
I
, - , -, .
Foreign Intelligence Surveillance ActModernization
Since its enactment in 1978, the Foreign Intel-ligence Surveillance Act (FISA), as amended, hasprovided a legal ramework through which the Intel-ligence Community law ully collects oreign intel-ligence in ormation o value to our Nations security,while simultaneously protecting the civil liberties o Americans. Revolutionary changes in technologysince 1978 had the e ect o expanding the scopeo FISAs coverage to include oreign intelligencecollection e orts that Congress did not intend tosubject to the statutes requirements. This unin-tended expansion o FISAs scope meant that ourintelligence pro essionals, in a signi cant numbero cases, needed to obtain a court order to collect
oreign intelligence in ormation against a targetlocated overseas. This circumstance created an un-necessary obstacle to our Intelligence Communitysability to gather real-time in ormation about theintent o our enemies overseas and diverted scarceresources that would be better spent sa eguardingthe civil liberties o people in the United States,not oreign terrorists who wish to do us harm. TheProtect America Act o 2007, which passed with bi-partisan support in the House and the Senate, wasan important interim step in modernizing FISA toaccount or modern changes in technology and thethreats that we ace in the 21 st century. Working
with Congress, we must make additional re ormsto FISA and ensure that the statute is permanentlyamended so that our intelligence pro essionals con-tinue to have the legal tools they need to gather in-
ormation about the intentions o our enemies whileprotecting the civil liberties o Americans now andin the uture.
-
8/14/2019 National Strategy for Homeland Security 2007
30/62
N S H S22
T U S
A , , , b . W N b ,
b . ,
x 21.
Prevent Violent slamic xtremist adicalizationin the nited tates
T U S b x
I x . P z M A ; ; U.S.
P z q , W S I x
U Sz x
. A , S b b b b z
Engage key communities as partners in the War on error . O S z x :
I . T x
I x b W , b A , x
. A x , M q . M b ,
b - A . W
, -M , b A , ,
W . E , b - , b
, b , b M A
b b , , Identi y and counter the sources o radicalization . T x
, ,
x z H . O z , b
-
8/14/2019 National Strategy for Homeland Security 2007
31/62
N S H S 2
x U S , , I z ,
b , b
U S I ,
U.S. b U.S. , , A . W z
, , , b , S , F M
z . Enhance Federal, State, local, and ribal government capacities to address radicaliza-
tion . A b I x
, , z . ,
U.S. G I z
b ; F , S , , b z , x ,
x ;
. Continue to advance our understanding o radicalization . A
I x , x
, z b b, b b
I x . F , M
z .
-
8/14/2019 National Strategy for Homeland Security 2007
32/62
-
8/14/2019 National Strategy for Homeland Security 2007
33/62
N S H S 2
Protect the American People,Critical Infrastructure, and Key Resources
W A H ,
, b , z q
, , b , q
, , b .
S A
N (CI/KR). A
2006N I -s P P(NIPP),
, , , ,
U S -
b -, ,
b , -b . K
b . B CI/KR,
A b , , N .
eter the errorist hreat
W , , - b .
Decreasing likelihood o success. b
. T P D
bj H b
U S , b b z .
Protection and Risk Management
Despite our best e or ts, achieving a complete state o CI/KR protection is not possible in the ace o the nu-
merous and varied catastrophic possibilities that couldchallenge the security o America today. Recognizingthat the uture is uncer tain and that we cannot envisionor prepare or every potential threat, we must under-stand and accept a certain level o risk as a permanentcondition. Managing homeland security risk requires adisciplined approach to resource prioritization and thediversi cation o protective responsibilities across the
ull spectrum o our Nations homeland security part-ners. Applying a risk-based ramework to all homelandsecurity e orts will help to ensure our success over thelong term and is discussed in detail in the chapter titledEnsuring Long-Term Success.
-
8/14/2019 National Strategy for Homeland Security 2007
34/62
N S H S2
A , q,
, , , b b , . I
G , b - S , , b , , -
, -,
, -
b , . T
F S , ,
b - -b
- . A -, b
b -
. W b
.
H x
. T b W S , , b ,
, . F ,
b , , q , ,
. Changing motivational calculus . b
q .11, U S W
b b . A b
The National In rastructure Protection Plan
Guiding our e orts to protect the Nations CI/KRis the 2006 National Infrastructure Protection Plan (NIPP) and its supporting Sector-Speci c Plans, whichwere developed pursuant to Homeland Security Presi-dential Directive-7, issued on December 17, 2003.The NIPP sets orth a comprehensive risk manage-ment ramework and provides a coordinated approachto CI/KR protection roles and responsibilities or Fed-eral, State, local, and private sector security partners.It sets national priorities, goals, and requirements
or the e ective distribution o unding and resourcesthat will help ensure that our government, economy,and public services continue to unction in the evento a man-made or natural disaster. In accordancewith HSPD-7, the NIPP includes an augmented ocuson the protection o CI/KR rom the unique andpotentially catastrophic e ects o terrorist attacks.However, the NIPP ramework supports a larger all-hazard approach to CI/KR protection.
-
8/14/2019 National Strategy for Homeland Security 2007
35/62
N S H S 2
, j , , , .
A q q
, b A
. M b q , ,
b x b . T ,
b , , . q ,
, b j
, b b x , .
itigate Vulnerabilities
W b b , b . W ,, N -
b , - , b
b - A .
Ensuring CI/KR structural resil-ience. W
b b
A , -
CI/KR .
A , , b b
b . A b CI/KR , , q
b
Critical In rastructure and Key Resources
Our Nation has identi ed 17 sectors o criticalin rastructure and key resources, each with cross-cutting physical, cyber, and human elements:
Agriculture and FoodBanking and Finance
ChemicalCommercial Facilities
Commercial Nuclear Reactors, Materials, andWasteDams
De ense Industrial BaseDrinking Water and Water Treatment Systems
Emergency ServicesEnergy
Government FacilitiesIn ormation Technology
National Monuments and Icons
Postal and ShippingPublic Health and Health Care
TelecommunicationsTransportation Systems
-
8/14/2019 National Strategy for Homeland Security 2007
36/62
N S H S28
.
F CI/KR , b , b
, z . I , bj . W
-
b - b b b
. W
b ,
x-
b -. R
b - -
.
A ,
b , -
. F
. W
N F I P - b
.
W F G
b
N CI/KR, -
. T , x 85 N
. W , b
b , NIPP, N . O x b . M CI/KR b
Cyber Security: A Special Consideration
Many o the Nations essential and emergencyservices, as well as our critical in rastructure, relyon the uninterrupted use o the Internet and thecommunications systems, data, monitoring, andcontrol systems that comprise our cyber in ra-structure. A cyber attack could be debilitating toour highly interdependent CI/KR and ultimately toour economy and national security.
A variety o actors threaten the security o ourcyber in rastructure. Terrorists increasingly exploitthe Internet to communicate, proselytize, recruit,raise unds, and conduct training and operationalplanning. Hostile oreign governments have thetechnical and nancial resources to supportadvanced network exploitation and launch attackson the in ormational and physical elements o ourcyber in rastructure. Criminal hackers threatenour Nations economy and the personal in orma-tion o our citizens, and they also could pose athreat i wittingly or unwittingly recruited by oreignintelligence or terrorist groups. Our cyber net-works also remain vulnerable to natural disasters.
In order to secure our cyber in rastructure againstthese man-made and natural threats, our Federal,State, and local governments, along with the pri-vate sector, are working together to prevent dam-age to, and the unauthorized use and exploitationo , our cyber systems. We also are enhancing ourability and procedures to respond in the event o an attack or major cyber incident. The NationalStrategy to Secure Cyberspace and the NIPPsCross-Sector Cyber Security plan are guiding oure orts.
-
8/14/2019 National Strategy for Homeland Security 2007
37/62
N S H S 2
. W b b b , b ,
b b .
Ensuring operational resilience . M b -
, , b
C
N
q S , , b b
b F G . L ,
b z U S , b
- b . S
b . Protecting the American people through medical preparedness . A
N b b
A . O , , q . W b A
b , x , z ,
q .
R N b b q b b , , ,
. W x b b
b . I
, S , , b
. L , S , , b F G .
I b A ,
, x x b b . W S
-
8/14/2019 National Strategy for Homeland Security 2007
38/62
N S H S0
b b , - . F
b - . L
, z b
, , . W F G q z
.
inimize onsequences
D b , , z q . S N b q
T , , . M ,
q , b x .
T , , - q b A
, , . W b , , x b A , , , ,
-b . B ,
z . P - b
, z ,
, .
-
8/14/2019 National Strategy for Homeland Security 2007
39/62
N S H S
Respond to and Recover from Incidents
D
A , ,
, . G x b
b . W , b b N b , , . A N b
, b b b z
. T , . U , , , b
, A b .
I - q
N b , S , , b
- bj . A
b NR P ( N R F ) N I M S(NIMS), -
H S PD -5, F b 28, 2003.B b ,
x - , H
K , N R
F , - z
. U , N R F ,
, , x , b z . T b , ,
b , S , , b - , F G . W
b b - b z .
Incident Management Versus Response
The homeland security community has used theterms incident management and response incomplementary and occasionally interchangeablemanners. Within this Strategy , response re ersto actions taken in the immediate a termatho an incident to save lives, meet basic human
needs, and reduce the loss o property. Incidentmanagement, however, is a broader concept thatre ers to how we manage incidents and mitigateconsequences across all homeland securityactivities, including prevention, protection, and re-sponse and recovery. This concept, including therole o the National Incident Management System(NIMS), is discussed urther in the chapter titledEnsuring Long-Term Success.
-
8/14/2019 National Strategy for Homeland Security 2007
40/62
N S H S2
trengthen the Foundation for an ffectiveational esponse
A - z b b b
, , j b , b . T b b
b , , j x ,
Clari y how national roles and responsibilities are ul lled across all levels o govern-ment and the private and non-pro t sectors . D
b S , , b , F G - h , . A
b b -
. A , b , b
b . W b F j b
j b , F G S , , b q , b
, F , b
- , .
Strengthen doctrine to guide the national response . I b j q x
-j q - z
x , . NIMS
, , I C S
U C , b j - bj , ,
, b . W x N R F . F x
z - x
, x . T , z b bj ,
, b
-
8/14/2019 National Strategy for Homeland Security 2007
41/62
N S H S
b b , x b , N
Develop and apply joint planning and training processes . A , b b . T
, , , b b . T
Roles and Responsibilities
In todays dynamic threat environment, we must strive or a national response based on engagedpartnerships at and across all levels that enable us to anticipate where we should increase orreduce support based on changing circumstances. Success starts with understanding the ol-lowing undamental roles:
Community Response. One o the undamental response principles is that all incidents should be handled at the lowest jurisdictional level possible. The initial response to themajority o incidents typically is handled by local responders within a single jurisdiction and goesno urther. When incidents exceed available resources, the local or Tribal government may relyon mutual aid agreements with nearby localities or request additional support rom the State. Itis worth noting that or certain types o Federal assistance, Tribal nations work with the State,but, as sovereign entities, they can elect to deal directly with the Federal Government or othertypes o assistance.
State Response. State governments have the primary responsibility or assisting local governments to respond to and recover rom disasters and emergencies. When an inci-dent expands to challenge the resources and capabilities o the State coordinate requests or
additional support, the State may request support rom the private and nonpro t sector, turn toother States or support through the Emergency Management Assistance Compact, or call uponthe Federal Government or assistance. States also may collaborate with one another to ensurea broader, more e ective regional response.
Federal Response. The Federal Government maintains a wide array o capabilities and resources that may be made available to States and local governments. Federal assis-tance is provided when needed to support State and local e orts or lessen or avert the threato a catastrophe within the United States. Accordingly, Federal response e orts are designed tocomplement and supplement, rather than supplant, the State and local response. The FederalGovernment also maintains relationships with private and non-pro t sector entities to aid in
acilitating additional support.
Private and Non-Proft Sector. The private and non-proft sectors ulfll key roles and work closely with communities, States, and the Federal Government. The private sector plays anessential role implementing plans or the rapid restoration o commercial activities and criticalin rastructure operations, which can help mitigate consequences, improve quality o li e, andaccelerate recovery or communities and the Nation. Non-pro t organizations serve a vital roleby per orming essential services within communities in times o need, such as mass sheltering,emergency ood supplies, counseling services, or other vital support services.
Special Circumstances. There are special circumstances where the Federal Government exercises a larger, more proactive role. This includes catastrophic incidents when local andState governments require signi cant support, and incidents where Federal interests are directlyimplicated, such as those involving primary Federal jurisdiction or authorities. For example, theFederal Government will lead response e orts to render sa e weapons o mass destruction andcoordinate related activities with State and local partners, as appropriate.
-
8/14/2019 National Strategy for Homeland Security 2007
42/62
N S H S
b , S , F -
. T b b b
, -
N b . F , b q , b x b , b b b b
.
C j j x
. U , j , , -
b - - . I b
x b N Conduct advance readiness activities . T b
q , , ,
W z . F x , -
b q W - , ,
b b . A b
- F F b .
ssess ituation and ake nitial ction
W , x ,
, , -
. O N
.
T -z
, b z - b , -
b .
Situational Awareness
Maintaining situational awareness is essential to assess-ing emerging incidents as well as conducting operationsand ultimately ensuring the e ective management o inci-dent response. It demands that we prioritize in ormationand develop a common operating picture, both o whichrequire a well-developed national in ormation managementsystem and e ective multi-agency coordination centers tosupport decision-making during incidents. The concept o situational awareness, along with other undamental prin-ciples o incident management, is detailed in the chaptertitled Ensuring Long-Term Success.
-
8/14/2019 National Strategy for Homeland Security 2007
43/62
N S H S
Prioritize and coordinate initial actions to mitigate consequences . S b ,
N z - -
z
. O b N I - M S (NIMS),
b z
. Fx ,
, q b - -
. U NIMS, - IA P ,
, bj ,
. T
, , b ,
-, -
, , , . A ,
b
. Efectively mobilize and deploy peo-
ple, resources, and capabilities . I, ,
q ,, b
, -, q
. b -
z , N R
F b
Examples o Federal Field Teams
Since September 11, the Federal Government
has strengthened deployable teams to helprespond to natural and man-made disasters.These teams support the emergent needs o State, local, and Tribal jurisdictions or exerciseFederal statutory responsibilities by providingspecialized expertise and capabilities, establish-ing emergency response acilities, and support-ing overall incident management.
Emergency Response Teams (ERT) to bereplaced by the Federal Incident Response Sup-port Teams (FIRST) and Incident ManagementAssistance Teams (IMAT)
Damage Assessment Teams
Nuclear Incident Response Team (NIRT)
Disaster Medical Assistance Teams (DMATs)
Department o Health and Human Services In-cident Response Coordination Team ormerlythe Secretarys Emergency Response Team
Department o Labor/Occupational Sa ety andHealth Administrations Specialized ResponseTeams
National Veterinary Response Teams (NVRT) ormerly the Veterinarian Medical AssistanceTeams (VMATs)
Disaster Mortuary Operational Response Teams(DMORTs)
Medical Emergency Radiological ResponseTeam (MERRT)
National Medical Response Teams (NMRTs)
Scienti c and Technical Advisory and ResponseTeams (STARTs)
Donations Coordination Teams Urban Search and Rescue (US&R) Task Forces
Incident Management Teams (IMTs)
Domestic Emergency Support Team (DEST)
Domestic Animal and Wildli e EmergencyResponse Teams and Mitigation AssessmentTeam
-
8/14/2019 National Strategy for Homeland Security 2007
44/62
N S H S
. I , b x
. A b b z , , , x
Anticipate additional support that may be needed . M b , ,
b b b . R b b
q b . W b
N R F j b
.
xpand perational apabilities, s eeded
W j q b j S , S . I , F G
. I x , z x ,
b . A x ,
q b . I N b
q .
Efectively coordinate requests or additional support . I bb q , - q
, . I , b
. O N , ,
z x . z S q
F G F G S . E q
x , , x b b .
Integrate resources and capabilities . D - , b , , ,
b . F x , b
S b . F , b z
-
8/14/2019 National Strategy for Homeland Security 2007
45/62
N S H S
- - z G - . I ,
N b . I , N R F
b , b .
ommence hort- erm ecovery ctions to tabilize the ffected rea and emobilize ssets
E b b . I b ,
- , , b , b ,
N . W - b S , F , S , , b
, , z . A , , , b b z
b , , - - b , -
, z - b z .
nsure an ffective ransition to ong- erm ebuilding andevitalization fforts
E - b b b
, , - b . R z -
, b b , q , b
.
R b z
S , x . S ,
- ,
I , j h , - - b
j . T b b x x . N
-
8/14/2019 National Strategy for Homeland Security 2007
46/62
N S H S8
h x MS b 11 , U S 2004
j x , G H K .
G , b b
b b z . b b , ,
, -b z . A , z -
, , , , z .
T j b F GH , F G , b ,
, , b
N , b , - b .
I , N b b
- . W S , , b , - ,
b b z .
I , F , S , , b ,
, b z b b b , , , b b
, . S : Restore community services and the economy. I ,
T , - ,
. I , , q b ,
z . F , S , , b
b ,
q - . Organize planning eforts among key players. T N b-
- . T q b
, , . I ,
-
8/14/2019 National Strategy for Homeland Security 2007
47/62
N S H S
q , x b
. I , x , F G b q
F x Facilitate long-term assistance or displaced victims. E b
- - . O
, , , . I b b b
, j - . Rebuild critical in rastructure. A F -
b b , , z
. B b , - b z b
, - . F ,
q .
-
8/14/2019 National Strategy for Homeland Security 2007
48/62
-
8/14/2019 National Strategy for Homeland Security 2007
49/62
N S H S
Ensuring Long- erm Success
P ; A
, ;
b . I b , , ,
H . U , S N .
isk anagement
T , b , ,
, , . I , b , q
. W -b z ( ),
b , z , b b , , ,
. A H . I
, N z b ,
ulture of Preparedness
O N b . I N b ,
z- z F , S , , b
. T C .
T C P N b . A z
, b A b
,
z b N b x b b .
T b . O C ,
b b b
.
-
8/14/2019 National Strategy for Homeland Security 2007
50/62
N S H S2
T z , , z . C z
H , , z R , N
( . A , , b b
b . A A b -
, b .
W , - - -b , ,
. T . A S ,
N x 85 . I
A , H
. T b
b H . D
,
T C P b N . A F , S , , b b q , C
. B , , b , C P
.
Homeland ecurity anagement ystem
I N , z H S M S
. R F G , S , , b b
- .
O N P G (NPG). C H S
D -8, D b 17, 2003, NPG
-
8/14/2019 National Strategy for Homeland Security 2007
51/62
N S H S
, , N , ,
. T NPG b
N , , b . T
37 b , NPG L , b , , b . I , NPG
-b b z , j
, , b , z .
W b b b x z
, A , . T H S
S ( F 1) , .
Phase One: Guidance . T H S M S . I
, b - - ,
z , , , , ,
, x b
Phase wo: Planning . T b , , ,
, . T b , b
F b b , ,
q .
S q b , . B
b q ,
b . F H S M S b - ,
b b
-
8/14/2019 National Strategy for Homeland Security 2007
52/62
N S H S
Figure 1HOMELAND SECURITY MANAGEMENT SYSTEM
DOCTRINE AND PLANNING GUIDANCE
Fundamental principles and instructions by which organizations guide their actions in ulflling strategy
STRATEGY
An integrated approach to achieve a policy that takes into account underlying assumptions, context, tradeo s, and necessary resources.
POLICY
High-level executive articulation o broad goals that must be achieved
GUIDANCE
PLANNING
STRATEGIC PLANNING
REQUIREMENTS AND CAPABILITIES
EDUCATION
Pro . Development Continuing Education
TRAINING
Mission-specifc Multi-disciplinary
LOGISTICS
Public and Private Supply Chains
Intermodal Delivery
RESOURCES
People
Equipment Technology
Funds
OPERATIONAL AND TACTICAL PLANNING
EXECUTION
EXERCISES
National Exercise and EvaluationProgram
OPERATIONS
All Hazards
ASSESSMENT AND EVALUATION
BEST PRACTICESLESSONS LEARNED
-
8/14/2019 National Strategy for Homeland Security 2007
53/62
N S H S
R q b
q b b x
b x . L b z
, b - x , -
z , - q -
. T
b - b -
-
b . Phase Tree: Execution . T
HS M S
x -
. T -
x ,
N ExP , -
b . Phase Four: Assessment and Evaluation . T
b x . T b b b
H S M S . T q
.B b , F G
-F H S M S . F H S M
, F b b b ; , b
q , N
Investing in Intellectual and Human Capital
In order to ensure the success o the HomelandSecurity Management System, our Nation must
urther develop a community o homeland securitypro essionals. This requires establishing multidisci-plinary education in homeland and relevant nationalsecurity policies and strategies; the planning pro-cess; execution o operations and exercises; andoverall assessment and evaluation. Furthermore,this should include an understanding and apprecia-tion o appropriate regions, religions, cultures, legal
systems, and languages. Education must continueoutside the classroom as well in order to enhanceknowledge and learning, build trust and amiliar-ity among diverse homeland security practitioners,break down organizational stovepipes, and advancethe exchange o ideas and best practices, we mustcontinue to develop interagency and intergovernmen-tal assignments and ellowship opportunities, tyingthem to promotions and pro essional advancement.Executive Order 13434 o May 17, 2007 (NationalSecurity Pro essional Development) and the result-ing National Strategy for the Development of Security Professionals are essential steps orward in meet-
ing these educational needs, and we will continueto build on these endeavors to ensure that we havethe necessary depth and breadth o intellectual andhuman capital across all levels o homeland securitypartnerships and disciplines.
-
8/14/2019 National Strategy for Homeland Security 2007
54/62
N S H S
F S , , b b b
z b j .
ncident anagement
W H S M S b H , b
- . D - , , - -
F , S , , .
O b N I M S
A H S P D -5 (HSPD-5), 28, 2003, NIMS . I, - H
, x , , b , x . I z HSPD-5,
b . F b
( b , , - ), , S , , b .
I - q . T
I C S , . O
j : , , ,
, . A x
h b , z -
. U C . T F G -
, S
b
b b b bj b j .
Principles and Requirementso Incident Management
Incident Command System
Uni ed Command
Crisis Action Planning Resources
Situational Awareness
Prioritization o In ormation
Multi-Agency Coordination Centers
Skilled Leaders and Partners
Training and Exercises
-
8/14/2019 National Strategy for Homeland Security 2007
55/62
N S H S
C x
q W
q . T
b q b b .
T - -
. I q -
, , ,
b - , , ,
. I -
- , z x q . W
b , b . W b b
q - z
z . I
b ,
q .
A q - -
x .
T - ,
, , b b Ex S , , b ; S ,
; N O C , N I C F E M A N R C
( D H S ); F B I I O C N J F
D J ); N C C (
Interoperable and ResilientCommunications
Our Nation continues to con ront two distinctcommunications challenges: interoperabilityand survivability. Unimpeded and timely fow o in ormation in varying degrees across multipleoperational systems and between di erent dis-
ciplines and jurisdictions is critical to command,control, and coordination o operational activi-ties. To achieve interoperability, we must havecompatible equipment, standard operatingprocedures, planning, mature governance struc-tures, and a collaborative culture that enables allnecessary parties to work together seamlessly.Survivable communications in rastructure iseven more undamental. To achieve survivability,our national security and emergency prepared-ness communications systems must be resilient either able to withstand destructive orcesregardless o cause or su ciently redundant to
su er damage and remain reliable. Without theappropriate application o interoperable communi-cations technologies, standards, and governancestructures, e ective and sa e incident manage-ment will be hindered. Although much progresshas been made, e ective communication duringmajor disasters requiring multi-jurisdictional co-ordination depends on continued improvement toour Nations communications systems.
-
8/14/2019 National Strategy for Homeland Security 2007
56/62
N S H S8
D N I ). W b
.
P x ,
H S S , q b q
b
. F , x , N Ex b x
b .
cience and echnology
T U S (S& ),
- H .
O x , N , b , , ,
F , b b A . F
N x H . W b
b b . T
, b , , WMD b q
- . W b q
b N b b . O
S& .
W b
H . W
, . S ,
b , , S& b b
b S& x x -
-
8/14/2019 National Strategy for Homeland Security 2007
57/62
N S H S
. R b q
x , b b q . B
, b
b S .everaging nstruments of ational Power and nfluence
I b S b 11 H K , U S
, , , -, , , -
, A ,
. F, b -
z b
O D N I N C C
I SE . T -
, , x b -,
-
.
W
, b
- -,
. W b b - N b
, b F , S , , b ,
H . W z b
b ; ; b
, , .
In ormation Sharing Environment
In December 2004, Congress passedand the President signed the IntelligenceRe orm and Terrorism Prevention Act o 2004 (IRTPA). IRTPA calls or, amongother things, the creation o the In orma-tion Sharing Environment (ISE) a trustedpartnership among all levels o government,the private sector, and our oreign partnersto detect, prevent, disrupt, preempt, andmitigate the e ects o terrorism against theterritory, people, and interests o the UnitedStates through the appropriate exchange o terrorism in ormation.
In addition, IRTPA establishes a ProgramManager or the ISE who is responsible oroverseeing its implementation. With theenactment o the Implementing Recom-mendations o the 9/11 Commission Act o 2007, the ISE has been expanded urtherto include not only terrorism in ormationas de ned in IRTPA but also other catego-ries o homeland security in ormation andweapons o mass destruction in ormation.
-
8/14/2019 National Strategy for Homeland Security 2007
58/62
N S H S0
A , q z
. O N F, b b , ,
b , . O F
100,000 - , 100 F B I
J F . M , U.S. A j A - A C b
, ,
J F .
O S , , b , , - z
. T b , A
, b S
W x z F , S , b . S , , b
b b .
G z
b
. S , b x , b ( . ., z
, j )
N . T b b
b b q b H . T b b -
, q ,
x q q . B b F , S , , b
b H A .
O N . O N G
b b b
-
8/14/2019 National Strategy for Homeland Security 2007
59/62
N S H S
U S , N .
O , b N b b ,
, b W . W D D ,
N G b , b
. W N GA j G , D D
z N . T
q b b b b
N G .
egislative ranch
H F x. T C b b
H A . T , x , q
. A , bC z
z - . T C b b z
bj , b b . I , C
b . F ,
b b , C b
.
-
8/14/2019 National Strategy for Homeland Security 2007
60/62
-
8/14/2019 National Strategy for Homeland Security 2007
61/62
N S H S
Conclusion
S , N
. I , A , , , b , -
. O , , . W H , A
N , . W , N .
-
8/14/2019 National Strategy for Homeland Security 2007
62/62