<?xml version="1.0" encoding="utf-8"?>
<PerformancePlanOrReport>
  <Name>U.S. Department of Homeland Security Fiscal Years 2014-2018 Strategic Plan</Name>
  <Description>
  </Description>
  <OtherInformation>
  </OtherInformation>
  <!--Strategic Plan Core-->
  <StrategicPlanCore>
    <Organization>
      <Name>U.S. Department of Homeland Security</Name>
      <Acronym>DHS</Acronym>
      <Identifier>Organization_6df6abfc-4ec6-4e07-9459-b5bdc7c4a125</Identifier>
      <Description>
      </Description>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>Jeh Charles Johnson</Name>
        <Description>Secretary</Description>
      </Stakeholder>
    </Organization>
    <Vision>
      <Description>A homeland that is safe, secure, and resilient against terrorism and other hazards, where American interests, aspirations, and way of life can thrive.</Description>
      <Identifier>Vision_3b6a07ac-48e6-4a5b-b9d9-b0d344761bcc</Identifier>
    </Vision>
    <Mission>
      <Description>To provide essential support to national and economic security</Description>
      <Identifier>Mission_3b6a07ac-48e6-4a5b-b9d9-b0d344761bcc</Identifier>
    </Mission>
    <Value>
      <Name>unnamed value</Name>
      <Description>
      </Description>
    </Value>
    <Goal>
      <Name>Terrorism &amp; Security</Name>
      <Description>PREVENT TERRORISM AND ENHANCE SECURITY</Description>
      <Identifier>Goal_ed160a35-1642-424d-9129-31e105da98ac</Identifier>
      <SequenceIndicator>1</SequenceIndicator>
      <OtherInformation>Preventing terrorism is the cornerstone of homeland security. Within this mission we focus on the goals of preventing terrorist attacks; preventing and protecting against the unauthorized acquisition or use of chemical, biological, radiological, and nuclear materials and capabilities; and reducing risk to the Nation’s most critical infrastructure, key leaders, and events.</OtherInformation>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Federal Visitors</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Private Sector</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Law Enforcement Authorities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Federal Employees</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Federal Facilities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Families</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Communities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Law Enforcement Partners</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Chemical Facilities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Attacks</Name>
        <Description>PREVENT TERRORIST ATTACKS</Description>
        <Identifier>Objective_ead5f232-2b4a-4c6e-a331-7e849ca015f2</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>The Department remains vigilant to new and evolving threats in order to protect the Nation from a terrorist attack. Although the U.S. Government’s counterterrorism efforts have degraded the ability of al-Qa’ida’s senior leadership in Afghanistan and Pakistan to centrally plan and execute sophisticated external attacks, since 2009 we have seen the rise of al-Qa’ida affiliates, such as al-Qa’ida in the Arabian Peninsula and the al-Nusrah Front in Syria. These groups have made attempts to export terrorism to our Nation. Additionally, we face the threat of domestic-based “lone offenders” and those who are inspired by violent extremist ideologies to radicalize and commit acts of terrorism against Americans and the Nation. These threats come in multiple forms and, because of the nature of independent actors, may be hardest to detect.</OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Information</Name>
        <Description>Analyze, fuse, and disseminate terrorism information by sharing information with, and utilizing threat analysis alongside, stakeholders across the homeland security enterprise.</Description>
        <Identifier>Objective_a5cbea91-4869-4d63-9b28-fee54c9e0f4b</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>We remain committed to integrating critical data sources, such as those for biometric data, by consolidating or federating screening and vetting operations. We will also continually increase and integrate domain awareness capabilities, as well as improve our ability to fully utilize vast amounts of intelligence and other information -- the so-called "big data" challenge -- while rigorously protecting privacy and civil rights and civil liberties.</OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Deterrence &amp; Disruption</Name>
        <Description>Deter and disrupt operations by leveraging the intelligence, information sharing, technological, operational, and policy-making elements within DHS to facilitate a cohesive and coordinated operational response.</Description>
        <Identifier>Objective_589418f6-c278-4b80-82ea-5e2abefa858e</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>We will also develop intelligence sources and leverage research and analysis to identify and illustrate the tactics, behaviors, and indicators potentially associated with violent extremism as well as factors that may influence violent extremism, and jointly develop with federal, state, local, tribal, and territorial partners training for frontline law enforcement officers on behaviors that may be telling regarding violent extremist activity.</OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Transportation Security</Name>
        <Description>Strengthen transportation security by using a multi-layered risk-based approach to detect malicious actors and dangerous items at various entry and exit points in the travel and trade system.</Description>
        <Identifier>Objective_8eed60f7-fec0-4cfc-bccc-a94a748f4f2c</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>We will also improve coordination with foreign governments and stakeholders to expand pre-departure screening and enhance transportation security operations among willing partners to mitigate risks from overseas.</OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Violent Extremism</Name>
        <Description>Counter violent extremism</Description>
        <Identifier>Objective_8fdbd3fe-8f4e-42de-8f60-1f56146a89d0</Identifier>
        <SequenceIndicator>5</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Problem Solving &amp; Integration</Name>
        <Description>Support community-based problem solving and integration efforts, as well as local law enforcement programs</Description>
        <Identifier>Objective_a7042cde-f547-46aa-b936-af4e2278c23f</Identifier>
        <SequenceIndicator>6</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Information Sharing</Name>
        <Description>Work with our partners to share information with frontline law enforcement partners, communities, families, and the private sector about how violent extremists are using the Internet and how to protect themselves and their communities.</Description>
        <Identifier>Objective_8aa17ec6-aff4-4a93-a3f8-cde47301355c</Identifier>
        <SequenceIndicator>7</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Private Sector</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Communities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Families</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Law Enforcement Partners</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Chemical, Radiological &amp; Nuclear Materials</Name>
        <Description>PREVENT AND PROTECT AGAINST THE UNAUTHORIZED ACQUISITION OR USE OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR MATERIALS AND CAPABILITIES</Description>
        <Identifier>Objective_425129af-754f-48b2-8cbc-490d3c5e3e64</Identifier>
        <SequenceIndicator>8</SequenceIndicator>
        <OtherInformation>Chemical, biological, radiological, and nuclear threats are enduring areas of concern. The consequences of these attacks are potentially high even though the likelihood of their occurrence is relatively low. Small scale chemical attacks are expected to remain more likely because the relative lack of specialized skills and knowledge required to conduct such attacks. However, nuclear terrorism and bioterrorism pose the most strategically significant risk because of their potential consequences. Although the difficulty of stealing a nuclear weapon or fabricating one from stolen or diverted weapons materials reduces the likelihood of this type of attack, the extremely high consequences of an improvised nuclear device attack make it an ongoing top homeland security risk.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Research &amp; Development</Name>
        <Description>Anticipate chemical, biological, radiological, and nuclear emerging threats by identifying and understanding potentially dangerous actors, technologies, and materials, and prioritizing research and development activities</Description>
        <Identifier>Objective_a236967f-7eba-487c-a61c-a4f3eeab0318</Identifier>
        <SequenceIndicator>9</SequenceIndicator>
        <OtherInformation>including: 1) analyses of alternative technology options; 2) assessments of complex issues such as the relative risk of different chemical, biological, radiological, and nuclear threats; 3) experimentation and operational test and evaluation of technologies proposed for acquisition; 4) detailed technical characterization of potential biological threat organisms; 5) the creation of consensus standards that enable cost-effective progress across many fields; and 6) the determination of nuclear material characteristics through nuclear forensics techniques.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Acquisition &amp; Movement</Name>
        <Description>Identify and interdict unlawful acquisition and movement of chemical, biological, radiological, and nuclear precursors and materials by leveraging investigative and enforcement assets towards domestic and international movement of these materials and by engaging in information sharing with all stakeholders to monitor and control this technology.</Description>
        <Identifier>Objective_554261fa-3425-4e87-97f7-a5a035245cea</Identifier>
        <SequenceIndicator>10</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Materials &amp; Weapons</Name>
        <Description>Detect, locate, and prevent the hostile use of chemical, biological, radiological, and nuclear materials and weapons</Description>
        <Identifier>Objective_0ad79372-d01d-4737-9083-7524a3bc4114</Identifier>
        <SequenceIndicator>11</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Authorities &amp; Assets</Name>
        <Description>Combine authorities and assets with other departments and agencies</Description>
        <Identifier>Objective_e18a8e70-a975-498f-9908-948b5cfba547</Identifier>
        <SequenceIndicator>12</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Nuclear Detection</Name>
        <Description>Build the U.S. Government's global nuclear detection capability through the Global Nuclear Detection Architecture, a framework for detecting (through technical and non-technical means), analyzing, and reporting on nuclear and other radioactive materials that are out of regulatory control</Description>
        <Identifier>Objective_2f487f6a-f8a8-4721-9264-589c023129f6</Identifier>
        <SequenceIndicator>13</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Nuclear Forensics</Name>
        <Description>Advance nuclear forensics capabilities in order to close down nuclear smuggling networks, promote global nuclear security, and deter wouldbe nation state terrorist facilitators from transferring nuclear materials to terrorists</Description>
        <Identifier>Objective_15ea55fe-b2c8-4b35-9487-d106958c01ff</Identifier>
        <SequenceIndicator>14</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Forensic Data</Name>
        <Description>Provide unimpeachable forensic data for use by law enforcement authorities in the investigation and prosecution of crimes involving biological agents</Description>
        <Identifier>Objective_8a239136-7ab2-4376-acda-c0e6d39492d4</Identifier>
        <SequenceIndicator>15</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Law Enforcement Authorities</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Chemical Facilities</Name>
        <Description>Regulate high-risk chemical facilities to ensure that they take proper steps to mitigate risks</Description>
        <Identifier>Objective_9c7bdb73-b383-4d9a-8a78-7da754ab40a2</Identifier>
        <SequenceIndicator>16</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Chemical Facilities</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Biological Incidents</Name>
        <Description>Prevent the occurrence of significant biological incidents, where possible, but, when unable to prevent, stopping them from overwhelming the capacity of our state, local, tribal, and territorial partners to manage and respond.</Description>
        <Identifier>Objective_349c686f-66dc-46ad-87d9-b09730eeb1fc</Identifier>
        <SequenceIndicator>17</SequenceIndicator>
        <OtherInformation>To this last point, DHS will deploy technologies that enable early detection of biological agents prior to the onset of symptoms, pursue more rapid responder capabilities, and increase the capacity and effectiveness of local public health, medical, and emergency services.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Critical Infrastructure, Leadership &amp; Events</Name>
        <Description>REDUCE RISK TO THE NATION'S CRITICAL INFRASTRUCTURE, KEY LEADERSHIP, AND EVENTS</Description>
        <Identifier>Objective_26f6644b-f13e-4810-a0ae-382e85e4bb00</Identifier>
        <SequenceIndicator>18</SequenceIndicator>
        <OtherInformation>DHS has national leadership responsibility for enhancing security to the Nation's critical infrastructure and protecting key leaders, facilities, and National Special Security Events. DHS reduces risk across a wide portfolio of activities, including the agriculture and food sector, the travel and trade system, and the financial services sector. These systems are vulnerable to criminal exploitation and both physical and cyber-attacks. DHS also maintains constant guard over key leaders and during high-profile events, reducing the possibility that these events could be exploited by criminal or terrorist actors.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Critical Infrastructure</Name>
        <Description>Enhance security for the Nation's critical infrastructure from terrorism and criminal activity.</Description>
        <Identifier>Objective_60394409-9b4b-4eb1-a661-8cee18525959</Identifier>
        <SequenceIndicator>19</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Vulnerabilities</Name>
        <Description>Identify critical infrastructure and related vulnerabilities.</Description>
        <Identifier>Objective_7e8e729c-bd69-4870-9508-09d039c3ff48</Identifier>
        <SequenceIndicator>20</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Assessment</Name>
        <Description>Develop and deploy a scalable assessment methodology depending on the level of threat and the nature of the target.</Description>
        <Identifier>Objective_33234188-f456-4348-8007-4f28126f9fe4</Identifier>
        <SequenceIndicator>21</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Technologies</Name>
        <Description>Insert and/or develop appropriate technologies.</Description>
        <Identifier>Objective_90aab4e3-b77f-4ac3-a59c-7e68b744e186</Identifier>
        <SequenceIndicator>22</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Protective Measures</Name>
        <Description>Track protective measures of our partners across the homeland security enterprise.</Description>
        <Identifier>Objective_c6afe722-c513-490c-988a-ff70c9e2c8a7</Identifier>
        <SequenceIndicator>23</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Investigations</Name>
        <Description>Conduct investigations that maximize disruption of criminal enterprises that pose the greatest risk to the United States.</Description>
        <Identifier>Objective_f2166986-b604-4cdb-bdc8-45bf243f147e</Identifier>
        <SequenceIndicator>24</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>IEDs</Name>
        <Description>Counter improvised explosive devices (IEDs).</Description>
        <Identifier>Objective_8f66a2dc-3073-4ef2-b7d7-a2ecaf1c5b7c</Identifier>
        <SequenceIndicator>25</SequenceIndicator>
        <OtherInformation>Strategy 1.3.1.6 We will also enhance the Nation's ability to counter improvise explosive devices (IEDs) by coordinating whole community efforts to prevent, protect against, respond to, and mitigate terrorist and criminal use of explosives.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Leaders, Facilities &amp; Events</Name>
        <Description>Protect key leaders, facilities, and National Special Security Events.</Description>
        <Identifier>Objective_9a5f5228-bd4e-49e6-960f-5c65bef5f2c3</Identifier>
        <SequenceIndicator>26</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Intelligence, Information Sharing, Security &amp; Response</Name>
        <Description>Work with partners across the homeland security enterprise to coordinate intelligence, information sharing, security, and response resources.</Description>
        <Identifier>Objective_2a200c14-c883-4a1b-b3c0-5f72015cc6d8</Identifier>
        <SequenceIndicator>27</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Protectees</Name>
        <Description>Protect the President, the Vice President, visiting heads of state, major Presidential candidates, and other designated protectees.</Description>
        <Identifier>Objective_b9f700f1-84ac-4d6d-a5ab-45539c32ef40</Identifier>
        <SequenceIndicator>28</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Federal Facilities, Employees &amp; Visitors</Name>
        <Description>Protect federal facilities, employees, and visitors.</Description>
        <Identifier>Objective_07c9a163-9018-49f7-8f49-40c35f28df54</Identifier>
        <SequenceIndicator>29</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Federal Visitors</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Federal Facilities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Federal Employees</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Events</Name>
        <Description>Assess risk and coordinating support to partners during major special events across the Nation through the Special Events Assessment Rating.</Description>
        <Identifier>Objective_80e42576-edb8-4e4f-9c17-579f49077cd3</Identifier>
        <SequenceIndicator>30</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Borders</Name>
      <Description>SECURE AND MANAGE OUR BORDERS</Description>
      <Identifier>Goal_d98191a5-868c-4afd-8215-ae9aa315478e</Identifier>
      <SequenceIndicator>2</SequenceIndicator>
      <OtherInformation>Secure, well-managed borders must not only protect the United States against threats from abroad, they must also safeguard and expedite the flow of lawful trade and travel. Achieving this end requires that we focus on three interrelated goals: 1) secure U.S. air, land, and sea borders and approaches; 2) safeguard and expedite lawful trade and travel; and 3) disrupt and dismantle transnational criminal organizations and other illicit actors. The 2014 Quadrennial Homeland Security Review defined a risk segmentation approach to managing the flows of people and goods: minimize disruption to and facilitate safe and secure inbound and outbound legal flows of people and goods; prioritize efforts to counter illicit finance and further increase transnational criminal organization perception of risk through targeted interdiction and other activities, while continuing to increase efficiencies in operations; and counter terrorist travel into the United States, terrorism against international travel and trade systems, and the export of sensitive goods and technology. Building on that work, the U.S. Southern Border and Approaches Campaign Planning Effort (2014), one of the first management imperatives from the Unity of Effort Initiative, articulates four mutually-supporting key areas of effort for securing the southern border and approaches: 1) segment and expedite flows of people and goods at ports of entry; 2) strengthen the security and resilience of the global supply chain and the international travel system; 3) combat transnational organized crime and terrorism; and 4) prevent illegal flows of people and goods between ports of entry.</OtherInformation>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>International Maritime Organization</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>International Civil Aviation Organization</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>INTERPOL</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>unnamed organisation</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Security</Name>
        <Description>SECURE U.S. AIR, LAND, AND SEA BORDER AND APPROACHES</Description>
        <Identifier>Objective_7862c960-ea72-4d3f-a84d-06b93cc3593f</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>Flows of people and goods around the world have expanded dramatically in recent years. DHS employs a range of strategies to improve upon border security, as well as to exclude terrorist threats, drug traffickers, and other threats to national security, economic security, and public safety. DHS and our partners ensure transit via legal pathways; identify and remove people and goods attempting to travel illegally; and ensure the safety and integrity of these flows of people and goods by safeguarding the conveyances, nodes, and pathways that make up the travel and trade system. DHS relies on a combination of people, technology, assets (e.g., surface and aviation platforms), and infrastructure (e.g., roads, fences) across DHS operating components to enable situational awareness and secure the border. Given the inherently transnational nature of securing our borders, DHS also continues to build international partnerships to enhance our ability to identify threats or hazards before they emerge in the United States.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Import &amp; Entry</Name>
        <Description>Prevent illegal import and entry.</Description>
        <Identifier>Objective_d53b0b30-3d08-4a50-afd9-7f2bc0ff41a2</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>Prevent illegal import and entry by employing a layered, risk-based approach to screen, identify, and intercept threats at points of departure and at U.S. ports of entry. Using a variety of intelligence, automated tools, and information collected in advance of arrival for passengers and cargo at air, land, and seaports, DHS screens, identifies, and intercepts threats at points of departure before they reach our borders. In the approaches to the United States, DHS maintains domain awareness efforts to establish and maintain a common operating picture of people, vehicles, aircraft, and marine vessels approaching our borders, as well as interdiction capabilities to achieve a law enforcement resolution.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Export &amp; Exit</Name>
        <Description>Prevent illegal export and exit.</Description>
        <Identifier>Objective_8c2dbce1-c2e1-4c34-9de6-acb785896257</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>Prevent illegal export and exit through a risk-based strategy to inspect people, cargo, and conveyances departing the United States through all airports, seaports, land border crossings, and international mail/courier facilities. Using this information, law enforcement organizations such as Immigration and Customs Enforcement will investigate illegal exports and exit.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Trade &amp; Travel</Name>
        <Description>SAFEGUARD AND EXPEDITE LAWFUL TRADE AND TRAVEL</Description>
        <Identifier>Objective_d09f3e0d-a1ae-4044-8da1-da8141ff9258</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>The vast majority of people and goods entering and exiting the United States represent lawful trade and travel. Lawful trade and travel provides enormous economic benefits to our society, evident by a substantial increase in the number of tourist and business travelers and in the value of U.S. exports and imports between 2005 and 2012, and underscored by projections for continued growth at an average of six percent annually through 2030. DHS and our partners work to secure and expedite these flows of people and goods, as they are a main driver of U.S. economic prosperity.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Nodes, Conveyances &amp; Pathways</Name>
        <Description>Safeguard key nodes, conveyances, and pathways.</Description>
        <Identifier>Objective_90ee944e-e310-4d0c-8c7b-344ca7540735</Identifier>
        <SequenceIndicator>5</SequenceIndicator>
        <OtherInformation>Safeguard key nodes, conveyances, and pathways by establishing and enforcing security standards and plans that maintain or restore infrastructure capabilities to be resilient from attacks and natural disasters; this includes facilities at ports of entry, modes of transportation, and pathways.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Transit</Name>
        <Description>Manage the risk of people and goods in transit.</Description>
        <Identifier>Objective_2486a279-fd1b-4645-8275-e7bea6fba4e9</Identifier>
        <SequenceIndicator>6</SequenceIndicator>
        <OtherInformation>Manage the risk of people and goods in transit by employing a risk-segmentation approach that identifies low-risk and high-risk people and goods moving within legal channels as far from the homeland as possible, and then expediting low-risk, lawful movement to and through the United States.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Trade, Economic Security &amp; Competitiveness</Name>
        <Description>Maximize compliance with U.S. trade laws and promote U.S. economic security and competitiveness.</Description>
        <Identifier>Objective_bdce3acb-8242-4ac0-a9cb-6261ec8e6f71</Identifier>
        <SequenceIndicator>7</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Standards</Name>
        <Description>Work with international partners, such as the International Maritime Organization, the International Civil Aviation Organization, and INTERPOL, to create global standards for security and resilience of the global trade and travel system.</Description>
        <Identifier>Objective_c2662d87-d8e6-4d08-8ad8-669f41d3f50d</Identifier>
        <SequenceIndicator>8</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Organization">
          <Name>International Maritime Organization</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Organization">
          <Name>International Civil Aviation Organization</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Organization">
          <Name>INTERPOL</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Cargo</Name>
        <Description>Conduct cargo recognition programs to reduce redundancies for industry while maintaining a commensurate level of security.</Description>
        <Identifier>Objective_683b7874-9eed-43c9-8dd9-022986a965ac</Identifier>
        <SequenceIndicator>9</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Organization">
          <Name>unnamed organisation</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Criminal Organizations &amp; Illicit Actors</Name>
        <Description>DISRUPT AND DISMANTLE TRANSNATIONAL CRIMINAL ORGANIZATIONS AND OTHER ILLICIT ACTORS</Description>
        <Identifier>Objective_9e4d92bc-124f-4f43-a58d-acc4d7ea792d</Identifier>
        <SequenceIndicator>10</SequenceIndicator>
        <OtherInformation>Transnational criminal organizations are increasing in strength and capability. They rely on revenues generated through the sale of illegal drugs and counterfeit goods, human trafficking and smuggling, and other criminal activities. They are also gaining strength by taking advantage of the same innovations in management and supply chain structures that are propelling multinational corporations.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>TCOs</Name>
        <Description>Identify, investigate, disrupt, and dismantle TCOs.</Description>
        <Identifier>Objective_69977984-ea9e-4dd5-b93d-3dbc7080c10e</Identifier>
        <SequenceIndicator>11</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Illicit Financing</Name>
        <Description>Target illicit financing activities that transnational criminal organizations depend on, such as money laundering, and increasing outbound inspection to deter practices such as cash smuggling</Description>
        <Identifier>Objective_32afab0c-3a1d-4427-b497-efe6610c56a8</Identifier>
        <SequenceIndicator>12</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Deterrence</Name>
        <Description>Create a deterrent effect from injecting the greatest amount of uncertainty and concern into criminal decision making by swiftly shifting assets, presence, technology, and tools, further targeting and focusing interdiction activities, and emphasizing strategic communications that project the effectiveness of homeland security capabilities.</Description>
        <Identifier>Objective_2d766bcc-9a5c-4f95-81b5-42ea23c82bf5</Identifier>
        <SequenceIndicator>13</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Illicit Actors</Name>
        <Description>Disrupt illicit actors, activities, and pathways.</Description>
        <Identifier>Objective_57d8af2e-f3d7-4b7c-94b5-37ce5dab9a9d</Identifier>
        <SequenceIndicator>14</SequenceIndicator>
        <OtherInformation>Disrupt illicit actors, activities, and pathways by using intelligence to target and interdict illicit people and goods through a rapid response workforce as well as surveillance and enforcement assets to detect, identify, monitor, track, and interdict targets of interest, and board vessels.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Immigration Laws</Name>
      <Description>ENFORCE AND ADMINISTER OUR IMMIGRATION LAWS</Description>
      <Identifier>Goal_c1101397-875d-41b8-95ef-fcf690ca5cf4</Identifier>
      <SequenceIndicator>3</SequenceIndicator>
      <OtherInformation>Immigration is essential to our identity as a nation of immigrants. Most American families have an immigration story, some recent, some more distant. Many immigrants have taken on great risks to work and contribute to America’s prosperity or were provided refuge after facing persecution abroad. Americans are extremely proud of this tradition. Smart and effective enforcement and administration of our immigration laws remains a core homeland security mission. The following priorities from the 2014 Quadrennial Homeland Security Review inform the strategic approach in this mission area: 1) Building a stronger, smarter border enforcement system; 2) Achieving smart and effective interior enforcement; 3) Creating a 21stCentury legal immigration system; 4) Facilitating reunions for long-separated families; 5) Creating an earned path to citizenship; and 6) Enhancing management and organization to develop a responsive immigration system.</OtherInformation>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Employers</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Immigration System</Name>
        <Description>STRENGTHEN AND EFFECTIVELY ADMINISTER THE IMMIGRATION SYSTEM</Description>
        <Identifier>Objective_fe368d99-2f33-4589-8018-635efa9c3596</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>At the center of any good immigration system must be a structure able to rapidly respond to regulatory changes and the flow of demand around the world while at the same time safeguarding security. We are constantly seeking ways to better administer benefits and use technology to make information more accessible and secure.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Lawful Immigration</Name>
        <Description>Promote lawful immigration.</Description>
        <Identifier>Objective_5227a089-a3e6-4a4d-9813-b9e4af8da4c0</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>Promote lawful immigration by uniting families, providing refuge, fostering economic opportunity, and promoting citizenship. We will also work to better assist high-skilled immigrants, streamline the processing of immigrant visas to encourage businesses to grow in the United States, and develop innovative programs to enable immigrants to reach their potential in the United States.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Immigration Services</Name>
        <Description>Effectively administer the immigration services system.</Description>
        <Identifier>Objective_6464d2a1-e98b-4f58-9564-ec0eff71d836</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Benefit &amp; Information Services</Name>
        <Description>Provide effective customer-oriented immigration benefit and information services at home and abroad.</Description>
        <Identifier>Objective_72981b4c-b0b5-49ae-b8dc-7d581b76480f</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Immigration Decisions</Name>
        <Description>Make all information needed to make immigration decisions available to appropriate agencies electronically and in real-time, including active individual case files and biometric information.</Description>
        <Identifier>Objective_d641b4a8-9603-4e3b-834d-500eb1852401</Identifier>
        <SequenceIndicator>5</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Immigration Benefits</Name>
        <Description>Ensure that only eligible applicants receive immigration benefits through expanded use of biometrics, a strengthening of screening processes, improvements to fraud detection, increases in legal staffing to ensure due process, and enhancements of interagency information sharing.</Description>
        <Identifier>Objective_87b05600-1780-4bbb-bd25-a9888d3031a1</Identifier>
        <SequenceIndicator>6</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Integration</Name>
        <Description>Promote the integration of lawful immigrants in American society.</Description>
        <Identifier>Objective_e9ba0321-a026-4705-9c78-b21151a62d41</Identifier>
        <SequenceIndicator>7</SequenceIndicator>
        <OtherInformation>Promote the integration of lawful immigrants in American society by enhancing educational resources and promoting opportunities to increase understanding of U.S. civic principles and the rights, responsibilities, and importance of citizenship, and supporting comprehensive immigration reform that provides an earned pathway to citizenship.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Unlawful Immigration</Name>
        <Description>PREVENT UNLAWFUL IMMIGRATION</Description>
        <Identifier>Objective_71a7280a-c9ca-4f65-8e86-248675cd97c2</Identifier>
        <SequenceIndicator>8</SequenceIndicator>
        <OtherInformation>The increased movement of people and goods across our borders provides many opportunities but also provides more places for illegal goods, unauthorized migrants, and threats to hide. Unauthorized migration is influenced by many factors, including weak rule of law and violence in sending countries. In addition, violent extremists and criminals can hide within this larger flow of migrants who intend no harm.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Unlawful Immigration</Name>
        <Description>Prevent unlawful entry, strengthen enforcement, and reduce drivers of unlawful immigration.</Description>
        <Identifier>Objective_ec21d629-74d7-40d9-abc1-bddf9173b32d</Identifier>
        <SequenceIndicator>9</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Situational Awareness</Name>
        <Description>Increase situational awareness of our borders.</Description>
        <Identifier>Objective_4fc7fdb1-595a-4b2a-ac6d-ef69706f4278</Identifier>
        <SequenceIndicator>10</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Travel Documents</Name>
        <Description>Ensure that only those abroad who are eligible receive travel documents to the United States.</Description>
        <Identifier>Objective_1d3834d2-1f1a-4108-af58-277e0a6d8855</Identifier>
        <SequenceIndicator>11</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Criminal Aliens</Name>
        <Description>Identify and removing criminal aliens, individuals who pose a threat to public safety, health, or national security, repeat immigration law violators, and other individuals prioritized for removal.</Description>
        <Identifier>Objective_a8cf60c6-31a4-4368-b933-2158eb72c186</Identifier>
        <SequenceIndicator>12</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Demand</Name>
        <Description>Reduce the demand for illegal immigrants.</Description>
        <Identifier>Objective_4c8d7001-c89f-46e1-896a-a399d0c2335c</Identifier>
        <SequenceIndicator>13</SequenceIndicator>
        <OtherInformation>We also reduce the demand for illegal immigrants by conducting inspections, audits, and investigations of employers who hire illegal immigrants and administering tools such as E-Verify to facilitate employers' ability to hire eligible workers in compliance with immigration laws.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Employers</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Arrests, Detentions &amp; Removal</Name>
        <Description>Arrest, detain, and remove criminals, fugitives, and other dangerous foreign nationals.</Description>
        <Identifier>Objective_0c08918e-137d-48cc-8ddb-e07ca8f272b4</Identifier>
        <SequenceIndicator>14</SequenceIndicator>
        <OtherInformation>Arrest, detain, and remove criminals, fugitives, and other dangerous foreign nationals by leveraging federal information sharing and state, local, and federal criminal justice systems to take enforcement action based on priorities with regard to criminal aliens, and working with the Department of Justice to ensure more timely hearing of immigration cases and appeals.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Cyberspace</Name>
      <Description>SAFEGUARD AND SECURE CYBERSPACE</Description>
      <Identifier>Goal_5411a6b4-d5b5-4369-8335-f8515feb7221</Identifier>
      <SequenceIndicator>4</SequenceIndicator>
      <OtherInformation>Each and every day, the United States faces a myriad of threats in cyberspace, from the theft of trade secrets, payment card data, and other sensitive information through cyber intrusions to denial-of-service attacks against Internet websites and attempted intrusions of U.S. critical infrastructure. DHS works closely with government and private sector partners to strengthen cybersecurity capabilities, investigate cybercrime, and share actionable information to ensure a secure and resilient cyberspace that protects privacy and civil rights and civil liberties by design, supports innovation and economic growth, and supports public health and safety. The 2014 Quadrennial Homeland Security Review outlines four strategic priorities to safeguard and secure cyberspace: 1) Strengthen the security and resilience of critical Infrastructure against cyber attacks and other hazards; 2) Secure the federal civilian government information technology enterprise; 3) Advance cyber law enforcement, incident response, and reporting capabilities; and 4) Strengthen the cyber ecosystem.</OtherInformation>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Cybersecurity Professionals</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Critical Infrastructure</Name>
        <Description>STRENGTHEN THE SECURITY AND RESILIENCE OF CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS AND OTHER HAZARDS</Description>
        <Identifier>Objective_4398d320-56a8-441a-8725-2ca86fda7dec</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>The concept of critical infrastructure as discrete, physical assets has become outdated as everything becomes linked to cyberspace. This "cyber-physical convergence" has changed the risks to critical infrastructure in sectors ranging from energy and transportation to agriculture and healthcare. DHS coordinates with its private sector partners as well as with state, local, tribal, and territorial governments to share information and intelligence regarding cyber threats and vulnerabilities, foster development of trustworthy products and services, and encourage the adoption of best-in-class cybersecurity practices.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Information &amp; Intelligence</Name>
        <Description>Enhance the exchange of information and intelligence on risks to critical infrastructure and develop real-time situational awareness capabilities.</Description>
        <Identifier>Objective_66023ccb-a08c-4ffe-b9ea-0e6214dcbf62</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>Enhance the exchange of information and intelligence on risks to critical infrastructure and develop real-time situational awareness capabilities that ensure machine and human interpretation and visualization by increasing the volume, timeliness and quality of cyber threat reporting shared with the private sector and state, local, tribal, and territorial partners, and enabling the National Cybersecurity and Communications Integration Center (to receive information at "machine speed" by enabling networks to be more self-healing, using mathematics and analytics to mimic restorative processes that occur biologically.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Services &amp; Functions</Name>
        <Description>Ensure the delivery of essential services and functions.</Description>
        <Identifier>Objective_988c240c-6fe6-40a1-be11-c9afedac0b2b</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>Partner with critical infrastructure owners and operators to ensure the delivery of essential services and functions by building effective partnerships to set a national focus and determine collective actions, providing assistance to local and regional partners, and leveraging incentives to advance security and resilience, as described in the National Infrastructure Protection Plan: Partnering for Security and Resilience.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Interdependencies &amp; Cascading Impacts</Name>
        <Description>Identify and understand interdependencies and cascading impacts among critical systems.</Description>
        <Identifier>Objective_72488498-455f-45e7-bf24-2f42d7a067a6</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>Identify and understand interdependencies and cascading impacts among critical systems by leveraging regional risk assessment programs, organization-specific assessment, asset and network-specific assessment, and cross-sector risk assessments.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Policies &amp; Best Practices</Name>
        <Description>Identify and develop effective cybersecurity policies and best practices.</Description>
        <Identifier>Objective_4ae8acb2-6477-486f-8b8f-1aa6b1dcf126</Identifier>
        <SequenceIndicator>5</SequenceIndicator>
        <OtherInformation>Collaborate with agencies and the private sector to identify and develop effective cybersecurity policies and best practices through voluntary collaboration with private sector owners and operators (including their partner associations, vendors, and others) and government entity counterparts.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Vulnerabilities &amp; Resilience</Name>
        <Description>Reduce vulnerabilities and promote resilient critical infrastructure design.</Description>
        <Identifier>Objective_d23d68b3-7dc5-4bb4-9b7d-76db24730f10</Identifier>
        <SequenceIndicator>6</SequenceIndicator>
        <OtherInformation>Reduce vulnerabilities and promote resilient critical infrastructure design by identifying and promoting opportunities that build security and resilience into critical infrastructure as it is being developed and updated, rather than focusing solely on mitigating vulnerabilities present within existing critical infrastructure.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Government IT</Name>
        <Description>SECURE THE FEDERAL CIVILIAN GOVERNMENT INFORMATION TECHNOLOGY ENTERPRISE</Description>
        <Identifier>Objective_cb2c358b-d5fe-477d-8817-37894022cf62</Identifier>
        <SequenceIndicator>7</SequenceIndicator>
        <OtherInformation>The Federal Government provides essential services and information on which many Americans rely. Not only must the government protect its own networks, it must serve as a role model to others in implementing security services. DHS itself plays a leading role in securing federal civilian networks, allowing the Federal Government to do its business securely. DHS partners with agencies to deploy products such as the EINSTEIN set of capabilities that provide perimeter network-based intrusion detection and prevention.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Cyber Technology</Name>
        <Description>Coordinate government purchasing of cyber technology.</Description>
        <Identifier>Objective_c78d9c20-f238-4ab7-94a7-c4c8ebaad9da</Identifier>
        <SequenceIndicator>8</SequenceIndicator>
        <OtherInformation>Coordinate government purchasing of cyber technology to enhance cost-effectiveness by using strategically sourced tools and services such as the Continuous Diagnostics and Mitigation program.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Networks, Tools &amp; Information</Name>
        <Description>Equip civilian government networks with innovative cybersecurity tools, information, and protections.</Description>
        <Identifier>Objective_700cbbcc-53e7-4960-8857-f03fefec5c72</Identifier>
        <SequenceIndicator>9</SequenceIndicator>
        <OtherInformation>Equip civilian government networks with innovative cybersecurity tools, information, and protections by supporting research and development and making the innovations from research and development available not only to the Federal Government but widely available across the public and private spheres.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Policy &amp; Standards</Name>
        <Description>Ensure government-wide policy and standards are consistently and effectively implemented and measured.</Description>
        <Identifier>Objective_4893b79d-21fa-4274-9e44-1b29fca36d3f</Identifier>
        <SequenceIndicator>10</SequenceIndicator>
        <OtherInformation>Ensure government-wide policy and standards are consistently and effectively implemented and measured by promoting the adoption of enterprise-wide policy and best practices and working with interagency partners to develop government-wide requirements that can bring the full strength of the market to bear on existing and emergent vulnerabilities.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Law Enforcement, Incident Response &amp; Reporting</Name>
        <Description>ADVANCE CYBER LAW ENFORCEMENT, INCIDENT RESPONSE, AND REPORTING CAPABILITIES</Description>
        <Identifier>Objective_df2b8f70-7952-414c-9f7e-c355e2f24e36</Identifier>
        <SequenceIndicator>11</SequenceIndicator>
        <OtherInformation>Online criminal activity threatens the Internet's safe and secure use. Law enforcement performs an essential role in achieving our Nation's cybersecurity objectives by detecting, investigating, and preventing a wide range of cybercrimes, from theft and fraud to child exploitation, and apprehending and prosecuting those responsible. In addition to criminal prosecution, there is a need to rapidly detect and respond to incidents, including through the development of quarantine and mitigation strategies, as well as to quickly share incident information so that others may protect themselves. Safeguarding and securing cyberspace requires close coordination among federal law enforcement entities, network security experts, state, local, tribal, and territorial officials, and private sector stakeholders.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Incidents</Name>
        <Description>Respond to and assist in the recovery from cyber incidents.</Description>
        <Identifier>Objective_872214ab-b46e-4211-b0d1-5c4276e10c24</Identifier>
        <SequenceIndicator>12</SequenceIndicator>
        <OtherInformation>Respond to and assist in the recovery from cyber incidents by managing incident response activities through the National Cybersecurity and Communications Integration Center and fostering enhanced collaboration between law enforcement and network security officials to pre-plan responses to cyber incidents.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Cybercrime</Name>
        <Description>Deter, disrupt, and investigate cybercrime.</Description>
        <Identifier>Objective_afed2c8b-062d-4848-9001-908606e3dd52</Identifier>
        <SequenceIndicator>13</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Investigations</Name>
        <Description>Increase the quantity and impact of cybercrime investigations.</Description>
        <Identifier>Objective_307fa9ad-37d0-483a-ac2e-7a44191b0a8b</Identifier>
        <SequenceIndicator>14</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Investigations, Experts &amp; Methods</Name>
        <Description>Partner with other agencies to conduct high-profile criminal investigations, prioritize the recruitment and training of technical experts, and develop standardized methods.</Description>
        <Identifier>Objective_c97b1194-aab9-49a1-bb27-e3debcdc1d40</Identifier>
        <SequenceIndicator>15</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Illicit Usage</Name>
        <Description>Strengthen law enforcement agencies' ability to detect, investigate, and arrest those that make illicit use of cyberspace.</Description>
        <Identifier>Objective_6ffcb4fd-5e82-41cb-ab2a-f7bf0a3a36f1</Identifier>
        <SequenceIndicator>16</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Cyber Ecosystem</Name>
        <Description>STRENGTHEN THE CYBER ECOSYSTEM</Description>
        <Identifier>Objective_b78cc47d-a325-46e2-a0a2-e4b6ac394f0d</Identifier>
        <SequenceIndicator>17</SequenceIndicator>
        <OtherInformation>Our entire society, from government and law enforcement to the private sector and members of the public, must work collaboratively to improve our network defense. Ensuring a healthy cyber ecosystem will require collaborative communities, innovative and agile security solutions, standardized and consistent processes to share information and best practices, sound policies and plans, meaningful protection of privacy, civil rights, and civil liberties, and development of a skilled workforce to ensure those policies and plans are implemented as intended.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Products, Services &amp; Solutions</Name>
        <Description>Drive innovative and cost effective security products, services, and solutions.</Description>
        <Identifier>Objective_2060b0ae-91d5-4dc1-9b7f-8f7b7133a4c3</Identifier>
        <SequenceIndicator>18</SequenceIndicator>
        <OtherInformation>Drive innovative and cost effective security products, services, and solutions throughout the cyber ecosystem by working with domestic and international partners across the public and private spheres, and across the science and policy communities to identify promising technology, policy and standards that enable robust, trust-based, automated sharing of cybersecurity information and collective action to limit the spread of incidents and minimize consequences.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>R&amp;D</Name>
        <Description>Conduct and transition research and development, enabling trustworthy cyber infrastructure.</Description>
        <Identifier>Objective_0de0b157-5155-445e-9ca6-22e415fd09ab</Identifier>
        <SequenceIndicator>19</SequenceIndicator>
        <OtherInformation>Conduct and transition research and development, enabling trustworthy cyber infrastructure by supporting initiatives to develop promising new security technologies and techniques including: 1) security automation techniques to facilitate real-time incident response; 2) interoperability to support security cooperation across sectors; and 3) privacy enhancing authentication to enable better system protection.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Cybersecurity Professionals</Name>
        <Description>Develop skilled cybersecurity professionals.</Description>
        <Identifier>Objective_5ef96d71-75b5-42c6-95ff-88984e4d5400</Identifier>
        <SequenceIndicator>20</SequenceIndicator>
        <OtherInformation>Develop skilled cybersecurity professionals by promoting cybersecurity knowledge and innovation, developing Department-wide human capital strategies, policies, and programs intended to enhance the DHS cyber workforce, and working with public and private sector partners to increase the pipeline of highly qualified homeland security professionals through academic and federal training programs.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Cybersecurity Professionals</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Awareness &amp; Best Practices</Name>
        <Description>Enhance public awareness and promote cybersecurity best practices.</Description>
        <Identifier>Objective_31d5681e-aa07-4412-b90d-83760274cb80</Identifier>
        <SequenceIndicator>21</SequenceIndicator>
        <OtherInformation>Enhance public awareness and promote cybersecurity best practices by promoting National Cybersecurity Awareness Month and the Stop. Think. Connect.™ Campaign, which raise awareness through collaborative outreach efforts and distributing materials, resources, and tips to promote cybersecurity.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>International Engagement</Name>
        <Description>Advance international engagement to promote capacity building, international standards, and cooperation.</Description>
        <Identifier>Objective_c0ae0868-6c32-43a1-b0ce-48eecad6e3ee</Identifier>
        <SequenceIndicator>22</SequenceIndicator>
        <OtherInformation>Advance international engagement to promote capacity building, international standards, and cooperation by working to establish and deepen relationships with foreign computer incident response teams both bilaterally and through participation in operationally-focused multilateral fora, such as the Forum for Incident Response and Security Teams.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Preparedness &amp; Resilience</Name>
      <Description>STRENGTHEN NATIONAL PREPAREDNESS AND RESILIENCE</Description>
      <Identifier>Goal_689ead4b-3049-45d0-9d9c-f8353106572c</Identifier>
      <SequenceIndicator>5</SequenceIndicator>
      <OtherInformation>Despite ongoing vigilance and efforts to protect the United States and its citizens, major accidents, disruptions, and natural disasters, as well as deliberate attacks, will occur. The challenge is to build the capacity of American society to be resilient in the face of disruptions, disasters, and other crises. Our goals in this mission require us to: 1) enhance national preparedness; 2) mitigate hazards and vulnerabilities; 3) ensure effective emergency response; and 4) enable rapid recovery. The 2014 Quadrennial Homeland Security Review reaffirms the Whole Community approach to national preparedness and resilience, which calls for the investment of everyone -- not just the government -- in preparedness efforts. Whole Community is a means by which emergency managers, organizational and community leaders, government officials, private and nonprofit sectors, faith-based and disability organizations, and the general public can collectively understand and assess the needs of their respective communities as well as determine the best ways to organize and strengthen their assets, capacities, and interests.</OtherInformation>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>Urban Area Security Initiative</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>State Homeland Security Grant Program</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Tribal Government Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Local Government Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Transit Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Communities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Regional Government Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Communities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Nonprofit Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Territorial Government Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>unnamed group</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Port Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Individuals</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>State Government Entities</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Preparedness</Name>
        <Description>ENHANCE NATIONAL PREPAREDNESS</Description>
        <Identifier>Objective_7f8da0b9-8143-4b3f-bb2e-7c54b0802e54</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>National preparedness underpins all efforts to safeguard and secure the Nation against those threats and hazards that pose the greatest risk. Presidential Policy Directive 8 calls for a National Preparedness Goal, which is "[a] secure and resilient Nation with the capabilities required across the Whole Community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk."</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Empowerment</Name>
        <Description>Empower individuals and communities to strengthen and sustain their own preparedness</Description>
        <Identifier>Objective_e5ad7efc-3004-40ee-8263-ede05a484b9b</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>Empower individuals and communities to strengthen and sustain their own preparedness by engaging public and community organizations through programs such as America's Preparathon! to build a collective understanding of their risks, the resources available to assist their preparations, and their roles and responsibilities in the event of a disaster.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Individuals</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Communities</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Capabilities</Name>
        <Description>Build and sustain core capabilities nationally to prevent, protect against, mitigate, respond to, and recover from all hazards.</Description>
        <Identifier>Objective_226538bb-8df3-4280-abbb-c75fadc4dc01</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Tools &amp; Technical Assistance</Name>
        <Description>Foster capability development by providing tools and technical assistance</Description>
        <Identifier>Objective_338b9d8d-6069-437d-92a0-dc5f6c2d88bf</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Planning &amp; Reachback</Name>
        <Description>Provide planning and reachback expertise.</Description>
        <Identifier>Objective_382e53a3-040a-44fd-8884-353bd2203221</Identifier>
        <SequenceIndicator>5</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Grants</Name>
        <Description>Use grant programs such as the State Homeland Security Grant Program and the Urban Area Security Initiative (which collectively provide funds to state, local, tribal, territorial, and regional government and port, transit, and nonprofit entities)</Description>
        <Identifier>Objective_1b46e2cb-8341-40dd-9c88-efc5e913cd00</Identifier>
        <SequenceIndicator>6</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Organization">
          <Name>Urban Area Security Initiative</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Organization">
          <Name>State Homeland Security Grant Program</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Tribal Government Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Nonprofit Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>State Government Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Regional Government Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Port Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Territorial Government Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Transit Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Local Government Entities</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Planning Frameworks</Name>
        <Description>Promote the use of the National Planning Frameworks.</Description>
        <Identifier>Objective_08659df9-4af5-4d32-b042-8880ee1a1a66</Identifier>
        <SequenceIndicator>7</SequenceIndicator>
        <OtherInformation>These activities support the Department's intent to build and sustain a national integrated network of capabilities across all levels of government and to promote the involvement of the Whole Community in the Assist federal entities in the establishment of effective continuity programs that are regularly updated, exercised, and improved by administering the National Exercise Program, the cornerstone of a collective effort to test, improve, and assess national preparedness.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Hazards &amp; Vulnerabilities</Name>
        <Description>MITIGATE HAZARDS AND VULNERABILITIES</Description>
        <Identifier>Objective_c230e395-8cef-4e9d-af54-e5468d41f566</Identifier>
        <SequenceIndicator>8</SequenceIndicator>
        <OtherInformation>DHS is uniquely positioned not only to support communities during a disaster, but also to enable partners to take steps that will decrease risk and mitigate future hazards before a disaster strikes. While risk cannot be totally eliminated, DHS can influence and support more positive outcomes in reducing risks. National risk management emphasizes focusing on those actions and interventions that reduce the greatest amount of strategic risk to the Nation.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Community Specific Risks</Name>
        <Description>Promote public and private sector awareness and understanding of community-specific risks.</Description>
        <Identifier>Objective_052fdfc5-bbfb-4f6d-a8f6-e0e41f9d680e</Identifier>
        <SequenceIndicator>9</SequenceIndicator>
        <OtherInformation>Promote public and private sector awareness and understanding of community-specific risks by providing credible and actionable data and tools to support risk-informed decision making and incentivizing and facilitating investments to manage current and future risk.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Communities</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Vulnerability</Name>
        <Description>Reduce vulnerability through standards, regulation, resilient design, effective mitigation, and disaster risk reduction measures.</Description>
        <Identifier>Objective_85ea099e-a13a-45db-b001-a313505f467d</Identifier>
        <SequenceIndicator>10</SequenceIndicator>
        <OtherInformation>Reduce vulnerability through standards, regulation, resilient design, effective mitigation, and disaster risk reduction measures by encouraging appropriate land use and adoption of building codes, while also applying engineering and planning practices in conjunction with advanced technology tools.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Maritime Incidents</Name>
        <Description>Prevent maritime incidents by establishing, and ensuring compliance with standards and regulations.</Description>
        <Identifier>Objective_7c37d323-478b-422a-81da-817128443de7</Identifier>
        <SequenceIndicator>11</SequenceIndicator>
        <OtherInformation>Prevent maritime incidents by establishing, and ensuring compliance with standards and regulations by licensing U.S. mariners, conducting and sharing findings of casualty investigations, and providing grants and support for government and nongovernment boating safety efforts.</OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>unnamed group</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
  </StrategicPlanCore>
  <!--Administrative Information-->
  <AdministrativeInformation>
    <Identifier>StrategyPlan_3b6a07ac-48e6-4a5b-b9d9-b0d344761bcc</Identifier>
    <StartDate>2013-10-01</StartDate>
    <EndDate>2018-09-30</EndDate>
    <PublicationDate>2025-12-24</PublicationDate>
    <Source>https://www.stratnavapp.com/StratML/Part2/3b6a07ac-48e6-4a5b-b9d9-b0d344761bcc</Source>
    <Submitter>
      <Identifier>Submitter_3b6a07ac-48e6-4a5b-b9d9-b0d344761bcc</Identifier>
      <GivenName>Owen</GivenName>
      <Surname>Ambur</Surname>
      <PhoneNumber>
      </PhoneNumber>
      <EmailAddress>
      </EmailAddress>
    </Submitter>
  </AdministrativeInformation>
</PerformancePlanOrReport>