U.S. Department of Homeland Security Fiscal Years 2014-2018 Strategic PlanU.S. Department of Homeland Security
DHS
Organization_6df6abfc-4ec6-4e07-9459-b5bdc7c4a125Jeh Charles JohnsonSecretaryA homeland that is safe, secure, and resilient against terrorism and other hazards, where American interests, aspirations, and way of life can thrive.Vision_3b6a07ac-48e6-4a5b-b9d9-b0d344761bccTo provide essential support to national and economic securityMission_3b6a07ac-48e6-4a5b-b9d9-b0d344761bccunnamed valueTerrorism & SecurityPREVENT TERRORISM AND ENHANCE SECURITYGoal_ed160a35-1642-424d-9129-31e105da98ac1Preventing terrorism is the cornerstone of homeland security. Within this mission we focus on the goals of preventing terrorist attacks; preventing and protecting against the unauthorized acquisition or use of chemical, biological, radiological, and nuclear materials and capabilities; and reducing risk to the Nation’s most critical infrastructure, key leaders, and events.Federal Visitorsunnamed generic groupPrivate Sectorunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupLaw Enforcement Authoritiesunnamed generic groupFederal Employeesunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupFederal Facilitiesunnamed generic groupFamiliesCommunitiesunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupLaw Enforcement Partnersunnamed generic groupunnamed generic groupChemical Facilitiesunnamed generic groupunnamed stakeholderunnamed stakeholderunnamed stakeholderunnamed stakeholderunnamed stakeholderunnamed stakeholderunnamed stakeholderAttacksPREVENT TERRORIST ATTACKSObjective_ead5f232-2b4a-4c6e-a331-7e849ca015f21The Department remains vigilant to new and evolving threats in order to protect the Nation from a terrorist attack. Although the U.S. Government’s counterterrorism efforts have degraded the ability of al-Qa’ida’s senior leadership in Afghanistan and Pakistan to centrally plan and execute sophisticated external attacks, since 2009 we have seen the rise of al-Qa’ida affiliates, such as al-Qa’ida in the Arabian Peninsula and the al-Nusrah Front in Syria. These groups have made attempts to export terrorism to our Nation. Additionally, we face the threat of domestic-based “lone offenders” and those who are inspired by violent extremist ideologies to radicalize and commit acts of terrorism against Americans and the Nation. These threats come in multiple forms and, because of the nature of independent actors, may be hardest to detect.unnamed stakeholderInformationAnalyze, fuse, and disseminate terrorism information by sharing information with, and utilizing threat analysis alongside, stakeholders across the homeland security enterprise.Objective_a5cbea91-4869-4d63-9b28-fee54c9e0f4b2We remain committed to integrating critical data sources, such as those for biometric data, by consolidating or federating screening and vetting operations. We will also continually increase and integrate domain awareness capabilities, as well as improve our ability to fully utilize vast amounts of intelligence and other information -- the so-called "big data" challenge -- while rigorously protecting privacy and civil rights and civil liberties.unnamed stakeholderDeterrence & DisruptionDeter and disrupt operations by leveraging the intelligence, information sharing, technological, operational, and policy-making elements within DHS to facilitate a cohesive and coordinated operational response.Objective_589418f6-c278-4b80-82ea-5e2abefa858e3We will also develop intelligence sources and leverage research and analysis to identify and illustrate the tactics, behaviors, and indicators potentially associated with violent extremism as well as factors that may influence violent extremism, and jointly develop with federal, state, local, tribal, and territorial partners training for frontline law enforcement officers on behaviors that may be telling regarding violent extremist activity.unnamed stakeholderTransportation SecurityStrengthen transportation security by using a multi-layered risk-based approach to detect malicious actors and dangerous items at various entry and exit points in the travel and trade system.Objective_8eed60f7-fec0-4cfc-bccc-a94a748f4f2c4We will also improve coordination with foreign governments and stakeholders to expand pre-departure screening and enhance transportation security operations among willing partners to mitigate risks from overseas.unnamed stakeholderViolent ExtremismCounter violent extremismObjective_8fdbd3fe-8f4e-42de-8f60-1f56146a89d05unnamed stakeholderProblem Solving & IntegrationSupport community-based problem solving and integration efforts, as well as local law enforcement programsObjective_a7042cde-f547-46aa-b936-af4e2278c23f6unnamed stakeholderInformation SharingWork with our partners to share information with frontline law enforcement partners, communities, families, and the private sector about how violent extremists are using the Internet and how to protect themselves and their communities.Objective_8aa17ec6-aff4-4a93-a3f8-cde47301355c7Private SectorCommunitiesFamiliesLaw Enforcement PartnersChemical, Radiological & Nuclear MaterialsPREVENT AND PROTECT AGAINST THE UNAUTHORIZED ACQUISITION OR USE OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR MATERIALS AND CAPABILITIESObjective_425129af-754f-48b2-8cbc-490d3c5e3e648Chemical, biological, radiological, and nuclear threats are enduring areas of concern. The consequences of these attacks are potentially high even though the likelihood of their occurrence is relatively low. Small scale chemical attacks are expected to remain more likely because the relative lack of specialized skills and knowledge required to conduct such attacks. However, nuclear terrorism and bioterrorism pose the most strategically significant risk because of their potential consequences. Although the difficulty of stealing a nuclear weapon or fabricating one from stolen or diverted weapons materials reduces the likelihood of this type of attack, the extremely high consequences of an improvised nuclear device attack make it an ongoing top homeland security risk.unnamed generic groupResearch & DevelopmentAnticipate chemical, biological, radiological, and nuclear emerging threats by identifying and understanding potentially dangerous actors, technologies, and materials, and prioritizing research and development activitiesObjective_a236967f-7eba-487c-a61c-a4f3eeab03189including: 1) analyses of alternative technology options; 2) assessments of complex issues such as the relative risk of different chemical, biological, radiological, and nuclear threats; 3) experimentation and operational test and evaluation of technologies proposed for acquisition; 4) detailed technical characterization of potential biological threat organisms; 5) the creation of consensus standards that enable cost-effective progress across many fields; and 6) the determination of nuclear material characteristics through nuclear forensics techniques.unnamed generic groupAcquisition & MovementIdentify and interdict unlawful acquisition and movement of chemical, biological, radiological, and nuclear precursors and materials by leveraging investigative and enforcement assets towards domestic and international movement of these materials and by engaging in information sharing with all stakeholders to monitor and control this technology.Objective_554261fa-3425-4e87-97f7-a5a035245cea10unnamed generic groupMaterials & WeaponsDetect, locate, and prevent the hostile use of chemical, biological, radiological, and nuclear materials and weaponsObjective_0ad79372-d01d-4737-9083-7524a3bc411411unnamed generic groupAuthorities & AssetsCombine authorities and assets with other departments and agenciesObjective_e18a8e70-a975-498f-9908-948b5cfba54712unnamed generic groupNuclear DetectionBuild the U.S. Government's global nuclear detection capability through the Global Nuclear Detection Architecture, a framework for detecting (through technical and non-technical means), analyzing, and reporting on nuclear and other radioactive materials that are out of regulatory controlObjective_2f487f6a-f8a8-4721-9264-589c023129f613unnamed generic groupNuclear ForensicsAdvance nuclear forensics capabilities in order to close down nuclear smuggling networks, promote global nuclear security, and deter wouldbe nation state terrorist facilitators from transferring nuclear materials to terroristsObjective_15ea55fe-b2c8-4b35-9487-d106958c01ff14unnamed generic groupForensic DataProvide unimpeachable forensic data for use by law enforcement authorities in the investigation and prosecution of crimes involving biological agentsObjective_8a239136-7ab2-4376-acda-c0e6d39492d415Law Enforcement AuthoritiesChemical FacilitiesRegulate high-risk chemical facilities to ensure that they take proper steps to mitigate risksObjective_9c7bdb73-b383-4d9a-8a78-7da754ab40a216Chemical FacilitiesBiological IncidentsPrevent the occurrence of significant biological incidents, where possible, but, when unable to prevent, stopping them from overwhelming the capacity of our state, local, tribal, and territorial partners to manage and respond.Objective_349c686f-66dc-46ad-87d9-b09730eeb1fc17To this last point, DHS will deploy technologies that enable early detection of biological agents prior to the onset of symptoms, pursue more rapid responder capabilities, and increase the capacity and effectiveness of local public health, medical, and emergency services.unnamed generic groupCritical Infrastructure, Leadership & EventsREDUCE RISK TO THE NATION'S CRITICAL INFRASTRUCTURE, KEY LEADERSHIP, AND EVENTSObjective_26f6644b-f13e-4810-a0ae-382e85e4bb0018DHS has national leadership responsibility for enhancing security to the Nation's critical infrastructure and protecting key leaders, facilities, and National Special Security Events. DHS reduces risk across a wide portfolio of activities, including the agriculture and food sector, the travel and trade system, and the financial services sector. These systems are vulnerable to criminal exploitation and both physical and cyber-attacks. DHS also maintains constant guard over key leaders and during high-profile events, reducing the possibility that these events could be exploited by criminal or terrorist actors.unnamed generic groupCritical InfrastructureEnhance security for the Nation's critical infrastructure from terrorism and criminal activity.Objective_60394409-9b4b-4eb1-a661-8cee1852595919unnamed generic groupVulnerabilitiesIdentify critical infrastructure and related vulnerabilities.Objective_7e8e729c-bd69-4870-9508-09d039c3ff4820unnamed generic groupAssessmentDevelop and deploy a scalable assessment methodology depending on the level of threat and the nature of the target.Objective_33234188-f456-4348-8007-4f28126f9fe421unnamed generic groupTechnologiesInsert and/or develop appropriate technologies.Objective_90aab4e3-b77f-4ac3-a59c-7e68b744e18622unnamed generic groupProtective MeasuresTrack protective measures of our partners across the homeland security enterprise.Objective_c6afe722-c513-490c-988a-ff70c9e2c8a723unnamed generic groupInvestigationsConduct investigations that maximize disruption of criminal enterprises that pose the greatest risk to the United States.Objective_f2166986-b604-4cdb-bdc8-45bf243f147e24unnamed generic groupIEDsCounter improvised explosive devices (IEDs).Objective_8f66a2dc-3073-4ef2-b7d7-a2ecaf1c5b7c25Strategy 1.3.1.6 We will also enhance the Nation's ability to counter improvise explosive devices (IEDs) by coordinating whole community efforts to prevent, protect against, respond to, and mitigate terrorist and criminal use of explosives.unnamed generic groupLeaders, Facilities & EventsProtect key leaders, facilities, and National Special Security Events.Objective_9a5f5228-bd4e-49e6-960f-5c65bef5f2c326unnamed generic groupIntelligence, Information Sharing, Security & ResponseWork with partners across the homeland security enterprise to coordinate intelligence, information sharing, security, and response resources.Objective_2a200c14-c883-4a1b-b3c0-5f72015cc6d827unnamed generic groupProtecteesProtect the President, the Vice President, visiting heads of state, major Presidential candidates, and other designated protectees.Objective_b9f700f1-84ac-4d6d-a5ab-45539c32ef4028unnamed generic groupFederal Facilities, Employees & VisitorsProtect federal facilities, employees, and visitors.Objective_07c9a163-9018-49f7-8f49-40c35f28df5429Federal VisitorsFederal FacilitiesFederal EmployeesEventsAssess risk and coordinating support to partners during major special events across the Nation through the Special Events Assessment Rating.Objective_80e42576-edb8-4e4f-9c17-579f49077cd330unnamed generic groupBordersSECURE AND MANAGE OUR BORDERSGoal_d98191a5-868c-4afd-8215-ae9aa315478e2Secure, well-managed borders must not only protect the United States against threats from abroad, they must also safeguard and expedite the flow of lawful trade and travel. Achieving this end requires that we focus on three interrelated goals: 1) secure U.S. air, land, and sea borders and approaches; 2) safeguard and expedite lawful trade and travel; and 3) disrupt and dismantle transnational criminal organizations and other illicit actors. The 2014 Quadrennial Homeland Security Review defined a risk segmentation approach to managing the flows of people and goods: minimize disruption to and facilitate safe and secure inbound and outbound legal flows of people and goods; prioritize efforts to counter illicit finance and further increase transnational criminal organization perception of risk through targeted interdiction and other activities, while continuing to increase efficiencies in operations; and counter terrorist travel into the United States, terrorism against international travel and trade systems, and the export of sensitive goods and technology. Building on that work, the U.S. Southern Border and Approaches Campaign Planning Effort (2014), one of the first management imperatives from the Unity of Effort Initiative, articulates four mutually-supporting key areas of effort for securing the southern border and approaches: 1) segment and expedite flows of people and goods at ports of entry; 2) strengthen the security and resilience of the global supply chain and the international travel system; 3) combat transnational organized crime and terrorism; and 4) prevent illegal flows of people and goods between ports of entry.International Maritime OrganizationInternational Civil Aviation OrganizationINTERPOLunnamed organisationunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed stakeholderSecuritySECURE U.S. AIR, LAND, AND SEA BORDER AND APPROACHESObjective_7862c960-ea72-4d3f-a84d-06b93cc3593f1Flows of people and goods around the world have expanded dramatically in recent years. DHS employs a range of strategies to improve upon border security, as well as to exclude terrorist threats, drug traffickers, and other threats to national security, economic security, and public safety. DHS and our partners ensure transit via legal pathways; identify and remove people and goods attempting to travel illegally; and ensure the safety and integrity of these flows of people and goods by safeguarding the conveyances, nodes, and pathways that make up the travel and trade system. DHS relies on a combination of people, technology, assets (e.g., surface and aviation platforms), and infrastructure (e.g., roads, fences) across DHS operating components to enable situational awareness and secure the border. Given the inherently transnational nature of securing our borders, DHS also continues to build international partnerships to enhance our ability to identify threats or hazards before they emerge in the United States.unnamed generic groupImport & EntryPrevent illegal import and entry.Objective_d53b0b30-3d08-4a50-afd9-7f2bc0ff41a22Prevent illegal import and entry by employing a layered, risk-based approach to screen, identify, and intercept threats at points of departure and at U.S. ports of entry. Using a variety of intelligence, automated tools, and information collected in advance of arrival for passengers and cargo at air, land, and seaports, DHS screens, identifies, and intercepts threats at points of departure before they reach our borders. In the approaches to the United States, DHS maintains domain awareness efforts to establish and maintain a common operating picture of people, vehicles, aircraft, and marine vessels approaching our borders, as well as interdiction capabilities to achieve a law enforcement resolution.unnamed generic groupExport & ExitPrevent illegal export and exit.Objective_8c2dbce1-c2e1-4c34-9de6-acb7858962573Prevent illegal export and exit through a risk-based strategy to inspect people, cargo, and conveyances departing the United States through all airports, seaports, land border crossings, and international mail/courier facilities. Using this information, law enforcement organizations such as Immigration and Customs Enforcement will investigate illegal exports and exit.unnamed generic groupTrade & TravelSAFEGUARD AND EXPEDITE LAWFUL TRADE AND TRAVELObjective_d09f3e0d-a1ae-4044-8da1-da8141ff92584The vast majority of people and goods entering and exiting the United States represent lawful trade and travel. Lawful trade and travel provides enormous economic benefits to our society, evident by a substantial increase in the number of tourist and business travelers and in the value of U.S. exports and imports between 2005 and 2012, and underscored by projections for continued growth at an average of six percent annually through 2030. DHS and our partners work to secure and expedite these flows of people and goods, as they are a main driver of U.S. economic prosperity.unnamed generic groupNodes, Conveyances & PathwaysSafeguard key nodes, conveyances, and pathways.Objective_90ee944e-e310-4d0c-8c7b-344ca75407355Safeguard key nodes, conveyances, and pathways by establishing and enforcing security standards and plans that maintain or restore infrastructure capabilities to be resilient from attacks and natural disasters; this includes facilities at ports of entry, modes of transportation, and pathways.unnamed generic groupTransitManage the risk of people and goods in transit.Objective_2486a279-fd1b-4645-8275-e7bea6fba4e96Manage the risk of people and goods in transit by employing a risk-segmentation approach that identifies low-risk and high-risk people and goods moving within legal channels as far from the homeland as possible, and then expediting low-risk, lawful movement to and through the United States.unnamed generic groupTrade, Economic Security & CompetitivenessMaximize compliance with U.S. trade laws and promote U.S. economic security and competitiveness.Objective_bdce3acb-8242-4ac0-a9cb-6261ec8e6f717unnamed generic groupStandardsWork with international partners, such as the International Maritime Organization, the International Civil Aviation Organization, and INTERPOL, to create global standards for security and resilience of the global trade and travel system.Objective_c2662d87-d8e6-4d08-8ad8-669f41d3f50d8International Maritime OrganizationInternational Civil Aviation OrganizationINTERPOLCargoConduct cargo recognition programs to reduce redundancies for industry while maintaining a commensurate level of security.Objective_683b7874-9eed-43c9-8dd9-022986a965ac9unnamed organisationCriminal Organizations & Illicit ActorsDISRUPT AND DISMANTLE TRANSNATIONAL CRIMINAL ORGANIZATIONS AND OTHER ILLICIT ACTORSObjective_9e4d92bc-124f-4f43-a58d-acc4d7ea792d10Transnational criminal organizations are increasing in strength and capability. They rely on revenues generated through the sale of illegal drugs and counterfeit goods, human trafficking and smuggling, and other criminal activities. They are also gaining strength by taking advantage of the same innovations in management and supply chain structures that are propelling multinational corporations.unnamed generic groupTCOsIdentify, investigate, disrupt, and dismantle TCOs.Objective_69977984-ea9e-4dd5-b93d-3dbc7080c10e11unnamed generic groupIllicit FinancingTarget illicit financing activities that transnational criminal organizations depend on, such as money laundering, and increasing outbound inspection to deter practices such as cash smugglingObjective_32afab0c-3a1d-4427-b497-efe6610c56a812unnamed generic groupDeterrenceCreate a deterrent effect from injecting the greatest amount of uncertainty and concern into criminal decision making by swiftly shifting assets, presence, technology, and tools, further targeting and focusing interdiction activities, and emphasizing strategic communications that project the effectiveness of homeland security capabilities.Objective_2d766bcc-9a5c-4f95-81b5-42ea23c82bf513unnamed generic groupIllicit ActorsDisrupt illicit actors, activities, and pathways.Objective_57d8af2e-f3d7-4b7c-94b5-37ce5dab9a9d14Disrupt illicit actors, activities, and pathways by using intelligence to target and interdict illicit people and goods through a rapid response workforce as well as surveillance and enforcement assets to detect, identify, monitor, track, and interdict targets of interest, and board vessels.unnamed generic groupImmigration LawsENFORCE AND ADMINISTER OUR IMMIGRATION LAWSGoal_c1101397-875d-41b8-95ef-fcf690ca5cf43Immigration is essential to our identity as a nation of immigrants. Most American families have an immigration story, some recent, some more distant. Many immigrants have taken on great risks to work and contribute to America’s prosperity or were provided refuge after facing persecution abroad. Americans are extremely proud of this tradition. Smart and effective enforcement and administration of our immigration laws remains a core homeland security mission. The following priorities from the 2014 Quadrennial Homeland Security Review inform the strategic approach in this mission area: 1) Building a stronger, smarter border enforcement system; 2) Achieving smart and effective interior enforcement; 3) Creating a 21stCentury legal immigration system; 4) Facilitating reunions for long-separated families; 5) Creating an earned path to citizenship; and 6) Enhancing management and organization to develop a responsive immigration system.unnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupEmployersunnamed stakeholderImmigration SystemSTRENGTHEN AND EFFECTIVELY ADMINISTER THE IMMIGRATION SYSTEMObjective_fe368d99-2f33-4589-8018-635efa9c35961At the center of any good immigration system must be a structure able to rapidly respond to regulatory changes and the flow of demand around the world while at the same time safeguarding security. We are constantly seeking ways to better administer benefits and use technology to make information more accessible and secure.unnamed generic groupLawful ImmigrationPromote lawful immigration.Objective_5227a089-a3e6-4a4d-9813-b9e4af8da4c02Promote lawful immigration by uniting families, providing refuge, fostering economic opportunity, and promoting citizenship. We will also work to better assist high-skilled immigrants, streamline the processing of immigrant visas to encourage businesses to grow in the United States, and develop innovative programs to enable immigrants to reach their potential in the United States.unnamed generic groupImmigration ServicesEffectively administer the immigration services system.Objective_6464d2a1-e98b-4f58-9564-ec0eff71d8363unnamed generic groupBenefit & Information ServicesProvide effective customer-oriented immigration benefit and information services at home and abroad.Objective_72981b4c-b0b5-49ae-b8dc-7d581b76480f4unnamed generic groupImmigration DecisionsMake all information needed to make immigration decisions available to appropriate agencies electronically and in real-time, including active individual case files and biometric information.Objective_d641b4a8-9603-4e3b-834d-500eb18524015unnamed generic groupImmigration BenefitsEnsure that only eligible applicants receive immigration benefits through expanded use of biometrics, a strengthening of screening processes, improvements to fraud detection, increases in legal staffing to ensure due process, and enhancements of interagency information sharing.Objective_87b05600-1780-4bbb-bd25-a9888d3031a16unnamed generic groupIntegrationPromote the integration of lawful immigrants in American society.Objective_e9ba0321-a026-4705-9c78-b21151a62d417Promote the integration of lawful immigrants in American society by enhancing educational resources and promoting opportunities to increase understanding of U.S. civic principles and the rights, responsibilities, and importance of citizenship, and supporting comprehensive immigration reform that provides an earned pathway to citizenship.unnamed generic groupUnlawful ImmigrationPREVENT UNLAWFUL IMMIGRATIONObjective_71a7280a-c9ca-4f65-8e86-248675cd97c28The increased movement of people and goods across our borders provides many opportunities but also provides more places for illegal goods, unauthorized migrants, and threats to hide. Unauthorized migration is influenced by many factors, including weak rule of law and violence in sending countries. In addition, violent extremists and criminals can hide within this larger flow of migrants who intend no harm.unnamed generic groupUnlawful ImmigrationPrevent unlawful entry, strengthen enforcement, and reduce drivers of unlawful immigration.Objective_ec21d629-74d7-40d9-abc1-bddf9173b32d9unnamed generic groupSituational AwarenessIncrease situational awareness of our borders.Objective_4fc7fdb1-595a-4b2a-ac6d-ef69706f427810unnamed generic groupTravel DocumentsEnsure that only those abroad who are eligible receive travel documents to the United States.Objective_1d3834d2-1f1a-4108-af58-277e0a6d885511unnamed generic groupCriminal AliensIdentify and removing criminal aliens, individuals who pose a threat to public safety, health, or national security, repeat immigration law violators, and other individuals prioritized for removal.Objective_a8cf60c6-31a4-4368-b933-2158eb72c18612unnamed generic groupDemandReduce the demand for illegal immigrants.Objective_4c8d7001-c89f-46e1-896a-a399d0c2335c13We also reduce the demand for illegal immigrants by conducting inspections, audits, and investigations of employers who hire illegal immigrants and administering tools such as E-Verify to facilitate employers' ability to hire eligible workers in compliance with immigration laws.EmployersArrests, Detentions & RemovalArrest, detain, and remove criminals, fugitives, and other dangerous foreign nationals.Objective_0c08918e-137d-48cc-8ddb-e07ca8f272b414Arrest, detain, and remove criminals, fugitives, and other dangerous foreign nationals by leveraging federal information sharing and state, local, and federal criminal justice systems to take enforcement action based on priorities with regard to criminal aliens, and working with the Department of Justice to ensure more timely hearing of immigration cases and appeals.unnamed generic groupCyberspaceSAFEGUARD AND SECURE CYBERSPACEGoal_5411a6b4-d5b5-4369-8335-f8515feb72214Each and every day, the United States faces a myriad of threats in cyberspace, from the theft of trade secrets, payment card data, and other sensitive information through cyber intrusions to denial-of-service attacks against Internet websites and attempted intrusions of U.S. critical infrastructure. DHS works closely with government and private sector partners to strengthen cybersecurity capabilities, investigate cybercrime, and share actionable information to ensure a secure and resilient cyberspace that protects privacy and civil rights and civil liberties by design, supports innovation and economic growth, and supports public health and safety. The 2014 Quadrennial Homeland Security Review outlines four strategic priorities to safeguard and secure cyberspace: 1) Strengthen the security and resilience of critical Infrastructure against cyber attacks and other hazards; 2) Secure the federal civilian government information technology enterprise; 3) Advance cyber law enforcement, incident response, and reporting capabilities; and 4) Strengthen the cyber ecosystem.unnamed generic groupunnamed generic groupCybersecurity Professionalsunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed generic groupunnamed stakeholderCritical InfrastructureSTRENGTHEN THE SECURITY AND RESILIENCE OF CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS AND OTHER HAZARDSObjective_4398d320-56a8-441a-8725-2ca86fda7dec1The concept of critical infrastructure as discrete, physical assets has become outdated as everything becomes linked to cyberspace. This "cyber-physical convergence" has changed the risks to critical infrastructure in sectors ranging from energy and transportation to agriculture and healthcare. DHS coordinates with its private sector partners as well as with state, local, tribal, and territorial governments to share information and intelligence regarding cyber threats and vulnerabilities, foster development of trustworthy products and services, and encourage the adoption of best-in-class cybersecurity practices.unnamed generic groupInformation & IntelligenceEnhance the exchange of information and intelligence on risks to critical infrastructure and develop real-time situational awareness capabilities.Objective_66023ccb-a08c-4ffe-b9ea-0e6214dcbf622Enhance the exchange of information and intelligence on risks to critical infrastructure and develop real-time situational awareness capabilities that ensure machine and human interpretation and visualization by increasing the volume, timeliness and quality of cyber threat reporting shared with the private sector and state, local, tribal, and territorial partners, and enabling the National Cybersecurity and Communications Integration Center (to receive information at "machine speed" by enabling networks to be more self-healing, using mathematics and analytics to mimic restorative processes that occur biologically.unnamed generic groupServices & FunctionsEnsure the delivery of essential services and functions.Objective_988c240c-6fe6-40a1-be11-c9afedac0b2b3Partner with critical infrastructure owners and operators to ensure the delivery of essential services and functions by building effective partnerships to set a national focus and determine collective actions, providing assistance to local and regional partners, and leveraging incentives to advance security and resilience, as described in the National Infrastructure Protection Plan: Partnering for Security and Resilience.unnamed generic groupInterdependencies & Cascading ImpactsIdentify and understand interdependencies and cascading impacts among critical systems.Objective_72488498-455f-45e7-bf24-2f42d7a067a64Identify and understand interdependencies and cascading impacts among critical systems by leveraging regional risk assessment programs, organization-specific assessment, asset and network-specific assessment, and cross-sector risk assessments.unnamed generic groupPolicies & Best PracticesIdentify and develop effective cybersecurity policies and best practices.Objective_4ae8acb2-6477-486f-8b8f-1aa6b1dcf1265Collaborate with agencies and the private sector to identify and develop effective cybersecurity policies and best practices through voluntary collaboration with private sector owners and operators (including their partner associations, vendors, and others) and government entity counterparts.unnamed generic groupVulnerabilities & ResilienceReduce vulnerabilities and promote resilient critical infrastructure design.Objective_d23d68b3-7dc5-4bb4-9b7d-76db24730f106Reduce vulnerabilities and promote resilient critical infrastructure design by identifying and promoting opportunities that build security and resilience into critical infrastructure as it is being developed and updated, rather than focusing solely on mitigating vulnerabilities present within existing critical infrastructure.unnamed generic groupGovernment ITSECURE THE FEDERAL CIVILIAN GOVERNMENT INFORMATION TECHNOLOGY ENTERPRISEObjective_cb2c358b-d5fe-477d-8817-37894022cf627The Federal Government provides essential services and information on which many Americans rely. Not only must the government protect its own networks, it must serve as a role model to others in implementing security services. DHS itself plays a leading role in securing federal civilian networks, allowing the Federal Government to do its business securely. DHS partners with agencies to deploy products such as the EINSTEIN set of capabilities that provide perimeter network-based intrusion detection and prevention.unnamed generic groupCyber TechnologyCoordinate government purchasing of cyber technology.Objective_c78d9c20-f238-4ab7-94a7-c4c8ebaad9da8Coordinate government purchasing of cyber technology to enhance cost-effectiveness by using strategically sourced tools and services such as the Continuous Diagnostics and Mitigation program.unnamed generic groupNetworks, Tools & InformationEquip civilian government networks with innovative cybersecurity tools, information, and protections.Objective_700cbbcc-53e7-4960-8857-f03fefec5c729Equip civilian government networks with innovative cybersecurity tools, information, and protections by supporting research and development and making the innovations from research and development available not only to the Federal Government but widely available across the public and private spheres.unnamed generic groupPolicy & StandardsEnsure government-wide policy and standards are consistently and effectively implemented and measured.Objective_4893b79d-21fa-4274-9e44-1b29fca36d3f10Ensure government-wide policy and standards are consistently and effectively implemented and measured by promoting the adoption of enterprise-wide policy and best practices and working with interagency partners to develop government-wide requirements that can bring the full strength of the market to bear on existing and emergent vulnerabilities.unnamed generic groupLaw Enforcement, Incident Response & ReportingADVANCE CYBER LAW ENFORCEMENT, INCIDENT RESPONSE, AND REPORTING CAPABILITIESObjective_df2b8f70-7952-414c-9f7e-c355e2f24e3611Online criminal activity threatens the Internet's safe and secure use. Law enforcement performs an essential role in achieving our Nation's cybersecurity objectives by detecting, investigating, and preventing a wide range of cybercrimes, from theft and fraud to child exploitation, and apprehending and prosecuting those responsible. In addition to criminal prosecution, there is a need to rapidly detect and respond to incidents, including through the development of quarantine and mitigation strategies, as well as to quickly share incident information so that others may protect themselves. Safeguarding and securing cyberspace requires close coordination among federal law enforcement entities, network security experts, state, local, tribal, and territorial officials, and private sector stakeholders.unnamed generic groupIncidentsRespond to and assist in the recovery from cyber incidents.Objective_872214ab-b46e-4211-b0d1-5c4276e10c2412Respond to and assist in the recovery from cyber incidents by managing incident response activities through the National Cybersecurity and Communications Integration Center and fostering enhanced collaboration between law enforcement and network security officials to pre-plan responses to cyber incidents.unnamed generic groupCybercrimeDeter, disrupt, and investigate cybercrime.Objective_afed2c8b-062d-4848-9001-908606e3dd5213unnamed generic groupInvestigationsIncrease the quantity and impact of cybercrime investigations.Objective_307fa9ad-37d0-483a-ac2e-7a44191b0a8b14unnamed generic groupInvestigations, Experts & MethodsPartner with other agencies to conduct high-profile criminal investigations, prioritize the recruitment and training of technical experts, and develop standardized methods.Objective_c97b1194-aab9-49a1-bb27-e3debcdc1d4015unnamed generic groupIllicit UsageStrengthen law enforcement agencies' ability to detect, investigate, and arrest those that make illicit use of cyberspace.Objective_6ffcb4fd-5e82-41cb-ab2a-f7bf0a3a36f116unnamed generic groupCyber EcosystemSTRENGTHEN THE CYBER ECOSYSTEMObjective_b78cc47d-a325-46e2-a0a2-e4b6ac394f0d17Our entire society, from government and law enforcement to the private sector and members of the public, must work collaboratively to improve our network defense. Ensuring a healthy cyber ecosystem will require collaborative communities, innovative and agile security solutions, standardized and consistent processes to share information and best practices, sound policies and plans, meaningful protection of privacy, civil rights, and civil liberties, and development of a skilled workforce to ensure those policies and plans are implemented as intended.unnamed generic groupProducts, Services & SolutionsDrive innovative and cost effective security products, services, and solutions.Objective_2060b0ae-91d5-4dc1-9b7f-8f7b7133a4c318Drive innovative and cost effective security products, services, and solutions throughout the cyber ecosystem by working with domestic and international partners across the public and private spheres, and across the science and policy communities to identify promising technology, policy and standards that enable robust, trust-based, automated sharing of cybersecurity information and collective action to limit the spread of incidents and minimize consequences.unnamed generic groupR&DConduct and transition research and development, enabling trustworthy cyber infrastructure.Objective_0de0b157-5155-445e-9ca6-22e415fd09ab19Conduct and transition research and development, enabling trustworthy cyber infrastructure by supporting initiatives to develop promising new security technologies and techniques including: 1) security automation techniques to facilitate real-time incident response; 2) interoperability to support security cooperation across sectors; and 3) privacy enhancing authentication to enable better system protection.unnamed generic groupCybersecurity ProfessionalsDevelop skilled cybersecurity professionals.Objective_5ef96d71-75b5-42c6-95ff-88984e4d540020Develop skilled cybersecurity professionals by promoting cybersecurity knowledge and innovation, developing Department-wide human capital strategies, policies, and programs intended to enhance the DHS cyber workforce, and working with public and private sector partners to increase the pipeline of highly qualified homeland security professionals through academic and federal training programs.Cybersecurity ProfessionalsAwareness & Best PracticesEnhance public awareness and promote cybersecurity best practices.Objective_31d5681e-aa07-4412-b90d-83760274cb8021Enhance public awareness and promote cybersecurity best practices by promoting National Cybersecurity Awareness Month and the Stop. Think. Connect.™ Campaign, which raise awareness through collaborative outreach efforts and distributing materials, resources, and tips to promote cybersecurity.unnamed generic groupInternational EngagementAdvance international engagement to promote capacity building, international standards, and cooperation.Objective_c0ae0868-6c32-43a1-b0ce-48eecad6e3ee22Advance international engagement to promote capacity building, international standards, and cooperation by working to establish and deepen relationships with foreign computer incident response teams both bilaterally and through participation in operationally-focused multilateral fora, such as the Forum for Incident Response and Security Teams.unnamed generic groupPreparedness & ResilienceSTRENGTHEN NATIONAL PREPAREDNESS AND RESILIENCEGoal_689ead4b-3049-45d0-9d9c-f8353106572c5Despite ongoing vigilance and efforts to protect the United States and its citizens, major accidents, disruptions, and natural disasters, as well as deliberate attacks, will occur. The challenge is to build the capacity of American society to be resilient in the face of disruptions, disasters, and other crises. Our goals in this mission require us to: 1) enhance national preparedness; 2) mitigate hazards and vulnerabilities; 3) ensure effective emergency response; and 4) enable rapid recovery. The 2014 Quadrennial Homeland Security Review reaffirms the Whole Community approach to national preparedness and resilience, which calls for the investment of everyone -- not just the government -- in preparedness efforts. Whole Community is a means by which emergency managers, organizational and community leaders, government officials, private and nonprofit sectors, faith-based and disability organizations, and the general public can collectively understand and assess the needs of their respective communities as well as determine the best ways to organize and strengthen their assets, capacities, and interests.Urban Area Security InitiativeState Homeland Security Grant ProgramTribal Government EntitiesLocal Government Entitiesunnamed generic groupTransit EntitiesCommunitiesunnamed generic groupunnamed generic groupunnamed generic groupRegional Government Entitiesunnamed generic groupunnamed generic groupCommunitiesNonprofit EntitiesTerritorial Government Entitiesunnamed generic groupunnamed generic groupPort EntitiesIndividualsState Government Entitiesunnamed stakeholderPreparednessENHANCE NATIONAL PREPAREDNESSObjective_7f8da0b9-8143-4b3f-bb2e-7c54b0802e541National preparedness underpins all efforts to safeguard and secure the Nation against those threats and hazards that pose the greatest risk. Presidential Policy Directive 8 calls for a National Preparedness Goal, which is "[a] secure and resilient Nation with the capabilities required across the Whole Community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk."unnamed generic groupEmpowermentEmpower individuals and communities to strengthen and sustain their own preparednessObjective_e5ad7efc-3004-40ee-8263-ede05a484b9b2Empower individuals and communities to strengthen and sustain their own preparedness by engaging public and community organizations through programs such as America's Preparathon! to build a collective understanding of their risks, the resources available to assist their preparations, and their roles and responsibilities in the event of a disaster.IndividualsCommunitiesCapabilitiesBuild and sustain core capabilities nationally to prevent, protect against, mitigate, respond to, and recover from all hazards.Objective_226538bb-8df3-4280-abbb-c75fadc4dc013unnamed generic groupTools & Technical AssistanceFoster capability development by providing tools and technical assistanceObjective_338b9d8d-6069-437d-92a0-dc5f6c2d88bf4unnamed generic groupPlanning & ReachbackProvide planning and reachback expertise.Objective_382e53a3-040a-44fd-8884-353bd22032215unnamed generic groupGrantsUse grant programs such as the State Homeland Security Grant Program and the Urban Area Security Initiative (which collectively provide funds to state, local, tribal, territorial, and regional government and port, transit, and nonprofit entities)Objective_1b46e2cb-8341-40dd-9c88-efc5e913cd006Urban Area Security InitiativeState Homeland Security Grant ProgramTribal Government EntitiesNonprofit EntitiesState Government EntitiesRegional Government EntitiesPort EntitiesTerritorial Government EntitiesTransit EntitiesLocal Government EntitiesPlanning FrameworksPromote the use of the National Planning Frameworks.Objective_08659df9-4af5-4d32-b042-8880ee1a1a667These activities support the Department's intent to build and sustain a national integrated network of capabilities across all levels of government and to promote the involvement of the Whole Community in the Assist federal entities in the establishment of effective continuity programs that are regularly updated, exercised, and improved by administering the National Exercise Program, the cornerstone of a collective effort to test, improve, and assess national preparedness.unnamed generic groupHazards & VulnerabilitiesMITIGATE HAZARDS AND VULNERABILITIESObjective_c230e395-8cef-4e9d-af54-e5468d41f5668DHS is uniquely positioned not only to support communities during a disaster, but also to enable partners to take steps that will decrease risk and mitigate future hazards before a disaster strikes. While risk cannot be totally eliminated, DHS can influence and support more positive outcomes in reducing risks. National risk management emphasizes focusing on those actions and interventions that reduce the greatest amount of strategic risk to the Nation.unnamed generic groupCommunity Specific RisksPromote public and private sector awareness and understanding of community-specific risks.Objective_052fdfc5-bbfb-4f6d-a8f6-e0e41f9d680e9Promote public and private sector awareness and understanding of community-specific risks by providing credible and actionable data and tools to support risk-informed decision making and incentivizing and facilitating investments to manage current and future risk.CommunitiesVulnerabilityReduce vulnerability through standards, regulation, resilient design, effective mitigation, and disaster risk reduction measures.Objective_85ea099e-a13a-45db-b001-a313505f467d10Reduce vulnerability through standards, regulation, resilient design, effective mitigation, and disaster risk reduction measures by encouraging appropriate land use and adoption of building codes, while also applying engineering and planning practices in conjunction with advanced technology tools.unnamed generic groupMaritime IncidentsPrevent maritime incidents by establishing, and ensuring compliance with standards and regulations.Objective_7c37d323-478b-422a-81da-817128443de711Prevent maritime incidents by establishing, and ensuring compliance with standards and regulations by licensing U.S. mariners, conducting and sharing findings of casualty investigations, and providing grants and support for government and nongovernment boating safety efforts.unnamed generic groupStrategyPlan_3b6a07ac-48e6-4a5b-b9d9-b0d344761bcc2013-10-012018-09-302021-11-06Submitter_3b6a07ac-48e6-4a5b-b9d9-b0d344761bccOwenAmbur