Homeland Security: The Players

At least 43 federal agencies and offices are involved in the war on terrorism. The official list is classified. But here is a partial list of players and roles:

NATIONAL POLICY

National Security Council (White House). Coordinates foreign strategy.
Office of Homeland Security (White House). Coordinates domestic defense.
Council of Economic Advisers (White House). Coordinates economic recovery.

INTELLIGENCE

Central Intelligence Agency. Coordinates all foreign intelligence, deploys spies.
National Security Agency. Intercepts foreign communications.
National Reconaissance Office (Defense). Runs spy satellites.
Defense Intelligence Agency (Defense). Coordinates military intelligence.
Special Operations Command (Defense). Scouts hostile territory.
State Department. Negotiates with foreign governments.
Federal Bureau of Investigation (Justice). Investigates attacks.
Treasury Department. Monitors suspicious financial activity.
Securities and Exchange Commission. Monitors suspicious trades.

PREEMPTION AND RETALIATION

Defense Department. Stages military strikes.
FBI. Arrests terrorists.
Drug Enforcement Administration (Justice). Attacks Afghan opium trade.
Treasury Department. Freezes terrorist accounts.

BORDER SECURITY

Coast Guard (Transportation in peacetime, Defense in wartime). Patrols coasts and waterways.
Immigration and Naturalization Service (Justice). Monitors people entering U.S.
Customs Service (Treasury). Monitors goods entering U.S.
North American Aerospace Defense Command (Defense/Canada). Monitors aircraft and missiles.

DISASTER PREPAREDNESS AND RESPONSE

FBI. Coordinates crisis response.
Office for Domestic Preparedness (Justice). Trains and equips local agencies.
Federal Emergency Management Agency. Supports, trains, and equips local fire, medical personnel.
Bureau of Alcohol, Tobacco, and Firearms (Treasury). Trains locals in explosives handling.
National Guard (Defense). Provides disaster relief, security.
Joint Task Force, Civil Support (Defense). Coordinates other military assistance.
Health and Human Services Department. Assists locals with bioterrorism, mass casualties.
Centers for Disease Control and Prevention (HHS). Detects disease outbreaks.
Environmental Protection Agency. Responds to chemical attacks.
Energy Department. Responds to radioactive and nuclear attacks.
Agriculture Department. Responds to attacks on food supply, crops, and livestock.
Food and Drug Administration. Monitors food supply.
Veterans Affairs Department. Provides extra hospital space.
Transportation Department. Protects transportation infrastructure.
National Infrastructure Protection Center (FBI). Protects computer networks.
Critical Infrastructure Assurance Office (Commerce). Protects computer networks.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.