<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="stratmliso.xsl"?>
<StrategicPlan xmlns="urn:ISO:std:iso:17469:tech:xsd:stratml_core" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:ISO:std:iso:17469:tech:xsd:stratml_core http://xml.govwebs.net/stratml/references/StrategicPlanISOVersion20140401.xsd"><Name>Fiscal Years 2014-2018 Strategic Plan</Name><Description/><OtherInformation/><StrategicPlanCore><Organization><Name>U.S. Department of Homeland Security</Name><Acronym>DHS</Acronym><Identifier>_6532f572-4eac-11e0-aa9f-7c137a64ea2a</Identifier><Description/><Stakeholder StakeholderTypeType="Person"><Name>Jeh Charles Johnson</Name><Description>Secretary</Description></Stakeholder></Organization><Vision><Description>A homeland that is safe, secure, and resilient against terrorism and other hazards, where American interests, aspirations, and way of life can thrive.</Description><Identifier>_7e0bc33a-4580-11e8-81c7-6748eec279ad</Identifier></Vision><Mission><Description>To provide essential support to national and economic security</Description><Identifier>_7e0bc5c4-4580-11e8-81c7-6748eec279ad</Identifier></Mission><Value><Name/><Description/></Value><Goal><Name>Terrorism &amp; Security</Name><Description>PREVENT TERRORISM AND ENHANCE SECURITY</Description><Identifier>_7e0bc6be-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>1</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>Preventing terrorism is the cornerstone of homeland security. Within this mission we focus on the goals of preventing terrorist attacks; preventing and protecting against the unauthorized acquisition or use of chemical, biological, radiological, and nuclear materials and capabilities; and reducing risk to the Nation’s most critical infrastructure, key leaders, and events. </OtherInformation><Objective><Name>Attacks</Name><Description>PREVENT TERRORIST ATTACKS</Description><Identifier>_7e0bc768-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>1.1</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>The Department remains vigilant to new and evolving threats in order to protect the Nation from a terrorist attack. Although the U.S. Government’s counterterrorism efforts have degraded the ability of al-Qa’ida’s senior leadership in Afghanistan and Pakistan to centrally plan and execute sophisticated external attacks, since 2009 we have seen the rise of al-Qa’ida affiliates, such as al-Qa’ida in the Arabian Peninsula and the al-Nusrah Front in Syria. These groups have made attempts to export terrorism to our Nation. Additionally, we face the threat of domestic-based “lone offenders” and those who are inspired by violent extremist ideologies to radicalize and commit acts of terrorism against Americans and the Nation. These threats come in multiple forms and, because of the nature of independent actors, may be hardest to detect. </OtherInformation></Objective><Objective><Name>Information</Name><Description>Analyze, fuse, and disseminate terrorism information by sharing information with, and utilizing threat analysis alongside, stakeholders across the homeland security enterprise. </Description><Identifier>_7e0bc81c-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.1.1</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>We remain committed to integrating critical data sources, such as those for biometric data, by consolidating or federating screening and vetting operations. We will also continually increase and integrate domain awareness capabilities, as well as improve our ability to fully utilize vast amounts of intelligence and other information -- the so-called "big data" challenge -- while rigorously protecting privacy and civil rights and civil liberties.  </OtherInformation></Objective><Objective><Name>Deterrence &amp; Disruption</Name><Description>Deter and disrupt operations by leveraging the intelligence, information sharing, technological, operational, and policy-making elements within DHS to facilitate a cohesive and coordinated operational response. </Description><Identifier>_7e0bc8c6-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.1.2</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>We will also develop intelligence sources and leverage research and analysis to identify and illustrate the tactics, behaviors, and indicators potentially associated with violent extremism as well as factors that may influence violent extremism, and jointly develop with federal, state, local, tribal, and territorial partners training for frontline law enforcement officers on behaviors that may be telling regarding violent extremist activity. </OtherInformation></Objective><Objective><Name>Transportation Security</Name><Description>Strengthen transportation security by using a multi-layered risk-based approach to detect malicious actors and dangerous items at various entry and exit points in the travel and trade system. </Description><Identifier>_7e0bc970-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.1.3</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>We will also improve coordination with foreign governments and stakeholders to expand pre-departure screening and enhance transportation security operations among willing partners to mitigate risks from overseas. </OtherInformation></Objective><Objective><Name>Violent Extremism</Name><Description>Counter violent extremism</Description><Identifier>_7e0bca24-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.1.4</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Problem Solving &amp; Integration</Name><Description>Support community-based problem solving and integration efforts, as well as local law enforcement programs</Description><Identifier>_7e0bcad8-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.1.4.1</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Information Sharing</Name><Description>Work with our partners to share information with frontline law enforcement partners, communities, families, and the private sector about how violent extremists are using the Internet and how to protect themselves and their communities. </Description><Identifier>_7e0bcb8c-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.1.4.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Law Enforcement Partners</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Communities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Families</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Private Sector</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Chemical, Radiological &amp; Nuclear Materials</Name><Description>PREVENT AND PROTECT AGAINST THE UNAUTHORIZED ACQUISITION OR USE OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR MATERIALS AND CAPABILITIES</Description><Identifier>_7e0bcc72-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Chemical, biological, radiological, and nuclear threats are enduring areas of concern. The consequences of these attacks are potentially high even though the likelihood of their occurrence is relatively low. Small scale chemical attacks are expected to remain more likely because the relative lack of specialized skills and knowledge required to conduct such attacks. However, nuclear terrorism and bioterrorism pose the most strategically significant risk because of their potential consequences. Although the difficulty of stealing a nuclear weapon or fabricating one from stolen or diverted weapons materials reduces the likelihood of this type of attack, the extremely high consequences of an improvised nuclear device attack make it an ongoing top homeland security risk. </OtherInformation></Objective><Objective><Name>Research &amp; Development</Name><Description>Anticipate chemical, biological, radiological, and nuclear emerging threats by identifying and understanding potentially dangerous actors, technologies, and materials, and prioritizing research and development activities</Description><Identifier>_7e0bcd30-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation> including: 1) analyses of alternative technology options; 2) assessments of complex issues such as the relative risk of different chemical, biological, radiological, and nuclear threats; 3) experimentation and operational test and evaluation of technologies proposed for acquisition; 4) detailed technical characterization of potential biological threat organisms; 5) the creation of consensus standards that enable cost-effective progress across many fields; and 6) the determination of nuclear material characteristics through nuclear forensics techniques. </OtherInformation></Objective><Objective><Name>Acquisition &amp; Movement</Name><Description>Identify and interdict unlawful acquisition and movement of chemical, biological, radiological, and nuclear precursors and materials by leveraging investigative and enforcement assets towards domestic and international movement of these materials and by engaging in information sharing with all stakeholders to monitor and control this technology.</Description><Identifier>_7e0bcdee-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Materials &amp; Weapons</Name><Description>Detect, locate, and prevent the hostile use of chemical, biological, radiological, and nuclear materials and weapons</Description><Identifier>_7e0bceb6-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Authorities &amp; Assets</Name><Description>Combine authorities and assets with other departments and agencies</Description><Identifier>_7e0bcf74-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Nuclear Detection</Name><Description>Build the U.S. Government's global nuclear detection capability through the Global Nuclear Detection Architecture, a framework for detecting (through technical and non-technical means), analyzing, and reporting on nuclear and other radioactive materials that are out of regulatory control</Description><Identifier>_7e0bd03c-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Nuclear Forensics</Name><Description>Advance nuclear forensics capabilities in order to close down nuclear smuggling networks, promote global nuclear security, and deter wouldbe nation state terrorist facilitators from transferring nuclear materials to terrorists</Description><Identifier>_7e0bd104-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Forensic Data</Name><Description>Provide unimpeachable forensic data for use by law enforcement authorities in the investigation and prosecution of crimes involving biological agents</Description><Identifier>_7e0bd1cc-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Law Enforcement Authorities</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Chemical Facilities</Name><Description>Regulate high-risk chemical facilities to ensure that they take proper steps to mitigate risks</Description><Identifier>_7e0bd294-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Chemical Facilities</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Biological Incidents</Name><Description>Prevent the occurrence of significant biological incidents, where possible, but, when unable to prevent, stopping them from overwhelming the capacity of our state, local, tribal, and territorial partners to manage and respond.</Description><Identifier>_7e0bd370-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.2.6</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>To this last point, DHS will deploy technologies that enable early detection of biological agents prior to the onset of symptoms, pursue more rapid responder capabilities, and increase the capacity and effectiveness of local public health, medical, and emergency services.</OtherInformation></Objective><Objective><Name>Critical Infrastructure, Leadership &amp; Events</Name><Description>REDUCE RISK TO THE NATION'S CRITICAL INFRASTRUCTURE, KEY LEADERSHIP, AND EVENTS</Description><Identifier>_7e0bd438-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>1.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>DHS has national leadership responsibility for enhancing security to the Nation's critical infrastructure and protecting key leaders, facilities, and National Special Security Events. DHS reduces risk across a wide portfolio of activities, including the agriculture and food sector, the travel and trade system, and the financial services sector. These systems are vulnerable to criminal exploitation and both physical and cyber-attacks. DHS also maintains constant guard over key leaders and during high-profile events, reducing the possibility that these events could be exploited by criminal or terrorist actors. </OtherInformation></Objective><Objective><Name>Critical Infrastructure</Name><Description>Enhance security for the Nation's critical infrastructure from terrorism and criminal activity.</Description><Identifier>_7e0bd50a-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.3.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Vulnerabilities</Name><Description>Identify critical infrastructure and related vulnerabilities.</Description><Identifier>_58141fc0-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.1.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Assessment</Name><Description>Develop and deploy a scalable assessment methodology depending on the level of threat and the nature of the target.</Description><Identifier>_58142380-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Technologies</Name><Description>Insert and/or develop appropriate technologies.</Description><Identifier>_58142524-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.1.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Protective Measures</Name><Description>Track protective measures of our partners across the homeland security enterprise.</Description><Identifier>_58142664-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.1.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Investigations</Name><Description>Conduct investigations that maximize disruption of criminal enterprises that pose the greatest risk to the United States.</Description><Identifier>_581427e0-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.1.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>IEDs</Name><Description>Counter improvised explosive devices (IEDs).</Description><Identifier>_58142966-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.1.6</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Strategy 1.3.1.6 We will also enhance the Nation's ability to counter improvise explosive devices (IEDs) by coordinating whole community efforts to prevent, protect against, respond to, and mitigate terrorist and criminal use of explosives. </OtherInformation></Objective><Objective><Name>Leaders, Facilities &amp; Events</Name><Description>Protect key leaders, facilities, and National Special Security Events.</Description><Identifier>_7e0bd5f0-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 1.3.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Intelligence, Information Sharing, Security &amp; Response</Name><Description>Work with partners across the homeland security enterprise to coordinate intelligence, information sharing, security, and response resources.</Description><Identifier>_58142a92-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Protectees</Name><Description>Protect the President, the Vice President, visiting heads of state, major Presidential candidates, and other designated protectees.</Description><Identifier>_58142c0e-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Federal Facilities, Employees &amp; Visitors</Name><Description>Protect federal facilities, employees, and visitors.</Description><Identifier>_58142d94-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Federal Facilities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Federal Employees</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Federal Visitors</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Events</Name><Description>Assess risk and coordinating support to partners during major special events across the Nation through the Special Events Assessment Rating. </Description><Identifier>_58142eca-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 1.3.2.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Borders</Name><Description>SECURE AND MANAGE OUR BORDERS</Description><Identifier>_7e0bd6c2-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>2</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>Secure, well-managed borders must not only protect the United States against threats from abroad, they must also safeguard and expedite the flow of lawful trade and travel. Achieving this end requires that we focus on three interrelated goals: 1) secure U.S. air, land, and sea borders and approaches; 2) safeguard and expedite lawful trade and travel; and 3) disrupt and dismantle transnational criminal organizations and other illicit actors. The 2014 Quadrennial Homeland Security Review defined a risk segmentation approach to managing the flows of people and goods: minimize disruption to and facilitate safe and secure inbound and outbound legal flows of people and goods; prioritize efforts to counter illicit finance and further increase transnational criminal organization perception of risk through targeted interdiction and other activities, while continuing to increase efficiencies in operations; and counter terrorist travel into the United States, terrorism against international travel and trade systems, and the export of sensitive goods and technology. Building on that work, the U.S. Southern Border and Approaches Campaign Planning Effort (2014), one of the first management imperatives from the Unity of Effort Initiative, articulates four mutually-supporting key areas of effort for securing the southern border and approaches: 1) segment and expedite flows of people and goods at ports of entry; 2) strengthen the security and resilience of the global supply chain and the international travel system; 3) combat transnational organized crime and terrorism; and 4) prevent illegal flows of people and goods between ports of entry. </OtherInformation><Objective><Name>Security</Name><Description>SECURE U.S. AIR, LAND, AND SEA BORDER AND APPROACHES</Description><Identifier>_7e0bd79e-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Flows of people and goods around the world have expanded dramatically in recent years. DHS employs a range of strategies to improve upon border security, as well as to exclude terrorist threats, drug traffickers, and other threats to national security, economic security, and public safety. DHS and our partners ensure transit via legal pathways; identify and remove people and goods attempting to travel illegally; and ensure the safety and integrity of these flows of people and goods by safeguarding the conveyances, nodes, and pathways that make up the travel and trade system. DHS relies on a combination of people, technology, assets (e.g., surface and aviation platforms), and infrastructure (e.g., roads, fences) across DHS operating components to enable situational awareness and secure the border. Given the inherently transnational nature of securing our borders, DHS also continues to build international partnerships to enhance our ability to identify threats or hazards before they emerge in the United States. </OtherInformation></Objective><Objective><Name>Import &amp; Entry</Name><Description>Prevent illegal import and entry.</Description><Identifier>_7e0bd898-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 2.1.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Prevent illegal import and entry by employing a layered, risk-based approach to screen, identify, and intercept threats at points of departure and at U.S. ports of entry. Using a variety of intelligence, automated tools, and information collected in advance of arrival for passengers and cargo at air, land, and seaports, DHS screens, identifies, and intercepts threats at points of departure before they reach our borders. In the approaches to the United States, DHS maintains domain awareness efforts to establish and maintain a common operating picture of people, vehicles, aircraft, and marine vessels approaching our borders, as well as interdiction capabilities to achieve a law enforcement resolution. </OtherInformation></Objective><Objective><Name>Export &amp; Exit</Name><Description>Prevent illegal export and exit.</Description><Identifier>_7e0bd974-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 2.1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Prevent illegal export and exit through a risk-based strategy to inspect people, cargo, and conveyances departing the United States through all airports, seaports, land border crossings, and international mail/courier facilities. Using this information, law enforcement organizations such as Immigration and Customs Enforcement will investigate illegal exports and exit. </OtherInformation></Objective><Objective><Name>Trade &amp; Travel</Name><Description>SAFEGUARD AND EXPEDITE LAWFUL TRADE AND TRAVEL</Description><Identifier>_7e0bda64-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The vast majority of people and goods entering and exiting the United States represent lawful trade and travel. Lawful trade and travel provides enormous economic benefits to our society, evident by a substantial increase in the number of tourist and business travelers and in the value of U.S. exports and imports between 2005 and 2012, and underscored by projections for continued growth at an average of six percent annually through 2030. DHS and our partners work to secure and expedite these flows of people and goods, as they are a main driver of U.S. economic prosperity. </OtherInformation></Objective><Objective><Name>Nodes, Conveyances &amp; Pathways</Name><Description>Safeguard key nodes, conveyances, and pathways.</Description><Identifier>_7e0bdb68-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 2.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Safeguard key nodes, conveyances, and pathways by establishing and enforcing security standards and plans that maintain or restore infrastructure capabilities to be resilient from attacks and natural disasters; this includes facilities at ports of entry, modes of transportation, and pathways. </OtherInformation></Objective><Objective><Name>Transit</Name><Description>Manage the risk of people and goods in transit.</Description><Identifier>_7e0bdc58-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 2.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Manage the risk of people and goods in transit by employing a risk-segmentation approach that identifies low-risk and high-risk people and goods moving within legal channels as far from the homeland as possible, and then expediting low-risk, lawful movement to and through the United States. </OtherInformation></Objective><Objective><Name>Trade, Economic Security &amp; Competitiveness</Name><Description>Maximize compliance with U.S. trade laws and promote U.S. economic security and competitiveness.</Description><Identifier>_7e0bdd48-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 2.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Standards</Name><Description>Work with international partners, such as the International Maritime Organization, the International Civil Aviation Organization, and INTERPOL, to create global standards for security and resilience of the global trade and travel system.</Description><Identifier>_58143046-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 2.2.3.1</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>International Maritime Organization</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>International Civil Aviation Organization</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>INTERPOL</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Cargo</Name><Description>Conduct cargo recognition programs to reduce redundancies for industry while maintaining a commensurate level of security. </Description><Identifier>_581431d6-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 2.2.3.2</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Criminal Organizations &amp; Illicit Actors</Name><Description>DISRUPT AND DISMANTLE TRANSNATIONAL CRIMINAL ORGANIZATIONS AND OTHER ILLICIT ACTORS</Description><Identifier>_7e0bde56-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Transnational criminal organizations are increasing in strength and capability. They rely on revenues generated through the sale of illegal drugs and counterfeit goods, human trafficking and smuggling, and other criminal activities. They are also gaining strength by taking advantage of the same innovations in management and supply chain structures that are propelling multinational corporations. </OtherInformation></Objective><Objective><Name>TCOs</Name><Description>Identify, investigate, disrupt, and dismantle TCOs.</Description><Identifier>_7e0bdf50-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 2.3.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Illicit Financing</Name><Description>Target illicit financing activities that transnational criminal organizations depend on, such as money laundering, and increasing outbound inspection to deter practices such as cash smuggling</Description><Identifier>_5814333e-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 2.3.1.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Deterrence</Name><Description>Create a deterrent effect from injecting the greatest amount of uncertainty and concern into criminal decision making by swiftly shifting assets, presence, technology, and tools, further targeting and focusing interdiction activities, and emphasizing strategic communications that project the effectiveness of homeland security capabilities. </Description><Identifier>_581434e2-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 2.3.1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Illicit Actors</Name><Description>Disrupt illicit actors, activities, and pathways.</Description><Identifier>_7e0be04a-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 2.3.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Disrupt illicit actors, activities, and pathways by using intelligence to target and interdict illicit people and goods through a rapid response workforce as well as surveillance and enforcement assets to detect, identify, monitor, track, and interdict targets of interest, and board vessels. </OtherInformation></Objective></Goal><Goal><Name>Immigration Laws</Name><Description>ENFORCE AND ADMINISTER OUR IMMIGRATION LAWS</Description><Identifier>_7e0be162-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>3</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>Immigration is essential to our identity as a nation of immigrants. Most American families have an immigration story, some recent, some more distant. Many immigrants have taken on great risks to work and contribute to America’s prosperity or were provided refuge after facing persecution abroad. Americans are extremely proud of this tradition. Smart and effective enforcement and administration of our immigration laws remains a core homeland security mission. The following priorities from the 2014 Quadrennial Homeland Security Review inform the strategic approach in this mission area: 1) Building a stronger, smarter border enforcement system; 2) Achieving smart and effective interior enforcement; 3) Creating a 21stCentury legal immigration system; 4) Facilitating reunions for long-separated families; 5) Creating an earned path to citizenship; and 6) Enhancing management and organization to develop a responsive immigration system. </OtherInformation><Objective><Name>Immigration System</Name><Description>STRENGTHEN AND EFFECTIVELY ADMINISTER THE IMMIGRATION SYSTEM</Description><Identifier>_7e0be266-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>3.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>At the center of any good immigration system must be a structure able to rapidly respond to regulatory changes and the flow of demand around the world while at the same time safeguarding security. We are constantly seeking ways to better administer benefits and use technology to make information more accessible and secure. </OtherInformation></Objective><Objective><Name>Lawful Immigration</Name><Description>Promote lawful immigration.</Description><Identifier>_7e0be36a-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 3.1.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Promote lawful immigration by uniting families, providing refuge, fostering economic opportunity, and promoting citizenship. We will also work to better assist high-skilled immigrants, streamline the processing of immigrant visas to encourage businesses to grow in the United States, and develop innovative programs to enable immigrants to reach their potential in the United States. </OtherInformation></Objective><Objective><Name>Immigration Services</Name><Description>Effectively administer the immigration services system.</Description><Identifier>_7e0be4be-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 3.1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Benefit &amp; Information Services</Name><Description>Provide effective customer-oriented immigration benefit and information services at home and abroad.</Description><Identifier>_58143686-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.1.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Immigration Decisions</Name><Description>Make all information needed to make immigration decisions available to appropriate agencies electronically and in real-time, including active individual case files and biometric information.</Description><Identifier>_5814385c-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.1.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Immigration Benefits</Name><Description>Ensure that only eligible applicants receive immigration benefits through expanded use of biometrics, a strengthening of screening processes, improvements to fraud detection, increases in legal staffing to ensure due process, and enhancements of interagency information sharing. </Description><Identifier>_58143a28-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.1.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Integration</Name><Description>Promote the integration of lawful immigrants in American society.</Description><Identifier>_7e0be5c2-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 3.1.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Promote the integration of lawful immigrants in American society by enhancing educational resources and promoting opportunities to increase understanding of U.S. civic principles and the rights, responsibilities, and importance of citizenship, and supporting comprehensive immigration reform that provides an earned pathway to citizenship. </OtherInformation></Objective><Objective><Name>Unlawful Immigration</Name><Description>PREVENT UNLAWFUL IMMIGRATION</Description><Identifier>_7e0be6d0-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>3.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The increased movement of people and goods across our borders provides many opportunities but also provides more places for illegal goods, unauthorized migrants, and threats to hide. Unauthorized migration is influenced by many factors, including weak rule of law and violence in sending countries. In addition, violent extremists and criminals can hide within this larger flow of migrants who intend no harm. </OtherInformation></Objective><Objective><Name>Unlawful Immigration</Name><Description>Prevent unlawful entry, strengthen enforcement, and reduce drivers of unlawful immigration.</Description><Identifier>_7e0be806-4580-11e8-81c7-6748eec279ad</Identifier><SequenceIndicator>Strategy 3.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Situational Awareness</Name><Description>Increase situational awareness of our borders.</Description><Identifier>_58143bb8-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.2.1.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Travel Documents</Name><Description>Ensure that only those abroad who are eligible receive travel documents to the United States.</Description><Identifier>_58143d2a-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.2.1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Criminal Aliens</Name><Description>Identify and removing criminal aliens, individuals who pose a threat to public safety, health, or national security, repeat immigration law violators, and other individuals prioritized for removal.</Description><Identifier>_58143ec4-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.2.1.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Demand</Name><Description>Reduce the demand for illegal immigrants.</Description><Identifier>_58144040-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.2.1.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Employers</Name><Description/></Stakeholder><OtherInformation>We also reduce the demand for illegal immigrants by conducting inspections, audits, and investigations of employers who hire illegal immigrants and administering tools such as E-Verify to facilitate employers' ability to hire eligible workers in compliance with immigration laws. </OtherInformation></Objective><Objective><Name>Arrests, Detentions &amp; Removal</Name><Description>Arrest, detain, and remove criminals, fugitives, and other dangerous foreign nationals.</Description><Identifier>_581441bc-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 3.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Arrest, detain, and remove criminals, fugitives, and other dangerous foreign nationals by leveraging federal information sharing and state, local, and federal criminal justice systems to take enforcement action based on priorities with regard to criminal aliens, and working with the Department of Justice to ensure more timely hearing of immigration cases and appeals.</OtherInformation></Objective></Goal><Goal><Name>Cyberspace</Name><Description>SAFEGUARD AND SECURE CYBERSPACE</Description><Identifier>_58144360-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>4</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>Each and every day, the United States faces a myriad of threats in cyberspace, from the theft of trade secrets, payment card data, and other sensitive information through cyber intrusions to denial-of-service attacks against Internet websites and attempted intrusions of U.S. critical infrastructure. DHS works closely with government and private sector partners to strengthen cybersecurity capabilities, investigate cybercrime, and share actionable information to ensure a secure and resilient cyberspace that protects privacy and civil rights and civil liberties by design, supports innovation and economic growth, and supports
public health and safety.
The 2014 Quadrennial Homeland Security Review outlines four strategic priorities to safeguard and secure cyberspace: 1) Strengthen the security and resilience of critical Infrastructure against cyber attacks and other hazards; 2) Secure the federal civilian government information technology enterprise; 3) Advance cyber law enforcement, incident response, and reporting capabilities; and 4) Strengthen the cyber ecosystem.</OtherInformation><Objective><Name>Critical Infrastructure</Name><Description>STRENGTHEN THE SECURITY AND RESILIENCE OF CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS AND OTHER HAZARDS</Description><Identifier>_581444dc-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>4.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The concept of critical infrastructure as discrete, physical assets has become outdated as everything becomes linked to cyberspace. This "cyber-physical convergence" has changed the risks to critical infrastructure in sectors ranging from energy and transportation to agriculture and healthcare. DHS coordinates with its private sector partners as well as with state, local, tribal, and territorial governments to share information and intelligence regarding cyber threats and vulnerabilities, foster development of trustworthy products and services,
and encourage the adoption of best-in-class cybersecurity practices. </OtherInformation></Objective><Objective><Name>Information &amp; Intelligence</Name><Description>Enhance the exchange of information and intelligence on risks to critical infrastructure and develop real-time situational awareness capabilities.</Description><Identifier>_58144a04-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.1.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Enhance the exchange of information and intelligence on risks to critical infrastructure and develop real-time situational awareness capabilities that ensure machine and human interpretation and visualization by increasing the volume, timeliness and quality of cyber threat reporting shared with the private sector and state, local, tribal, and territorial partners, and enabling the National Cybersecurity and Communications Integration Center (to receive information at "machine speed" by enabling networks to be more self-healing, using
mathematics and analytics to mimic restorative processes that occur biologically.</OtherInformation></Objective><Objective><Name>Services &amp; Functions</Name><Description>Ensure the delivery of essential services and functions.</Description><Identifier>_58144c3e-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Partner with critical infrastructure owners and operators to ensure the delivery of essential services and functions by building effective partnerships to set a national focus and determine collective actions, providing assistance to local and regional partners, and leveraging incentives to advance security and resilience, as described in the National Infrastructure Protection Plan: Partnering for Security and Resilience. </OtherInformation></Objective><Objective><Name>Interdependencies &amp; Cascading Impacts</Name><Description>Identify and understand interdependencies and cascading impacts among critical systems.</Description><Identifier>_58144e32-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.1.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Identify and understand interdependencies and cascading impacts among critical systems by leveraging regional risk assessment programs, organization-specific assessment, asset and network-specific assessment, and cross-sector risk assessments.</OtherInformation></Objective><Objective><Name>Policies &amp; Best Practices</Name><Description>Identify and develop effective cybersecurity policies and best practices.</Description><Identifier>_5814501c-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.1.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Collaborate with agencies and the private sector to identify and develop effective cybersecurity policies and best practices through voluntary collaboration with private sector owners and operators (including their partner associations, vendors, and others) and government entity counterparts.</OtherInformation></Objective><Objective><Name>Vulnerabilities &amp; Resilience</Name><Description>Reduce vulnerabilities and promote resilient critical infrastructure design.</Description><Identifier>_58145292-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.1.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Reduce vulnerabilities and promote resilient critical infrastructure design by identifying and promoting opportunities that build security and resilience into critical infrastructure as it is being developed and updated, rather than focusing solely on mitigating vulnerabilities present within existing critical infrastructure. </OtherInformation></Objective><Objective><Name>Government IT</Name><Description>SECURE THE FEDERAL CIVILIAN GOVERNMENT INFORMATION TECHNOLOGY ENTERPRISE</Description><Identifier>_581454a4-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>4.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The Federal Government provides essential services and information on which many Americans rely. Not only must the government protect its own networks, it must serve as a role model to others in implementing security services. DHS itself plays a leading role in securing federal civilian networks, allowing the Federal Government to do its business securely.
DHS partners with agencies to deploy products such as the EINSTEIN set of capabilities that provide perimeter network-based intrusion detection and prevention. </OtherInformation></Objective><Objective><Name>Cyber Technology</Name><Description>Coordinate government purchasing of cyber technology.</Description><Identifier>_5814565c-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Coordinate government purchasing of cyber technology to enhance cost-effectiveness by using strategically sourced tools and services such as the Continuous Diagnostics and Mitigation program.</OtherInformation></Objective><Objective><Name>Networks, Tools &amp; Information</Name><Description>Equip civilian government networks with innovative cybersecurity tools, information, and protections.</Description><Identifier>_58145864-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Equip civilian government networks with innovative cybersecurity tools, information, and protections by supporting research and development and making the innovations from research and development available not only to the Federal Government but widely available across the public and private spheres. </OtherInformation></Objective><Objective><Name>Policy &amp; Standards</Name><Description>Ensure government-wide policy and standards are consistently and effectively implemented and measured.</Description><Identifier>_58145a62-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Ensure government-wide policy and standards are consistently and effectively implemented and measured by promoting the adoption of enterprise-wide policy and best practices and working with interagency partners to develop government-wide requirements that can bring the full strength of the market to bear on existing and emergent vulnerabilities.</OtherInformation></Objective><Objective><Name>Law Enforcement, Incident Response &amp; Reporting</Name><Description>ADVANCE CYBER LAW ENFORCEMENT, INCIDENT RESPONSE, AND REPORTING CAPABILITIES</Description><Identifier>_58145c1a-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>4.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Online criminal activity threatens the Internet's safe and secure use. Law enforcement performs an essential role in achieving our Nation's cybersecurity objectives by detecting, investigating, and preventing a wide range of cybercrimes, from theft and fraud to child exploitation, and apprehending and prosecuting those responsible. In addition to criminal prosecution, there is a need to rapidly detect and respond to incidents, including through the development of quarantine and mitigation strategies, as well as to quickly share incident information so that others may protect themselves. Safeguarding and securing cyberspace requires close coordination among federal law enforcement entities, network security experts, state, local, tribal, and territorial officials, and private sector stakeholders.</OtherInformation></Objective><Objective><Name>Incidents</Name><Description>Respond to and assist in the recovery from cyber incidents.</Description><Identifier>_58145f9e-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.3.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Respond to and assist in the recovery from cyber incidents by managing incident response activities through the National Cybersecurity and Communications Integration Center and fostering enhanced collaboration between law enforcement and network security officials to pre-plan responses to cyber incidents. </OtherInformation></Objective><Objective><Name>Cybercrime</Name><Description>Deter, disrupt, and investigate cybercrime.</Description><Identifier>_581461b0-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.3.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Investigations</Name><Description>Increase the quantity and impact of cybercrime investigations.</Description><Identifier>_58146372-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.3.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Investigations, Experts &amp; Methods</Name><Description>Partner with other agencies to conduct high-profile criminal investigations, prioritize the recruitment and training of technical experts, and develop standardized methods.</Description><Identifier>_58146606-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.3.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Illicit Usage</Name><Description>Strengthen law enforcement agencies' ability to detect, investigate, and arrest those that make illicit use of cyberspace.</Description><Identifier>_58146890-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.3.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Cyber Ecosystem</Name><Description>STRENGTHEN THE CYBER ECOSYSTEM</Description><Identifier>_58146a52-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>4.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Our entire society, from government and law enforcement to the private sector and members of the public, must work collaboratively to improve our network defense. Ensuring a healthy cyber ecosystem will require collaborative communities, innovative and agile security solutions, standardized and consistent processes to share information and best practices, sound policies and plans, meaningful protection of privacy, civil rights, and civil liberties,
and development of a skilled workforce to ensure those policies and plans are implemented as intended. </OtherInformation></Objective><Objective><Name>Products, Services &amp; Solutions</Name><Description>Drive innovative and cost effective security products, services, and solutions.</Description><Identifier>_58146ce6-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.4.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Drive innovative and cost effective security products, services, and solutions throughout the cyber ecosystem by working with domestic and international partners across the public and private spheres, and across the science and policy communities to identify promising technology, policy and standards that enable robust, trust-based, automated sharing of cybersecurity information and collective action to limit the spread of incidents and minimize
consequences. </OtherInformation></Objective><Objective><Name>R&amp;D</Name><Description>Conduct and transition research and development, enabling trustworthy cyber infrastructure.</Description><Identifier>_58146f66-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.4.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Conduct and transition research and development, enabling trustworthy cyber infrastructure by supporting initiatives to develop promising new security technologies and techniques including: 1) security automation techniques to facilitate real-time incident response; 2) interoperability to support security cooperation across sectors; and 3) privacy enhancing authentication to enable better system protection. </OtherInformation></Objective><Objective><Name>Cybersecurity Professionals</Name><Description>Develop skilled cybersecurity professionals.</Description><Identifier>_58147132-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.4.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cybersecurity Professionals</Name><Description/></Stakeholder><OtherInformation>Develop skilled cybersecurity professionals by promoting cybersecurity knowledge and innovation, developing Department-wide human capital strategies, policies, and programs intended to enhance the DHS cyber workforce, and working with public and private sector partners to increase the pipeline of highly qualified homeland security professionals through academic and federal training programs. </OtherInformation></Objective><Objective><Name>Awareness &amp; Best Practices</Name><Description>Enhance public awareness and promote cybersecurity best practices.</Description><Identifier>_58147362-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.4.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Enhance public awareness and promote cybersecurity best practices by promoting National Cybersecurity Awareness Month and the Stop. Think. Connect.™ Campaign, which raise awareness through collaborative outreach efforts and distributing materials, resources, and tips to promote cybersecurity. </OtherInformation></Objective><Objective><Name>International Engagement</Name><Description>Advance international engagement to promote capacity building, international standards, and cooperation.</Description><Identifier>_5814756a-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 4.4.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Advance international engagement to promote capacity building, international standards, and cooperation by working to establish and deepen relationships with foreign computer incident response teams both bilaterally and through participation in operationally-focused multilateral fora, such as the Forum for Incident Response and Security Teams. </OtherInformation></Objective></Goal><Goal><Name>Preparedness &amp; Resilience</Name><Description>STRENGTHEN NATIONAL PREPAREDNESS AND RESILIENCE</Description><Identifier>_58147740-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>5</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation>Despite ongoing vigilance and efforts to protect the United States and its citizens, major accidents, disruptions, and natural disasters, as well as deliberate attacks, will occur. The challenge is to build the capacity of American society to be resilient in the face of disruptions, disasters, and other crises. Our goals in this mission require us to: 1) enhance national preparedness; 2) mitigate hazards and vulnerabilities; 3) ensure effective emergency response; and 4) enable rapid recovery.
The 2014 Quadrennial Homeland Security Review reaffirms the Whole Community approach to national preparedness and resilience, which calls for the investment of everyone -- not just the government -- in preparedness efforts. Whole Community is a means by which emergency managers, organizational and community leaders, government officials, private and nonprofit sectors, faith-based and disability organizations, and the general public can collectively understand and assess the needs of their respective communities as well as determine the best ways to organize and strengthen their assets, capacities, and interests. </OtherInformation><Objective><Name>Preparedness</Name><Description>ENHANCE NATIONAL PREPAREDNESS</Description><Identifier>_58147970-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>5.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>National preparedness underpins all efforts to safeguard and secure the Nation against those threats and hazards that pose the greatest risk. Presidential Policy Directive 8 calls for a National Preparedness Goal, which is "[a] secure and resilient Nation with the capabilities required across the Whole Community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk."</OtherInformation></Objective><Objective><Name>Empowerment</Name><Description>Empower individuals and communities to strengthen and sustain their own preparedness</Description><Identifier>_58147b96-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.1.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Individuals</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Communities</Name><Description/></Stakeholder><OtherInformation>Empower individuals and communities to strengthen and sustain their own preparedness by engaging public and community organizations through programs such as America's Preparathon! to build a collective understanding of their risks, the resources available to assist their preparations, and their roles and responsibilities in the event of a disaster. </OtherInformation></Objective><Objective><Name>Capabilities</Name><Description>Build and sustain core capabilities nationally to prevent, protect against, mitigate, respond to, and recover from all hazards.</Description><Identifier>_58147d76-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.1.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Tools &amp; Technical Assistance</Name><Description>Foster capability development by providing tools and technical assistance</Description><Identifier>_58147fb0-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.1.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Planning &amp; Reachback</Name><Description>Provide planning and reachback expertise.</Description><Identifier>_581481d6-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.1.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Grants</Name><Description>Use grant programs such as the State Homeland Security Grant Program and the Urban Area Security Initiative (which collectively provide funds to state, local, tribal, territorial, and regional government and port, transit, and nonprofit entities)</Description><Identifier>_581483c0-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.1.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>State Homeland Security Grant Program</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Urban Area Security Initiative</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>State Government Entities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Local Government Entities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Tribal Government Entities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Territorial Government Entities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Regional Government Entities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Port Entities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Transit Entities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Nonprofit Entities</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Planning Frameworks</Name><Description>Promote the use of the National Planning Frameworks.</Description><Identifier>_58148654-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.1.2.4 </SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>These activities support the Department's intent to build and sustain a national integrated network of capabilities across all levels of government and to promote the involvement of the Whole Community in the Assist federal entities in the establishment of effective continuity programs that are regularly updated, exercised, and improved by administering the National Exercise Program, the cornerstone of a collective effort to test, improve, and assess national preparedness. </OtherInformation></Objective><Objective><Name>Hazards &amp; Vulnerabilities</Name><Description>MITIGATE HAZARDS AND VULNERABILITIES</Description><Identifier>_58148884-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>5.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>DHS is uniquely positioned not only to support communities during a disaster, but also to enable partners to take steps that will decrease risk and mitigate future hazards before a disaster strikes. While risk cannot be totally eliminated, DHS can influence and support more positive outcomes in reducing risks. National risk management emphasizes focusing on those actions and interventions that reduce the greatest amount of strategic risk to the
Nation. </OtherInformation></Objective><Objective><Name>Community Specific Risks</Name><Description>Promote public and private sector awareness and understanding of community-specific risks.</Description><Identifier>_58148a78-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Communities</Name><Description/></Stakeholder><OtherInformation>Promote public and private sector awareness and understanding of community-specific risks by providing credible and actionable data and tools to support risk-informed decision making and incentivizing and facilitating investments to manage current and future risk. 
</OtherInformation></Objective><Objective><Name>Vulnerability</Name><Description>Reduce vulnerability through standards, regulation, resilient design, effective mitigation, and disaster risk reduction measures.</Description><Identifier>_58148cee-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Reduce vulnerability through standards, regulation, resilient design, effective mitigation, and disaster risk reduction measures by encouraging appropriate land use and adoption of building codes, while also applying engineering and planning practices in conjunction with advanced technology tools. </OtherInformation></Objective><Objective><Name>Maritime Incidents</Name><Description>Prevent maritime incidents by establishing, and ensuring compliance with standards and regulations.</Description><Identifier>_58148f46-45d4-11e8-a5c0-ae9cf2c279ad</Identifier><SequenceIndicator>Strategy 5.2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Prevent maritime incidents by establishing, and ensuring compliance with standards and regulations by licensing U.S. mariners, conducting and sharing findings of casualty investigations, and providing grants and support for government and nongovernment boating
safety efforts. </OtherInformation></Objective></Goal></StrategicPlanCore><AdministrativeInformation><StartDate>2013-10-01</StartDate><EndDate>2018-09-30</EndDate><PublicationDate>2018-04-21</PublicationDate><Source>https://www.dhs.gov/sites/default/files/publications/FY14-18 Strategic Plan_0_0.PDF</Source><Submitter><GivenName>Owen</GivenName><Surname>Ambur</Surname><PhoneNumber/><EmailAddress>Owen.Ambur@verizon.net</EmailAddress></Submitter></AdministrativeInformation></StrategicPlan>