<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DHS - The Black Vault</title>
	<atom:link href="https://www.theblackvault.com/documentarchive/tag/dhs/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theblackvault.com/documentarchive</link>
	<description>Discover the Truth</description>
	<lastBuildDate>Sat, 13 Oct 2018 02:38:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.theblackvault.com/documentarchive/wp-content/uploads/2020/06/cropped-siteicon-2-150x150.jpg</url>
	<title>DHS - The Black Vault</title>
	<link>https://www.theblackvault.com/documentarchive</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">87123917</site>	<item>
		<title>Department of Homeland Security (DHS) House Style Guidelines, October 2003</title>
		<link>https://www.theblackvault.com/documentarchive/department-of-homeland-security-dhs-house-style-guidelines-october-2003/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=department-of-homeland-security-dhs-house-style-guidelines-october-2003</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sat, 13 Oct 2018 02:38:59 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[style guide]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=6668</guid>

					<description><![CDATA[<p>Background From the document: &#8220;The design elements, or visual language, that make up our house style attempt to convey — through imagery, color and appearance — the qualities that we want the Department of Homeland Security to be known for: being innovative and proactive in our mission and being accessible and direct with our public. We [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/department-of-homeland-security-dhs-house-style-guidelines-october-2003/">Department of Homeland Security (DHS) House Style Guidelines, October 2003</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>From the document:</p>
<p style="padding-left: 30px;"><em><strong>&#8220;The design elements, or visual language, that make up our house style attempt to convey — through imagery, color and appearance — the qualities that we want the Department of </strong></em><em><strong>Homeland Security to be known for: being innovative and proactive in our mission and being accessible and direct with our public. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>We are entrusted with the relentless protection and defense of America, its ideals, its way of life and its people. We are the trusted and authoritative partner to the state, local and private </strong></em><em><strong>sector entities that share our mission. We are a 21st-century form of government and proud to protect our homeland. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>And our communications must reflect our convictions. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>The following pages introduce the foundations of our house style. The hallmarks of this visual language are the distinctive color palettes, the complementary typefaces, standardized </strong></em><em><strong>uses of imagery and consistent placement of our signature. Our house style will ensure maximum recognition and a clean, contemporary look for all our communications.</strong></em></p>
<p style="padding-left: 30px;"><em><strong>These house style guidelines should be used in conjunction with the Seal and Signature Usage Guidelines, which provide more detailed information on usage of the DHS signature and its variations.&#8221;</strong></em></p>
<h3>Document Archive</h3>
<h4><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/dhs/2018-HQFO-01162.pdf">Department of Homeland Security (DHS) House Style Guidelines, October 2003</a> [39 Pages, 22.2MB]</h4>
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/department-of-homeland-security-dhs-house-style-guidelines-october-2003/">Department of Homeland Security (DHS) House Style Guidelines, October 2003</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6668</post-id>	</item>
		<item>
		<title>TOPOFF Operations, US Department of Homeland Security</title>
		<link>https://www.theblackvault.com/documentarchive/topoff-operations-us-department-homeland-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=topoff-operations-us-department-homeland-security</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sun, 20 Aug 2017 22:42:33 +0000</pubDate>
				<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[TOPOFF]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=4897</guid>

					<description><![CDATA[<p>Background The Top Officials Exercise (TOPOFF) is a congressionally mandated biennial cycle of seminars, planning events, and national exercises designed to strengthen the Unites States’ capacity to prevent, prepare for, respond to, and recover from large scale terrorist attacks. Every two years, the cycle culminates in an exercise that simulates a coordinated terrorist attack involving [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/topoff-operations-us-department-homeland-security/">TOPOFF Operations, US Department of Homeland Security</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>The Top Officials Exercise (TOPOFF) is a congressionally mandated biennial cycle of seminars, planning events, and national exercises designed to strengthen the Unites States’ capacity to prevent, prepare for, respond to, and recover from large scale terrorist attacks. Every two years, the cycle culminates in an exercise that simulates a coordinated terrorist attack involving biological, chemical, radiological, or weapons of mass destruction (WMD). The exercises seek to draw the participation of top officials and key personnel from all levels of government who have domestic response and consequence management roles and responsibilities in actual terrorist events. The Department of Homeland Security’s (DHS) Office of State and Local Government Coordination and Preparedness (SLGCP) sponsors the TOPOFF series plus manages the design, planning, conduct, and evaluation of the exercises.</p>
<h4>TOPOFF 2</h4>
<p>Top Officials 2 (TOPOFF 2) was a Congressionally-mandated, national terrorism exercise that was designed to identify vulnerabilities in the nation’s domestic incident management capability by exercising the plans, policies, procedures, systems, and facilities of federal, state, and local response organizations against a series of integrated terrorist threats and acts in separate regions of the country.</p>
<p>TOPOFF 2 was the largest and most comprehensive terrorism response exercise ever conducted in the United States.  The exercise scenario, which was played out from May 12 to May 16, 2003, depicted a fictitious, foreign terrorist organization that detonated a simulated radiological dispersal device (RDD) in Seattle, Washington, and released the Pneumonic Plague (<em>Yersinia</em> <em>pestis</em>) in several Chicago metropolitan area locations.  There was also significant pre-exercise intelligence play, a cyber-attack, and credible terrorism threats against other locations.  The exercise brought together top government officials from 25 federal, state, and local agencies and departments, and the Canadian Government to test the domestic incident management in response to WMD terrorist attacks in the United States.</p>
<h5>Document Archive</h5>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/fema/2017-FEFO-01072 Responsive Records - TOPOFF2 AAR.pdf">Top Officials (TOPOFF) Exercise Series, TOPOFF 2 (T2) After Action Report, September 30, 2003</a> [437 Pages, 92.4MB]</p>
<h4>TOPOFF 3</h4>
<p>The TOPOFF 3 full scale exercise, conducted from April 4–8, 2005, was the third in the series, and by any measure the most ambitious civilian terrorism response exercise ever conducted. The design incorporated many more elements, roles, and participants than in previous exercises and the extent of play involved new challenges. For example, the recently released National Response Plan (NRP) and National Incident Management System (NIMS) were used as both the framework and approach for response and incident management. For the first time, pre-exercise intelligence play was also added. In addition, the exercise sought to synchronize national goals and objectives, improve international coordination and cooperation during a linked terrorist incident response, and assess as well as strengthen government, nongovernment, and private sector partnerships in response to WMD incidents.</p>
<p>TOPOFF 3  involved a biological attack in New Jersey and a chemical attack in Connecticut. Over 20,000 participants were involved representing more than 250 federal, state, and local agencies, private businesses, volunteer groups, and international organizations. Canada and the United Kingdom joined the simulation as international partners that conducted simultaneous, related exercises in concert with U.S. efforts. DOS took the lead in organizing the international component by managing the interface among the United States, Canada, and the United Kingdom. The benefit of international participation in the TOPOFF exercises cannot be overstated. The United Kingdom’s efficient response and management of the London subway bombing of July 2005 were due in part to the lessons learned from their participation in TOPOFF 3.</p>
<h5>Document Archive</h5>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/fema/2017-FEFO-01072 Responsive Records - TOPOFF 3 AAR.pdf">Top Officials 3 (TOPOFF 3) Full Scale Exercise After-Action Report, April 4-10, 2005</a> [398 Pages, 84.2MB]</p>
<h4>TOPOFF 4</h4>
<p>TOPOFF 4 involved over 23,000 participants from Federal, international, State, territorial, regional, tribal, local, volunteer, and private sector organizations. TOPOFF 4 was conducted from October 15-24, 2007, and simulated Radiological Dispersal Device (RDD), or “dirty bomb” attacks in the Territory of Guam, Portland, Oregon, and Phoenix, Arizona. The scenario simulated casualties and widespread contamination, and although real weapons were not used, the response was mounted as if they had been. Three international partners participated in TOPOFF 4: Australia, Canada and the United Kingdom. As in previous TOPOFF exercises, S/CT managed the international aspects of the exercise, which focused on crisis management, information sharing, consular operations, and public messaging. International activities focused on border issues, commercial aviation to and from the United States, and U.S. acceptance of international offers of assistance. Teams from Australia, Canada and the United Kingdom deployed to exercise locations to assist their citizens, and to interact with local and Federal authorities. In Washington DC, DOS activated an Exercise Task Force and participated in high level meetings with other Department and Agency decision-makers. In addition, DOS deployed a representative to the Joint Field Office in Portland to coordinate with the international teams and domestic interagency responders. American Embassies in Canberra, Ottawa and London convened Emergency Action Committees and worked closely with host governments and the DOS Task Force.</p>
<h5>Document Archive</h5>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/fema/2017-FEFO-01072 Responsive Records - Evaluator Handbook.pdf">TOPOFF 4 Evaluation Handbook</a> [30 Pages, 3.8MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/fema/2017-FEFO-01072 Responsive Records - TOPOFF 4 AAR.pdf">T4 Command Post Exercise After-Action Report, June 19-22, 2006</a> [180 Pages, 40.3MB]</p><p>The post <a href="https://www.theblackvault.com/documentarchive/topoff-operations-us-department-homeland-security/">TOPOFF Operations, US Department of Homeland Security</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4897</post-id>	</item>
		<item>
		<title>Review of Domestic Sharing of Counterterrorism Information, March 2017</title>
		<link>https://www.theblackvault.com/documentarchive/review-domestic-sharing-counterterrorism-information-march-2017/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=review-domestic-sharing-counterterrorism-information-march-2017</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 22:49:46 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[Government Accountability & I.G. Reports]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Department of Justice]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[DOJ]]></category>
		<category><![CDATA[IG]]></category>
		<category><![CDATA[inspector general]]></category>
		<category><![CDATA[intelligence]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=4345</guid>

					<description><![CDATA[<p>Executive Summary Fifteen years after the September 11, 2001, terrorist attacks on the United States, the terrorist threat remains in the United States and abroad, as evidenced by recent attacks in Paris, France; San Bernardino, California; Brussels, Belgium; Orlando, Florida; and Nice, France. The U.S.’s national security depends on the ability to share the right information [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/review-domestic-sharing-counterterrorism-information-march-2017/">Review of Domestic Sharing of Counterterrorism Information, March 2017</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Executive Summary</h3>
<p>Fifteen years after the September 11, 2001, terrorist attacks on the United States, the terrorist threat remains in the United States and abroad, as evidenced by recent attacks in Paris, France; San Bernardino, California; Brussels, Belgium; Orlando, Florida; and Nice, France. The U.S.’s national security depends on the ability to share the right information with the right people at the right time. This requires sustained and responsible collaboration among federal, state, local, and tribal entities, as well as the private sector and international partners.</p>
<p>In response to a request from the Senate Select Committee on Intelligence, the Senate Homeland Security and Governmental Affairs Committee, and the Senate Judiciary Committee, the Offices of Inspector General (OIG) of the Intelligence Community (IC), Department of Homeland Security (DHS), and the Department of Justice (DOJ) conducted a review of the domestic sharing of counterterrorism information. The OIGs concluded that the partners in the terrorism-related<br />
Information Sharing Environment components of the Office of the Director of National Intelligence (ODNI), DHS, DOJ, and their state and local partners are committed to sharing counterterrorism information. The partners’ commitment to protecting the nation is illustrated by the actions taken before, during, and following terrorism-related incidents, as well as by programs and initiatives designed to improve sharing of counterterrorism information.</p>
<p>However, the OIGs also identified several areas in which improvements could enhance information sharing.</p>
<p>To share information effectively, the federal, state, and local entities actively involved in counterterrorism efforts must understand each other’s roles,  responsibilities, and contributions, especially with the involvement of multiple agencies, such as the DOJ’s Federal Bureau of Investigation (FBI) and DHS’ U.S. Immigration and Customs Enforcement (ICE), in complex investigations. Updating or establishing new information sharing agreements among such entities should enhance coordination and collaboration, and reaffirm and formalize the roles and responsibilities of partners in the current information sharing environment. Similarly, although there is a national information sharing strategy, its implementation has been viewed to be uneven. The OIGs believe that the ODNI, DHS, and DOJ should review the interagency information sharing memorandum of understanding (MOU) and take necessary actions to update intelligence information sharing standards and processes among the departments, which we believe would result in better implementation of the strategy.</p>
<p>The OIGs also identified improvements in various practices and processes of the partners involved in counterterrorism. At DHS, a lack of unity in its Intelligence Enterprise, issues in the field related to staffing and access to classified systems and facilities, as well as problems with intelligence reporting processes, have made the DHS Intelligence Enterprise less effective and valuable to the IC than it could be. DOJ can improve its counterterrorism information sharing efforts by developing and implementing a consolidated internal DOJ strategy, and evaluating the continued need and most effective utilization for the United States Attorney’s Offices’ Anti-Terrorism Advisory Council (ATAC) meetings. Further, the FBI should spur participation associated with Joint Terrorism Task Forces (JTTF) and improve its efforts to obtain partners’ input in the process of identifying and prioritizing counterterrorism threats. Within the ODNI, the Domestic DNI Representative program is hindered by large geographic regions, as well as the lack of a clear strategic vision and guidance. In addition, the National Counterterrorism Center (NCTC) Domestic Representative program, although well received in the field, has also struggled to sufficiently cover its regions. At the state and local level, due to unpredictable federal support, fusion centers are focused on sustaining operations rather than enhancing capabilities. Further, varying requirements for state and local security clearances sponsored by federal agencies can impede access to classified systems and facilities.</p>
<p>Our review resulted in 23 recommendations to help improve the sharing of counterterrorism information and ultimately, enhance the Nation’s ability to<br />
prevent terrorist attacks. We discuss our findings in detail in the Findings and Recommendations section of the report.</p>
<h3>The Investigation</h3>
<p><a href="https://documents.theblackvault.com/documents/ig/a1721.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /></a> <a href="https://documents.theblackvault.com/documents/ig/a1721.pdf">Review of Domestic Sharing of Counterterrorism Information, March 2017</a> [85 Pages, 6.7MB]</p>
<p>https://documents.theblackvault.com/documents/ig/a1721.pdf</p><p>The post <a href="https://www.theblackvault.com/documentarchive/review-domestic-sharing-counterterrorism-information-march-2017/">Review of Domestic Sharing of Counterterrorism Information, March 2017</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4345</post-id>	</item>
		<item>
		<title>Weekly Inventory List of Detained Cases &#8211; U.S. Immigration and Customs Enforcement (ICE)</title>
		<link>https://www.theblackvault.com/documentarchive/weekly-inventory-list-detained-cases-u-s-immigration-customs-enforcement-ice/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=weekly-inventory-list-detained-cases-u-s-immigration-customs-enforcement-ice</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 20 Jul 2016 21:13:31 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[ICE]]></category>
		<category><![CDATA[immigration]]></category>
		<category><![CDATA[Immigration and customs enforcement]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=2718</guid>

					<description><![CDATA[<p>Background The Weekly Inventory List of Detained Cases (WILDC) report was established as a process to achieve consistency, accuracy, improve on the tracking of detained cases and decrease average length of stay. In each weekly published document, ICE tallied the number of &#8220;detained&#8221; cases throughout their various field offices. In April of 2016, a FOIA [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/weekly-inventory-list-detained-cases-u-s-immigration-customs-enforcement-ice/">Weekly Inventory List of Detained Cases – U.S. Immigration and Customs Enforcement (ICE)</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>The Weekly Inventory List of Detained Cases (WILDC) report was established as a process to achieve consistency, accuracy, improve on the tracking of detained cases and decrease average length of stay.</p>
<p>In each weekly published document, ICE tallied the number of &#8220;detained&#8221; cases throughout their various field offices.</p>
<p>In April of 2016, a FOIA request was submitted that requested, &#8220;the four most recent WILDC reports at ICE.&#8221;  In June of 2016, the below were released.</p>
<p>Although there is still being research done on these reports by The Black Vault, it appears they may no longer be published by ICE, since the request yielded reports from 2010 (and the request was for the most recent, and filed in 2016.)</p>
<p>More information will be added, when available, but these documents are made available:</p>
<h3>Declassified Documents</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/ice/establishmentoftheweeklyinventorylistofdetainedcases-wildc-reportmar122008.pdf">Memorandum Dated March 12, 2008, entitled, &#8220;Establishment of the Weekly Inventory List of Detained Cases (WILDC) Report</a> [2 Pages, 0.4MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/ice/ice-wildc-response.pdf">FOIA Response from ICE, dated June 21, 2016</a> [2 Pages, 0.95MB]</p>
<pre>      <img decoding="async" src="http://www.theblackvault.com/images/excel.gif" /> <a href="https://documents.theblackvault.com/documents/ice/CUMULATIVE%20MASTER%20WILDC%20FY10%20(09-03-10).xls">CUMULATIVE MASTER WILDC FY10 (09-03-10).xls</a> 20-Jul-2016 14:05  1.0M  
      <img decoding="async" src="http://www.theblackvault.com/images/excel.gif" /> <a href="https://documents.theblackvault.com/documents/ice/WILDC%20SUMMARY%2008%2020%2010.xls">WILDC SUMMARY 08 20 10.xls</a>                  20-Jul-2016 14:05   71K  
      <img decoding="async" src="http://www.theblackvault.com/images/excel.gif" /> <a href="https://documents.theblackvault.com/documents/ice/WILDC%20SUMMARY%2008%2027%2010.xls">WILDC SUMMARY 08 27 10.xls</a>                  20-Jul-2016 14:05   71K  
      <img decoding="async" src="http://www.theblackvault.com/images/excel.gif" /> <a href="https://documents.theblackvault.com/documents/ice/WILDC%20SUMMARY%2008.13.10.xls">WILDC SUMMARY 08.13.10.xls</a>                  20-Jul-2016 14:05   71K  
      <img decoding="async" src="http://www.theblackvault.com/images/excel.gif" /> <a href="https://documents.theblackvault.com/documents/ice/WILDC%20SUMMARY%2009%2003%2010.xls">WILDC SUMMARY 09 03 10.xls</a>                  20-Jul-2016 14:05   71K</pre><p>The post <a href="https://www.theblackvault.com/documentarchive/weekly-inventory-list-detained-cases-u-s-immigration-customs-enforcement-ice/">Weekly Inventory List of Detained Cases – U.S. Immigration and Customs Enforcement (ICE)</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2718</post-id>	</item>
		<item>
		<title>Department of Homeland Security (DHS) Employee Manual</title>
		<link>https://www.theblackvault.com/documentarchive/department-of-homeland-security-dhs-employee-manual/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=department-of-homeland-security-dhs-employee-manual</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Thu, 26 Feb 2015 06:28:11 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[Government Employee Manuals / Orientation]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[employee manual]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=739</guid>

					<description><![CDATA[<p>The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. This requires the dedication of more than 225,000 employees in jobs that range from aviation and border security to emergency response, from cybersecurity analyst to chemical facility inspector. Our duties are wide-ranging, but our goal is [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/department-of-homeland-security-dhs-employee-manual/">Department of Homeland Security (DHS) Employee Manual</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. This requires the dedication of more than 225,000 employees in jobs that range from aviation and border security to emergency response, from cybersecurity analyst to chemical facility inspector. Our duties are wide-ranging, but our goal is clear &#8211; keeping America safe.</p>
<p>Below are the contents of a CD-ROM obtained from the DHS, after filing a request for the &#8220;DHS Employee manual / handbook.&#8221;</p>
<p>&nbsp;</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/manuals/dhsmanual.pdf">Department of Homeland Security Employee Manual</a> [62 Pages, 4.34mb]</p>
<p><a href="https://documents.theblackvault.com/documents/manuals/dhsmanual.pdf">https://documents.theblackvault.com/documents/manuals/dhsmanual.pdf</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/department-of-homeland-security-dhs-employee-manual/">Department of Homeland Security (DHS) Employee Manual</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">739</post-id>	</item>
		<item>
		<title>Occupy Wall Street</title>
		<link>https://www.theblackvault.com/documentarchive/occupy-wall-street/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=occupy-wall-street</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Thu, 26 Feb 2015 05:15:20 +0000</pubDate>
				<category><![CDATA[FBI Files / Domestic & Foreign Intelligence]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[occupy wall street]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=660</guid>

					<description><![CDATA[<p>Occupy Wall Street (OWS) is the name given to a protest movement that began on September 17, 2011 in Zuccotti Park, located in New York City&#8217;s Wall Street financial district. The Canadian activist group Adbusters initiated the protest, which has led to Occupy protests and movements around the world. The main issues are social and [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/occupy-wall-street/">Occupy Wall Street</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Occupy Wall Street (OWS) is the name given to a protest movement that began on September 17, 2011 in Zuccotti Park, located in New York City&#8217;s Wall Street financial district.</p>
<p>The Canadian activist group Adbusters initiated the protest, which has led to Occupy protests and movements around the world. The main issues are social and economic inequality, greed, corruption and the perceived undue influence of corporations on government—particularly from the financial services sector. The OWS slogan, We are the 99%, addresses the growing income inequality and wealth distribution in the U.S. between the wealthiest 1% and the rest of the population. To achieve their goals, protesters act on consensus-based decision made in general assemblies which emphasize direct action over petitioning authorities for redress.</p>
<p>Protesters were forced out of Zuccotti Park on November 15, 2011. After several unsuccessful attempts to re-occupy the original location, protesters turned their focus to occupying banks, corporate headquarters, board meetings, college and university campuses.</p>
<p>&nbsp;</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/fbifiles/occupy-wall-street-redacted-1.pdf">Department of Homeland Security Released Documents on Occupy Wall Street &#8211; Release #1 </a>[398 Pages, 20.81 MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/fbifiles/occupy-wall-street-redacted-2.pdf">Department of Homeland Security Released Documents on Occupy Wall Street &#8211; Release #2 </a>[335 Pages, 14.71 MB]</p><p>The post <a href="https://www.theblackvault.com/documentarchive/occupy-wall-street/">Occupy Wall Street</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">660</post-id>	</item>
	</channel>
</rss>
