U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force

NCJ Number
203836
Date Published
2003
Length
171 pages
Annotation
This task force report discusses the need for the United States Government to improve its ability to use information to protect the nation through the creation of an information network that prevents terrorism and protects the security of the United States homeland.
Abstract
Since the terrorist attacks on the United States in 2001, the United States Government and the private sector have given considerable thought and effort to solving the problem of how the Nation can use information and information technology more effectively to protect the Nation while preserving civil liberties. This report from the Markle Foundation Task Force attempts to contribute to the solution by providing a framework for a national strategy and architecture for a decentralized system of information sharing and analysis making the most effective possible use of information while instituting guidelines and technologies to minimize abuses and protect privacy. The report is divided into three parts: (1) the Task Force Report, (2) working group analyses, and (3) appendices. Part 1 of the report consists of the achieving of a networked community for homeland security; the assessment of government progress toward a trusted, decentralized network; the building of a networked community for homeland security, the assessing of private sector data; and future work for the network. Part 2 of the report has the working group analyses involved working group one on the networking of Federal Government agencies with State and local government and private sector entities and working group two on building an effective, sustainable partnership between the government and the private sector. Lastly, part 3 of the report has nine appendices which include: reliable identification for homeland protection and collateral gains, homeland security players and information, immune system model, information vignettes, key questions for detection and prevention, technology challenges, landscape of available data, government requests for private sector data, and data analytics practices of the private sector.