DHS Says New Review Is a Tool for Leadership to Link Programs with Missions

July 2010
TR2: Terror Response Technology Report;7/21/2010, Vol. 6 Issue 15, p2
Trade Publication
The article focuses on the recently completed Bottom-Up Review (BUR) which gives the U.S. Department of Homeland Security's (DHS) leadership a powerful tool for linking its programs and activities to its missions and functions. David Heyman, assistant secretary for Policy at DHS, says the BUR maps the activities which are below the programmatic level to the mission areas and functional areas. The BUR was released by the DHS earlier in July 2010.


Related Articles

  • TiPS II. Doherty, Brian // Reason;Apr2011, Vol. 42 Issue 11, p14 

    The article focuses on the program initiated by the U.S. Department of Homeland Security (DHS), in conjunction with the Nationwide Suspicious Activity Reporting (SAR) Initiative, under which state and local law enforcement are trained to identify suspicious behavior indicating terrorism-related...

  • DHS Policy Chief: BUR A Tool For Leadership To Link Programs With Missions. Biesecker, Calvin // Defense Daily;7/19/2010, Vol. 247 Issue 12, p4 

    The article offers views of David Heyman, assistant secretary for Policy at the U.S. Department of Homeland Security (DHS), on the benefits of recently released document Bottom-Up Review (BUR). BUR links the organizational and programming needs to the DHS' mission areas including terrorism...

  • Of risk and pork: urban security and the politics of objectivity. Lakoff, Andrew; Klinenberg, Eric // Theory & Society;Sep2010, Vol. 39 Issue 5, p503 

    This article focuses on the Urban Area Security Initiative (UASI) controversy as a case study in the politics of risk assessment. It examines struggles among diverse actors–think tank experts, journalists, politicians, and government officials–engaged in the contentious process of...

  • Recalibrating Homeland Security. Flynn, Stephen // Foreign Affairs;May/Jun2011, Vol. 90 Issue 3, p130 

    An article is presented that reports on homeland security in the U.S. in 2011. The article describes American security policy following the September 11, 2011 terrorist attacks and counterterrorism measures for law enforcement and border control. The article discusses policies and agencies under...

  • Homeland security experts ask private sector for anti-terror technology. Ames, Ben // Military & Aerospace Electronics;Jun2003, Vol. 14 Issue 6, p1 

    Reports on the posting of a request by the U.S. Department of Homeland Security for 50 types of anti-terror technology. Categories of the anti-terror tools; Demand for custom-design solutions; Detection and decontamination of chemical, biological, radiological, and nuclear agents.

  • Keeping Us Safe.  // Scholastic News -- Senior Edition;11/5/2001, Vol. 70 Issue 9, p2 

    Reports on the creation of the Office of Homeland Security by United States President George W. Bush designed to protect the country from further terrorist attacks.

  • A Big Change for U.S. Government.  // Scholastic News -- Senior Edition;12/13/2002, Vol. 71 Issue 12, p3 

    Reports on the creation of a U.S. Department of Homeland Security to help the government protect the nation against terrorist attacks.

  • Mission impossible? Brumfiel, Geoff // Nature;9/5/2002, Vol. 419 Issue 6902, p10 

    Outlines the problems facing the research wing of the U.S. Department of Homeland Security, which is to be given the task of defending the country against further terrorist attacks. Development of technologies that will detect a terrorist attack, determine its source and mitigate its effects;...

  • Briefing.  // TR2: Terror Response Technology Report;12/8/2010, Vol. 6 Issue 25, p1 

    This section offers news briefs related to terror response technology as of December 8, 2010, including Tek84 Engineering Group's Ait84 whole body imaging and shoe scanning system and a plan by House Republican leaders to examine consolidation of committee jurisdictions over the U.S. Department...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics