U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. News
  3. Publications Library

Publications Library

The Publication Library contains guidance and policy papers, reports, strategies, program regulations, guidelines, brochures and more.

To search the DHS Publications Library, please enter search terms below.

  • Combating Trafficking in Counterfeit and Pirated Goods

    The rapid growth of e-commerce has revolutionized the way goods are bought and sold, allowing for counterfeit and pirated goods to flood our borders and penetrate our communities and homes. Illicit goods trafficked to American consumers by e-commerce platforms and online third-party marketplaces threaten public health and safety, as well as national security. This illicit activity impacts American innovation and erodes the competitiveness of U.S. manufacturers and workers.

  • Strategy to Combat Human Trafficking, the Importation of Goods Produced with Forced Labor, and Child Sexual Exploitation

    The U.S. Department of Homeland Security Strategy to Combat Human Trafficking, the Importation of Goods Produced with Forced Labor, and Child Sexual Exploitation articulates the Department’s long-term approach for combating these crimes and serves as a framework to prioritize resources and monitor progress. Additionally, this strategy supports the President’s Interagency Task Force to Monitor and Combat Trafficking in Persons, a Cabinet-level entity that coordinates federal efforts to combat human trafficking.

  • Expert Recommendations Memo for Onsite Investigation at York County Prison in York, Pennsylvania

    CRCL conducted an onsite investigation into conditions of detention for U.S. Immigration and Customs Enforcement detainees at the York County Prison in York, Pennsylvania on July 29-31, 2019. This onsite was in response to civil rights allegations received by CRCL regarding medical and mental health care at the facility, and general conditions of detention.

  • DHS/ALL/PIA-089 DHS International Biometric Interoperability Initiative for the Visa Waiver Program

    The Visa Waiver Program (VWP), administered by the U.S. Department of Homeland Security (DHS) in consultation with the Department of State (State), permits citizens of designated countries to travel to the United States for business or tourism for stays of up to 90 days without a visa. This Privacy Impact Assessment (PIA) considers the privacy risks and applicable mitigation strategies associated with implementing this Departmental policy.

  • National Terrorism Advisory System Bulletin - January 4, 2020 - Translations

    On January 4, 2020, Acting Secretary of Homeland Security Chad F. Wolf issued a National Terrorism Advisory System Bulletin. The following are versions of the Bulletin translated into various languages.

  • ST-CES 2020 Schedules

    The following documents provide detailed speaker and topic information for DHS conference and exhibit hall activities at CES Las Vegas, Jan. 6-10, 2020.

  • DHS/USSS/PIA-026 Social Media Screening

    The United States Secret Service (USSS or Secret Service) Security Management Division (SMD) has procured a contract to conduct social media checks in support of the background investigation (BI) process for hiring, continuous evaluation, and periodic reinvestigation. The Secret Service uses these BI processes to help mitigate the risk posed by those who potentially represent a threat to national security through proactive intervention and by identifying security-relevant information. Currently, various sources are checked for personnel security purposes, and USSS is adding a review of publicly available social media information to the existing processes that USSS security personnel use in identifying relevant information in assessing the eligibility of job applicants who have been conditionally selected for hire; reinvestigation of personnel holding clearances; and evaluation of a covered individual on an ongoing basis during the period of eligibility. The Secret Service is conducting this Privacy Impact Assessment (PIA) to discuss the collection, use, and maintenance of social media information in these processes.

  • Close Memo for Onsite Investigation at Folkston County Processing Center in Folkston, Georgia

    CRCL conducted an investigation into conditions of detention for U.S. Immigration and Customs Enforcement detainees at the Folkston Processing Center in Folkston, Georgia. CRCL’s onsite investigation occurred August 7-8, 2018, and was in response to allegations received alleging civil rights and civil liberties violations of general conditions of detention and inadequate medical care of detainees at the facility.

  • DHS/CISA/PIA-034 Protected Critical Infrastructure Information Program

    The Protected Critical Infrastructure Information (PCII) Program, part of the Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Infrastructure Security Division (ISD), Infrastructure Assessments and Analysis (IAA) Sub-Division, facilitates the sharing of PCII between the Government and the private sector. CISA has conducted this privacy impact assessment (PIA) to analyze and evaluate the privacy impact of the PCII Program’s overall operations, including the PCII submission and validation process, and user access management. Most of this work occurs on the Protected Critical Infrastructure Information Management System (PCIIMS). PCIIMS is an Information Technology (IT) system and the means by which PCII submissions from non-federal critical infrastructure owners and operators are received and cataloged, and PCII Authorized Users are registered, trained, and managed. This system receives, provides validation processes, and securely stores critical infrastructure information (physical and cyber systems and assets) meeting the PCII program definition for validation. This PIA replaces DHS/NPPD/PIA-006 Protected Critical Infrastructure Information Management System, published July 13, 2011.

  • ST-Binary Image JTAG, Chip-Off Decoding and Analysis Tool

    The following are CFTT reports for write-protected drives (organized by publication date).  The DHS Science and Technology Directorate funded these reports.

Last Updated: 01/28/2022