U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. News
  3. Publications Library

Publications Library

The Publication Library contains guidance and policy papers, reports, strategies, program regulations, guidelines, brochures and more.

To search the DHS Publications Library, please enter search terms below.

  • Suspicious Activity Reporting Probation, Parole, and Corrections Training Overview

    This overview is an introduction to the NSI, relates how probation, parole, and corrections professionals may fit into the suspicious activity reporting process, and includes instructions on accessing the training.

  • Suspicious Activity Reporting Process Implementation Checklist

    Provides a simplified checklist for chief executives and senior leadership to implement a SAR process within their agencies.

  • Suspicious Activity Reporting Public Health and Health Care Partners Training Overview

    This overview is an introduction to the NSI, relates how public health and health care partners may fit into the suspicious activity reporting process, and includes instructions on accessing the training.

  • Suspicious Activity Reporting Public Safety Telecommunications Training Overview

    This overview is an introduction to the NSI, relates how public safety telecommunications professionals (e.g., 9-1-1 operators) may fit into the suspicious activity reporting process, and includes instructions on accessing the training.

  • Unified Message

    This Unified Message document was created to help clarify a unified approach to the process of reporting and sharing information related to suspicious activity.

  • Updated Privacy Policy Review Process

    This document details the new privacy policy review process. It has been recently modified to support fusion centers and expedite the finalization of their privacy policies.

  • Validation of the Nationwide Suspicious Activity Reporting (SAR) Initiative

    This executive summary details the University of Maryland's National Consortium for the Study of Terrorism and Responses to Terrorism (START) initiative to compare pre-incident activities of terrorists and violent criminal extremists in the United States to the 16 suspicious activity reporting (SAR) behavioral indicators that are outlined in the Information Sharing Environment (ISE) SAR Functional Standard as being observed behaviors reasonably indicative of preoperational planning related to terrorism or other criminal activity. The START Study verifies the utility of the Nationwide SAR Initiative (NSI), which provides law enforcement and homeland security agencies with a uniform method for gathering and reporting raw tips, leads, and reports of suspicious activity.

  • Annual Performance Report for Fiscal Years 2018–2020

    The Department of Homeland Security's Performance and Accountability Reports provide information that enables the President, Congress and the public to assess the effectiveness of the Department's mission performance and stewardship of resources.  The following is the Performance and Accountability Report for Fiscal Years 2018–2020.

  • Congressional Budget Justification FY 2020

    Congressional Budget Justification FY 2020

  • DHS/S&T/PIA-037 Genomics Informatics System (GIS)

    The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) National Biodefense Analysis and Countermeasures Center (NBACC) created the Genomics Informatics System (GIS) to analyze bio-forensic data for classified development projects and law enforcement casework. GIS processes deoxyribonucleic acid (DNA) and amino-acid sequences transferred to GIS from external sources. S&T uses GIS for the analysis of bio-forensic data that may include the DNA or amino-acid sequences of synthetic constructs, viruses, bacteria, plants, animals, and/or humans. GIS is not used to identify individuals, and the identity of an individual cannot be inferred from a DNA sequence or other information in the GIS database. S&T is conducting this PIA to analyze potential privacy risks in the collection, analysis, and storage of human DNA sequences by GIS.

Last Updated: 01/28/2022