Search This Blog

Monday, March 25, 2019

United States Secret Service

From Wikipedia, the free encyclopedia

United States Secret Service
Logo of the United States Secret Service.svg
U.S Secret Service emblem
Badge of the United States Secret Service.png
Secret Service Special Agent badge
Flag of the United States Secret Service.svg
U.S. Secret Service flag
Common nameSecret Service
AbbreviationUSSS
Agency overview
FormedJuly 5, 1865
Employees7,000+ (2019)
Annual budget$2.2 billion (2019)
HeadquartersWashington, D.C.

Agency executives
Parent agency U.S. Department of Homeland Security (2003–present)
U.S. Department of the Treasury (1865–2003)
Facilities
Field and resident offices116
Overseas offices20
Website
www.secretservice.gov

The United States Secret Service (also USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security charged with conducting criminal investigations and protecting the nation's leaders. Until 2003, the Secret Service was part of the Department of the Treasury, as the agency was originally founded to combat the then-widespread counterfeiting of US currency.

Primary Missions

The Secret Service is mandated by Congress with two distinct and critical national security missions; protecting the nation's leaders and safeguarding the financial and critical infrastructure of the United States.

Protective Mission

Ensures the safety of the President of the United States, the Vice President of the United States, the President's and Vice President's immediate families, former presidents, their spouses, and their minor children under the age of 16, major presidential and vice presidential candidates and their spouses, and foreign heads of state. The Secret Service also provides physical security for the White House Complex, the neighboring Treasury Department building, the Vice President's residence, and all foreign diplomatic missions in Washington, D.C. The protective mission includes protective operations to coordinate manpower and logistics with state and local law enforcement, protective advances to conduct site and venue assessments for protectees, and protective intelligence to investigate all manners of threats made against protectees. The Secret Service is the lead agency in charge of the planning, coordination, and implementation of security operations for events designated as National Special Security Events (NSSEs). As part of the Service's mission of preventing an incident before it occurs, the agency relies on meticulous advance work and threat assessments developed by its Intelligence Division to identify potential risks to protectees.

Investigative Mission

Safeguards the payment and financial systems of the United States from a wide range of financial and electronic-based crimes. Financial investigations include counterfeit US currency, bank & financial institution fraud, mail fraud, wire fraud, illicit financing operations, and major conspiracies. Electronic investigations include cybercrime, network intrusions, identity theft, access device fraud, credit card fraud, and intellectual property crimes. The Secret Service is a key member of the FBI's Joint Terrorism Task Force (JTTF) which investigates and combats terrorism on a national and international scale, as well as of the High Intensity Drug Trafficking Areas (HIDTA) Task Force which seeks to reduce and eliminate drug trafficking in critical regions of the United States. The Secret Service also investigates missing and exploited children and is a core partner of the National Center for Missing & Exploited Children (NCMEC).

The Secret Service's initial responsibility was to investigate the counterfeiting of US currency, which was rampant following the American Civil War. The agency then evolved into the United States' first domestic intelligence and counterintelligence agency. Many of the agency's missions were later taken over by subsequent agencies such as the Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), Drug Enforcement Administration (DEA), Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), and IRS Criminal Investigation Division (IRS-CI).

Dual objective

Secret Service agents conducting electronic investigations
 
Secret Service agents protecting President George W. Bush in 2002
 
Secret Service and FBI agents investigate the Boston Marathon bombing
 
The Secret Service combines the two responsibilities into a unique dual objective. The two core missions of protection and investigations synergize with the other, providing crucial benefits to special agents during the course of their careers. Skills developed during the course of investigations which are also used in an agent’s protective duties include but are not limited to:
  • Partnerships that are created between field offices and local law enforcement during the course of investigations being used to gather both protective intelligence and in coordinating protection events.
  • Tactical operation (i.e. surveillance, arrests, and search warrants) and law enforcement writing (i.e. affidavits, after action reports, and operations plans) skills being applied to both investigative and protective duties.
  • Proficiency in analyzing handwriting and forgery techniques being applied in protective investigations of handwritten letters and suspicious package threats.
  • Expertise in investigating electronic and financial crimes being applied in protective investigations of threats made against the nation's leaders on the Internet.
Protection of the nation's highest elected leaders and other government officials is one of the primary missions of the Secret Service. After the 1901 assassination of President William McKinley, Congress also directed the Secret Service to protect the President of the United States.

The Secret Service is authorized by law to protect:
  • The President, Vice President (or other officer next in the order of succession to the Office of President, should the Vice Presidency be vacant), President-elect and Vice President-elect
  • The immediate families of the above individuals
  • Former Presidents and their spouses for their lifetimes (except when the spouse divorces or remarries), under the Former Presidents Act. From 1997 until 2013, legislation was in place limiting Secret Service protection to former Presidents and their spouses to a period of 10 years from the date the former President leaves office. President Barack Obama signed legislation on January 10, 2013, reversing this limit and reinstating lifetime protection.
  • The widow or widower of a former President who dies in office or dies within a year of leaving office for a period of one year after the President's death (the Secretary of Homeland Security can extend the protection time)
  • Children of former Presidents until age 16 or 10 years after the presidency
  • Former Vice Presidents, their spouses, and their children under 16 years of age, for up to 6 months from the date the former Vice President leaves office (the Secretary of Homeland Security can extend the protection time)
  • Visiting heads of states or governments and their spouses traveling with them
  • Other distinguished foreign visitors to the United States and official representatives of the United States performing special missions abroad, as directed by the President
  • Major presidential and vice presidential candidates
  • The spouses of major presidential and vice presidential candidates (within 120 days of a general presidential election)
  • Other individuals as designated per executive order of the President
  • National Special Security Events, when designated as such by the Secretary of Homeland Security
The law states that individuals other than the President, the Vice President (or other officer next in the order of succession to the Office of President), the President-elect, and the Vice President-elect may decline Secret Service protection, but the law neither allows nor disallows these excepted offices from declining.

When Hillary Clinton became Secretary of State in 2009, the Secret Service continued to protect her at home; however the Diplomatic Security Service protected her while she was performing her duties as the Secretary of State, including foreign travel.

The Secret Service investigates thousands of incidents each year of individuals threatening the President of the United States.

In the face of budget pressure, hiring challenges and some high-profile lapses in its protective service role in 2014, the Brookings Institution and some members of Congress are asking whether the agency's focus should shift more to the protective mission, leaving more of its original mission to other agencies.

The Secret Service's other primary mission is investigative; to protect the payment and financial systems of the United States from a wide range of financial and electronic-based crimes including counterfeit U.S. currency, bank & financial institution fraud, illicit financing operations, cybercrime, identity theft, intellectual property crimes, and any other violations that may affect the United States economy and financial systems. The agency's key focus is on large, high-dollar economic impact cases involving organized criminal groups. Financial criminals include embezzling bank employees, armed robbers at automatic teller machines, heroin traffickers, and criminal organizations that commit bank fraud on a global scale.

The USSS plays a leading role in facilitating relationships between other law enforcement entities, the private sector, and academia. The Service maintains the Electronic Crimes Task Forces, which focus on identifying and locating international cyber criminals connected to cyber intrusions, bank fraud, data breaches, and other computer-related crimes. Additionally, the Secret Service runs the National Computer Forensics Institute (NCFI), which provides law enforcement officers, prosecutors, and judges with cyber training and information to combat cybercrime.

History

Early years

Logo of the United States Secret Service
 
With a reported one third of the currency in circulation being counterfeit at the time, the Secret Service was created on July 5, 1865 in Washington, D.C., to suppress counterfeit currency. Chief William P. Wood was sworn in by Secretary of the Treasury Hugh McCulloch. It was commissioned in Washington, D.C. as the "Secret Service Division" of the Department of the Treasury with the mission of suppressing counterfeiting. The legislation creating the agency was on Abraham Lincoln's desk the night he was assassinated. At the time, the only other federal law enforcement agencies were the United States Customs Service, the United States Park Police, the U.S. Post Office Department's Office of Instructions and Mail Depredations (now known as the United States Postal Inspection Service), and the United States Marshals Service. The Marshals did not have the manpower to investigate all crime under federal jurisdiction, so the Secret Service began investigating a wide range of crimes from murder to bank robbery to illegal gambling. After the assassination of President William McKinley in 1901, Congress informally requested that the Secret Service provide presidential protection. A year later, the Secret Service assumed full-time responsibility for presidential protection. In 1902, William Craig became the first Secret Service agent to die while serving, in a road accident while riding in the presidential carriage.

The Secret Service was the first U.S. domestic intelligence and counterintelligence agency. Domestic intelligence collection and counterintelligence responsibilities were vested in the Federal Bureau of Investigation (FBI) upon the FBI's creation in 1908.

The Secret Service assisted in arresting Japanese American leaders and in the Japanese American internment during World War II. The U.S. Secret Service is not a part of the U.S. Intelligence Community.

20th century

Taft assassination attempt

In 1909, President William H. Taft agreed to meet with Mexican President Porfirio Díaz in El Paso, Texas and Ciudad Juárez, Mexico, the first meeting between a U.S. and a Mexican president and also the first time an American president visited Mexico. But the historic summit resulted in serious assassination threats and other security concerns for the then small Secret Service, so the Texas Rangers, 4,000 U.S. and Mexican troops, BOI agents, U.S. Marshals, and an additional 250 private security detail led by Frederick Russell Burnham, the celebrated scout, were all called in by Chief John Wilkie to provide added security. On October 16, the day of the summit, Burnham discovered a man holding a concealed palm pistol standing at the El Paso Chamber of Commerce building along the procession route. The man was captured and disarmed only a few feet from Díaz and Taft.

1950s

In 1950, President Harry S. Truman was residing in Blair House while the White House, across the street, was undergoing renovations. On November 1, 1950, two Puerto Rican nationalists, Oscar Collazo and Griselio Torresola, approached Blair House with the intent to assassinate President Truman. Collazo and Torresola opened fire on Private Leslie Coffelt and other White House Police officers. Though mortally wounded by three shots from a 9 mm German Luger to his chest and abdomen, Private Coffelt returned fire, killing Torresola with a single shot to his head. As of 2017, Coffelt is the only member of the Secret Service killed while protecting a US president against an assassination attempt (Special Agent Tim McCarthy stepped in front of President Ronald Reagan during the assassination attempt of March 30, 1981, and took a bullet to the abdomen but made a full recovery). Collazo was also shot, but survived his injuries and served 29 years in prison before returning to Puerto Rico in late 1979.

1960s

In 1968, as a result of Robert F. Kennedy's assassination, Congress authorized protection of major presidential and vice presidential candidates and nominees. In 1965 and 1968, Congress also authorized lifetime protection of the spouses of deceased presidents unless they remarry and of the children of former presidents until age 16.

1980s

Secret Service analyst examining counterfeit documents
 
The Secret Service Presidential Protective Division safeguards the President of the United States and his immediate family. They work with other federal, state, and local law enforcement agencies and the military to safeguard the President when he travels in Air Force One, Marine One and by limousine in motorcades.

Although the most visible role of the Secret Service today, personal protection is an anomaly in the responsibilities of an agency focused on fraud and counterfeiting.

In 1984, the US Congress passed the Comprehensive Crime Control Act, which extended the Secret Service's jurisdiction over credit card fraud and computer fraud.

1990s

In 1990, the Secret Service initiated Operation Sundevil, which they originally intended as a sting against malicious hackers, allegedly responsible for disrupting telephone services across the entire United States. The operation, which was later described by Bruce Sterling in his book The Hacker Crackdown, affected a great number of people unrelated to hacking, and led to no convictions. The Secret Service, however, was sued and required to pay damages.

In 1994 and 1995, it ran an undercover sting called Operation Cybersnare. The Secret Service has concurrent jurisdiction with the FBI over certain violations of federal computer crime laws. They have created 24 Electronic Crimes Task Forces (ECTFs) across the United States. These task forces are partnerships between the Service, federal/state and local law enforcement, the private sector and academia aimed at combating technology-based crimes.

In 1998, President Bill Clinton signed Presidential Decision Directive 62, which established National Special Security Events (NSSE). That directive made the Secret Service responsible for security at designated events. In 1999, the United States Secret Service Memorial Building was dedicated in DC, granting the agency its first headquarters. Prior to this, the agency's different departments were based in office space around the DC area.

21st century

2000s

September 11 attacks
The New York City Field office was located at 6 World Trade Center. Immediately after the World Trade Center was attacked as part of the September 11 attacks, Special Agents and other New York Field office employees were among the first to respond with first aid. Sixty-seven Special Agents in New York City, at and near the New York Field Office, helped to set up triage areas and evacuate the towers. One Secret Service employee, Master Special Officer Craig Miller, died during the rescue efforts. On August 20, 2002, Director Brian L. Stafford awarded the Director's Valor Award to employees who assisted in the rescue attempts.
Domestic expansion
Secret Service Electronic Crimes Task Force (ECTF)
 
Secret Service Asset Forfeiture and Money Laundering Task Force (AFMLTF)
 
Effective March 1, 2003, the Secret Service transferred from the Treasury to the newly established Department of Homeland Security.

The USA Patriot Act, signed into law by President George W. Bush on October 26, 2001, mandated the Secret Service to establish a nationwide network of ECTFs in addition to the one already active in New York. As such, this mandate expanded on the agency's first ECTF—the New York Electronic Crimes Task Force, formed in 1995—which brought together federal, state and local law enforcement, prosecutors, private-industry companies, and academia. These bodies collectively provide necessary support and resources to field investigations that meet any one of the following criteria: significant economic or community impact; participation of organized criminal groups involving multiple districts or transnational organizations; or use of schemes involving new technology.

The network prioritizes investigations that meet the following criteria:
  • Significant economic or community impact,
  • Participation of multiple-district or transnational organized criminal groups,
  • Use of new technology as a means to commit crime.
Investigations conducted by ECTFs include crimes such as computer generated counterfeit currency; bank fraud; virus and worm proliferation; access device fraud; telecommunications fraud; Internet threats; computer system intrusions and cyberattacks; phishing/spoofing; assistance with Internet-related child pornography and exploitation; and identity theft.
International expansion
Secret Service Cyber Intelligence Center (CIS)
 
On July 6, 2009, the U.S. Secret Service expanded its fight on cybercrime by creating the first European Electronic Crime Task Force, based on the successful U.S. domestic model, through a memorandum of understanding with Italian police and postal officials. Over a year later, on August 9, 2010, the agency expanded its European involvement by creating its second overseas ECTF in the United Kingdom.

Both task forces are said to concentrate on a wide range of "computer-based criminal activity," including:

2010s

As of 2010, the Service had over 6,500 employees: 3,200 Special Agents, 1,300 Uniformed Division Officers, and 2,000 technical and administrative employees. Special agents serve on protective details and investigate financial, cyber, and homeland security-related crimes.

In September 2014, the United States Secret Service came under criticism following two high-profile incidents involving intruders at the White House. One such intruder entered the East Room of the White House through an unlocked door.

Another incident involved a violation of procedure in which an armed security guard for the Centers for Disease Control and Prevention rode in the same elevator as President Barack Obama during a visit to that agency's headquarters in Atlanta, Georgia, to discuss U.S. response to the Ebola virus epidemic in West Africa. The guard used his phone to record a video of Obama and refused to comply with a request to stop. The guard had been arrested multiple times in the past, but had never been convicted of a crime.

Attacks on presidents

Secret Service agents responding to the assassination attempt of Ronald Reagan by John Hinckley, Jr. on March 30, 1981
 
Since the 1960s, Presidents John F. Kennedy (killed), Gerald Ford (twice attacked, but uninjured) and Ronald Reagan (seriously wounded) have been attacked while appearing in public. Agents on scene though not injured during attacks on Presidents include William Greer and Roy Kellerman. One of the agents was Robert DeProspero, the Special Agent In Charge (SAIC) of Reagan's Presidential Protective Division (PPD) from January 1982 to April 1985. DeProspero was deputy to Jerry Parr, the SAIC of PPD during the Reagan assassination attempt on March 30, 1981.

Secret Service agents guard President George W. Bush in 2008.
 
The Kennedy assassination spotlighted the bravery of two Secret Service agents. First, an agent protecting Mrs. Kennedy, Clint Hill, was riding in the car directly behind the presidential limousine when the attack began. While the shooting continued, Hill leapt from the running board of the car he was riding on and jumped onto the back of the President's moving car and guided Mrs. Kennedy from the trunk back into the rear seat of the car. He then shielded the President and the First Lady with his body until the car arrived at the hospital.

Rufus Youngblood was riding in the vice-presidential car. When the shots were fired, he vaulted over the front seat and threw his body over Vice President Lyndon B. Johnson. That evening, Johnson called Secret Service Chief James J. Rowley and cited Youngblood's bravery. Youngblood would later recall some of this in his memoir, Twenty Years in the Secret Service

The period following the Kennedy assassination was the most difficult in the modern history of the agency. Press reports indicated that morale among the agents was "low" for months following the assassination. The agency overhauled its procedures in the wake of the Kennedy killing. Training, which until that time had been confined largely to "on-the-job" efforts, was systematized and regularized. 

The Reagan assassination attempt also highlighted the bravery of several Secret Service agents, particularly agent Tim McCarthy, who spread his stance to protect Reagan as six bullets were being fired by the would-be assassin, John Hinckley Jr. McCarthy survived a .22-caliber round in the abdomen. For his bravery, McCarthy received the NCAA Award of Valor in 1982. Jerry Parr, the agent who pushed President Reagan into the limousine, and made the critical decision to divert the presidential motorcade to George Washington University Hospital instead of returning to the White House, was also honored with U.S. Congress commendations for his actions that day.

Significant investigations

Arrest and indictment of Max Ray Butler, co-founder of the Carders Market carding website. Butler was indicted by a federal grand jury in Pittsburgh, Pennsylvania, after his September 5, 2007 arrest, on wire fraud and identity theft charges. According to the indictment, Butler hacked over the Internet into computers at financial institutions and credit card processing centers and sold the tens of thousands of credit card numbers that he acquired in the process.

Operation Firewall: In October 2004, 28 suspects—located across eight U.S. states and six countries—were arrested on charges of identity theft, computer fraud, credit-card fraud, and conspiracy. Nearly 30 national and foreign field offices of the U.S. Secret Service, including the newly established national ECTFs, and countless local enforcement agencies from around the globe, were involved in this operation. Collectively, the arrested suspects trafficked in at least 1.7 million stolen credit card numbers, which amounted to $4.3 million of losses to financial institutions. However, authorities estimated that prevented loss to the industry was in the hundreds of millions of dollars. The operation, which started in July 2003 and lasted for more than a year, led investigators to identify three cybercriminal groups: Shadowcrew, Carderplanet, and Darkprofits.

Arrest and indictment of Albert Gonzalez and 11 individuals; three U.S. citizens, one from Estonia, three from Ukraine, two from the People's Republic of China, one from Belarus, and one known only by an online alias. They were arrested on August 5, 2008, for the theft and sale of more than 40 million credit and debit card numbers from major U.S. retailers, including TJX Companies, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, Forever 21, and DSW. Gonzalez, the main organizer of the scheme, was charged with computer fraud, wire fraud, access device fraud, aggravated identity theft, and conspiracy for his leading role in the crime.

Structure

Secret Service agents protecting President Obama and First Lady Michelle Obama
Ranks of the Secret Service (not inclusive)
---
  • Special Agent in Charge (SAIC)
  • Deputy Special Agent in Charge (DSAIC)
  • Assistant Special Agent in Charge (ASAIC)
  • Assistant to the Special Agent in Charge (ATSAIC)
  • Special Agent (SA)
  • Uniformed Division Officer (UD)
  • Special Officer (SO)
---
  • Administrative, Professional, Technical (APT)

Special Agent

Secret Service agents executing a protective operation
 
The Secret Service special agent position is highly competitive. In 2011, the Service accepted less than 1% of its 15,600 special agent applicants. While the Secret Service has always been a popular career path for former military and law enforcement personnel, the Service seeks to hire agents from a diverse range of backgrounds in fulfilling its dual mission, including accountants, lawyers, scientists, engineers, and foreign language specialists.

At a minimum, a prospective agent must be a U.S. citizen, possess a current valid driver's license, be in excellent health and physical condition, possess visual acuity no worse than 20/60 uncorrected, correctable to 20/20 in each eye, and be between the ages of 21 and 37 at the time of appointment. However, eligible veterans may apply after age 37. In 2009, the Office of Personnel Management issued implementation guidance on the Isabella v. Department of State court decision: OPM Letter.

Prospective agents must also qualify for a TS/SCI (Top Secret / Sensitive Compartmented Information) clearance, and undergo an extensive background investigation, to include in-depth interviews, drug screening, medical diagnosis, and full-scope polygraph examination.

Secret Service agent trainees at the James J. Rowley Training Center (RTC)
 
Special agents receive training in two locations, totaling approximately 7 months. The first phase, the Criminal Investigator Training Program (CITP) is conducted at the Federal Law Enforcement Training Centers (FLETC) at Glynco, GA, lasting approximately 12 weeks. The second phase, the Special Agent Training Course (SATC) is conducted at the Secret Service Academy, James J. Rowley Training Center (JJRTC), just outside Washington, D.C. in Laurel, Maryland, lasting approximately 18 weeks.

Secret Service agent trainees practice executing a search warrant.
 
A typical special agent career path, depending upon performance and promotions that affect individual assignments, begins with the first six to eight years on the job assigned to a field office. Applicants are directed to list their office location preference during the application process, and upon receiving a final job offer, usually have several locations to choose from. After their field office experience, agents are usually transferred to a protective assignment where they will stay for three to five years. Following their protective assignment, many agents return to a field office for the rest of their careers, or opt for a headquarters based assignment located in Washington, D.C. During their careers, agents also have the opportunity to work overseas in one of the agency's international field offices. This typically requires foreign language training to ensure language proficiency when working alongside the agency's foreign law enforcement counterparts.

Special agents are hired at either the GL-07 or GL-09 grade level, depending on individual qualifications and/or education. Agents are eligible for promotion on a yearly basis, from GL-07, to GL-09, to GS-11, to GS-12, to GS-13 (GL-08 and GS-10 grade levels are skipped). The full performance grade level for a journeyman agent is GS-13, which a GL-07 and GL-09 agent may reach in as little as four and three years respectively. GS-13 agents are eligible for competitive promotion to supervisory agent positions, which compasses the GS-14, GS-15, and SES grade levels. GS-13 agents who wish to remain as senior field agents continue to advance the GS-13 step level, capping at GS-13 Step-10. 

Special agents also receive Law Enforcement Availability Pay (LEAP), a type of premium overtime pay which provides them with an additional 25% bonus pay on top of their salary, as agents are required to work an average workweek of 50 hours as opposed to 40. Therefore, an agent living in the Greater New York City area will earn an annual salary of approximately $65,733 (GL-07), $74,850 (GL-09), $87,639 (GS-11), $105,044 (GS-12), $124,909 (GS-13), $147,606 (GS-14), and $164,200 (GS-15).

Moreover, due to the nature of their work and unique among their federal law enforcement counterparts (e.g. FBI, DEA, ATF, ICE), Secret Service agents are regularly eligible for scheduled overtime pay (SOT pay) in addition to LEAP for hours they work beyond 50 per week, and enjoy a raised statutory pay cap of $189,600 per year (Level II of the Executive Schedule) as opposed to $164,200 per year (Level IV of the Executive Schedule).

Uniformed Division Officer

Secret Service officer and his police dog as part of the Emergency Response Team (ERT)
 
The Secret Service Uniformed Division is a security police similar to the U.S. Capitol Police or DHS Federal Protective Service and is in charge of protecting the physical White House grounds and foreign diplomatic missions in the Washington, D.C. area. Established in 1922 as the White House Police, this organization was fully integrated into the Secret Service in 1930. In 1970, the protection of foreign diplomatic missions was added to the force's responsibilities, and its name was changed to the Executive Protective Service. The name United States Secret Service Uniformed Division was adopted in 1977. 

Secret Service Uniformed Division officers provide protection for the White House Complex, the Vice President's residence, the main Treasury Building and Annex, and foreign diplomatic missions and embassies in the Washington, D.C., area. Additionally, Uniformed Division officers travel in support of presidential, vice presidential and foreign head of state government missions. Officers may, as their careers progress, be selected to participate in one of several specialized units, including the:
  • Canine Unit: Performing security sweeps and responding to bomb threats and suspicious packages.
  • Emergency Response Team: Providing a coordinated tactical response for the White House and other protected facilities.
  • Counter-sniper Team: Utilizing observation, sighting equipment and high-performance weapons to provide a secure environment for protectees.
  • Motorcade Support Unit: Providing motorcycle tactical support for official movements of motorcades.
  • Crime Scene Search Unit: Photographing, collecting and processing physical and latent evidence.
  • Office of Training: Serving as firearms and classroom instructors or recruiters.
  • Special Operations Section: Handling special duties and functions at the White House Complex, including conducting the daily congressional and public tours of the White House.

Special Officer

Secret Service special officers (not to be confused with Uniformed Division Officers) are federal agents who work within the Special Agent Division and perform a wide range of security functions and support assignments as part of the protective mission for the Secret Service. Whereas special agents alternate between protection and investigative assignments, special officers are hired only to work protection details. They must have a familiarity with all phases of protective responsibilities sufficient to assist in protective movements, cover designated security posts and drive protective vehicles. 

Assignments may include:
  • Maintaining designated protective security posts that control movement of persons into and around multiple Secret Service facilities and associated areas
  • Inspecting all operational, safety, emergency, and convenience equipment of protective vehicles to ensure peak-operating condition
  • Driving protective or follow-up vehicles
  • Monitoring and operating various communications equipment
  • Using various advanced x-ray screening technologies to detect and identify high-risk items
Special officers are sworn law enforcement officers, and are authorized to make arrests in connection with their official duties. They are classified as federal agents but use "special officer" as their official title much the same way as Deputy US Marshals are special agents but use the title "Deputy US Marshal". 

Newly appointed special officers must successfully complete eight (8) weeks of intensive training at the Special Officer Basic Training Course at the Secret Service James J. Rowley Training Center just outside Washington, D.C. The training includes courses such as Criminal Law, Laws of Arrest, Search and Seizure, Control Tactics, Civil Liability, Emergency Medicine, Basic Water Safety, Firearms and Weapons Handling, Radio Communications, Emergency Driving and Physical Fitness Training.

Investigative Protection Officer

Investigative Protection Officer "IPO" is a new title reclassification of the Special Officer position. Whether the two will coexist is unknown. Both positions have the same duties but IPOs have full law enforcement authority and their full performance level is a GL-11 instead of GL-9, which is a Special Officer.

Weapons and equipment

Two men on a roof with rifles positioned on tripods
Secret Service snipers protect Vice President Mike Pence in Indianapolis in 2017.
 
Since the agency's inception, a variety of weapons have been carried by its agents.

Previous firearms

Initially the firearms were privately procured and there was little, if any, standardization. In the 1930s, the USSS issued the Colt M1911A1 pistol in .45 ACP caliber. In the 1950s and 1960s, Special Agents carried the Smith & Wesson Model 36 and Colt Detective Special .38-Special revolvers. 

Following President Kennedy's assassination, USSS Special Agents were authorized to carry the .357 Magnum Smith & Wesson Model 19 revolver. Between 1981 and 1991, the Secret Service issued the Smith & Wesson Model 19 and the Smith & Wesson Model 66 .357 Magnum revolvers, with 2.5-inch barrels all the way up to the 4-inch-barreled models, loaded with hollow-point rounds. By 1992, the standard issue weapon became the SIG Sauer P228 9mm pistol. This weapon stayed in service through 1999. 

The Secret Service replaced the Thompson submachine gun with the Uzi submachine gun in the 1970s. Uzis that the Secret Service used have slightly shorter-than-standard barrels so they could to fit inside the standard size Samsonite briefcases that concealed them. They phased out the Uzi in the mid 1990s and replaced it with the H&K MP5. The Secret Service was the last Federal agency to use the Uzi. The Counter-Assault Team used the M4 carbine from the early 1990s until 2006.

Current weapons

Secret Service counter-sniper marksman on top of the White House's roof, armed with a sniper rifle
 
The current sidearm for USSS agents is the SIG Sauer P229 chambered in .357 SIG (which entered service in 1999).

Agents and officers are trained on standard shoulder weapons that include the FN P90 submachine gun, the 9mm Heckler & Koch MP5 submachine gun, and the 12-gauge Remington 870 shotgun. The agency has initiated a procurement process to ultimately replace the MP5 with a 5.56mm rifle.

As a non-lethal option, Special Agents, Special Officers, and Uniformed Division Officers are armed with the ASP 16” expandable baton, and Uniformed Division officers also carry pepper spray

Special Operations Division (SOD) units are authorized to use a variety of non-standard weapons. The Counter Assault Team (CAT) and the Emergency Response Team (ERT) both use the 5.56mm Knight's Armament Company SR-16 CQB assault rifle in an 11.5" configuration. CAT also deploys 12 gauge Remington 870 MCS breaching shotguns. Uniform Division technicians assigned to the Counter Sniper (CS) team use custom built .300 Winchester Magnum-chambered bolt-action rifles referred to as JARs ("Just Another Rifle"). These rifles are built with Remington 700 long actions in Accuracy International stocks and use Schmidt & Bender optics. CS technicians also use the 7.62mm KAC SR-25/Mk11 Mod 0 semi-automatic sniper rifle with a Trijicon 5.5× ACOG optic.

Badges

Attire

Secret Service agent in business suit working President Obama's protection detail
 
Special Agents and Special Officers of the Secret Service wear attire that is appropriate for their surroundings, in order to blend in as much as possible. In most circumstances, the attire of a close protection shift is a conservative suit, but it can range from a tuxedo to casual clothing as required by the environment. Stereotypically, Secret Service agents are often portrayed wearing reflective sunglasses and a communication earpiece. Often their attire is customized to conceal the wide array of equipment worn in service. Agents wear a distinctive lapel pin that identifies them to other agents.

The attire for Uniformed Division Officers includes standard police uniforms or utility uniforms and ballistic/identification vests for members of the counter-sniper team, Emergency Response Team (ERT), and canine officers. The shoulder patch of the Uniformed Division consists of the U.S. coat of arms on white or black, depending on the garment. Also, the shoulder patch is embroidered with "U.S. Secret Service Uniformed Division Police" around the emblem.

Vehicles

When transporting the President in a motorcade, the Secret Service uses a fleet of custom-built armored Cadillac Parade Limousines, the newest and largest version of which is known as "The Beast". Armored Chevrolet Suburbans are also used when logistics require such a vehicle or when a more low profile appearance is required. For official movement the limousine is affixed with U.S. and presidential flags and the presidential seal on the rear doors. For unofficial events the vehicles are left sterile and unadorned.

Field offices

Secret Service Field Offices

The Secret Service has agents assigned to 136 field offices and field agencies, and the headquarters in Washington, D.C. The Service's offices are located in cities throughout the United States and the world. The offices in Lyon and The Hague are respectively responsible for liaison with the headquarters of Interpol and Europol, located in those cities.

Misconduct

In April 2012, an incident involving the president's security detail received international press attention. The incident involved 11 agents and personnel from four branches of the U.S. military; they allegedly engaged prostitutes while assigned to protect the U.S. President at the 6th Summit of the Americas in Cartagena, Colombia. As of April 24, 2012, nine employees had resigned or retired.

After the incident was publicized, the Secret Service implemented new rules for its personnel. The rules prohibit personnel from visiting "non-reputable establishments" and from consuming alcohol less than ten hours before starting work. Additionally, they restrict who is allowed in hotel rooms.

A few weeks later, stories emerged of Secret Service agents hiring strippers and prostitutes prior to Obama's 2011 visit to El Salvador.

In 2015, two inebriated senior service agents drove an official car into the White House complex and collided with a barrier. One of the congressmen in the United States House Committee on Oversight and Government Reform that investigated that incident was Jason Chaffetz. In September 2015, it was revealed that 18 Secret Service employees or supervisors, including Assistant Director Ed Lowery, accessed an unsuccessful 2003 application by Chaffetz for employment with the agency and discussed leaking the information to the media in retaliation for Chaffetz' investigations of agency misconduct. The confidential personal information was later leaked to The Daily Beast. Agency Director Joe Clancy apologized to Chaffetz and said that disciplinary action would be taken against those responsible.

In March 2017, a member of US Vice President Mike Pence's detail was suspended after he was caught visiting a prostitute at a hotel in Maryland.

In popular culture

Films

Television

  • The Wild Wild West (1965): A highly popular Western action series, set in the early- to mid- 1870s, starring Robert Conrad and Ross Martin as Secret Service agents James West and Artemus Gordon. West and Gordon pursue a variety of villains across the old west and often report directly to President Ulysses S. Grant. Two reunion telemovies were screened in 1979 and 1980, followed by the film Wild Wild West (above).
  • 24 (2001): Involves many characters and operations within the Secret Service as they protect the presidents throughout the series, most notable Agent Aaron Pierce, played by Glenn Morshower.
  • House of Cards (2013): Edward Meechum initially serves as a bodyguard to President Frank Underwood when he was Majority Whip but later gets promoted to the Secret Service when Underwood became Vice President (remaining on his detail when he becomes president). During an assassination attempt on President Underwood, Edward Meechum takes a bullet for the president and shoots and kills the gunman before immediately dying from his injuries.
  • Intelligence (2014): U.S. Secret Service agent Riley Neal (Meghan Ory) is recruited by the U.S. Cyber Command to provide protective services for Cyber Command agent Gabriel Vaughn (Josh Holloway), into whose brain a high-tech microchip has been implanted.
  • Wayward Pines (2015): After a car crash, U.S. Secret Service agent Ethan Burke (Matt Dillon) wakes up in the mysterious town of Wayward Pines, where the inexplicable happens and from which there is no escape.

Video games

Internet security

From Wikipedia, the free encyclopedia

Internet security is a branch of computer security specifically related to not only the Internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing, online viruses, trojans, worms and more.

Many methods are used to protect the transfer of data, including encryption and from-the-ground-up engineering. The current focus is on prevention as much as on real time protection against well known and new threats.

Threats

Malicious software

An internet user can be tricked or forced into downloading software that is of malicious intent onto a computer. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms.
  • Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. The term badware is sometimes used, and applied to both true (malicious) malware and unintentionally harmful software.
  • A botnet is a network of zombie computers that have been taken over by a robot or bot that performs large-scale malicious acts for the creator of the botnet.
  • Computer Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data.
  • Computer worms are programs that can replicate themselves throughout a computer network, performing malicious tasks throughout.
  • Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
  • Scareware is scam software of usually limited or no benefit, containing malicious payloads, that is sold to consumers via certain unethical marketing practices. The selling approach uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user.
  • Spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent.
  • One particular kind of spyware is key logging malware. Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard.
  • A Trojan horse, commonly known as a Trojan, is a general term for malicious software that pretends to be harmless, so that a user willingly allows it to be downloaded onto the computer.

Denial-of-service attacks

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Another way of understanding DDoS is seeing it as attacks in cloud computing environment that are growing due to the essential characteristics of cloud computing. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. According to businesses who participated in an international business security survey, 25% of respondents experienced a DoS attack in 2007 and 16.8% experienced one in 2010. DoS attacks often use bots (or a botnet) to carry out the attack.

Phishing

Phishing is an attack which targets online users for extraction of their sensitive information such as username, password and credit card information. Phishing occurs when the attacker pretends to be a trustworthy entity, either via email or web page. Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails, instant messenger/social media or other avenues. Often tactics such as email spoofing are used to make emails appear to be from legitimate senders, or long complex subdomains hide the real website host. Insurance group RSA said that phishing accounted for worldwide losses of $10.8 billion in 2016.

Application vulnerabilities

Applications used to access Internet resources may contain security vulnerabilities such as memory safety bugs or flawed authentication checks. The most severe of these bugs can give network attackers full control over the computer. Most security applications and suites are incapable of adequate defense against these kinds of attacks.

Remedies

Network layer security

TCP/IP protocols may be secured with cryptographic methods and security protocols. These protocols include Secure Sockets Layer (SSL), succeeded by Transport Layer Security (TLS) for web traffic, Pretty Good Privacy (PGP) for email, and IPsec for the network layer security.

Internet Protocol Security (IPsec)

IPsec is designed to protect TCP/IP communication in a secure manner. It is a set of security extensions developed by the Internet Task Force (IETF). It provides security and authentication at the IP layer by transforming data using encryption. Two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and ESP. These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer. 

The basic components of the IPsec security architecture are described in terms of the following functionalities:
  • Security protocols for AH and ESP
  • Security association for policy management and traffic processing
  • Manual and automatic key management for the Internet key exchange (IKE)
  • Algorithms for authentication and encryption
The set of security services provided at the IP layer includes access control, data origin integrity, protection against replays, and confidentiality. The algorithm allows these sets to work independently without affecting other parts of the implementation. The IPsec implementation is operated in a host or security gateway environment giving protection to IP traffic.

Multi-factor authentication

Multi-factor authentication (MFA) is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Internet resources, such as websites and email, may be secured using multi-factor authentication.

Security token

Some online sites offer customers the ability to use a six-digit code which randomly changes every 30–60 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. The website that the user is logging into would be made aware of that device's serial number and would know the computation and correct time built into the device to verify that the number given is indeed one of the handful of six-digit numbers that works in that given 30-60 second cycle. After 30–60 seconds the device will present a new random six-digit number which can log into the website.

Electronic mail security

Background

Email messages are composed, delivered, and stored in a multiple step process, which starts with the message's composition. When the user finishes composing the message and sends it, the message is transformed into a standard format: an RFC 2822 formatted message. Afterwards, the message can be transmitted. Using a network connection, the mail client, referred to as a mail user agent (MUA), connects to a mail transfer agent (MTA) operating on the mail server. The mail client then provides the sender’s identity to the server. Next, using the mail server commands, the client sends the recipient list to the mail server. The client then supplies the message. Once the mail server receives and processes the message, several events occur: recipient server identification, connection establishment, and message transmission. Using Domain Name System (DNS) services, the sender’s mail server determines the mail server(s) for the recipient(s). Then, the server opens up a connection(s) to the recipient mail server(s) and sends the message employing a process similar to that used by the originating client, delivering the message to the recipient(s).

Pretty Good Privacy (PGP)

Pretty Good Privacy provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm such as Triple DES or CAST-128. Email messages can be protected by using cryptography in various ways, such as the following:
  • Signing an email message to ensure its integrity and confirm the identity of its sender.
  • Encrypting the body of an email message to ensure its confidentiality.
  • Encrypting the communications between mail servers to protect the confidentiality of both message body and message header.
The first two methods, message signing and message body encryption, are often used together; however, encrypting the transmissions between mail servers is typically used only when two organizations want to protect emails regularly sent between each other. For example, the organizations could establish a virtual private network (VPN) to encrypt the communications between their mail servers over the Internet. Unlike methods that can only encrypt a message body, a VPN can encrypt entire messages, including email header information such as senders, recipients, and subjects. In some cases, organizations may need to protect header information. However, a VPN solution alone cannot provide a message signing mechanism, nor can it provide protection for email messages along the entire route from sender to recipient.

Multipurpose Internet Mail Extensions (MIME)

MIME transforms non-ASCII data at the sender's site to Network Virtual Terminal (NVT) ASCII data and delivers it to client's Simple Mail Transfer Protocol (SMTP) to be sent through the Internet. The server SMTP at the receiver's side receives the NVT ASCII data and delivers it to MIME to be transformed back to the original non-ASCII data.

Message Authentication Code

A Message authentication code (MAC) is a cryptography method that uses a secret key to encrypt a message. This method outputs a MAC value that can be decrypted by the receiver, using the same secret key used by the sender. The Message Authentication Code protects both a message's data integrity as well as its authenticity.

Firewalls

A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP) connections.

Role of firewalls in web security

Firewalls impose restrictions on incoming and outgoing Network packets to and from private networks. Incoming or outgoing traffic must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points (borrowed from the identical military term of a combat limiting geographical feature). Firewalls can create choke points based on IP source and TCP port number. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.

Types of firewall

Packet filter
A packet filter is a first generation firewall that processes network traffic on a packet-by-packet basis. Its main job is to filter traffic from a remote IP host, so a router is needed to connect the internal network to the Internet. The router is known as a screening router, which screens packets leaving and entering the network.
Stateful packet inspection
In a stateful firewall the circuit-level gateway is a proxy server that operates at the network level of an Open Systems Interconnection (OSI) model and statically defines what traffic will be allowed. Circuit proxies will forward Network packets (formatted unit of data ) containing a given port number, if the port is permitted by the algorithm. The main advantage of a proxy server is its ability to provide Network Address Translation (NAT), which can hide the user's IP address from the Internet, effectively protecting all internal information from the Internet.
Application-level gateway
An application-level firewall is a third generation firewall where a proxy server operates at the very top of the OSI model, the IP suite application level. A network packet is forwarded only if a connection is established using a known protocol. Application-level gateways are notable for analyzing entire messages rather than individual packets of data when the data are being sent or received.

Browser choice

Web browser statistics tend to affect the amount a Web browser is exploited. For example, Internet Explorer 6, which used to own a majority of the Web browser market share, is considered extremely insecure because vulnerabilities were exploited due to its former popularity. Since browser choice is now more evenly distributed (Internet Explorer at 28.5%, Firefox at 18.4%, Google Chrome at 40.8%, and so on), vulnerabilities are exploited in many different browsers.

Internet security products

Antivirus

Antivirus software and Internet security programs can protect a programmable device from attack by detecting and eliminating malware; Antivirus software was mainly shareware in the early years of the Internet, but there are now several free security applications on the Internet to choose from for all platforms.

Password managers

A password manager is a software application that helps a user store and organize passwords. Password managers usually store passwords encrypted, requiring the user to create a master password; a single, ideally very strong password which grants the user access to their entire password database from top to bottom.

Security suites

So called security suites were first offered for sale in 2003 (McAfee) and contain a suite of firewalls, anti-virus, anti-spyware and more. They also offer theft protection, portable storage device safety check, private Internet browsing, cloud anti-spam, a file shredder or make security-related decisions (answering popup windows) and several were free of charge.

Memory and trauma

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Memory_and_trauma ...