Indian Issues: BLM's Program for Issuing Individual Indian Allotments on Public Lands Is No Longer Viable (open access)

Indian Issues: BLM's Program for Issuing Individual Indian Allotments on Public Lands Is No Longer Viable

Correspondence issued by the Government Accountability Office with an abstract that begins "Beginning in the late nineteenth century the federal government began an effort to assimilate Indians by transferring them from communal tribal existence to individual land ownership. The Act of February 8, 1887, commonly referred to as the General Allotment Act, initiated the federal government's Indian allotment policy. The act authorized the President to allot parcels of land to individual Indians--generally in sizes of 40, 80, or 160 acres--on Indian reservations and on public lands. The act was implemented by the Department of the Interior's (Interior) Bureau of Indian Affairs (BIA) and Bureau of Land Management (BLM). Under this authority, BIA issued millions of acres of individual allotments on Indian reservations, and BLM issued thousands of acres of individual Indian allotments on public lands. However, in 1934, the Indian Reorganization Act largely reversed the federal government's Indian allotment policy and replaced it with a policy that encouraged tribal self-governance. Section 5 of the Indian Reorganization Act also provided the Secretary of the Interior new authority to acquire land, on and off reservations, on behalf of federally recognized tribes or their members. While the Indian Reorganization Act ended BIA's authority …
Date: October 20, 2006
Creator: United States. Government Accountability Office.
Object Type: Text
System: The UNT Digital Library
Managing Sensitive Information: DOJ Needs a More Complete Staffing Strategy for Managing Classified Information and a Set of Internal Controls for Other Sensitive Information (open access)

Managing Sensitive Information: DOJ Needs a More Complete Staffing Strategy for Managing Classified Information and a Set of Internal Controls for Other Sensitive Information

A letter report issued by the Government Accountability Office with an abstract that begins "The September 11 attacks showed that agencies must balance the need to protect and share sensitive information to prevent future attacks. Agencies classify this information or designate it sensitive but unclassified to protect and limit access to it. The National Archives' Information Security Oversight Office (ISOO) assesses agencies' classification management programs, and in July 2004 and April 2005 recommended changes to correct problems at the Justice Department (DOJ) and Federal Bureau of Investigation (FBI). GAO was asked to examine (1) DOJ's and FBI's progress in implementing the recommendations and (2) the management controls DOJ components have to ensure the proper use of sensitive but unclassified designations. GAO reviewed ISOO's reports and agency documentation on changes implemented and controls in place, and interviewed security program managers at DOJ, its components, and ISOO to examine these issues."
Date: October 20, 2006
Creator: United States. Government Accountability Office.
Object Type: Report
System: The UNT Digital Library
Homeland Security: Opportunities Exist to Enhance Collaboration at 24/7 Operations Centers Staffed by Multiple DHS Agencies (open access)

Homeland Security: Opportunities Exist to Enhance Collaboration at 24/7 Operations Centers Staffed by Multiple DHS Agencies

A letter report issued by the Government Accountability Office with an abstract that begins "Because terrorists do not operate on a 9-5 schedule, the Department of Homeland Security (DHS) and its operational components have established information gathering and analysis centers that conduct activities 24 hours a day, 7 days a week, 365 days a year. Staff at these operations centers work to help detect, deter, and prevent terrorist acts. DHS has determined that out of 25 operations centers, four require higher levels of collaboration that can only be provided by personnel from multiple DHS agencies, and other federal, and sometimes state and local, agencies. For these four multi-agency operations centers, this report (1) describes their missions, products, functions, and customers and (2) assesses the extent to which DHS efforts to promote collaboration among the multiple agencies responsible for the centers reflect key practices for enhancing and sustaining collaborative efforts. To do so, GAO visited operations centers, reviewed data and reports from the centers, and interviewed center and other DHS officials."
Date: October 20, 2006
Creator: United States. Government Accountability Office.
Object Type: Report
System: The UNT Digital Library
Commercial Space Launches: FAA Needs Continued Planning and Monitoring to Oversee the Safety of the Emerging Space Tourism Industry (open access)

Commercial Space Launches: FAA Needs Continued Planning and Monitoring to Oversee the Safety of the Emerging Space Tourism Industry

A letter report issued by the Government Accountability Office with an abstract that begins "In 2004, the successful launches of SpaceShipOne raised the possibility of an emerging U.S. commercial space tourism industry that would make human space travel available to the public. The Federal Aviation Administration (FAA), which has responsibility for safety and industry promotion, licenses operations of commercial space launches and launch sites. To allow the industry to grow, Congress prohibited FAA from regulating crew and passenger safety before 2012, except in response to high-risk events. GAO evaluated FAA's (1) safety oversight of commercial space launches, (2) response to emerging issues, and (3) challenges in regulating and promoting space tourism and responding to competitive issues affecting the industry. GAO reviewed FAA's applicable safety oversight processes and interviewed federal and industry officials."
Date: October 20, 2006
Creator: United States. Government Accountability Office.
Object Type: Report
System: The UNT Digital Library
Information Security: Agencies Need to Develop and Implement Adequate Policies for Periodic Testing (open access)

Information Security: Agencies Need to Develop and Implement Adequate Policies for Periodic Testing

A letter report issued by the Government Accountability Office with an abstract that begins "Agencies rely extensively on computerized information systems and electronic data to carry out their missions. To ensure the security of the information and information systems that support critical operations and infrastructure, federal law and policy require agencies to periodically test and evaluate the effectiveness of their information security controls at least annually. GAO was asked to evaluate the extent to which agencies have adequately designed and effectively implemented policies for testing and evaluating their information security controls. GAO surveyed 24 major federal agencies and analyzed their policies to determine whether the policies address important elements for periodic testing. GAO also examined testing documentation at 6 agencies to assess the quality and effectiveness of testing on 30 systems."
Date: October 20, 2006
Creator: United States. Government Accountability Office.
Object Type: Report
System: The UNT Digital Library