It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The Shadow Government Following a catastrophic national emergency, the President, or his successor can authorize the establishment of a temporary "shadow government" to maintain control of the essential functions of the Federal Government. President Bush activated the shadow government on September 11, 2001 shortly after the second attack on the World Trade Center. Every federal agency has designated key individuals to be part of an "Emergency Relocation Group". These ERGs are assigned to an alternate secure location on a rotating basis and are ready to take over the duty of supporting the National Essential Functions of this nation in an emergency.
COGCON Levels The Continuity of Government Readiness Conditions (COGCON) system establishes executive branch readiness levels based on possible threats to the National Capital Region. The President alone determines and issues the COGCON Level. READINES FEDERAL CONTINUITY RESPONSE
COGCON 4 Federal executive branch government employees at their normal work locations. Maintain alternate facility and conduct periodic continuity readiness exercises.
COGCON 3 continuity staff. Track agency leaders and successors daily.
COGCON 2 Deployment of 50-75% of Emergency Relocation Group continuity staff to alternate locations.Establish their ability to conduct operations and prepare to perform their organization’s essential functions in the event of a catastrophic emergency
COGCON 1 Full deployment of designated leadership and continuity staffs to perform the organization’s essential functions from alternate facilities either as a result of, or in preparation for, a catastrophic emergency.
Federal agencies and departments Advance offsite Relocation and capabilities, Teams which “warm include up” their testing alternate sites
Upon activation, communications troops would report and IT to systems. their assigned Ensure that "Civilian Control District". The military would alternate impose curfews facilities until are the prepared chaos to subsided. receive Citizens would be required to carry identification at all times. The civilian judicial system would be temporarily halted until full order was restored. Military forces would have the authority to imprison rioters, looters and other civilians committing criminal offenses. Anyone failing to heed the orders of the military would be arrested and held in temporary detention camps until the civilian judicial process was restored. Special military units acting under the authority of classified JCS CONPLAN 0300-97 would detain Main Core watch-listed individuals in the Special Circumstances Section of the federal detention camps.
White House believes the ability to rapidly expand Presidential Powers in a crisis is a matter of National Security. Because it is impossible to anticipate every possible catastrophic scenario, draft Presidential Emergency-Action Directives (PEADs) have been prepared in advance allowing the White House to fill in the blanks as needed during a crisis Under a recent Cybersecurity Act, the President has the right to shut down parts of the Internet in times of an emergency. This would be accomplished by having the National Security Agency shut down key Domain Name Servers.
The Office of Defense Nuclear Security is responsible for the overall policy direction and assessment of security programs at NNSA facilities. To support NA-70 with its mission, Mele will continue to provide technical and analytical support services to NA-70 in the following technical areas:
• Technical and Program Management Support;
• Strategic Communication Management Support;
• Ad Hoc Program Support;
• Headquarters Security Operations Support;
• Headquarters Security Incident Support;
• Headquarters Classified Matter Protection and Control Support;
• North Atlantic Treaty Organization Program Support;
• Foreign Interests Program Support;
• Continuity of Operations Program;
• Security Education, Awareness and Outreach;
• Classification and Controlled Information Program Technical Support;
• Classification and Declassification Reviews;
• Sensitive Unclassified Reviews;
• Operations Support;
• Subject Matter Expertise;
• Safeguards and Security Information Management Systems;
• DNS Program Support;
• DNS Metrics;
• Implementation and Guidance Development;
• HSPD-12 Program Management;
• International Treaties and Arms Control Agreements Program Support