This is the first single-authored, comprehensive treatment of intelligence support to the full range of homeland security practitioners with a focus on counterterrorism and cyber-security. In the post 9/11 era, federal homeland security professionals rely heavily on intelligence to perform their tasks in all mission areas--prevent, protect, mitigate, respond, and recover. But this enterprise also includes hundreds of thousands of state and local government and private sector practitioners who are still exploring how intelligence can act as a force multiplier in helping them achieve their goals. Steiner provides a thorough and in-depth picture of why intelligence is so crucial to homeland security missions, who provides intelligence support to which homeland security customer, and how intelligence products differ depending on the customer's specific needs and duties
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Intro -- DEPARTMENT OF HOMELAND SECURITY INTELLIGENCE ENTERPRISE: OVERVIEW AND ISSUES -- DEPARTMENT OF HOMELAND SECURITY INTELLIGENCE ENTERPRISE: OVERVIEW AND ISSUES -- CONTENTS -- PREFACE -- Chapter 1 THE DEPARTMENT OF HOMELAND SECURITY INTELLIGENCE ENTERPRISE: OPERATIONAL OVERVIEW AND OVERSIGHT CHALLENGES FOR CONGRESS -- SUMMARY -- INTRODUCTION -- OFFICE OF INTELLIGENCE AND ANALYSIS (I&A) -- The Homeland Security Intelligence Mission -- I&A Customers -- Integrating the DHS IE -- Homeland Security Intelligence Council (HSIC) -- Budget -- I&A Organization -- The Analysis Mission -- I&A Intelligence Products -- Intelligence Support to State, Local, Tribal Officials, and the Private Sector -- State and Local Fusion Center Program -- Intelligence Threat Assessment and Coordination Group (ITACG) -- Mission Integration -- Integrated Border Intelligence Program (IBIP) -- National Applications Office (NAO) -- Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) -- Operations Coordination and Planning Directorate (OPS)-Intelligence Division -- U.S. CUSTOMS AND BORDER PROTECTION (CBP) INTELLIGENCE ELEMENT -- CBP Office of Intelligence and Operations Coordination (OIOC) -- CBP Intelligence Support to DHS and CBP Missions -- At Ports of Entry -- National Targeting Center (NTC) -- NTC-Passenger (NTCP) -- NTC-Cargo (NTCC) -- Between POE's -- Border Field Intelligence Center (BORFIC) -- Air and Marine Operations Center (AMOC) -- Intelligence Driven Special Operations (IDSO) -- IMMIGRATION AND CUSTOMS ENFORCEMENT (ICE) INTELLIGENCE ELEMENT -- Office of Intelligence -- Intelligence Programs Division -- Border Violence Intelligence Cell (BVIC) -- Border Enforcement Security Task Forces (BEST) -- Armas Cruzadas -- Operation Firewall -- Collection Management and Requirements Division -- Field Intelligence Groups (FIG).
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Of the many challenges faced by the Department of Homeland Security & its intelligence enterprise, developing a common culture remains one of the most daunting tasks. Intelligence Preparation of the Battlespace (IPB) provides an analytical methodology that could cultivate a common analytical culture in the homeland security intelligence community, which is key to the community's effectiveness in thwarting a terrorist attack against the United States. Adapted from the source document.
In: The SAIS review of international affairs / the Johns Hopkins University, the Paul H. Nitze School of Advanced International Studies (SAIS), Band 28, Heft 1, S. 75-87
In: The SAIS review of international affairs / the Johns Hopkins University, the Paul H. Nitze School of Advanced International Studies (SAIS), Band 28, Heft 1, S. 75-87
This article appeared in Strategic Insights (December 2002), v.1 no.10 ; September 11, 2001 demonstrated that policy makers and intelligence organizations had conducted business in traditional ways, not in response to today's threats to our nation. The attacks in September suggest that inadequate information sharing between law enforcement and national intelligence agencies led to lost opportunities to thwart the attacks launched by Al-Qaeda. Little has yet been done to fix many of these problems. The nation has failed to formulate significant changes in the way it tasks, collects, analyzes, produces and disseminates intelligence information. The architecture needed to provide intelligence for homeland defense has not yet emerged. The September 11 attacks are a watershed event that should change our current intelligence organization, perhaps resulting in legislation as important as the National Security Act of 1947.
Protecting the homeland -- The origins of the homeland security enterprise -- The creation of the Department of Homeland Security -- The role of the intelligence community -- The role of homeland security agencies -- The role of other security agencies -- Counterintelligence missions -- Domestic threats and national security -- Homeland vs. national vs. practical intelligence -- Making the system work -- The future of intelligence in homeland security.
Part I. Homeland security and organization and administration: a first look at homeland security organization / Keith Gregory Logan; Law and policy in homeland security and emergency management / Emily Bentley; Private sector and homeland security / Michael Chumer -- Part II. Homeland security resources: critical infrastructure protection / Steven D. Hart and James Ramsay; Homeland security intelligence / William J. Lahneman; Defense Support of civil authorities / Bert Tussing; Homeland security technology / Randy Griffith; Environmental security and public health / Terry O'Sullivan and James Ramsay -- Part III. Homeland security strategies: emergency management / Scott Robinson; Strategic communication for homeland security / Gail Fann Thomas; Strategic planning / Samuel H. Clovis, Jr.; American and terrorism in the twenty-first century / George Michael; Terrorism and counterterrorism: defending our communities at the local level / Michael L. Hummel.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext: