Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Understanding hs ch 11

267 views

Published on

Understanding Homeland Security

Published in: Government & Nonprofit
  • Be the first to comment

  • Be the first to like this

Understanding hs ch 11

  1. 1. Chapter 11 Always VigilantAlways Vigilant Intelligence and Hardening the TargetIntelligence and Hardening the Target Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  2. 2.  Background: Intelligence Collection andBackground: Intelligence Collection and JurisdictionJurisdiction  The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission  The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  3. 3.  Background: Intelligence Collection andBackground: Intelligence Collection and JurisdictionJurisdiction  FBI and Domestic Intelligence Collection AuthorityFBI and Domestic Intelligence Collection Authority  CIA and International Intelligence CollectionCIA and International Intelligence Collection AuthorityAuthority  Diplomatic Security Service AuthorityDiplomatic Security Service Authority Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  4. 4.  The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission  Office of the Director of National IntelligenceOffice of the Director of National Intelligence  National Security AgencyNational Security Agency  Central Intelligence AgencyCentral Intelligence Agency  Federal Bureau of InvestigationFederal Bureau of Investigation Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  5. 5.  The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges  Problems of Intelligence CoordinationProblems of Intelligence Coordination  Case in Point: Successful International IntelligenceCase in Point: Successful International Intelligence CooperationCooperation  Problems of Collection and AnalysisProblems of Collection and Analysis  Report on the U.S. Intelligence Community’s Prewar Intelligence Assessments on Iraq Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  6. 6.  Critical Infrastructure: Background and ContextCritical Infrastructure: Background and Context  Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)  Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and Target HardeningTarget Hardening Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  7. 7.  Critical Infrastructure: Background andCritical Infrastructure: Background and ContextContext  Defining Critical InfrastructureDefining Critical Infrastructure  Presidential Decision Directive/NSC-63Presidential Decision Directive/NSC-63  Homeland Security Policy Directive (HSPD)-7Homeland Security Policy Directive (HSPD)-7  Presidential Policy Directive (PPD)-21Presidential Policy Directive (PPD)-21  Target HardeningTarget Hardening  Hardening the Target: Public-Private ContextHardening the Target: Public-Private ContextMartin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  8. 8.  Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)  Science and Technology Directorate, InfrastructureScience and Technology Directorate, Infrastructure Protection and Disaster Management DivisionProtection and Disaster Management Division  Case in Point:Case in Point: Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, Edition 2 Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  9. 9.  Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and Target HardeningTarget Hardening  Innovative Options for Securing CriticalInnovative Options for Securing Critical InfrastructureInfrastructure  Perimeter SecurityPerimeter Security  Urban Design Features and LandscapingUrban Design Features and Landscaping  Glazing TechniquesGlazing Techniques  Architectural BarriersArchitectural Barriers  Electronic Warning and Detection TechnologiesElectronic Warning and Detection Technologies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  10. 10.  Security Considerations and Patrolling theSecurity Considerations and Patrolling the BorderBorder  Hardening the Border: Three AgenciesHardening the Border: Three Agencies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  11. 11.  Security Considerations and Patrolling theSecurity Considerations and Patrolling the BorderBorder  Evolution of the U.S. Border PatrolEvolution of the U.S. Border Patrol  First Border Patrol AcademyFirst Border Patrol Academy  Second World WarSecond World War  After September 11, 2001After September 11, 2001 Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  12. 12.  Hardening the Border: Three AgenciesHardening the Border: Three Agencies  U.S. Citizenship and Immigration ServicesU.S. Citizenship and Immigration Services  U.S. Immigration and Customs EnforcementU.S. Immigration and Customs Enforcement  U.S. Customs and Border ProtectionU.S. Customs and Border Protection Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  13. 13.  A Complex Arrangement: Components of theA Complex Arrangement: Components of the Transportation SystemTransportation System  The Transportation Security AdministrationThe Transportation Security Administration Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  14. 14.  A Complex Arrangement: Components of theA Complex Arrangement: Components of the Transportation SystemTransportation System  Aviation and the U.S. Federal AviationAviation and the U.S. Federal Aviation AdministrationAdministration  Motor Transportation NetworksMotor Transportation Networks  RailwaysRailways Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  15. 15.  The Transportation Security AdministrationThe Transportation Security Administration  Aviation and Transportation Security Act of 2001Aviation and Transportation Security Act of 2001  Federal Air Marshal ServiceFederal Air Marshal Service  TSA ServicesTSA Services Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  16. 16.  Cyber-Terror: The ThreatCyber-Terror: The Threat  Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets  Case in Point: Information Security andCase in Point: Information Security and CyberwarCyberwar  Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  17. 17.  Cyber-Terror: The ThreatCyber-Terror: The Threat  The Internet and the New TerrorismThe Internet and the New Terrorism  Uses of the InternetUses of the Internet  CyberwarCyberwar  CyberterrorismCyberterrorism Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  18. 18.  Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets  Private Corporations, TelecommunicationsPrivate Corporations, Telecommunications Companies, Government AgenciesCompanies, Government Agencies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  19. 19.  Case in Point: Information Security andCase in Point: Information Security and CyberwarCyberwar  New Technologies as Counterterrorist WeaponsNew Technologies as Counterterrorist Weapons  Modern Surveillance TechnologiesModern Surveillance Technologies  EchelonEchelon Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  20. 20.  Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood  Feasibility: Availability of TechnologiesFeasibility: Availability of Technologies  Likelihood: A Moot Point?Likelihood: A Moot Point? Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

×