SlideShare a Scribd company logo
1 of 2
(Boston Globe, 24APR13): *A federal audit … warned there
was a “high risk” that the government’s information-sharing
system would not prevent a terror attack, raising questions
about whether a communications breakdown allowed the Boston
Marathon bomb plot to evolve undetected and its perpetrators to
elude quick capture.
US officials disclosed that the CIA had placed Tamerlan
Tsarnaev on a terrorism watch list several months after the FBI
had placed him on a different watch list. Both actions were
based on separate alerts provided by Russian authorities, but
they failed to help the United States recognize and intervene to
head off the threat or identify Tsarnaev as a suspect once the
bombs went off. The Commonwealth Fusion Center is located in
Maynard, Mass…. The Massachusetts State Police did not
respond to questions about whether the center was alerted to the
FBI’s concerns about Tsarnaev.
Is this information-sharing mix-up an isolated event or could
there be other instances? If so, what would be the first step in
“tightening up” Fusion Centers?
Question # 2
After reviewing the capabilities and limitations of the different
INTs, do the following:
Select a Homeland Security issue (terrorism, drugs, human
trafficking, counterfeiting, counterintelligence, or another) that
is important today.
Briefly explain which INT is most relevant to this issue, and
how the capabilities of that INT are related to the Cold War
history.
Remember to cite your sources and provide a list of references.

More Related Content

More from kendalfarrier

More from kendalfarrier (20)

Explain which HRIS types your current or previous employer uti.docx
Explain which HRIS types your current or previous employer uti.docxExplain which HRIS types your current or previous employer uti.docx
Explain which HRIS types your current or previous employer uti.docx
 
Explain whether you believe it is U.S. consumers or policy makers wh.docx
Explain whether you believe it is U.S. consumers or policy makers wh.docxExplain whether you believe it is U.S. consumers or policy makers wh.docx
Explain whether you believe it is U.S. consumers or policy makers wh.docx
 
Explain whether psychotherapy has a biological basis. Explain how cu.docx
Explain whether psychotherapy has a biological basis. Explain how cu.docxExplain whether psychotherapy has a biological basis. Explain how cu.docx
Explain whether psychotherapy has a biological basis. Explain how cu.docx
 
Explain what the textbook author says about each theme present. Pr.docx
Explain what the textbook author says about each theme present. Pr.docxExplain what the textbook author says about each theme present. Pr.docx
Explain what the textbook author says about each theme present. Pr.docx
 
Explain what should qualify as global leadership considering the dep.docx
Explain what should qualify as global leadership considering the dep.docxExplain what should qualify as global leadership considering the dep.docx
Explain what should qualify as global leadership considering the dep.docx
 
Explain what is mean by media planning and how advertisers decide .docx
Explain what is mean by media planning and how advertisers decide .docxExplain what is mean by media planning and how advertisers decide .docx
Explain what is mean by media planning and how advertisers decide .docx
 
Explain what communication barriers are, then describe a situation t.docx
Explain what communication barriers are, then describe a situation t.docxExplain what communication barriers are, then describe a situation t.docx
Explain what communication barriers are, then describe a situation t.docx
 
Explain what areas a forensic psychology professional may like.docx
Explain what areas a forensic psychology professional may like.docxExplain what areas a forensic psychology professional may like.docx
Explain what areas a forensic psychology professional may like.docx
 
Explain two major differences between common-sense understandings an.docx
Explain two major differences between common-sense understandings an.docxExplain two major differences between common-sense understandings an.docx
Explain two major differences between common-sense understandings an.docx
 
Explain three forces leading companies to pursue international ope.docx
Explain three forces leading companies to pursue international ope.docxExplain three forces leading companies to pursue international ope.docx
Explain three forces leading companies to pursue international ope.docx
 
Explain the various forms of social engineering tactics that hackers.docx
Explain the various forms of social engineering tactics that hackers.docxExplain the various forms of social engineering tactics that hackers.docx
Explain the various forms of social engineering tactics that hackers.docx
 
Explain the two major types of bias. Identify a peer-reviewed epidem.docx
Explain the two major types of bias. Identify a peer-reviewed epidem.docxExplain the two major types of bias. Identify a peer-reviewed epidem.docx
Explain the two major types of bias. Identify a peer-reviewed epidem.docx
 
Explain the users role in an OS.Explain the differences b.docx
Explain the users role in an OS.Explain the differences b.docxExplain the users role in an OS.Explain the differences b.docx
Explain the users role in an OS.Explain the differences b.docx
 
Explain the tone and figurative language in the following paragraph..docx
Explain the tone and figurative language in the following paragraph..docxExplain the tone and figurative language in the following paragraph..docx
Explain the tone and figurative language in the following paragraph..docx
 
Explain the suicide-related forensic assessment procedures uti.docx
Explain the suicide-related forensic assessment procedures uti.docxExplain the suicide-related forensic assessment procedures uti.docx
Explain the suicide-related forensic assessment procedures uti.docx
 
Explain the sociological perspective on race How is it different th.docx
Explain the sociological perspective on race How is it different th.docxExplain the sociological perspective on race How is it different th.docx
Explain the sociological perspective on race How is it different th.docx
 
explain the significance of Umayyad al-Andalus and the main feat.docx
explain the significance of Umayyad al-Andalus and the main feat.docxexplain the significance of Umayyad al-Andalus and the main feat.docx
explain the significance of Umayyad al-Andalus and the main feat.docx
 
Explain the similarities and differences between vicarious trauma .docx
Explain the similarities and differences between vicarious trauma .docxExplain the similarities and differences between vicarious trauma .docx
Explain the similarities and differences between vicarious trauma .docx
 
Explain the role of the community health nurse in partnership with.docx
Explain the role of the community health nurse in partnership with.docxExplain the role of the community health nurse in partnership with.docx
Explain the role of the community health nurse in partnership with.docx
 
Explain the Routine Activities Theory (Cohen & Felson, 1979) and the.docx
Explain the Routine Activities Theory (Cohen & Felson, 1979) and the.docxExplain the Routine Activities Theory (Cohen & Felson, 1979) and the.docx
Explain the Routine Activities Theory (Cohen & Felson, 1979) and the.docx
 

(Boston Globe, 24APR13) A federal audit … warned there was a hi

  • 1. (Boston Globe, 24APR13): *A federal audit … warned there was a “high risk” that the government’s information-sharing system would not prevent a terror attack, raising questions about whether a communications breakdown allowed the Boston Marathon bomb plot to evolve undetected and its perpetrators to elude quick capture. US officials disclosed that the CIA had placed Tamerlan Tsarnaev on a terrorism watch list several months after the FBI had placed him on a different watch list. Both actions were based on separate alerts provided by Russian authorities, but they failed to help the United States recognize and intervene to head off the threat or identify Tsarnaev as a suspect once the bombs went off. The Commonwealth Fusion Center is located in Maynard, Mass…. The Massachusetts State Police did not respond to questions about whether the center was alerted to the FBI’s concerns about Tsarnaev. Is this information-sharing mix-up an isolated event or could there be other instances? If so, what would be the first step in “tightening up” Fusion Centers? Question # 2 After reviewing the capabilities and limitations of the different INTs, do the following: Select a Homeland Security issue (terrorism, drugs, human trafficking, counterfeiting, counterintelligence, or another) that
  • 2. is important today. Briefly explain which INT is most relevant to this issue, and how the capabilities of that INT are related to the Cold War history. Remember to cite your sources and provide a list of references.