SlideShare a Scribd company logo
1 of 27
EXAM NOTES for the Certified in Homeland Security – Level II
Developed as a courtesy by:
Dave Sweigert, CEH, CHS-II, CISA, CISSP, HCISPP, PMP, SEC+
Key points: two circles (1) risk management (2) intelligence
The core of the CHS-II test is the DHS Risk Management Framework
Core concepts:
Risk Analysis – The development of a quantitative estimate of risk based on technical
evaluation and mathematical techniques for combining estimates of incident likelihood
and consequences.
Risk Assessment – The process by which results of a risk analysis are used to make
decisions, either through relative ranking of risks and risk reduction strategies or
through comparison with risk targets.
Risk Management – The ongoing process of planning, organizing, leading and
controlling people, assets, and activities to minimize the potential consequences
and/or probability of risks identified and appraised through risk assessment.
DHS Risk managementCycle
5 DHS Risk Management principles:
 Unity of Effort – risk management efforts should be coordinated and
integrated among the organization as a whole.
 Transparency – open and direct communication is essential to effective
security risk management.
 Adaptability – risk management strategies and processes should be designed
to be flexible and responsive to change.
 Practicality – homeland security risk management cannot eliminate all
uncertainty nor identify all risks.
 Customization – risk management efforts should be structured and tailored to
fit the needs and values of the organization.
What are the parts of the Intelligence process?
Planning and direction, Collection, Processing and exploitation, Analysis and
production, Dissemination and integration
Scientific & Technical Intelligence?
Encompasses foreign developments in S&T w/warfare potential
Estimative Intelligence?
Forecasts the unknown based on an analysis of known facts using techniques
such as pattern analysis, inference, and statistical probability.
Current intelligence?
Provides updated support for ongoing ops across the range of military
operations (ROMO)
Warning intelligence?
Very time-sensitive. Forewarns of adversary actions or intentions.
Research Intelligence?
Basic intelligence or Intelligence for operational support
The NIPP
DHS TVC Analysis
Natural Hazards Analysis
There is a solid foundation of data, models, and scholarship to underpin the Federal
Emergency Management Agency’s (FEMA’s) risk analyses for earthquakes, flooding,
and hurricanes which uses the Risk = T × V × C model. This paradigm has been
applied to natural hazards, especially flooding, more than a century. Perhaps the
earliest use of the Risk = T × V × C model—often referred to as “probabilistic risk
assessment” in other fields—dates to its use in forecasting flood risks on the Thames
in the nineteenth century.
Terror attacks
1978-1995 - Three people die and 23 others are wounded after a string of mail
bombings carried out by Ted Kaczynski. "The Unabomber," as he is also known, is
serving eight life sentences for murder. He was not charged with terrorism, but the
string of bombings is considered to be a terror case.
February 26, 1993 - A bomb explodes on the second subterranean level of Vista
Hotel's public parking garage, below the 2 World Trade Center building. Six people
are killed, and more than 1,000 people are treated for injuries. Six suspects are
convicted of participating in the bombing. The seventh suspect, Abdul Rahman Yasin,
is still at large.
April 19, 1995 - A bomb rips through the Alfred P. Murrah Federal Building in
Oklahoma City, Oklahoma, killing 168 people and injuring almost 700. Timothy
McVeigh is convicted on federal murder charges and executed in 2001.
July 27, 1996 - A bomb explodes in Centennial Olympic Park in Atlanta during the
middle of a concert during the Summer Olympics. One person is killed, another dies
from a heart attack, and 111 others are injured. Bombing suspect Eric Robert
Rudolph is arrested in North Carolina in 2003, after being indicted in 2000 for the
Atlanta bombing and for other bombings, including one at an abortion clinic where
one person died. Rudolph is serving four consecutive sentences of life in prison plus
120 years for the attacks.
September 11, 2001 - Nineteen al Qaeda members hijack four US passenger
airliners. Two are flown into the Twin Towers in New York, one crashes into the
Pentagon and another crashes into the Pennsylvania countryside after passengers
attempt to wrest control of the aircraft to prevent an attack on the US Capitol. At the
World Trade Center site 2,753 people are killed; 184 at the Pentagon; and 40 in
Shanksville, Pennsylvania. A total of 2,977 people are killed.
Richard Colvin Reid (born 12 August 1973), also known as the Shoe Bomber, is
a British man arrested as the prime suspect who attempted to detonate explosives
packed into the shoes he was wearing, while on American Airlines Flight 63 from
Paris to Miami on December 22, 2001.
The D.C. or Beltway sniper attacks were a series of coordinated shootings that
took place over three weeks in October 2002 in Maryland, Virginia, and
Washington, D.C. Ten people were killed and three other victims were critically
injured in several locations throughout the Washington, D.C., metropolitan area and
along Interstate 95 in Virginia.
November 5, 2009 - Major Nidal Hassan goes on a shooting rampage at a military
processing center at Fort Hood, Texas, killing 13 and wounding 32. Hassan is
convicted of 13 counts of murder and 32 counts of attempted murder. He is given the
death penalty. Hassan is not charged with terrorism, but the rampage is considered
by many to be a terror incident.
On May 1, 2010, an attempted terrorist attack occurred in Times Square in
Manhattan, New York. Two street vendors alerted New York City security personnel
after they spotted smoke coming from a vehicle, and a car bomb was
discovered.[1][2] The bomb had been ignited, but failed to explode, and was
disarmed before it caused any casualties.[1][3][4] Two days later, federal agents
arrested Faisal Shahzad, a 30-year-old Pakistan-born resident of Bridgeport,
Connecticut, who had become a U.S. citizen in April 2009.
April 15, 2013 - Twin bomb blasts explode near the finish line of the Boston
Marathon, killing three and wounding at least 264. Suspect Dzhokhar Tsarnaev is
charged by the US government with one count of using and conspiring to use a
weapon of mass destruction resulting in death and one count of malicious destruction
of property by means of an explosive device resulting in death. He is given the death
penalty on June 25, 2015.
July 16, 2015 - Mohammad Abdulazeez opens fire on a military recruiting center and
a Navy reserve facility in Chattanooga, Tennessee, killing four US Marines and a
Navy sailor. FBI Director James Comey later says Abdulazeez's actions were
"motivated by foreign terrorist organization propaganda," adding that it's difficult to
determine which terrorist group may have inspired him.
December 2, 2015 - Married couple Syed Rizwan Farook and Tashfeen Malik open
fire on a holiday party taking place at Inland Regional Center in San Bernardino,
California, killing 14 people. Investigators believe the couple was self-radicalized.
http://www.cnn.com/2013/04/18/us/u-s-terrorist-attacks-fast-facts/
The Six Steps of the Intelligence Community
The Intelligence Cycle is the process of developing raw information into finished intelligence for
policymakers to use in decision-making and action. There are five steps which constitute the
Intelligence Cycle.
1. Identify Requirements
Requirements refer to the information that is needed.
2. Planning and Direction
This is management of the entire effort, from identifying the need for data to delivering an
intelligence product to a consumer. It is the beginning and the end of the cycle--the beginning
because it involves drawing up specific collection requirements and the end because finished
intelligence, which supports policy decisions, generates new requirements.
3. Collection
...is the gathering of the raw information needed to produce finished intelligence. There are many
sources of information including open sources such as foreign broadcasts, newspapers,
periodicals, and books. Open source reporting is integral to CIA's analytical capabilities. There are
also secret sources of information. CIA's operations officers collect such information from agents
abroad and from defectors who provide information obtainable in no other way.
4. Processing
...involves converting the vast amount of information collected to a form usable by analysts through
decryption, language translations, and data reduction.
5. All Source Analysis and Production
...is the conversion of basic information into finished intelligence. It includes integrating, evaluating,
and analyzing all available data--which is often fragmentary and even contradictory--and preparing
intelligence products. Analysts, who are subject-matter specialists, consider the information's
reliability, validity, and relevance. They integrate data into a coherent whole, put the evaluated
information in context, and produce finished intelligence that includes assessments of events and
judgments about the implications of the information for the United States.
6. Dissemination
The last step, which logically feeds into the first, is the distribution of the finished intelligence to the
consumers, the same policymakers whose needs initiated the intelligence requirements. Finished
intelligence is hand-carried daily to the President and key national security advisers. The
policymakers, the recipients of finished intelligence, then make decisions based on the information,
and these decisions may lead to the levying of more requirements, thus triggering the Intelligence
Cycle
Quadrennial Homeland Security Review (QHSR)
The purpose of the first-ever Quadrennial Homeland Security Review (QHSR) is to
outline the strategic framework to guide the activities of participants in homeland
security toward a common end. A safe and secure homeland must mean more than
preventing terrorist attacks from being carried out. It must also ensure that the liberties
of all Americans are assured, privacy is protected, and the means by which we
interchange with the world—through travel, lawful immigration, trade, commerce, and
exchange—are secured.
https://www.dhs.gov/quadrennial-homeland-security-review#
3 KEY CONCEPTS
5 DHS MISSION AREAS
2014 Quadrennial Homeland Security Review
THE FIVE HOMELAND SECURITY MISSIONS
The first quadrennial review established the five enduring missions of homeland
security. This review reaffirms the five-mission structure and updates the missions
(detailed in the Mission Framework In Depth section). The updated missions are:
 Prevent Terrorism and Enhance Security;
 Secure and Manage Our Borders;
 Enforce and Administer Our Immigration Laws;
 Safeguard and Secure Cyberspace; and
 Strengthen National Preparedness and Resilience.
https://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf
PRESIDENTIAL DIRECTIVES
PPD 8
National Preparedness
Presidential Policy Directive / PPD-8 is aimed at strengthening the security and resilience
of the United States through systematic preparation for the threats that pose the greatest
risk to the security of the nation, including acts of terrorism, cyber-attacks, pandemics,
and catastrophic natural disasters.
 States the goal: “A secure and resilient nation with the capabilities
required across the whole community to prevent, protect against,
mitigate, respond to and recover from the threats and hazards that
pose the greatest risk.”
 Defines a series of national preparedness elements (called core
capabilities) that we need to achieve the goal.
 Emphasizes the need for the whole community to work together in a
variety of ways and make the best use of resources.
The National Preparedness Goal defines what it means for the whole
community to be prepared for all types of disasters and emergencies.
The goal itself is succinct:
“A secure and resilient nation with the capabilities required across
the whole community to prevent, protect against, mitigate, respond
to, and recover from the threats and hazards that pose the greatest
risk.”
The National Preparedness Goal organizes the core capabilities into
the five mission areas:
 Prevention. Prevent, avoid or stop an imminent, threatened or
actual act of terrorism.
 Protection. Protect our citizens, residents, visitors and assets
against the greatest threats and hazards in a manner that allows
our interests, aspirations and way of life to thrive.
 Mitigation. Reduce the loss of life and property by lessening the
impact of future disasters.
 Response. Respond quickly to save lives, protect property and
the environment, and meet basic human needs in the aftermath of
a catastrophic incident.
 Recovery. Recover through a focus on the timely restoration,
strengthening and revitalization of infrastructure, housing and a
sustainable economy, as well as the health, social, cultural,
historic and environmental fabric of communities affected by a
catastrophic incident.
PPD 21
Critical Infrastructure Security and Resilience
The Presidential Policy Directive (PPD) on Critical Infrastructure Security and
Resilience advances a national unity of effort to strengthen and maintain secure,
functioning, and resilient critical infrastructure.
MISSION OF DHS PER Quadrennial Homeland Security Review (QHSR)
 Prevent terrorism and enhance security
 Secure and manage our borders
 Enforce and administer our immigration laws
 Safeguard and secure cyberspace
 Strengthen national preparedness and resilience
Key points:
 DHS combines 22 various federal agencies
 Established by the Homeland Security Act (Public Law 107-296)
 DHS officially operational on March 1, 2003
VNSA
Violent non-state actors (VNSA), also known as armed non-state actors, are non-
state actors, i.e. "individuals or organizations that have economic, political or social
power and are able to influence at a national and sometimes international level but do
not belong to or ally themselves to any particular country or state,"[1] who employ
violence in pursuit of their objectives. The term has been used in several papers
published by the U.S. military.[2][3][4][5] There are many reasons why violent non-state
actors develop.
https://en.wikipedia.org/wiki/Violent_non-state_actor
 Warlords
 Militias
 Insurgencies
 Terrorist organizations
 Criminal organizations and gangs
A warlord is a leader able to exercise military, economic, and political control over
a subnational territory within a sovereign state due to his ability to mobilize loyal
armed forces. These armed forces, usually considered militias, are loyal to the
warlord rather than to the state regime. Warlords have existed throughout much of
history, albeit in a variety of different capacities within the political, economic, and
social structure of states or ungoverned territories.
A militia /mᵻˈlɪʃə/[1] is generally an army or some other type of fighting unit that is
composed of non-professional fighters, citizens of a nation or subjects of a state or
government who can be called upon to enter a combat situation, as opposed to a
professional force of regular, full-time military personnel, or historically, members of
a warrior nobility class (e.g., knights or samurai). Unable to hold their own against
properly trained and equipped professional forces, it is common for militias to
engage in guerrilla warfare or defense instead of being used in open attacks and
offensive actions.
A paramilitary is a semi-militarized force whose organizational structure, tactics,
training, subculture, and (often) function are similar to those of a professional
military, but which is not included as part of a state's formal armed forces.[1]
Under the law of war, a state may incorporate a paramilitary organization or armed
agency (such as a national police, a private volunteer militia) into its combatant
armed forces. The other parties to a conflict have to be notified thereof
An insurgency is a rebellion against authority (for example, an authority
recognized as such by the United Nations) when those taking part in the rebellion
are not recognized as belligerents.[1] An insurgency can be fought via counter-
insurgency warfare, and may also be opposed by measures to protect the
population, and by political and economic actions of various kinds aimed at
undermining the insurgents' claims against the incumbent regime.[2] The nature of
insurgencies is an ambiguous concept.
This is a list of designated terrorist groups by national governments, former
governments, and inter-governmental organizations, where the proscription has a
significant effect on the group's activities. Many organizations that are accused of
being a terrorist organization deny using terrorism as a military tactic to achieve
their goals, and there is no international consensus on the legal definition of
terrorism.
Organized crime is a category of transnational, national, or local groupings of
highly centralized enterprises run by criminals who intend to engage in illegal
activity, most commonly for money and profit. Some criminal organizations, such as
terrorist groups, are politically motivated. Sometimes criminal organizations force
people to do business with them, such as when a gang extorts money from
shopkeepers for so-called "protection".[1] Gangs may become disciplined enough to
be considered organized. A criminal organization or gang can also be referred to
as a mafia, mob, or crime syndicate; the network, subculture and community of
criminals may be referred to as the underworld.
DEFINITIONS
C3: Cyber Crimes Center
CERT: Community Emergency Response Team
EX: Explosive
DNDO: Domestic Nuclear Detection Office
NCCIC: National Cybersecurity and Communications Integration Center
NIMS: National Incident Management System
NIPP: National Infrastructure Protection Plan
NOC: National Operations Center
NTAS: National Terrorism Advisory System
OEC: Office of Emergency Communications
VNSA: Violent Non-State Actors
REVIEW

More Related Content

What's hot

C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorMatthew Boutross
 
C03.8 organization & financing of terrorism
C03.8 organization & financing of terrorismC03.8 organization & financing of terrorism
C03.8 organization & financing of terrorismMatthew Boutross
 
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaedaPpt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaedaKathleen Paris
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information WarfareJeffrey Malone
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber Warpjoyal
 
Chapter.ID_43375_6x9_lastChapterProof
Chapter.ID_43375_6x9_lastChapterProofChapter.ID_43375_6x9_lastChapterProof
Chapter.ID_43375_6x9_lastChapterProofJennifer Pomeroy
 
C04.8 terrorism and the media
C04.8 terrorism and the mediaC04.8 terrorism and the media
C04.8 terrorism and the mediaMatthew Boutross
 
Security sector reform defence diplomacy
Security sector reform defence diplomacySecurity sector reform defence diplomacy
Security sector reform defence diplomacyLita Najwa
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...runningman825
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...runningman825
 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoAlvin "Flex" Plexico, Ph.D.
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
Gearoid conway-dissertation
Gearoid conway-dissertationGearoid conway-dissertation
Gearoid conway-dissertationGearidConway
 

What's hot (20)

C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terror
 
C03.8 organization & financing of terrorism
C03.8 organization & financing of terrorismC03.8 organization & financing of terrorism
C03.8 organization & financing of terrorism
 
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaedaPpt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda
 
JBowmanResearchPaper
JBowmanResearchPaperJBowmanResearchPaper
JBowmanResearchPaper
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber War
 
Chapter.ID_43375_6x9_lastChapterProof
Chapter.ID_43375_6x9_lastChapterProofChapter.ID_43375_6x9_lastChapterProof
Chapter.ID_43375_6x9_lastChapterProof
 
Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
 
C04.8 terrorism and the media
C04.8 terrorism and the mediaC04.8 terrorism and the media
C04.8 terrorism and the media
 
Security sector reform defence diplomacy
Security sector reform defence diplomacySecurity sector reform defence diplomacy
Security sector reform defence diplomacy
 
Vol3ch03
Vol3ch03Vol3ch03
Vol3ch03
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
 
491
491491
491
 
strategic-intelligence-theory-to-application
strategic-intelligence-theory-to-applicationstrategic-intelligence-theory-to-application
strategic-intelligence-theory-to-application
 
Terrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. PlexicoTerrorism and the Press class notes by Dr. Plexico
Terrorism and the Press class notes by Dr. Plexico
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
terrorist_group_proclivity_toward_wmd
terrorist_group_proclivity_toward_wmdterrorist_group_proclivity_toward_wmd
terrorist_group_proclivity_toward_wmd
 
Bradford, PPP
Bradford, PPPBradford, PPP
Bradford, PPP
 
Gearoid conway-dissertation
Gearoid conway-dissertationGearoid conway-dissertation
Gearoid conway-dissertation
 

Similar to CHS-II Exam Notes: Risk Management and Intelligence

EXAM NOTES for the Certified in Homeland Security
 EXAM NOTES for the Certified in Homeland Security EXAM NOTES for the Certified in Homeland Security
EXAM NOTES for the Certified in Homeland SecurityDavid Sweigert
 
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfKeeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfHassaanSial1
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.ravitaurus
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
CRJ 570 National Political Convention Project Guidelines .docx
CRJ 570 National Political Convention Project Guidelines .docxCRJ 570 National Political Convention Project Guidelines .docx
CRJ 570 National Political Convention Project Guidelines .docxfaithxdunce63732
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docxaryan532920
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterJulie Davis
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referwildmandelorse
 
Cja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.comCja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.comsholingarjosh76
 
Cja 426 Success Begins / snaptutorial.com
Cja 426  Success Begins / snaptutorial.comCja 426  Success Begins / snaptutorial.com
Cja 426 Success Begins / snaptutorial.comWilliamsTaylorza41
 
Cja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.comCja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.comStephenson25
 
a report of the csis homeland security and counterterrorism.docx
a report of the csis homeland  security and counterterrorism.docxa report of the csis homeland  security and counterterrorism.docx
a report of the csis homeland security and counterterrorism.docxevonnehoggarth79783
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coladonnacamplin
 

Similar to CHS-II Exam Notes: Risk Management and Intelligence (20)

EXAM NOTES for the Certified in Homeland Security
 EXAM NOTES for the Certified in Homeland Security EXAM NOTES for the Certified in Homeland Security
EXAM NOTES for the Certified in Homeland Security
 
40 years of terror trend
40 years of terror trend40 years of terror trend
40 years of terror trend
 
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfKeeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
 
911 Essays
911 Essays911 Essays
911 Essays
 
911 Essays
911 Essays911 Essays
911 Essays
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
CRJ 570 National Political Convention Project Guidelines .docx
CRJ 570 National Political Convention Project Guidelines .docxCRJ 570 National Political Convention Project Guidelines .docx
CRJ 570 National Political Convention Project Guidelines .docx
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
 
Cja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.comCja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.com
 
Cja 426 Success Begins / snaptutorial.com
Cja 426  Success Begins / snaptutorial.comCja 426  Success Begins / snaptutorial.com
Cja 426 Success Begins / snaptutorial.com
 
Cja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.comCja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.com
 
a report of the csis homeland security and counterterrorism.docx
a report of the csis homeland  security and counterterrorism.docxa report of the csis homeland  security and counterterrorism.docx
a report of the csis homeland security and counterterrorism.docx
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to co
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Miss joya
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipurseemahedar019
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...gragteena
 
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Niamh verma
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 

Recently uploaded (20)

VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
 
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
 

CHS-II Exam Notes: Risk Management and Intelligence

  • 1. EXAM NOTES for the Certified in Homeland Security – Level II Developed as a courtesy by: Dave Sweigert, CEH, CHS-II, CISA, CISSP, HCISPP, PMP, SEC+ Key points: two circles (1) risk management (2) intelligence
  • 2.
  • 3. The core of the CHS-II test is the DHS Risk Management Framework Core concepts: Risk Analysis – The development of a quantitative estimate of risk based on technical evaluation and mathematical techniques for combining estimates of incident likelihood and consequences. Risk Assessment – The process by which results of a risk analysis are used to make decisions, either through relative ranking of risks and risk reduction strategies or through comparison with risk targets. Risk Management – The ongoing process of planning, organizing, leading and controlling people, assets, and activities to minimize the potential consequences and/or probability of risks identified and appraised through risk assessment. DHS Risk managementCycle
  • 4. 5 DHS Risk Management principles:  Unity of Effort – risk management efforts should be coordinated and integrated among the organization as a whole.  Transparency – open and direct communication is essential to effective security risk management.  Adaptability – risk management strategies and processes should be designed to be flexible and responsive to change.  Practicality – homeland security risk management cannot eliminate all uncertainty nor identify all risks.  Customization – risk management efforts should be structured and tailored to fit the needs and values of the organization. What are the parts of the Intelligence process? Planning and direction, Collection, Processing and exploitation, Analysis and production, Dissemination and integration Scientific & Technical Intelligence? Encompasses foreign developments in S&T w/warfare potential Estimative Intelligence? Forecasts the unknown based on an analysis of known facts using techniques such as pattern analysis, inference, and statistical probability. Current intelligence? Provides updated support for ongoing ops across the range of military operations (ROMO) Warning intelligence? Very time-sensitive. Forewarns of adversary actions or intentions. Research Intelligence? Basic intelligence or Intelligence for operational support
  • 6. DHS TVC Analysis Natural Hazards Analysis There is a solid foundation of data, models, and scholarship to underpin the Federal Emergency Management Agency’s (FEMA’s) risk analyses for earthquakes, flooding, and hurricanes which uses the Risk = T × V × C model. This paradigm has been applied to natural hazards, especially flooding, more than a century. Perhaps the earliest use of the Risk = T × V × C model—often referred to as “probabilistic risk assessment” in other fields—dates to its use in forecasting flood risks on the Thames in the nineteenth century.
  • 7.
  • 8.
  • 9. Terror attacks 1978-1995 - Three people die and 23 others are wounded after a string of mail bombings carried out by Ted Kaczynski. "The Unabomber," as he is also known, is serving eight life sentences for murder. He was not charged with terrorism, but the string of bombings is considered to be a terror case. February 26, 1993 - A bomb explodes on the second subterranean level of Vista Hotel's public parking garage, below the 2 World Trade Center building. Six people are killed, and more than 1,000 people are treated for injuries. Six suspects are convicted of participating in the bombing. The seventh suspect, Abdul Rahman Yasin, is still at large. April 19, 1995 - A bomb rips through the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma, killing 168 people and injuring almost 700. Timothy McVeigh is convicted on federal murder charges and executed in 2001. July 27, 1996 - A bomb explodes in Centennial Olympic Park in Atlanta during the middle of a concert during the Summer Olympics. One person is killed, another dies from a heart attack, and 111 others are injured. Bombing suspect Eric Robert Rudolph is arrested in North Carolina in 2003, after being indicted in 2000 for the Atlanta bombing and for other bombings, including one at an abortion clinic where one person died. Rudolph is serving four consecutive sentences of life in prison plus 120 years for the attacks. September 11, 2001 - Nineteen al Qaeda members hijack four US passenger airliners. Two are flown into the Twin Towers in New York, one crashes into the Pentagon and another crashes into the Pennsylvania countryside after passengers attempt to wrest control of the aircraft to prevent an attack on the US Capitol. At the World Trade Center site 2,753 people are killed; 184 at the Pentagon; and 40 in Shanksville, Pennsylvania. A total of 2,977 people are killed. Richard Colvin Reid (born 12 August 1973), also known as the Shoe Bomber, is a British man arrested as the prime suspect who attempted to detonate explosives packed into the shoes he was wearing, while on American Airlines Flight 63 from Paris to Miami on December 22, 2001.
  • 10. The D.C. or Beltway sniper attacks were a series of coordinated shootings that took place over three weeks in October 2002 in Maryland, Virginia, and Washington, D.C. Ten people were killed and three other victims were critically injured in several locations throughout the Washington, D.C., metropolitan area and along Interstate 95 in Virginia. November 5, 2009 - Major Nidal Hassan goes on a shooting rampage at a military processing center at Fort Hood, Texas, killing 13 and wounding 32. Hassan is convicted of 13 counts of murder and 32 counts of attempted murder. He is given the death penalty. Hassan is not charged with terrorism, but the rampage is considered by many to be a terror incident. On May 1, 2010, an attempted terrorist attack occurred in Times Square in Manhattan, New York. Two street vendors alerted New York City security personnel after they spotted smoke coming from a vehicle, and a car bomb was discovered.[1][2] The bomb had been ignited, but failed to explode, and was disarmed before it caused any casualties.[1][3][4] Two days later, federal agents arrested Faisal Shahzad, a 30-year-old Pakistan-born resident of Bridgeport, Connecticut, who had become a U.S. citizen in April 2009. April 15, 2013 - Twin bomb blasts explode near the finish line of the Boston Marathon, killing three and wounding at least 264. Suspect Dzhokhar Tsarnaev is charged by the US government with one count of using and conspiring to use a weapon of mass destruction resulting in death and one count of malicious destruction of property by means of an explosive device resulting in death. He is given the death penalty on June 25, 2015. July 16, 2015 - Mohammad Abdulazeez opens fire on a military recruiting center and a Navy reserve facility in Chattanooga, Tennessee, killing four US Marines and a Navy sailor. FBI Director James Comey later says Abdulazeez's actions were "motivated by foreign terrorist organization propaganda," adding that it's difficult to determine which terrorist group may have inspired him. December 2, 2015 - Married couple Syed Rizwan Farook and Tashfeen Malik open fire on a holiday party taking place at Inland Regional Center in San Bernardino, California, killing 14 people. Investigators believe the couple was self-radicalized. http://www.cnn.com/2013/04/18/us/u-s-terrorist-attacks-fast-facts/
  • 11. The Six Steps of the Intelligence Community
  • 12. The Intelligence Cycle is the process of developing raw information into finished intelligence for policymakers to use in decision-making and action. There are five steps which constitute the Intelligence Cycle. 1. Identify Requirements Requirements refer to the information that is needed. 2. Planning and Direction This is management of the entire effort, from identifying the need for data to delivering an intelligence product to a consumer. It is the beginning and the end of the cycle--the beginning because it involves drawing up specific collection requirements and the end because finished intelligence, which supports policy decisions, generates new requirements. 3. Collection ...is the gathering of the raw information needed to produce finished intelligence. There are many sources of information including open sources such as foreign broadcasts, newspapers, periodicals, and books. Open source reporting is integral to CIA's analytical capabilities. There are also secret sources of information. CIA's operations officers collect such information from agents abroad and from defectors who provide information obtainable in no other way. 4. Processing ...involves converting the vast amount of information collected to a form usable by analysts through decryption, language translations, and data reduction. 5. All Source Analysis and Production ...is the conversion of basic information into finished intelligence. It includes integrating, evaluating, and analyzing all available data--which is often fragmentary and even contradictory--and preparing intelligence products. Analysts, who are subject-matter specialists, consider the information's reliability, validity, and relevance. They integrate data into a coherent whole, put the evaluated information in context, and produce finished intelligence that includes assessments of events and judgments about the implications of the information for the United States. 6. Dissemination The last step, which logically feeds into the first, is the distribution of the finished intelligence to the consumers, the same policymakers whose needs initiated the intelligence requirements. Finished intelligence is hand-carried daily to the President and key national security advisers. The policymakers, the recipients of finished intelligence, then make decisions based on the information, and these decisions may lead to the levying of more requirements, thus triggering the Intelligence Cycle
  • 13.
  • 14. Quadrennial Homeland Security Review (QHSR) The purpose of the first-ever Quadrennial Homeland Security Review (QHSR) is to outline the strategic framework to guide the activities of participants in homeland security toward a common end. A safe and secure homeland must mean more than preventing terrorist attacks from being carried out. It must also ensure that the liberties of all Americans are assured, privacy is protected, and the means by which we interchange with the world—through travel, lawful immigration, trade, commerce, and exchange—are secured. https://www.dhs.gov/quadrennial-homeland-security-review# 3 KEY CONCEPTS 5 DHS MISSION AREAS
  • 15.
  • 16. 2014 Quadrennial Homeland Security Review THE FIVE HOMELAND SECURITY MISSIONS The first quadrennial review established the five enduring missions of homeland security. This review reaffirms the five-mission structure and updates the missions (detailed in the Mission Framework In Depth section). The updated missions are:  Prevent Terrorism and Enhance Security;  Secure and Manage Our Borders;  Enforce and Administer Our Immigration Laws;  Safeguard and Secure Cyberspace; and  Strengthen National Preparedness and Resilience. https://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf
  • 17.
  • 18. PRESIDENTIAL DIRECTIVES PPD 8 National Preparedness Presidential Policy Directive / PPD-8 is aimed at strengthening the security and resilience of the United States through systematic preparation for the threats that pose the greatest risk to the security of the nation, including acts of terrorism, cyber-attacks, pandemics, and catastrophic natural disasters.  States the goal: “A secure and resilient nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to and recover from the threats and hazards that pose the greatest risk.”  Defines a series of national preparedness elements (called core capabilities) that we need to achieve the goal.  Emphasizes the need for the whole community to work together in a variety of ways and make the best use of resources.
  • 19.
  • 20. The National Preparedness Goal defines what it means for the whole community to be prepared for all types of disasters and emergencies. The goal itself is succinct: “A secure and resilient nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk.”
  • 21. The National Preparedness Goal organizes the core capabilities into the five mission areas:  Prevention. Prevent, avoid or stop an imminent, threatened or actual act of terrorism.  Protection. Protect our citizens, residents, visitors and assets against the greatest threats and hazards in a manner that allows our interests, aspirations and way of life to thrive.  Mitigation. Reduce the loss of life and property by lessening the impact of future disasters.  Response. Respond quickly to save lives, protect property and the environment, and meet basic human needs in the aftermath of a catastrophic incident.  Recovery. Recover through a focus on the timely restoration, strengthening and revitalization of infrastructure, housing and a sustainable economy, as well as the health, social, cultural, historic and environmental fabric of communities affected by a catastrophic incident.
  • 22. PPD 21 Critical Infrastructure Security and Resilience The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure.
  • 23. MISSION OF DHS PER Quadrennial Homeland Security Review (QHSR)  Prevent terrorism and enhance security  Secure and manage our borders  Enforce and administer our immigration laws  Safeguard and secure cyberspace  Strengthen national preparedness and resilience Key points:  DHS combines 22 various federal agencies  Established by the Homeland Security Act (Public Law 107-296)  DHS officially operational on March 1, 2003
  • 24. VNSA Violent non-state actors (VNSA), also known as armed non-state actors, are non- state actors, i.e. "individuals or organizations that have economic, political or social power and are able to influence at a national and sometimes international level but do not belong to or ally themselves to any particular country or state,"[1] who employ violence in pursuit of their objectives. The term has been used in several papers published by the U.S. military.[2][3][4][5] There are many reasons why violent non-state actors develop. https://en.wikipedia.org/wiki/Violent_non-state_actor  Warlords  Militias  Insurgencies  Terrorist organizations  Criminal organizations and gangs A warlord is a leader able to exercise military, economic, and political control over a subnational territory within a sovereign state due to his ability to mobilize loyal armed forces. These armed forces, usually considered militias, are loyal to the warlord rather than to the state regime. Warlords have existed throughout much of history, albeit in a variety of different capacities within the political, economic, and social structure of states or ungoverned territories. A militia /mᵻˈlɪʃə/[1] is generally an army or some other type of fighting unit that is composed of non-professional fighters, citizens of a nation or subjects of a state or government who can be called upon to enter a combat situation, as opposed to a professional force of regular, full-time military personnel, or historically, members of a warrior nobility class (e.g., knights or samurai). Unable to hold their own against properly trained and equipped professional forces, it is common for militias to engage in guerrilla warfare or defense instead of being used in open attacks and offensive actions. A paramilitary is a semi-militarized force whose organizational structure, tactics, training, subculture, and (often) function are similar to those of a professional military, but which is not included as part of a state's formal armed forces.[1] Under the law of war, a state may incorporate a paramilitary organization or armed agency (such as a national police, a private volunteer militia) into its combatant armed forces. The other parties to a conflict have to be notified thereof An insurgency is a rebellion against authority (for example, an authority recognized as such by the United Nations) when those taking part in the rebellion are not recognized as belligerents.[1] An insurgency can be fought via counter-
  • 25. insurgency warfare, and may also be opposed by measures to protect the population, and by political and economic actions of various kinds aimed at undermining the insurgents' claims against the incumbent regime.[2] The nature of insurgencies is an ambiguous concept. This is a list of designated terrorist groups by national governments, former governments, and inter-governmental organizations, where the proscription has a significant effect on the group's activities. Many organizations that are accused of being a terrorist organization deny using terrorism as a military tactic to achieve their goals, and there is no international consensus on the legal definition of terrorism. Organized crime is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals who intend to engage in illegal activity, most commonly for money and profit. Some criminal organizations, such as terrorist groups, are politically motivated. Sometimes criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for so-called "protection".[1] Gangs may become disciplined enough to be considered organized. A criminal organization or gang can also be referred to as a mafia, mob, or crime syndicate; the network, subculture and community of criminals may be referred to as the underworld.
  • 26. DEFINITIONS C3: Cyber Crimes Center CERT: Community Emergency Response Team EX: Explosive DNDO: Domestic Nuclear Detection Office NCCIC: National Cybersecurity and Communications Integration Center NIMS: National Incident Management System NIPP: National Infrastructure Protection Plan NOC: National Operations Center NTAS: National Terrorism Advisory System OEC: Office of Emergency Communications VNSA: Violent Non-State Actors