SlideShare a Scribd company logo
1 of 27
EXAM NOTES for the Certified in Homeland Security
Developed as a courtesy by:
Dave Sweigert, CEH, CISA, CISSP, HCISPP, PMP, SEC+
Terror attacks
1978-1995 - Three people die and 23 others are wounded after a string of mail
bombings carried out by Ted Kaczynski. "The Unabomber," as he is also known, is
serving eight life sentences for murder. He was not charged with terrorism, but the
string of bombings is considered to be a terror case.
February 26, 1993 - A bomb explodes on the second subterranean level of Vista
Hotel's public parking garage, below the 2 World Trade Center building. Six people
are killed, and more than 1,000 people are treated for injuries. Six suspects are
convicted of participating in the bombing. The seventh suspect, Abdul Rahman Yasin,
is still at large.
April 19, 1995 - A bomb rips through the Alfred P. Murrah Federal Building in
Oklahoma City, Oklahoma, killing 168 people and injuring almost 700. Timothy
McVeigh is convicted on federal murder charges and executed in 2001.
July 27, 1996 - A bomb explodes in Centennial Olympic Park in Atlanta during the
middle of a concert during the Summer Olympics. One person is killed, another dies
from a heart attack, and 111 others are injured. Bombing suspect Eric Robert
Rudolph is arrested in North Carolina in 2003, after being indicted in 2000 for the
Atlanta bombing and for other bombings, including one at an abortion clinic where
one person died. Rudolph is serving four consecutive sentences of life in prison plus
120 years for the attacks.
September 11, 2001 - Nineteen al Qaeda members hijack four US passenger
airliners. Two are flown into the Twin Towers in New York, one crashes into the
Pentagon and another crashes into the Pennsylvania countryside after passengers
attempt to wrest control of the aircraft to prevent an attack on the US Capitol. At the
World Trade Center site 2,753 people are killed; 184 at the Pentagon; and 40 in
Shanksville, Pennsylvania. A total of 2,977 people are killed.
Richard Colvin Reid (born 12 August 1973), also known as the Shoe Bomber, is
a British man arrested as the prime suspect who attempted to detonate explosives
packed into the shoes he was wearing, while on American Airlines Flight 63 from
Paris to Miami on December 22, 2001.
The D.C. or Beltway sniper attacks were a series of coordinated shootings that
took place over three weeks in October 2002 in Maryland, Virginia, and
Washington, D.C. Ten people were killed and three other victims were critically
injured in several locations throughout the Washington, D.C., metropolitan area and
along Interstate 95 in Virginia.
November 5, 2009 - Major Nidal Hassan goes on a shooting rampage at a military
processing center at Fort Hood, Texas, killing 13 and wounding 32. Hassan is
convicted of 13 counts of murder and 32 counts of attempted murder. He is given the
death penalty. Hassan is not charged with terrorism, but the rampage is considered
by many to be a terror incident.
On May 1, 2010, an attempted terrorist attack occurred in Times Square in
Manhattan, New York. Two street vendors alerted New York City security personnel
after they spotted smoke coming from a vehicle, and a car bomb was
discovered.[1][2] The bomb had been ignited, but failed to explode, and was
disarmed before it caused any casualties.[1][3][4] Two days later, federal agents
arrested Faisal Shahzad, a 30-year-old Pakistan-born resident of Bridgeport,
Connecticut, who had become a U.S. citizen in April 2009.
April 15, 2013 - Twin bomb blasts explode near the finish line of the Boston
Marathon, killing three and wounding at least 264. Suspect Dzhokhar Tsarnaev is
charged by the US government with one count of using and conspiring to use a
weapon of mass destruction resulting in death and one count of malicious destruction
of property by means of an explosive device resulting in death. He is given the death
penalty on June 25, 2015.
July 16, 2015 - Mohammad Abdulazeez opens fire on a military recruiting center and
a Navy reserve facility in Chattanooga, Tennessee, killing four US Marines and a
Navy sailor. FBI Director James Comey later says Abdulazeez's actions were
"motivated by foreign terrorist organization propaganda," adding that it's difficult to
determine which terrorist group may have inspired him.
December 2, 2015 - Married couple Syed Rizwan Farook and Tashfeen Malik open
fire on a holiday party taking place at Inland Regional Center in San Bernardino,
California, killing 14 people. Investigators believe the couple was self-radicalized.
http://www.cnn.com/2013/04/18/us/u-s-terrorist-attacks-fast-facts/
ORIGINAL LEGISLATION (DEFEATED)
MARCH 2001
Quadrennial Homeland Security Review (QHSR)
The purpose of the first-ever Quadrennial Homeland Security Review (QHSR) is to
outline the strategic framework to guide the activities of participants in homeland
security toward a common end. A safe and secure homeland must mean more than
preventing terrorist attacks from being carried out. It must also ensure that the liberties
of all Americans are assured, privacy is protected, and the means by which we
interchange with the world—through travel, lawful immigration, trade, commerce, and
exchange—are secured.
https://www.dhs.gov/quadrennial-homeland-security-review#
3 KEY CONCEPTS
5 DHS MISSION AREAS
2014 Quadrennial Homeland Security Review
THE FIVE HOMELAND SECURITY MISSIONS
The first quadrennial review established the five enduring missions of homeland
security. This review reaffirms the five-mission structure and updates the missions
(detailed in the Mission Framework In Depth section). The updated missions are:
 Prevent Terrorism and Enhance Security;
 Secure and Manage Our Borders;
 Enforce and Administer Our Immigration Laws;
 Safeguard and Secure Cyberspace; and
 Strengthen National Preparedness and Resilience.
https://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf
National Security Presidential Directive 38 (NSPD 38)
NSPD 38 was issued on July 7, 2004, as the National Strategy to Secure Cyberspace.
The contents of this classified directive have never been released, but prior to the
issuance of NSPD 38, the Whitehouse released a different document also entitled
"National Strategy to Secure Cyberspace" that detailed five priorities to secure
cyberspace:
1. A National Cyberspace Security Response System.
2. A National Cyberspace Security Threat and Vulnerability Reduction Program.
3. A National Cyberspace Security Awareness and Training Program.
4. Securing Governments' Cyberspace
5. National Security and International Cyberspace Security Cooperation
https://epic.org/privacy/cybersecurity/presidential-directives/cybersecurity.html
SAFE Port Act
The port security provisions were one of 20 bills introduced to Congress in the wake of
the Dubai Ports World controversy that aimed to block Dubai Ports World acquiring
P&O Ports, and more generally to stop key US ports falling into the hands of foreign
owners by changing the Exon-Florio Amendment.[4] The act codified into law a number
of programs to improve security of U.S. ports, such as:
 Additional requirements for maritime facilities
 Creation of the Transportation Worker Identification Credential
 Establishment of Interagency Operations Centers for port security
 Port Security Grant Program
 Container Security Initiative
 Foreign port assessments
 Customs Trade Partnership against Terrorism
In addition, the Act created the Domestic Nuclear Detection Office within the
Department of Homeland Security and appropriated funds toward the Integrated
Deepwater System Program, a long-term U.S. Coast Guard modernization program.
https://en.wikipedia.org/wiki/SAFE_Port_Act
NOTE: In addition, the Act created the Domestic Nuclear Detection
Office within the Department of Homeland Security
PRESIDENTIAL DIRECTIVES
SUMMARY OUTLINE:
HSPD
1
ORGANIZATION AND OPERATION OF THE HOMELAND SECURITY COUNCIL
This is the first in a series of Homeland Security Presidential Directives that shall record and
communicate presidential decisions about the homeland security policies of the United
States.
HSPD
5
HSPD
7 CRITICAL INFRASTRUCTURE IDENTIFICATION, PRIORITIZATION, AND PROTECTION
The directive defines relevant terms and delivers 31 policy statements. These policy
statements define what the directive covers and the roles various federal, state, and local
agencies will play in carrying it out.
HSPD-7, issued in December 2003, superseded PDD-63 and:
 established the Department of Homeland Security (DHS) as the
principal federal agency to lead, integrate, and coordinate the
implementation of efforts to protect the cybersecurity for the nation’s
critical infrastructure and key resources (CIKR). This includes
analysis, warning, information sharing, vulnerability reduction,
mitigation, and recovery efforts for critical infrastructure information
systems. It also directs DHS to develop a national indications and
warnings architecture for infrastructure protection and capabilities,
including cyber, that will facilitate an understanding of baseline
infrastructure operations, the identification of indicators and
precursors to an attack, and create a surge capacity for detecting
and analyzing patterns of potential attacks;
HSPD
-9
DEFENSE OF UNITED STATES AGRICULTURE AND FOOD (1) This directive establishes
a national policy to defend the agriculture and food system against terrorist attacks, major
disasters, and other emergencies.
HSPD
10 BIODEFENSE FOR THE 21ST CENTURY, which fully integrates the sustained efforts of the
national, and homeland security, medical, public health, intelligence, diplomatic, and law,
enforcement communities in combating biological terrorism., Specific direction to departments
and agencies to carry out this biodefense program is, contained in a classified version of this
directive.
HSPD
13
MARITIME SECURITY POLICY This document, the Maritime Security Policy National
Security/Homeland Security Presidential Directive (NSPD/HSPD), reiterates the President's
commitment to maritime security and aims to integrate and align all U.S. Government
maritime security programs.
HSPD 13; Homeland Security Presidential Directive 13;
NSPD 41; National Security Presidential Directive 41
National Strategy for Maritime
Security
The Maritime Commerce Security Plan is one of eight plans developed in
support of the National Strategy for Maritime Security, as directed by
National Security Presidential Directive-41/Homeland Security Presidential
Directive-13. In addition to drawing on the expertise of federal agencies,
this Plan also reflects the insight and concerns of public and private
stakeholders. It was also coordinated with the other supporting plans
throughout its development, especially the Maritime Transportation System
Security Plan and the Maritime Infrastructure Recovery Plan because of
their importance to the secure flow of commerce.
NSPD-41/HSPD-13 established the Maritime Security Policy Coordinating
Committee (MSPCC) — the first coordinating committee specifically tasked
to address the issue of maritime security — to oversee the development of a
National Strategy for Maritime Security (NSMS) and eight supporting
implementation plans.
HSPD
14
NSPD 43 / HSPD 14: DOMESTIC NUCLEAR DETECTION OFFICE
As part of the national effort to protect the nation from radiological and nuclear threats, the
Domestic Nuclear Detection Office (DNDO).The DNDO will provide a single accountable
organization with dedicated responsibilities to develop the global NUCLEAR DETECTION
ARCHITECTURE, and acquire, and support the deployment of the domestic detection system
to detect and report attempts to import or transport a nuclear device or fissile or radiological
material intended for illicit use.
HSPD
16 National Security Presidential Directive-47/Homeland Security Presidential Directive-16
(NSPD-47/HSPD-16) details a strategic vision for AVIATION SECURITY while recognizing
ongoing efforts, and directs the production of a National Strategy for Aviation Security and
supporting plans. The supporting plans address the following areas: aviation transportation
system security; aviation operational threat response; aviation transportation system
recovery; air domain surveillance and intelligence integration; domestic outreach; and
international outreach.
NSPD 22 Trafficking in Persons National Security Presidential Directive
NSPD 38
National Strategy to Secure Cyberspace (CLASSIFIED)
PPD 8
National Preparedness
Presidential Policy Directive / PPD-8 is aimed at strengthening the security and resilience
of the United States through systematic preparation for the threats that pose the greatest
risk to the security of the nation, including acts of terrorism, cyber-attacks, pandemics,
and catastrophic natural disasters.
 States the goal: “A secure and resilient nation with the capabilities
required across the whole community to prevent, protect against,
mitigate, respond to and recover from the threats and hazards that
pose the greatest risk.”
 Defines a series of national preparedness elements (called core
capabilities) that we need to achieve the goal.
 Emphasizes the need for the whole community to work together in a
variety of ways and make the best use of resources.
The National Preparedness Goal defines what it means for the whole
community to be prepared for all types of disasters and emergencies.
The goal itself is succinct:
“A secure and resilient nation with the capabilities required across
the whole community to prevent, protect against, mitigate, respond
to, and recover from the threats and hazards that pose the greatest
risk.”
The National Preparedness Goal organizes the core capabilities into
the five mission areas:
 Prevention. Prevent, avoid or stop an imminent, threatened or
actual act of terrorism.
 Protection. Protect our citizens, residents, visitors and assets
against the greatest threats and hazards in a manner that allows
our interests, aspirations and way of life to thrive.
 Mitigation. Reduce the loss of life and property by lessening the
impact of future disasters.
 Response. Respond quickly to save lives, protect property and
the environment, and meet basic human needs in the aftermath of
a catastrophic incident.
 Recovery. Recover through a focus on the timely restoration,
strengthening and revitalization of infrastructure, housing and a
sustainable economy, as well as the health, social, cultural,
historic and environmental fabric of communities affected by a
catastrophic incident.
PPD 21
Critical Infrastructure Security and Resilience
The Presidential Policy Directive (PPD) on Critical Infrastructure Security and
Resilience advances a national unity of effort to strengthen and maintain secure,
functioning, and resilient critical infrastructure.
MISSION OF DHS PER Quadrennial Homeland Security Review (QHSR)
 Prevent terrorism and enhance security
 Secure and manage our borders
 Enforce and administer our immigration laws
 Safeguard and secure cyberspace
 Strengthen national preparedness and resilience
Key points:
 DHS combines 22 various federal agencies
 Established by the Homeland Security Act (Public Law 107-296)
 DHS officially operational on March 1, 2003
OTHER POLICY DIRECTIVES
National Security Presidential Directive 38 (NSPD 38)
NSPD 38 was issued on July 7, 2004, as the National Strategy to Secure
Cyberspace. The contents of this classified directive have never been released, but
prior to the issuance of NSPD 38, the Whitehouse released a different document also
entitled "National Strategy to Secure Cyberspace" that detailed five priorities to
secure cyberspace:
1. A National Cyberspace Security Response System.
2. A National Cyberspace Security Threat and Vulnerability Reduction Program.
3. A National Cyberspace Security Awareness and Training Program.
4. Securing Governments' Cyberspace
5. National Security and International Cyberspace Security Cooperation
The National Strategy to Secure Cyberspace
The National Strategy to Secure Cyberspace is part of our overall effort to protect the
Nation. It is an implementing component of the National Strategy for Homeland
Security and is complemented by a National Strategy for the Physical Protection
of Critical Infrastructures and Key Assets. The purpose of this document is to
engage and empower Americans to secure the portions of cyberspace that they own,
operate, control, or with which they interact. Securing cyberspace is a difficult
strategic challenge that requires coordinated and focused effort from our entire
society, the federal government, state and local governments, the private sector, and
the American people.
KNOWLEDGE POINTS:
Blue Campaign
The Blue Campaign is the unified voice for the U.S. Department of Homeland
Security’s (DHS) efforts to combat human trafficking. Working in collaboration with
law enforcement, government, non-governmental and private organizations, the Blue
Campaign strives to protect the basic right of freedom and to bring those who exploit
human lives to justice.
Executive Order 13260
Establishment and Membership. I hereby establish the President's Homeland Security
Advisory Council (PHSAC). The PHSAC shall be composed of not more than 21
members appointed by the President. March 19, 2002.
National Strategy for Homeland Security
The United States National Strategy for Homeland Security is a formal government
response to the events of September 11, 2001 at the Pentagon and World Trade
Center. The document issued by President George W. Bush outlines the overall
strategic considerations for cooperation between the federal government, states,
private enterprises, and ordinary citizens in anticipating future terrorism attacks as
well as natural disasters and other incidents of national significance.[1] The National
Response Framework is the part of the homeland security national strategy that is a
Comprehensive Emergency Management guideline for implementing scalable
responses to disasters and other incidents of national significance.
https://en.wikipedia.org/wiki/National_Strategy_for_Homeland_Security
VNSA
Violent non-state actors (VNSA), also known as armed non-state actors, are non-
state actors, i.e. "individuals or organizations that have economic, political or social
power and are able to influence at a national and sometimes international level but do
not belong to or ally themselves to any particular country or state,"[1] who employ
violence in pursuit of their objectives. The term has been used in several papers
published by the U.S. military.[2][3][4][5] There are many reasons why violent non-state
actors develop.
https://en.wikipedia.org/wiki/Violent_non-state_actor
 Warlords
 Militias
 Insurgencies
 Terrorist organizations
 Criminal organizations and gangs
A warlord is a leader able to exercise military, economic, and political control over
a subnational territory within a sovereign state due to his ability to mobilize loyal
armed forces. These armed forces, usually considered militias, are loyal to the
warlord rather than to the state regime. Warlords have existed throughout much of
history, albeit in a variety of different capacities within the political, economic, and
social structure of states or ungoverned territories.
A militia /mᵻˈlɪʃə/[1] is generally an army or some other type of fighting unit that is
composed of non-professional fighters, citizens of a nation or subjects of a state or
government who can be called upon to enter a combat situation, as opposed to a
professional force of regular, full-time military personnel, or historically, members of
a warrior nobility class (e.g., knights or samurai). Unable to hold their own against
properly trained and equipped professional forces, it is common for militias to
engage in guerrilla warfare or defense instead of being used in open attacks and
offensive actions.
A paramilitary is a semi-militarized force whose organizational structure, tactics,
training, subculture, and (often) function are similar to those of a professional
military, but which is not included as part of a state's formal armed forces.[1]
Under the law of war, a state may incorporate a paramilitary organization or armed
agency (such as a national police, a private volunteer militia) into its combatant
armed forces. The other parties to a conflict have to be notified thereof
An insurgency is a rebellion against authority (for example, an authority
recognized as such by the United Nations) when those taking part in the rebellion
are not recognized as belligerents.[1] An insurgency can be fought via counter-
insurgency warfare, and may also be opposed by measures to protect the
population, and by political and economic actions of various kinds aimed at
undermining the insurgents' claims against the incumbent regime.[2] The nature of
insurgencies is an ambiguous concept.
This is a list of designated terrorist groups by national governments, former
governments, and inter-governmental organizations, where the proscription has a
significant effect on the group's activities. Many organizations that are accused of
being a terrorist organization deny using terrorism as a military tactic to achieve
their goals, and there is no international consensus on the legal definition of
terrorism.
Organized crime is a category of transnational, national, or local groupings of
highly centralized enterprises run by criminals who intend to engage in illegal
activity, most commonly for money and profit. Some criminal organizations, such as
terrorist groups, are politically motivated. Sometimes criminal organizations force
people to do business with them, such as when a gang extorts money from
shopkeepers for so-called "protection".[1] Gangs may become disciplined enough to
be considered organized. A criminal organization or gang can also be referred to
as a mafia, mob, or crime syndicate; the network, subculture and community of
criminals may be referred to as the underworld.
DHS
The United States Department of Homeland Security (DHS) is a cabinet
department of the United States federal government with responsibilities in public
security, roughly comparable to the interior or home ministries of other countries. Its
stated missions involve anti-terrorism, border security, immigration and customs,
cyber security, and disaster prevention and management. It was created in response
to the September 11 attacks.
In fiscal year 2017, it was allocated a net discretionary budget of $40.6 billion. With
more than 240,000 employees, DHS is the third largest Cabinet department, after the
Departments of Defense and Veterans Affairs. Homeland security policy is
coordinated at the White House by the Homeland Security Council. Other agencies
with significant homeland security responsibilities include the Departments of Health
and Human Services, Justice, and Energy.
https://en.wikipedia.org/wiki/United_States_Department_of_Homeland_Security
DEFINITIONS
C3: Cyber Crimes Center
CERT: Community Emergency Response Team
EX: Explosive
DNDO: Domestic Nuclear Detection Office
NCCIC: National Cybersecurity and Communications Integration Center
NIMS: National Incident Management System
NIPP: National Infrastructure Protection Plan
NOC: National Operations Center
NTAS: National Terrorism Advisory System
OEC: Office of Emergency Communications
VNSA: Violent Non-State Actors
REVIEW

More Related Content

What's hot

The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...inventionjournals
 
Aviation Security essay_TRC
Aviation Security essay_TRCAviation Security essay_TRC
Aviation Security essay_TRCKevin R McCarthy
 
The Islamic State and International Terrorism - A Symposium
The Islamic State and International Terrorism - A SymposiumThe Islamic State and International Terrorism - A Symposium
The Islamic State and International Terrorism - A SymposiumJonathan Meyer
 
U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...
U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...
U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...Clifton M. Hasegawa & Associates, LLC
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Pranav Gupta
 
Border security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european unionBorder security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european unionWanjang'i Gituku
 
united nations in africa
united nations in africaunited nations in africa
united nations in africawolfreader2
 
IHL and New Means and Methods of Warfare
IHL and New Means and Methods of WarfareIHL and New Means and Methods of Warfare
IHL and New Means and Methods of WarfareNilendra Kumar
 
Responsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global TerrorismResponsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global TerrorismParliamentary Exchange and Dialogue
 
Action against-nato-war-crimes
Action against-nato-war-crimesAction against-nato-war-crimes
Action against-nato-war-crimesProtect_SriLanka
 
International Law and National Security
International Law and National SecurityInternational Law and National Security
International Law and National SecurityNilendra Kumar
 
Defence of Thesis on Suicide Terrorism: Threat And Response
Defence of Thesis on Suicide Terrorism: Threat And ResponseDefence of Thesis on Suicide Terrorism: Threat And Response
Defence of Thesis on Suicide Terrorism: Threat And Responsemohandezoysa
 
Farooq research paper
Farooq research paperFarooq research paper
Farooq research paperMehranMouzam
 

What's hot (19)

565 3805-1-pb
565 3805-1-pb565 3805-1-pb
565 3805-1-pb
 
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
The Danger of Proliferation of Nuclear Weapon and Fissile Materials in the er...
 
Silje-ISIS
Silje-ISISSilje-ISIS
Silje-ISIS
 
Aviation Security essay_TRC
Aviation Security essay_TRCAviation Security essay_TRC
Aviation Security essay_TRC
 
unclos_definition_and_classification_of_pirate_acts
unclos_definition_and_classification_of_pirate_actsunclos_definition_and_classification_of_pirate_acts
unclos_definition_and_classification_of_pirate_acts
 
The Islamic State and International Terrorism - A Symposium
The Islamic State and International Terrorism - A SymposiumThe Islamic State and International Terrorism - A Symposium
The Islamic State and International Terrorism - A Symposium
 
U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...
U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...
U.S. GAO REPORT 14-459 - Maritime Critical Infrastructure Protection: DHS Nee...
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 
Border security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european unionBorder security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european union
 
united nations in africa
united nations in africaunited nations in africa
united nations in africa
 
Iraq human shields
Iraq human shieldsIraq human shields
Iraq human shields
 
IHL and New Means and Methods of Warfare
IHL and New Means and Methods of WarfareIHL and New Means and Methods of Warfare
IHL and New Means and Methods of Warfare
 
Responsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global TerrorismResponsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global Terrorism
 
Action against-nato-war-crimes
Action against-nato-war-crimesAction against-nato-war-crimes
Action against-nato-war-crimes
 
Terrorismo 12
Terrorismo 12Terrorismo 12
Terrorismo 12
 
International Law and National Security
International Law and National SecurityInternational Law and National Security
International Law and National Security
 
Defence of Thesis on Suicide Terrorism: Threat And Response
Defence of Thesis on Suicide Terrorism: Threat And ResponseDefence of Thesis on Suicide Terrorism: Threat And Response
Defence of Thesis on Suicide Terrorism: Threat And Response
 
Farooq research paper
Farooq research paperFarooq research paper
Farooq research paper
 
Exp r35
Exp r35Exp r35
Exp r35
 

Similar to EXAM NOTES for the Certified in Homeland Security

Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 
terrorism-130223174148-phpapp02
terrorism-130223174148-phpapp02terrorism-130223174148-phpapp02
terrorism-130223174148-phpapp02Walter Sinchak,
 
*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copy
*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copy*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copy
*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copyNancy Yanira Munoz Martinez
 
Artic Homeland Threats
Artic Homeland ThreatsArtic Homeland Threats
Artic Homeland ThreatsLiberteks
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.ravitaurus
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
 
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfKeeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfHassaanSial1
 
The 1993 World Trade Centre Bombing
The 1993 World Trade Centre BombingThe 1993 World Trade Centre Bombing
The 1993 World Trade Centre BombingPATRICK MAELO
 
RUNNING HEADER TERRORISM .docx
RUNNING HEADER TERRORISM                                         .docxRUNNING HEADER TERRORISM                                         .docx
RUNNING HEADER TERRORISM .docxagnesdcarey33086
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation OllieShoresna
 
RAND Corporation Chapter Title The U.S. Invasion of .docx
RAND Corporation  Chapter Title The U.S. Invasion of .docxRAND Corporation  Chapter Title The U.S. Invasion of .docx
RAND Corporation Chapter Title The U.S. Invasion of .docxaudeleypearl
 
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docxSafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docxjeffsrosalyn
 
Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)
Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)
Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)Md Shaifullar Rabbi
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 

Similar to EXAM NOTES for the Certified in Homeland Security (20)

Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
terrorism-130223174148-phpapp02
terrorism-130223174148-phpapp02terrorism-130223174148-phpapp02
terrorism-130223174148-phpapp02
 
*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copy
*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copy*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copy
*En 102 final9-terroristthreat(wmd)-sh:correct-02-2018 copy- copy
 
Artic Homeland Threats
Artic Homeland ThreatsArtic Homeland Threats
Artic Homeland Threats
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
 
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfKeeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
 
40 years of terror trend
40 years of terror trend40 years of terror trend
40 years of terror trend
 
The 1993 World Trade Centre Bombing
The 1993 World Trade Centre BombingThe 1993 World Trade Centre Bombing
The 1993 World Trade Centre Bombing
 
RUNNING HEADER TERRORISM .docx
RUNNING HEADER TERRORISM                                         .docxRUNNING HEADER TERRORISM                                         .docx
RUNNING HEADER TERRORISM .docx
 
14 nov
14 nov14 nov
14 nov
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
RAND Corporation Chapter Title The U.S. Invasion of .docx
RAND Corporation  Chapter Title The U.S. Invasion of .docxRAND Corporation  Chapter Title The U.S. Invasion of .docx
RAND Corporation Chapter Title The U.S. Invasion of .docx
 
The Bush Doctrine
The Bush DoctrineThe Bush Doctrine
The Bush Doctrine
 
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docxSafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
SafeAssignCheckTestWaldorf - Waldorf SafeAssign Plagiarism Check.docx
 
Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)
Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)
Chapter 7 Terrorism on Tourism Sector, Effects and challenges(FASS)
 
911 Essays
911 Essays911 Essays
911 Essays
 
911 Essays
911 Essays911 Essays
911 Essays
 
Terrorism
TerrorismTerrorism
Terrorism
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024ARCResearch
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Recently uploaded (20)

Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 

EXAM NOTES for the Certified in Homeland Security

  • 1. EXAM NOTES for the Certified in Homeland Security Developed as a courtesy by: Dave Sweigert, CEH, CISA, CISSP, HCISPP, PMP, SEC+ Terror attacks 1978-1995 - Three people die and 23 others are wounded after a string of mail bombings carried out by Ted Kaczynski. "The Unabomber," as he is also known, is serving eight life sentences for murder. He was not charged with terrorism, but the string of bombings is considered to be a terror case. February 26, 1993 - A bomb explodes on the second subterranean level of Vista Hotel's public parking garage, below the 2 World Trade Center building. Six people are killed, and more than 1,000 people are treated for injuries. Six suspects are convicted of participating in the bombing. The seventh suspect, Abdul Rahman Yasin, is still at large. April 19, 1995 - A bomb rips through the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma, killing 168 people and injuring almost 700. Timothy McVeigh is convicted on federal murder charges and executed in 2001. July 27, 1996 - A bomb explodes in Centennial Olympic Park in Atlanta during the middle of a concert during the Summer Olympics. One person is killed, another dies from a heart attack, and 111 others are injured. Bombing suspect Eric Robert Rudolph is arrested in North Carolina in 2003, after being indicted in 2000 for the Atlanta bombing and for other bombings, including one at an abortion clinic where one person died. Rudolph is serving four consecutive sentences of life in prison plus 120 years for the attacks. September 11, 2001 - Nineteen al Qaeda members hijack four US passenger airliners. Two are flown into the Twin Towers in New York, one crashes into the Pentagon and another crashes into the Pennsylvania countryside after passengers attempt to wrest control of the aircraft to prevent an attack on the US Capitol. At the World Trade Center site 2,753 people are killed; 184 at the Pentagon; and 40 in Shanksville, Pennsylvania. A total of 2,977 people are killed. Richard Colvin Reid (born 12 August 1973), also known as the Shoe Bomber, is a British man arrested as the prime suspect who attempted to detonate explosives packed into the shoes he was wearing, while on American Airlines Flight 63 from Paris to Miami on December 22, 2001.
  • 2. The D.C. or Beltway sniper attacks were a series of coordinated shootings that took place over three weeks in October 2002 in Maryland, Virginia, and Washington, D.C. Ten people were killed and three other victims were critically injured in several locations throughout the Washington, D.C., metropolitan area and along Interstate 95 in Virginia. November 5, 2009 - Major Nidal Hassan goes on a shooting rampage at a military processing center at Fort Hood, Texas, killing 13 and wounding 32. Hassan is convicted of 13 counts of murder and 32 counts of attempted murder. He is given the death penalty. Hassan is not charged with terrorism, but the rampage is considered by many to be a terror incident. On May 1, 2010, an attempted terrorist attack occurred in Times Square in Manhattan, New York. Two street vendors alerted New York City security personnel after they spotted smoke coming from a vehicle, and a car bomb was discovered.[1][2] The bomb had been ignited, but failed to explode, and was disarmed before it caused any casualties.[1][3][4] Two days later, federal agents arrested Faisal Shahzad, a 30-year-old Pakistan-born resident of Bridgeport, Connecticut, who had become a U.S. citizen in April 2009. April 15, 2013 - Twin bomb blasts explode near the finish line of the Boston Marathon, killing three and wounding at least 264. Suspect Dzhokhar Tsarnaev is charged by the US government with one count of using and conspiring to use a weapon of mass destruction resulting in death and one count of malicious destruction of property by means of an explosive device resulting in death. He is given the death penalty on June 25, 2015. July 16, 2015 - Mohammad Abdulazeez opens fire on a military recruiting center and a Navy reserve facility in Chattanooga, Tennessee, killing four US Marines and a Navy sailor. FBI Director James Comey later says Abdulazeez's actions were "motivated by foreign terrorist organization propaganda," adding that it's difficult to determine which terrorist group may have inspired him. December 2, 2015 - Married couple Syed Rizwan Farook and Tashfeen Malik open fire on a holiday party taking place at Inland Regional Center in San Bernardino, California, killing 14 people. Investigators believe the couple was self-radicalized. http://www.cnn.com/2013/04/18/us/u-s-terrorist-attacks-fast-facts/
  • 3.
  • 5.
  • 6. Quadrennial Homeland Security Review (QHSR) The purpose of the first-ever Quadrennial Homeland Security Review (QHSR) is to outline the strategic framework to guide the activities of participants in homeland security toward a common end. A safe and secure homeland must mean more than preventing terrorist attacks from being carried out. It must also ensure that the liberties of all Americans are assured, privacy is protected, and the means by which we interchange with the world—through travel, lawful immigration, trade, commerce, and exchange—are secured. https://www.dhs.gov/quadrennial-homeland-security-review# 3 KEY CONCEPTS 5 DHS MISSION AREAS
  • 7.
  • 8. 2014 Quadrennial Homeland Security Review THE FIVE HOMELAND SECURITY MISSIONS The first quadrennial review established the five enduring missions of homeland security. This review reaffirms the five-mission structure and updates the missions (detailed in the Mission Framework In Depth section). The updated missions are:  Prevent Terrorism and Enhance Security;  Secure and Manage Our Borders;  Enforce and Administer Our Immigration Laws;  Safeguard and Secure Cyberspace; and  Strengthen National Preparedness and Resilience. https://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf
  • 9. National Security Presidential Directive 38 (NSPD 38) NSPD 38 was issued on July 7, 2004, as the National Strategy to Secure Cyberspace. The contents of this classified directive have never been released, but prior to the issuance of NSPD 38, the Whitehouse released a different document also entitled "National Strategy to Secure Cyberspace" that detailed five priorities to secure cyberspace: 1. A National Cyberspace Security Response System. 2. A National Cyberspace Security Threat and Vulnerability Reduction Program. 3. A National Cyberspace Security Awareness and Training Program. 4. Securing Governments' Cyberspace 5. National Security and International Cyberspace Security Cooperation https://epic.org/privacy/cybersecurity/presidential-directives/cybersecurity.html
  • 10. SAFE Port Act The port security provisions were one of 20 bills introduced to Congress in the wake of the Dubai Ports World controversy that aimed to block Dubai Ports World acquiring P&O Ports, and more generally to stop key US ports falling into the hands of foreign owners by changing the Exon-Florio Amendment.[4] The act codified into law a number of programs to improve security of U.S. ports, such as:  Additional requirements for maritime facilities  Creation of the Transportation Worker Identification Credential  Establishment of Interagency Operations Centers for port security  Port Security Grant Program  Container Security Initiative  Foreign port assessments  Customs Trade Partnership against Terrorism In addition, the Act created the Domestic Nuclear Detection Office within the Department of Homeland Security and appropriated funds toward the Integrated Deepwater System Program, a long-term U.S. Coast Guard modernization program. https://en.wikipedia.org/wiki/SAFE_Port_Act NOTE: In addition, the Act created the Domestic Nuclear Detection Office within the Department of Homeland Security
  • 11. PRESIDENTIAL DIRECTIVES SUMMARY OUTLINE: HSPD 1 ORGANIZATION AND OPERATION OF THE HOMELAND SECURITY COUNCIL This is the first in a series of Homeland Security Presidential Directives that shall record and communicate presidential decisions about the homeland security policies of the United States. HSPD 5 HSPD 7 CRITICAL INFRASTRUCTURE IDENTIFICATION, PRIORITIZATION, AND PROTECTION
  • 12. The directive defines relevant terms and delivers 31 policy statements. These policy statements define what the directive covers and the roles various federal, state, and local agencies will play in carrying it out. HSPD-7, issued in December 2003, superseded PDD-63 and:  established the Department of Homeland Security (DHS) as the principal federal agency to lead, integrate, and coordinate the implementation of efforts to protect the cybersecurity for the nation’s critical infrastructure and key resources (CIKR). This includes analysis, warning, information sharing, vulnerability reduction, mitigation, and recovery efforts for critical infrastructure information systems. It also directs DHS to develop a national indications and warnings architecture for infrastructure protection and capabilities, including cyber, that will facilitate an understanding of baseline infrastructure operations, the identification of indicators and precursors to an attack, and create a surge capacity for detecting and analyzing patterns of potential attacks;
  • 13. HSPD -9 DEFENSE OF UNITED STATES AGRICULTURE AND FOOD (1) This directive establishes a national policy to defend the agriculture and food system against terrorist attacks, major disasters, and other emergencies. HSPD 10 BIODEFENSE FOR THE 21ST CENTURY, which fully integrates the sustained efforts of the national, and homeland security, medical, public health, intelligence, diplomatic, and law, enforcement communities in combating biological terrorism., Specific direction to departments and agencies to carry out this biodefense program is, contained in a classified version of this directive. HSPD 13 MARITIME SECURITY POLICY This document, the Maritime Security Policy National Security/Homeland Security Presidential Directive (NSPD/HSPD), reiterates the President's commitment to maritime security and aims to integrate and align all U.S. Government maritime security programs. HSPD 13; Homeland Security Presidential Directive 13; NSPD 41; National Security Presidential Directive 41 National Strategy for Maritime Security The Maritime Commerce Security Plan is one of eight plans developed in support of the National Strategy for Maritime Security, as directed by National Security Presidential Directive-41/Homeland Security Presidential Directive-13. In addition to drawing on the expertise of federal agencies, this Plan also reflects the insight and concerns of public and private stakeholders. It was also coordinated with the other supporting plans throughout its development, especially the Maritime Transportation System Security Plan and the Maritime Infrastructure Recovery Plan because of their importance to the secure flow of commerce.
  • 14. NSPD-41/HSPD-13 established the Maritime Security Policy Coordinating Committee (MSPCC) — the first coordinating committee specifically tasked to address the issue of maritime security — to oversee the development of a National Strategy for Maritime Security (NSMS) and eight supporting implementation plans. HSPD 14 NSPD 43 / HSPD 14: DOMESTIC NUCLEAR DETECTION OFFICE As part of the national effort to protect the nation from radiological and nuclear threats, the Domestic Nuclear Detection Office (DNDO).The DNDO will provide a single accountable organization with dedicated responsibilities to develop the global NUCLEAR DETECTION ARCHITECTURE, and acquire, and support the deployment of the domestic detection system to detect and report attempts to import or transport a nuclear device or fissile or radiological material intended for illicit use.
  • 15. HSPD 16 National Security Presidential Directive-47/Homeland Security Presidential Directive-16 (NSPD-47/HSPD-16) details a strategic vision for AVIATION SECURITY while recognizing ongoing efforts, and directs the production of a National Strategy for Aviation Security and supporting plans. The supporting plans address the following areas: aviation transportation system security; aviation operational threat response; aviation transportation system recovery; air domain surveillance and intelligence integration; domestic outreach; and international outreach. NSPD 22 Trafficking in Persons National Security Presidential Directive NSPD 38 National Strategy to Secure Cyberspace (CLASSIFIED) PPD 8 National Preparedness Presidential Policy Directive / PPD-8 is aimed at strengthening the security and resilience of the United States through systematic preparation for the threats that pose the greatest
  • 16. risk to the security of the nation, including acts of terrorism, cyber-attacks, pandemics, and catastrophic natural disasters.  States the goal: “A secure and resilient nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to and recover from the threats and hazards that pose the greatest risk.”  Defines a series of national preparedness elements (called core capabilities) that we need to achieve the goal.  Emphasizes the need for the whole community to work together in a variety of ways and make the best use of resources.
  • 17. The National Preparedness Goal defines what it means for the whole community to be prepared for all types of disasters and emergencies. The goal itself is succinct: “A secure and resilient nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk.”
  • 18. The National Preparedness Goal organizes the core capabilities into the five mission areas:  Prevention. Prevent, avoid or stop an imminent, threatened or actual act of terrorism.  Protection. Protect our citizens, residents, visitors and assets against the greatest threats and hazards in a manner that allows our interests, aspirations and way of life to thrive.  Mitigation. Reduce the loss of life and property by lessening the impact of future disasters.  Response. Respond quickly to save lives, protect property and the environment, and meet basic human needs in the aftermath of a catastrophic incident.  Recovery. Recover through a focus on the timely restoration, strengthening and revitalization of infrastructure, housing and a sustainable economy, as well as the health, social, cultural, historic and environmental fabric of communities affected by a catastrophic incident.
  • 19. PPD 21 Critical Infrastructure Security and Resilience The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure.
  • 20. MISSION OF DHS PER Quadrennial Homeland Security Review (QHSR)  Prevent terrorism and enhance security  Secure and manage our borders  Enforce and administer our immigration laws  Safeguard and secure cyberspace  Strengthen national preparedness and resilience Key points:  DHS combines 22 various federal agencies  Established by the Homeland Security Act (Public Law 107-296)  DHS officially operational on March 1, 2003
  • 21. OTHER POLICY DIRECTIVES National Security Presidential Directive 38 (NSPD 38) NSPD 38 was issued on July 7, 2004, as the National Strategy to Secure Cyberspace. The contents of this classified directive have never been released, but prior to the issuance of NSPD 38, the Whitehouse released a different document also entitled "National Strategy to Secure Cyberspace" that detailed five priorities to secure cyberspace: 1. A National Cyberspace Security Response System. 2. A National Cyberspace Security Threat and Vulnerability Reduction Program. 3. A National Cyberspace Security Awareness and Training Program. 4. Securing Governments' Cyberspace 5. National Security and International Cyberspace Security Cooperation The National Strategy to Secure Cyberspace The National Strategy to Secure Cyberspace is part of our overall effort to protect the Nation. It is an implementing component of the National Strategy for Homeland Security and is complemented by a National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The purpose of this document is to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact. Securing cyberspace is a difficult strategic challenge that requires coordinated and focused effort from our entire society, the federal government, state and local governments, the private sector, and the American people.
  • 22. KNOWLEDGE POINTS: Blue Campaign The Blue Campaign is the unified voice for the U.S. Department of Homeland Security’s (DHS) efforts to combat human trafficking. Working in collaboration with law enforcement, government, non-governmental and private organizations, the Blue Campaign strives to protect the basic right of freedom and to bring those who exploit human lives to justice. Executive Order 13260 Establishment and Membership. I hereby establish the President's Homeland Security Advisory Council (PHSAC). The PHSAC shall be composed of not more than 21 members appointed by the President. March 19, 2002. National Strategy for Homeland Security The United States National Strategy for Homeland Security is a formal government response to the events of September 11, 2001 at the Pentagon and World Trade Center. The document issued by President George W. Bush outlines the overall strategic considerations for cooperation between the federal government, states, private enterprises, and ordinary citizens in anticipating future terrorism attacks as well as natural disasters and other incidents of national significance.[1] The National Response Framework is the part of the homeland security national strategy that is a Comprehensive Emergency Management guideline for implementing scalable responses to disasters and other incidents of national significance. https://en.wikipedia.org/wiki/National_Strategy_for_Homeland_Security VNSA Violent non-state actors (VNSA), also known as armed non-state actors, are non- state actors, i.e. "individuals or organizations that have economic, political or social power and are able to influence at a national and sometimes international level but do not belong to or ally themselves to any particular country or state,"[1] who employ violence in pursuit of their objectives. The term has been used in several papers published by the U.S. military.[2][3][4][5] There are many reasons why violent non-state actors develop. https://en.wikipedia.org/wiki/Violent_non-state_actor
  • 23.  Warlords  Militias  Insurgencies  Terrorist organizations  Criminal organizations and gangs A warlord is a leader able to exercise military, economic, and political control over a subnational territory within a sovereign state due to his ability to mobilize loyal armed forces. These armed forces, usually considered militias, are loyal to the warlord rather than to the state regime. Warlords have existed throughout much of history, albeit in a variety of different capacities within the political, economic, and social structure of states or ungoverned territories. A militia /mᵻˈlɪʃə/[1] is generally an army or some other type of fighting unit that is composed of non-professional fighters, citizens of a nation or subjects of a state or government who can be called upon to enter a combat situation, as opposed to a professional force of regular, full-time military personnel, or historically, members of a warrior nobility class (e.g., knights or samurai). Unable to hold their own against properly trained and equipped professional forces, it is common for militias to engage in guerrilla warfare or defense instead of being used in open attacks and offensive actions. A paramilitary is a semi-militarized force whose organizational structure, tactics, training, subculture, and (often) function are similar to those of a professional military, but which is not included as part of a state's formal armed forces.[1] Under the law of war, a state may incorporate a paramilitary organization or armed agency (such as a national police, a private volunteer militia) into its combatant armed forces. The other parties to a conflict have to be notified thereof An insurgency is a rebellion against authority (for example, an authority recognized as such by the United Nations) when those taking part in the rebellion are not recognized as belligerents.[1] An insurgency can be fought via counter- insurgency warfare, and may also be opposed by measures to protect the population, and by political and economic actions of various kinds aimed at undermining the insurgents' claims against the incumbent regime.[2] The nature of insurgencies is an ambiguous concept. This is a list of designated terrorist groups by national governments, former governments, and inter-governmental organizations, where the proscription has a significant effect on the group's activities. Many organizations that are accused of being a terrorist organization deny using terrorism as a military tactic to achieve their goals, and there is no international consensus on the legal definition of terrorism.
  • 24. Organized crime is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals who intend to engage in illegal activity, most commonly for money and profit. Some criminal organizations, such as terrorist groups, are politically motivated. Sometimes criminal organizations force people to do business with them, such as when a gang extorts money from shopkeepers for so-called "protection".[1] Gangs may become disciplined enough to be considered organized. A criminal organization or gang can also be referred to as a mafia, mob, or crime syndicate; the network, subculture and community of criminals may be referred to as the underworld.
  • 25. DHS The United States Department of Homeland Security (DHS) is a cabinet department of the United States federal government with responsibilities in public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management. It was created in response to the September 11 attacks. In fiscal year 2017, it was allocated a net discretionary budget of $40.6 billion. With more than 240,000 employees, DHS is the third largest Cabinet department, after the Departments of Defense and Veterans Affairs. Homeland security policy is coordinated at the White House by the Homeland Security Council. Other agencies with significant homeland security responsibilities include the Departments of Health and Human Services, Justice, and Energy. https://en.wikipedia.org/wiki/United_States_Department_of_Homeland_Security
  • 26. DEFINITIONS C3: Cyber Crimes Center CERT: Community Emergency Response Team EX: Explosive DNDO: Domestic Nuclear Detection Office NCCIC: National Cybersecurity and Communications Integration Center NIMS: National Incident Management System NIPP: National Infrastructure Protection Plan NOC: National Operations Center NTAS: National Terrorism Advisory System OEC: Office of Emergency Communications VNSA: Violent Non-State Actors