Chapter 11
Always VigilantAlways Vigilant
Intelligence and Hardening the TargetIntelligence and Hardening the Target
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Background: Intelligence Collection andBackground: Intelligence Collection and
JurisdictionJurisdiction
 The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission
 The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Background: Intelligence Collection andBackground: Intelligence Collection and
JurisdictionJurisdiction
 FBI and Domestic Intelligence Collection AuthorityFBI and Domestic Intelligence Collection Authority
 CIA and International Intelligence CollectionCIA and International Intelligence Collection
AuthorityAuthority
 Diplomatic Security Service AuthorityDiplomatic Security Service Authority
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission
 Office of the Director of National IntelligenceOffice of the Director of National Intelligence
 National Security AgencyNational Security Agency
 Central Intelligence AgencyCentral Intelligence Agency
 Federal Bureau of InvestigationFederal Bureau of Investigation
Martin, Understanding Homeland
Security © 2015 SAGE Publications,
Inc.
 The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges
 Problems of Intelligence CoordinationProblems of Intelligence Coordination
 Case in Point: Successful International IntelligenceCase in Point: Successful International Intelligence
CooperationCooperation
 Problems of Collection and AnalysisProblems of Collection and Analysis
 Report on the U.S. Intelligence Community’s Prewar
Intelligence Assessments on Iraq
Martin, Understanding Homeland
Security © 2015 SAGE Publications,
Inc.
 Critical Infrastructure: Background and ContextCritical Infrastructure: Background and Context
 Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and
Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)
 Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and
Target HardeningTarget Hardening
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Critical Infrastructure: Background andCritical Infrastructure: Background and
ContextContext
 Defining Critical InfrastructureDefining Critical Infrastructure
 Presidential Decision Directive/NSC-63Presidential Decision Directive/NSC-63
 Homeland Security Policy Directive (HSPD)-7Homeland Security Policy Directive (HSPD)-7
 Presidential Policy Directive (PPD)-21Presidential Policy Directive (PPD)-21
 Target HardeningTarget Hardening
 Hardening the Target: Public-Private ContextHardening the Target: Public-Private ContextMartin, Understanding Homeland
Security © 2015 SAGE Publications,
Inc.
 Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and
Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)
 Science and Technology Directorate, InfrastructureScience and Technology Directorate, Infrastructure
Protection and Disaster Management DivisionProtection and Disaster Management Division
 Case in Point:Case in Point: Reference Manual to Mitigate Potential
Terrorist Attacks Against Buildings, Edition 2
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and
Target HardeningTarget Hardening
 Innovative Options for Securing CriticalInnovative Options for Securing Critical
InfrastructureInfrastructure
 Perimeter SecurityPerimeter Security
 Urban Design Features and LandscapingUrban Design Features and Landscaping
 Glazing TechniquesGlazing Techniques
 Architectural BarriersArchitectural Barriers
 Electronic Warning and Detection TechnologiesElectronic Warning and Detection Technologies
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Security Considerations and Patrolling theSecurity Considerations and Patrolling the
BorderBorder
 Hardening the Border: Three AgenciesHardening the Border: Three Agencies
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Security Considerations and Patrolling theSecurity Considerations and Patrolling the
BorderBorder
 Evolution of the U.S. Border PatrolEvolution of the U.S. Border Patrol
 First Border Patrol AcademyFirst Border Patrol Academy
 Second World WarSecond World War
 After September 11, 2001After September 11, 2001
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Hardening the Border: Three AgenciesHardening the Border: Three Agencies
 U.S. Citizenship and Immigration ServicesU.S. Citizenship and Immigration Services
 U.S. Immigration and Customs EnforcementU.S. Immigration and Customs Enforcement
 U.S. Customs and Border ProtectionU.S. Customs and Border Protection
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 A Complex Arrangement: Components of theA Complex Arrangement: Components of the
Transportation SystemTransportation System
 The Transportation Security AdministrationThe Transportation Security Administration
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 A Complex Arrangement: Components of theA Complex Arrangement: Components of the
Transportation SystemTransportation System
 Aviation and the U.S. Federal AviationAviation and the U.S. Federal Aviation
AdministrationAdministration
 Motor Transportation NetworksMotor Transportation Networks
 RailwaysRailways
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 The Transportation Security AdministrationThe Transportation Security Administration
 Aviation and Transportation Security Act of 2001Aviation and Transportation Security Act of 2001
 Federal Air Marshal ServiceFederal Air Marshal Service
 TSA ServicesTSA Services
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: The ThreatCyber-Terror: The Threat
 Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets
 Case in Point: Information Security andCase in Point: Information Security and
CyberwarCyberwar
 Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: The ThreatCyber-Terror: The Threat
 The Internet and the New TerrorismThe Internet and the New Terrorism
 Uses of the InternetUses of the Internet
 CyberwarCyberwar
 CyberterrorismCyberterrorism
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets
 Private Corporations, TelecommunicationsPrivate Corporations, Telecommunications
Companies, Government AgenciesCompanies, Government Agencies
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Case in Point: Information Security andCase in Point: Information Security and
CyberwarCyberwar
 New Technologies as Counterterrorist WeaponsNew Technologies as Counterterrorist Weapons
 Modern Surveillance TechnologiesModern Surveillance Technologies
 EchelonEchelon
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood
 Feasibility: Availability of TechnologiesFeasibility: Availability of Technologies
 Likelihood: A Moot Point?Likelihood: A Moot Point?
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.

Understanding hs ch 11

  • 1.
    Chapter 11 Always VigilantAlwaysVigilant Intelligence and Hardening the TargetIntelligence and Hardening the Target Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 2.
     Background: IntelligenceCollection andBackground: Intelligence Collection and JurisdictionJurisdiction  The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission  The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 3.
     Background: IntelligenceCollection andBackground: Intelligence Collection and JurisdictionJurisdiction  FBI and Domestic Intelligence Collection AuthorityFBI and Domestic Intelligence Collection Authority  CIA and International Intelligence CollectionCIA and International Intelligence Collection AuthorityAuthority  Diplomatic Security Service AuthorityDiplomatic Security Service Authority Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 4.
     The U.S.Intelligence Community: MissionThe U.S. Intelligence Community: Mission  Office of the Director of National IntelligenceOffice of the Director of National Intelligence  National Security AgencyNational Security Agency  Central Intelligence AgencyCentral Intelligence Agency  Federal Bureau of InvestigationFederal Bureau of Investigation Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 5.
     The U.S.Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges  Problems of Intelligence CoordinationProblems of Intelligence Coordination  Case in Point: Successful International IntelligenceCase in Point: Successful International Intelligence CooperationCooperation  Problems of Collection and AnalysisProblems of Collection and Analysis  Report on the U.S. Intelligence Community’s Prewar Intelligence Assessments on Iraq Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 6.
     Critical Infrastructure:Background and ContextCritical Infrastructure: Background and Context  Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)  Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and Target HardeningTarget Hardening Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 7.
     Critical Infrastructure:Background andCritical Infrastructure: Background and ContextContext  Defining Critical InfrastructureDefining Critical Infrastructure  Presidential Decision Directive/NSC-63Presidential Decision Directive/NSC-63  Homeland Security Policy Directive (HSPD)-7Homeland Security Policy Directive (HSPD)-7  Presidential Policy Directive (PPD)-21Presidential Policy Directive (PPD)-21  Target HardeningTarget Hardening  Hardening the Target: Public-Private ContextHardening the Target: Public-Private ContextMartin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 9.
     Federal Guidance:The DHS Building andFederal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)  Science and Technology Directorate, InfrastructureScience and Technology Directorate, Infrastructure Protection and Disaster Management DivisionProtection and Disaster Management Division  Case in Point:Case in Point: Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, Edition 2 Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 10.
     Options forCritical Infrastructure Security andOptions for Critical Infrastructure Security and Target HardeningTarget Hardening  Innovative Options for Securing CriticalInnovative Options for Securing Critical InfrastructureInfrastructure  Perimeter SecurityPerimeter Security  Urban Design Features and LandscapingUrban Design Features and Landscaping  Glazing TechniquesGlazing Techniques  Architectural BarriersArchitectural Barriers  Electronic Warning and Detection TechnologiesElectronic Warning and Detection Technologies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 11.
     Security Considerationsand Patrolling theSecurity Considerations and Patrolling the BorderBorder  Hardening the Border: Three AgenciesHardening the Border: Three Agencies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 12.
     Security Considerationsand Patrolling theSecurity Considerations and Patrolling the BorderBorder  Evolution of the U.S. Border PatrolEvolution of the U.S. Border Patrol  First Border Patrol AcademyFirst Border Patrol Academy  Second World WarSecond World War  After September 11, 2001After September 11, 2001 Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 13.
     Hardening theBorder: Three AgenciesHardening the Border: Three Agencies  U.S. Citizenship and Immigration ServicesU.S. Citizenship and Immigration Services  U.S. Immigration and Customs EnforcementU.S. Immigration and Customs Enforcement  U.S. Customs and Border ProtectionU.S. Customs and Border Protection Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 14.
     A ComplexArrangement: Components of theA Complex Arrangement: Components of the Transportation SystemTransportation System  The Transportation Security AdministrationThe Transportation Security Administration Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 15.
     A ComplexArrangement: Components of theA Complex Arrangement: Components of the Transportation SystemTransportation System  Aviation and the U.S. Federal AviationAviation and the U.S. Federal Aviation AdministrationAdministration  Motor Transportation NetworksMotor Transportation Networks  RailwaysRailways Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 16.
     The TransportationSecurity AdministrationThe Transportation Security Administration  Aviation and Transportation Security Act of 2001Aviation and Transportation Security Act of 2001  Federal Air Marshal ServiceFederal Air Marshal Service  TSA ServicesTSA Services Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 17.
     Cyber-Terror: TheThreatCyber-Terror: The Threat  Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets  Case in Point: Information Security andCase in Point: Information Security and CyberwarCyberwar  Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 18.
     Cyber-Terror: TheThreatCyber-Terror: The Threat  The Internet and the New TerrorismThe Internet and the New Terrorism  Uses of the InternetUses of the Internet  CyberwarCyberwar  CyberterrorismCyberterrorism Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 19.
     Cyber-Terror: PotentialTargetsCyber-Terror: Potential Targets  Private Corporations, TelecommunicationsPrivate Corporations, Telecommunications Companies, Government AgenciesCompanies, Government Agencies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 20.
     Case inPoint: Information Security andCase in Point: Information Security and CyberwarCyberwar  New Technologies as Counterterrorist WeaponsNew Technologies as Counterterrorist Weapons  Modern Surveillance TechnologiesModern Surveillance Technologies  EchelonEchelon Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 21.
     Cyber-Terror: Feasibilityand LikelihoodCyber-Terror: Feasibility and Likelihood  Feasibility: Availability of TechnologiesFeasibility: Availability of Technologies  Likelihood: A Moot Point?Likelihood: A Moot Point? Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.