Chapter 11
Always VigilantAlways VigilantIntelligence and Hardening the Intelligence and Hardening the
TargetTargetMartin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
Background: Intelligence Collection and Background: Intelligence Collection and JurisdictionJurisdiction
The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission The U.S. Intelligence Community: The U.S. Intelligence Community:
ChallengesChallenges
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Background: Intelligence Collection and Background: Intelligence Collection and JurisdictionJurisdiction
FBI and Domestic Intelligence Collection FBI and Domestic Intelligence Collection AuthorityAuthority
CIA and International Intelligence Collection CIA and International Intelligence Collection AuthorityAuthority
Diplomatic Security Service AuthorityDiplomatic Security Service Authority
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission
Office of the Director of National IntelligenceOffice of the Director of National Intelligence National Security AgencyNational Security Agency Central Intelligence AgencyCentral Intelligence Agency Federal Bureau of InvestigationFederal Bureau of Investigation
Martin, Understanding Homeland Security © 2015 SAGE Publications,
Inc.
The U.S. Intelligence Community: The U.S. Intelligence Community: ChallengesChallenges
Problems of Intelligence CoordinationProblems of Intelligence Coordination Case in Point: Successful International Case in Point: Successful International
Intelligence CooperationIntelligence Cooperation Problems of Collection and AnalysisProblems of Collection and Analysis Report on the U.S. Intelligence Community’s
Prewar Intelligence Assessments on Iraq
Martin, Understanding Homeland Security © 2015 SAGE Publications,
Inc.
Critical Infrastructure: Background and Critical Infrastructure: Background and ContextContext
Federal Guidance: The DHS Building and Federal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)
Options for Critical Infrastructure Security Options for Critical Infrastructure Security and Target Hardeningand Target Hardening
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Critical Infrastructure: Background and Critical Infrastructure: Background and ContextContext
Defining Critical InfrastructureDefining Critical Infrastructure Presidential Decision Directive/NSC-63Presidential Decision Directive/NSC-63 Homeland Security Policy Directive (HSPD)-7Homeland Security Policy Directive (HSPD)-7 Presidential Policy Directive (PPD)-21Presidential Policy Directive (PPD)-21
Target HardeningTarget Hardening Hardening the Target: Public-Private ContextHardening the Target: Public-Private ContextMartin, Understanding Homeland
Security © 2015 SAGE Publications, Inc.
Federal Guidance: The DHS Building and Federal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)
Science and Technology Directorate, Science and Technology Directorate, Infrastructure Protection and Disaster Infrastructure Protection and Disaster Management DivisionManagement Division
Case in Point: Case in Point: Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, Edition 2
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Options for Critical Infrastructure Security Options for Critical Infrastructure Security and Target Hardeningand Target Hardening
Innovative Options for Securing Critical Innovative Options for Securing Critical InfrastructureInfrastructure
Perimeter SecurityPerimeter Security Urban Design Features and LandscapingUrban Design Features and Landscaping Glazing TechniquesGlazing Techniques Architectural BarriersArchitectural Barriers Electronic Warning and Detection TechnologiesElectronic Warning and Detection Technologies
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Security Considerations and Patrolling the Security Considerations and Patrolling the BorderBorder
Hardening the Border: Three AgenciesHardening the Border: Three Agencies
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Security Considerations and Patrolling the Security Considerations and Patrolling the BorderBorder
Evolution of the U.S. Border PatrolEvolution of the U.S. Border Patrol First Border Patrol AcademyFirst Border Patrol Academy Second World WarSecond World War After September 11, 2001After September 11, 2001
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Hardening the Border: Three AgenciesHardening the Border: Three Agencies
U.S. Citizenship and Immigration ServicesU.S. Citizenship and Immigration Services U.S. Immigration and Customs EnforcementU.S. Immigration and Customs Enforcement U.S. Customs and Border ProtectionU.S. Customs and Border Protection
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
A Complex Arrangement: Components of A Complex Arrangement: Components of the Transportation Systemthe Transportation System
The Transportation Security The Transportation Security AdministrationAdministration
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
A Complex Arrangement: Components of A Complex Arrangement: Components of the Transportation Systemthe Transportation System
Aviation and the U.S. Federal Aviation Aviation and the U.S. Federal Aviation AdministrationAdministration
Motor Transportation NetworksMotor Transportation Networks RailwaysRailways
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
The Transportation Security The Transportation Security AdministrationAdministration
Aviation and Transportation Security Act of Aviation and Transportation Security Act of 20012001
Federal Air Marshal ServiceFederal Air Marshal Service TSA ServicesTSA Services
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Cyber-Terror: The ThreatCyber-Terror: The Threat Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets Case in Point: Information Security and Case in Point: Information Security and
CyberwarCyberwar Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Cyber-Terror: The ThreatCyber-Terror: The Threat
The Internet and the New TerrorismThe Internet and the New Terrorism Uses of the InternetUses of the Internet CyberwarCyberwar CyberterrorismCyberterrorism
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets
Private Corporations, Telecommunications Private Corporations, Telecommunications Companies, Government AgenciesCompanies, Government Agencies
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Case in Point: Information Security and Case in Point: Information Security and CyberwarCyberwar
New Technologies as Counterterrorist WeaponsNew Technologies as Counterterrorist Weapons Modern Surveillance TechnologiesModern Surveillance Technologies EchelonEchelon
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood
Feasibility: Availability of TechnologiesFeasibility: Availability of Technologies Likelihood: A Moot Point?Likelihood: A Moot Point?
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Top Related