SlideShare uma empresa Scribd logo
1 de 21
Chapter 11
Always VigilantAlways Vigilant
Intelligence and Hardening the TargetIntelligence and Hardening the Target
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Background: Intelligence Collection andBackground: Intelligence Collection and
JurisdictionJurisdiction
 The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission
 The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Background: Intelligence Collection andBackground: Intelligence Collection and
JurisdictionJurisdiction
 FBI and Domestic Intelligence Collection AuthorityFBI and Domestic Intelligence Collection Authority
 CIA and International Intelligence CollectionCIA and International Intelligence Collection
AuthorityAuthority
 Diplomatic Security Service AuthorityDiplomatic Security Service Authority
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission
 Office of the Director of National IntelligenceOffice of the Director of National Intelligence
 National Security AgencyNational Security Agency
 Central Intelligence AgencyCentral Intelligence Agency
 Federal Bureau of InvestigationFederal Bureau of Investigation
Martin, Understanding Homeland
Security © 2015 SAGE Publications,
Inc.
 The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges
 Problems of Intelligence CoordinationProblems of Intelligence Coordination
 Case in Point: Successful International IntelligenceCase in Point: Successful International Intelligence
CooperationCooperation
 Problems of Collection and AnalysisProblems of Collection and Analysis
 Report on the U.S. Intelligence Community’s Prewar
Intelligence Assessments on Iraq
Martin, Understanding Homeland
Security © 2015 SAGE Publications,
Inc.
 Critical Infrastructure: Background and ContextCritical Infrastructure: Background and Context
 Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and
Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)
 Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and
Target HardeningTarget Hardening
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Critical Infrastructure: Background andCritical Infrastructure: Background and
ContextContext
 Defining Critical InfrastructureDefining Critical Infrastructure
 Presidential Decision Directive/NSC-63Presidential Decision Directive/NSC-63
 Homeland Security Policy Directive (HSPD)-7Homeland Security Policy Directive (HSPD)-7
 Presidential Policy Directive (PPD)-21Presidential Policy Directive (PPD)-21
 Target HardeningTarget Hardening
 Hardening the Target: Public-Private ContextHardening the Target: Public-Private ContextMartin, Understanding Homeland
Security © 2015 SAGE Publications,
Inc.
 Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and
Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)
 Science and Technology Directorate, InfrastructureScience and Technology Directorate, Infrastructure
Protection and Disaster Management DivisionProtection and Disaster Management Division
 Case in Point:Case in Point: Reference Manual to Mitigate Potential
Terrorist Attacks Against Buildings, Edition 2
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and
Target HardeningTarget Hardening
 Innovative Options for Securing CriticalInnovative Options for Securing Critical
InfrastructureInfrastructure
 Perimeter SecurityPerimeter Security
 Urban Design Features and LandscapingUrban Design Features and Landscaping
 Glazing TechniquesGlazing Techniques
 Architectural BarriersArchitectural Barriers
 Electronic Warning and Detection TechnologiesElectronic Warning and Detection Technologies
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Security Considerations and Patrolling theSecurity Considerations and Patrolling the
BorderBorder
 Hardening the Border: Three AgenciesHardening the Border: Three Agencies
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Security Considerations and Patrolling theSecurity Considerations and Patrolling the
BorderBorder
 Evolution of the U.S. Border PatrolEvolution of the U.S. Border Patrol
 First Border Patrol AcademyFirst Border Patrol Academy
 Second World WarSecond World War
 After September 11, 2001After September 11, 2001
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Hardening the Border: Three AgenciesHardening the Border: Three Agencies
 U.S. Citizenship and Immigration ServicesU.S. Citizenship and Immigration Services
 U.S. Immigration and Customs EnforcementU.S. Immigration and Customs Enforcement
 U.S. Customs and Border ProtectionU.S. Customs and Border Protection
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 A Complex Arrangement: Components of theA Complex Arrangement: Components of the
Transportation SystemTransportation System
 The Transportation Security AdministrationThe Transportation Security Administration
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 A Complex Arrangement: Components of theA Complex Arrangement: Components of the
Transportation SystemTransportation System
 Aviation and the U.S. Federal AviationAviation and the U.S. Federal Aviation
AdministrationAdministration
 Motor Transportation NetworksMotor Transportation Networks
 RailwaysRailways
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 The Transportation Security AdministrationThe Transportation Security Administration
 Aviation and Transportation Security Act of 2001Aviation and Transportation Security Act of 2001
 Federal Air Marshal ServiceFederal Air Marshal Service
 TSA ServicesTSA Services
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: The ThreatCyber-Terror: The Threat
 Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets
 Case in Point: Information Security andCase in Point: Information Security and
CyberwarCyberwar
 Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: The ThreatCyber-Terror: The Threat
 The Internet and the New TerrorismThe Internet and the New Terrorism
 Uses of the InternetUses of the Internet
 CyberwarCyberwar
 CyberterrorismCyberterrorism
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets
 Private Corporations, TelecommunicationsPrivate Corporations, Telecommunications
Companies, Government AgenciesCompanies, Government Agencies
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Case in Point: Information Security andCase in Point: Information Security and
CyberwarCyberwar
 New Technologies as Counterterrorist WeaponsNew Technologies as Counterterrorist Weapons
 Modern Surveillance TechnologiesModern Surveillance Technologies
 EchelonEchelon
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
 Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood
 Feasibility: Availability of TechnologiesFeasibility: Availability of Technologies
 Likelihood: A Moot Point?Likelihood: A Moot Point?
Martin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.

Mais conteúdo relacionado

Destaque

White7e ppt ch12
White7e ppt ch12White7e ppt ch12
White7e ppt ch12difordham
 
US Customs & Border Protection/Jobs for Everyone
US Customs & Border Protection/Jobs for EveryoneUS Customs & Border Protection/Jobs for Everyone
US Customs & Border Protection/Jobs for EveryoneBethanyJablonsky
 
In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...
In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...
In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...Menocarta.net Rete d'Impresa
 
Border Patrol - Count, throttle, kick & ban in perl
Border Patrol - Count, throttle, kick & ban in perlBorder Patrol - Count, throttle, kick & ban in perl
Border Patrol - Count, throttle, kick & ban in perlDavid Morel
 
White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14difordham
 
TSA Final Presentation - Final
TSA Final Presentation - FinalTSA Final Presentation - Final
TSA Final Presentation - FinalMegan Findakly
 
Crime and target hardening
Crime and target hardeningCrime and target hardening
Crime and target hardeningJelly Carr
 
Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"TSA
 
Defence 3 border protection
Defence 3 border protectionDefence 3 border protection
Defence 3 border protectionAlex Thompson
 
Importación de productos perecederos- Información general y requisitos
Importación de productos perecederos- Información general y requisitosImportación de productos perecederos- Información general y requisitos
Importación de productos perecederos- Información general y requisitosProColombia
 

Destaque (12)

White7e ppt ch12
White7e ppt ch12White7e ppt ch12
White7e ppt ch12
 
US Customs & Border Protection/Jobs for Everyone
US Customs & Border Protection/Jobs for EveryoneUS Customs & Border Protection/Jobs for Everyone
US Customs & Border Protection/Jobs for Everyone
 
In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...
In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...
In quali ambiti e contesti aziendali nel 2016 si estenderanno i documenti dig...
 
Border Patrol - Count, throttle, kick & ban in perl
Border Patrol - Count, throttle, kick & ban in perlBorder Patrol - Count, throttle, kick & ban in perl
Border Patrol - Count, throttle, kick & ban in perl
 
U.S. Customs & Border Protection (CBP) Funding Outlook
U.S. Customs & Border Protection (CBP) Funding OutlookU.S. Customs & Border Protection (CBP) Funding Outlook
U.S. Customs & Border Protection (CBP) Funding Outlook
 
White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14
 
TSA Final Presentation - Final
TSA Final Presentation - FinalTSA Final Presentation - Final
TSA Final Presentation - Final
 
Crime and target hardening
Crime and target hardeningCrime and target hardening
Crime and target hardening
 
Container Security Initiative CSI
Container Security Initiative CSIContainer Security Initiative CSI
Container Security Initiative CSI
 
Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"Transportation Security Administration "TSA 101"
Transportation Security Administration "TSA 101"
 
Defence 3 border protection
Defence 3 border protectionDefence 3 border protection
Defence 3 border protection
 
Importación de productos perecederos- Información general y requisitos
Importación de productos perecederos- Información general y requisitosImportación de productos perecederos- Información general y requisitos
Importación de productos perecederos- Información general y requisitos
 

Semelhante a Understanding hs ch 11

Understanding hs ch 03
Understanding hs ch 03Understanding hs ch 03
Understanding hs ch 03erothmanjsu
 
Understanding hs ch 07
Understanding hs ch 07Understanding hs ch 07
Understanding hs ch 07erothmanjsu
 
What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyEly Kahn
 
FY15 DHS Sales Opportunities
FY15 DHS Sales OpportunitiesFY15 DHS Sales Opportunities
FY15 DHS Sales OpportunitiesimmixGroup
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsIT-oLogy
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementThomas Ewert
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
David Allan: Update & Top 5 PFM Disclosure Issues
David Allan: Update & Top 5 PFM Disclosure IssuesDavid Allan: Update & Top 5 PFM Disclosure Issues
David Allan: Update & Top 5 PFM Disclosure IssuesEthical Sector
 
InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015InfraGardNCR
 
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”KTN
 
DocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docx
DocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docxDocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docx
DocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docxelinoraudley582231
 

Semelhante a Understanding hs ch 11 (20)

Understanding hs ch 03
Understanding hs ch 03Understanding hs ch 03
Understanding hs ch 03
 
Understanding hs ch 07
Understanding hs ch 07Understanding hs ch 07
Understanding hs ch 07
 
What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity Policy
 
FY15 DHS Sales Opportunities
FY15 DHS Sales OpportunitiesFY15 DHS Sales Opportunities
FY15 DHS Sales Opportunities
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce Jenkins
 
2002-annual-report
2002-annual-report2002-annual-report
2002-annual-report
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
BCM for National Critical Resources
BCM for National Critical ResourcesBCM for National Critical Resources
BCM for National Critical Resources
 
David Allan: Update & Top 5 PFM Disclosure Issues
David Allan: Update & Top 5 PFM Disclosure IssuesDavid Allan: Update & Top 5 PFM Disclosure Issues
David Allan: Update & Top 5 PFM Disclosure Issues
 
InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015InfragardNCR Annual Report 2015
InfragardNCR Annual Report 2015
 
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
DocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docx
DocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docxDocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docx
DocumentationIndexed MachineryAuthorDatePurposeTo display the 2014.docx
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 

Mais de erothmanjsu

Understanding hs ch 08
Understanding hs ch 08Understanding hs ch 08
Understanding hs ch 08erothmanjsu
 
Understanding hs ch 02
Understanding hs ch 02Understanding hs ch 02
Understanding hs ch 02erothmanjsu
 
Understanding terror 5e ch 15
Understanding terror 5e ch 15Understanding terror 5e ch 15
Understanding terror 5e ch 15erothmanjsu
 
Understanding terror 5e ch 14
Understanding terror 5e ch 14Understanding terror 5e ch 14
Understanding terror 5e ch 14erothmanjsu
 
Understanding terror 5e ch 13
Understanding terror 5e ch 13Understanding terror 5e ch 13
Understanding terror 5e ch 13erothmanjsu
 
Understanding terror 5e ch 12
Understanding terror 5e ch 12Understanding terror 5e ch 12
Understanding terror 5e ch 12erothmanjsu
 
Understanding terror 5e ch 11
Understanding terror 5e ch 11Understanding terror 5e ch 11
Understanding terror 5e ch 11erothmanjsu
 
Understanding terror 5e ch 10
Understanding terror 5e ch 10Understanding terror 5e ch 10
Understanding terror 5e ch 10erothmanjsu
 
Understanding terror 5e ch 09
Understanding terror 5e ch 09Understanding terror 5e ch 09
Understanding terror 5e ch 09erothmanjsu
 
Understanding terror 5e ch 08
Understanding terror 5e ch 08Understanding terror 5e ch 08
Understanding terror 5e ch 08erothmanjsu
 
Understanding terror 5e ch 07
Understanding terror 5e ch 07Understanding terror 5e ch 07
Understanding terror 5e ch 07erothmanjsu
 
Understanding terror 5e ch 06
Understanding terror 5e ch 06Understanding terror 5e ch 06
Understanding terror 5e ch 06erothmanjsu
 
Understanding terror 5e ch 05
Understanding terror 5e ch 05Understanding terror 5e ch 05
Understanding terror 5e ch 05erothmanjsu
 
Understanding terror 5e ch 04
Understanding terror 5e ch 04Understanding terror 5e ch 04
Understanding terror 5e ch 04erothmanjsu
 
Understanding terror 5e ch 03
Understanding terror 5e ch 03Understanding terror 5e ch 03
Understanding terror 5e ch 03erothmanjsu
 
Understanding terror 5e ch 02
Understanding terror 5e ch 02Understanding terror 5e ch 02
Understanding terror 5e ch 02erothmanjsu
 
Understanding terror 5e ch 01
Understanding terror 5e ch 01Understanding terror 5e ch 01
Understanding terror 5e ch 01erothmanjsu
 

Mais de erothmanjsu (17)

Understanding hs ch 08
Understanding hs ch 08Understanding hs ch 08
Understanding hs ch 08
 
Understanding hs ch 02
Understanding hs ch 02Understanding hs ch 02
Understanding hs ch 02
 
Understanding terror 5e ch 15
Understanding terror 5e ch 15Understanding terror 5e ch 15
Understanding terror 5e ch 15
 
Understanding terror 5e ch 14
Understanding terror 5e ch 14Understanding terror 5e ch 14
Understanding terror 5e ch 14
 
Understanding terror 5e ch 13
Understanding terror 5e ch 13Understanding terror 5e ch 13
Understanding terror 5e ch 13
 
Understanding terror 5e ch 12
Understanding terror 5e ch 12Understanding terror 5e ch 12
Understanding terror 5e ch 12
 
Understanding terror 5e ch 11
Understanding terror 5e ch 11Understanding terror 5e ch 11
Understanding terror 5e ch 11
 
Understanding terror 5e ch 10
Understanding terror 5e ch 10Understanding terror 5e ch 10
Understanding terror 5e ch 10
 
Understanding terror 5e ch 09
Understanding terror 5e ch 09Understanding terror 5e ch 09
Understanding terror 5e ch 09
 
Understanding terror 5e ch 08
Understanding terror 5e ch 08Understanding terror 5e ch 08
Understanding terror 5e ch 08
 
Understanding terror 5e ch 07
Understanding terror 5e ch 07Understanding terror 5e ch 07
Understanding terror 5e ch 07
 
Understanding terror 5e ch 06
Understanding terror 5e ch 06Understanding terror 5e ch 06
Understanding terror 5e ch 06
 
Understanding terror 5e ch 05
Understanding terror 5e ch 05Understanding terror 5e ch 05
Understanding terror 5e ch 05
 
Understanding terror 5e ch 04
Understanding terror 5e ch 04Understanding terror 5e ch 04
Understanding terror 5e ch 04
 
Understanding terror 5e ch 03
Understanding terror 5e ch 03Understanding terror 5e ch 03
Understanding terror 5e ch 03
 
Understanding terror 5e ch 02
Understanding terror 5e ch 02Understanding terror 5e ch 02
Understanding terror 5e ch 02
 
Understanding terror 5e ch 01
Understanding terror 5e ch 01Understanding terror 5e ch 01
Understanding terror 5e ch 01
 

Último

Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCNAP Global Network
 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)NAP Global Network
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...tanu pandey
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLSarandianics
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...tanu pandey
 

Último (20)

Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 

Understanding hs ch 11

  • 1. Chapter 11 Always VigilantAlways Vigilant Intelligence and Hardening the TargetIntelligence and Hardening the Target Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 2.  Background: Intelligence Collection andBackground: Intelligence Collection and JurisdictionJurisdiction  The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission  The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 3.  Background: Intelligence Collection andBackground: Intelligence Collection and JurisdictionJurisdiction  FBI and Domestic Intelligence Collection AuthorityFBI and Domestic Intelligence Collection Authority  CIA and International Intelligence CollectionCIA and International Intelligence Collection AuthorityAuthority  Diplomatic Security Service AuthorityDiplomatic Security Service Authority Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 4.  The U.S. Intelligence Community: MissionThe U.S. Intelligence Community: Mission  Office of the Director of National IntelligenceOffice of the Director of National Intelligence  National Security AgencyNational Security Agency  Central Intelligence AgencyCentral Intelligence Agency  Federal Bureau of InvestigationFederal Bureau of Investigation Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 5.  The U.S. Intelligence Community: ChallengesThe U.S. Intelligence Community: Challenges  Problems of Intelligence CoordinationProblems of Intelligence Coordination  Case in Point: Successful International IntelligenceCase in Point: Successful International Intelligence CooperationCooperation  Problems of Collection and AnalysisProblems of Collection and Analysis  Report on the U.S. Intelligence Community’s Prewar Intelligence Assessments on Iraq Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 6.  Critical Infrastructure: Background and ContextCritical Infrastructure: Background and Context  Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)  Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and Target HardeningTarget Hardening Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 7.  Critical Infrastructure: Background andCritical Infrastructure: Background and ContextContext  Defining Critical InfrastructureDefining Critical Infrastructure  Presidential Decision Directive/NSC-63Presidential Decision Directive/NSC-63  Homeland Security Policy Directive (HSPD)-7Homeland Security Policy Directive (HSPD)-7  Presidential Policy Directive (PPD)-21Presidential Policy Directive (PPD)-21  Target HardeningTarget Hardening  Hardening the Target: Public-Private ContextHardening the Target: Public-Private ContextMartin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 8.
  • 9.  Federal Guidance: The DHS Building andFederal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)Infrastructure Protection Series (BIPS)  Science and Technology Directorate, InfrastructureScience and Technology Directorate, Infrastructure Protection and Disaster Management DivisionProtection and Disaster Management Division  Case in Point:Case in Point: Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, Edition 2 Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 10.  Options for Critical Infrastructure Security andOptions for Critical Infrastructure Security and Target HardeningTarget Hardening  Innovative Options for Securing CriticalInnovative Options for Securing Critical InfrastructureInfrastructure  Perimeter SecurityPerimeter Security  Urban Design Features and LandscapingUrban Design Features and Landscaping  Glazing TechniquesGlazing Techniques  Architectural BarriersArchitectural Barriers  Electronic Warning and Detection TechnologiesElectronic Warning and Detection Technologies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 11.  Security Considerations and Patrolling theSecurity Considerations and Patrolling the BorderBorder  Hardening the Border: Three AgenciesHardening the Border: Three Agencies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 12.  Security Considerations and Patrolling theSecurity Considerations and Patrolling the BorderBorder  Evolution of the U.S. Border PatrolEvolution of the U.S. Border Patrol  First Border Patrol AcademyFirst Border Patrol Academy  Second World WarSecond World War  After September 11, 2001After September 11, 2001 Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 13.  Hardening the Border: Three AgenciesHardening the Border: Three Agencies  U.S. Citizenship and Immigration ServicesU.S. Citizenship and Immigration Services  U.S. Immigration and Customs EnforcementU.S. Immigration and Customs Enforcement  U.S. Customs and Border ProtectionU.S. Customs and Border Protection Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 14.  A Complex Arrangement: Components of theA Complex Arrangement: Components of the Transportation SystemTransportation System  The Transportation Security AdministrationThe Transportation Security Administration Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 15.  A Complex Arrangement: Components of theA Complex Arrangement: Components of the Transportation SystemTransportation System  Aviation and the U.S. Federal AviationAviation and the U.S. Federal Aviation AdministrationAdministration  Motor Transportation NetworksMotor Transportation Networks  RailwaysRailways Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 16.  The Transportation Security AdministrationThe Transportation Security Administration  Aviation and Transportation Security Act of 2001Aviation and Transportation Security Act of 2001  Federal Air Marshal ServiceFederal Air Marshal Service  TSA ServicesTSA Services Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 17.  Cyber-Terror: The ThreatCyber-Terror: The Threat  Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets  Case in Point: Information Security andCase in Point: Information Security and CyberwarCyberwar  Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 18.  Cyber-Terror: The ThreatCyber-Terror: The Threat  The Internet and the New TerrorismThe Internet and the New Terrorism  Uses of the InternetUses of the Internet  CyberwarCyberwar  CyberterrorismCyberterrorism Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 19.  Cyber-Terror: Potential TargetsCyber-Terror: Potential Targets  Private Corporations, TelecommunicationsPrivate Corporations, Telecommunications Companies, Government AgenciesCompanies, Government Agencies Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 20.  Case in Point: Information Security andCase in Point: Information Security and CyberwarCyberwar  New Technologies as Counterterrorist WeaponsNew Technologies as Counterterrorist Weapons  Modern Surveillance TechnologiesModern Surveillance Technologies  EchelonEchelon Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
  • 21.  Cyber-Terror: Feasibility and LikelihoodCyber-Terror: Feasibility and Likelihood  Feasibility: Availability of TechnologiesFeasibility: Availability of Technologies  Likelihood: A Moot Point?Likelihood: A Moot Point? Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.