A Report Card on Homeland Security Information Sharing


Book Description




Homeland Security Intelligence


Book Description

Prior to 9/11, it was possible to make a distinction between ¿domestic intell.¿ ¿ law enforcement info. collected within the U.S. ¿ and ¿foreign intell.¿ ¿ military, political, and economic intell. collected outside the country. Today, threats posed by terrorist groups are now national security threats. This report provides a conceptual model of how to frame HSINT, including geographic, structural/statutory, and holistic approaches. The report argues that there is, in effect, a Homeland Security Intell. Community. State and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. Illus.







Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative


Book Description

This is a print on demand edition of a hard to find publication. The 9/11 Commission cited breakdowns in info. sharing and the failure to fuse pertinent intelligence as key factors in the failure to prevent the 9/11 attacks. Suspicious Activity Reports (SARs) contain info. about criminal activity that may also reveal terrorist pre-operational planning. The Nationwide SAR Initiative (NSI) is an effort to have fed., state, local, and tribal law enforcement org. participate in a standardized, integrated approach to gathering, documenting, processing, and analyzing terrorism-related SARs. This report describes the NSI, the rationale for the sharing of terrorism-related SARs, and how the NSI seeks to achieve this objective. It examines the privacy and civil liberties concerns raised by the initiative. Charts and tables.




Department of Homeland Security Intelligence Enterprise


Book Description

At the outset of the new Admin., the Department of Homeland Security Intelligence (DHSI) enterprise consists of the intelligence elements of 6 DHS operational components: Customs and Border Protection, Immigration and Customs Enforcement, Citizenship and Immigration Services, the Transport. Security Admin., Coast Guard, and the Secret Service. This report provides an overview of DHSI both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. Illustrations.







National Infrastructure Advisory Council Intelligence Information Sharing Final Report and Recommendations


Book Description

Executive Summary The National Infrastructure Advisory Council (NIAC) set out to determine whether the right people are receiving the right intelligence information at the right time to support robust protection and resilience of the Nation’s critical infrastructure. More than 200 interviews and extensive open-source research uncovered a wealth of insights on this complex problem. First, there have been marked improvements in the sharing of intelligence information within the Federal Intelligence Community, and between the Federal Government and regions, States, and municipalities. However, this level of improvement has not been matched in the sharing of intelligence information between the Federal Government and private sector owners and operators of critical infrastructure. Despite some notable successes, this bi-directional sharing is still relatively immature, leaving a large gap between current practices and an optimal system of effective public-private intelligence information sharing. We observe that trust is the essential glue to make this public-private system work. Trust results when partner capabilities are understood and valued, processes are tailored to leverage these capabilities, and these processes are tested and proven valuable to all partners. When breakdowns in information sharing occur, it erodes trust and is counterproductive to risk management. Information sharing is perhaps the most important factor in the protection and resilience of critical infrastructure. Information on threats to infrastructure and their likely impact underlies nearly every security decision made by owners and operators, including which assets to protect, how to make operations more resilient, how to plan for potential disasters, when to ramp up to higher levels of security, and how to respond in the immediate aftermath of a disaster. We looked at intelligence information flowing from the Federal Government to critical infrastructure owners and operators as well as risk information flowing from critical infrastructure owners and operators to the government. Our study reveals the complex ways information is gathered, analyzed, packaged, and shared among government and the owners and operators of critical infrastructures. In tackling this complex subject, we examined the different stages of the intelligence cycle, including requirements generation, information collection, analysis, and dissemination. To gather a variety of perspectives, we conducted extensive interviews with security directors, chief executives, subject matter experts, and government executives and managers. Recognizing that distinct sector characteristics shape information sharing needs, we conducted case studies of five sectors: Commercial Facilities, Healthcare and Public Health, Energy (Oil and Natural Gas), Banking and Finance, and Chemical. While we found some information sharing approaches to be effective, others were not. As a result, we adopted a “capability maturity approach,” which acknowledges that different Federal agencies have different abilities to share information effectively, and we sought to build on what is working.




Legislative Calendar


Book Description




American Jihadist Terrorism: Combating a Complex Threat


Book Description

This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, "homegrown" and "domestic" are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities.




Congressional Record


Book Description

The Congressional Record is the official record of the proceedings and debates of the United States Congress. It is published daily when Congress is in session. The Congressional Record began publication in 1873. Debates for sessions prior to 1873 are recorded in The Debates and Proceedings in the Congress of the United States (1789-1824), the Register of Debates in Congress (1824-1837), and the Congressional Globe (1833-1873)