Defining Homeland Security

 

 

Why is there confusion in defining Homeland Security?
Describe the interdepartmental structure of the Department of Homeland Security.
Explain the comparison of intelligence gathering to academic research, as indicated in the text. Explain how this process is directly applicable to gathering intelligence.
Define national security intelligence and criminal intelligence. What is the difference between national security and law enforcement? According to Richard Best, what two channels of information should law enforcement plan and develop?
Why do symbols hold special importance for terrorism and counterterrorism?
What did Nancy Tucker suggest as the failure of the 9/11 intelligence analysis? Discuss the response of Congress to these failures.

 

 

Defining Homeland Security

 

 

Why is there confusion in defining Homeland Security?
Describe the interdepartmental structure of the Department of Homeland Security.
Explain the comparison of intelligence gathering to academic research, as indicated in the text. Explain how this process is directly applicable to gathering intelligence.
Define national security intelligence and criminal intelligence. What is the difference between national security and law enforcement? According to Richard Best, what two channels of information should law enforcement plan and develop?
Why do symbols hold special importance for terrorism and counterterrorism?
What did Nancy Tucker suggest as the failure of the 9/11 intelligence analysis? Discuss the response of Congress to these failures.

 

 

Intelligence cycle and describe the major elements

 

1. What is OSINT? How does it differ from other intelligence disciplines? How is OSINT being used in the Russian war in Ukraine? What are the limitations of OSINT? Provide specific examples.
2. Draw the intelligence cycle and describe the major elements. How do they relate
3. In what way do intelligence requirements represent the needs of decision-makers? Who contributes to the creation of intelligence requirements? How are intelligence requirements related to resources? Provide specific examples.
4. What are covert operations? How are covert operations in the US approved? Name the various types of covert action? How relevant are the types of covert operations conducted during the Cold War (1950 – 1989) to the current international environment? Provide specific examples.
5. Is the policy maker part of the intelligence process (policy-maker a euphemism for any intelligence customer)? How do policy-makers interact with the intelligence community? Do policy-makers have a right to question analysts about their findings? Explain. Provide specific examples.

 

 

 

 

 

The 2014 Quadrennial Homeland Security Review

 

Prompt: The Department of Homeland Security’s 2014 Quadrennial Homeland Security Review identifies six strategic challenges (found on page 28 of this document – http://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf) that it believes will drive risks facing the nation over the next several years. Explain the process used by local communities (counties or cities) in determining which of these threats pose the greatest risks to their respective communities, and how these communities prioritize their resources in attempting to prevent or mitigate these threats. In addition, what steps and actions might be taken by these communities to prepare for such events in a proactive and effective manner?
(Note: The six strategic challenges are: The terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards. Do not confuse these with the Department of Homeland Security’s five missions)
Technical Requirements

 

 

The 2014 Quadrennial Homeland Security Review

 

Prompt: The Department of Homeland Security’s 2014 Quadrennial Homeland Security Review identifies six strategic challenges (found on page 28 of this document – http://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf) that it believes will drive risks facing the nation over the next several years. Explain the process used by local communities (counties or cities) in determining which of these threats pose the greatest risks to their respective communities, and how these communities prioritize their resources in attempting to prevent or mitigate these threats. In addition, what steps and actions might be taken by these communities to prepare for such events in a proactive and effective manner?
(Note: The six strategic challenges are: The terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards. Do not confuse these with the Department of Homeland Security’s five missions)
Technical Requirements

 

 

The U.S. Department of Homeland Security (DHS)

 

 

 

 

The U.S. Department of Homeland Security (DHS), the Quadrennial Homeland Security Review (QHSR), and, specifically, Mission Four: Safeguard and Secure Cyberspace plays a major role in providing security to The United States of America. The mission of conducting such actions focuses on the importance of securing cyberspace in the public and private sectors. The DHS (2009) leads the effort for securing federal computer systems and networks. Today’s cyberspace is considered one of the top critical infrastructures and nodes needing attention globally. This mission focuses on three key goals that include analyzing and reducing cyber security threats and risks; communicating cyber threat warnings to all local, state, and federal agencies including the private sector; and coordinating effective and efficient ways to respond to critical incidents on core computer systems, networks, and government software applications. This ensures that cybercrimes and terrorism are addressed while securing public and private cyber networks (DHS, 2009).

After reviewing Mission Four of the QHSR, do you believe that revisions are needed in order to counter future cyber-terrorist threats and attacks? Why, or why not? If enhancements are needed, what recommendations would you have as a future homeland security professional?

Operations Management

 

A 2000 word report based on your analysis of the operations management issues raised in this case study. You should consider how applying supply chain management and quality management tools might be beneficial for this business. This will involve critically assessing the issues presented in the case study alongside theory/ literature and making recommendations for improvements to the management systems/ approaches used by the case study organisation. You should also be crickets of the challenges of adopting any supply chain management and quality management tools.

Roles played by chemical agents play in homeland security

 

 

 

 

Based on your assigned readings and own research, what role do chemical agents play in homeland security? What type of chemical agent do you think is most viable as a weapon? Why? What role do explosive hazards play in homeland security? What type of explosive agent do you think is most viable as a weapon? Why? How might or do toxic chemicals play into homeland security?

 

Textbook:

Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.

Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.

 

National security priorities.

 

 

 

 

Each year, the intelligence community establishes national security priorities. To help gain an understanding of prioritization Please choose one agency DIA, CIA, FBI, NSA. Then pick three main priorities to focus on in the upcoming fiscal year. The priorities should reflect the agency’s mission as well as current threats against the United States. Also, explain in times of budget hardship, how would the intelligence community decide where to direct its funding?

 

 

 

 

 

The 5 Mission areas of the Department of Homeland Security

 

Describe the 5 Mission areas of the Department of Homeland Security in APA format.

A bibliography citing three references and a title page. The bibliography and title page are not part of the three pages of writing.

APA Assistance: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html