Creating a Trusted Information Network for Homeland Security

Creating a Trusted Information Network for Homeland Security
Author:
Publisher:
Total Pages: 70
Release: 2003
Genre: Civil defense
ISBN:

Report concluds that by using currently available technology, the government can set up a network that substantially improves our ability to prevent terrorist attacks and protect civil liberties. It provided details for the necessary elements of a proposed System-wide Homeland Analysis and Resource Exchange (SHARE) Network that would more effectively combat terrorism than our current system, while protecting privacy. The public's trust in a governmental network that makes use of information about its own people can be achieved only if government-wide guidelines for information sharing and privacy protection are established after open public debates on the issue. The Task Force therefore proposed that the President set the goal of creating such a network, and issue clear government-wide policy guidelines for the collection and use of information about people in the U.S., including private sector information.

Fixing the Homeland Security Information Network

Fixing the Homeland Security Information Network
Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment
Publisher:
Total Pages: 56
Release: 2009
Genre: Intelligence service
ISBN:

Next-Generation Homeland Security

Next-Generation Homeland Security
Author: John Morton
Publisher: Naval Institute Press
Total Pages: 426
Release: 2012-10-15
Genre: Political Science
ISBN: 1612510892

Security governance in the second decade of the 21st century is ill-serving the American people. Left uncorrected, civic life and national continuity will remain increasingly at risk. At stake well beyond our shores is the stability and future direction of an international political and economic system dependent on robust and continued U.S. engagement. Outdated hierarchical, industrial structures and processes configured in 1947 for the Cold War no longer provide for the security and resilience of the homeland. Security governance in this post-industrial, digital age of complex interdependencies must transform to anticipate and if necessary manage a range of cascading catastrophic effects, whether wrought by asymmetric adversaries or technological or natural disasters. Security structures and processes that perpetuate a 20th century, top-down, federal-centric governance model offer Americans no more than a single point-of-failure. The strategic environment has changed; the system has not. Changes in policy alone will not bring resolution. U.S. security governance today requires a means to begin the structural and process transformation into what this book calls Network Federalism. Charting the origins and development of borders-out security governance into and through the American Century, the book establishes how an expanding techno-industrial base enabled American hegemony. Turning to the homeland, it introduces a borders-in narrative—the convergence of the functional disciplines of emergency management, civil defense, resource mobilization and counterterrorism into what is now called homeland security. For both policymakers and students a seminal work in the yet-to-be-established homeland security canon, this book records the political dynamics behind the creation of the Department of Homeland Security, the impact of Hurricane Katrina and the ongoing development of what is now called the Homeland Security Enterprise. The work makes the case that national security governance has heretofore been one-dimensional, involving horizontal interagency structures and processes at the Federal level. Yet homeland security in this federal republic has a second dimension that is vertical, intergovernmental, involving sovereign states and local governments whose personnel are not in the President’s chain of command. In the strategic environment of the post-industrial 21st century, states thus have a co-equal role in strategy and policy development, resourcing and operational execution to perform security and resilience missions. This book argues that only a Network Federal governance will provide unity of effort to mature the Homeland Security Enterprise. The places to start implementing network federal mechanisms are in the ten FEMA regions. To that end, it recommends establishment of Regional Preparedness Staffs, composed of Federal, state and local personnel serving as co-equals on Intergovernmental Personnel Act (IPA) rotational assignments. These IPAs would form the basis of an intergovernmental and interdisciplinary homeland security professional cadre to build a collaborative national preparedness culture. As facilitators of regional unity of effort with regard to prioritization of risk, planning, resourcing and operational execution, these Regional Preparedness Staffs would provide the Nation with decentralized network nodes enabling security and resilience in this 21st century post-industrial strategic environment.

The Homeland Security Information Network

The Homeland Security Information Network
Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment
Publisher:
Total Pages: 64
Release: 2007
Genre: Computers
ISBN:

Intelligence Guide for First Responders

Intelligence Guide for First Responders
Author:
Publisher:
Total Pages: 103
Release: 2009
Genre: First responders
ISBN:

This Interagency Threat Assessment and Coordination Group (ITACG) Intelligence Guide for First Responders is designed to assist state, local, tribal law enforcement, firefighting, homeland security, and appropriate private sector personnel in accessing and understanding Federal counterterrorism, homeland security, and weapons of mass destruction intelligence reporting. Most of the information contained in this guide was compiled, derived, and adapted from existing Intelligence Community and open source references. The ITACG consists of state, local, and tribal first responders and federal intelligence analysts from the Department of Homeland Security and the Federal Bureau of Investigation, working at the National Counterterrorism Center (NCTC) to enhance the sharing of federal counterterrorism, homeland security, and weapons of mass destruction information with state, local, and tribal consumers of intelligence.

Intelligence Information

Intelligence Information
Author: Richard A. Best, Jr.
Publisher: DIANE Publishing
Total Pages: 16
Release: 2011-07-06
Genre: Technology & Engineering
ISBN: 1437987532

Unauthorized disclosures of classified intelligence are seen as doing significant damage to U.S. security. This is the case whether information is disclosed to a foreign government or published on the Internet. On the other hand, if intelligence is not made available to government officials who need it to do their jobs, enormous expenditures on collection, analysis, and dissemination are wasted. These conflicting concerns require careful and difficult balancing.Investigations of the 9/11 attacks concluded that both technical and policy barriers had limited sharing of information collected by different agencies that, if viewed together, could have provided useful insight into the unfolding plot. A consensus emerged that U.S. intelligenceagencies should share information more widely in order that analysts could integrate clues acquired by different agencies in order to "connect the dots." This report focuses on information acquired, analyzed, and disseminated by agencies of the U.S. Intelligence Community, but these concerns also affect classified information outside the Intelligence Community. Contents: (1) Background; (2) Changes Undertaken in Response to 9/11: The Information Sharing Environment; (3) Limitations and Risks of Information Sharing: Detroit Bomb Attempt; Fort Hood Shooting; WikiLeaks; (4) Conclusion. This is a print on demand report.

Review of the Department of Homeland Security's Approach to Risk Analysis

Review of the Department of Homeland Security's Approach to Risk Analysis
Author: National Research Council
Publisher: National Academies Press
Total Pages: 161
Release: 2010-09-10
Genre: Political Science
ISBN: 0309161525

The events of September 11, 2001 changed perceptions, rearranged national priorities, and produced significant new government entities, including the U.S. Department of Homeland Security (DHS) created in 2003. While the principal mission of DHS is to lead efforts to secure the nation against those forces that wish to do harm, the department also has responsibilities in regard to preparation for and response to other hazards and disasters, such as floods, earthquakes, and other "natural" disasters. Whether in the context of preparedness, response or recovery from terrorism, illegal entry to the country, or natural disasters, DHS is committed to processes and methods that feature risk assessment as a critical component for making better-informed decisions. Review of the Department of Homeland Security's Approach to Risk Analysis explores how DHS is building its capabilities in risk analysis to inform decision making. The department uses risk analysis to inform decisions ranging from high-level policy choices to fine-scale protocols that guide the minute-by-minute actions of DHS employees. Although DHS is responsible for mitigating a range of threats, natural disasters, and pandemics, its risk analysis efforts are weighted heavily toward terrorism. In addition to assessing the capability of DHS risk analysis methods to support decision-making, the book evaluates the quality of the current approach to estimating risk and discusses how to improve current risk analysis procedures. Review of the Department of Homeland Security's Approach to Risk Analysis recommends that DHS continue to build its integrated risk management framework. It also suggests that the department improve the way models are developed and used and follow time-tested scientific practices, among other recommendations.

Protecting What Matters

Protecting What Matters
Author: Clayton Northouse
Publisher: Rowman & Littlefield
Total Pages: 238
Release: 2007-02-01
Genre: Political Science
ISBN: 9780815761273

A Brookings Institution Press and the Computer Ethics Institute publication Can we safeguard our nation's security without weakening cherished liberties? And how does technology affect the potential conflict between these fundamental goals? These questions acquired renewed urgency in the wake of the 9/11 attacks. They also spurred heated debates over such controversial measures as Total Information Awareness and the USA PATRIOT Act. In this volume, leading figures from the worlds of government, public policy, and business analyze the critical issues underlying these debates. The first set of essays examines the relationship between liberty and security and explores where the public stands on how best to balance the two. In the second section, the authors focus on information technology's role in combating terrorism, as well as tools, policies, and procedures that can strengthen both security and liberty at the same time. Finally, the third part of the book takes on a series of key legal issues concerning the restrictions that should be placed on the government's power to exploit these powerful new technologies. Contributors include Zoë Baird (Markle Foundation), James Barksdale (Barksdale Group), Bruce Berkowitz (Hoover Institution), Jerry Berman (Center for Democracy and Technology), Beryl A. Howell (Stroz Friedberg), Jon Kyl (U.S. Senate), Gilman Louie (In-Q-Tel), David Luban (Georgetown University), Richard A. Posner (U.S. Court of Appeals for the Seventh Circuit), Marc Rotenberg (Electronic Privacy Information Center), James Steinberg (Brookings), Larry Thompson (Brookings), Gayle von Eckartsberg (In-Q-Tel), and Alan F. Westin (Columbia University).