Presentation is loading. Please wait.

Presentation is loading. Please wait.

Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.

Similar presentations


Presentation on theme: "Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8."— Presentation transcript:

1 Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8

2 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-2 Intelligence Failure – What Does It Mean? Fail to Collect at Multiple Levels Once Collected, Fail to Recognize Its Importance, Link It With Other Pertinent Information, or Interpret It in a Useable Policy Format Fail to Share Information, Resulting in Many Incomplete Pieces of the Same Puzzles

3 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-3 The National Security Council and The Homeland Security Council President’s Primary Forum for Considering Matters Related to National Security and Foreign Policy Coordinates the Implementation of Policies Across the Various Federal Departments and Agencies Ensure That There is Consistency in Policy Implementation Produce National Intelligence Estimate NSC and HSC Were Merged in May 2009

4 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-4 The Director of National Intelligence Head of the Intelligence Community Advises the President and National Security Council or Intelligence Related to National Security Submits Budgets for the Intelligence Agencies Coordinates the Agencies Comprising the Intelligence Community

5 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-5 Homeland Security Intelligence Four Dimensions Relative to Intelligence Foreign Domestic Military Homeland Security

6 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-6 Types of Intelligence Collection Activities Human Intelligence – HUMINT Signals Intelligence – SIGINT Measures and Signatures – MASINT Imagery Intelligence – IMINT Open Source Intelligence - OSINT

7 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-7 Agencies Within the American Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of Energy Department of Homeland Security Department of State

8 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-8 Agencies Within the American Intelligence Community (continued) Department of Treasury Drug Enforcement Administration Office Federal Bureau of Investigation National Geospatial-Intelligence Agency National Reconnaissance Office

9 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-9 Agencies Within the American Intelligence Community (continued) National Security Agency US Air Force US Army US Coast Guard US Marine US Navy

10 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-10 Intersection of Policy Decisions and Intelligence: The Intelligence Cycle Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination

11 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-11 Counterintelligence Keep Weapons of Mass Destruction and Other Embargoed Technologies from Getting Into Wrong Hands Protect the Secrets of the U.S. Intelligence Community Protect the Secrets of the U.S. Government and Contractors Protect Our Nation’s Critical National Assets Focus on Countries that Pose the Greatest Threat to the U.S.

12 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-12 Domestic Industrial Espionage Targeting U.S. Firms for Technology Posting Personnel at U.S. Military Bases to Collect Classified Information Using Commercial Firms in U.S. to Target and Acquire U.S. Technology Recruitment of Students, Professors, Scientists, and Researchers to Engage in Technology Collections

13 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-13 Domestic Industrial Espionage (continued) Forming Ventures in U.S. Firms to Gain Sensitive Technologies or Establishing Foreign Research Facilities and Software Development Companies Outside U.S. to Work on Projects Related to Protected Programs Offering Technical Services to U.S. Research Facilities or Cleared Defense Contractors in the hope of Gaining Access to Protected Technologies Exploiting Foreign Visits to the U.S. and Collecting at Conventions and Expositions Relying on Cyber Tools to Collect Sensitive U.S. Technology and Economic Information

14 Homeland Security, First Edition Gaines © 2012 Pearson Education, Inc. All Rights Reserved. 8-14 Secure Flight Program – No Fly List Maintained by TSA Deter Potential Terrorist Plots or Hijackings Serves to Keep Certain Individual Out of our Country Provides a Psychological Benefit May Prevent Another Costly Attack


Download ppt "Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8."

Similar presentations


Ads by Google