This is the first single-authored, comprehensive treatment of intelligence support to the full range of homeland security practitioners with a focus on counterterrorism and cyber-security. In the post 9/11 era, federal homeland security professionals rely heavily on intelligence to perform their tasks in all mission areas—prevent, protect, mitigate, respond, and recover. But this enterprise also includes hundreds of thousands of state and local government and private sector practitioners who are still exploring how intelligence can act as a force multiplier in helping them achieve their goals. Steiner provides a thorough and in-depth picture of why intelligence is so crucial to homeland security missions, who provides intelligence support to which homeland security customer, and how intelligence products differ depending on the customer's specific needs and duties. Key Features: • The author's breadth and depth of experience at the federal and state levels provides a single paradigm the intelligence support process. • Chapters present actual (unclassified or de-classified) intelligence documents to demonstrate the characteristics of intelligence required to help a homeland security customer do his/her job. • Real-world student exercises and research issues provide hands-on experience in preparing and evaluating intelligence products tailored to a customer's specific information requirements.
Chapter 8: Cybersecurity Requires a Whole-of-the-Nation Effort
Cybersecurity Requires a Whole-of-the-Nation Effort
The military divides its battlefields into domains. For most of history, wars were fought in only two arenas—on the land and on/under the sea. During the 20th century, two more domains came of age—air and space. We have now added a fifth domain—cyberspace—to our theaters of operations.
Cyberspace1 is fundamentally different from the other domains in many ways, but two are critical to our discussion. First, and arguably most important, virtually all individuals and public and private institutions have a presence and assets in cyberspace that can be attacked by domestic and foreign enemies and criminals at any time. Second, unlike all the other domains, we do not expect the government to protect the public in ...