This is the first single-authored, comprehensive treatment of intelligence support to the full range of homeland security practitioners with a focus on counterterrorism and cyber-security. In the post 9/11 era, federal homeland security professionals rely heavily on intelligence to perform their tasks in all mission areas—prevent, protect, mitigate, respond, and recover. But this enterprise also includes hundreds of thousands of state and local government and private sector practitioners who are still exploring how intelligence can act as a force multiplier in helping them achieve their goals. Steiner provides a thorough and in-depth picture of why intelligence is so crucial to homeland security missions, who provides intelligence support to which homeland security customer, and how intelligence products differ depending on the customer's specific needs and duties. Key Features: • The author's breadth and depth of experience at the federal and state levels provides a single paradigm the intelligence support process. • Chapters present actual (unclassified or de-classified) intelligence documents to demonstrate the characteristics of intelligence required to help a homeland security customer do his/her job. • Real-world student exercises and research issues provide hands-on experience in preparing and evaluating intelligence products tailored to a customer's specific information requirements.
Chapter 1: U.S. Homeland Security
U.S. Homeland Security
The United States has massive, overlapping homeland security and intelligence enterprises. Homeland security intelligence is at the nexus of these two structures and impacts most of the organizations in both communities. In this part of the book, we will look at the structure, organization, and functions of both enterprises. We begin by developing a definition of homeland security and examining the U.S. strategy for achieving a secure homeland. Then we look at the specific homeland security missions and programs and the responsibilities of homeland security actors at the federal, state, local, private, non-governmental, and public levels. The chapter concludes with a brief overview of the risk-management process that is at the heart of homeland security resource allocation.
Definition and Strategy