This is the first single-authored, comprehensive treatment of intelligence support to the full range of homeland security practitioners with a focus on counterterrorism and cyber-security. In the post 9/11 era, federal homeland security professionals rely heavily on intelligence to perform their tasks in all mission areas—prevent, protect, mitigate, respond, and recover. But this enterprise also includes hundreds of thousands of state and local government and private sector practitioners who are still exploring how intelligence can act as a force multiplier in helping them achieve their goals. Steiner provides a thorough and in-depth picture of why intelligence is so crucial to homeland security missions, who provides intelligence support to which homeland security customer, and how intelligence products differ depending on the customer's specific needs and duties. Key Features: • The author's breadth and depth of experience at the federal and state levels provides a single paradigm the intelligence support process. • Chapters present actual (unclassified or de-classified) intelligence documents to demonstrate the characteristics of intelligence required to help a homeland security customer do his/her job. • Real-world student exercises and research issues provide hands-on experience in preparing and evaluating intelligence products tailored to a customer's specific information requirements.

U.S. Intelligence

U.S. intelligence

Let's begin with the basics, first defining intelligence and its component activities in the intelligence cycle. Then we will look at the structure of our intelligence enterprise, beginning with the federal Intelligence Community (IC) that was reformed and expanded by law in 2004 in response to new threats to our vital national interests. We will look at how the IC's organizational structure and capabilities now encompass intelligence collection and reporting on terrorism and cyber threats at home and abroad. We will then turn to the newest additions to U.S. intelligence capabilities—state and local government as well as private-sector intelligence. The chapter concludes with a look at how the IC has interpreted its role in implementing the 2010 National Security Strategy that ...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles