This is the first single-authored, comprehensive treatment of intelligence support to the full range of homeland security practitioners with a focus on counterterrorism and cyber-security. In the post 9/11 era, federal homeland security professionals rely heavily on intelligence to perform their tasks in all mission areas—prevent, protect, mitigate, respond, and recover. But this enterprise also includes hundreds of thousands of state and local government and private sector practitioners who are still exploring how intelligence can act as a force multiplier in helping them achieve their goals. Steiner provides a thorough and in-depth picture of why intelligence is so crucial to homeland security missions, who provides intelligence support to which homeland security customer, and how intelligence products differ depending on the customer's specific needs and duties. Key Features: • The author's breadth and depth of experience at the federal and state levels provides a single paradigm the intelligence support process. • Chapters present actual (unclassified or de-classified) intelligence documents to demonstrate the characteristics of intelligence required to help a homeland security customer do his/her job. • Real-world student exercises and research issues provide hands-on experience in preparing and evaluating intelligence products tailored to a customer's specific information requirements.

Intelligence Support to Policy Formulation

Intelligence support to policy formulation

We now begin the task of examining how intelligence is used to support the various homeland security missions and customers, starting with policy development or formulation, because this is the first and most fundamental homeland security task. As we saw in Chapter 1, you need to have a strategy to guide the acquisition of capabilities and development of programs to eventually achieve your vision. For homeland security, this means that senior, elected government officials at the federal, state, and local levels, and private-sector owners and operators must formulate or adopt a security policy. They must define a vision of what they want to achieve and a plan specifying what resources and capabilities are needed to ...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles