Verified Document

U.S. Strategy On Terrorism There Thesis

(White House, 2003) II. The NATIONAL STRATEGY for SECURE CYBERSPACE

The National Strategy for Secure Cyberspace strategic plan states that its strategic objectives are "consistent with the National Strategy for Homeland Security' and that those objectives include: (1) prevention of cyber attacks against America's critical infrastructure; (2) reduction of national vulnerability to cyber attacks and; (3) minimization of damage and recovery time from cyber attacks that do occur. (White House, 2003) This report additionally relates that the sector best equipped and structured in providing a response to cyber threats which are constantly evolving is the private sector. Specifically stated in the report is "Public-private engagement is a key component of our Strategy to secure cyberspace. Public-private partnerships can usefully confront coordination problems. They can significantly enhance information exchange and cooperation." (White House, 2003) Under this strategy to secure cyberspace it is stated that engagement between the pubic and private sectors will take various forms and additionally will "...address awareness, training, technological improvements, vulnerability remediation, and recovery operations." (White House, 2003) the Department of Homeland Security was signed into legislation on November 25, 2002. DHS is a "cabinet-level department" that serves to "unite 22 federal entities for the common purpose of improving" homeland security in the United States. Responsibilities of the Secretary of DHS include: (1) development of a comprehensive national plan for securing the key resources and critical infrastructure of the United States; (2) Providing crisis management in response to attacks on critical information systems; (3) Providing technical assistance to the private sector and other government entities with respect to emergency recovery plans for failures of critical information systems; (4) coordination with other agencies of the federal government to provide specific warning information and advice about appropriate protective measures and countermeasures to state, local, and nongovernmental organizations including the private sector, academia, and the public; and; (5) Performing and funding research and development along with other agencies that will lead to new scientific understanding and technologies in support of homeland security. (White House, 2003) Five national priorities stated by the National Strategy to Secure Cyberspace are the following: (1) a National Cyberspace Security Response System; (2) a National Cyberspace Security Threat and Vulnerability Reduction Program; (3) a National Cyberspace Security Awareness and Training Program; (4) Securing Governments' Cyberspace; and (5) National Security and International Cyberspace Security Cooperation. (White House, 2003) Stated as eight major actions and initiatives for cyberspace security response are the following: (1) establishment of a public-private architecture for responding to national-level cyber incidents; (2) Provide for the development of tactical and strategic analysis of cyber attacks and vulnerability assessments; (3) Encourage the development of a private sector capability to share a synoptic view of the health of cyberspace; (4) Expand the Cyber Warning and Information Network to support the role of DHS in coordinating crisis management for cyberspace security; (5) Improve national incident management;(6) Coordinate processes for voluntary participation in the development of national public-private continuity and contingency plans; (7) Exercise cybersecurity continuity plans for federal systems; and (8) Improve and enhance public-private information sharing involving cyber attacks, threats, and vulnerabilities.

Stated as the eight major actions and initiatives to reduce threats and related vulnerabilities are the following: (1) Enhance law enforcement's capabilities for preventing and prosecuting cyberspace attacks; (2) Create a process for national vulnerability assessments to better understand the potential consequences of threats and vulnerabilities; (3) Secure the mechanisms of the Internet by improving protocols and routing; (4) Foster the use of trusted digital control systems/supervisory control and data acquisition systems; (5) Reduce and remediate software vulnerabilities; (6) understand infrastructure interdependencies and improve the physical security of cyber systems and telecommunications; (7) Prioritize federal cybersecurity research and development agendas; and (8) Assess and secure emerging systems.

III. The DHS (DEPARTMENT of HOMELAND SECURITY) INTELLIGENCE ENTERPRISE STRATEGIC PLAN

Stated as goals that "encompass the breadth of activities of the Department of Homeland Security Intelligence Enterprise" and that illustrates where efforts will be concentrated in the improvement of capabilities are those as follows:

Goal 1: Requirements, Collection and Dissemination:...

Lead the Homeland Security Intelligence Community to support Continuity of Operations (COOP), Continuity of Government (COG) and National Special Security Events (NSSEs) and other special events, emerging incidents, and exercises.
Goal 5: Mission Advocacy: Serve as the primary Federal Government homeland security intelligence-related information provider to our Stakeholders while acting as their advocate for intelligence-related information within the Intelligence, Defense and Law Enforcement Communities.

Goal 6: Culture: Promote a culture that supports and rewards initiative, creativity, diversity, and professionalism.

Goal 7: Business Process: Create open and flexible business processes that foster operational excellence and mission success. (U.S. Department of Homeland Security, 2006)

Primary objectives stated by the DHS Enterprise Strategic Plan are the following objectives:

1) Information and Collection Requirements: Build and continuously update the definitive list of Homeland Security Stakeholders' information and collection requirements, including Priority Intelligence Information Requirements (PIIRs) and Standing Information Needs (SINs.)

2) Collection Management: Build an integrated collection policy and structure for DHS. Provide collection management services to non-IC DHS components, and provide the linkage to DoD, IC, and law enforcement collection systems.

3) Collection Activities: Manage and expand departmental collection resources to more effectively support customer information needs. Improve efficiency and reduce duplication of DHS component collection resources through proper policy and oversight.

4) Reporting: Manage Homeland Security intelligence-related information reporting, seamlessly linking all levels of government and the private sector. Standardize DHS reporting and improve the ability of DHS components to report all relevant intelligence related information obtained through operations; and 5) Dissemination: Manage dissemination of DHS-origin reports throughout the Homeland Security Stakeholder Community, as well as dissemination of non-DHS origin reports to DHS components. (U.S. Department of Homeland Security, 2006)

Analysis and warning objectives include: (1) warning; (2) strategic analysis; (3) operational support; (4) alternative analysis; and (5) customized production. Sharing and management goals include the following objectives: (1) intelligence relation information sharing policy and implementation; (2) data access; (3) information management; (4) technology and tools. (U.S. Department of Homeland Security, 2006)

Objectives stated toward the fourth goal of 'mitigation, prevention and readiness' include the following objectives: (1) ensure a seamless DHS capability for support of the full scope of customers in all operating environments; (2) build partnerships that Homeland security stakeholder through development of an "integrated Homeland Security intelligence approach that will succeed and adapt to all operating environments and the transitions between them; Intelligence Leadership: During COOP / COG, NSSEs, and emerging incidents, be the intelligence provider of choice for all Homeland Security Stakeholders; (4) Counterintelligence: Consistent with legal authorities, establish measures to protect the Department against hostile intelligence and operational activities conducted by or on behalf of foreign powers or international terrorist activities. (U.S. Department of Homeland Security, 2006) Stated as mission advocacy objectives are: (1) establishment of priorities; (2) deployment of experts; (3) coordination of intelligence support; (4) strengthen activities in coordination of Homeland Security Intelligence projects between the DHS components, Intelligence, Law Enforcement and Defense Communities, leveraging relevant expertise; and (5) Outreach through ensuring customers of DHS are familiar with te abilities of DHS that meet the intelligence needs of the customers. (U.S. Department of Homeland Security, 2006)

SUMMARY & CONCLUSION

Each of the foregoing documents reviewed in this study sets out particulars of protection and security for…

Sources used in this document:
Bibliography

DHS Intelligence Enterprise Strategic Plan (2006) U.S. Department of Homeland Security. Washington, DC. January 2006.

National Infrastructure Protection Plan (2006) U.S. Department of Homeland Security, Washington DC.

The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets (2003) the White House, Washington, DC. February 2003.
Cite this Document:
Copy Bibliography Citation

Related Documents

U.S. Foreign Policy US Middle
Words: 2218 Length: 8 Document Type: Thesis

The international community can obviously respond by seeking to marginalize the Taliban and similar movements as extremists. However, it has become clear following the terrorist attacks on the World Trade Center and the Pentagon that western governments have not been effective in infiltrating terrorist networks and pre-empting attacks. It has also become clear that there will be no shortage of people in the Islamic world who are willing to

U.S. Invaded Iraq in 2003 Why U.S.
Words: 7685 Length: 19 Document Type: Essay

U.S. INVADED IRAQ IN 2003 Why U.S. Invade Iraq 2003 invasion of Iraq has a number of forceful effects that relate to the influence of the 9/11 occurrence in the country. The then U.S. president who happened to have been President Bush pushed for the U.S. invasion of Iraq amidst the actions that Saddam had done to the U.S. In most avenues of performance, it is clear that the U.S. attack

U.S. Foreign Policy on Terrorism
Words: 2230 Length: 5 Document Type: Essay

International Terrorism Discussion Questions on International Terrorism Explain the origins and evolution of long-term separatists and ethnic and nationalistic terrorism. Also, provide group names and their respective parts of the world. Ethno- separatist/nationalist terrorism is not specifically a modern phenomenon. Historically, two Jewish movements in Judaea that desired to provoke the local population to rise against the Roman occupiers used ethno-racial terrorism. However, it was only in 60s and 70s that terrorism came

U.S. Approach to Terrorism Post 2001
Words: 3011 Length: 10 Document Type: Term Paper

U.S. Approach to Terrorism U.S Approach to Terrorism Post 2001 The incidence of September 11, 2001 led to an anti-terrorism campaign by the government of U.S. And was called the war or terror. Since 2001, U.S. government has taken several steps to maintain security and counter terrorism by implementing certain strategies at national and international level. These approaches and steps, whether useful or not have been discussed in this paper. President Bush's Justifications

U.S. Security and the Terrorist
Words: 2546 Length: 8 Document Type: Term Paper

However, just how one is supposed to recognize future threats is difficult to determine. After all, if one imagines that excessive support in intervention, arms supply, technology, and financial backing is a key factor, combined with a strong religious motivation of the recipient nation, group, or organization, Israel or at the very least the Israeli right wing may one day be as dangerous as any Islamic threat may pose

U.S. War Against Iraq 'The Big Lie':
Words: 708 Length: 2 Document Type: Term Paper

U.S. War against Iraq 'The Big Lie': Larry Mosqueda's Historical Analysis of U.S. Imperialism and Its Significance with the U.S.-Iraq War (Gulf War II) Media reports about the current state of the U.S.-Iraq War, also called Gulf War II, illustrates how the war is premeditated and triggered by the bombing of the World Trade Center in 2001. The Bush Administration, generally perceived as the whole country of United States, decided to end

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now