Contemporary Security Management Chapter 24 Critical Infrastructures and Key Resources CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources.

Slides:



Advertisements
Similar presentations
Protective Security Advisors Securing the Nations critical infrastructure one community at a time.
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
National Infrastructure Protection Plan
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
Civilian Intelligence Organizations
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
DHS, National Cyber Security Division Overview
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
PPA 573 – Emergency Management and Homeland Security Lecture 9a. 9/11 Commission Report: Terrorism and Organizational Recommendations.
Managerial Flexibility in the Department of Homeland Security R. Steven Daniels, CSUB & Carolyn L. Clark-Daniels, Bakersfield, CA.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
THE EXECUTIVE BRANCH The President The Administration
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Tradition CIA FBI. Commissions US Commission on National Security in the 21 st Century (USCNS) Hart- Rudman Commission (see Phase 1 Report, p. 7) US Commission.
The Federal Bureaucracy Chapter 15. What is a bureaucracy?
Part of a Broader Strategy
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Program Manager, Information Sharing Environment UNCLASSIFIED ISE Enterprise Architecture and Common Standards Program.
ACADs (08-006) Covered Keywords Commission, regulation, advisory, standards. Description This presentation provides general information about each of the.
Parts of the Executive Branch The Hand of Government.
1. Organization. Tradition CIA FBI Commissions US Commission on National Security in the 21 st Century (USCNS) Hart-Rudman Commission (see Phase 1 Report,
IS-813: ESF #13 – Public Safety and Security
The Nationwide SAR Initiative Briefing for the National Maritime Security Advisory Committee April 2, 2013.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
Catastrophe Readiness and Response Session 7b 1 Session 7b Critical Infrastructure Drew Bumbak.
“History is a set of lies agreed upon.” Napoleon Bonaparte.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
The Homeland Security Act of 2002 During the second session of the 107th Congress, the primary focus was on how best to tackle the development of a viable,
Food and Agriculture Sector A Collaborative Path to Agriculture Security and Food Defense LeeAnne Jackson, HHS/FDA Multistate Partnership Meeting Madison,
U.S. Department of Homeland Security Brief to the Inter Agency Board Incident Management and Communications Subgroup Oct 22, 2010 Pete Owen, PSA San Diego.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
A-16 Data Theme Gaps for Homeland Security and Homeland Defense Mike Lee - FGDC Homeland Security Working Group January 15, 2008.
UNCLASSIFIED Joint Counterterrorism Assessment Team JCAT 1.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
The Executive Branch The President’s Cabinet The Cabinet There are 15 executive department agencies Purpose is for members to advise the President Weekly.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004.
Chapter 17: Foreign Policy and National Defense Section 2.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
CHAPTER 15 Government at Work: The Bureaucracy. What Is a Bureaucracy? Hierarchical authority. Bureaucracies are based on a pyramid structure with a chain.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Citizen Corps Volunteer for America “Engaging Citizens In Homeland Security”
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Disaster and Emergency Management
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
Legal Implications.
California Cybersecurity Integration Center (Cal-CSIC)
U. S. Department of Homeland Security. Office for Civil Rights
Copyright © 2012, Elsevier Inc. All rights Reserved.
[ 6.6 ] National Security.
The Executive Agencies
Federal Law Enforcement
The U.S. Department of Homeland Security
NPHS 1510 Federal and International
The Executive Branch.
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
The FBI The Federal Bureau of Investigation is the top law enforcement agency. They investigate all federal crimes and crimes where jurisdiction crosses.
Role of US Security and Intelligence Agencies
Presentation transcript:

Contemporary Security Management Chapter 24 Critical Infrastructures and Key Resources CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 1

Definition The U.S. Government states that the country's critical infrastructure is the: "infrastructure and assets vital to national security, governance, public health and safety, economy and public confidence." CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 2

Critical Infrastructure Subjects According to the Department of Homeland Security, the following subjects make up the critical infrastructure: – Agriculture and Food – Water – Public Health – Emergency Services – Defense Industrial Base – Telecommunications – Energy – Transportation – Banking and Finance – Chemicals and Hazardous Materials – Postal and Shipping – Gas production, transport and distribution – Dams – Nuclear reactors, materials, and waste – Critical manufacturing CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 3

Presidential Directive Administration of George W. Bush, 2003 / Dec. 17 established Homeland Security Presidential Directive/HSPD-7– Critical Infrastructure Identification, Prioritization, and Protection Purpose – This directive establishes a national policy for Federal departments and agencies to identify and prioritize U.S. critical infrastructure and key resources and to protect them from terrorist attacks. 421 CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 4

Presidential Directive The directive created a framework for partnering with the National Infrastructure Protection Plan (NIPP) whose mission is to identify, prioritize, and protect the nation’s CIKR from terrorist attacks. The plan directs the Department of Homeland Security (DHS) to identify gaps in the protection of CIKRS and to fill these gaps with Sector- Specific Agencies (SSA) and plans developed by them. 421 CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 5

The Patriot Act The USA PATRIOT Act is an Act of Congress that was signed into law by President George W. Bush on October 26, The title of the act is a ten-letter backronym (USA PATRIOT) that stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 This law established the Department of Homeland Security 422 CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 6

Department of Homeland Security The Department of Homeland Security (DHS) is responsible for enforcing policies that keep America secure. The creation of the department consolidated security activities and monies to one agency to enable better handling of security crises. With a budget in the billions of dollars, DHS is responsible for overseeing counterterrorism, border security, preparedness/response/recovery and immigration. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 7 423

Structure Just a few of the agencies that fall under DHS include: – Office of Cyber Security and Communications, – Infrastructure Protection, – Office of Intelligence and Analysis, – Office of International Affairs, – U.S. Citizenship and Immigration Services, – U.S. Customs and Border Protection, – U.S. Immigration and Customs Enforcement (ICE), – Federal Emergency Management Agency (FEMA) and – Transportation Security Administration (TSA). CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 8

Vulnerability Vulnerability of the CIKR to terrorist attack is a topic not made known publically. Vulnerability assessment (VA) is a basic tool of the CSO in uncovering weakness in a company’s security program. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 9 424

The VA Process 1.Identify the company’s critical assets. 2.Determine what is needed to protect the critical assets. 3.Determine what is not in place to protect the critical assets. 4.Determine if there is a discrepancy between what is needed and what is in place to meet the need. 5.Identify the missing pieces, i.e., vulnerability. 6.Prepare a report of findings and make recommendations to management for removing the vulnerability. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

Threat Probability The CSO can gain better understanding of threat probability by answering two simple questions: – Are there facts to indicate that a terrorist or terrorist group intends to commit an act of terrorism? – Are there facts to indicate that our organization is the intended target? CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 11

See handout on “Terrorist Attacks Against The United States.” CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 12

The National Counterterrorism Center (NCTC) The National Counterterrorism Center is a United States government organization responsible for national and international counterterrorism efforts. It is based in a complex in McLean, Virginia, called Liberty Crossing near Tysons Corner. NCTC advises the United States on terrorism. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

The National Counterterrorism Center (NCTC) The NCTC analyzes and stores foreign terrorism intelligence and extensively uses information technology to process data. The NCTC is involved in planning counterterrorism activities as directed by the President of the United States, the National Security Council, and DHS. The NCTC maintains lists and descriptions of terrorists, terrorist groups, and worldwide terrorist incidents; and writes assessments and briefings for senior policy makers. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

Fusion Centers Some states and major urban areas have jointed together to form what are called “fusion centers.” – These centers, comprised of multiple agencies, gather raw information, analyze it, and send ti to the appropriate reaction agencies. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

Fighting Terrorism In New York City CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 16

The National Strategy for Information Sharing (NSIP) NSIP delineates the specific roles and responsibilities of federal, state, local, and tribal governments as they relate to the establishment and continued operation of fusion centers and provides guidelines to support the performance of the roles and responsibilities. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

The National Strategy for Information Sharing (NSIP) Primary objective of NSIP – To assist state and local governments in establishing and sustaining operation of the fusion centers. – This National Strategy for Information Sharing and Safeguarding (Strategy) aims to strike the proper balance between sharing information with those who need it to keep our country safe and safeguarding it from those who would do us harm. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

The National Criminal Intelligence Resource Center (NCIRC) The NCIRC provides a secure “one-stop shop” for local, State, tribal, and Federal law enforcement. This site, sponsored by the U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Assistance (BJA), provides criminal justice professionals with a multitude of resources that are primarily concerned with law enforcement intelligence operations and practices. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

The National Criminal Intelligence Resource Center PURPOSE: – The purpose for maintaining the NCIC system is to provide a computerized database for ready access by a criminal justice agency making an inquiry and for prompt disclosure of information in the system from other criminal justice agencies about crimes and criminals. This information assists authorized agencies in criminal justice and related law enforcement objectives, such as apprehending fugitives, locating missing persons, locating and returning stolen property, as well as in the protection of the law enforcement officers encountering the individuals described in the system. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 20

Recent and Popular Items Event Deconfliction Systems Web page and Interactive Map First Amendment-Protected Events—The Role of State and Local Law Enforcement Officers training videos Unified Message—created to help clarify a unified approach to the process of reporting and sharing information related to suspicious activity Recommendations for First Amendment-Protected Events for State and Local Law Enforcement Role of State and Local Law Enforcement in First Amendment Events Tribal Participation in Fusion Centers Fact Sheet: Safeguarding the U.S. Government's Classified Information and Networks Criminal Intelligence Resources Guide The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public Safety training video DHS/DOJ Fusion Process Technical Assistance Program and Services Common Competencies for State, Local, and Tribal Intelligence Analysts Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise Dru Sjodin National Sex Offender Public Website (NSOPW) CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources 21

National Infrastructure Advisory Council (NIAC) The National Infrastructure Advisory Council (NIAC) shall provide the President through the Secretary of Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. – The council is composed of a maximum of 30 members, appointed by the President from private industry, academia, and state and local government. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

Federal Bureau of Investigation (FBI) The Federal Bureau of Investigation (FBI) is a governmental agency belonging to the United States Department of Justice that serves as both a federal criminal investigative body and an internal intelligence agency (counterintelligence). – The FBI operates a 24-hour global command center for terrorism-prevention operations. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

Central Intelligence Agency (CIA) Our Mission – Preempt threats and further US national security objectives by collecting intelligence that matters, producing objective all-source analysis, conducting effective covert action as directed by the President, and safeguarding the secrets that help keep our Nation safe. – Both the Director and Deputy Director are appointed by the President with consent of the Senate. – The CIA does not perform law enforcement functions. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

Law Enforcement Shift in responsibilities since 9/11 1.Created new working relationships with other first-responder agencies such as fire departments and agencies responsible for delivering emergency medical treatment and hazardous materials containment. 2.Acquired new communication equipment and revised their methods for communicating within and outside the department. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources

Law Enforcement Shift in responsibilities since 9/11 3.Refined their training programs and emergency response plans to address terrorist threats, including attacks with weapons of mass destruction. 4.Given more patrol attention to potential target sites such as government buildings, ports of entry, transportation hubs, nuclear power plants, chemical plants, and other facilities of a symbolic or critical nature. 5.Increase their presence at major public events. CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources