Assess the evolving relationship between the U.S. intelligence community and the homeland security enterprise. CO-3: Assess the state of intelligence reform since the September 2001 terrorist attacks on t

Instructions

You must use the template I provided for this assignment since it will make it a lot easier for you. Failure to do so will result in a return of your paper for you to redo, a reduction in points, or both. I strongly recommend that you simply download it and then upload it under a different name, such as your last name, course number, and assignment number.

Choose a topic of your choice that relates to the materials covered during this course and write a research paper on it. This topic should be different from the topics you wrote about for the prior assignments. This is your opportunity to explore in-depth a topic that you have a greater interest in than what we covered during the course.

Technical Requirements

Your paper must be at a minimum of 10 pages (the Title, Abstract, and Reference pages do not count towards the minimum limit).
Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
Type in Times New Roman, 12 point, and double space.
Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
Points will be deducted for the use of Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
All submissions will be graded using the assignment rubric.

Week 6: Collaboration and Information Sharing within HSINT

Overview:

This week we will be exploring the importance of inter and intra-agency collaboration for intelligence support of the homeland security enterprise. We will continue the push to ensure that you have full exposure to the various aspects of homeland security intelligence. We will also address the issues surrounding information sharing vertically at the national level as well as horizontally from the national level down to the local level.

Course Objective(s):

CO-1: Assess the evolving relationship between the U.S. intelligence community and the homeland security enterprise.

CO-3: Assess the state of intelligence reform since the September 2001 terrorist attacks on the United States.

CO-4: Evaluate the capabilities and limitations of intelligence support to homeland security policymakers and practitioners.

CO-5: Analyze interagency and inter-organizational relationships and processes in intelligence support to homeland security.

Lesson Objective(s):

LO6.1: Interpret the inter and intra-agency collaboration for HSINT.

LO6.2: Evaluate the information and intelligence sharing capabilities between and among agencies.

Topics of Discussion:

Inter and intra-agency collaboration and sharing of information within HSINT.

References

9/11 Commission. (2004) Retrieved from https://www.9-11commission.gov/report/911Report.pdf

Clark, C.S. (2015, November 10). Homeland Security Leaders See Progress in ‘Unity of Effort’ Government Executive. Retrieved from http://www.govexec.com/defense/2015/11/homeland-security-leaders-see-progress-unity-effort/123573/?oref=relatedstories

Davisson, S. P. (2004). Spooks Vs. Suits – the Ultimate Sibling Rivalry: CIA/FBI Interagency Competition, Communicative Failures, and Effects on U.S. National Security. Retrieved from https://poseidon01.ssrn.com/delivery.php?

Foley, F. (2016) U.S. counterterrorism is mired in turf wars. We could learn a lot from the U.K. The Washington Post. Retrieved from https://www.washingtonpost.com/news/monkey-cage/wp/2016/07/19/there-are-turf-wars-in-u-s-domestic-counterterrorism-efforts-the-u-k-doesnt-have-this-problem/?utm_term=.7bde5442313c

Gardner, J. (2017). A Duty to Share: The Opportunities and Obstacles of Federal Counterterrorism Intelligence Sharing with Nonfederal Fusion Centers. Walden University Dissertation.

Johnson, J. (2015, January 29). Secretary of Homeland Security: DHS 2015: The Secretary’s Progress Report. Retrieved from http://www.dhs.gov/news/2015/01/29/remarks-secretary-johnson-dhs-2015-secretarys-progress-report

Joint Review of Domestic Sharing of Counterterrorism Information. (2017). Inspector Generals of the IC, DHS and DOJ. Retrieved from https://oig.justice.gov/reports/2017/a1721.pdf

Lamb, C. (2011). Joint Interagency Task Force–South: The Best Known, Least Understood Interagency Success. Retrieved from http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/inss/Strategic-Perspectives-5.pdf

The Information Sharing Environment (ISE). (n.d.) Information Sharing Systems and Architecture ISE Retrieved from https://www.ise.gov/resources/training-resources/core-awareness-training-supplemental-materials/information-sharing-systems-and-architecture

U.S. Government Accountability Office (GAO). n.d. Terrorism-Related Information Sharing – High Risk Issue. Retrieved from https://www.gao.gov/key_issues/terrorism_related_information_sharing/issue_summary#t=0

Zegart, A. (January 6). Why the Intelligence Community Matters. Stanford Center for International Security and Cooperation. Retrieved from http://cisac.fsi.stanford.edu/news/why-intelligence-community-matters

Week 7: HSINT and State, Local, and Tribal Authorities

Overview:

This week we will be examining the distribution of authority among the various entities that contribute to homeland security. We will look at the strengths and weaknesses of a distributed homeland security intelligence production – a federal system with independent and largely “sovereign” state, local, tribal, even private sector security agencies.

Course Objective(s):

CO-1: Assess the evolving relationship between the U.S. intelligence community and the homeland security enterprise.

CO-2: Analyze the role of intelligence during the Cold War compared to its current role in countering 21st-century homeland security threats.

CO-4: Evaluate the capabilities and limitations of intelligence support to homeland security policymakers and practitioners.

CO-5: Analyze interagency and inter-organizational relationships and processes in intelligence support to homeland security.

Lesson Objective(s):

LO7.1: Describe the strengths and limitations of a distributed homeland security intelligence production.

LO7.2: Construct specific suggestion for improving a limitation within the homeland security intelligence production.

LO7.3: Choose and assess the specific missions of Fusion Centers.

Topics of Discussion:

The distributed system that incorporates homeland security.

References

Clapper, J. (2016) Domestic approach to national intelligence. Retrieved from https://www.hsdl.org/?view&did=798173

Downing, M. P. (2015). Policing terrorism in the US: The LAPD’s convergence strategy. Turning the Tide, 28(4), 7. Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1765840445?accountid=8289

Vicinanzo, A. (2016, June 6). DHS components lacked coordination in aftermath of San Bernardino attacks. Homeland Security Today. Retrieved from http://www.hstoday.us/channels/dhs/single-article-page/dhs-components-lacked-coordination-in-aftermath-of-san-bernardino-attacks/b63b5f664e08e81e1663e95f7c771524.html

U.S. Constitution. Bill of Rights, Amendment Ten. Retrieved from https://www.archives.gov/founding-docs/bill-of-rights-transcript

Advancing the Homeland Security Information Sharing Environment: A Review of the National Network of Fusion Centers (2018)

https://www.hsdl.org/?view&did=805450

Cybersecurity and Information Sharing: Legal Challenges and Solutions (2015)

https://fas.org/sgp/crs/intel/R43941.pdf

SUPPLEMENTAL: FBI: Protecting the Homeland in the 21st Century: Report of the Congressionally-directed 9/11 Review Commission (2015) – Chapter IV

https://www.hsdl.org/?view&did=763412

Inter-organizational relationships and law enforcement information sharing post 11 September 2001 (2015)

https://scholarworks.iupui.edu/bitstream/handle/1805/4544/carter-2014-interorganizational.pdf?sequence=1&isAllowed=n

Office of the Director of National Intelligence: Information Sharing Environment (2018)

https://www.dni.gov/files/documents/FOIA/2018_Information_Sharing_Environment_Annual_Report.pdf

SUPPLEMENTAL: Cybersecurity and Information Sharing: Legal Challenges and Solutions (2015)

https://fas.org/sgp/crs/intel/R43941.pdf

Crossing the Bridge: Tribal-State-Local Collaboration (2019)

https://bja.ojp.gov/sites/g/files/xyckuh186/files/Publications/crossing-the-bridge-tribal-state-local-collaboration.pdf

Domestic Approach to National Intelligence (2017)

https://www.hsdl.org/?view&did=798173

End-user perceptions of intelligence dissemination from a state fusion center (2016)

http://ezproxy.apus.edu/login?url=https://link.springer.com/content/pdf/10.1057%2Fsj.2014.38.pdf

Intelligence Led Policing: Changing the Face of Crime Prevention (2018)

Intelligence-led Policing: Changing the Face of Crime Prevention

Intelligence Led Policing: Preferred Policing Model in the War Against Terrorism (2016)

https://inpublicsafety.com/2016/04/intelligence-led-policing-preferred-policing-model-war-terrorism/

Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States (2016)

https://www.dhs.gov/sites/default/files/publications/2016_strategic_implementation_plan_empowering_local_partners_prev.pdf

Need Help With Your Assignment Projects?

X
× How can I help you?