Watch “The Evolution of the Intelligence Community (IC).”
Read “
What We Do: Members of the Intelligence Community.
”
Assume you are the head of security for a Fortune 500 company, and one of the senior executives of the company received a letter threat against them. In the letter, the subject threatened to kill the executive during a large product deployment conference they are hosting in the next month, and you are required to notify the appropriate IC components for investigation and support.
Write a 1,050- to 1,400-word paper identifying the current makeup of the U.S. Intelligence Community (IC) to understand how the agencies manage risk and develop intelligence to protect overall public safety. Complete the following in your paper:
Submit your assignment. Use APA format for the paper. Follow the Instructor Writing Guide.
Week 2
Transcript
AJS/555 v2
Page 2 of 2
The Evolution of the Intelligence Community (IC)
Critical Incident and Risk Management
This week, you will focus on Learning Objective : Examine interrelationships between organizational risk assessment and consequence management.
Let’s explore the evolution of the U.S. Intelligence Community, or IC as it is abbreviated.
Before 9/11, natural hazards were pervasive. Examples of natural hazards include earthquakes, flooding, landslides, and hurricanes.
Then the 1992 World Trade Center Bombing and 1995 Oklahoma City Bombing occurred. These events introduced and raised awareness for terrorism preparedness.
After these two events occurred, building disaster-resistant communities was introduced. In addition, business continuity planning increased, and emergency management became more professionalized. As we are all aware, terrorism became a major focus in 2001.
Before then, many agencies had counterterrorism and terror preparedness functions. However, major inefficiencies were exposed through exercises and responses that remained a concern.
Then the September 11th terror attacks occurred. This led to the review of all parts of emergency management in the United States in order to better understand how the existing system of intelligence failed to identify threats to the country.
The 9/11 Commission Report identified issues in the intelligence community that lead to the attacks. After the fact, they were able to connect various pieces of intelligence that were never shared. This lack of oversight and collaboration resulted in not being able to stop the terrorist attacks.
A new concept was developed. The Department of Homeland Security was born. It created a greater emphasis on the need for united actions and efforts across previously divided elements of government and society.
The organization of the IC became more focused and organized the agencies into a large, interrelated group. The IC is comprised of eighteen different bodies that include the following: Two independent agencies, Office of the Director of National Intelligence (ODNI) and Central Intelligence Agency (CIA).
Nine Departments of Defense elements:
Defense Intelligence Agency (DIA)
National Security Agency (NSA)
National Geospatial- Intelligence Agency (NGA)
National Reconnaissance Office (NRO), and
Intelligence elements of the five DoD services, Army, Navy, Marine Corps, Air Force, and Space Force
Seven elements of other departments and agencies:
Department of Energy’s Office of Intelligence and Counter-Intelligence
Department of Homeland Security’s Office of Intelligence and Analysis
U.S. Coast Guard Intelligence
Department of Justice’s Federal Bureau of Investigation
Drug Enforcement Agency’s Office of National Security Intelligence
Department of State’s Bureau of Intelligence and Research, and
Department of the Treasury’s Office of Intelligence and Analysis
Let’s explore the concept of homeland security. Though the homeland security concept was raised long before the September 11 attacks, after 9/11, these ideas were turned into policy and resulted in major changes in the structure of government.
On November 25, 2002, President Bush signed the Homeland Security Act of 2002, in what came to be known as the greatest federal reorganization since Truman consolidated the Defense Department.
The DHS was created and was charged with a threefold mission:
protect the United States from further terrorist attacks, reduce the nation’s vulnerability to terrorism, and minimize the damage from potential terrorist attacks and natural disasters.
Under DHS, more than 179,000 federal employees from 22 existing federal agencies were brought together under one umbrella. This provided for collaboration across the country.
The creation of DHS combined the efforts of: other federal agencies, state and territorial governments, tribal governments, county governments, local governments, Critical Infrastructure and Key Resource (CIKR) owners and operators, and small businesses.
The strategic areas of focus for the new efforts were to integrate intelligence, information sharing, and operations; enhance partnerships and outreach; conduct homeland security research and development; train and exercise frontline operators and first responders; as well as strengthen service delivery, and manage DHS resources.
The current state of Homeland Security DHS conducts a mitigation planning process that identifies and organizes resources, conducts risk or threat assessment and estimates losses, identifies mitigation measures that will reduce the effects of the hazards and create a strategy to deal with the mitigation measures in priority order, and implements the measures, evaluates the results, and keeps the plans up to date.
It is a never-ending process of training, mitigation, and planning to prevent terrorist attacks and respond to disasters.
Let’s further explore interrelationships between organizational risk assessment and consequence management and more.
Copyright 2021 by University of Phoenix. All rights reserved.
Copyright 2021 by University of Phoenix. All rights reserved.
image1
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read moreOur specialists are always online to help you! We are available 24/7 via live chat, WhatsApp, and phone to answer questions, correct mistakes, or just address your academic fears.
See our T&Cs