SlideShare a Scribd company logo
**ANSWER EACH QUESTION 100 WORDS MIN EACH**
1. The terrorist organizations are more likely to obtain and use a
biological weapons (BW) than a nuclear weapon. Col Alfred F.
Abramson III stated that both civilian and military sources
foresee that over the next decade the threat from proliferation of
BW will increase significantly (2012). In my opinion, BW are
more dangerous than nuclear weapons because they can persist
and spread through a population. BW are easy to hide and
difficult to detect such as plague and anthrax. Biological
weapons include any microorganism that can cause illness or
death. These agents include viruses, bacteria, fungi, and toxins
cultured from living organisms. They are invisible, odorless,
tasteless, and can be spread silently likely go unnoticed
(Abramson, 2012). Person may not experience symptoms
immediately after being exposed to the agents and each agent
has a different exposure period before infection. When use by
terrorists it can be disseminate through a variety of means such
as aerosol sprays or put into food or water. The devastating
consequences of our current covid-19 pandemic for individuals,
families, countries as whole offers vivid proof that
microorganism could be just as destructive and terrifying; more
so than the nuclear weapons. The threat of nuclear weapons by
non-state actors remains low, it demands a considerable amount
of time, skill sets, funding and specialized equipment or tools to
handle these complex weapons (Abramson, 2012). BW
possession by hostile states and terrorist groups represent one
of the greatest security challenges facing the U.S. Homeland
Security Enterprise (HSE). My prediction is that the modern
BW can be so deadly that our immune system may response to
them. From our current pandemic, developing a much more
global governance of biosafety than exists at present is an
urgent need for not just the U.S. government but for the
international community.
2. The last major bioterrorism attack against the United States
occurred in the chaotic weeks following 9/11; envelopes
containing spores of Anthrax were sent around the country,
killing five and sending more than a dozen into serious illness
(Funk, 2018). While this was the last major attack of this kind,
it certainly will not be the last, nor was it the first; the history
of weaponizing biological agents stretches back to medieval
times. There are four key factors in determining the
effectiveness of a response to a biological attack. The first,
speed of detection, deals with the government's ability to
recognize an attack as such, and that it is not simply a natural
outbreak of disease. The second, accuracy of identification,
simply measures the accuracy with which investigators can
identify what pathogen is in play. The third factor is the
effectiveness of containing the contamination, while the fourth
is neutralizing the effects of the pathogen (Abramson, 2012). In
evaluating the possibility of terrorists using a biological
weapon, it is impossible to ignore the current global pandemic.
The United States has been ravaged by the effects of COVID-
19, and containment measures have largely failed. It is highly
likely that terrorists are also watching this pandemic unfold and
taking notes. In terms of Abramson's four factors, the third
factor has been a complete and abject failure. To a terrorist,
this pandemic clearly proves that the United States is a soft
target for a biological attack, and it would not be unreasonable
to postulate that the time is right for just such an attack to be
committed. The nation's public health system is staggering
under the weight of the pandemic, and the American public is
growing tired of quarantines, "safer at home orders", and other
containment measures. The virus has spread to every state, and
even through rarely-travelled small towns. Adding a bioweapon
to the current situation would be utterly devastating. Comparing
this to the possibility of a nuclear attack, it is clear that a
bioweapon will ultimately cause more fear, casualties, and
economic damage. A nuclear attack, while dramatic, will be
largely contained to a specific geographic area. Even putting
aside the difficulty associated with attaining suitable nuclear
material, the benefits of using a biological weapon, particularly
at the present time, vastly outweigh those of a nuclear device.
3. After the events of 9/11 began an evolution in the
relationships between federal, state, and local homeland
security, law enforcement, and intelligence organizations. At
the federal level, the Office of the DNI and the Department of
Homeland Security (DHS) was created. Law enforcement and
intelligence became more integrated. Some law enforcement
organizations were reorganized in manners more closely
resembling intelligence agencies. The foreign intelligence
community also saw fundamental reform. At the state level, the
impact of these changes was even greater. State governments
grew into leading roles in homeland security. Most states
responded by bringing together existing public security, law
enforcement, and emergency response capabilities and opening
channels to other states. They also strengthened linkages with
federal agencies and sought classified government intelligence
to better inform their efforts to protect citizens. State and local
law enforcement agencies investigate crime that could possibly
be used as a foundation for terrorist activity. These agencies
might conduct surveillance or collect information on suspicious
activity in their communities. State and local officers also
participate in federal task forces such as the FBI’s Joint
Terrorism Task Force (JTTF). ACCOUNTABILITY There are
task forces located in 104 cities in the United States, and there
is at least one task force in each of the 56 FBI field offices.
Seventy-one Joint Terrorism Task Forces (JTFFs) have been
created since the events of 9/11; however the first task force
ever was established in New York City in 1980. There are
appropriately 4,000 members nationwide, which is a four-fold
increase since the events of 9/11. JTFF members come from
over 500 state and local agencies and 55 federal agencies,
including many components of the Department of Homeland
Security (DHS), the Department of Justice (DOJ) and
Department of State.The National Joint Terrorism Task Force
(NJTTF) is responsible for the coordination all of the 104
regional tasks forces across the United States. There are several
benefits to state and localities that set up a fusion center. They
allow state and local agencies the ability to receive federal
intelligence and other information from the rest of the national
network. This sharing allows for improved situational awareness
of threats and a mechanism to disseminate information within
their jurisdiction. Additional funding in the forms of grants is
available, and training and overall technical support can be
garnered to state and local agencies to support fusion centers.
There are numerous success stories associated with fusion
centers in the United States. Their accomplishments span the
entire country and involve the work of many national and
international entities. The three examples that follow all
occurred in the year 2014. I do think that state and local police
should be involved in domestic intelligence operations as it
relates to citizens within their jurisdiction because if they are in
the loop it could help them work together with all the agencies
and work together to bring them to justice. The local police
agencies often time have the best knowledge about the area,
they know the community and the everyday occurrences of the
city, town or state. The downside of fusion centers is that they
are not all created equal, The notion that “if you’ve seen one
fusion center you’ve seen just one fusion center” has merit. No
two fusion centers seem to have the same processes, products,
priorities, or performance metrics. They are designed to serve
their local customers, not federal consumers, and certainly not
the intelligence community in Washington. While some are seen
to serve their customers well, others (perhaps the majority,
although that conclusion would require far more detailed
research) are not.
4. For homeland security within their jurisdictions. most law
enforcement agencies have been utilizing fusion centers.
Fusion centers are great, because they now connect state and
local homeland security and law enforcement and especially
new intelligence organizations. with federal, community, and,
in some cases, foreign intelligence services. While this is great
to have a center that servers as a communication focal point, all
the kinks haven't been worked out yet. Often times people don't
know their roles within investigations, organizations, etc. The
Fusion centers are nice, but at the same time, there needs to be a
single integrated intelligence enterprise with well-defined lanes
for everyone. This has been challenging for the IC, so imagine
the state levels trying to figure it out. I do think that local
police should be involved in domestic intelligence operations as
it relates to citizens within their jurisdiction. I think of a
situation where if there was intelligence of the Boston bombing
about to take place, It would need a ton of coordination and for
the FBI for example to be the only agencies trying to work with
the intelligence they have received, it just might not be good
enough. In regards to who I think should be the primary
provider of Federal level domestic intelligence to state and local
agencies, I think that the FBI should be the primary provider. I
don't think that the Department of Homeland Security shouldn't
be right there with them, but I think it makes more sense for the
FBI due to the law enforcement and resources aspect of things.
5. Within the concept of homeland security, the organizations
associated with it are responsible for protecting the critical
infrastructure. Critical infrastructure in the United States is
defined as systems, processes, technologies, facilities, assets,
networks and services essential to the safety, health, security
and economic well-being of Americans and the U.S.
government. Any disaster or major disruption of the critical
infrastructure could lead to extreme loss of life and significant
harm to the public and economic safety. There are 16 critical
infrastructure sectors all equally important to the success of a
functioning government and society. In my opinion, the food
and agriculture (FA) sector is one of the most important critical
infrastructure sectors because of its’ drastic positive and
negative impacts in can have on a nation. There are three parts
of the FA sector, production, processing and delivery. The goal
of the FA sector is to ensure that each part or process in the
chain is protected against a possible disruption in the food
supply. Any disruption would pose serious threats to the
economy, safety and welfare of the nation through shortages or
potential diseases. This sector is extremely important because of
the risk associated with the production and processing. Due to
the veracity of this sectors’ implications, a national food and
agriculture sector-specific plan has been developed in
accordance with national infrastructure protection plan to
ensure the organizations and companies involved in the FA
sector adhere to specific guidelines to continue to keep the food
supply of the nation safe.
6. Critical infrastructure and key resources are defined as
"assets of the United States essential to the nation's security,
public health and safety, economic vitality, and way of life"
(DHS.gov, CIKR, paragraph 1). These are things like buildings,
transportation systems, places of large gatherings such as malls
and stadiums, and all the components that make up cyber
networks. These things are deemed as critical infrastructure
because they are essential to maintaining the security of our
nation and maintaining our economy. there are a variety of
things that can threaten our critical infrastructure. I feel the
most common threat is weather and natural disasters. At some
point in time, all of the 6 above mentioned sectors of critical
infrastructure have been affected by weather or natural
disasters. The energy sector in the area I live in seems to be
effect the most on a regular basis. It seems that every year there
are multiple weather events that cause power outages and other
similar problems. Information sharing has become essential in
preparing for those events. It allows for preparations to be made
in order to mitigate these problems as they arise. That is
essential for all potential hazards. Sharing information and
warning of hazards allows for ample time to prepare for and
potentially prevent something catastrophic from happening.
Being prepared for potential hazards is one of the key concepts
of homeland security. It doesn't do any good to know about
hazards and not doing anything to be prepared for them.

More Related Content

DOC
Alien invasion
DOC
Alien invasion
DOC
Alien invasion 2
DOC
Alien invasion 2
DOCX
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
PPTX
Terrorist related hazardsassignment2 jarodbleibdrey
PDF
Homeland Security The Essentials 2nd edition Bullock
Alien invasion
Alien invasion
Alien invasion 2
Alien invasion 2
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
Terrorist related hazardsassignment2 jarodbleibdrey
Homeland Security The Essentials 2nd edition Bullock

Similar to ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx (20)

PPT
White7e ppt ch17
DOCX
REPLY TO EACH RESPONSE 100 WORDS MIN EACH .docx
PPT
White7e ppt ch14
DOCX
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx
PDF
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
PDF
Protecting the American Homeland One Year on Michael E. O'Hanlon
DOCX
How the criminal justice system in the US ha.docx
PDF
Safe at home
DOCX
Module 4 SLP – Summary - Assignment (You are the City IC) Date – .docx
DOCX
Running head ISOL 534 – Application Security 1Running head.docx
PPT
White7e ppt ch15
DOCX
Melanie McBrideIt seems as if when It comes to emergency res.docx
PPTX
HM 598 Emergency Management Innovation
DOCX
Please respond to at least 2 other students. Responses should be a m.docx
DOCX
CRJ Module 8 OverviewTerrorism and the Future of Emergency Manag.docx
DOCX
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
PDF
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
DOCX
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
DOCX
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx
White7e ppt ch17
REPLY TO EACH RESPONSE 100 WORDS MIN EACH .docx
White7e ppt ch14
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docx
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Protecting the American Homeland One Year on Michael E. O'Hanlon
How the criminal justice system in the US ha.docx
Safe at home
Module 4 SLP – Summary - Assignment (You are the City IC) Date – .docx
Running head ISOL 534 – Application Security 1Running head.docx
White7e ppt ch15
Melanie McBrideIt seems as if when It comes to emergency res.docx
HM 598 Emergency Management Innovation
Please respond to at least 2 other students. Responses should be a m.docx
CRJ Module 8 OverviewTerrorism and the Future of Emergency Manag.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
10 Year Anniversary 9-11- How Has Law Enforcement Responded-2
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx

More from SHIVA101531 (20)

DOCX
Answer the following questions in a minimum of 1-2 paragraphs ea.docx
DOCX
Answer the following questions using scholarly sources as references.docx
DOCX
Answer the following questions about this case studyClient .docx
DOCX
Answer the following questions using art vocabulary and ideas from L.docx
DOCX
Answer the following questions in a total of 3 pages (900 words). My.docx
DOCX
Answer the following questions No single word responses (at lea.docx
DOCX
Answer the following questions based on the ethnography Dancing Skel.docx
DOCX
Answer the following questions to the best of your ability1) De.docx
DOCX
Answer the following questionDo you think it is necessary to .docx
DOCX
Answer the following question. Use facts and examples to support.docx
DOCX
Answer the bottom questions  in apa format and decent answer no shor.docx
DOCX
Answer the following below using the EXCEL attachment. chapter 5.docx
DOCX
Answer the following prompts about A Germanic People Create a Code .docx
DOCX
Answer the following discussion board question below minumun 25.docx
DOCX
Answer the following questions about IT Project Management. What.docx
DOCX
Answer the following in at least 100 words minimum each1.Of.docx
DOCX
Answer the following questions(at least 200 words) and responses 2 p.docx
DOCX
Answer the following questions in a Word document and upload it by M.docx
DOCX
Answer the following questions in complete sentences. Each answer sh.docx
DOCX
ANSWER THE DISCUSSION QUESTION 250 WORDS MINDiscussion Q.docx
Answer the following questions in a minimum of 1-2 paragraphs ea.docx
Answer the following questions using scholarly sources as references.docx
Answer the following questions about this case studyClient .docx
Answer the following questions using art vocabulary and ideas from L.docx
Answer the following questions in a total of 3 pages (900 words). My.docx
Answer the following questions No single word responses (at lea.docx
Answer the following questions based on the ethnography Dancing Skel.docx
Answer the following questions to the best of your ability1) De.docx
Answer the following questionDo you think it is necessary to .docx
Answer the following question. Use facts and examples to support.docx
Answer the bottom questions  in apa format and decent answer no shor.docx
Answer the following below using the EXCEL attachment. chapter 5.docx
Answer the following prompts about A Germanic People Create a Code .docx
Answer the following discussion board question below minumun 25.docx
Answer the following questions about IT Project Management. What.docx
Answer the following in at least 100 words minimum each1.Of.docx
Answer the following questions(at least 200 words) and responses 2 p.docx
Answer the following questions in a Word document and upload it by M.docx
Answer the following questions in complete sentences. Each answer sh.docx
ANSWER THE DISCUSSION QUESTION 250 WORDS MINDiscussion Q.docx

Recently uploaded (20)

PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Trump Administration's workforce development strategy
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Computing-Curriculum for Schools in Ghana
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
advance database management system book.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
HVAC Specification 2024 according to central public works department
B.Sc. DS Unit 2 Software Engineering.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
What if we spent less time fighting change, and more time building what’s rig...
Unit 4 Computer Architecture Multicore Processor.pptx
20th Century Theater, Methods, History.pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Hazard Identification & Risk Assessment .pdf
Trump Administration's workforce development strategy
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Computing-Curriculum for Schools in Ghana
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Computer Architecture Input Output Memory.pptx
Indian roads congress 037 - 2012 Flexible pavement
advance database management system book.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
Virtual and Augmented Reality in Current Scenario
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
HVAC Specification 2024 according to central public works department

ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx

  • 1. **ANSWER EACH QUESTION 100 WORDS MIN EACH** 1. The terrorist organizations are more likely to obtain and use a biological weapons (BW) than a nuclear weapon. Col Alfred F. Abramson III stated that both civilian and military sources foresee that over the next decade the threat from proliferation of BW will increase significantly (2012). In my opinion, BW are more dangerous than nuclear weapons because they can persist and spread through a population. BW are easy to hide and difficult to detect such as plague and anthrax. Biological weapons include any microorganism that can cause illness or death. These agents include viruses, bacteria, fungi, and toxins cultured from living organisms. They are invisible, odorless, tasteless, and can be spread silently likely go unnoticed (Abramson, 2012). Person may not experience symptoms immediately after being exposed to the agents and each agent has a different exposure period before infection. When use by terrorists it can be disseminate through a variety of means such as aerosol sprays or put into food or water. The devastating consequences of our current covid-19 pandemic for individuals, families, countries as whole offers vivid proof that microorganism could be just as destructive and terrifying; more so than the nuclear weapons. The threat of nuclear weapons by non-state actors remains low, it demands a considerable amount of time, skill sets, funding and specialized equipment or tools to handle these complex weapons (Abramson, 2012). BW possession by hostile states and terrorist groups represent one of the greatest security challenges facing the U.S. Homeland Security Enterprise (HSE). My prediction is that the modern BW can be so deadly that our immune system may response to them. From our current pandemic, developing a much more global governance of biosafety than exists at present is an urgent need for not just the U.S. government but for the
  • 2. international community. 2. The last major bioterrorism attack against the United States occurred in the chaotic weeks following 9/11; envelopes containing spores of Anthrax were sent around the country, killing five and sending more than a dozen into serious illness (Funk, 2018). While this was the last major attack of this kind, it certainly will not be the last, nor was it the first; the history of weaponizing biological agents stretches back to medieval times. There are four key factors in determining the effectiveness of a response to a biological attack. The first, speed of detection, deals with the government's ability to recognize an attack as such, and that it is not simply a natural outbreak of disease. The second, accuracy of identification, simply measures the accuracy with which investigators can identify what pathogen is in play. The third factor is the effectiveness of containing the contamination, while the fourth is neutralizing the effects of the pathogen (Abramson, 2012). In evaluating the possibility of terrorists using a biological weapon, it is impossible to ignore the current global pandemic. The United States has been ravaged by the effects of COVID- 19, and containment measures have largely failed. It is highly likely that terrorists are also watching this pandemic unfold and taking notes. In terms of Abramson's four factors, the third factor has been a complete and abject failure. To a terrorist, this pandemic clearly proves that the United States is a soft target for a biological attack, and it would not be unreasonable to postulate that the time is right for just such an attack to be committed. The nation's public health system is staggering under the weight of the pandemic, and the American public is growing tired of quarantines, "safer at home orders", and other containment measures. The virus has spread to every state, and even through rarely-travelled small towns. Adding a bioweapon
  • 3. to the current situation would be utterly devastating. Comparing this to the possibility of a nuclear attack, it is clear that a bioweapon will ultimately cause more fear, casualties, and economic damage. A nuclear attack, while dramatic, will be largely contained to a specific geographic area. Even putting aside the difficulty associated with attaining suitable nuclear material, the benefits of using a biological weapon, particularly at the present time, vastly outweigh those of a nuclear device. 3. After the events of 9/11 began an evolution in the relationships between federal, state, and local homeland security, law enforcement, and intelligence organizations. At the federal level, the Office of the DNI and the Department of Homeland Security (DHS) was created. Law enforcement and intelligence became more integrated. Some law enforcement organizations were reorganized in manners more closely resembling intelligence agencies. The foreign intelligence community also saw fundamental reform. At the state level, the impact of these changes was even greater. State governments grew into leading roles in homeland security. Most states responded by bringing together existing public security, law enforcement, and emergency response capabilities and opening channels to other states. They also strengthened linkages with federal agencies and sought classified government intelligence to better inform their efforts to protect citizens. State and local law enforcement agencies investigate crime that could possibly be used as a foundation for terrorist activity. These agencies might conduct surveillance or collect information on suspicious activity in their communities. State and local officers also participate in federal task forces such as the FBI’s Joint Terrorism Task Force (JTTF). ACCOUNTABILITY There are task forces located in 104 cities in the United States, and there is at least one task force in each of the 56 FBI field offices.
  • 4. Seventy-one Joint Terrorism Task Forces (JTFFs) have been created since the events of 9/11; however the first task force ever was established in New York City in 1980. There are appropriately 4,000 members nationwide, which is a four-fold increase since the events of 9/11. JTFF members come from over 500 state and local agencies and 55 federal agencies, including many components of the Department of Homeland Security (DHS), the Department of Justice (DOJ) and Department of State.The National Joint Terrorism Task Force (NJTTF) is responsible for the coordination all of the 104 regional tasks forces across the United States. There are several benefits to state and localities that set up a fusion center. They allow state and local agencies the ability to receive federal intelligence and other information from the rest of the national network. This sharing allows for improved situational awareness of threats and a mechanism to disseminate information within their jurisdiction. Additional funding in the forms of grants is available, and training and overall technical support can be garnered to state and local agencies to support fusion centers. There are numerous success stories associated with fusion centers in the United States. Their accomplishments span the entire country and involve the work of many national and international entities. The three examples that follow all occurred in the year 2014. I do think that state and local police should be involved in domestic intelligence operations as it relates to citizens within their jurisdiction because if they are in the loop it could help them work together with all the agencies and work together to bring them to justice. The local police agencies often time have the best knowledge about the area, they know the community and the everyday occurrences of the city, town or state. The downside of fusion centers is that they are not all created equal, The notion that “if you’ve seen one fusion center you’ve seen just one fusion center” has merit. No two fusion centers seem to have the same processes, products, priorities, or performance metrics. They are designed to serve their local customers, not federal consumers, and certainly not
  • 5. the intelligence community in Washington. While some are seen to serve their customers well, others (perhaps the majority, although that conclusion would require far more detailed research) are not. 4. For homeland security within their jurisdictions. most law enforcement agencies have been utilizing fusion centers. Fusion centers are great, because they now connect state and local homeland security and law enforcement and especially new intelligence organizations. with federal, community, and, in some cases, foreign intelligence services. While this is great to have a center that servers as a communication focal point, all the kinks haven't been worked out yet. Often times people don't know their roles within investigations, organizations, etc. The Fusion centers are nice, but at the same time, there needs to be a single integrated intelligence enterprise with well-defined lanes for everyone. This has been challenging for the IC, so imagine the state levels trying to figure it out. I do think that local police should be involved in domestic intelligence operations as it relates to citizens within their jurisdiction. I think of a situation where if there was intelligence of the Boston bombing about to take place, It would need a ton of coordination and for the FBI for example to be the only agencies trying to work with the intelligence they have received, it just might not be good enough. In regards to who I think should be the primary provider of Federal level domestic intelligence to state and local agencies, I think that the FBI should be the primary provider. I don't think that the Department of Homeland Security shouldn't be right there with them, but I think it makes more sense for the FBI due to the law enforcement and resources aspect of things.
  • 6. 5. Within the concept of homeland security, the organizations associated with it are responsible for protecting the critical infrastructure. Critical infrastructure in the United States is defined as systems, processes, technologies, facilities, assets, networks and services essential to the safety, health, security and economic well-being of Americans and the U.S. government. Any disaster or major disruption of the critical infrastructure could lead to extreme loss of life and significant harm to the public and economic safety. There are 16 critical infrastructure sectors all equally important to the success of a functioning government and society. In my opinion, the food and agriculture (FA) sector is one of the most important critical infrastructure sectors because of its’ drastic positive and negative impacts in can have on a nation. There are three parts of the FA sector, production, processing and delivery. The goal of the FA sector is to ensure that each part or process in the chain is protected against a possible disruption in the food supply. Any disruption would pose serious threats to the economy, safety and welfare of the nation through shortages or potential diseases. This sector is extremely important because of the risk associated with the production and processing. Due to the veracity of this sectors’ implications, a national food and agriculture sector-specific plan has been developed in accordance with national infrastructure protection plan to ensure the organizations and companies involved in the FA sector adhere to specific guidelines to continue to keep the food supply of the nation safe. 6. Critical infrastructure and key resources are defined as "assets of the United States essential to the nation's security, public health and safety, economic vitality, and way of life"
  • 7. (DHS.gov, CIKR, paragraph 1). These are things like buildings, transportation systems, places of large gatherings such as malls and stadiums, and all the components that make up cyber networks. These things are deemed as critical infrastructure because they are essential to maintaining the security of our nation and maintaining our economy. there are a variety of things that can threaten our critical infrastructure. I feel the most common threat is weather and natural disasters. At some point in time, all of the 6 above mentioned sectors of critical infrastructure have been affected by weather or natural disasters. The energy sector in the area I live in seems to be effect the most on a regular basis. It seems that every year there are multiple weather events that cause power outages and other similar problems. Information sharing has become essential in preparing for those events. It allows for preparations to be made in order to mitigate these problems as they arise. That is essential for all potential hazards. Sharing information and warning of hazards allows for ample time to prepare for and potentially prevent something catastrophic from happening. Being prepared for potential hazards is one of the key concepts of homeland security. It doesn't do any good to know about hazards and not doing anything to be prepared for them.