Test 3 Flashcards
What is The Intelligence Community?
- executive branch agencies and organizations
- work both independently and collaboratively
- gather the intelligence necessary to conduct national security activities
- collect and convey essential security-related info the Pres and members of the policymaking, law enforcement, and military communities as they require to carry out their required functions and duties.
- 17 agencies today
How long as the US gov performed some type of intelligence gathering?
always
When did the intelligence gathering expand?
during the Cold War
By the 1980s, the US intelligence community consisted of
- 25 intelligence collection and analysis organizations
- 100,000 people
- 30 billion budget
After the Cold War ended, the # of agencies and employees were reduced with
- consolidation of activities
- budget reductions
Post Cold-war reductions dropped staff by approx:
17-25%
-despite reductions, a lot remained
Mission of the Intelligence Community
- “Collect & interpret information, overcoming in the process & barriers to keep secret the activities, capabilities, & plans of foreign powers or organizations”
- Additionally, the intelligence community was established to identify & head off plans for attacks against the US
9/11 Commission found 6 intelligence probs:
- structural barriers to performing joint intelligence work
- lack of common standards and practices across the foreign-domestic divide
- divided management of national intelligence capabilities
- weak capacity to set priorities and move resources
- too many jobs
- too complex and secret
What did then Congress pass?
- The Intelligence Reform and Terrorism Prevention Act
- -proscribed far-reaching reforms for the intelligence community
- This called for the creation of:
- -Director of National Intelligence
- -National Counterterrorism Center
Intelligence Cycle 1: Planning and Direction
- Establishing the intelligence requirements of the policy makers
- -Pres, NSC, Military commanders, and gov agencies
- Management of the entire intelligence cycle from identifying the need for data to delivering the product
Intelligence Cycle 2: Collection
- The gathering of raw data from which finished intelligence is produced
- Six basic sources:
1. Human-source Intelligence
2. Imagery Intelligence
3. Signals Intelligence
4. Measurement and Signature Intelligence
5. Open-Source intelligence
6. Geospatial Intelligence
Human-Soruce Intelligence (HUMINT)
- spies on the ground
- foreign informants
- diplomats
- military attaches
- used mainly by the CIA, FBI, DoD, DoS
Imaginery Intelligence (IMINT)
- Includes representatives of objects reproduced electronically:
- -film
- -electronic display devices
- -ect
- Imagery derived from:
- -visual photos: satellites/spy plane photos
- -radar sensors
- -infraed sensors
- -lasers
- -electro-optics
- National Geospatial-Intelligence Agency is the manager for all imagery intelligence activities
Signals Intelligence (SIGINT)
- derived from signal intercepts comprising-however transmitted-either individually or in combo:
- -All Communications Intelligence
- -Electronic Intelligence
- -Foreign Instruments Signals Intelligence
- National Security Agency is responsible for collecting, processing, and reporting Signals Intelligence
Measurement and Signature Intelligence
- technically derived intelligence data other than imagery or signals
- results in intelligence that locates, identifies or describes distinctive characteristics of targets
- employs a broad range of disciplines including:
- -nuclear, optical, radio frequency, acoustics, seismic, materials sciences
- examples:
- -Distinctive radar signatures of specific aircraft
- -Chemical composition of air or water samples
- The Central MASINT Organization, a competent of the Defense Intelligence Agency, is the focus for all national and DoD MASINT matters
Open-Source Intelligence
- Publicly available info
- radio, TV, newspapers, journals, Internet, Commercial databases, Videos, Graphics, Drawings
- Collections activities broadly distributed throughout the IC, but major collectors are:
- -Foreign Broadcast Info Service
- -National Air and Space Intelligence Center
Geospatial Intelligence
- Analysis and visual representation of security related activities on the earth
- Produced through an integration of imagery, imagery intelligence, and geospatial info
The Intelligence Cycle 3: Processing and Exploitation
- conversion of large amounts of data to a form suitable for the production of finished intelligence
- includes: decryption, translations, interpretations of info stored on film and magnetic media through the use of highly refined photogenic and electronic processes
- substantial portion of the US Intelligence is devoted to this
The Intelligence Cycle 4: Analysis and Production
-integration, evaluation and analysis of all available data and the prep of a variety of intelligence products, including timely, single-source, event orientated reports and longer term, all-source intelligence studies
Analysts:
- receive the incoming info
- evaluate it
- produce an assessment of current info
- forecast future trends or outcomes
- develop requirements for collection of new info
Situation may require analysts from several agencies:
ex: Iran’s nuclear program
- CIA
- DoS
- DIA
- DoE
The Intelligence Cycle 5: Dissemination
- delivering the products(finished intelligence) to the consumers who request them
- five categories of finished intel:
1. current intelligence
2. estimative intelligence
3. warning intelligence
4. research intelligence
5. scientific and technical intelligence
Categories of Finished Intel(1): Current Intelligence
-Addresses day to day events
–seeks to apprise consumers of:
—new developments and related background
–to assess their significant
–to warn of near-term consequences
–to signal potentially dangerous situations in the near future
–presented: daily, weekly, monthly, as needed
Categories of Finished Intel(2):Estimative Intelligence
- looks forward to assess potential developments that could affect US national security
- help policy makers think strategically about long-term threats
- -discesses implications of a range of possible outcomes and alternative scenarios
- estimative reports
- -National Intelligence Estimate
- -produced by the National Intelligence Council
Categories of Finished Intel(3):Warning Intelligence
- sounds an alarm or gives warning to policy makers
- -connotes urgency and implies the potential need for policy action in response
- warning includes identifying or forecasting events that could cause the engagement of US military forces, or those that would have a sudden and detritus effect on US foreign policy concerns.
ex: coups, third party wars, refugee situations
Categories of Finished Intel(4):Research Intelligence
- two subcategories:
1. Basic intelligence - -structured compilation of foreign country data
- –geographic, demographic, social, military, political
- -presented in the form of:
- –maps, atlases, force summaries, handbooks, models
2. Intelligence for operational support - includes all types of intelligence production-current, estimative, warning, research and scientific
- tailored, focused, and rapidly produced for planners and operators
- top priority for the DIA to satisfy intelligence needs of operational forces and their commanders
- -DIA also provides near-real-time inlligence to military forces in peacetime crisis, contingency and combat
- –operates Joint Worldwide Intelligence Communications System
- –Deploys National Intelligence Support Teams
Categories of Finished Intel(5):
- includes info on technical developments and characteristics, performance, and capabilities of foreign technologies including weapon systems or subsystems
- info derived from analysis of all-source data, including technical measurements
- responds to specific national requirements derived from:
- -weapons acquisition process
- -arms control negotiations
- -military operations
Categories of Finished Intel
- Current Intelligence
- Estimative Intelligence
- Warning Intelligence
- Research Intelligence
- Scientific and Technical Intelligence
Intelligence Oversight
- executive and legislative branches
- organizations include:
- -The President’s Foreign Intelligence Advisory Board
- -The President’s Intelligence Oversight Board
- -The Office of Management and Budget
- -The Senate Select Committee on Intelligence
Director of National Intelligence(DNI) was recommended by who and serves as what?
- Created by the 9/11 Commission
- Serves as the head of the Intelligence Committee
What is the goal of the DNI?
-Goal: to ensure coordination and cooperation between all US intelligence communities and to unify the national intelligence effort in place of the Director of Central Intelligence
DNI has the authority to what?
- create national intelligence centers
- control the national intelligence budget
- transfer personnel and funds
- create a Privacy and Civil Liberties Board
- Establish an information-sharing network
Who was the first DNI and who currently heads it?
- first was John Negroponte on 5/18/5
- Currently by James R Clapper Jr
DNI Mission Support Activities
- National Counterterrorism Center
- National Counterintelligence Executive
- National Counterproliferation Center
- The Special Security Center
- The National Intelligence University
- Intelligence Advanced Research Projects Activity
- The Center for Security Evaluations
- THe National Intelligence Council
- The National Intelligence Coordination Center
- The Mission Support Center
The CIA was established when and under what?
-1947 under the National Security Act of 1947
Had roots in?
in the disbanded WWII Intelligence Agency, Office of Strategic Services
Headquarted, training facilities, currently headed by?
- headquartered in Langley, LA
- Training in Camp Perry, VA
- Headed by John Brennan
Function of the CIA
- Advise the National Security Council on intelligence activities related to national security.
- Make recommendations to the NSC for the coordination of such intelligence activities.
- Correlate and evaluate national security intelligence and disseminate such intelligence within the gov
- Perform for the benefit of existing intelligence agencies such as additional services of common concern as the NSC determines can be accomplished centrally
- Perform other such functions and duties related to intelligence as the NSC may from time to time direct
Defense Intelligence Agency is what and was established when?
- Major producer and manager of foreign military intelligence
- established November 1 1961
DIA Director is what?
- 3 star military officer
- currently General Vincent Stewart
FBI is what, protects who?
- Federal law enforcement organization
- -also a threat-based, intelligence driven, national security organization
- protects the US from critical threats while safeguarding civil liberties`
FBI serves as what?
-serves as a link between intelligence and law enforcement communities
FBI priorities?
- combating the threat of terrorism
- counterintelligence
- cybercrime
National Geospatial-Intelligence Agency was established when?
October 1996
NGA used to be called what? and changed under what?
National Imagery an Mapping Agency
-changed under the 2004 Defense Reauthorization Bill
NGA- 3 operational units?
- Imagery analysis
- Geospatial Info and Services
- Central Imagery Tasking Office
National Reconnaissance Office established when and why?
-in Sept 6 1961 to coordinate CIA reconnaissance activities with those of the Department of Defense(staffed by DOD and CIA)
National Reconnaissance Office primary functions?
- oversee the research and development, procurement, deployment and operation of:
- imaging satellities
- signals intelligence satellites
- ocean surveillance
National Security Agency created when and when did it become NSA/Central Security Service?
- October 24, 1952 created
- and changed in 1971
NSA primary responsibilities?
- information assurance
2. signals intelligence
NA basic functions- Information Assurance Mission:
- Detect, report and respond to cyber threats
- make encryption codes to securely pass info between systems
- embed IA measures directly into the emerging global into grid
- Build secure audio and video comm equipment
- make tamper-proof products
- provide trusted microelectronics solutions
- test the security of its partners’ and customers’ systems
- provide operational security assistance
- evaluate commercial software and hardware
NSA Basic Functions: Signals Intelligence Mission
- Collects, processes and disseminates foreign signals intelligence
- -conducts or managers intelligence operations on a worldwide basis employing
- –satellites
- –aircraft
- –ships
- –subs
- –ground stations
Signals Intelligence- developes what and provides what?
- develops intel and info security hardwoods, devices that can be used to decipher foreign communications
- provides info in the form go SIGINT products and services that enables US gov officials to make critical decisions
DHS Office of Intelligence and Analysis
- DHS’s headquarters intelligence element
- led by the Under Secretary for Intelligence and Analysis
- responsible for using info and intelligence from multiple sources to identify and assess current and future threats to the US
- Provides actionable intelligence to support national and DHS decision-makers
Department of State Bureau of Intelligence and Research
- provides expert intelligence analysis to the Secretary of State and senior policymakers on decisions regarding the protection of Am interests around the world.
- serves as the State Department focal point for all policy issues and activities involving the Intelligence Community
- the INR Humanitarian Information Unit serves as a nucleus for unclassified info related to complex emergencies
DHS created in response to criticism:
that increased federal intelligence inter-agency cooperation could have prevented the 9/11 terrorist attacks.
Borders provide access for:
- illegal immigrants
- illegal goods
Border security and control is the utmost importance in the effort to…?
mitigate the risk posed by terrorists and criminals
What two groups started in 1904 that were Immigration service Watchmen?
- Mounted Guards
- Mounted Inspectors
In early 20th century, gov more concerned with..?
customs violations than illegal immigration
What did the gov do for custom violations?
- issed a higher head tax/literacy requirements
- placed limits on # of immigrants entering country
- Labor Appropriation Act
- -created Border Patrol
What did the Border Patrol do?
- split between Mexican and Canadian borders
- Immigration and Naturalization Service created out of the separate bureaus of Immigration and Naturalization
- given the power to search anywhere for illegal immigrants
- they expanded
- launched “Hold the Line(el paso)” and “gatekeeper(san diego)”
Immigration
the act of entering and settling permanently in another country, and/or becoming a permanent resident or legal citizen of that country
US founded on the principle of?
open immigration
Immigration law guides the granting of…?
residency and citizenship to foreign nationals
Nations protect their nationalist economic interest through:
- the levying of import taxes on foreign goods
- controlling the rate of flow and quantity of specific goods that enter the country
When did the US initiate custom services?
soon after declaring independence in 1776
Customs generate almost all of the US gov’s revenue for how many years?
125
following 9/11, DHS consolidated:
- ICE
- CBP
- USCG
- USCIS
US Customs and Border Protection(CBP)
- the only agency responsible for protecting the US borders at and between the official ports of entry
- -considered the “front line” in protecting the nation against terrorist attacks
- ensures national economic security by regulating and facilitating the lawful movement of goods and persons across the US Borders
- one of DHS’s largest and most complex components
Border patrol’s mission
the detection and apprehension of illegal aliens and smugglers of aliens at or near the land border
Office of Air and Marine mission and considered to be..?
- mission to protect people and critical infrastructure through the coordinated use of integrated air and marine forces
- considered to be one of the world’s largest air and marine LE organizations
Office of Technology Innovation and Acquisitions(OTIA) established…. and what falls under this office?
- established to seek out, develop, and acquire technological solutions to CBP probs
- construction of vehicle and pedestrian fences
OTIA includes:
- establishing acquisition policies
- maintaining an acquisition workforce
- assessing the cost and effectiveness of technologies
- assessing their performance in the field
Secure Freight Initiative
- a network of radiation detection and container imaging equipment operated at 6 seaports worldwide
- uses modern imagery and scanning systems to inspect maritime cargo containers
- sensor and image data are encrypted and sent to the CBP National Targeting Center fr final assessment
- if scanning data indicates concerns, containers are sent to secondary inspection
- US bound containers can be refused until the concern is resolved
Container Security Initiative mission(CSI)
-to target and prescreen containers and to develop additional investigative leads related to the terrorist threat to cargo bound for the US
CSI is now operational at ports in:
-North American, Europe, Asia, Africa, The Middle East, Latin and Central America
Agricultural Inspection
- CBP agents work with agents from USDA to prevent the intro of harmful pests into the US
- have extensive training in agriculture and biological inspection
- also able to recognize and prevent entry of organisms that could be used for biological warfare or terrorism
- also use detector dogs to sniff out hidden agricultural products
CPB Immigration Inspection Program: what they do and what they are responsible for
- Examine immigrant documents to determine eligibility
- CBP officers responsible for determining the nationality an ID of every person entering the US
CBP officers may…..
question any incoming person under oath and search the person of any incoming person
Law of Presumption
every incoming person is assumed to be an alien until evidence of citizenship is shown
The principle investigative arm of DHS and is the second largest investigative agency in the fed gov is
Immigrations and Customs Enforcement (ICE)
ICE’s primary mission
promote homeland security and public safety through the criminal and civil enforcement of federal laws governing:
-border control, customs, trade, immigration
ICE’s mission also expands to:
- terrorist financing
- money laundering
- arms trafficking
- technology exports
- commercial fraud
- child pornography
ICE Enforcement and Removal Operations
- charged with enforcement of US immigration law
- IDs and apprehends removal aliens
- -detains and deportation
- prioritize the apprehension, arrest, and removal of convicted criminals
Secure Communities Program: Created to….
- to prioritize the detention and removal of illegal aliens who:
- -post a unique or significant public safety threat
- -are repeat immigration offenders
Secure Communities Program: Process
- FBI collects and sends the fingerprints of people arrested by local LE to ICE
- ICE processes the prints and determines if the arrested person is residing illegally
- In such cases, ICE has the authority to begin removal operations
- Individuals ID’d are moved to the front of the line
ICE Homeland security investigations(HSI): tasked with…
-investigating various domestic and international activities related to the illegal movement of people and goods into, within, and out of the US
HSI also responsible for:
- financial crimes, money laundering, and bulk cash smuggling
- commercial fraud and intellectual property theft
- cyber crimes
- human rights violations
- human smuggling/trafficking
- transnational gang activity
- export enforcement
- international art and antiquity theft
ICE Project Shield America: aimed at preventing WMD trafficking by:
- illegal exporters
- targeted foreign countries
- terrorist groups
- international criminal organizations
ICE Project Shield America: also used to stop efforts to obtain and illegally export:
- licensable commodities and technologies
- conventional munitions and firearms
- stolen property
- financing that violates US sanctions
Joint Terrorism Task Forces(JTTF) and who is its largest contributor?
- investigate, detect, interdict, and prosecute and remove terrorists, and dismantle terrorist organizations
- ICE
Border Enforcement Security Task Force(BEST): goals
-to ID, disrupt, and dismantle criminal organizations posing significant threats to border securitty
BEST: Created in response to
-the dramatic increase in cross-border crime and violence
BEST includes foreign agencies:
- Mexican Secretaria de Seguridad Publica(SSP)
- Royal Canadian Mounted Police(RCMP)
- Argentinian Customs Agency
Counterterrorism and Criminal Exploitation Unit(CTCEU): prevents… and reviews…?
- prevents terrorists and other criminals from exploiting US immigration
- reviews the immigration status of known and suspected terrorists
CTCEU: combats…. and uses…?
- combats criminal exploitation of the Student and Exchange Visitor Program(SEVP)
- uses HSI’s expertise to ID national security threats
Counterproliferation Investigations
- ICE is the only fed LE agency with full statutory authority to investigate and enforce criminal violations of all US export laws related to:
- -military items
- -controlled “dual-use” commodities
- -sanctioned countries
US Coast Guard(USCG)
- only military organization with DHS
- lead fed agency for maritime drug interdiction nd air interdiction
- aslo tasked with enforcing immigration law at sea
- lead agency for the fed response to oil and hazardous materials incident
US Citizenship and Immigration Services(USCIS)
- oversees lawful immigration to the US
- provides accurate and useful info to intending immigrants
- grants immigration and citizenship benefits
- Intelligence has shown terrorists to be interested in exploiting the US immigration system to gain entry to the US
Transportation safety and security: history:
- the US has relied on the private sector for both the transportation network and the network’s safety and security
- the 9/11 events illustrated the vulnerabilities of our systems and required a chance to past approaches
Transportation networks
- Freight Rail
- Highways, Roadways, and Motor Carrier Networks
- Ports and Intermodal Freight Transport
- Mass Transit
- Pipeline Security
- Air Freight
- Commercial and General Aviation
Transportation Security
Administration (TSA): created as a result of….
-Created as a result of the Aviation and Transportation Security Act, 2001
• TSA operated w/in the Dept. of Transportation (DOT) until 2003, when it
moved to DHS
• Made aviation security a direct Federal responsibility for the first time
• Consolidated all transportation security
activities under the umbrella of one agency
TSA: primary security focus is on:`
- Identifying risks
- Prioritizing them
- Managing them to acceptable risk levels
- Mitigating the impact of potential incidents that may arise as a result of these risks
TSA Responsibilities (1):
-Provide security to the nation’s
transportation security systems, with a
primary focus on aviation security
• Screening of all aviation passengers and baggage
TSA Responsibilities(2):
2) Manage the security risk to the US
surface transportation systems
• Mass transit
TSA Areas of Responsibility
- Air Transportation Safety and Security Trucking Safety
- Ports and Shipping Security
- Bus Transportation Security
- Railway Transportation Security
TSA Components
- Transportation Security Grants
- Law Enforcement Program
- Security Programs
- Security Screening
Transportation Security
Grants
- Freight Rail Security Grant Program
- Intercity Bus Security Grant Program
- Transit Security Grant Program
TSA Law Enforcement
-Federal Air Marshal Service (FAMS)
• Detect, deter, and defeat hostile acts targeting
US air carriers, airports, passengers, and crews
-National Explosives Detection Canine Team
-Crew Member Self Defense Training Program
-Armed Security Officer
-Federal Flight Deck Officer Program
-Law Enforcement Officers Flying Armed Program
TSA Security Programs
- Air Cargo Security
- Flight School Security Awareness Training Program
- I-STEP Program
TSA Security Screening
- Passenger Screening
- Baggage Screening
- Covert Testing
What percentage of all hazardous materials are transported by trucks?
90%
TSA began conducting background checks on HAZMATS drivers in?
2005
TSA provides grants under the “Highway Watch” program for the following:
• Participant Identification and Recruitment
• Training
• Communications
–Highway Watch Call Center
• Information Analysis and Distribution
–Highway Information Sharing and Analysis Center (ISAC)
An attack on any major US port could result in:
- Significant loss of life
- Tremendous physical damage
- Serious disruption to the economy and commerce of the US and its trading partners
SAFE Port Act of October 2006
• Tasked DHS with the responsibility of assuring maritime transport security and protecting the nation’s ports
-USCG is lead Fed agency
DHS and DOT share responsibilities for
securing maritime transportation systems
and the ports
DHS and USCG have a layered security approach:
Aims to minimize potential threats while:
- US-bound ships/vessels are overseas
- They are in transit
- They are within US waterways
24-Hour Advanced Manifest Rule
• All sea carriers required to provide proper cargo descriptions and valid consignee addresses 24 hrs before cargo is loaded at a foreign port
• Failure to do so will result in a “no load”
message and other penalties
Container Security Initiative (CSI)
- CBP teams screen containers in foreign ports
- Potential suspect containers are targeted and identified before being loaded onto vessels
Customs-Trade Partnership Against Terrorism (C-TPAT)
-importers, carries, brokers, forwarders, port
and terminals, and foreign manufacturers take steps to secure their supply lines
-Participants receive
special benefits
-Allows DHS to devote more resources to high risk shipments
International Ship and Port Facility Security (ISPS) Code
• First multilateral ship and port security standard ever created
• Requires vessels and port facilities to:
-Conduct security assessments
-Develop security plans
-Hire security officers
• Compliance ensured by the USCG under the International Port Security Program
Operation Safe Commerce (OSC)
• Pilot program to analyze security in the commercial supply chain and testing solutions to close security gaps • Technologies tested will: -Enhance maritime cargo security -Protect global supply chain -Facilitate the flow of commerce
Smart Box Initiative
- Development of “tamper evident” containers
- Works in conjunction with current mechanical seals
- Device would indicate an attempted intrusion
Ship Security Alert System (SSAS)
- Allows a vessel operator to send a covert alert to shore for incidents involving violence or indicating that the security of the ship is under threat or has been compromised
- All new and existing passenger and cargo ships of at least 500 gross tons must have equipment installed as of July 1, 2006
Automated Targeting System (ATS)
- uses pre arrival info and input from the intelligence community to identify high-risk targets before they arrive in the US
- Evaluates arrivals via all modes of transportation
96-Hour Advance Notice of Arrival
Ships must notify USCG 96 hours prior to arriving in US port
•must provide detailed info on:
-Crew
-Passengers
-Cargo
-Voyage history
• Info then analyzed using databases and intelligence information
• USCG then determines which vessels require additional attention
National Targeting Center (NTC)
• Provides tactical targeting and analytical research support for CBP antiterrorism efforts.
• Experts in passenger and cargo targeting
-Utilize ATS
• Also supports CSI personnel
Maritime Intelligence Fusion Center(MIFC)
-Compile and synthesize intel products from federal, state, and local sources dealing with maritime security
• Products are then disseminated to homeland security agencies involved in port and waterway security
High Interest Vessel Boardings
- High-risk vessels are targeted for boarding to address potential security issues prior to entry into port
- USCG also randomly selects vessels for security boardings
Operation Port Shield
- USCG boards all vessels (at sea or at the dock) on their first visit to a US port to ensure compliance with US security standards
- Program officers also visit foreign countries to evaluate antiterrorism measures at foreign ports
Automatic Identification System
- Allows the near real-time tracking of vessels
* Currently, only large vessels on international voyages are required to have this
Area Maritime Security Committees
• USCG has established committees in all of the nation’s ports
• Allows for the coordination of all activities of port stakeholders
-Collaborative security plans
Port Security Assessment Program
- Designed to make best practice info available to US port officials.
- Aimed at helping port officials make decisions about how to improve the vulnerability of their ports
Port Security Grants
• Provides federal resources for projects to
enhance security at port facilities.
-Funds assist ports in analyzing vulnerabilities and then closing security gaps
• Control gates
• Fencing • Lighting
• Communications
• Surveillance equipment
Non-Intrusive Inspection Technology
• Leveraging technology to screen a larger portion of commercial traffic in less time while facilitating legitimate trade
- Backscatter X-ray machines
- Handheld radiation meters
- Density meters
- Fiber optic scopes
Maritime Safety and Security Teams (MSSTs)
- USCG rapid response force for threats to vital ports
- capable of nation-wide deployment via air, ground, or sea
- capabilities:
- -explosive detection dogs
- -fest rope capable
- -antiterrorism/Force Protection Small Boat handling training
- -underwater port security
Guarding In-Between the Ports
• USCG
• CBP Border Patrol
• ICE Air and Maritime Operations Units
-Responsible for patrolling and securing the nation’s borders between ports of entry
Transportation Worker Identity Card (TWIC)
-Secure, uniform ID card to prevent potential
terrorist threats from entering sensitive areas of the transportation system
-Biometric based
-Will allow workers to enter secure areas at multiple facilities
–Will reduce need for background checks and multiple ID cards
The Container Story: 1
- cargo checked at secure Port of Departure
- -24 hr advanced manifest rule
- -CSI
- -C-TPAT
- -ISPS Code
The Container Story: 2
- Tracked in transit
- -automatic identification system
The Container Story: 3
- advanced notice of arrival
- -96 hr advance notice
The Container Story: 4
- vessel, crew, and cargo assessed prior to port entry
- -ATS
- -NTC
- -MIFC
- -high interest vessel boardings
- -operation port shield
The Container Story: 5
- Vessel examined at secure Port of Arrival
• Area Maritime Security Committee
• Port Security Assessment Program
• Port Security Grant
The Container Story: 6,7,8
- crew documents checked at arrival
- cargo screened before delivery
- -non-intrusive inspection technology - delivered to proper customer
Rail Security Act 2004:
-Requires DHS to conduct a vulnerability assessment of the nation’s rail systems and report back to Congress
• Identification and evaluation of critical assets and infrastructure
• Threats to those assets and infrastructure
• Vulnerabilities that are specific to rail transportation of HAZMAT
• Security weaknesses
TSA Initiatives
- security screening of passengers and baggage
- transportation worker identity credential
- explosive detection k9 teams
- transit and rail inspection pilot
- -evaluated the use of technologies to screen rail passengers and their baggage.