Haven't found the Essay You Want?
GET YOUR CUSTOM ESSAY SAMPLE
For Only $12.90/page

Intelligence community Essay

Intelligence community’s core was established through the national security Act of 1947. It consists of 13 organizations and agencies. The workforce of the intelligence community consists of military and civilian personnel who are a part of the intelligence programs. Fusion centers are entities created by the state and are mostly financed and also staffed by the state. There is however, no model for how a fusion center should be created. State, law enforcement and criminal intelligence are at the core of many fusion centers.

A fusion center organization is a collaborative effort or agencies whose purpose is to provide resources, information and also expertise to the center with the main goal being to maximize their ability to detect, prevent, investigate and provide response to criminal activities. Intelligence communities provide information to those who draft the laws of a country. They do the collection of necessary information, analyze it and distribute it so that it is fit to be used by the military, decision makers and policy makers.

Once the users of the intelligence express their need for information, the intelligence community then identifies the appropriate collection agencies to do the job. The information collected is processed, analyzed and distributed to the users and to the community’s analysts who will then combine it with open source information before producing a finished intelligence report (Siegel, 2008). Various disciplines and jurisdictions The discipline of transport can be of importance in the fusion centers and also in the enhancement of homeland security.

The transportation agency or administration works both in the local and federal law enforcement. The agency can also provide security in the transport sector through the screening of persons and property in every transport area be it air, water or road transportation. This agency’s responsibility is to conduct inspections, assessments and investigations on passengers and cargo to determine their security posture. Transportation agencies improve staff and passenger safety and also provide quick response to any emergency situation.

The agencies also help improve efficiency in maintenance and operations (Haynes, 2007). The discipline of agriculture should depict itself in the fusion centers through the protection of animals, animal welfare and also plant protection against diseases and pests. The agency of agriculture should establish a damage control system that will be used for recovery when any damage occurs. Incorporation Information sharing is one of the ways to incorporate non traditional agencies in meeting homeland security objectives.

Information sharing is a unifying factor that is important in securing the homeland. The issue of information sharing is ensured through the development and implementation of effective information sharing policies and programs that are necessary for the success of the mission. Homeland security objectives and the ability to secure the homeland are also enhanced through building trusted relationships with the state, local tribal and private sector partners.

Pros and cons Protection of people and property is an important issue in homeland security and also in the anti-terrorist initiatives. Intelligent video management solutions and software provide a major surveillance, monitoring and security for both the public and private locations. Centralization of security management resources will enhance great cost effectiveness and can provide a better response to risks or threats through the use of video analytics.

Monitoring of alarm systems can be done and secure video can also be accessed from anywhere by authorized users only through the use of wireless or wired networks. Mobile and fixed systems should be interoperable to ensure consistent user operation, a flexible system growth and efficient video access and storage. Fixed IP video systems that contain all video capabilities provide an expansive monitoring and surveillance for any type of security operation (Brown & Rudma, 1996).


Essay Topics:


Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email. Please, specify your valid email address

We can't stand spam as much as you do No, thanks. I prefer suffering on my own