Discussion Board Peer Responses

Discussion Board Peer Responses. Unit 3 – Discussion Board Peer Responses
View Assignment Details for Unit 3 – Discussion Board
Assignment Overview
Type: Discussion Board
Unit: Strategies for Integrated Homeland Security Intelligence
Deliverable Length: 100 word reply to 2 individual selected classmates for a total of 200 words minimum (100 words x 2)
Assignment Descriiption

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

What did you learn from your classmate’s posting?
What information did you find most interesting about each posting after reading the posting?
What information would you research further after reading the posting?
What differences or similarities do you see between your posting and other classmates’ postings?
For assistance with your assignment, please use the following resource materials.

NATO Intelligence and Information Sharing: Improving NATO Strategy for…
by Hanna, Michael; Granzow, David; Bolte, Bjorn ; Alvarado, Andrew

The failure of police ‘fusion’ centers and the concept of a national intelligence sharing plan
by Taylor, Robert W; Russell, Amanda L

Knowledge sharing and competitive intelligence
by Luu, Tuan

Assessing the Effects of Cultural Intelligence on Team Knowledge Sharing From a Socio‐Cognitive Perspective
by Chen, Mei-Liang; Lin, Chieh-Peng

Lowenthal, M. (2003). Intelligence from secrets to policy. Washington D.C.: CQ.

The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States (2004). New York: Norton.

Joint publication 2-0: Joint intelligence. (2007, June 22). Retrieved November 9, 2009, from the Federation of American Scientists Web site: http://fas.org/irp/doddir/dod/jp2_0.pdf

National strategy for homeland security. (2007, October). Retrieved November 6, 2009, from the Department of Homeland Security Web site: http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf


In this discussion post counterintelligence is protection of strong information that I feel can be something I think some type of information that is needed to know about organization any countries and entity’s reading the article I learned it’s a strategy to stall and prevent any attempt that may damage or take away from the main information. Having counterintelligence work can either be offensive or can be some type of collection that can gather defensive as well. (Crandall, n.d).

Counterintelligence and its actions are can very much be vital in helping other groups that may be minimized vulnerabilities and avoid attacks. Counterintelligence is crucial in the homeland security because the counterintelligence events that help improve the effectiveness and value of homeland security. Counterintelligence inhibits serious performers from acquiring access to this organization to develop the complex data and sources it acquires. With no counterintelligence, the department of homeland security and several additional intelligence organizations would be more than exposed to incidents from terrorists and other groups.

Part 2

Collaboration is another essential element that is at the core of fusion centers. This guideline enables fusion centers to share information and intelligence with other agencies and organizations effectively. The collaboration between agencies provides an enhanced capability to detect, prevent, and capture terrorists (Fusion Center Guidelines, n.d.). In addition, collaboration enables the involved agencies and organizations to manage intelligence and relationships better.

Proper governance is essential to the achievement of synthesis centers. Governance creates a shape that determines and applies standards that manage tactical direction and objective achievement. These standards decrease excess by using sources intelligently and controlling risks (Fusion Center Guidelines, n.d.). In addition, governance guarantees that fusion centers can function professionally and have the required standards to retain the company’s honesty. Which I think is a combination of people and the ability to have technology.

Centers are also held responsible for their sustainability. This organization’s expenditures must be partially or absolutely accepted by the individual himself after numerous of authorized financing sources. Apart from durability, the facility’s ability to create or even achieve a great plan which is clearly influenced by its capability to generate high-level assistance. (This is announced on Fusion Center Number 17. n.d)

The Fusion Center has the guidelines of support infrastructure security, information which is some type of privacy and funding of the Bureau of Justice Assistance (BJA), Office of Justice Programs, U.S. Department of Justice, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative and the U.S. Department of Homeland Security. These Guidelines for Establishing and Operating Fusion Centers at the Local, State, and Federal Levels.

National Counterintelligence Strategy. (2020). www.dni.gov/files/NCSC/documents/features/20200205-National_CI_Strategy_2020_2022.pdf.

Fusion Center Guidelines. (n.d.). www.bja.ojp.gov/sites/g/files/xyckuh186/files/media/document/fusion_center_guidelines_law_enforcement.pdf


Part One:

Counterintelligence is an essential tool that is vital in protecting government organizations and their data. There are three types of counterintelligence: collection, defensive, and offensive. Collection counterintelligence obtains information about an adversary’s abilities to gain intelligence that could adversely impact one’s organization. Defensive counterintelligence prevents the activities of bad actors from negatively impacting one’s agency. Finally, offensive counterintelligence identifies adversary activities that compromise one’s systems. This form of counterintelligence prevents the attacks by recruiting the bad actors to turn them into double agents or supplies them with false intelligence that will be provided to their organization (Lowenthal, 2003). Establishing objectives helps agencies prioritize activities and guides decision-making. The primary objectives of counterintelligence are: to protect the critical infrastructure of the country, reduce threats that could impact supply chains within the United States, counter any acts that aim at exploiting the U.S. economy, prevent foreign influence over American democratic processes and institutions, and counter foreign intelligence that threatens the cyber and technical operations of the country (National Counterintelligence Strategy, 2020). The agency carefully considers each strategic objective to ensure the safety of the country and other government agencies.

Counterintelligence and its activities are also vital in helping other organizations minimize vulnerabilities and prevent attacks. Counterintelligence is critical to homeland security because counterintelligence activities help enhance the efficiency and effectiveness of homeland security. Counterintelligence prevents bad actors from gaining access to the organization to exploit the sensitive data and resources it possesses. Without counterintelligence, homeland security and many other intelligence organizations would be more vulnerable to attacks from terrorists and other organizations.

Part Two:

Guideline 3) Governance:

Proper governance is critical to the success of fusion centers. Governance creates a structure that establishes and enforces standards that guide management’s strategic direction and objective achievement. These standards minimize waste by using resources wisely and managing risks (Fusion Center Guidelines, n.d.). In addition, governance ensures that fusion centers can operate efficiently and possess the necessary standards to maintain the organization’s integrity.

Guideline 4) Collaboration:

Collaboration is another essential element that is at the core of fusion centers. This guideline enables fusion centers to share information and intelligence with other agencies and organizations effectively. The collaboration between agencies provides an enhanced capability to detect, prevent, and capture terrorists (Fusion Center Guidelines, n.d.). In addition, collaboration enables the involved agencies and organizations to manage intelligence and relationships better.

Guideline 9) Security:

Prioritizing security is another essential element of fusion centers. The security guideline ensures that suitable security measures are in place to protect the facility, data, and personnel. In addition, this guideline ensures that fusion centers possess the necessary capabilities to protect the aforementioned elements with the help of access control, encryption, and confidentiality (Fusion Center Guidelines, n.d.). Managing these elements ensures that fusion center activities are protected from attack.


Fusion Center Guidelines. (n.d.). www.bja.ojp.gov/sites/g/files/xyckuh186/files/media/document/fusion_center_guidelines_law_enforcement.pdf.

Lowenthal, M. (2003). Intelligence from secrets to policy. Washington D.C.: CQ.

National Counterintelligence Strategy. (2020). www.dni.gov/files/NCSC/documents/features/20200205-National_CI_Strategy_2020_2022.pdf.


Unit 3 – Discussion Board
Organizational and Policy Challenges (HLS630-2105A-01)
Strategies for Integrated Homeland Security Intelligence

Part A: Objectives and Importance of CI

Counterintelligence, commonly abbreviated as CI, describes intelligence’s function that classifies and counteracts threats emanating from entities and other hostile intelligence capabilities (Lowenthal, 2012). One objective of CI is to enrich command security. CI achieves that objective by denying adversary information, which, in turn, helps conduct successful operations against friendly forces. CI aims to safeguard the command by recognizing and counteracting terrorism, subversion, sabotage, and espionage efforts, thereby protecting America and its key sources, critical infrastructure, and people (Department of Homeland Security, 2007). Additionally, the objective of CI is to offer essential intelligence backing to command force defense efforts by assisting in the identification of planned intentions, threat capabilities, and possible threats to friendly operations (Lowenthal, 2012). Consequently, this ensures that CI help deceives the enemy as to friendly intentions, vulnerabilities, and capabilities.

CI is vital to homeland security (HLS) because it enhances operational and physical security by combating terrorism. While operational security lessens exposure, physical security diminishes vulnerability, making a country a less lucrative target. As a result, CI escalates uncertainty for the opponent, thus, increasing the chances of victory of friendly operations. Moreover, CI aids in the identification of vulnerability and evaluation of security measures (Lowenthal, 2012). Sequentially, this ensures the enactment of appropriate security plans, thereby enhancing the protection of a nation. For instance, in the case of Al Qaeda, CI permitted it to form an exact and representative assessment of its environment (National Commission on Terrorist Attacks upon the United States et al., 2004). In turn, this enabled Al Qaeda to scatter concepts of a group inspired by a degree of radicalism that misrepresents its view of reality or disturbs its ability to take part in rational decision-making.

Part B: Fusion Center Guidelines

A fusion center describes a joint effort of at least two agencies, which offer information, expertise, and resources to the center, whose primary objective is to maximize their capability to respond to, investigate, prevent, and detect terrorist and criminal activities (Bureau of Justice Assistance et al., 2006). The Department of Justice (DOJ) has established 18 fusion center guidelines, three of which include guideline 9, 15, and 18, which concerns security, policies

Discussion Board Peer Responses

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer