The FBI's Infragard Program

Total Page:16

File Type:pdf, Size:1020Kb

The FBI's Infragard Program InfraGard San Diego Members Alliance The FBI’s InfraGard Program InfraGard San Diego Members Alliance The Birth of InfraGard The National InfraGard Program began as a pilot project in 1996, when the Cleveland FBI Office asked local computer security professionals to assist the FBI in determining how to better protect critical information systems in the public and private sectors. From this new partnership, the first InfraGard Chapter was formed to address both cyber and physical threats. InfraGard San Diego Members Alliance InfraGard Purpose Mitigate Criminal- and Terrorist- based Threat, Risk and Loss • Provide opportunity to exchange ideas, information and security practices between the private sector, law enforcement, other first responders, government and academia. • Provide members with timely threat/risk advisories, alerts and warnings. • Provide a conduit to act as a “force multiplier” for the FBI and DHS • Host regular meetings on timely topics of concern and importance to our critical infrastructure sectors InfraGard San Diego Members Alliance InfraGard Program Guidance • Homeland Security Presidential Directive 7 − HSPD-7 − Establishes Critical Infrastructure/Key Resource Protection Program (CIP) • National Infrastructure Protection Plan (NIPP) − Guiding document for CIP • Sector Specific Plans (SSP) − Guidance for individual sectors • Intelligence Reform Act − Fusion Centers • Fusion Center Baseline Capabilities - DOJ InfraGard San Diego Members Alliance Critical Infrastructure & Key Resources in San Diego RESEARCH MANUFACTURING EDUCATION X VOLUNTEERS InfraGard San Diego Members Alliance Example: Transportation Sector A critical infrastructure characterized by the physical distribution system critical to supporting the national security and economic well-being of this nation, including aviation; the national airspace system; airlines and aircraft; and airports; roads and highways, commercial and personal vehicles, intelligent transportation systems; waterborne commerce; ports and waterways and the vessels operating thereon; mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous material; freight and long haul passenger rail; and delivery services. InfraGard San Diego Members Alliance InfraGard National Structure MOU MOU 76 Fusion 56 Field Offices Centers InfraGard Chapter 86 IMA’s Approval process IMA IMA IMA + >500 members Vetting InfraGard San Diego Members Alliance InfraGard Membership • Critical Infrastructure Owners/Operators Private Sector Public Sector • Strategic Partners Local, State and Federal Law Enforcement Government Agencies (e.g. MPO’s, Transit Agencies, Cities, Special Districts, etc.) Other First Responders (Fire, EMS, etc.) • Trust Relationship All members have FBI Security Clearance for Law Enforcement Sensitive/FOUO information InfraGard San Diego Members Alliance InfraGard Partnership Initiatives with the Intelligence Community • New IC partnerships: − ADDNI/OS (Asst Deputy Dir Natl Intelligence/Open Source) − HITRAC (Homeland Infrastructure Threat-Risk Assessment Center – DHS) − State Fusion Centers • In CA: STTAC, NCRIC, JRIC, LECC, OCIAC, CCIC • New Initiatives with U.S. Dept. of Homeland Security − InfraGard access to Homeland Security Information Network – CS Portal (HSIN-CS) − JCIP: Joint Critical Infrastructure Partnership − Private Sector Clearance Program - PSCP InfraGard San Diego Members Alliance InfraGard San Diego Members Alliance, Inc. A Delaware 501(c)3 Corporation InfraGard San Diego Members Alliance FBI San Diego & InfraGard San Diego San Diego & Imperial Counties InfraGard San Diego Members Alliance Who’s Involved in SD InfraGard? Board of Directors & Officers Chapter Board Member Functional Expertise Bruce Churchill, President/CEO; CI/KR Transportation Security, Emergency Sector Coordinator (SD LECC) Management, ex-Navy (25 yrs) Matt Miller, Vice President Fusion Center Intel Analyst (SD LECC) Jim Colville, Secretary CPA Andy Crossland, Secretary Hotel Security Curtis Jones, Membership Coordinator BioTech Security Dave Dalton (pending election) Private Security, ex-LAPD (29 yrs) Paul Kielbasa (pending election) Defense Industry Security Officer Katherine Zacharias, Member at Large Insurance Charlie Kim, Member at Large Legal Pete Owen (Advisor) DHS Protective Security Advisor (PSA) Fernando Keller (Advisor) DHS Intelligence Officer (SD LECC) Chris Vera (Advisor) Sempra Energy InfraGard San Diego Members Alliance InfraGard Sector Chief Program SD Law FBI Infragard Enforcement Coord IG Board Center Coordinator Critical Infrastructure Program CI/KR Sector Coordinator TLO Program Intelligence Support Unit Joint Terrorism Task Force Sector Chiefs FBI Case Agents InfraGard San Diego Members Alliance Sector Chief Certification • Formal Training − San Diego CI/KR Environment − National Infrastructure Protection Plan (2009) − Sector-Specific Plans − County CIP Program − Fusion Center Organization/Operations(SD LECC) • Information Sharing Environment − HSIN-CS − Chapter web site − Social Media • Intel Collection, Reporting and Dissemination • Certification by San Diego FBI Field Office InfraGard San Diego Members Alliance Infragard and San Diego LECC All-Crimes Terrorism Deconfliction JTTF Watch LECC (FBI Lead) Center Drugs SD FBI Gangs SLO – Sector Liaison Officer TLO – Terrorism Liaison Officer Border Crimes CI/KR – Critical Infrastructure/Key Resources Violent Crimes OES – SD County Office of Emergency Services Strategic Intel LECC – Law Enforcement Coordination Center JTTF – Joint Terrorism Task Force Infragard CIP – Critical Infrastructure Program Private Sector Intel Support Unit Local Govts County OES CI/KR Program Local Public Safety SD County CIP Federal LE TLO Program Military SLO Local First Program Responders InfraGard San Diego Members Alliance What Does Our Chapter Do? • Strategic Planning • Maintains a seat in San Diego Fusion Center (SD LECC) • Quarterly Membership Meetings − Information exchange − Networking − Recruiting • Periodic Sector Chief Meetings − CI/KR Sector Coordinator and Sector Chiefs − Sector-Specific Meetings • Local outreach • Conferences, Special Events & Exercises InfraGard San Diego Members Alliance InfraGard National Success Stories I-35W Bridge Collapse NSA Project Pegasus 4-State Full-Scale Ex 1000’s of Cases to FBI InfraGard San Diego Members Alliance SD InfraGard Exercises TTX-Medusa 2010 FSE-STAR 2009 (w/ LA) FE-Raging Waters 2012 TTX-CAMPUS 2011 InfraGard San Diego Members Alliance HALO Counter-Terrorism Summit InfraGard San Diego is partnering with the HALO Corporation for the 2012 Counter-Terrorism Summit at the Paradise Point Resort in San Diego. Keynote Speakers will include Gen. Michael Hayden (USAF Ret.) former Director CIA & NSA; AZ Gov. Jan Brewer (invited), Alejandro Poiré Romero, Mexico’s Minister of the Interior and Chief Michael Downing, Commander LAPD Counter-Terrorism/Special Ops Bureau. InfraGard San Diego Members Alliance SD Law Enforcement Coordination Center LA Joint Regional Intelligence Center Arizona Counter-Terrorism Intel Center Southern NV Counter-Terrorism Center We partner with InfraGard Chapters in LA, AZ, Southern NV InfraGard San Diego Members Alliance InfraGard’s Intrinsic Value Proposition • InfraGard Chapters are local and can adapt to the needs of their community/region • InfraGard Chapters have representation from all 19 DHS Critical Infrastructure Sectors • The trust inherent in individuals with FBI clearance is unmatched in any other public-private partnership in the U.S. • The FBI-InfraGard Team is a unique and highly- successful solution to involving the private sector in the protection of our nation’s critical infrastructure InfraGard San Diego Members Alliance InfraGard Membership Step 1: Step 2: Allow about 4-6 weeks for processing QUESTIONS? For more information: For more information: Bruce Churchill Special Agent Parker Scott President/CEO InfraGard Coordinator InfraGard SD Members Alliance Federal Bureau of Investigation [email protected] [email protected] Thank You for Your Interest in InfraGard!.
Recommended publications
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Federal Bureau of Investigation Hearing
    FEDERAL BUREAU OF INVESTIGATION HEARING BEFORE THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION JULY 26, 2007 Serial No. 110–86 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PRINTING OFFICE 37–010 PDF WASHINGTON : 2007 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 11:11 Jul 09, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 H:\WORK\FULL\072607\37010.000 HJUD1 PsN: DOUGA COMMITTEE ON THE JUDICIARY JOHN CONYERS, JR., Michigan, Chairman HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia F. JAMES SENSENBRENNER, JR., JERROLD NADLER, New York Wisconsin ROBERT C. ‘‘BOBBY’’ SCOTT, Virginia HOWARD COBLE, North Carolina MELVIN L. WATT, North Carolina ELTON GALLEGLY, California ZOE LOFGREN, California BOB GOODLATTE, Virginia SHEILA JACKSON LEE, Texas STEVE CHABOT, Ohio MAXINE WATERS, California DANIEL E. LUNGREN, California WILLIAM D. DELAHUNT, Massachusetts CHRIS CANNON, Utah ROBERT WEXLER, Florida RIC KELLER, Florida LINDA T. SA´ NCHEZ, California DARRELL ISSA, California STEVE COHEN, Tennessee MIKE PENCE, Indiana HANK JOHNSON, Georgia J. RANDY FORBES, Virginia BETTY SUTTON, Ohio STEVE KING, Iowa LUIS V. GUTIERREZ, Illinois TOM FEENEY, Florida BRAD SHERMAN, California TRENT FRANKS, Arizona
    [Show full text]
  • The Internal Effects of the Federal Bureau of Investigation's
    REDACTED AND UNCLASSIFIED The Internal Effects of the Federal Bureau of Investigation’s Reprioritization U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 04-39 September 2004 REDACTED AND UNCLASSIFIED REDACTED AND UNCLASSIFIED THE INTERNAL EFFECTS OF THE FEDERAL BUREAU OF INVESTIGATION’S REPRIORITIZATION EXECUTIVE SUMMARY * In direct response to the September 11, 2001 (9/11), terrorist attacks, the Director of the Federal Bureau of Investigation (FBI) initiated a transformation that, among other things, established a new ranking of priorities and formally shifted a significant number of agents from traditional criminal investigative work to counterterrorism and counterintelligence matters. According to the Director, each of the changes was designed to reshape the FBI into an organization better able to combat the imminent threat of terrorism and to prevent another large-scale terrorist attack against the United States. Prior to 9/11, the FBI utilized more of its field agent resources to investigate traditional criminal activity than to investigate matters related to terrorism. According to the FBI, since the reprioritization it is striving to incorporate more proactive, intelligence-based tactics and operations into its procedures, particularly in terrorism-related matters. Non-terrorism related crime, however, still occurs, and because the FBI has the broadest jurisdiction of any federal law enforcement agency, it is expected to maintain a response capability for violations of federal criminal law. However, other federal, state, and local law enforcement agencies may be capable of taking on increased responsibilities for certain investigative areas in light of the FBI’s reprioritization. In order for this transition to occur effectively, the specific areas from which the FBI has reduced its involvement must be identified.
    [Show full text]
  • The FBI: Protecting the Homeland in the 21St Century
    EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED (U) The FBI: Protecting the Homeland in the 21st Century (U) Report of the Congressionally-directed (U) 9/11 Review Commission To (U) The Director of the Federal Bureau of Investigation By (U) Commissioners Bruce Hoffman Edwin Meese III Timothy J. Roemer EMBARGOED(U) March 2015 EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED 1 EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED (U) TABLE OF CONTENTS (U) Introduction: The 9/11 Review Commission…..……….………........ p. 3 (U) Chapter I: Baseline: The FBI Today…………………………….. p. 15 (U) Chapter II: The Sum of Five Cases………………….……………. p. 38 (U) Chapter III: Anticipating New Threats and Missions…………....... p. 53 (U) Chapter IV: Collaboration and Information Sharing………………. p. 73 (U) Chapter V: New Information Related to the 9/11 Attacks………… p. 100 (U) Key Findings and Recommendations…………………………………. p. 108 (U) Conclusion: ………………………………………………………… p. 118 (U) Appendix A: Briefs Provided by FBI Headquarters Divisions.…..… p. 119 (U) Appendix B: Interviews Conducted……… ………………………. p. 121 (U) Appendix C: Select FBI Intelligence Program Developments…….… p. 122 (U) Appendix D: Acronyms……………… …………………………… p. 124 EMBARGOED 2 EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED (U) INTRODUCTION THE FBI 9/11 REVIEW COMMISSION (U) The FBI 9/11 Review Commission was established in January 2014 pursuant to a congressional mandate.1 The United States Congress directed the Federal Bureau of Investigation (FBI, or the “Bureau”) to create a commission with the expertise and scope to conduct a “comprehensive external review of the implementation of the recommendations related to the FBI that were proposed by the National Commission on Terrorist Attacks Upon the United States (commonly known as the 9/11 Commission).”2 The Review Commission was tasked specifically to report on: 1.
    [Show full text]
  • Critical Infrastructure Threat Information Sharing Framework a Reference Guide for the Critical Infrastructure Community
    Critical Infrastructure Threat Information Sharing Framework A Reference Guide for the Critical Infrastructure Community October 2016 CRITICAL INFRASTRUCTURE THREAT INFORMATION SHARING FRAMEWORK Page intentionally left blank. CRITICAL INFRASTRUCTURE THREAT INFORMATION SHARING FRAMEWORK Contents Quick Reference Guide for Critical Infrastructure Owners and Operators, .................................. iii Report Threats and Incidents ...................................................................................................... iii Report Suspicious Activity ...................................................................................................... iii Report Suspected or Known Cyber Incidents .......................................................................... iv Report Physical Infrastructure Incidents .................................................................................. iv Become a Partner in the “If You See Something, Say Something™” Campaign ................... iv Receive Threat Information Relevant to Your Sector ................................................................ iv Access Threat Prevention and Protection Related Training and Exercises .............................. v Executive Summary ........................................................................................................................ 1 1 Introduction ............................................................................................................................... 3 1.1 Background ........................................................................................................................
    [Show full text]
  • Combatting Cybercrime: Tools and Capacity Building for Emerging Economies, Washington, DC: World Bank License: Creative Commons Attribution 3.0 IGO (CC by 3.0 IGO)
    Combatting Cybercrime Tools and Capacity Building for Emerging Economies Page 1 | Chapter 1 | § Table of Contents Combatting Cybercrime Tools and Capacity Building for Emerging Economies Some Rights Reserved This work is a co-publication of The World Bank and the United Nations. The findings, interpretations, and conclusions expressed in this work do not necessarily reflect the views of The World Bank, its Board of Executive Directors, or the governments they represent, or those of the United Nations. The World Bank and the United Nations do not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank or the United Nations concerning the legal status of any territory or the endorsement or acceptance of such boundaries. Nothing herein shall constitute or be considered to be a limitation upon or waiver of the privileges and immunities of The World Bank or the United Nations, all of which are specifically reserved. Rights & Permission This work is available under the Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) http://creativecommons.org/licenses/by/3.0/igo. Under the Creative Commons Attribution license, you are free to copy, distribute, transmit, and adapt this work, including for commercial purposes, under the following conditions: Attribution — Please cite the work as follows: World Bank and United Nations. 2017. Combatting Cybercrime: Tools and Capacity Building for Emerging Economies, Washington, DC: World Bank License: Creative Commons Attribution 3.0 IGO (CC BY 3.0 IGO).
    [Show full text]
  • 2013: the FBI Story
    U.S. Department of Justice Federal Bureau of Investigation 2013 An examiner with the Terrorist Explosive Device Analytical Center (TEDAC)—a multi-agency operation established by the FBI in 2003—photographs parts used in an improvised explosive device. 2013 Hostage Rescue Team members debrief after a training exercise at their facility in Quantico, Virginia. 2013 The FBI Story I II 2013 The FBI Story A Message from FBI Director James B. Comey This past year, the FBI and its partners again addressed a wide range of national security and criminal threats. Together, we responded to numerous crisis incidents, such as the terrorist bombings of the Boston Marathon and the shootings at the Navy Yard in Washington, D.C. We confronted a continued surge of cyber attacks against targets ranging from everyday citizens to our largest and most successful businesses. And we stopped those who would strike at the heart of our communities—from violent gangs and white-collar criminals to child predators and corrupt public officials. A glimpse of the challenges we faced—and what we achieved together—can be found in this latest edition of The FBI Story, our annual collection of news and feature articles from the Bureau’s public website. Here you can read about some of our most successful recent major investigations and operations. These include a three-day nationwide sweep targeting child prostitution in which we identified and rescued more than 100 young victims and arrested more than 150 pimps; the rescue of a 5-year-old boy held captive in a heavily armed bunker in Alabama; and the uncovering of the largest domestic bribery and bid-rigging scheme in the history of federal contracting cases—one that siphoned more than $30 million dollars of taxpayer money.
    [Show full text]
  • FY 2009 FBI Congressional Budget Justification
    Table of Contents Page No. I. Overview ………………………………………………………………….............. 1-1 II Summary of Program Changes…………………………………………….. 2-1 III. Appropriations Language and Analysis of Appropriations Language….......... 3-1 IV. Decision Unit Justification A. Intelligence………………………………………………………………… . 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews B. CT/CI……………………………………………………………………… 4-15 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews C. CEFC………………………………………………………………………....... 4-39 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews D. CJS………………………………………………………………………… ...... 4-65 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes c. Results of Programs Assessment Rating Tool (PART) Reviews V. E-Gov Initiatives……………………………………………………………. 5-1 VI. Program Increases by Item………………………………………………… 6-1 Domain and Operations Increases Response to a WMD Incident……………………………………………. 6-1 CBRNE/WMD Forensic Response
    [Show full text]
  • The Attorney General
    Case M:06-cv-01791-VRW Document 356 Filed 08/20/2007 Page 1 of 155 Laurence F. Pulgram (CSB No. 115163) 1 [email protected] Candace Morey (CSB No. 233081) 2 [email protected] FENWICK & WEST LLP 3 555 California Street, 12th Floor San Francisco, CA 94104 4 Telephone: (415) 875-2300 Facsimile: (415) 281-1350 5 6 Ann Brick (CSB No. 65296) [email protected] 7 AMERICAN CIVIL LIBERTIES UNION FOUNDATION OF NORTHERN CALIFORNIA 8 39 Drumm Street San Francisco, CA 94111 9 Telephone: (415) 621-2493 Facsimile: (4150 255-8437 10 Attorneys for Plaintiffs in 11 Dennis P. Riordan, et al. Vincent I. Parrett (CSB No. 237563) [email protected] 12 Barry R. Himmelstein (CSB No. 157736) MOTLEY RICE LLC [email protected] 28 Bridgeside Boulevard 13 LIEFF, CABRASER, HEIMANN & BERNSTEIN, LLP P. O. Box 1792 275 Battery Street, 30th Floor Mount Pleasant, SC 29465 14 San Francisco, CA 94111-3339 Telephone: (843) 216-9000 Telephone: 415-956-1000 Facsimile: (843) 216-9440 15 Facsimile: 415-956-1008 Interim Class Counsel for 16 Interim Class Counsel for MCI Class Verizon Class 17 UNITED STATES DISTRICT COURT 18 NORTHERN DISTRICT OF CALIFORNIA 19 SAN FRANCISCO DIVISION 20 IN RE: MDL No. 06-1791 VRW 21 NATIONAL SECURITY AGENCY PLAINTIFFS’ SUPPLEMENTAL TELECOMMUNICATIONS RECORDS REQUEST FOR JUDICIAL NOTICE AND 22 LITIGATION, SUPPLEMENTAL AUTHORITIES FOR THE MOTIONS TO DISMISS OR, IN THE 23 This Document Relates To: ALTERNATIVE, FOR SUMMARY JUDGMENT BY THE UNITED STATES 24 (1) All Class Actions Against MCI and OF AMERICA AND VERIZON Verizon Defendants in the Master MCI and 25 Verizon Consolidated Complaint, Dkt.
    [Show full text]
  • Hacktivism: an Analysis of the Motive to Disseminate
    HACKTIVISM: AN ANALYSIS OF THE MOTIVE TO DISSEMINATE CONFIDENTIAL INFORMATION THESIS Presented to the Graduate Council of Texas State University-San Marcos in Partial Fulfillment of the Requirements for the Degree Master of SCIENCE by Warren V. Held, B.A. San Marcos, TX December 2012 HACKTIVISM: AN ANALYSIS OF THE MOTIVE TO DISSEMINATE CONFIDENTIAL INFORMATION Committee Members Approved: ______________________________ Jay D. Jamieson, Chair ______________________________ J. Pete Blair ______________________________ Jeffrey M. Cancino Approved: ____________________________ J. Michael Willoughby Dean of the Graduate College COPYRIGHT by Warren V. Held 2012 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Warren V. Held, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. ACKNOWLEDGEMENTS I would like to thank the family members, friends, professors, and others who have lent support, assistance, and guidance throughout the course of my education. This manuscript was submitted on October 26th, 2012. v TABLE OF CONTENTS Page ACKNOWLEDGEMENTS ...............................................................................................
    [Show full text]
  • Baseline Capabilities for State and Major Urban Area Fusion Centers
    NT O E F M JU T S Global Justice R T A I P C Information E E D Sharing Initiative United States Department of Justice Baseline Capabilities for State and Major Urban Area Fusion Centers A Supplement to the Fusion Center Guidelines September 2008 Baseline Capabilities for State and Major Urban Area Fusion Centers A Supplement to the Fusion Center Guidelines September 2008 About Global The U.S. Department of Justice’s Global Justice Information Sharing Initiative (Global) serves as a Federal Advisory Committee to the U.S. Attorney General on critical justice information sharing initiatives. Global promotes standards-based electronic information exchange to provide justice and public safety communities with timely, accurate, complete, and accessible information in a secure and trusted environment. Global is administered by the U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Assistance. This project was supported by Grant No. 2007-NC-BX-K001 awarded by the Bureau of Justice Assistance, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative and the U.S. Department of Homeland Security. The Bureau of Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Justice or the U.S. Department of Homeland Security.
    [Show full text]
  • Download The-FBI-Story-2014-Web.Pdf
    U.S. Department of Justice Federal Bureau of Investigation 2014 FBI Director James B. Comey speaks to Cyber Division employees at FBI Headquarters. CAPSTitle 20CAPSTitle14 Subtitle and Upper and Upper and Upper and Upper www.fbi.gov The National Cyber Investigative Joint Task Force is composed of nearly two dozen federal intelligence, military, and law enforcement agencies, along with local law enforcement and international and private industry partners. The task force serves as the government’s central hub for coordinating, integrating, and sharing information related to cyber threat investigations. 2014 The FBI Story I A Message from FBI Director James B. Comey It has been a busy and challenging year for the FBI and for our partners at home and around the world. Together, we confronted cyber attacks from sophisticated, state-sponsored actors, transnational criminal groups, and everyday hackers. We arrested white-collar criminals and corrupt public officials. We protected our communities from violent gangs and child predators. And we safeguarded Americans from an array of counterterrorism and counterintelligence threats. This latest edition of The FBI Story, our annual collection of news and feature articles from our public website, FBI.gov, chronicles our most successful 2014 investigations and operations. These include the disruption of botnet operators responsible for the theft of more than $100 million worldwide; nearly $9 billion in penalties levied against one of the largest financial institutions in the world for exploiting the American financial system; and a nationwide child exploitation sweep that recovered 168 victims of trafficking. This edition of The FBI Story also highlights some of our unique capabilities.
    [Show full text]