U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

National Preparedness: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy

NCJ Number
195355
Author(s)
Randall A. Yim
Date Published
June 2002
Length
26 pages
Annotation
This document presents testimony on homeland security strategies.
Abstract
There are specific data, information sharing, and technology challenges facing the country in developing and implementing a national preparedness strategy. The nature of the terrorist threat makes it difficult to identify and differentiate information that can provide an early indication of a threat from the mass of data available to those in positions of authority responsible for homeland security. The United States faces cultural, legal, and technical barriers in collecting and sharing information. Many technologies are not yet available to address threats, and many existing technologies have not been effectively adapted for the threats the country now faces. The real challenge is to define the homeland security mission and information, technologies, and approaches necessary to perform the mission without organizational and cultural differences. Local, State, and Federal agencies will need to carry out their respective roles with a great deal of assistance from the private sector. Risk management principles should be applied to analyze and identify assets that need to be protected to maintain the continuity of critical operations, as well as threats, vulnerabilities, risks, priorities, and countermeasures. The first step in risk management is to identify assets that must be protected to maintain continuity of critical operations and the impact of their potential loss. The second step is to identify and characterize the threat to these assets. The third step involves identifying and characterizing vulnerabilities that would allow identified threats to be realized. In the fourth step, risk must be assessed and priorities determined for protecting assets. The last step is to identify countermeasures to reduce or eliminate risks. The advantages and benefits of these countermeasures must be weighed against their disadvantages and costs. The Federal government should develop an architecture that describes homeland security operations in logical terms and technical terms. A critical function of this architecture would be to establish protocols and standards for data collection. Analytical and warning capabilities should be developed so that advanced warnings can be issued and protective measures implemented. 17 footnotes