Strategies for Identifying Threats and Risks in Colorado

School: Southern New Hampshire University - Course: CJ 310 - Subject: Accounting

CJ 310 Module Six Assignment Sabrina Lund
 
StateMission of Fusion CenterStrategies for Identifying DomesticThreats and RisksStrategies for Identifying International Threats and Risks ColoradoThe Colorado InformationAnalysis Center (CIAC) gathersand analyzes data to preventterrorism. The CIAC is part of theDHS. It is composed of federal,local, private sector, tribal, andstate law enforcementprofessionals that shareinformation to prevent and reducecrime. According to the ColoradoInformation Analysis CenterDepartment of Public Safety, "Themission of the ColoradoInformation Analysis Center(CIAC) is to serve as the focalpoint within the State forreceiving, analyzing, and sharingthreat-related information amongprivate sector, local, tribal, andfederal partners." (CIAC et al.,2023)The CIAC works with theInfrastructure Protection (IP) Teamto gather intelligence aboutdomestic terrorist organizations.They assist sector, local, territorial,state, tribal, and federal partners toprotect Colorado's criticalinfrastructure. The ColoradoInformation Analysis CenterDepartment of Public Safety states,"The section manages the state'sinvolvement in multiple criticalinfrastructure related federalprograms and works to integrateprovisions of the NationalInfrastructure Protection Plan(NIPP) into Colorado's StateHomeland Security." (CIAC et al.,2023)The CIAC uses specific strategiesto identify natural and manmadethreats and disasters. The CIACCybersecurity Team collaborateswith the Infrastructure ProtectionTeam to review and analyze risks.The Colorado InformationAnalysis Center (CIAC) ThreatPrioritization Program (TPP)identifies threats based on whetherthey are human caused or not. TheThe CIAC analyzes and identifies international threats and risks. Since they are part of the national network of state fusion centers, they can share information with federal agencies. CIAC's Critical Infrastructure Protection Team has released a page addressing UAS threats. (CIAC et al., 2023) The DHS and the CIAC Infrastructure Protection Team assist private sector partners to analyze vulnerabilities of critical infrastructure. Protected Critical Infrastructure Information is information which can be shared with all agencies, including federal. The CIAC works with these international organizations to gather intelligence about international terrorist organizations. The CIAC submits an annual report to the HSAC for analyzation and tracking. These include Suspicious Activity Reports (SAR). The CIAC works with federal partners to identify, reduce, and report terrorism. (Executive Summary

Expert's Answer

Your future, our responsibilty submit your task on time.

Order Now

Need Urgent Academic Assistance?

Price Starts from $10 Per Page

*
*
*
*

TOP
Order Notification

[variable_1] from [variable_2] has just ordered [variable_3] Assignment [amount] minutes ago.