Property | Value |
rdfs:label | |
is dcterms:subject of | - Terrorist Identities Group
- Social media tools
- Situational Information Report
- Cyberfunding
- Information Sharing Environment: Better Road Map Needed to Guide Implementation and Investments
- New York State Intelligence Center
- Terrorist Capabilities for Cyberattack: Overview and Policy Issues
- Vulnerability Assessment of Federal Facilities
- Nationwide SAR Initiative
- Information Technology for Counterterrorism: Immediate Actions and Future Possibilities
- National Counterintelligence Board
- The Attorney General's Guidelines for Domestic FBI Operations
- Protecting America's Freedom in the Information Age
- Physical attack
- Cyber Terror Response Center
- Presidential Decision Directives
- National Joint Terrorism Task Force
- Agent Provocateur
- Statewide Communication Interoperability Plans
- Protection
- Program Manager
- Terrorist activity
- Terrorist site
- DCI Counterterrorist Center
- National Counter-Terrorism Committee
- Terrorism-related information
- Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
- Cyberhooliganism
- Counterterrorism Division
- Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
- Numerical Integrated Processing System
- High Terrorist Factor
- Executive Order 13356
- 24 Hour Log
- Terrorism Watch List
- Terrorist group
- Combating Terrorism Technical Support Office
- Upstate New York Regional Intelligence Center
- ISE-Suspicious Activity Report
- Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress
- Gateway Information Sharing Initiative
- Terrorist organization
- Hybrid threat
- Antiterrorism risk management
- International terrorist
- Weapons of Mass Destruction Information
- Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
- Federal Support for and Involvement in State and Local Fusion Centers
- Terrorists and the Internet
- Check the Web
- Information fusion
- Random attack
- National Counterterrorism Center Online
- Scalable Social Network Analysis
- Intelligence Study
- Asymmetric attack
- Cybercrime, Cyberterrorism, Cyberwarfare, Averting an Electronic Waterloo
- Domestic counterterrorism
- Digital Outreach Team
- Counterterrorism Security Group
- Cyberterrorism Defense Initiative
- Multi-State Information Sharing and Analysis Center
- Coordinated cyber-physical attack
- Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
- Global War On Terror
- Arrival and Departure Information System
- Mobilizing Information to Prevent Terrorism: Accelerating Development of a Trusted Information Sharing Environment
- Weapon of mass destruction
- 9/11 Commission Recommendations: A Civil Liberties Oversight Board
- Information Warfare: An Analysis of the Threat of Cyber Terrorism Towards the US Critical Infrastructure
- Foreign terrorist organization
- Arizona Fusion Center
- Homeland Security Presidential Directive 6
- Asymmetric threat
- Biometric Center of Excellence
- Behavioral surveillance
- The Use of the Internet for Terrorist Purposes
- Catastrophic incident
- Contest
- Man-made unintentional threat
- Homeland Security: Better Use of Terrorist Watchlist Information and Improvements in Deployment of Passenger Checkpoint Technologies Could Further Strengthen Security
- Dead dropping
- Evidence Extraction and Link Discovery
- Environmental Response Laboratory Network
- Common Terrorism Information Sharing Standards
- Cyberterrorist
- Counterterrorism
- Homeland Security Presidential Directive 12
- Joint Internet Centre
- Terrorist Identities Datamart Environment (TIDE) Fact Sheet
- Counter-insurgency
- Information Assurance Directorate
- Executive Order 13311
- Executive Order 13292
- International Multilateral Partnership Against Cyber Threats
- Intelligence Memorandum
- Alerts, Warnings, and Notifications
- National Counterproliferation Center
- Threat focus cell
- Directorate of Terrorist Identities
- Tearline
- Homeland Security Presidential Directive 11
- NSTAC Report to the President on Telecommunications and Electric Power Interdependencies: The Implications of Long-Term Outages
- Interagency Working Group to Counter Online Radicalization to Violence
- ICE Pattern Analysis and Information Collection
- National Spatial and Information Management Working Group
- Executive Order 13354
- Anti-terrorism technology
- Intelligence Bulletin
- Office of National Intelligence Management
- Terrorist act
- Tier 1
- National Security and International Policy Group
- Special Event Threat Assessment
- Markle Task Force on National Security In the Information Age
- Threat condition
- Threat intelligence
- Energy Infrastructure Attack Database
- Office of Infrastructure Protection
- Bioterrorism
- National Security Division
- Nationwide Suspicious Activity Reporting Initiative
- Executive Order 13228
- Counter Terrorism Internet Referral Unit
- Suspicious Activity
- National Security Investigation
- Terrorist Screening Database
- Joint Counterterrorism Assessment Team
- Security Environment Threat List
- Regional intelligence center
- Homeland Security Intelligence Report
- Overview of NCTC's Data Access as Authorized by the 2012 Attorney General Guidelines
- Integrated Consortium of Laboratory Networks
- Threat recognition
- ISE Shared Spaces
- Information Sharing Environment Implementation Plan
- Law enforcement information
- Counter-Terrorism Implementation Task Force
- Terrorist Threat Integration Center
- Nationwide (SAR) Initiative
- Field Intelligence Model
- Terror
- Electronic Directory Services – People & Organizations
- Joint Security and Suitability Reform Team
- Center for Strategic Counterterrorism Communications
- All-hazards preparedness
- National Security Letter
- How to Prevent and Fight International and Domestic Cyberterrorism and Cyberhooliganism
- Memorandum of Agreement Between the Department of Homeland Security and the National Counterterrorism Center Regarding Advance Passenger Information System Data
- Guidelines for Access, Retention, Use, and Dissemination by the National Counterterrorism Center and Other Agencies of Information in Data Sets Containing Non-Terrorism Information
- Common Information Sharing Standards
- Office of Terrorism and Financial Intelligence
- Cyber espionage
- Presidential Policy Directive 8
- Incident response process
- The Federal Bureau of Investigation and Terrorism Investigations
- Joint Intelligence Community Council
- Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals
- Anti-terrorism, Crime and Security Act
- Homeland Security: Establishment and Implementation of Northern Command
- National Strategy for Information Sharing: Successes and Challenges in Improving Terrorism-Related Information Sharing
- International terrorism
- Terrorist attack
- Overview of the Baseline Safeguard Protections Under NCTC’s 2012 Attorney General Guidelines
- Risk management-based intelligence
- Homeland Security Presidential Directive-15
- Information Sharing Environment: 2013 Annual Report to the Congress
- Interagency Center for Applied Homeland Security Technology
- Executive Order 13010
- Federal Agency for State Protection and Counter-Terrorism
- BioSense
- California Anti-Terrorism Information Center
- Operational analysis
- Physical threat
- U.S.-EU SWIFT Accord
- Genisys
- National Strategy to Secure Cyberspace
- Independent Reviewer of Terrorism Legislation
- Actionable
- Technology and Privacy Advisory Committee
- Cybernetworking
- Joint Regional Information Exchange System
- USA PATRIOT Act of 2001
- Sector partnership model
- Inter-American Committee Against Terrorism
- Monitoring Assessment and Partners
- Disaster management
- Advanced persistent threat
- Information Sharing: DHS Could Better Define How It Plans to Meet Its State and Local Mission and Improve Performance Accountability
- Terrorist threat
- Anti-Terrorism Advisory Council
- Terrorism Information and Prevention System
- U.S.-EU Cooperation Against Terrorism
- NCTC's Annual Report on the Access, Retention, Use and Dissemination of United States Person Information For the Period March 23, 2012 through March 31, 2013
- TTIC Online
- Army Threat Integration Center
- Surveillance, Collection, and Operations Support
- CALEA Implementation Unit
- Foreign Government Information Sharing Working Group
- Man-made deliberate threat
- Technical Resource for Incident Prevention
- Terrorist Screening Center
- Data Mining: Early Attention to Privacy in Developing a Key DHS Program Could Reduce Risks
- Safeguarding Privacy in the Fight against Terrorism
- Efforts to Improve Information Sharing Need to Be Strengthened
- Chemical facility anti-terrorism standards
- National Criminal Intelligence Service
- Report of the Working Group on Countering the Use of the Internet for Terrorist Purposes
- National Counterterrorism Center
- A Question of Trust: Report of the Investigatory Powers Review
- Organisation of the Islamic Conference-CERT
- Couterterrorism Division
- Intentional cyber assault
- Anti-terrorism
- Terrorist Use of the Internet: Information Operations in Cyberspace
- Cyber 9/11
- Biometrics-enabled intelligence
- Information Technology Management: Terrorism Information Awareness Program
- Terrorist surveillance program
- DHS National Emergency Communications Plan
- National Committee on Critical Infrastructure Protection
- Prevention of Information Technology Crimes
- Terrorism information
- Baseline Capabilities for State and Major Urban Area Fusion Centers
- Terrorists use of the Internet
- National Terrorism Brief
- Directorate of Operations Support
- Worldwide Incidents Tracking System
- Working Group on Countering the Use of Internet for Terrorist Purposes
- Countering the Use of the Internet for Terrorist Purposes: Legal and Technical Aspects
- Terrorist
- Terrorist Identities Datamart Environment
- Law Enforcement Intelligence Unit
- Counter Terrorism Security Adviser
- Critical Infrastructure Working Group
- Risk Analysis Process for Informed Decision-making
- Working Group on Countering the Use of the Internet for Terrorist Purposes
- Data Mining: DHS Needs to Improve Executive Oversight of Systems Supporting Counterterrorism
- IT Roadmap to a Geospatial Future
- Threat and Vulnerability Testing and Assessment
- Pipeline Cybersecurity: Federal Policy
- Cyberterrorism
- United States Visitor and Immigrant Status Indicator Technology
- Office of the National Coordinator for Security, Infrastructure Protection and Counter-Terrorism
- National Terrorism Advisory System
- Under Secretary of the Treasury for Terrorism and Financial Intelligence
- Cyber Incident Data Detection and Analysis Center
- Office of Foreign Assets Control
- Development of Espionage, Counterintelligence, and Counterterrorism Awareness
- Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
- Genisys Privacy Protection
- DHS Policy for Internal Information Exchange and Sharing
- Defence Intelligence Organisation
- Jihadis and the Internet
- Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
- Regional Consortium Coordinating Council
- Threat advisory
- Homeland Security Presidential Directive 19
- Privacy Technology Focus Group
- Homeland Security State and Local Intelligence Community
- Survey of DHS Data Mining Activities
- Regional Terrorism Threat Assessment Center
- Financial intelligence unit
- Terrorism
- National Cyber Investigative Joint Task Force
- Joint Intelligence Bulletin
- Information Sharing: Federal Agencies Are Helping Fusion Centers Build and Sustain Capabilities and Protect Privacy, but Could Better Measure Results
- DHS Privacy Office: Progress Made but Challenges Remain in Notifying and Reporting to the Public
- Threat and Local Observation Notice
|