Using Intelligence to Identify Border Threats

Using Intelligence to Identify Border Threats

Using Intelligence to Identify Border Threats

The United States confronts a wide array of threats. Terrorism. Transnational criminal organizations. Drug and weapons smuggling.  Human trafficking. Cybercrime. And the ongoing challenge of illegal migration across U.S. borders.

Given this diversity of threats, how does the Department of Homeland Security (DHS) establish its priorities and allocate its scarce enforcement resources to effectively protect our borders?

DHS strategy must take into account the nearly 7,500 miles of shared border with Mexico and Canada, more than 12,000 miles of Atlantic and Pacific coastlines, and all of America’s airspace. Its strategy must not only be effective against the illegal entry of “people and things”, but also against the increasingly sophisticated tactics used to elude lawful inspection at more than 300 ports-of-entry located throughout the United States. It is a monumental task. 

So how does DHS accomplish it?  One key tool is intelligence. The absence of timely and accurate intelligence would make it extremely difficult for DHS to identify threats to the homeland and implement risk-based and intelligence-driven strategies.  A risk-based and layered operational approach that is driven by intelligence is the centerpiece of DHS’ strategy to focus its resources against public safety and national security risks, while also facilitating the lawful entry of people and cargo that pose no risks to the country.

 

DHS is one of 17 federal agencies in the United States Intelligence Community (IC) and is an essential partner in the sharing and developing of intelligence information. A threat analysis is created and used by the government to adapt to new and emerging threats. In addition to being a member of the IC, the DHS Intelligence and Analysis (I&A) office leads the Department’s Intelligence Enterprise.

The Intelligence Enterprise enables DHS to refine its internal threat analysis and adjust its operations to meet unique agency missions. In November 2014, DHS Secretary Jeh Johnson directed the creation of the Southern Border and Approaches Campaign, which is a multi-agency approach to improve how the Department protects the homeland across our borders. The use of intelligence-driven strategies is a crucial component to the Campaign’s effectiveness.

Intelligence is essential to DHS’ ability to protect America and effectively use its resources to prevent and disrupt public safety and national security risks.

Contributors

Steve Farquharson | Steve is a Senior Associate currently supporting information sharing solutions to improve intergovernmental communications, special event management, and operational support among homeland security and law enforcement agencies. At Arc Aspicio, Steve contributes to strategic initiatives, recruiting, and external communications and comes from long federal government career specializing in homeland security, border security, immigration, and law enforcement operations. He worked for the former Immigration and Naturalization Service and the US Department of Homeland Security and retired from public service as a senior executive for US Customs and Border Protection. Steve is a graduate of the University of Massachusetts.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

Washington, DC, October 19, 2018 — LeadersNest named Arc Aspicio CEO Lynn Ann Casey a FedFem Award Honoree. The FedFem awards salute high-impact women executives and leaders of the government contracting community. FedFem Award Honorees blend their entrepreneurial courage and Federal government support that effectively impacts the industry, national economy, and the local marketplace. 

Boosting the Mission: Developing Acquisition Requirements Guidance

Boosting the Mission: Developing Acquisition Requirements Guidance

To keep up with the fast pace of change in the field of Government acquisitions, Department of Homeland Security (DHS) components are developing their own acquisition requirements (AR) policies. However, without specific timeframes to finalize these policies, DHS agencies often lack guidance on how to develop ARs. Among DHS agencies, the U.S. Coast Guard is leading the way with their own formal policy to describe this process. To compliment the U.S. Coast Guard’s policy, DHS created the Joint Requirements Integration and Management System (JRIMS) to offer direction for agencies—to review, validate, and suggest solutions for capability gaps and requirements.

Top Qualities of Design Thinking Leaders

Top Qualities of Design Thinking Leaders

Design Thinking is on the rise in the business world. Design Thinking leaders focus on creating the best product for their clients and working with the experiences and insight of fellow coworkers. Some of the key characteristics of Design Thinking leaders present themselves in individuals who are open and subject themselves to vulnerability with clients and coworkers. These qualities help leaders to connect and build relationships with others. They also create an open flow of communication that allows for others to better share their knowledge to align with and understand the company's mission.

Think, Key, Speak: Purposeful Communications

Think, Key, Speak: Purposeful Communications

I spent the early years of my career in the United States Navy as a Naval Flight Officer on the E-2C Hawkeye, the Navy’s aircraft carrier-based Airborne Early Warning and Command and Control platform. The various missions of the aircraft demand that aircrew monitor up to ten radio frequencies, and actively speak on three or four of those, at any given moment in flight.