The Pros And Cons Of Fusion Centerss

Improved Essays
One of the problems that remains an issue for fusion centers is although they are good at dispersing information between all levels of law enforcement, there remains a disconnect between the private sector and the fusion centers. In a recent survey conducted with seventy of the seventy-seven fusion centers around the country, 2.1 percent of them admitted that they received daily information from the private sector (Erickson, 2012). Without the private sectors input of information there remains a disconnect of information and this should be addressed as soon as possible. Another problem that persists is the difficulty that fusion centers have when it comes to their ability to “analyze cyber security relevant information (Erickson, 2012).” This could easily be fixed by employing more knowledgeable personnel. An …show more content…
As I mentioned before, the DHS is completely aware of how fusion money is spent. Back in 2009, the Department of homeland Security had an estimate on how much was spent which was between 289 million and 1.4 billion dollars (Smith, 2012). Knowing how tax payer’s money is spent is not only a good way to let the public know that their money is going to good use, but it would also help the fusion centers themselves figure out the best way to spend the money. So what I propose is that each state government takes charge of auditing their own fusion center. The reason for this is not only because the federal government does not want to do it, it is because each state is in a unique situation and this will cause spending of Americans tax dollars to go in different directions. The government historically has rarely if ever been good at keeping track of their money as evidenced by our national debt. However, if our country can spend money wisely on fusion centers, it will help fusion centers grow and become far more

Related Documents

  • Improved Essays

    Abstract Stephen Flynn believes that there are goals of homeland security that are crucial to America’s bureaucracies and he senses that the country is wasting the chance to really protect the United States. Stephen discusses two crucial mistakes that he feels America has made and the first mistake is that he discusses is how homeland security is separated from national security. The two key intelligence agencies are not communicating. The second issue, he discusses is how our infrastructure is penetrable. In this lesson Stephen Flynn sees a problem with tactical thinking within the Department of Homeland Security (DHS).…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As easy as it is to focus on the negative side of fusion centers, since 2007, fusion centers have been gaining more success stories. One example of this can be found back in 2008. The Central California Intelligence Center was responsible for preventing two bombs from potentially exploding the American embassy in Italy and Delta Airlines. The analysts were able to provide its co-local JTTF Joint Terrorist Task Force and prevent two men from blowing up those two locations. Another success story comes from 2014 when the Southeast Fusion Center helped local agencies in apprehending a murder suspect.…

    • 252 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The success of the North Carolina Information Sharing and Analysis Center demonstrates the effectiveness of Fusion Centers. Based upon the reference material there is” potential risk to civil liberties concerns or violations since the Intelligence gathered could be viewed as pre-emptive law enforcement and gathered in the absence of a criminal predicate and that individuals who do not necessarily have the appropriate law enforcement or broader intelligence training will engage in intelligence collection that is not supported by law”. ("Global Intelligence Working Group, 2005a, p. 11". Retrieved…

    • 906 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Dni Effect

    • 1657 Words
    • 7 Pages

    As the number of arrests shows, domestic terrorism is not going away and as the enemy evolves and transforms into a more sophisticated terrorist, the law enforcement and intelligence communities at all levels must do so as well. Experts in the domestic terrorism field warn against the intersections where the cyber-terror, narco-traffickers and terrorist will meet. Currently, the intelligence agencies that monitor these different types of threats are disconnected and the IC is not positioned to detect an intersection among these disparate groups. This is clearly a vulnerability that exists within the framework of the domestic counter-terrorism IC; joint collaboration must continue to evolve to ensure an attack does not occur in these…

    • 1657 Words
    • 7 Pages
    Great Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Millions of Americans depend on the Department of Homeland Security to protect their information including addresses, phone numbers, and other online information that is stored on the DHS’s network. Although cyber attacks can happen at any time, the Department of Homeland Security has many agencies to stop these attacks. The National Cybersecurity and Communications Integration Center (NCCIC) is one of the many agencies that works to stop and address cyber attacks. It is a 24/7 cyber awareness management center. It addresses threats and other incidents affecting our cyber infrastructure to the public to warn citizens about keeping their information…

    • 883 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The use of the intelligence method is prominent with the AFP through collecting information and data to produce intelligence. The AFP also employs the use of both strategic and Tactical intelligence in their practices, theoretically being that strategic intelligence uses long-term initiatives, strategies on emerging problems and structures of serious organised crime while tactical intelligence focuses on short-term initiatives, looking closely at criminal groups and activities (Buckley 2013). A practical example is the Specialist Response group that provides tactical strategies through intelligence operational priorities for a diverse range of AFP operations and building missions (AFP 2016). A difference identified through analysing the AFPS initiatives compared to the academic intelligence methods is the AFP’s use of public relations through educating the public with critical matters and receiving information from the public to improve statistics and crime prevention techniques. This is initiated through the AFPs virtual global taskforce for cyber crime, focusing on informing the public on risks and preventative actions (AFP Corporate Plan 2015-2019).…

    • 1017 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. Fusion center are centers—consisting of multiple law enforcement agencies—that are designed to bring agencies together by combining efforts to collect, share and analyze information in order to create intelligence law enforcement can act on. 2. Legalistic policing is the style of policing in which officers are by the book, meaning that the police departments that embrace this style of policing will for example give a ticket to someone going 36mph in a 35mph zone. Service policing is the style of policing in which officers prefer to help members of the community rather than strict enforcement.…

    • 307 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Homeland Security and Critical Infrastructure The events of September 11, 2001, highlighted significant gaps in the country’s emergency preparedness and more specifically, its ability to identify threats and protect against terrorist attacks. The resulting analyses of the incident and the response efforts stressed the need for an overarching program that would coordinate the efforts of a multitude of government agencies with competing goals and requirements. A program that would improve the transfer of critical intelligence and maximize response efforts.…

    • 1808 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Fusion Essay

    • 408 Words
    • 2 Pages

    1. What type of power does a patent provide to a company? Is this the same? Is this the same kind of power that people within a firm attempt to gain?…

    • 408 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays