Laserfiche WebLink
HSGP Appendix | 2023 Page A-25 <br />and domestic violent extremists, threats to life and targeted violence, transnational organized <br />criminal activity, cyber threats, and natural hazards, among others that require close collaboration <br />with DHS operational, investigative, and analytic entities such as CBP, ICE, United States Secret <br />Service (USSS), CISA, the United States Coast Guard (USCG), and FEMA. <br />•Analytic Capability: Fusion centers must maintain strong analytic capabilities at tactical, <br />operational, and strategic levels to address a wide array of threats or hazards that could have <br />implications for homeland security or national security. These capabilities directly support <br />operational, investigative, and information sharing efforts across all levels of government. These <br />capabilities include, but are not limited to: <br />o Building and sustaining a capable workforce of analysts who have the necessary <br />experience and training; access to open source, unclassified and classified information, <br />products, data, suspicious activity reporting; tips/leads and online/social media-based <br />threats; as well as necessary services and technology to facilitate analytic capabilities and <br />collaboration; <br />o Assessing, evaluating, and deconflicting acts of targeted violence, threats to life, and <br />other criminal or suspicious activity, to include potential indicators and behaviors, for <br />potential connection to or implications for international or domestic terrorism, or other <br />threats within the DHS mission space; <br />o Providing analytic support and responses to requests for information from federal, state, <br />and local partners during no notice threats, attacks, or incidents, as well as other planned <br />events such as NSSEs; <br />o Conducting threat assessments within their respective jurisdictions, including the <br />identification of threats, intelligence gaps, and mitigation efforts; <br />o Establishing, formalizing, and maintaining bi-directional information sharing with federal <br />and other state agencies in accordance with jurisdictional authorities; <br />o Leveraging available resources and capabilities to conduct target and event deconfliction <br />in support of threat identification, officer safety, and information sharing. <br />o Maintaining an ability to routinely support federal government efforts to watchlist <br />terrorists and transnational organized crime actors; and <br />o Appropriately planning for, and assessing/forecasting, prioritizing, and executing against <br />both known and emerging threat vectors, and ensuring the safety and security of all <br />operations, while protecting privacy, civil rights, and civil liberties. <br />Fusion centers should also consider their operational capacity when aligning manpower and <br />resources in support of this capability (e.g., the ability to maintain watch and analytic support <br />functions over a 24/7 operational tempo). <br />•Technological Integration: Access to data, information, and products is essential for fusion <br />centers and the federal government to effectively identify, collect, analyze, and share information. <br />Just as threats do not stop at jurisdictional borders, fusion centers must be able to effectively <br />access and share appropriate information and data across jurisdictions, agencies, and disciplines. <br />Fusion centers must ensure and certify via the Fusion Center Assessment they have the <br />necessary technological capacity to access, analyze, and share information, including criminal <br />intelligence and online/social media threat information, both within their jurisdictions, as well as <br />with other fusion centers across the country and with the Federal Government through a variety <br />of systems, databases, tools, and technologies that allow for federated searching and <br />data/information analysis that protects Personally Identifiable Information and includes <br />appropriate security, privacy, civil rights, and civil liberties protections. This includes <br />maintenance of the ability to collect, integrate, evaluate, and assess SAR, tips/leads, data resident <br />in CAD and RMS, and online/social media-based threats from agencies across the jurisdiction. <br />Such approaches should also address the evaluation and use of emerging capabilities, including <br />social network analysis, federated search technology across CAD, RMS, and other data systems,