The companion website to:

The McGraw-Hill Homeland Security Handbook (2nd edition)

Welcome To McGraw-Hill Homeland Security Handbook

Learning Resources for Chapter 10

Chapters 3, 8 of the 9/11 Commission Report. http://govinfo.library.unt.edu/911/report/index.htm

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) and the national network of State and Major Urban Area Fusion Centers in the chapter by Kshemendra Paul, the ISE Program Manage.

Fingar, Thomas, Reducing Uncertainty: Intelligence Analysis and National Security, Stanford University Press, 2011.

The White House, National Strategy for Information Sharing, October 2007. http://georgewbush-whitehouse.archives.gov/nsc/infosharing/index.html.

www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf

http://georgewbush-whitehouse.archives.gov/homeland/maritime-security.html

www.us-cert.gov/reading_room/cyberspace_strategy.pdf

www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative

http://www.dhs.gov/xlibrary/assets/niac/niac-intelligence-information-sharing-final-report-01102012.pdf

"The Need to Know: Information Sharing Lessons Learned for Disaster Response," Hearing before the Committee on Government Reform, House of Representatives, 109th Congress, Second Session, March 30, 2006 Serial No. 109-143 accessed at http://www.fas.org/sgp/congress/2006/infoshare.html.

The Comprehensive Preparedness Guide can be accessed at http://www.fema.gov/pdf/about/divisions/npd/CPG_101_V2.pdf

The Lessons Learned Information Sharing website address is https://www.llis.dhs.gov

 “Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions,” edited by Derrick J. Neal and Linton Wells ll,  Center for Technology and National Security Policy, Institute for National Strategic Studies, National Defense University, December 2011.

Laskow, Sarah. “Homeland Security’s Billion Dollar Bet on Better Communications” (The Center for Public Integrity, February 16, 2010) http://www.publicintegrity.org/investigations/homeland_security/articles/entry/1925/