Laserfiche WebLink
/trD*ut*", <br />t frIATWGEfr]EIITY/Krrrtras coItNTY <br />KITTITAS COUNTY CEMP <br />E. Common Prevention and Protection <br />F. Prevention Mission <br />Prevention includes those capabilities necessary to avoid, prevent, or stop a threatened or actual <br />act of terrorism. Unlike other mission areas, which are all-hazards by design, Prevention core <br />capabilities are focused specifically on imminent terrorist threats, including on-going attacks or <br />stopping imminent follow-on attacks. <br />G. Protection Mission <br />Protection includes the capabilities to safeguard the homeland against acts of terrorism and man- <br />made or natural disasters. lt focuses on actions to protect our people, our vital interests, and our <br />way of life <br />COMMON CORE CAPABILITIES <br />Operational Coordination <br />Establish and maintain a unified and coordinated operational structure and process that appropriately <br />inteqrates all critical stakeholders and supports the execution of Core Capabilities <br />lntel nce and lnformation <br />Provide timely, accurate, and actionable information resulting from the planning, direction, collection, <br />exploitation, processing, analysis, production, dissemination, evaluation, and feedback of available <br />information concerning physical and cyber threats to the United States, its people, property, or <br />interests; the development, proliferation, or use of WMDs; or any other matter bearing on U.S. <br />national or homeland security by local, state, tribal, territorial, Federal, and other stakeholders. <br />lnformation sharing is the ability to exchange intelligence, information, data, or knowledge among <br />oovernment or private sector entities, as appropriate <br />lnterdiction and Disruption <br />Delay, divert, intercept, halt, apprehend,or secure threats and/or hazards. <br />Screening, Search, and Detection <br />ldentify, discover, or locate threats and/or hazards through active and passive <br />search procedures. This may include the use of systematic examinations and <br />surveillance, sensor technologies, or physical investigation and intelligence <br />surveillance and <br />assessments, bio- <br />.l .,1i,l <br />Forensics and Attribution <br />Conduct forensic analysis and attribute terrorist acts (including the means <br />to their source, to include forensic analysis as well as attribution for an attack and for the preparation <br />foranattack,inanefforttopreventinitialorfollow-onactsand/orSWi <br />and methods of terrorism) <br />Access Control and ldentity Verification <br />Apply and support necessary physical, technological, and cyber measures to control admittance to <br />critical locations and svstems <br />Cybersecurity <br />November 2024 | BASIC PLAN Page 23 of 63