|
/trD*ut*",
<br />t frIATWGEfr]EIITY/Krrrtras coItNTY
<br />KITTITAS COUNTY CEMP
<br />E. Common Prevention and Protection
<br />F. Prevention Mission
<br />Prevention includes those capabilities necessary to avoid, prevent, or stop a threatened or actual
<br />act of terrorism. Unlike other mission areas, which are all-hazards by design, Prevention core
<br />capabilities are focused specifically on imminent terrorist threats, including on-going attacks or
<br />stopping imminent follow-on attacks.
<br />G. Protection Mission
<br />Protection includes the capabilities to safeguard the homeland against acts of terrorism and man-
<br />made or natural disasters. lt focuses on actions to protect our people, our vital interests, and our
<br />way of life
<br />COMMON CORE CAPABILITIES
<br />Operational Coordination
<br />Establish and maintain a unified and coordinated operational structure and process that appropriately
<br />inteqrates all critical stakeholders and supports the execution of Core Capabilities
<br />lntel nce and lnformation
<br />Provide timely, accurate, and actionable information resulting from the planning, direction, collection,
<br />exploitation, processing, analysis, production, dissemination, evaluation, and feedback of available
<br />information concerning physical and cyber threats to the United States, its people, property, or
<br />interests; the development, proliferation, or use of WMDs; or any other matter bearing on U.S.
<br />national or homeland security by local, state, tribal, territorial, Federal, and other stakeholders.
<br />lnformation sharing is the ability to exchange intelligence, information, data, or knowledge among
<br />oovernment or private sector entities, as appropriate
<br />lnterdiction and Disruption
<br />Delay, divert, intercept, halt, apprehend,or secure threats and/or hazards.
<br />Screening, Search, and Detection
<br />ldentify, discover, or locate threats and/or hazards through active and passive
<br />search procedures. This may include the use of systematic examinations and
<br />surveillance, sensor technologies, or physical investigation and intelligence
<br />surveillance and
<br />assessments, bio-
<br />.l .,1i,l
<br />Forensics and Attribution
<br />Conduct forensic analysis and attribute terrorist acts (including the means
<br />to their source, to include forensic analysis as well as attribution for an attack and for the preparation
<br />foranattack,inanefforttopreventinitialorfollow-onactsand/orSWi
<br />and methods of terrorism)
<br />Access Control and ldentity Verification
<br />Apply and support necessary physical, technological, and cyber measures to control admittance to
<br />critical locations and svstems
<br />Cybersecurity
<br />November 2024 | BASIC PLAN Page 23 of 63
|