text
stringlengths
16
120
<Hostage Negotiation, prevents, Target Hardening>
<Insider Threat Programs, international_cooperates, Intelligence Gathering>
<Insider Threat Programs, partOf, Behavioral Threat Assessment>
<Intelligence Gathering, connectedTo, Legislation and Policy Development>
<Intelligence Gathering, partOf, Behavioral Threat Assessment>
<International Cooperation, connectedTo, Data Analytics for Terrorism>
<International Cooperation, connectedTo, Radicalization Prevention>
<International Cooperation, connectedTo, Target Hardening>
<International Cooperation, resilience_builds, Surveillance and Monitoring>
<Legislation and Policy Development, connectedTo, Target Hardening>
<Legislation and Policy Development, partOf, Behavioral Threat Assessment>
<Public Awareness Campaigns, connectedTo, Hostage Negotiation>
<Surveillance and Monitoring, connectedTo, Data Analytics for Terrorism>
<Target Hardening, connectedTo, Bomb Disposal>
<Target Hardening, connectedTo, Surveillance and Monitoring>
<Terrorism Financing Interdiction, laws_enforces, Drone Countermeasures>
<Transportation Security, weapons_interdicts, Public Awareness Campaigns>
<Airport Security, connectedTo, Military Counterterrorism>
<Bomb Disposal, connectedTo, Intelligence Gathering>
<Bomb Disposal, partOf, Surveillance and Monitoring>
<Counter_Propaganda, connectedTo, Airport Security>
<Counter_Propaganda, partOf, Surveillance and Monitoring>
<Crisis Response Planning, connectedTo, Information Sharing>
<Crisis Response Planning, connectedTo, Post_Incident Recovery>
<Crisis Response Planning, connectedTo, Transportation Security>
<Crisis Response Planning, cyber_defends, Intelligence Analysis>
<Crisis Response Planning, targets_protects, Airport Security>
<Crisis Response Planning, vulnerabilities_reduces, Transportation Security>
<Information Sharing, evidence_collects, Transportation Security>
<Insider Threat Programs, connectedTo, Post_Incident Recovery>
<Intelligence Analysis, connectedTo, Airport Security>
<Intelligence Analysis, connectedTo, Bomb Disposal>
<Intelligence Analysis, connectedTo, Information Sharing>
<Intelligence Analysis, connectedTo, Transportation Security>
<Intelligence Gathering, detects, Counter_Propaganda>
<Intelligence Gathering, partOf, Surveillance and Monitoring>
<Military Counterterrorism, connectedTo, Target Hardening>
<Target Hardening, crisis_manages, Insider Threat Programs>
<Transportation Security, connectedTo, Airport Security>
<Airport Security, connectedTo, Bomb Disposal>
<Airport Security, partOf, Drone Countermeasures>
<Behavioral Threat Assessment, connectedTo, International Cooperation>
<Bomb Disposal, connectedTo, Early Warning Systems>
<Bomb Disposal, connectedTo, Terrorism Financing Interdiction>
<Bomb Disposal, de_radicalizes, Fusion Center Operations>
<Border Security, connectedTo, Training Exercises>
<Border Security, partOf, Drone Countermeasures>
<Counter_Propaganda, connectedTo, Biometric Screening>
<Early Warning Systems, connectedTo, Fusion Center Operations>
<Fusion Center Operations, technologies_applies, Hostage Negotiation>
<Homeland Security Planning, connectedTo, Early Warning Systems>
<Hostage Negotiation, impacts_assesses, Counter_Propaganda>
<Insider Threat Programs, connectedTo, Intelligence Gathering>
<Intelligence Gathering, connectedTo, Behavioral Threat Assessment>
<International Cooperation, connectedTo, Biometric Screening>
<International Cooperation, connectedTo, Hostage Negotiation>
<International Cooperation, connectedTo, Law Enforcement Operations>
<International Cooperation, connectedTo, Terrorism Financing Interdiction>
<Law Enforcement Operations, connectedTo, Bomb Disposal>
<Law Enforcement Operations, connectedTo, Terrorism Financing Interdiction>
<Law Enforcement Operations, policies_develops, Radicalization Prevention>
<Radicalization Prevention, cyber_defends, Border Security>
<Radicalization Prevention, partOf, Drone Countermeasures>
<Terrorism Financing Interdiction, connectedTo, Homeland Security Planning>
<Training Exercises, partOf, Drone Countermeasures>
<Training Exercises, targets_protects, Airport Security>
<Airport Security, weapons_interdicts, Surveillance and Monitoring>
<Biometric Screening, connectedTo, Data Analytics for Terrorism>
<Biometric Screening, shares_info, Psychological Operations>
<Crisis Response Planning, connectedTo, Airport Security>
<Crisis Response Planning, incidents_responds, Training Exercises>
<Data Analytics for Terrorism, laws_enforces, Insider Threat Programs>
<Data Analytics for Terrorism, partOf, Risk Analysis>
<Drone Countermeasures, connectedTo, Crisis Response Planning>
<Drone Countermeasures, drills, Training Exercises>
<Forensic Investigation of Attacks, technologies_applies, Behavioral Threat Assessment>
<Insider Threat Programs, connectedTo, Public Awareness Campaigns>
<Insider Threat Programs, partOf, Risk Analysis>
<Psychological Operations, connectedTo, Forensic Investigation of Attacks>
<Public Awareness Campaigns, connectedTo, Training Exercises>
<Public Awareness Campaigns, partOf, Risk Analysis>
<Surveillance and Monitoring, connectedTo, Training Exercises>
<Training Exercises, connectedTo, Behavioral Threat Assessment>
<Training Exercises, connectedTo, Biometric Screening>
<Training Exercises, connectedTo, Psychological Operations>
<Biometric Screening, connectedTo, Drone Countermeasures>
<Biometric Screening, partOf, Insider Threat Programs>
<Drone Countermeasures, disrupts, Forensic Investigation of Attacks>
<Drone Countermeasures, partOf, Insider Threat Programs>
<Forensic Investigation of Attacks, connectedTo, Port Security>
<Intelligence Gathering, connectedTo, Forensic Investigation of Attacks>
<Intelligence Gathering, connectedTo, Port Security>
<Intelligence Gathering, connectedTo, Vulnerability Assessment>
<Intelligence Gathering, shares_info, Legislation and Policy Development>
<Legislation and Policy Development, connectedTo, Port Security>
<Legislation and Policy Development, connectedTo, Vulnerability Assessment>
<Legislation and Policy Development, laws_enforces, Forensic Investigation of Attacks>
<Military Counterterrorism, vulnerabilities_reduces, Forensic Investigation of Attacks>
<Risk Analysis, connectedTo, Biometric Screening>
<Risk Analysis, partOf, Insider Threat Programs>