There has been a widely talked about need and effort to improve intelligence analysis practice based on scholarship and research. It is the job of intelligence analysts to provide policymakers in government and other fields with relevant and timely information, but not to go as far as shaping or influencing policy in any particular direction or based on any political agenda. With regards to the Intelligence Community (IC) in the United States, major reforms have taken place since the passing of the Intelligence Reform and Terrorism Prevention Act of 2005, signed by President George W. Bush. Improving and creating more structured analytical approaches to intelligence gathering, information processing, and intelligence sharing has been one feature of this new initiative. Another is increasing funding and resources for the Intelligence Community. Some of us recall that during the run up to the Iraq War there was much confusion, an atmosphere of concern for justifications of the invasion of Iraq in the context of a global war on terror. Many policymakers and intelligence analyst spoke publicly, in forums as high as the United Nations, about weapons of mass destruction hidden in Iraq, chemical and biological weapons, and Iraqi connections to Osama Bin Laden. Later people found …show more content…
This further complicates the idea of cybercrime in the computer age. Many FBI, CIA, and Homeland Security personnel began training for a new kind of search for criminals, the ones with messages, training and recruitment videos posted online. This is the new post 9/11 world that we live in. A new generation of intelligence analysts are being trained and readied for this new kind of task of gathering and analyzing intelligence on the ground, in cyberspace from those who are affiliated with al Qaeda and / or terrorism, and from sources inside terrorist
September 11, 2001 marked a tragic day in the history of the United States; a terrorist attack had left the country shaken. It did not take long to determine those who were behind the attack and a call for retribution swept through the nation. Citizens in a wave of patriotism signed up for military service and the United States found resounding international support for their efforts in the war on terror. Little opposition was raised at the removal of the Taliban regime and there was much support for bringing Osama Bin Laden and the leaders of al-Qaeda to justice. Approval abroad diminished approximately a year and a half later when Afghanistan became a stepping stone to the administration’s larger ambition, the invasion of Iraq. The administration would invent several stories and in some cases remain silent of the truth where would prove positive for the Iraqi invasion. It seems they were willing to say anything to promote the largely unpopular and unnecessary war they were resolved on engaging in.
The pros of electronic surveillance are extensive. The ability for agents of the United States Intelligence Community (IC) to intercept and process communications and information from foreign powers, agents of foreign powers, international terrorist organizations, and others who seek to engage in activities with such groups, provides the ...
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
The Iraq war, also known as the second Gulf War, is a five-year, ongoing military campaign which started on March 20, 2003 with the invasion of Iraq by U.S. troops. One of the most controversial events in the history of the western world, the war has caused an unimaginable number of deaths, and spending of ridiculous amounts of money. The reason for invasion war Iraq’s alleged possession of weapons of mass destruction, which eventually was disproved by weapons inspectors. Many people question George W. Bush’s decision to engage a war in Iraq, but there might be greater reason why the decision was made. The ideas of George W. Bush might have been sculpted by one of the greatest works of all time, "The Prince."
The DIA started in 1958. The organizational structure of the DoD and U.S. foreign intelligence came to a new shape with the establishment of DIA. It was Robert McNamara, then Secretary of Defense, who came up with the concept of DIA in 1961. DIA gathers human source intelligence, analyzes technical intelligence, distributes intelligence/reports to the intelligence agencies, provides advice and support to the Joint Chiefs of Staff with foreign military intelligence, and provides military intelligence to combatant commands as its operational functions. A DIA director is supposed to be a three-star military general and DIA is believed to have employed at least 7,500 staff worldwide today. The DIA is a defense intelligence agency that prevents strategic surprises and delivers a decision advantage to warfighters, defense planners, and to policymakers. This paper will try to evaluate DIA’s role in US national security in present condition of massive budget deficits and increased congressional oversight, plus the intelligence capabilities of the Regional Combatant Commanders and the individual services like CIA and NSA.
Through the progression of the years, the intelligence operation within the United States government has changed tremendously over the last decades for both domestic and foreign intelligence. The intelligence community has grown and has evolved into executing different roles within the government; this includes law enforcement and government agencies. Both law enforcement and intelligence organizations have recognized the necessity to collaborate and exchange data in eliminating high security risks. The September 11 attacks also led to the expansion of more agencies and organizations to combat
... Sept. 11th, 2001, terrorist attack on theWorld Trade Center and the unreliability of U.S. intelligence onWeapons of mass Destruction in Iraq have been a focus of intense scrutiny in the U.S. in 2004 particularly in the context of the 9/11 Commision , the continuing armed resistance against U.S. occupation of Iraq, and the widely perceived need for systematic review of the respective roles of the CIA, FBI and the Defense Intelligence Agency. On July 9th, 2004 the Senate report of Pre-war Intelligenceon Iraq of the Senate Intelligence Committe stated that the CIA described the danger presented by Weapons of Mass Destruction in Iraq in an unreasonable way, largely unsupported by the available intelligence. In a briefing held Sept 15th, 2001 George Tenet presented the Worldwide Attack Matrix, a "top-secret" document describing covert CIA anti-terror operations in 80 countries in Asia, the Middle East, and Africa. The actions, underway or being recommended, would range from "routine propaganda to lethal covert action in preparation for military attacks". The plans, if carried out, "would give the CIA the broadest and most lethal authority in its history".
Homeland security was developed by the United States government to protect the country from external aggression, reduce the likelihood of terrorist attacks and manage the damage that occurs in case of attacks. To this end, the government set up and reconstituted numerous agencies to aid in the fight against terrorism in the United States. The United States Department of Justice and Department of Homeland Security constitute the most prominent departments under the United States law to champion the fight against any attacks by extremist groups. Federal, State and local law enforcement agencies, as well as the United States’ military also have a role to play in homeland security. With the increasing cases of attacks and acts of aggression towards the United States, the government sought to strengthen the resolve to curb any attacks aimed at killing or maiming the citizens or destruction of government institutions and installations. In the wake of the September 11 attacks, it was apparent that stringent measures were needed to prevent attacks on American soil and protect the citizens of the country. This paper examines the duties; responsibility and intelligence methods used by the military, federal, State and local law enforcement agencies, as well as homeland security agencies in the fight against terrorism, with the aim of drawing similarities and differences.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
The future of America is definitely affected by terrorism and terrorism has benefited from the new technologies that aid and speed up communication around the world. Terrorists can use tactics that they know and manipulate advanced technologies such as the internet. These technological advantages have certainly improved the capabilities of terrorist groups to plan and accomplish their operations. It also offers these terrorists the ability to affect communities faster and much more intensely than earlier terrorists. In order to reduce America's vulnerability to terrorism, in regards to their threats, strategies and tactics, when dealing with the internet, a complete understanding of the nature of America’s enemies is necessary.
Intelligence collection and apprehension of criminals have occurred for many years; however, with the exception of the Federal Bureau of Investigation, these actions were performed by different organizations. Nonetheless, roles and responsibilities have changed since the attacks on September 11, 2001. Intelligence-led policing and the National Criminal Intelligence Sharing program were incorporated, and fusion centers were established to help gather intelligence from different levels of the government. Although law enforcement at the local, state, and tribal levels aid in intelligence collection, it is important to ensure that intelligence gathered to protect national security and law enforcement intelligence are kept separately. Even though law enforcement operations can strengthen intelligence operations and vice versa, complications can arise when the two actions are combined. Government agencies must also ensure that sensitive and secret information does not leak or is not compromised when sharing intelligence. Therefore the purpose is to describe intelligence and law enforcement operations, discuss the expectations of prevention and punishment, and discuss the benefits and consequences of combining law enforcement and intelligence operations.
The System-level of analysis shows that the Iraq Crisis (2003–present) is not a domestic conflict as it involved international actors like UN, IAEA and countries like USA. In 1991, after the second Gulf War, UN enforced the destruction of weapons of mass destruction (WMDs) on Iraq. The UN condemnation of Iraq was crucial to preserve its authenticity. The UNMOVIC and IAEA had been responsible to check Iraq's acquiescence with its responsibility to eradicate WMDs (UN Chronicle, 1991). Iraq’s non-cooperation with inspection agencies by obstructing the inspection from 1997 to 2002 resulted in massive international pressure and strengthening USA’s doubts on Iraq. The apprehe...
Counterintelligence (CI) is defined as, “information gathered and activities conducted to identify, deceive, exploit, disrupt, or protected against espionage, other intelligence activities, sabotage, or assassination conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities. ” The citizenry of the United States on the U.S. Government is the focus of the examination of counter intelligence of citizenry on its national government. Data collected and research performed by James Riedel seeks to establish the citizens as a network of spies on the U.S. Government. The spying of citizens on the government is referred to as “espionage” . Counter Intelligence as acts of espionage committed by U.S. citizens is described by Riedel as short in duration and “poorly paid” .
As a patriot of this great nation, what has been presented is of extreme if not grave concern. The challenges of cyberculture to our nation’s security have been revealed . To what extent our security has been breached is a matter of speculation but be informed that these breaches must be met with complete counter active success - failure to do so is not an option.
Globalization enables cyber criminals to come together and collaborate on cybercrimes and share ideas on how to commit crimes, which makes it harder for police to prevent the criminals’ crimes. These criminals target many people to gain personal information or take advantage of the victims in another way. However, there are international and national agencies committed to combating cybercrime and making progress in accomplishing this goal. Lieutenant Amanda Simmons of the South Carolina Computer Crime Center believes “there is a possibility that nearly every crime will eventually involve some high-tech piece of evidence” due to the younger, technologically-savvy generation (Wolf, par.18). This shows the extreme increase in cybercrime as a security threat.