Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
American homeland security
Wtc bombing and boston marathon bombing
American homeland security
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: American homeland security
Intelligence is one of the first lines of defense tool used by the United States to protect the Country against both foreign and domestic threats (Johnson, 2010). It proved to be veritable tool during the World War II and during the cold war against the USSR. There are many ways and methods of intelligence collections employed by the intelligence community, such as “spies, eavesdropping, technical sources, and openly available materials” etc. (Clark, 2013). Method used also depends on many factors such as available resources, time, agency involved, and intelligence collection source. Each intelligence agencies use different collection and analytical method that suit their collection function, structure and process. For example, DNI/OSC …show more content…
relies on open source (OSINT), the CIA uses human intelligence (HUMINT) tactic, DIA uses measurements and signatures intelligence (MASINT), NSA employs signals intelligence (SIGINT), and NGA utilizes imagery intelligence (IMINT) techniques for their intelligence collections (Clark, 2013). Moreover, majority of these agencies within the intelligence community uses a combination of methods to gather intelligence information.
For instance, Homeland security intelligence unit uses a broad array of sources on a continual basis to collect, analyzes, and evaluates terrorism-related information. Also, the U.S. Coast Guard intelligence information use to combat weapon of mass effect proliferation, drug smugglers, gunrunners, and illegal immigration comes from different sources. This intelligence information comes from broad arrays of sources, both domestic and foreign. In some cases, these INTs communities compete among each other to provide needed intelligence information to policy makers to justify their budgetary allocations (Lowenthal, 2014). However, these competitions for supremacy often results in lack of sharing of valuable intelligence information. There was this allegation that someone within the intelligence community had advance information about the "Underwear Bomber” in 2009 but failed to share the information among other intelligence community and law enforcement agents. There was also, an accusation that Boston marathon day bombing would have been prevented had it been that the prior information about the brothers was disseminated among the intelligence community …show more content…
alike. Furthermore, lots of national agencies (CIA, DIA, DHS, and the State Department) and military service units are charged with producing all source analysis of intelligence information. These intelligence collections can be divided into five main categories referred to as “intelligence collection disciplines” or the “INTs”. These include Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), Measurement and Signatures Intelligence (MASINT), Open-Source Intelligence (OSINT), (The Federal Bureau of Investigation, n. d). These intelligence collection methods will be discussed below. Human Intelligence (HUMINT): Human intelligence has proved to be a useful tool for intelligence collection, which has helped to shape U.S foreign policy decisions over the years (Johnson, 2010).
It involves collection of information from human sources. The Federal Bureau of Investigation (FBI) used this method of intelligence collection to gather intelligence information within the United States, while the Central Intelligence Agency (CIA) employ this tactic to gather intelligence information on threats outside the United States and other information about world affairs (The Federal Bureau of Investigation, n. d). The National Clandestine Service (NCS) is the branch of the CIA responsible for the collection of HUMINT. They obtain their intelligence information through the clandestine acquisition of photography, documents, and other material; overt collection by officers overseas; debriefing of foreign nationals and U.S. citizens who travel abroad; and official contacts with foreign governments. The NCS task is to aid in the strengthening of the national security and foreign policy objectives through the clandestine collection of HUMINT (Central Intelligence Agency, n. d). The FBI also, uses SIGINT, MASINT, and OSINT to collect intelligence
information. Signals Intelligence (SIGINT): This method of intelligence collection deals with “the collection and exploitation of signals transmitted from communication systems, such as radars, broadcast communications systems , weapon systems and other electronic systems” through the use of communication interception devices designed to detect transmissions (Central Intelligence Agency, n. d). Signals intelligence collection falls under the responsibility of the National Security Agency (NSA). Signals intelligence comprises of numerous categories such as Communications Intelligence (COMINT), Foreign Instrumentation Signals Intelligence (FISINT), Electronic intelligence (ELINT), telemetry from missile tests (TELINT), and radar transmitters (RADINT), (Pike, 1997). These electronic transmissions can be intercepted by ships, planes, ground sites, or satellites (The Federal Bureau of Investigation, n. d). Imagery Intelligence (IMINT): Imagery intelligence includes literal photographic, digital, or radar pictures of targets (Berkowitz, 2008). This method of intelligence gathering have some advantages over other collection types in that it produces graphics and pictures that convey concrete and “self-reveal” information to policy makers, war fighters, intelligence professionals and first responders. Imagery intelligence does not require detail interpretation to policy makers (Lowenthal, 2014). For instance, U.S intelligence community were able to produce satellite images of the North Korea nuclear sites which show levels of activity on the underground test site at Punggye-ri. These types of image prove useful intelligence to policy makers on the imminence of nuclear test by the Democratic People’s Republic of Korea. The National Geospatial-Intelligence Agency has a responsibility for the collection and processing the imagery which they deliver to decision makers, war fighters, and first responders’ need, when they need it; while the National Reconnaissance Office designs, builds, and operates imagery satellites (The Federal Bureau of Investigation, n. d). Measurement and Signatures Intelligence (MASINT): MASINT deals with weapons capabilities and industrial activities Lowenthal, 2014). Electronic intelligence (ELINT) and Foreign Instrumentation Signals Intelligence (FISINT), are both major contributors to MASINT. ELINT involves “intercepts of non-communication signals sent over electromagnetic waves while FISINT deals with the signals sent by foreign entities when testing and deploying aerospace, surface, and sub-surface systems” (Knight, n. d). The Defense Intelligence Agency’s Central MASINT Office (CMO), is the principal user of MASINT data. Open-Source Intelligence (OSINT): Open-Source Intelligence involves the collection, processing, and exploitation/analysis of multiple intelligence information from open-source such as the media, professional and academic records, and public data. This method of intelligence collection has the advantage of easy accessibility of intelligence information. For instance, one can access bunch of information from browsing the World Wide Web or social media. CIA is responsible for collecting, producing, and promoting open source intelligence through its management of the DNI Open Source Center (OSC), (Central Intelligence Agency, 2010). Intelligence information runs into various circles before reaching the policy makers for final consumption. The six step cycle of developing unrefined data into polished intelligence before delivering it to the policy makers is known as intelligence cycle. Those six step cycle includes Requirements, Planning and Direction, Collection, Processing and Exploitation, Analysis and Production, Dissemination. The cycle starts with the identification of needs for information about what must be known to safeguard the nation. The next step involves planning, coordination, and management of the process. This follows by the actual intelligence collection, processing and exploitation. Information collected will then send to the analytical unit for analysis and synthesis before disseminating it to the policy makers. This entire process requires active collaboration from all intelligence disciplines as mandated by the Executive Order 12333. Executive Order 12333 guides the U.S. intelligence-collection activities in that it mandates the Director of National Intelligence, among other things, “to serve as the head of the Intelligence Community; lead a unified, coordinated, and effective intelligence effort by taking into account the views of the heads of departments containing an element of the Intelligence Community and of the Director of the Central Intelligence Agency”. The Intelligence Community under the leadership of the Director of National Intelligence “shall also, ensure, through appropriate policies and procedures, the deconfliction, coordination, and integration of all intelligence activities conducted by an Intelligence Community element or funded by the National Intelligence Program” (Executive Order 12333, 1981). To summarize, the Intelligence Reform and Terrorism Prevention Act of 2004 and Executive Order 12333 (as amended) restructured the U.S intelligence community to enhance better communication and information sharing among them. Each of these 16 notable Members of the U.S. Intelligence Community work in concerted effort under unified command in other to collect intelligence information needed to secure the United States against domestic and foreign aggressions. The intelligence community uses five main methods to collect and analyze intelligence information. These methods include Human Intelligence, Signals Intelligence, Imagery Intelligence, Measurement and Signatures Intelligence, Open-Source Intelligence. The information collected goes into six cycles such as requirements, planning and direction, collection, processing and exploitation, analysis and production, dissemination, before the final consumption by the policy makers.
The pros of electronic surveillance are extensive. The ability for agents of the United States Intelligence Community (IC) to intercept and process communications and information from foreign powers, agents of foreign powers, international terrorist organizations, and others who seek to engage in activities with such groups, provides the ...
One of the main failures of law enforcement and intelligence agencies identified by both the authors of “The Cell” and Senator Richard Shelby was that the F.B.I. and C.I.A. acted in competition with one another to produce results, as opposed to in centralized collaboration. Gladwell points out that the intelligence community was structured in this manner in response to the failures of the Bay of Pigs operation, which had been based on highly centralized intelligence gathering. In turn, the structure of intelligence agencies at the time of the Bay of Pigs was in response to the failure of decentralized intelligence to identify the threat of an attack on Pearl Harbor. The iterative cycle of intelligence failures and subsequent reform efforts ignores the premise that the failures do not represent evidence of the limitations of intelligence agencies, but rather the limitations of intelligence itself. As Gladwell states, “in our zeal to correct what we believe to be the problems of the past, we end up creating new problems for the
The Department of Homeland Security faces challenges of failure to coordinate and cooperate in the latest fight against computer crimes as well as more general intelligence-gathering operations. (...
National Security Agency/Central Security Service The National Security Agency/Central Security Service (NSA/CSS) was established in November 1952 to provide a cryptologic organization for the civilian and military leaders of the United States and to provide them with timely information. The National Security Agency (NSA) coordinates, directs, and performs highly specialized activities to produce foreign intelligence information and protect United States information systems through two main missions, Signals Intelligence (SIGINT) and Information Assurance (IA). The Signals Intelligence (SIGINT) mission uses cryptologic machines to break foreign codes to find out what they know and what they are doing. The biggest accomplishment publicly known was when they broke the Japanese military code in World War II and learned that Japan had plans of invading Midway Island.
...e community have had conflicting views and opposing agendas. Lack of cooperation and communication between intelligence agencies; such as the FBI and the CIA refusing to share information prior to the terrorist attacks of 2001, resulted in limited information and failure on the part of the intelligence community and policy decisions regarding US safeguards against terrorist.
Nedzi (D-Mich.), Luclen N. “Oversight or Overlook: Congress and the US Intelligence Agency.” A Congressman talk to the CIA senior seminar, November 14, 1979, https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol18no2/pdf/v18i2a02p.pdf (accessed January 7, 2014).
In the 21st century, the world as we know it suffers from psychotic, demented, treacherous and, sophisticated crimes. This world would be corrupt without a tunnel of light if it was not for the Federal Bureau of Investigation. The Federal Bureau of Investigation, also known as the FBI, is a corporation that seeks fidelity, bravery and, integrity for the United States of America. The FBI researches shocking and concerning crimes the news reports about politics, war and, safety that we hear on the television about issues that are being reported to the people. These cases of transgression are missions the FBI analyzes, such as hacking information from double spies, locating terrorists, seeking pedophiles, cracking down unknown mobsters, gang leaders and serial killers, white-collar crime, public corruption, cyber-crime, counter intelligence and civil rights.
This essay examines two forms of intelligence collection, namely signals intelligence (SIGINT) and open source intelligence (OSINT), with a view to determining whether the collection methods can be ranked in terms of importance. To this end, this essay will describe SIGINT and OSINT, with a focus on outlining the relative advantages and disadvantages of each method. It will be shown that any attempt to 'rank' collection methods in terms of their importance is only productive insofar as it is necessary to effectively direct the most suitable collection method against an intelligence target. Moreover, it will be argued that OSINT has a uniquely significant, although not more important role, in serving as a foundation upon which all other collection methods can be based.
Through the progression of the years, the intelligence operation within the United States government has changed tremendously over the last decades for both domestic and foreign intelligence. The intelligence community has grown and has evolved into executing different roles within the government; this includes law enforcement and government agencies. Both law enforcement and intelligence organizations have recognized the necessity to collaborate and exchange data in eliminating high security risks. The September 11 attacks also led to the expansion of more agencies and organizations to combat
The Central Intelligence Agency The CIA is one of the U.S. foreign intelligence agencies, responsible for getting and analyzing information about foreign governments, corporations, individuals, and reporting such information to the various branches of the U.S. government. The State Department's Bureau of Intelligence and Research and the Defense Department's Defense Intelligence Agency comprise the other two. Its headquarters is in Langley, Virginia, across the Potomac River from D.C. The Agency, created in 1947 by President Harry S. Trueman, is a descendant of the Office of Strategic Services (OSS) of World War 2. The OSS was dissolved in October 1945 but William J. Jonavan, the creator of the OSS, had submitted a proposal to President Roosevelt in 1944.
Intelligence collection and apprehension of criminals have occurred for many years; however, with the exception of the Federal Bureau of Investigation, these actions were performed by different organizations. Nonetheless, roles and responsibilities have changed since the attacks on September 11, 2001. Intelligence-led policing and the National Criminal Intelligence Sharing program were incorporated, and fusion centers were established to help gather intelligence from different levels of the government. Although law enforcement at the local, state, and tribal levels aid in intelligence collection, it is important to ensure that intelligence gathered to protect national security and law enforcement intelligence are kept separately. Even though law enforcement operations can strengthen intelligence operations and vice versa, complications can arise when the two actions are combined. Government agencies must also ensure that sensitive and secret information does not leak or is not compromised when sharing intelligence. Therefore the purpose is to describe intelligence and law enforcement operations, discuss the expectations of prevention and punishment, and discuss the benefits and consequences of combining law enforcement and intelligence operations.
United Sttes. Central Intelligence. Operations. By Richard Helms. United States Government. 14 Apr. 2013 .
Signals Intelligence (SIGINT) has access to many traditional and non-traditional dynamic elements that provide superior capabilities to collect and monitor visual, seismic, and acoustic signatures of motorized vehicles. SIGINT is the only system that can be operational and maintainable in any type of climate and terrain, which provides an advantage over the United States’ (U.S.) adversaries. The process of obtaining the intelligence starts with the collection of any type of signal, whether it be infrared, electro-optical, or electronic. After the signals are collected, analysts encounter the tasks of cryptanalysis, transcription, traffic analysis, and translations of the enemy information systems; analyst then determine size, location, distance, and terrain features. The data is usually processed in overlays and graphic displays within the United States. End products are then populated into National databases for the use of the Intelligence Community. The increasing utilization of computers, the internet, satellites, sophisticated encryption, and cellular telephones have streamlined effective and accurate Human Intelligence (HUMINT); implementation of Signals Intelligence has became an important role to maintain superiority over adversaries.
The Central Intelligence Agency’s main responsibility is stated in its Vision statement: “We will provide knowledge and take action to ensure the national security of the United States and the preservation of American life and ideals” (www.cia.gov). The CIA’s job is to provide pertinent, timely, and un-biased foreign intelligence. They also act as an unseen force by conducting undercover action as ordered by the President in order to preempt threats or achieve objectives of the United States. The CIA is the only intelligence organization that is not subject to cabinet prerogative, making it reliable in it is unbiased in its reports, because it has no political agenda. There are six main types of intelligence by which the CIA collects information. Human intelligence (HUMINT) is information gathered by field operatives through overt and covert techniques (www.cia.gov). Communications intelligence (COMINT) is acquired from intercepted foreign communications (www.cia.go...
Counterintelligence (CI) is defined as, “information gathered and activities conducted to identify, deceive, exploit, disrupt, or protected against espionage, other intelligence activities, sabotage, or assassination conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities. ” The citizenry of the United States on the U.S. Government is the focus of the examination of counter intelligence of citizenry on its national government. Data collected and research performed by James Riedel seeks to establish the citizens as a network of spies on the U.S. Government. The spying of citizens on the government is referred to as “espionage” . Counter Intelligence as acts of espionage committed by U.S. citizens is described by Riedel as short in duration and “poorly paid” .