National Security Agency/Central Security Service
The National Security Agency/Central Security Service (NSA/CSS) was established in November 1952 to provide a cryptologic organization for the civilian and military leaders of the United States and to provide them with timely information. The National Security Agency (NSA) coordinates, directs, and performs highly specialized activities to produce foreign intelligence information and protect United States information systems through two main missions, Signals Intelligence (SIGINT) and Information Assurance (IA). The Signals Intelligence (SIGINT) mission uses cryptologic machines to break foreign codes to find out what they know and what they are doing. The biggest accomplishment publicly known was when they broke the Japanese military code in World War II and learned that Japan had plans of invading Midway Island. This allowed us to attack and destroy Japan’s superior fleet. With this intelligence, it was said to have shortened the Pacific war by over one year.
The Information Assurance (IA) mission becomes more important every day as technology becomes more advanced. The Information Assurance (IA) mission is to make all government equipment that is used to send classified and sensitive information impenetrable so that no one can hack into them and steal viable information belonging to the United States. These two missions together promote a single goal: information superiority for America and its Allies.
To accomplish these ...
The organization I have chosen for this essay is CSIS ( Canadian Security Intelligence Service ). CSIS closely resembles The Federal Bureau of Investigation ( FBI ) or British Security Intelligence Service. I have chosen this organization because I have great interest in becoming an employee of CSIS in the future. This essay will provide brief history of CSIS, the responsibilities of CSIS for Canada, and the application process for an entry – level position. These will be further discussed in greater detail as the essay goes on.
The mission and values of the Federal Bureau of Investigation (FBI) is up held with strong Constitutional values. Over the years since the FBI was created in 1908 by Attorney General Charles Bonaparte during the Presidency of Theodore Roosevelt. As a progressive during this time period Bonaparte applied his philosophy to forming the FBI with several corps of agents. His thought was that these men should have expertise and not political connections. With the U.S. Constitution based on “federalism” a national government with jurisdiction over matters that cross boundaries, such as interstate and foreign affairs.
After the fear of terrorism grew in the United States do to the Al Qaeda 9/11 attacks on the World Trade Center and Pentagon, the US Government found a need for a centralized department that umbrellas all other agencies when it comes to homeland security. The U.S. Government found this umbrella agency with the passage of the Homeland Security Act by Congress in November 2002, the Department of Homeland Security formally came into being as a stand-alone, Cabinet-level department to further coordinate and unify national homeland security efforts. (Homeland Security) With the creation of the new Department of Homeland Security (DHS) the government had a pinpoint location for the collection and gathering of intelligence, control of policies that effect national security, and a no fail mission. The Department of Homeland Security started to engulf other agencies and created many more, a total of 22 agencies now fall under the DHS. The DHS is control of all areas that deal with national security which included but are not limited to coastal and boarder protection, domestic terrorism, international terrorism, protection of the American people, protection of key infrastructure, protection of key resources and respond to natural disasters.
The NSA helps to supply the military with weapons and supplies. The NSA also helps protect citizens by providing high tech security. Some of which are approving standards, techniques, systems, and equipment related to the security of National Security Systems (NSA.gov). In addition, the NSA also provides “end-to-end insights into malicious cyber activity, the activities of hostile foreign powers, and cyber best practices” (NSA.gov). Another thing the NSA does is partner with other departments, countries, and companies to help reach goals and provide a good outcome in any circumstance (NSA.gov). Terrorism and cyber threats are big problems towards the United States as well. When the NSA hears or reports any terrorism threats they communicate with national leaders, military, law enforcement and policymakers to discuss solutions. There always is a group of National Security Act workers monitoring surveillance twenty- four seven(NSA.gov).This always ensures extra protection and is always
Border Patrol The U.S. Border Patrol to me is very important to the United States of America and to me as well. Without the Border Patrol, America would be a goat standing in the middle of a wolf cage. The Border Patrol and their agents border the boundaries of America so we can be safe in our homes. People don’t realize how important any kind of law enforcement is, until the day that they need assistance comes. I don’t take our men and women who protect us Americans.
Chuck Goodwin explains, “TSA, which stands for Transportation Security Administration, is an agency in the Department of Homeland Security and is responsible for screening all travelers and their luggage, as well as the screening of all air and rail transportation in the US.” Many travelers know of the them for their increased presence in all airports in the U.S and other major American airports worldwide. After the terrorist attack that took place in September 2001, President Bush and his advisors implemented The Patriot Act. Tracey DiLascio explains, “The Patriot Act is complex, but its major provisions act to improve coordination and communication between government intelligence agencies, removing unwieldy and unnecessary legal barriers between different federal offices and allowing vital investigations to proceed with greater ease and efficiency.” Their idea was to ensure that all intelligence agencies would communicate in a way that would keep America safe. “Steps to prevent events of the scale of those that took place at the World Trade Center and the Pentagon on September 11, 2001, began to fall into place almost immediately...The first outline of a proposal for what would eventually become the USA Patriot Act was drafted just days after the attacks.” (DiLascio) Due to past terrorist attacks, the TSA has implemented security measures in the airports they occupy. “Following September 11, 2001, the Transportation Security Administration (TSA) was created to strengthen the security of the nation’s transportation systems and ensure the freedom of movement for people and commerce.” (TSA website) These measures include full body scanners and pat downs.
Immigration and Customs Enforcement often referred to as I.C.E is an elite agency under the branch of Homeland Security formed in 2003 in response to the attacks on 9/11. ICE has two major components, Homeland Security Investigations and Enforcement and Removal Operations. It is also the second largest law enforcement organization in the United States, second only to the FBI. ICE was created when merger of the investigative and interior enforcement elements of the U.S. Customs Service and the Immigration and Naturalization Service. ICE has over twenty thousand employees in offices all over the U.S. and in forty seven foreign countries, about seven thousands of these employees are special agents. ICE has only one field office in New Jersey, located in Newark but it has nearby offices in Philadelphia and New York City. ICE has six detention facilities in New Jersey. A few of them are: Bergen County Jail, Monmouth County Correctional Institution, and Essex County Correctional Facility. Currently ICE doesn’t have a director, but the assistant director is Daniel Ragsdale and Chie...
The CIA is one of the U.S. foreign inteligency agencies, responsible for getting and analyzing information about foreign government, corporations, individuals, and reporting such information to the various branches of the U.S. government. The State Department's Bureau or inteligence and reserch and theDefense Department'sdefense inteligence agency comprise the other two. Its headquarters is inLangley, Virginia, across the Potomac River from D.C. The Agency, created in 1947 by President Harry S. Trueman, is a descendant of the Office of stratigic Services(OSS) of World War 2. The OSS was dissolved in October 1945 but William J. Jonavan, the creator of the OSS, had submitted a proposal to President Roosevelt in 1944. He called for a new organization having direct Presidential supervision, "which will procure intelligence both by overt and covert methods and will at the same time provide intelligence guidance, determine national intelligence objectives, and correlate the intelligence material collected by all government agencies." Despite strong opposition from the military, the State Department, and the FBI, Truman established the Central Intelligence Group in January 1946. Later under the National Security Act of 1947, the National Security council and the Central Intelligence Agency were established.
CIA triad guide provides an information security model that has three important components to identify gaps and issues as well as corresponding remedies to fill the gaps. The three components that are assessed and evaluated in the information are confidentiality, integrity and availability.
Over the course of the history of the United States of America, the country has had struggles with its own borders and the protection of those borders. Illegal immigration is a big problem and the smuggling of drugs, weapons, and cash over our borders into our country has evolved into a bigger problem. The United States has over seven-thousand miles of border to cover each day. That is quite a bit of land, but the only problem with this is there is a lack of manpower to cover every single mile of border. The US shares its borders with Canada and Mexico. All along these borders are small communities and cities that are occupied by US citizens. This means that these cities and communities require the protection of our Homeland Security Agency.
Homeland security entities are proactive in the fight against terrorism on American soil. Their mandate is to collect information relating to potential attacks and analyze it to find a solution to the danger. With this in mind, these entities employ numerous spying techniques to collect intelligence for safeguarding of the nation. Homeland security entities have spies in almost all the countries in the world, especially those that show aggression towards America. The main aim of these spies is to carry out espionage to determine threat levels and find ways of neutralizing threats (Randol, 2009). This involves deployment of secret agents to areas or countries that exhibit terrorism activity in a bid to collect information. The spies interact with local people and members of terrorist groups using aliases that enable them conceal their identities.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Al-Qaeda Introduction Al Qaeda is a terrorist organization established in Peshawar, Pakistan, between 1988 and 1989 by Osama bin Laden and his teacher Abullah Yusuf Azzam. Al-Qaeda is an international terrorist network that is considered the top terrorist threat to the United States. Al Qaeda is seeking to get rid of all westerns from Muslim territory and replace their own Islamic regime. They are a group of people who work together to plan acts of terrorism against Muslims and non-Muslims especially in the United States. Al Qaeda believes that they are fighting a holy war against the enemy of their religion.
Although, the Office of the Director of National Intelligence is the lead intelligence integration agency for forging the intelligence community as well as ensuring that information is delivered with the highest possible (dni.gov. n.d.). It is not the only agency that shares intelligence within the intelligence community. However, it is the only agency that ensures that all of the information is correct as well as placed along to the President, Congress, the heads of other departments and agencies of the executive branch, the Chairman of the Joint Chiefs of Staff as well as senior military commanders (dni.gov. n.d.). Although, the National Security Act of 1947 had to be amended by the Intelligence Reform and Terrorism Prevention
In the United States the CIA or the Central Intelligence Agency is the main agency for gathering secret information and responsible for operations outside the United States. The FBI or Federal Bureau of Investigation has the primary responsibility for counterespionage activities within the United States. Counterespionage is when a country or an organization captures a hostile spy and turns them into a so-called “double agent” who sends false information to their own organization. It prevents other nations from gaining such information. Under international law, these activities are not illegal, but individual nations have laws against spying. However, spies are not considered with common or uncommon criminals. They are neither sinners nor international lawbreakers. If spies are caught they are either send back to their country, sent to jail or used as counterespionage (double agents).