JohnsonHLSS320Progress

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

320

Subject

Business

Date

Jan 9, 2024

Type

docx

Pages

9

Uploaded by tarrisjohnson25

1 Domestic Intelligence Collection and Analysis – Al-Qaeda Tarris J. Johnson American Military University HLSS 320 Dr. Jeffrey Gardner 13 June 2021
2 Introduction Domestic Intelligence covers the activities that are performed with the aim and purpose of protecting the United States. The main purpose of Domestic Intelligence is to detect and prevent terrorist attacks from happening on American soil. Domestic Intelligence activities include human intelligence, signal intelligence, and imagery intelligence. Various Domestic Intelligence collection efforts are applied to collect intelligence on Al-Qaeda. The efforts will be analyzed and the best highlighted as well as the best Intelligence Collection disciplines. The collection of intelligence is important because it helps the country avert attacks and keeps the country warned and informed about the activities of the terrorist groups. Domestic Intelligence Collection Efforts Domestic Intelligence collection efforts in the United States are divided into many categories and have different collection agencies. One key intelligence collection effort is the use of human sources. HUMINT is one of the oldest forms of intelligence collection. The widely known aspect of HUMINT data collection is when an agent goes undercover and joins a terror group to collect information regarding the group (Richelson, 2018). However, Domestic Intelligence collection on Al-Qaeda by HUMINT may involve many activities, including the recruitment of assets that may be part of the group. When an individual is identified, and their information reveals that they are part of Al-Qaeda, they are approached and either coerced or enticed into providing information. The individual now becomes a mole inside the terrorist group. They inform the authorities through a handler of information and happenings in the group. In exchange, they are either promised amnesty or protection. Domestic collection using HUMINT can also involve assets that offer information as they remain part of the group because of their personal ideas or financial reasons. For example, an individual may have been recruited into Al-Qaeda but after a while sees that the cause and reason that made him join is not being fulfilled. When the person comes out to the
3 authorities, they are considered an asset and are asked to maintain their position as they inform. Defectors of the terrorist group are also considered HUMINT and provide information regarding the group meeting point and plans that are underway (Richards, 2018). Data collection using HUMINT on Al-Qaeda has its benefits and disadvantages. Data collected this way is very reliable if the sources are trustworthy, for instance, an agent who has gone undercover. However, this data collection method puts the lives of the assets and their families in danger should the group find out that they have a mole in the organization. Domestic Intelligence collection efforts on Al-Qaeda also involve the interception of communication between members of the group. This intelligence collection method is referred to as signal intelligence, SIGINT. Suspected members of the Al-Qaeda have agents physically follow them and watch them determine what activities they are engaged in to predict their plans. As physical surveillance is ongoing, online and communication surveillance is also used to collect intelligence. With the increased use of the internet and social media, intercepting emails and social media messages such as Facebook messages may provide information on the plans and activities of Al-Qaeda. The telephones of known or suspected members are also intercepted and analyzed to interpret the chatter (Kilroy, 2017). While many will use codes to communicate, the agencies employ the services of professionals who have experience and knowledge of some of the codes that may be used in communication. Financial data is also monitored using SIGINT. If unusual financial data traffic is observed in a certain individual account, it could be a sign of a plan that is undergoing. By following the financial data, the authorities can also create a connection between the terror group and the people who fund the group. The Department of Homeland Security is tasked with intelligence collection at the airports as people come in and leave the country. The type of intelligence collected as individuals come into the country is useful in forming a basis of other intelligence collection
4 methods. Individuals who have had suspicious activity before they get into the country or whose reason for coming into the country is not valid are flagged, and a follow-up is done. The follow-up may involve questioning or surveillance once they are in the country. Intelligence collected is important because it provides knowledge of any new and suspicious people in the country, which facilitates monitoring to ensure that they do not facilitate or engage in terror activities. Domestic Intelligence collection efforts also include open-source intelligence (OSINT). Open-source intelligence consists of information that is retrieved from public sources. The information is available to the public on platforms such as newspapers and websites (Steele, 2007). The intelligence gained through this data collection method is readily available to the public. Still, analysis can provide more insight into the terror groups and indicate their plans or what they are likely to do. Examples of open sources that may be sourced on intelligence include newspapers, journals, televisions, radios, and the internet. Best collector of Intelligence on Al-Qaeda The Intelligence Community is comprised of the FBI, the DHS, and the Department of Defense. The Federal Bureau of Investigation, FBI, would be one of the best collectors of intelligence on Al-Qaeda within the United States. The FBI being a member of the Intelligence Community, uses intelligence to investigate and solve cases and share intelligence with other IC members. The FBI collects intelligence through HUMINT, SIGINT, and OSINT. The main reason why the FBI would be one of the best collectors of intelligence on the Al-Qaeda is the HUMINT. Within the United States, the collection of intelligence using human sources is the responsibility of the FBI. The FBI has perfected the art of intelligence collection through HUMINT by having assets and their agents undercover to get more information regarding the activities of Al-Qaeda in the country (Sinai, 2018). Human sources, especially trustworthy
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help