JohnsonHLSS320Progress
docx
School
American Military University *
*We aren’t endorsed by this school
Course
320
Subject
Business
Date
Jan 9, 2024
Type
docx
Pages
9
Uploaded by tarrisjohnson25
1
Domestic Intelligence Collection and Analysis – Al-Qaeda Tarris J. Johnson
American Military University
HLSS 320
Dr. Jeffrey Gardner
13 June 2021
2
Introduction
Domestic Intelligence covers the activities that are performed with the aim and purpose of protecting the United States. The main purpose of Domestic Intelligence is to detect and prevent terrorist attacks from happening on American soil. Domestic Intelligence activities include human intelligence, signal intelligence, and imagery intelligence. Various Domestic Intelligence collection efforts are applied to collect intelligence on Al-Qaeda. The efforts will be analyzed and the best highlighted as well as the best Intelligence Collection disciplines. The collection of intelligence is important because it helps the country avert attacks and keeps the country warned and informed about the activities of the terrorist groups.
Domestic Intelligence Collection Efforts
Domestic Intelligence collection efforts in the United States are divided into many categories and have different collection agencies. One key intelligence collection effort is the use of human sources. HUMINT is one of the oldest forms of intelligence collection. The widely known aspect of HUMINT data collection is when an agent goes undercover and joins
a terror group to collect information regarding the group (Richelson, 2018). However, Domestic Intelligence collection on Al-Qaeda by HUMINT may involve many activities, including the recruitment of assets that may be part of the group. When an individual is identified, and their information reveals that they are part of Al-Qaeda, they are approached and either coerced or enticed into providing information. The individual now becomes a mole
inside the terrorist group. They inform the authorities through a handler of information and happenings in the group. In exchange, they are either promised amnesty or protection.
Domestic collection using HUMINT can also involve assets that offer information as they remain part of the group because of their personal ideas or financial reasons. For example, an individual may have been recruited into Al-Qaeda but after a while sees that the cause and reason that made him join is not being fulfilled. When the person comes out to the
3
authorities, they are considered an asset and are asked to maintain their position as they inform. Defectors of the terrorist group are also considered HUMINT and provide information regarding the group meeting point and plans that are underway (Richards, 2018). Data collection using HUMINT on Al-Qaeda has its benefits and disadvantages. Data collected this way is very reliable if the sources are trustworthy, for instance, an agent who has gone undercover. However, this data collection method puts the lives of the assets and their families in danger should the group find out that they have a mole in the organization.
Domestic Intelligence collection efforts on Al-Qaeda also involve the interception of communication between members of the group. This intelligence collection method is referred to as signal intelligence, SIGINT. Suspected members of the Al-Qaeda have agents physically follow them and watch them determine what activities they are engaged in to predict their plans. As physical surveillance is ongoing, online and communication surveillance is also used to collect intelligence. With the increased use of the internet and social media, intercepting emails and social media messages such as Facebook messages may
provide information on the plans and activities of Al-Qaeda. The telephones of known or suspected members are also intercepted and analyzed to interpret the chatter (Kilroy, 2017). While many will use codes to communicate, the agencies employ the services of professionals who have experience and knowledge of some of the codes that may be used in communication. Financial data is also monitored using SIGINT. If unusual financial data traffic is observed in a certain individual account, it could be a sign of a plan that is undergoing. By following the financial data, the authorities can also create a connection between the terror group and the people who fund the group.
The Department of Homeland Security is tasked with intelligence collection at the airports as people come in and leave the country. The type of intelligence collected as individuals come into the country is useful in forming a basis of other intelligence collection
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
methods. Individuals who have had suspicious activity before they get into the country or whose reason for coming into the country is not valid are flagged, and a follow-up is done. The follow-up may involve questioning or surveillance once they are in the country. Intelligence collected is important because it provides knowledge of any new and suspicious people in the country, which facilitates monitoring to ensure that they do not facilitate or engage in terror activities.
Domestic Intelligence collection efforts also include open-source intelligence (OSINT). Open-source intelligence consists of information that is retrieved from public sources. The information is available to the public on platforms such as newspapers and websites (Steele, 2007). The intelligence gained through this data collection method is readily
available to the public. Still, analysis can provide more insight into the terror groups and indicate their plans or what they are likely to do. Examples of open sources that may be sourced on intelligence include newspapers, journals, televisions, radios, and the internet.
Best collector of Intelligence on Al-Qaeda
The Intelligence Community is comprised of the FBI, the DHS, and the Department of Defense. The Federal Bureau of Investigation, FBI, would be one of the best collectors of intelligence on Al-Qaeda within the United States. The FBI being a member of the Intelligence Community, uses intelligence to investigate and solve cases and share intelligence with other IC members.
The FBI collects intelligence through HUMINT, SIGINT, and OSINT. The main reason why the FBI would be one of the best collectors of intelligence on the Al-Qaeda is the HUMINT. Within the United States, the collection of intelligence using human sources is the responsibility of the FBI. The FBI has perfected the art of intelligence collection through HUMINT by having assets and their agents undercover to get more information regarding the
activities of Al-Qaeda in the country (Sinai, 2018). Human sources, especially trustworthy
5
sources such as agents, are the best sources of intelligence of Al-Qaeda because Al-Qaeda knows they are being surveyed and their communication and therefore avoid using communication devices. Their information is passed on to the members physically for security purposes.
The FBI is also the best to collect intelligence as its role is to ensure that the United States is protected against terrorist threats and acts. The agency, therefore, has experience and
information on how to collect intelligence on the terrorist groups. The activities of the FBI over time have been focused on intelligence collection rather than making quick arrests. The intelligence collection activity makes the FBI the best to collect intelligence on Al-Qaeda. Once a suspect is identified as a member of Al-Qaeda, the agency will use the suspect to collect information about the terror group. The FBI would launch surveillance on the suspect and assets deployed to get close to the suspect (Robillard, 2021). These methods of intelligence collection make the FBI one of the best intelligence collection members.
The Department of Homeland Security has an intelligence and analysis branch tasked with equipping the DHS with the intelligence and information necessary to keep the country safe. The mission of the DHS is to stop terrorist attacks before they even start the DHS suitable and one of the best to collect intelligence on Al-Qaeda. The DHS and the I&A were established after 9/11 with the sole aim of collecting intelligence and information to stop terror attacks and would therefore be best to collect intelligence on Al-Qaeda (Tromblay). Their specialty is terrorism and stopping terrorist attacks. The DHS's intelligence collection involves monitoring the internet and communications analysis to detect chatter that could indicate a looming attack.
The DHS, through ICE which is an agency under the DHS, collects intelligence on the
borders and airports of people coming into the country (Gardner, 2020). The intelligence collected on the borders is important in the fight against terrorism because the agency will be
6
informed of any suspicious people coming into the country. Surveillance can start as early as when the individuals get into the country.
Another agency that would be best and instrumental in collecting intelligence is the Department of Justice, Office of Intelligence. The Office of Intelligence is important in intelligence collection as the office ensures that other intelligence communities have the legal
authority necessary to conduct intelligence operations. For example, in the surveillance of a suspect, they provide the FISA clearance. The Department of Justice Office of Intelligence is appropriate in intelligence collection in giving warrants to search premises and warrants to survey and tap into the communication of suspects (Collyer, 2017). The intelligence-
gathering process is volatile, and if it lacks the authorizing documents, the intelligence collected might lack basis in court.
Intelligence Analysis Strategies
Intelligence analysis strategies are strategies that are used to understand the big picture from data and intelligence that has been gathered. The process involves the extraction of meaning and information from data that has been collected through the intelligence-
gathering processes. Key assumptions check as an intelligence analysis strategy would be effective at the beginning of a project. The key assumptions check involves articulating and reviewing the key assumptions to ensure that the assessment will be based on premises that have a basis (US Government, 2012). The strategy of key assumptions check is faced by one key challenge, which is the identification of hidden assumptions. The ideas that are held unconsciously are mostly the ideas that are thought to be true and rarely challenged. Key assumptions strategy in analyzing intelligence collected on a suspect can be analyzed, for instance, to prove the assumption that the suspect is a member of the Al-Qaeda. For instance, a suspect coming into the airport with a passport indicating a visit to countries that are popular with the Al-Qaeda, such as Iraq and with no reason to be in the United States, will be
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
surveyed. The key assumption that will guide the intelligence collection service is that the suspect is a member of Al-Qaeda. The key assumptions strategy will involve analyzing data and the key assumptions to determine which assumptions are more likely according to the intelligence gathered.
The quality of information check is another analysis that is effective in information analysis. The quality of information check involves the weighing of validity of the sources (US Government, 2012). Understanding how valid a source is in terms of accuracy and reliability is a key analysis strategy because the validity of intelligence influences the analytic
judgments that are made. Checking the quality of information is a continuous process and a very effective intelligence analysis process. Determining the quality of intelligence influences
the judgment-making process and is an important analysis strategy.
Another effective intelligence analysis strategy is the indicators or the signposts of change. Indicators of change are important in determining when a hypothesis is developing (US Government, 2012). For instance, in the case of a suspect with a passport that indicates he has been through Iraq, if the surveillance observes the suspect visit a known safe house of the Al-Qaeda or meet with a known member or another suspect of Al-Qaeda, then the hypothesis is developing towards the idea that the suspect is a member of Al-Qaeda. The indicators of change are an important analysis strategy because it proves that the hypothesis is
developing and might be true and helps analyze intelligence and aid in judgment and decision-making. Intelligence analysis strategies are important in decision-making regarding the intelligence and the data that has been collected (Walsh, 2011). Effective intelligence analysis ensures that the data collected helps in making the right decisions.
Conclusion
Conclusively, Domestic Intelligence collection is an important aspect of battling terrorist threats. Intelligence collection informs the agencies of threats before they happen,
8
and the threats can be evaded. Intelligence collection agencies include the FBI, DHS, and the Department of Defense. Some data collection efforts that would be best utilized on Al-Qaeda include human sources, HUMINT. Human intelligence is essential in getting intelligence on Al-Qaeda because they prefer to use physical communication between their members. Another method is the tapping of communications and surveillance of suspects. The intelligence that is gathered is analyzed through different strategies. The strategies that would
be most effective in analyzing the intelligence collected on Al-Qaeda are the key assumptions
check, quality information check, and the use of indicators or signposts of change. The intelligence collection and analysis process is essential in evading terror threats and ensuring that the country is prepared for any threat.
9
References
Collyer, R. M. (2017). Order, In re Unknown Foreign Intelligence Surveillance Court Orders.
Gardner, J. V. (2020). Intelligence Fusion Centers.
Kilroy Jr, R. J. (2017). Terror and technology: domestic intelligence collection and the gossamer of enhanced security.
Journal of Policing, Intelligence and Counter Terrorism
,
12
(2), 119-141.
Richards, J. (2018). Intelligence and Counter-Terrorism.
Routledge Handbook of Terrorism and Counterterrorism
, 1974.
Richelson, J. T. (2018).
The US intelligence community
. Routledge.
Robillard, M. (2021). National counter-terrorism responses: United States of America. In
Global Jihadist Terrorism
. Edward Elgar Publishing.
Sinai, J. (2018). The United States of America: Domestic Counterterrorism since 9/11. In
Routledge handbook of terrorism and counterterrorism
(pp. 635-647). Routledge. Steele, R. D. (2007). Open source intelligence.
Handbook of intelligence studies
,
42
(5), 129-
147.
Tromblay, D. E. Book review: Spying: Assessing US Domestic Intelligence Since 9/11.
US Government. (2012).
Tradecraft primer: Structured analytic techniques for improving intelligence analysis
. Books Llc.
Walsh, P. (2011).
Intelligence and intelligence analysis
. Willan.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Recommended textbooks for you

Purchasing and Supply Chain Management
Operations Management
ISBN:9781285869681
Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:Cengage Learning
Recommended textbooks for you
- Purchasing and Supply Chain ManagementOperations ManagementISBN:9781285869681Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. PattersonPublisher:Cengage Learning

Purchasing and Supply Chain Management
Operations Management
ISBN:9781285869681
Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:Cengage Learning