ACT FOUR FADE IN: INT. ABANDONED MILITARY COMPLEX - DAY There are two desk in two rows. The team is taking a critical multiple choice exam. Anthony struggles to cheat off of Jorge’s paper. Beverly is focused on her paper. Brandon, sits, holding his head up with one hand. KEEGAN ALEXANDER 60s, works for the Defensive Intelligence Agency. He is sitting at a desk watching everyone. Anthony raises his hand. ANTHONY Sir, request permission to use the bathroom. KEEGAN You have five minutes. Anthony rushes out the door. BRANDON I am finished sir. KEEGAN Leave it on your desk. Anthony enters the room. Beverly snarls at Anthony. KEEGAN (CONT’D) Alright people, we’re going to learn about Counterintelligence. ANTHONY That’s a big word. Every one laughs. …show more content…
BRANDON Sir, you lost me. What does that mean? KEEGAN In 1940, President Roosevelt signed Executive Order (EO) 8381. This was the first Presidential Order designed to protect sensitive information in the name of “national defense.” Anthony raises his hand. KEEGAN (CONT’D) You have a question? ANTHONY Is this Counterintelligence? KEEGAN Counterintelligence (CI) is intertwined with our history, laws and ethics, and major espionage cases have affected American society and politics from German saboteurs and communist movements to terrorist cells today. JORGE Excuse me. I thought we were going after drug dealers. KEEGAN Drug profits are used to fund terrorist. The first clue to understanding counterintelligence is in the word itself. What is it that counterintelligence is “counter” to or against? If you answered, “foreign intelligence threats” you are correct. Beverly raises her hand. KEEGAN (CONT’D) Yes. BEVERLY Counterintelligence encompasses both “information” and “activities.” When we collect intelligence on what foreign intelligence services are doing that intelligence is called “counterintelligence information.” KEEGAN You are …show more content…
I hate guns. WARREN When I am handing over ten million dollars of my hard earned money, you can never be to cautious. MALINKA How long do you know my brother? WARREN I know Ivan a long time. MALINKA Ivan and I are one. WARREN No offense, but I like dealing with Ivan. MALINKA Ivan has one more year to go in that fifthly prison. So you are stuck with me. WARREN When do I get my washed money? MALINKA I will need a few days. And my fee is twenty percent. WARREN I will need five separate checks. MALINKA I know darling. I know... She walks closer to Warren and leans into his ear. MALINKA (CONT’D) I need a favor. WARREN A favor? MALINKA I need someone to disappear. WARREN I’m not in the disposal business. MALINKA If you do this favor for me, I will arrange to get you 50 kilos of Heroin. Warren thinks for a moment. WARREN OK. MALINKA Come visit me at the club and I will give you the details. She kisses him on the cheek. She motions to the bodyguards to get the suitcase. The Mercedes, casually pulls away. DEREK You trust that bitch? WARREN No! But what choice do I have? DEREK We need some new
In Roosevelt’s Executive Order 9066, he states that in times of war, protection against “espionage and against sabotage” is needed for the safety of the populus(Document E). The intended audience of this order is to the general American public and to the different military commander who will use this new law how they may. This quotation, coming directly from the order, shows that it was for a security purpose. If this measure was not taken and thousands of Americans died because of it, there would be a massive uproar complaining about not taking all of the relevant steps to put the country’s citizens out of harm’s
“Counterintelligence (CI) refers to information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, persons, or international terrorist activities, however, not including personnel, physical, document or communications security programs.” (United States 1981)
In the aftermath of 9/11 the intelligence community (IC) felt pressure from all directions. Employees of the IC, Congress, and the general public wanted questions answered as to why our nation didn’t know an attack was imminent. This “failure” of intelligence caused a shake up within the entire IC, leading to many future changes. One such change was in communications intelligence (COMINT) collection. According to Cummings (2006), “President George W. Bush said that he authorized NSA to intercept the international communications of people with known links to al Qaeda and
There are several different types of counter-narcotic plans which allow for intelligence agencies and/or law enforcement personnel to retrieve necessary information in regards to protecting our country and all of the things we hold near and dear. Knowing there are multiple plans that could be used, it is important to understand how each plan works, who is the most qualified to run each plan, and on whom the plans will be directed towards. In this essay, I will discuss the different types of counter-narcotic plans and how they will be used in working against the Cuban drug trafficking organizations.
The ideas discussed in this article are also discussed in an article by Ross Bellaby in the Journal of Intelligence and National Security. Bellaby notes that as intelligence collection adapts to new threats in the world, a coherent ethical framework is needed to prevent abuse. He is concerned about the ability of intelligence organizations to intercept, monitor and retain personal data and personal communications on computers throughout the world forever. Individual privacy boundaries are being shattered as intelligence agencies routinely intercept our communications without our consent.
We have to learn lessons from the past how vulnerable our counter intelligence operation is and build the system to safeguard our classified information to protect American citizens harm from our adversaries. We can’t afford to have another penetration on our counter intelligence operation. Hanssen, Ames, Montes cases must be the last example of penetration to our CI operation flaw. Harber argues that government agencies are responsible more thorough background investigations and periodic reviews; regular personal finance disclosure for national security officials and their families; and more frequent polygraphs. (Harber 2009, 228) This will help to mitigate the treat from our enemies. Former National Counterintelligence Executive Michelle Van Cleave has argued that ‘‘By working the foreign intelligence service as a strategic target globally, U.S. counterintelligence should be able to leverage insights into adversary activities and vulnerabilities to direct CI operations to maximum effect.’’ (Harber 2009,
Badge and credentials, and firearms are issued to federal agents or law enforcement officers to conduct official business and protect themselves and others. Agencies such as the Federal Bureau of Investigations (FBI), Drug Enforcement Agency (DEA), the Army’s Criminal Investigation Division (CID), and many other federal agencies work in this capacity of carrying firearms, badge and credentials without the associated stigma and constraints that counterintelligence suffer from. Very few Army counterintelligence offices or entities function in the same manner as our civilian counterparts. Therefore, the question is why the Counterintelligence Corp is not working in the same capacity and function as our civilian law enforcement counterparts regarding
In “The High Cost of Afghanistan’s Opium Economy” Jennifer Quigley-Jones warns her readers of the extreme dangers Afghanistan’s opium economy brings. Quigley-Jones explains that the opiate problem is only getting worse as the addiction rate has tripled over the last five years. With over seven providences cultivating opium a solution has to surface. Quigley-Jones explains how the government has failed in eradication and seizure attempts. In 2011 only 4% of opiates were seized while less than 3% was
Other intelligence operations also consist of covert, counterintelligence operations. Counterintelligence is usually used to collect information about the adversary and weaken foreign intelligence operations. Sabotage, spying, and infiltration are all characteristics of foreign intelligence operations. Covert operations hide the identity of the agent(s) or officer(s) executing the operations. If operations are compromised, this protects the agent(s) against retaliation from the enemy.
My childhood was anything but ordinary; a typical Saturday afternoon in the would consist of me watching a documentary on the origins of the universe, C-SPAN, or learning a new programming language. I wasn’t a fan of baseball, football, or most other sports for that matter, I just really liked learning. I have always possessed a quiet sense of internal patriotism and watching the President deliver the State of the Union to me was like the Super Bowl. However, it wasn’t until after some soul searching in the ninth grade that I know I wanted a career within the United States Intelligence Community. Thomas Jefferson, in Congress wrote on July 4, 1776 “That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed”. This single quote (that I hold close to my heart), a devastating event on a Tuesday morning in September 2001, a strong sense of civic duty, and ensuring the continuity of the American Dream is why I want to contribute to the silent story of Central Intelligence Agency (CIA).
The CIA (Central Intelligence Agency) is a civilian intellect agency. It is an execution of the government of the United States of America. More so, CIA is an executive organization that directly reports to the DNI (Director of Nation Intelligence) (White, 2008). Of note is that the agency is tasked with offering national security intellect evaluation to senior policy makers of the United States. It must be noted that intelligence collection is crucial to the protection and safety of the Americans and the country as whole. Among the responsibilities of the CIA is to counteract the U.S military from going into war. CIA work jointly to collect useful information as regards security of the nation besides helping offset warfare.
When I think of Counterintelligence, what comes to mind is the Intelligence Community, with Department of Defense (DoD) in particular and of course Foreign Intelligence Services (FIS). Moreover, until a few years ago, was unaware of corporate CI and that changed after some of my former colleagues told me that they we working in the private sector. When thinking of private sector, I would say that most of us don’t consider its contribution to national security; however, that is not the case. DoD and other government agencies rely heavily on private corporations to develop new equipment and technologies that are used for national security. “Today, foreign intelligence services, criminals, and private sector spies are focused on American industry
One may wonder what the roots of competitive intelligence, intellectual espionage, and reverse engineering are. On the surface, it may seem clear that there is a distinction between competitive intelligence and corporate espionage. One is gained legally, as a means of retaining corporate relevance, while the other is gained illegally and at in some cases in an indignant fashion [4]. According to David Blenkhorn, a professor at Wilfrid Laurier University, this topic is not appropriately discussed in universities today. It is not clear or obvious how one should treat corporate intelligence ethically, as cultural viewpoints skew the morality of the situation. It certainly could be argued that this information gathering is a necessary and sufficient means to an end. Dr. Blenkhorn notes that there is a generally accepted ethical view with respect to information gathering in Europe and North America, but in other countries, this perspective is quite different. To some degree this may be a normalization of deviance, where over time, such actions are simply accepted as a means of holding a business or national security edge, and thus over time becomes ingrained into the culture. Interestingly, according to Professor Blenkhorn, one of his students from Russia was taught how to conduct industrial
When the wrong person gains intelligence information than many lives are put at risk. Covert
Espionage has been recognized as an important part of all military affairs since the beginnings of recorded history. It began with, and still heavily relies upon, the various forms of