Counter Terrorism intelligence Scenario that requires the use of counterterrorism forces A terrorist organization operating in a territory of a host country without its knowledge attacks that country's drinking water supply with a view to causing widespread illnesses, deaths, and panic (Burrows & Renner, 1999). The country's intelligence services issues a warning system. This prompts bodies concerned with supply of water to come up with strategies of protecting that country's drinking water supply. They delineate the sources of water and do an inventory of the potential sources of contamination in those areas. The water catchment area is also subsequently mapped. The mapping enables them to conduct quantitative tracer testing where a known quantity of material is released into a source water location and the tracer recovered at a downstream location. This body also uses Efficient Hydrological Tracer-test Design to facilitate tracer testing. Security agencies are eventually posted at every water installation to avert chances of further attacks. That country's intelligence service later manages to locate the base from where these terrorists operate. Because the host country's counterterrorism policy does not allow them to make concession with terrorists, they are left with no choice but to bring them (terrorists) to justice for attempting to murder innocent civilians. A specialized force is charged with responsibility of tracking them down and apprehending them with no
Paper 1: What are the capabilities and limitations of intelligence in supporting homeland security efforts?
Counter Intelligence can be defined as the efforts by an intelligence organization to counter a hostile or enemy organization from successfully acquiring information or anything against them. The intelligence organizations are responsible for the general security of nations and their main responsibility is to keep checking what the enemy nations are doing or have in plan. Equipped with the knowledge, they are then able to give needed advice to the government. Programs have hence been created for this responsibility, and are known as National Intelligence Programs. These programs are highly vulnerable to attacks from the enemies and the intelligence cycle security has to keep check to protect the process.
Terrorism has become popular among extremists who are employing different dynamic strategies to thrive in their agenda. Understanding the terror groups is fundamental principle to overcome them or counter the sects. Modern terrorism has additionally advanced. Today 's assaults are less incessant, however all the more savage. Terrorists beforehand acted like renegades trying to connect with the foe (Miller, 2013. This was trailed by a period of kidnappings and plane hijackings. States create first class counter-terrorist strengths, extraordinarily prepared at prisoner transaction and salvage. Like the youngster 's amusement - paper-scissors-stone the following phase of advancement was the appropriation of bombings as the favored strategy (Roberts, 2014). Bombs can be delivered from basic materials, put and exploded remotely, with generally okay to the planes and little open door for counter-terrorist strengths to catch them. Terror groups like the IRA, Al-Qaida, ISIS and Boko
For our purposes, we will use the Title 22 of the US Code, Section 2656f(d), to define terrorism. It defines terrorism as “premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents” (Central Intelligence Agency, 2013). Examples of terrorism persist on a near daily basis around the world. Unstable countries, such as Afghanistan and Syria, deal with terrorist attacks on a constant basis. The common thread of these attacks is deliberate targeting of civilian populations in order to achieve political objectives. The best known and largest example are
When the 1997 Empire State Building shooting took place, the FBI-New York City police department joint Terrorism Task Force (JTTF). “The task force immediately began working to ascertain the shooters identity, his origin and whether he had any ties to organized terrorist groups” ( Martin, 1999 P.27). It only took a few hours and all these questions had answers. The shooter acted alone, and expressed hatred of Israel and the United States. The FBI-NYPD JTTF has remained on the forefront of the war against terrorism, they are dedicated to fight terrorism, and eliminate the fear and panic that the terrorist rely on to advance their causes. If it was not for the help of JTTF in the Empire State Building shooting it would had taken weeks to
Domestic terrorism is like cancer that eats away at the very values and beliefs of the American people. Instead of combining efforts to peacefully and legally enact change, domestic terrorists take the law and actions into their own hands. Groups such as eco-terrorists use firebombing to make their point that the Earth will be protected at all costs. That cost even meant human lives. Militia groups feel the same way. Their goal is not about saving the Earth but rather to change the government. They see it as too weak to handle the needs of the America people. These individuals use modified firearms, explosives, and survival tactics. Law abiding citizens are not defenseless, the FBI and NCIRC work together to help keep America safe.
Terrorism is an act of violence, usually done in the public sphere, which is used to incite fear in a population in order to coerce change in public opinion or a government’s position on an issue. In many parts of the world, groups wage war with their countries, either to separate from the government or to overthrow it entirely. Sometimes these people are treated unfairly by their government, and their struggles are justified. Other times, these groups use violence against both military and civilian targets, terrorizing innocent bystanders to get what they want—these groups are terrorists. Often, though, it is difficult to tell the difference.
The Border Force Counter-Terrorism Unit (CTU) is a new capability to deal with national security threats at the border. It is part of the Government’s $630 million counter-terrorism package, of which Customs and Border Protection will receive $150 million to implement a number of measures including the establishment of Border Force CTU teams at Australia’s eight major international airports. Customs and Border Protection began standing up interim CTU teams on 22 August 2014, and when completed will provide an additional 80 Australian Border Force Officers stationed across the eight major airports. These proactive, well-equipped and multi-disciplinary specialist teams exercise the full suite of legislative powers available to officers and provide
The United States Department of Homeland Security was used the National Terrorism Advisory System (NTAS) which is terrorism threat advisory scale since 20 April 2011. The framework was reported on 27 January 2011 by Secretary of Homeland Security Janet Napolitano amid a discourse at George Washington University. The National Terrorism Advisory System (NTAS) is a terrorism threat advisory scale used by the United States Department of Homeland Security since April 26, 2011. The NTAS is the replacement for the often-criticized, color-coded Homeland Security Advisory System introduced by the George W. Bush administration in 2002.
In this article “How Safer Streets Can Thwart Terrorists” written by Yonah Freemark, educates us about multiple terrorist attacks that have occurred specifically in the New York area and how the state is working to develop a safer approach. In May of 2017 at Times Square a motorist drove through a large crowd killing one person and injuring many others. Had it not been for a three foot guarding rail, the motorist could have killed many more. Another attack like this happened previously where an average of sixteen pedestrians were killed and since then have doubled. New York is not only the victim of these kind of attacks; famous places like France, Netherlands, and London constantly have attacks like these happen.
According to the Office of the Director of National Intelligence “post 9/11 investigations proposed sweeping change in the Intelligence Community, resulting in the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). The IRTPA created the Office of the Director of National Intelligence (ODNI) to oversee a 17-organization Intelligence Community (IC) and improve information sharing and ensure integration across the nation's IC.” The efforts of the ODNI and the IC to find and kill Usama bin Laden (UBL) following the events of 9/11 were more than sufficient in achieving their mission. It may have taken the IC 10 years of working together to successfully track down the location where UBL was hiding in Pakistan, but they did it and
Counterintelligence (CI) involves actions aimed at protecting the United States against foreign intelligence operations and espionage from penetration and disruption by hostile nations or their intelligence services (Lowenthal, 2014). Three main components of Counterintelligence include collection, defensive and offensive. Collection is ability to gather intelligence information about rivalry capabilities against own nation; defensive part of CI involve measures to prevent and thwarting other nations attempts to penetration into own nations intelligence system; while offensive deal with running double agents to penetrate, manipulate, exploit, and control targeted adversaries. CI is said to be the most essential aspect of the intelligence disciplines, in the sense that collecting vast quantities of secret information and produce excellent analysis of the intelligence, but ineffective counterintelligence measures may diminish confidence the final results (Van Cleave, 2013). According to Federal Bureau of Investigation (2011) “Significant advances have been made in clarifying and rectifying intelligence gaps and requirements through the formation of liaison and working relationships with other U.S. intelligence community agencies, foreign partners, the private sector, and academia”. For instance, since 2001, FBI CI program has resulted to total arrests of 249, of which 46 of them were linked to espionage. Counterintelligence (CI)
Intelligence is a dependable instrument of its own to generate information that establishes the base of National Security in the United States. Intelligence has been used since the beginning of history to provide information on enemy threats and how to prevent a mass disasters. It has been used for wars, national security, military tactics, etc. Intelligence has been available since the revolutionary war and our first president George Washington and other leaders of the world have used intelligence to protect their countries. Intelligence is the dominant and the backbone of homeland Security and it is ceaseless learning about it. National Intelligence agents train tirelessly to fight and create
As a direct consequence of September 11, a number of substantial challenges lie ahead in the area of counter-terrorism.. The most prominent of these is the changing nature of the terrorism phenomenon. In past years, when terrorism was largely the product of direct state sponsorship, policymakers were able to diminish prospects for the United States becoming a target using a combination of diplomatic and military instruments to deter potential state sponsors. Today, however, many terrorist organizations and individuals act independently from former and present state sponsors, shifting to other sources of support, including the development of transnational networks.
Intelligence philosophers such as Sun Tzu, Kautilya and Machiavelli have stressed on the importance of strategic intelligence for the security of a nation and the history across the world is evident with its prime examples. Such is also the case of India and in this presentation we will be examining some key historic Indian events and their impact on the country’s two foremost intelligence agencies – the Intelligence Bureau (IB) and the Research and Analysis Wing (RAW). Towards the end we will also consider the influence of such events on the future of Indian intelligence.