-
How does the Intelligence Community (IC) thwart the growing challenges of transnational criminal organizations, terrorist organizations and their associated nefarious activities which impact U.S. National Policy, international laws, and not to mention the innocent lives lost surrounding those events? We take notice in this week’s readings and resources that Open Source Intelligence is a significant to the expansion of strategic intelligence amongst DoD agencies, law enforcement, private sector, media, and the government due to its unrestricted, legal, methods and wide-open sources allowing cross-leveling of information without clearance requirements (need-to-know), and secretive world of the IC unlike that of the technical intelligence collections. Human Intelligence (aka
…show more content…
Furthermore, HUMINT is unrivaled as its capabilities to unmask private and confidential information of those desired collection targets (Lowenthal, 2010). Technical collection intelligence provides simple and plain language, text for analysts to scrutinize, develop and produce intelligence analysis. HUMINT intelligence collection also has a downside to its efforts and the resistance of counter-intelligence efforts and actors. Deception has been said to plague the HUMINT world leaving many questions of the actual source and motives for the unsolicited information against the collection target such as potential double-agent. Technical collection techniques have been degraded by the pace of change in telecommunications technology and by our adversaries’ increasing awareness of our capabilities such as signal and imagery intelligence, measurement and signature intelligence. Often times technical collections are hindered by laws and policies we have created to protect ourselves; Foreign Intelligence Surveillance Act (FISA) which governs, in part, the manner in which the U.S. government may conduct electronic surveillance within the United States and electronic surveillance of U.S.
The three great conflicts of the twentieth century: World Wars I and II and the Cold War impacted the progression of the intelligence revolution. During these conflict the United States leadership “looked to intelligence as a weapon of defense and as an aid to victory. ”1 Further, it was the pressures of these wars that the intelligence community expanded, moving closer to the inner circle of the government.2 Furthermore, as the intelligence community expanded, and intelligence professionals developed their skills in conducting threat assessment. In view of, a need to expand the intelligence community it began the rise of the intelligence community in the 20th century.3
This paper discusses how political, military, economic, social, information, infrastructure, physical environment and time factors affect human intelligence operations within Pakistan against the terrorist group Lashkar-e-Tabia. This paper goes on to identify the conditions, effect and response of previously mentioned factors while conduction human intelligence operations. By developing specifically tailored human intelligence responses to the conditions and effects a human intelligence team will be able to use the environment and population to amplify any existing advantage. When no advantage exists to the human intelligence collector the response will dictate how the human intelligence team will be able to reduce any disadvantage or if possible turn that disadvantage into the collector’s advantage.
Counterintelligence is one of the most vital areas of the United States intelligence system, and is heavily intertwined with our history, laws and ethics. According to the National Security Act of 1947, counterintelligence (CI) is defined as “information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities.” It consists of five activities and functions: operations, investigations, collection, analysis and production, and functional services. In this aspect, CI is unique in that it is both an activity and its product. U.S. intelligence agencies, including the National Security Agency (NSA) and the Central Intelligence Agency (CIA) collect and analyze both CI information and foreign intelligence. There are many counterintelligence activities that the United States is involved in, as both CI and foreign intelligence play an important role in countering threats to our country’s national security. Among these most controversial and misunderstood activities are counterespionage and disinformation.
The 1776 united States of America Declaration of Independence contain the words that succinctly describe our national objective, strategy, and message, “We hold these Truths to be self-evident, that all Men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty, and the Pursuit of Happiness.” In today’s United States of America, the world acknowledges American’s as the preeminent owner of individual freedoms, holding and promoting these three basic principles for some 240 years. During these years, the U.S. has employed the use of intelligence to shape its objectives and strategies, and then in times of war used the same intelligence to shape strategic messages against foreign powers. However, as hostilities decline and give way to the restoration of relative peace, the use of intelligence for strategic messages against foreign powers ceases. Under these circumstances, the void created by secession of U.S. messages, provides a communication opportunity to foreign powers for transmission of anti-U.S. messages. Attempts have been made to reinstate the offices that during war countered these anti-U.S. messages to a comprehensive reorganization of the U.S Government intelligence community. This paper does not support creation of a new agency or department to utilize existing strategic intelligence.
The 9/11 attacks opened the avenue for a scrutiny of the performance and ability of the intelligence community to detect any threats to the safety of the United States. The media, politicians, reformists and other interested parties would not comprehend how such an attack would happen without the knowledge of the intelligence community. However, it is important to consider the fact that the attack was one of its kind and could not be approached with the resources and expertise used in other initiative such as the cold war. Therefore, the need to restructure the intelligence community arose from the view that it was still operating in the mindset and spirit of the cold war even in the modern era that had seen a revolutionary change of warfare
Counterintelligence (CI) involves actions aimed at protecting the United States against foreign intelligence operations and espionage from penetration and disruption by hostile nations or their intelligence services (Lowenthal, 2014). Three main components of Counterintelligence include collection, defensive and offensive. Collection is ability to gather intelligence information about rivalry capabilities against own nation; defensive part of CI involve measures to prevent and thwarting other nations attempts to penetration into own nations intelligence system; while offensive deal with running double agents to penetrate, manipulate, exploit, and control targeted adversaries. CI is said to be the most essential aspect of the intelligence disciplines, in the sense that collecting vast quantities of secret information and produce excellent analysis of the intelligence, but ineffective counterintelligence measures may diminish confidence the final results (Van Cleave, 2013). According to Federal Bureau of Investigation (2011) “Significant advances have been made in clarifying and rectifying intelligence gaps and requirements through the formation of liaison and working relationships with other U.S. intelligence community agencies, foreign partners, the private sector, and academia”. For instance, since 2001, FBI CI program has resulted to total arrests of 249, of which 46 of them were linked to espionage. Counterintelligence (CI)
The attack on the World Trade Center was not the first attack and was not the first time the US Intelligence Community had heard of Al-Qaeda or Osama Bin Laden. The role of counterintelligence from both sides the US and Al-Qaeda, lent to the information flow not only form the attackers but also to the ones who would ultimately respond. The FBI, the CIA, the DIA, have integral parts in these series of events from the information collection to the information flow. In a time where it was realized that Counterintelligence and Counterterrorism have a similar need, as well as information sharing across agencies, have led to the CI and IC we see today.
Central to threat assessment is intelligence to help develop our own targets to deter or punish state sponsors. In this regard, the development of long-term human source intelligence [HUMINT] is often cited as a vital component in building our ability to preempt attacks. Critical to threat assessment is the need to get smarter, not just in protecting against the threat from outsiders, but smarter about the threat posed by people with legitimate access. This includes acts of carelessness by insiders. A chain is only as strong as its weakest link. We need to continue our efforts to enhance our vigilance to minimize any potential threats posed by third country nationals- for example, threats posed by outsiders working at U.S. embassies and military installations overseas.
(2011). No More Secrets: Open Source Information and the Reshaping of US Intelligence: Open Source Information and the Reshaping of US Intelligence. California,CA:ABC-CLIO,LLC
Terrorism has become a main threat to the peace and development in the U.S and the world as a whole. Past experiences of terrorism such as the September 11th attack in the United States has a created the need to have a functioning counters intelligence which will effectively deal with terrorism. However, for the counter intelligence to be effective, other basic functions have to be played out. The basic functions are collection and analysis. The other function is the execution of covert actions and the major role is the counterintelligence. The Intelligence agents combine all roles and place them under the umbrella of intelligence.
The United States Intelligence community draws on advanced technology and analytical techniques. An intelligence process that sets objectives, collects, analyzes, and report findings, with feedback loops integrated throughout. Explicitly, the intelligence community advantages technology and tradecraft within a proscribed process. However, estimation of threats and decision-making are outcomes of human thinking. Analysts and policymakers create mental models, or short cuts to manage complex, changing environments. In other words, to make sense of ambiguous or uncertain situations, humans form cognitive biases. Informed because of personal experience, education, and specifically applied to intelligence analysis, Davis
Intelligence collection and apprehension of criminals have occurred for many years; however, with the exception of the Federal Bureau of Investigation, these actions were performed by different organizations. Nonetheless, roles and responsibilities have changed since the attacks on September 11, 2001. Intelligence-led policing and the National Criminal Intelligence Sharing program were incorporated, and fusion centers were established to help gather intelligence from different levels of the government. Although law enforcement at the local, state, and tribal levels aid in intelligence collection, it is important to ensure that intelligence gathered to protect national security and law enforcement
While the Department of Homeland Security (DHS) is one, centralized agency, securing the homeland involves the cooperation and collaboration of many, different agencies and organizations ranging from local law enforcement to national agencies such as the NSA, CIA, and FBI. Each of these agencies contributes to the development of homeland security intelligence. By carefully analyzing and commenting on the objectives, tasks, strengths, weaknesses, and roles of each agency, a larger picture emerges regarding the capabilities and limitation of intelligence in supporting homeland security efforts.
Intelligence is one of the first lines of defense used by the United States to protect the Country against both foreign and domestic threats (Johnson, 2010). There are many ways and methods of intelligence collections employed by the intelligence community such as “spies, eavesdropping, technical sources, and openly available materials” etc (Clark, 2013). Method used also depends on many factors such as available resources, time, agency involved, and intelligence collection source. U.S Intelligence agencies use different collection and analytical method that suit their collection function, structure and pro¬cess. For example, DNI/OSC relies on open source (OSINT), CIA uses human intelligence (HUMINT) tactic, DIA uses measurements and signatures intelligence (MASINT), NSA employs signals intelligence (SIGINT), and NGA utilizes imagery intelligence (IMINT) techniques for their intelligence collections (Clark, 2013).
Counterintelligence (CI) involves actions aimed at protecting the United States against foreign intelligence operations and espionage from penetration and disruption by hostile nations or their intelligence services (Lowenthal, 2014). Three main components of Counterintelligence include collection, defensive and offensive. The collection is the ability to gather intelligence information about rivalry capabilities against own nation; defensive part of CI involves measures to prevent and thwart other nations ' attempts to penetrate into own nation 's intelligence system; while an offensive aspect deal with running double agents to penetrate, manipulate, exploit, and control targeted adversaries. CI is said to be the most essential aspect of the intelligence disciplines, in the sense that it helps in collecting vast quantities of secret information and produce an excellent analysis of intelligence, although, ineffective counterintelligence measures may diminish confidence in the final results (Van Cleave, 2013).