100% (1)
page:
5 pages/≈1375 words
Sources:
-1
Style:
APA
Subject:
Social Sciences
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 25.92
Topic:

Domestic Intelligence Collection and Analysis and the Different Disciplines and Strategies

Research Paper Instructions:

1) Introduction:

Develop a research paper to address domestic intelligence collection and analysis of your ISIS-West Africa  from your Red Cell Midterm Assignment. Building on the information that you started in your midterm, prepare a new research paper that addresses which intelligence collection disciplines and agencies are essential to effectively collect on and analyze information about the red cell threat you chose in 5-7 full pages of content (not counting title or reference pages).

2) Domestic Intelligence Collection and Analysis:

Specify the most effective intelligence collection and analysis methods against the terrorist organization likely to conduct an attack within the United States that you selected by clearing answering all 3 of the following:

A) - What domestic intelligence collection efforts would be best utilized on the organization you selected? (Intelligence Collection disciplines discussed in week 5) Do not focus on overseas intelligence collection programs; this is an HLSS course and we are focused ONLY on collection within the U.S. homeland. 

B) - Which members of the IC would be the best collectors of intelligence on this particular organization within the country? (the intelligence and law enforcement agencies of the intelligence community we discussed in week 2) You may address agencies that collect overseas and within the homeland as the terrorism nexus overlaps both domains. You may also consider some of the field agencies of DHS (since DHS I&A is just an office and does not collect) as some of the operating components do collect like ICE, CBP, USCG, and the Secret Service (who does focus on terrorism financing). Again, this is a Homeland Security course, so focus on the agencies that can support the homeland (like the FBI), NOT primarily overseas intelligence collection of foreign targets. Clearly focus your paper only on domestic intelligence and law enforcement and remember the CIA does not collect intelligence on Americans domestically, they are a foreign intelligence agency (as are ALL of the military intelligence branches). See the readings from week 5 as well as this link to Executive Order 12333 https://www.cia.gov/about-cia/eo12333.html. However, the NSA is very different as they can and do collect both foreign and domestic communications (when authorized by a court [like FISA] or under certain conditions by the Attorney General to support the FBI). See https://www.nsa.gov/about/faqs/sigint-faqs.shtml

C) - What intelligence analysis strategies would be the most effective and why? (choose only from the analytical strategies discussed in the week 6 lesson and specifically the reading A tradecraft primer: Structured analytic techniques for improving intelligence analysis). Remember that critical thinking (brainstorming) and situational logic DO NOT in themselves constitute an analytical approach -- be specific and pick at least two specific strategies you think will help analyze what can be collected on a clandestine terrorist group attempting to attack the U.S. homeland.

Research Paper Sample Content Preview:

Domestic Intelligence Collection and Analysis
[Name]
[Institutional Affiliation]
Introduction
Intelligence is commonly used within any quarters of a government, meaning a process that bears fruit from information that has been collected, evaluated, integrated and interpreted CITATION Int91 \l 2057 (Interagency OPSEC Support Staff, 1991). Intelligence collection is essential to a country since it dispels ambiguity that is inherent when the external activities are observed. Most of the times, an enemy of the state might seek information about that state about their military capabilities economic programs or just some property information of the United States. On the other hand, the United States might seek information concerning the capabilities of that enemy and how it may harm the citizens of the United States. Many countries have a dedicated organization that is focused on domestically collecting intelligence for the safety of their country, but the US does it differently from them.
The Federal Bureau of Investigation (FBI) is the official intelligence agency, while the Central Intelligence Agency (CIA) and the Department of Defence (DoD) also is concerned about intelligence domestically but with the CIA that role extends to abroad. The CIA participate in domestic intelligence to curb any threat that comes from out of the country to harm the country (Central Inteligence Agency(CIA), 2019). Sometimes the intelligence of US can be compromised by a former employee of the intelligence that exposes the country’s activities concerning espionage. For instance, the summer of 2013, where the former contractor of the National Security Agency (NSA) and the CIA Edward Snowden shocked many in the world by issuing an elaborative revelation of how the government does its surveillance activities and spying on the citizens of United States CITATION Gre13 \l 2057 (Greenwald, 2013). This is a research paper on the domestic intelligence collection and analysis of the Islamic State in the Greater Sahara (ISGS) threat in the US soil, and evaluating the intelligence collection disciplines and agencies that can effectively collect and analyse information about ISGS.
Domestic Intelligence Collection and Analysis
Domestic Intelligence, as the name suggests, deals with tracking of gathering information about a threat from within the country. As discussed, the policing body that deals with this is the FBI which not just terrorism, but gather information about the locals who are a threat to others or cases of homicides within the country. The FBI was created in the year 1908 with responsibilities of both enforcing the law and cases of espionage CITATION Per09 \l 2057 (Peritz & Rosenbach , 2009). FBI must train its employee on how to gather, analyse and present the intelligence information for its use in protecting the American Citizens. This is because the intelligence information is fragile and can cause much damage to the people whom it wasn’t supposed to reach and therefore the FBI employees must swear to secrecy and make sure the information doesn’t leave the premise.
There are processes for gathering, production, and presenting the intelligence information to the relevant personnel who uses it effectively. The process until the information is relayed to the person to whom it is meant, and there are steps. The first step is planning and direction, which entails managing the intelligence effort from identifying a need for data to delivery of the final intelligence information to the person consuming it. This process usually comes after a potential threat has been identified, and a preliminary observation takes place in preparation of getting more information. The second step is the collection, which involves information acquisition. This process also involves the management of different activities that include criteria of collection of this information that optimises the use of intelligence resources. The third step is processing; this is where the collected information is converted into a form that can be presented and palatable to the intelligence. Such that the intelligence analyst has an easy time using this information presented. The fourth step is production; this step involves analysing, evaluation, interpretation and integration of the raw data into a complete intelligence report for an expected purpose and application. The complete intelligence report is supposed to focus on what is needed. Should be objective, well-timed, and accurate. The final process is the dissemination of the report, which describes how the report is conveyed to whomever it concerns, and the concerned party should be able to use it effectively. The approved relevant networks and medium can be used at this stage CITATION The91 \l 2057 (The Joint Chiefs of Staff, 2011)
Figure SEQ Figure \* ARABIC 1: The Intelligence Cycle
Intelligence Collection on ISGS
Different intelligent disciplines can be employed by the enemy to acquire information concerning the US; they are as follows:
* Human intelligence (HUMINT)
* Signals intelligence (SIGINT)
* Imagery Intelligence (IMINT)
* Measurement and signatures intelligence (MASINT)
* Open-source intelligence (OSINT)
ISGS is affiliated to the ISIS; therefore, they draw ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!