Domestic Intelligence to Stop the Attack
1) Introduction: For this final paper you condense two previous papers into a single research paper and then add 3 substantive recommendations on how you propose that domestic intelligence can be employed more effective to support the HSE to stop terrorist attacks. This is essentially what you need to know to write this final paper.
2) Full Spectrum Domestic Intelligence to Counter Terrorism within the Homeland:
Develop a comprehensive paper summarizing the content and research from your first two papers, and then make at least three substantive recommendations on how to prevent or thwart your selected terrorist group from succeeding in their hypothetical attack on the United States homeland. Use the Organizational Profile (Red Cell paper) you prepared for your Midterm Assignment and combine it with the Progress Assignment you prepared about collecting and analyzing on that group (making all necessary changes based on instructor feedback) and melding them both into one seamless research paper that also adds a major new section to address your specific recommendations to counter your selected terrorist organization's planned attack in the homeland. Make sure your recommendations are focused only on what happens within the homeland as this is not a foreign policy or international relations course. The recommendations need to be something new or enacting a policy or procedure that is not already in place (do not describe how we already protect the homeland or discuss what current agencies do). Be original or cite ideas from others on how to adapt or reform how intelligence can better support homeland security here domestically to stop your hypothetical attack. Also, make sure your recommendations address a role for state and local agencies.
The focus of this paper is to address how intelligence, law enforcement and homeland security officials from all three levels of government can prevent or disrupt this attack here in the U.S. (not overseas) by clearly specifying your recommendations of counter-measures to stop or interdict the terrorists here at home before the attack occurs. Just listing what the government already does to collect and analyze and conduct law enforcement on the terrorism threat to the Homeland is not sufficient -- make some original or even controversial proposals if you like. Do not discuss defensive or protective measures such as increasing physical security the thrust of your recommendations need to be focused on domestic intelligence). You can recommend a change to policy, procedure or an organizational change to how the IC (or an individual agency) supports the homeland which directly contributes to stopping a terrorist attack..
Your paper needs to clearly identify your three homeland security intelligence and law enforcement recommendations at the end of your paper before your conclusions, and include specific section headings for each recommendation with the short title for each recommendation. Your proposals to stop a terrorist attack are the heart of your final assignment, this will be the primary criteria for grading this paper and the comprehensive and culminating event for this course. You must use sections headings like these:
Recommendation #1: Your idea to improve homeland security (domestic) intelligence and law enforcement to specifically stop this impending attack; only what you think should be done at home -- DO NOT make overseas recommendations. All three must be homeland intelligence focused proposals and not address anything going on abroad -- that is not the subject of this course.
Recommendation #2: Make sure at least one recommendation includes a role for the all-important state and local agencies (week 4).
Recommendation #3: Intelligence is about collecting, analyzing, collaborating, sharing/disseminating, etc, so your recommendations must fall somewhere within the intelligence cycle/process we covered about in week 3. Do NOT make recommendations about increased security measures or 'force protection' and defensive approaches -- remember this course is about INTELLIGENCE (which is proactive / preventative, not protective / reactive).
Note on the three paper assignment series: This final assignment combines all that you wrote in the first two papers (they build on each other content not including title and reference pages).
Again, in plain terms, for this final paper, all you have to do is condense your two previous papers (as a research paper) and then make 3 recommendations on how to better stop attacks at the end.
Domestic Intelligence to Stop the Attack
[Name]
[Institutional Affiliation]
Collection and Analysis
Intelligence collection, analysis, interpretation and dissemination are essential to counter external threats that seek to harm the homeland (Interagency OPSEC Support Staff, 1991). In the United States, the official intelligence agency is the Federal Bureau of Investigation (FBI), that collects and analyse domestic intelligence. The Central Intelligence Agency (CIA) and the Department of Defence (DoD), also participate in domestic intelligence but the CIA extends their reach through international borders (Central Intelligence Agency, 2019). There are specific steps in collecting and analysing domestic intelligence for homeland security, which includes planning, collection, processing, production, and dissemination (Gill & Phythian, 2018; The Joint Chiefs of Staff, 2011).
Planning. The intelligence agencies determine the possible terror threat through purposive observation of the situation, then prepare for the acquiring more information about the threat. Proper planning is required for successful collection of information.
Collection. The intelligence agencies involve themselves into different management activities and methodologies to acquire different information that optimise the use of intelligence resource, which include the successful identification of the parties involved in the possible terror threat and the form in which they will perform their attack.
Processing. The collected information is translated into a more presentable and palatable manner, so that the information analysis can easily interpret the results.
Production. This involves analysis, evaluation, interpretation, and integration of raw data into a complete intelligence report for the purposes of applying the information in strengthening homeland security.
Dissemination. The report is conveyed into different concerned parties for effective implementation and changes in the action of the intelligence agency depending on the situation stated on the report.
Intelligence agencies gather intelligence through the use Human intelligence (HUMINT), Signals intelligence (SIGINT), Imagery Intelligence (IMINT), Measurement and signatures intelligence (MASINT), and Open-source intelligence (OSINT) to acquire intelligence concerning the US. HUMINT are information obtained using human agents; IMINT are information from photography; MASINT are information from sensing devices that records electronic signatures; SIGINT are information from intercepted communication; and OSINT are information from open sources such as newspapers and the internet Gill & Phythian, 2018).
Terrorist Group Profile
However, intelligence disciplines are also terrorist groups, such as the Islamic State in the Greater Sahara (ISGS) to threaten the US. The ISGS is affiliated to the ISIS, where they draw their strategies and ideologies from the IS, even their way of carrying out attacks are the same. This group pledges their loyalty to the IS and is determined to participate in achieving the IS’s objective which is restoring the Islamic caliphate CITATION Wei16 \l 2057 (Weiss, Thomas, & Joscelyn, 2016). The terrorist groups obtain funds from the drug trades between South America and Europe, as well as human trafficking. The terrorist group benefit from these kinds of trades and are getting wealthier by the day (Meservey, 2019). The strength of the ISGS has been embolden by at least 10 Islamic terrorist groups across the West African Sahel region. They subdued the weak countries in the region, where providing security for their citizens becomes challenging. Those countries have continued to escalate in poverty levels leaving their citizen with no choice but to join the terrorist groups CITATION UNS19 \l 2057 (UN Secretary-General, 2019).
Hypothetical Terrorist Attack
The main objective of a terrorist attack is to create fear in the citizen of the country and provoke the government to violently respond. Part of the terrorist attack, involves acquiring a working visa to secure employment with the citizens of the US, say security details of crowded area, like the Yankee Stadium in New York City. As long as the raw materials for making explosives can be bought in the country, a potential terrorist just needs to access the country using a tourist or visitation visa. Additionally, the terrorist could have entered the US with the help of a relative that is a citizen in that country or a sympathiser to the terrorists’ cause. Within a given timeframe, the terrorist can familiarise themselves in the target area and assess the security profile, the exits and entry points, the estimated number of people, and other relevant data for the explosion. The Yankee stadium is expected to have a strict security detail when fully packed. However, terrorists have developed bombs that are not easily detected by the screening device when covered. Since the bombs needs to be hidden, they can utilize a Muslim woman since they traditionally cover themselves from head to toe. Once an entry is successful, the trigger could be a button or a cell phone call which will explode at the designated time and specific area within the stadium. One or more terrorists can enter the stadium at different entry points to ensure the success of the plan.
Recommendations
Recommendation #1: Use a test/retest psychometric analytical methods US immigration and private sectors. In the hypothetical situation, terrorists can easily enter the country through the use of a tourist or visitation visa. Usually, the physical profile of the individual terrorist is not easily identified since terrorist groups can easily employ new members from their country to ensures the stability of their operations. Using a validated and reliable psychometric analysis, which can be developed by forensic psychiatrist and psychologist, a scale for classifying possible violent radicalism from the immigrants can be established to assess the possible threat terrorism.
A research program should be established to create the analysis of reviewing current terrorism threats and comparing them with the historic terrorism threats to create a well-calibrated psychometric test for all immigrants. Additionally, more than one test should be implemented if the immigrant ai...
👀 Other Visitors are Viewing These APA Essay Samples:
-
Domestic Intelligence Collection and Analysis and the Different Disciplines and Strategies
5 pages/≈1375 words | No Sources | APA | Social Sciences | Research Paper |
-
Fostering Corporate Diversity in Companies and its Implementation
7 pages/≈1925 words | No Sources | APA | Social Sciences | Research Paper |
-
The International Organizations. Social Sciences. Research Paper
2 pages/≈550 words | 5 Sources | APA | Social Sciences | Research Paper |