Building on the information that you prepared from your Midterm Assignment

User Generated

tnzory

Business Finance

Description

I will added everything you need all the readings, also week six is not up yet but I will added it next week I wanted to give you a head start. I will add my midterm paper and how to make it better because he took off a lot I did get a B, but I need better. On my midterm paper I did add a few things he had to say. really need this paper to be good. Once again I will add week 6 things this coming week thank you

Assignment Instructions

Building on the information that you prepared from your Midterm Assignment, prepare a new research paper that addresses the below information in 5-7 full pages of content (not counting title or reference pages):

For the terrorist organization likely to conduct an attack within the United States that you selected, determine:

- What domestic data collection programs would be best utilized on the organization you selected? (Intelligence Collection disciplines discussed in week 5) Do not focus on overseas intelligence collection programs; this is an HLSS course and we are focused only on the homeland.

- Which members of the IC would be the best collectors of intelligence on this particular organization? (we discussed the agencies of the intelligence community in week 2) You may address agencies that collect overseas and within the homeland as the terrorism nexus overlaps both domains. You may also consider some of the field agencies of DHS (since DHS I&A is just an office and does not collect) as some of the operating components do collect like ICE, CBP, USCG, and the Secret Service (who does focus on terrorism financing). Again, this is a Homeland Security course, so focus on the agencies that can support the homeland (like the FBI), not primarily overseas intelligence collection of foreign targets.

- What intelligence analysis strategies would be the most effective and why? (choose only from the strategies discussed in the week 6 lesson). Remember that critical thinking is not a strategy -- be specific about what you think will help analyze what we collect on a clandestine terrorist group attempting to attack the U.S. homeland.

Note: As a paper for this HLSS course, these questions are to be answered as it relates to collecting and analyzing intelligence on the terrorist group plans and activities within the U.S. as they prepare to attack so that law enforcement and security officials here in the homeland can detect, identify, and warn on this potential or hypothetical attack. You do not need to address how to stop this attack, that will be the subject of your recommendations in your final paper. Only address your hypothetical attack using a paragraph or two (unless you were specifically told that you did not address the attack in sufficient detail in your midterm).

This progress paper will set the stage for your final paper where you will then discuss how intelligence, law enforcement and homeland security officials from all three levels of government can prevent or disrupt this attack (as well as your recommendations to them in your final paper). Therefore, do not address measures to stop or interdict the terrorists in your progress paper, only focus here in this paper on intelligence collection disciplines, the most appropriate IC agencies to play a role, and the most effective analytical techniques to employ in this scenario.

I would also remind you that the CIA does not collect anything domestically, they are a foreign intelligence agency. See the readings from week 5 as well as this link to Executive Order 12333 https://www.cia.gov/about-cia/eo12333.html. The NSA is very different as they can and do collect both foreign and domestic communications when authorized by a court (like FISA) or under certain conditions by the Attorney General (to support the FBI). See https://www.nsa.gov/about/faqs/sigint-faqs.shtml

The Progress Assignment is due on Sunday of Week 6. The analysis must be double spaced and follow APA guidelines (in -text parenthetical citation format, not endnotes or footnotes) and be free of typographical, spelling and grammatical errors (see example paper). 5 is the minimum number of pages of content not counting title page and reference page. Name the assignment "LastnameHLSS320Progresspaper.doc". Compliance with the above directions, quality of your analysis, and the SSGS Assignment Rubric for 300-400 Level Classes will be used to evaluate this assignment. Assignment Rubric

Clarification on assignments: The first paper (the midterm, your Red Cell paper) was about the terrorist group you selected and was basically from the terrorist perspective, and it should have addressed attack scenarios of how your group could attack the U.S. Homeland. The second paper (the progress assignment) is from the friendly perspective and is on how the U.S. can do intelligence collection and analysis on the terrorist group:

For the final assignment, it will give you an opportunity to describe how to stop the attack by making your own recommendations based on what you learned.

Note: You must use APA (in-text parenthetical) format [but not endnotes or footnotes] in HLSS owned courses. The APUS library has many useful documents, videos and guides on how to research, write and cite for college level papers. See http://www.apus.edu/Online-Library/resources-services/resources/student-academic-resource-center.html. I have also attached an example papers to the assignment instructions for your midterm that you should use as a template for your papers in this course.

Make sure you read the instructions carefully and that you focus your paper on answering the assigned question. This assignment is a research paper, not an opinion paper, so you need to cite scholarly sources to support your thesis. Make sure you use APA style in-text parenthetical citations at the end of every sentence where you are quoting or paraphrasing another’s ideas (or any information) that is not your own thoughts and words, like this (Bergen, 2015, para 14). I highly recommend you use the APUS writing guide based on the APA style which can be found in the university library or at this link: APUS Style Guide for APA. You are welcome to use supplementary sources to compliment the assigned readings based upon your research, but make sure you use scholarly and credible sources. See the APUS Library Homeland Security Program Guide for good sources, as well as the APUS Research Primer and the APUS Library Research FAQs.

Requirements:

- 5-7 Full pages of text (not counting title page or references). 5 FULL pages of content is the minimum acceptable length

- Written according to the APA style and format;

- Use Times New Roman 12 point font;

- 1 inch margins on all sides with no paragraph indentation other than the first line by .5 inches

- Double space all text (no extra lines or spaces after a paragraph or section headings and no added font sizes or lines either)

A respectable number of credible resources used, cited in the paper as in-text citations, and included on the reference page. A good rule of thumb is at least 2 scholarly sources per page of content (at least 10 scholarly references for this 5 page paper). Use those sources provided to you throughout the course (listed in the announcements), as well as other material obtained from conducting your own research. Freely utilize appropriate and reputable academic sources, summarize in your own words and cite accordingly.

Be mindful of excessive direct quotes as the paper should not contain just a string of various quotations. Make sure you comply with all academic integrity standards expected by APUS and as slide 14 of the APUS Academic Integrity presentation posted in course syllabus (and the week 1 introduction forum) states “Quotes cannot make up more than 10% of the text of your assignment.” So paraphrase where you can and provide your own analysis and synthesis of your research. See the syllabus tab within this course for more important information on academic integrity and the repercussions of plagiarism.

Unformatted Attachment Preview

1 Isis Christopher Hawthorne Professor Jeffery Gardner 18, April, 2017 Isis 2 Isis Table of content 1.0…………………………………………………………………………………Introduction 1.1…………………………………………………………………………………Body 1.1.0……………………………………………………………Islamic ideology 1.1.1……………………………………………………………To take over the world 1.1.2……………………………………………………………Financial institution 1.2…………………………………………………………………………………Conclusion 1.3…………………………………………………………………………………reference 3 Isis 1.0 introduction Following the recent missile attack by the US that was targeting the ISIS, my focus will be on the possibility of ISIS revenging; they are a bunch of savages. ISIS is an abbreviation of Islamic States of Iraqi and Syria. It is an unrecognized pro-state militant group and is considered one of the most successful to have existed. It originated from Jama ‘at al Tawhid that took part in the Iraqi insurgency and proclaimed itself a worldwide caliphate. Many countries with UN among them refer to this group as a terrorist group. The group is highly destructive and is known for video beheadings of its prisoners. ISIS has bureaucratic hierarchy of leaders. The groups’ territories include oil fields that is a major source of income. Though the adoption of the name Islamic states has been greatly criticized, the group claims authority over all Muslims across the world. The group is believed to be fully operational in over 18 countries and is seemingly growing to other countries. 4 Isis 1.1 body Islamic States ideology is the establishment of a theological empire also known as the Caliphate to be ruled by a single political and religious leader according to Sharia; the Islamic law. ISIS can be traced back to 2003 when US among other Nations successfully killed Saddam Hussein whose regime was full of war against humanity. Their main objective to taking over the world is to influence people mainly youth into joining them to help them expand and grow stronger. They want a global leader and they believe the only way to come to this is through a global war. They teach extremism and influence their prey such that they lose their minds; they are taught that if they die in that path of seeking the truth, they shall enter paradise. Abu Bakr al-Baghdadi is deemed to be the leader of this pro-militia group. The figure is quite shadowy and little is known about him. Though there are claims that he studied at various courses at certain universities within Iraq and that he later taught as a lecturer, none of this has yet been clarified. Islamic states are known for exploiting the area around them as a means of acquiring funds to enhance their operations. They control financial institutions, tax and oil. Exporting of oil from oil fields captured by Islamic states earns them a fortune since it is estimated to earn over US$1 million a day. This is believed to be one of the greatest means of making money. They are also believed to taking captives and asking for ransoms in exchange for their freedom. In this case they just don’t kidnap everybody but rather relatives of tycoons who can be able to raise the crazy amount of cash they ask for. Some countries and individuals are also believed to making donations to this ruthless group with Qatar being in the spotlight. It was believed that the group 5 Isis acquired a lot of wealth when it captured Mosul through looting. Sale of antiques and artifacts is believed to be the second largest source of income. This is because they looted a grand palace and smuggled the treasure to other countries for sale. The US has constantly been coming into the way of the ISIS achieving their ultimate goal which is to rule the world with the sharia law put in place. Recently on April 3rd US launched a missile that was targeting the ISIS that saw them loose some of their men and weapons. In Iraq the US has been supporting the government in the war against this group and they lost quite a number of wars hence lost some of their territories to the government and the US forces. They must be very bitter and I believe that they will soon hit back at the US who are seemingly getting into their way. Firstly, there is a very high possibility of US being massively hit bearing in mind that Trump doesn’t seem to be cooperating with countries like Iran, Russia and Syria itself. Unlike the former presidents, Trumps regime might be a little different because he works his way. The United States can never go it alone and win this war unless they add more troops to their forces and invest heavily on it at the same time and this might not be easy. Trump’s relation with other countries might make ISIS come out strong since some of them might start turning their backs on US and supporting ISIS. Trump is known for his famous radical phrase ‘Islam hates us’ thus his war seems to be directly on Muslims rather than the terrorist groups. This poses a great danger to the US since the angered Muslim nations can opt to support ISIS to fire back. Secondly, Islamic state might not physically come and attack the United State but rather some of its supporters within the US might slowly revenge, Trump’s relation with the local 6 Isis Muslims has never been good hence the likelihood of having a few haters is a real thing. He seems to be promoting radicalism among his citizens and that comes with many problems. Thirdly, the Islamic States might opt to take US citizens who travel to other countries as tourists or even researchers their captives. It’s not the best alternative but this will hurt US directly. ISIS is known to possess chemical weapons; ISIS has attacked civilians with the chemical and killed hundreds. They are also known to possess vast number of assault and battle riffles, sniper rifles, machine guns, pistols, explosives and anti-tank weapons and anti-aircraft launchers, towed artillery, tanks and armored fighting vehicles, artillery, aircraft and watercraft. 7 Isis 1.2 Conclusion The chances of the US being attacked by the ISIS are generally very high. Considering that the US president hasn’t been cooperating with other nations it might not receive the support it requires in the war against this ruthless group. Secondly presidents Trump belief that Muslims are the countries enemies might just be another trouble. Since his inauguration he has raised a new travel ban that blocks migrants from many Islamic countries. This brings hatred and thus may lead them encourage and help ISIS attack US. To win this battle the United States must ensure good relation with other countries like Russia, Iran and Syria. The president must also ensure he wins local Muslims loyalty. In so doing they will easily win the battle since by having a good relation with those countries they will get to know a lot about the enemy. Once the enemy is known inside out it is quite easy to deal with them effectively. 8 Isis 1.3 reference Adan Suleiman, (June 26th 2014) inside the Middle East Retrieved from http//:www.christianpost.com Christian Morison (May 2015) The Sun magazine about the Middle East, Retrieved from http//:www.thesun.com Amanpor (December 2014) CNN, inside the Middle East; ISIS, Retrieved from http//:www.cnn.com Edgar Owen, (January 20th 2015) The National Magazine, Retrieved from http//:www.crethiplethi.com Thank you for your work on this midterm paper. Your assignment was to select a terrorist organization likely to conduct a terrorist attack in the U.S. and complete an in-depth profile on the organization in 5-7 pages. Your task was to explain the organization’s origins, ideology, goals & objectives, leadership, funding, and capabilities and describe how you envision this group actually conducting an attack within the United States, such as the known and suspected weapons/lethal agents and delivery methods, and the tactics, techniques and procedures that they may use in conducting the attack within the U.S. homeland. Below is your grade breakdown and some comments are also included within your paper using GRADEMARK (see below). Make sure you incorporate my input into your future papers. Your paper was graded based on the SSGS grading rubric for 300-400 level courses as follows: 17/20 Focus/Thesis 16/20 Content/Subject Knowledge 18/20 Critical Thinking Skills 9 Isis 15/20 Organization of Ideas/Format 16/20 Writing Conventions Final Grade: 82 You can view my comments/corrections directly on your paper in grademark. Click on the percentage % number next to your paper file where it is green, yellow, or red. Your paper will open in turnitin. In the upper left you’ll see ORIGINALITY in red, GRADEMARK, and PEERMARK. Click GRADEMARK and then your paper will open and you can scroll down (The tab will turn blue once you click on it). Hover your mouse over the blue bubbles to read the full comments I made. WEEK 2: INTELLIGENCE COMMUNITY ORGANIZATION Lesson Last week we explored the relatively short history that the United States has of intelligence being a key component of national security. However, even in that short history several changes have taken place. Since the events of September 11, 2001 there has been a significant reorganization of the intelligence leadership and capabilities at the federal level. The primary purpose of the reorganization was to improve critical shortfalls in communication efforts and information sharing that were identified within the 9/11 Commission Report. (U.S. National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report (Washington, D.C.: GPO, 2004), pp. 399, 411.) The two most notable changes that occurred were: 1. 2. The Homeland Security Act of 2002 (P.L. 107-296), which formally created the Department of Homeland Security (DHS); and (U.S. Congress. House of Representatives. Select Committee on Homeland Security. Homeland Security Act of 2002, 107th Cong., 2d sess., 2002. HR Rep. 107-609, pt. 1.) The Intelligence Reform and Terrorism Prevention Act of 2004 (P.L 108-458), which created the Office of the Director of National Intelligence (ODNI) (Intelligence Authorization Act for Fiscal Year 2003, Public Law 107–306, 107th Congress (November 27, 2002). Prior to these events there was not a cabinet level department that had specific responsibility to unify and execute all homeland security initiatives and the director of the Central Intelligence Agency (CIA) was the U.S director of intelligence. With the passages of these two acts DHS is now charged with safeguarding the country against acts of terrorism and the director of ODNI serves as the director of national intelligence (DNI). INTELLIGENCE TIMELINE • • • • • • • • 1947-2004: CIA Director is U.S. Director of Intel events of 2001 9/11 Report HLSAct 2002 DHS Opens its Doors (2003) Intel Act 2003 ODNI established Lead of ODNI is DNI Currently in the United States, the intelligence community (IC) is comprised of 17 entities, including ODNI who is the lead for all of the IC and ensures seamless intelligence integration. Each of the 16 organizations function under their own directives; however, they also collectively work together to ensure the security of the country. (An Overview of the United States Intelligence Community for the 111th Congress (2009), http://www.dni.gov/overview.pdf) The following descriptions of the IC are based on direct excerpts from the Office of the Director of National Intelligence’s webpage. Office of the Director of National Intelligence The Director of National Intelligence serves as the head of the Intelligence Community, overseeing and directing the implementation of the National Intelligence Program and acting as the principal advisor to the President, the National Security Council, and the Homeland Security Council for intelligence matters related to national security. Working together with the Principal Deputy DNI and with the assistance of Mission Managers and Deputy Directors, the Office of the DNI's goal is to effectively integrate foreign, military and domestic intelligence in defense of the homeland and of United States interests abroad. With this goal in mind, Congress provided the DNI with a number of authorities and duties, as outlined in the Intelligence Reform and Terrorism Prevention Act of 2004 including to: • • • • • • • Ensure that timely and objective national intelligence is provided to the President, the heads of departments and agencies of the executive branch; the Chairman of the Joint Chiefs of Staff and senior military commanders; and the Congress. Establish objectives and priorities for collection, analysis, production, and dissemination of national intelligence. Ensure maximum availability of and access to intelligence information within the Intelligence Community. Develop and ensure the execution of an annual budget for the National Intelligence program based on budget proposals provided by IC component organizations. Oversee coordination of relationships with the intelligence or security services of foreign governments and international organizations. Ensure the most accurate analysis of intelligence is derived from all sources to support national security needs. Develop personnel policies and programs to enhance the capacity for joint operations and to facilitate staffing of community management functions. Oversee the development and implementation of a program management plan for acquisition of major systems, doing so jointly with the Secretary of Defense for DOD programs, that includes cost, schedule, and performance goals and program milestone criteria. Air force Intelligence The U.S. Air Force Intelligence, Surveillance, and Reconnaissance (USAF ISR) Enterprise is America's leading provider of finished intelligence derived from airborne, space, and cyberspace sensors. The USAF ISR Enterprise delivers decision advantage in order to enable commanders to achieve kinetic and non-kinetic effects on targets anywhere on the globe in support of national, strategic, operational, and tactical requirements. The AF/A2 is the USAF's Senior Intelligence Officer and is responsible for functional management of all Air Force global integrated ISR capabilities, including oversight of planning, programming, and budgeting; developing and implementing the Air Force policies and guidance for managing Air Force global integrated ISR activities; and professional development, training, education, readiness, and deployment of 50,000 military and civilian United States Air Force intelligence personnel. Army Intelligence U.S. Army Intelligence (G-2) is responsible for policy formulation, planning, programming, budgeting, management, staff supervision, evaluation, and oversight for intelligence activities for the Department of the Army. The G-2 is responsible for the overall coordination of the five major military intelligence (MI) disciplines within the Army: Imagery Intelligence, Signals Intelligence, Human Intelligence, Measurement and Signature Intelligence, and Counterintelligence and Security Countermeasures. Central Intelligence Agency The Central Intelligence Agency (CIA) is responsible for providing national security intelligence to senior U.S. policymakers. The CIA director is nominated by the president and confirmed by the Senate. The director manages the operations, personnel and budget of the CIA and acts as the National Human Source Intelligence manager. The CIA is separated into four basic components: the National Clandestine Service, the Directorate of Intelligence, the Directorate of Science & Technology, and the Directorate of Support. They carry out “the intelligence cycle,” the process of collecting, analyzing, and disseminating intelligence information to top U.S. government officials. Coast Guard Intelligence The Coast Guard's broad responsibilities include protecting citizens from the sea (maritime safety), protecting America from threats delivered by the sea (maritime security), and protecting the sea itself (maritime stewardship). The Coast Guard's persistent presence in the maritime domain, due to its diverse mission sets and broad legal authorities, allows it to fill a unique niche within the Intelligence Community. Because of its unique access, emphasis, and expertise in the maritime domain Coast Guard Intelligence can collect and report intelligence that not only supports Coast Guard missions, but also supports national objectives. Coast Guard Intelligence strives to create decision advantage to advance U.S. interests by providing timely, actionable, and relevant intelligence to shape Coast Guard operations, planning, and decision-making, and to support national and homeland security intelligence requirements. The Coast Guard became a member of the Intelligence Community Dec. 28, 2001. Defense Intelligence Agency The Defense Intelligence Agency is a Department of Defense combat support agency. With more than 16,500 military and civilian employees worldwide, DIA is a major producer and manager of foreign military intelligence and provides military intelligence to warfighters, defense policymakers and force planners, in the DOD and the Intelligence Community, in support of U.S. military planning and operations and weapon systems acquisition. The DIA director serves as principal adviser to the secretary of defense and to the chairman of the Joint Chiefs of Staff on matters of military intelligence. The director also chairs the Military Intelligence Board, which coordinates activities of the defense intelligence community. Department of Energy The U.S. Department of Energy's Office of Intelligence and Counterintelligence is responsible for the intelligence and counterintelligence activities throughout the DOE complex, including nearly 30 intelligence and counterintelligence offices nationwide. The mission is to protect, enable, and represent the vast scientific brain trust resident in DOE's laboratories and plants. The office protects vital national security information and technologies, representing intellectual property of incalculable value, and provides unmatched scientific and technical expertise to the U.S. government to respond to foreign intelligence, terrorist and cyber threats, to solve the hardest problems associated with U.S. energy security, and to address a wide range of other national security issues. Department of Homeland Security The Office of Intelligence and Analysis is responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the U.S. DHS Intelligence focuses on four strategic areas: Promote understanding of threats through intelligence analysis; Collect information and intelligence pertinent to homeland security; Share information necessary for action; and Manage intelligence for the homeland security enterprise. The Under Secretary for I&A also serves as DHS’ chief intelligence officer and is responsible to both the secretary of Homeland Security and the director of National Intelligence. Department of State The Bureau of Intelligence and Research provides the Secretary of State with timely, objective analysis of global developments as well as real-time insights from all-source intelligence. It serves as the focal point within the Department of State for all policy issues and activities involving the Intelligence Community. The INR Assistant Secretary reports directly to the Secretary of State and serves as the Secretary's principal adviser on all intelligence matters. INR's expert, independent foreign affairs analysts draw on all-source intelligence, diplomatic reporting, INR's public opinion polling, and interaction with U.S. and foreign scholars. Their strong regional and functional backgrounds allow them to respond rapidly to changing policy priorities and to provide early warning and in-depth analysis of events and trends that affect U.S. foreign policy and national security interests. Department of the Treasury The Office of Intelligence and Analysis was established by the Intelligence Authorization Act for fiscal 2004. OIA is responsible for the receipt, analysis, collation, and dissemination of foreign intelligence and foreign counterintelligence information related to the operation and responsibilities of the Department of the Treasury. OIA is a component of the U.S. Department of the Treasury’s Office of Terrorism and Financial Intelligence (TFI). TFI marshals the Department’s intelligence and enforcement functions with the twin aims of safeguarding the financial system against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction proliferators, money launderers, drug kingpins, and other national security threats. Drug Enforcement Administration The Drug Enforcement Administration is responsible for enforcing the controlled substance laws and regulations of the United States. DEA’s Office of National Security Intelligence (ONSI) became a member of the IC in 2006. ONSI facilitates full and appropriate intelligence coordination and information sharing with other members of the U.S. Intelligence Community and homeland security elements. Its goal is to enhance the U.S.’s efforts to reduce the supply of drugs, protect national security, and combat global terrorism. DEA has 21 field divisions in the U.S. and more than 80 offices in more than 60 countries worldwide. Federal Bureau of Investigation The FBI, as an intelligence and law enforcement agency, is responsible for understanding threats to our national security and penetrating national and transnational networks that have a desire and capability to harm the U.S. The National Security Branch was established in response to a presidential directive and Weapons of Mass Destruction Commission recommendation to establish a National Security Service that combines the missions, capabilities, and resources of the FBI’s counterterrorism, counterintelligence, and intelligence elements under the leadership of a senior FBI official. In July 2006, the NSB created the WMD Directorate to integrate components previously distributed throughout the FBI. The NSB also includes the Terrorist Screening Center, which provides crucial, actionable intelligence to state and local law enforcement, and the HighValue Detainee Interrogation Group, an interagency body that collects intelligence from key terror suspects to prevent attacks against the U.S. and its allies. Marine Corps Intelligence The U.S. Marine Corps produces tactical and operational intelligence for battlefield support. Its IC component is comprised of all intelligence professionals in the Marine Corps responsible for policy, plans, programming, budgets, and staff supervision of intelligence and supporting activities within the USMC. The department supports the commandant of the Marine Corps in his role as a member of the Joint Chiefs of Staff, represents the service in Joint and Intelligence Community matters, and exercises supervision over the Marine Corps Intelligence Activity. The department has service staff responsibility for geospatial intelligence, advanced geospatial intelligence, signals intelligence, human intelligence, counterintelligence, and ensures there is a single synchronized strategy for the development of the Marine Corps Intelligence, Surveillance, and Reconnaissance Enterprise. The Marine Corps' director of intelligence is the commandant's principal intelligence staff officer and the functional manager for intelligence, counterintelligence, and cryptologic matters. National Geospatial-Intelligence Agency The National Geospatial-Intelligence Agency provides timely, relevant, and accurate geospatial intelligence in support of national security objectives. Information collected and processed by NGA is tailored for customer-specific solutions. By giving customers ready access to geospatial intelligence, NGA provides support to civilian and military leaders and contributes to the state of readiness of U.S. military forces. NGA also contributes to humanitarian efforts such as tracking floods and fires, and in peacekeeping. NGA is a Department of Defense Combat Support Agency. Headquartered in Springfield, Va., NGA operates major facilities in the St. Louis, Mo. and Washington, D.C. areas. The agency also fields support teams worldwide. National Reconnaissance Office The National Reconnaissance Office designs, builds and operates the nation's reconnaissance satellites. NRO products, provided to an expanding list of customers like the Central Intelligence Agency and the Department of Defense, can warn of potential trouble spots around the world, help plan military operations, and monitor the environment. As part of the Intelligence Community, the NRO plays a primary role in achieving information superiority for the U.S. Government and Armed Forces. A DOD agency, the NRO is staffed by DOD and CIA personnel. It is funded through the National Reconnaissance Program, part of the National Foreign Intelligence Program. National Security Agency/Central Security Agency The National Security Agency/Central Security Service is the nation's cryptologic organization that coordinates, directs, and performs highly specialized activities to protect U.S. information systems and to produce foreign signals intelligence information. A high-technology organization, NSA is at the forefront of communications and information technology. NSA is also one of the most important centers of foreign language analysis and research within the U.S. government and is said to be the largest employer of mathematicians in the United States and perhaps the world. Founded in 1952, NSA is part of the Department of Defense and a member of the U.S. Intelligence Community. The Agency supports military customers, national policymakers, and the counterterrorism and counterintelligence communities, as well as key international allies. Its workforce represents an unusual combination of specialties: analysts, engineers, physicists, mathematicians, linguists, computer scientists, researchers, as well as customer relations specialists, security officers, data flow experts, managers, administrative officers and clerical assistants. Navy Intelligence The Office of Naval Intelligence is the leading provider of maritime intelligence to the U.S. Navy and joint warfighting forces, as well national decision makers and other consumers in the Intelligence Community. Established in 1882, ONI specializes in the analysis, production and dissemination of vital, timely and accurate scientific, technical, geopolitical and military intelligence information to key consumers worldwide. ONI employs more than 3,000 military, civilian, mobilized reservists and contractor personnel worldwide, including analysts, scientists, engineers, specialists and technicians. While ONI is the largest Naval Intelligence organization with the largest concentration of Naval Intelligence civilians, most of Naval Intelligence is comprises active duty military personnel, serving throughout the world. Conclusion Unlike some other nations, the U.S. does not have a dedicated domestic intelligence agency, however the design of the IC helps to ensure that information sharing occurs. WEEK 5: INTELLIGENCE COLLECTION Lesson By now you should have a strong understanding of the history of intelligence in the U.S.; how the intelligence community functions; how intelligence is produced; and the role of local, state and the federal governments in intelligence activities. But, you may still be wondering where does all the information that these entities collect actually come from. And, just as importantly, how is this information obtained. In lesson three, we learned about the intelligence process and used the five-phase cycle to examine the various steps. As you recall, in the process, phase two is the collection phase. We briefly also identified and defined the six basic sources of information. These are referred to as “intelligence collection disciples” or the “INTs” 1. 2. 3. 4. 5. Human Intelligence (HUMINT) Signals Intelligence (SIGINT) derived from all communications intelligence (COMINT), electronic intelligence (ELINT), or foreign instrumentation signals intelligence (FISINT). Imagery Intelligence (IMINT) / Geospatial intelligence (GEOINT) Measurement and Signatures Intelligence (MASINT) Open-Source Intelligence (OSINT) These disciplines are the sources of all the information that is collected to produce intelligence products. Remember, it is a bit of a misperception that secret “movie-like” missions collect all information. While it is true that some is indeed collected in the more classic “spy” type way; a great deal of information is collected by looking at sources that everyone can access. For the purposes of this class, we will use the Federal Bureau of Investigation’s (FBI’s) explanations of the first five INTs, which include a high level discussion of which members of the IC use the those INTs. The description of the last INT, GEOINT, remains the same as lesson three and is provided by the CIA. Human Intelligence (HUMINT) is the collection of information from human sources. The collection may be done openly. For example: when FBI agents interview witnesses or suspects, or it may be done through clandestine or covert means (espionage). Within the United States, HUMINT collection is the FBI’s responsibility. Beyond U.S. borders, HUMINT is generally collected by the CIA, but also by other U.S. components abroad. Signals Intelligence (SIGINT) refers to electronic transmissions that can be collected by ships, planes, ground sites, or satellites. Communications Intelligence (COMINT) is a type of SIGINT and refers to the interception of communications between two parties and includes electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT). U.S. SIGINT satellites are designed and built by the National Reconnaissance Office, although conducting U.S. signals intelligence activities is primarily the responsibility of the National Security Agency (NSA). Imagery Intelligence (IMINT) is sometimes also referred to as photo intelligence (PHOTINT). One of the earliest forms of IMINT took place during the Civil War, when soldiers were sent up in balloons to gather intelligence about their surroundings. IMINT was practiced to a greater extent in World Wars I and II when both sides took photographs from airplanes. Today, the National Reconnaissance Office designs, builds, and operates imagery satellites, while the National Geospatial-Intelligence Agency is largely responsible for processing and using the imagery. Measurement and Signatures Intelligence (MASINT) is a relatively little-known collection discipline that concerns weapons capabilities and industrial activities. MASINT includes the advanced processing and use of data gathered from overhead and airborne IMINT and SIGINT collection systems. Telemetry Intelligence (TELINT) is sometimes used to indicate data relayed by weapons during tests, while electronic intelligence (ELINT) can indicate electronic emissions picked up from modern weapons and tracking systems. Both TELINT and ELINT can be types of SIGINT and contribute to MASINT. The Defense Intelligence Agency’s Central MASINT Office (CMO), is the principal user of MASINT data. Measurement and Signatures Intelligence has become increasingly important due to growing concern about the existence and spread of weapons of mass destruction. MASINT can be used, for example, to help identify chemical weapons or pinpoint the specific features of unknown weapons systems. The FBI’s extensive forensic work is a type of MASINT. The FBI Laboratory’s Chem-Bio Sciences Unit, for example, provides analysis to detect traces of chemical, biological, or nuclear materials to support the prevention, investigation, and prosecution of terrorist activities. Open-Source Intelligence (OSINT) refers to a broad array of information and sources that are generally available, including information obtained from the media (newspapers, radio, television, etc.), professional and academic records (papers, conferences, professional associations, etc.), and public data (government reports, demographics, hearings, speeches, etc.). Unlike the other INTs, open-source intelligence is not the responsibility of any one agency, but instead is collected by the entire USIC. One advantage of OSINT is its accessibility, although the sheer amount of available information can make it difficult to know what is of value. Determining the data’s source and its reliability can also be complicated. OSINT data therefore still requires review and analysis to be of use to policymakers. Geospatial intelligence (GEOINT) is the analysis and visual representation of security related activities on the earth. It is produced through and integration of imagery, imagery intelligence, and geospatial information. Some example applications include the analysis of multi-spectral images and even change detection (like when earth/dirt has been disturbed). It is important to keep in mind a few key points about collection. Often in the field of intelligence you will hear a great deal of discussion about “connecting the dots” meaning putting all the pieces of information together to yield a usable end product or action. However, this is not what collections is about. Collections literally means collecting the information OR collecting “the dots”. The next phases of the intelligence cycle process and analyze the collected information, which is connecting the dots (Norwitz 2010). References Central Intelligence Agency (CIA). Retrieved from https://www.cia.gov/library/publications/additional-publications/the-work-of-a-nation/work-of-thecia.html Federal Bureau of Investigation (FBI). http://www.fbi.gov/about-us/intelligence/disciplines Norwitz, J. (2010). Disrupting human networks: Ancient tools for modern challenges. In Homeland Security and Intelligence, edited by Logan, K. Santa Barbara, CA: Praeger Security International. Retrieved from http://ezproxy.apus.edu/login?url=http://psi.praeger.com/doc.aspx?d=/books/gpg/C9095C/C9095C1079.xml
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Thank you for working with me

Running head: THE ISIS TERRORIST GROUP

The ISIS Terrorist Group
Name:
Institutional affiliation

1

2

THE ISIS TERRORIST GROUP

The ISIS Terrorist Group
Domestic Data Collection Programs
There are some programs used by the homeland security in the collection of intelligence
data. The security departments may utilize these programs when collecting information on
Islamic States of Iraqi and Syria (ISIS). The Human Intelligence (HUMINT) is one of the
programs used in data collection. This program aims at obtaining intelligence data about a
terrorist group through interviewing of human sources. The FBI has a mandate to a collection of
data from suspects either openly or covert within the borders of America. This technique is most
appropriate it only takes human intervention to assess the plans of the ISIS terrorist group.
Furthermore, HUMINT is necessary for the provision of coverage and access. There are
locations such as underground that needs human intelligence. The unveiling of such activities by
the ISIS is only possible through the use of human intelligence. To determine ISIS attributes,
personality, and motive, HUMINT is the best program to use (Finnegan, 2000).
The second technique that the government security can use to obtain information about
ISIS terrorist group is the open source intelligence (OSINT). This method is where government
agency collects information about the terrorist group from print media, government agencies, and
academic scholars among others. Reviewing this information will provide the intelligence units
with information on the location of the ISIS group, their beliefs, leadership, history, and the
sources of finance. The use of OSINT is likely to produce more information that will facilitate
the understanding of the group. Moreover, the mutual interaction between different agencies will
facilitate the acquisition of the relevant information. The development of the internet has had a

THE ISIS TERRORIST GROUP

3

positive impact on OSINT since information about the group can be easily accessed (Johnson,
2010).
The third technique is the signals intelligence (SIGINT) where the intelligence agency
and homeland security collects ele...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags