Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

HLSS320Domestic Intelligence Collection and AnalysisAmerican, Lecture notes of Accounting

HLSS320Domestic Intelligence Collection and AnalysisAmerican Military University HLSS320IntroductionAcquisition of terrorist information is a foundation to eliminating the possibilities of occurrences of their threats. The main aim for collecting information is to propagate a basis for producing reliable elements that the terrorist groups may plan. Locally within the United States, intelligence agencies engage in diverse disciplines to facilitate their informationgathering that include; human intelligence (HUMINT), imagery intelligence (IMINT), signals intelligence (SIGINT), open-source intelligence (OSINT) and measurement and signatures intelligence (MASINT) ("Section 2 - INTELLIGENCE COLLECTION ACTIVITIES AND DISCIPLINES - Operations Security - INTELLIGENCE THREAT HANDBOOK", 2021). The intelligence disciplines targeted are engaged by terrorists whenever targeting the United States, thus necessitating the approaches. Besides terrorist activities, organizations and companies engage th

Typology: Lecture notes

2023/2024

Available from 06/20/2024

helperatsof-1
helperatsof-1 🇺🇸

4

(3)

8.4K documents

1 / 7

Toggle sidebar

Related documents


Partial preview of the text

Download HLSS320Domestic Intelligence Collection and AnalysisAmerican and more Lecture notes Accounting in PDF only on Docsity! HLSS320 Domestic Intelligence Collection and Analysis American Military University HLSS320 Introduction Acquisition of terrorist information is a foundation to eliminating the possibilities of occurrences of their threats. The main aim for collecting information is to propagate a basis for producing reliable elements that the terrorist groups may plan. Locally within the United States, intelligence agencies engage in diverse disciplines to facilitate their information gathering that include; human intelligence (HUMINT), imagery intelligence (IMINT), signals intelligence (SIGINT), open-source intelligence (OSINT) and measurement and signatures intelligence (MASINT) ("Section 2 - INTELLIGENCE COLLECTION ACTIVITIES AND DISCIPLINES - Operations Security - INTELLIGENCE THREAT HANDBOOK", 2021). The intelligence disciplines targeted are engaged by terrorists whenever targeting the United States, thus necessitating the approaches. Besides terrorist activities, organizations and companies engage the human intelligence discipline in gathering information from its competitors and threats. Intelligence collection disciplines Collection of the intelligence information on the Asaib Ahl al-Haq (AAH) within the United States homeland can assume the already stated disciplines to ascertain the intentions of the terrorist group. HUMINT implementation would primarily permit gathering information from reliable human sources on the expected intentions of these terrorists. HUMINT has for a long time maintained as the most dependable and widely used intelligence-gathering process. The HUMINT collection process dictates diverse aspects, i.e. sensitive, overt and clandestine factors by the individuals engaging the process (Ivan, 2017). Overt activities are committed through open means based on evaluation of publications, conference materials and congress addresses. Clandestine approaches on the HUMINT approach utilize foreign nationals originating from the terrorist groups' nations in infiltrating related organizations within America. The United States' malicious operations are unveiled through this technique, and a link established on the sufficient information from the terrorist group. The HUMINT discipline facilitates collecting firsthand information as it entails the onsite gathering of data ("Section 2 - INTELLIGENCE COLLECTION ACTIVITIES AND DISCIPLINES - Operations Security - INTELLIGENCE THREAT HANDBOOK", 2021). The HUMINT is profoundly dominant in providing information that is limited in access to the other technical engagements. Another employable collection discipline is the SIGINT. This intelligence-gathering aspect entails transmissions from communications within and across the country. Maintaining targets within the homeland, interception of communication through the numerous existing communication channels presents an opportunity to gather efficient information for intelligence agencies (Lowenthal & Clark, 2015). The SIGINT targets three diverse intelligence disciplines, i.e. communication intelligence, electronic intelligence, and foreign instrumentation signal intelligence. Under communication intelligence, information is obtained from videos, morse codes, voice calls and teleprinter communications. The electrical intelligence discipline utilizes radars and other transmission factors that can relay information on the terrorist activity within the United States jurisdiction. The foreign instrumentation signal intelligence is majorly used on targets typically outside the country. The United States has developed concrete awareness and reach of the law to every corner of its territory. The comprehensive coverage does not allow the development of any weaponry system that will necessitate this kind of intelligence scheme. MASINT implements mainly scientific processes that generate quantitative and qualitative information through sensors incorporated within electrical components to facilitate the engagement of identification features (Clark, 2013). The information generated aids in identifying and classifying the equipment types available for the people involved within a communication. In the United States, homeland various techniques of MASINT are efficient choice of information analysis technique that facilitates awareness of their programs and their affiliates. The key assumptions check complies critically with the information needed from the process as it enables the provision of data checks of the target group (Arcos, 2016). Conducting an analysis ensures every detail is tabled for scrutiny by the specific analyst group. The assessment basis is formed from the tabulated assumptions that generally enhance the possibility of engagement. The critical assumption check allows the agency to explain the logic within an analytic argument and expose the fault within reason. Also, thinking of an issue is stimulated, thus the development of understanding about the subject. Relationships of factors hidden are discovered among the information obtained. Weaknesses of the critical factors are evaluated that could have possibly led to the neglect of the specific issue in question. The key assumptions check facilitates the preparation of the analysts on the surprising circumstances they would engage in the process. Also, the quality information check can be implemented to facilitate the evaluation of competence and soundness of the available sources of information (Marrin, 2012). Critical thinking by the analysts is encouraged to determine the weights of the process information obtained. The data is critically reviewed to ascertain the nature of information present and its ability to engage the specific targeted group constructively. The weaknesses and strengths of the information types are based on previous experiences of similar technique implementation. The quality information check technique is appropriate as it ensures the detection of deceptive information (Prunckun, 2010). Also, it facilitates the awareness of intelligence gaps, thus necessitating new intelligence engagements by the agencies. Policymakers within the institutions are provided with confidence analytics of their analysts on the judgements of the information. The intelligence collection process contributes entirely to the specific analytical approach to be implemented. A comprehensive collection of information entails the engagement of all possible intelligence collection disciplines. The AAH operational capacity in the United States is an indirect approach; thus, ultimate care should be taken and engagement of all intelligence diagnostic methods implemented. The key assumptions check and the quality information check ensures that both possibilities and facts are achieved by adherence to its specific procedures for intelligence analysis. FBI intelligence operations allow them to integrate and engage within the homeland and is elevated by the managerial policy of cooperation with domestic agencies. References Arcos, R. (2016). Public relations strategic intelligence: Intelligence analysis, communication and influence. Public relations review, 42(2), 264- 270.https://doi.org/10.1016/j.pubrev.2015.08.003. Best Jr, R. A., & Cumming, A. (2007). Open source intelligence (OSINT): issues for congress. December, 5, 28. Clark, R. M. (2013). Intelligence collection. CQ Press. Clark, R. M. (2013). Perspectives on intelligence collection. Journal of US Intelligence Collection, 20, 47-52.. Ivan, A. (2017). HUMINT-INTELLIGENCE COLLECTION TOOL. In International Scientific Conference Strategies XXI (pp. 410-414)." Carol I" National Defence University Publishing House. Johnson, L. K. (Ed.). (2010). The Oxford handbook of national security intelligence. Oxford University Press. Lowenthal, M. M., & Clark, R. M. (Eds.). (2015). The five disciplines of intelligence collection. Sage. Marrin, S. (2012). Evaluating the quality of intelligence analysis: By what (mis) measure?. Intelligence and National Security, 27(6), 896- 912.https://doi.org/10.1080/02684527.2012.699290 Partnerships Are Key to Disrupting Violent Plots | Federal Bureau of Investigation. Federal Bureau of Investigation. (2021). Retrieved 11 May 2021, from https://www.fbi.gov/news/stories/public-and-partners-key-to-disrupting-terrorism- plots-050721. Poole, R. A. (Ed.). (2017). Secret agencies: US intelligence in a hostile world. Yale university press. Prunckun, H. (2010). Handbook of scientific methods of inquiry for intelligence analysis (Vol. 11). Scarecrow Press. Section 2 - INTELLIGENCE COLLECTION ACTIVITIES AND DISCIPLINES - Operations Security - INTELLIGENCE THREAT HANDBOOK. Fas.org. (2021). Retrieved 11 May 2021, from https://fas.org/irp/nsa/ioss/threat96/part02.htm.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved